Lines Matching refs:enabled
7 called on an opaque key, MBEDTLS_USE_PSA_CRYPTO is enabled,
10 when called on an opaque RSA key, MBEDTLS_USE_PSA_CRYPTO is enabled
26 corresponding PSA mechanism is enabled, since the server provides the
28 * A TLS handshake may now call psa_crypto_init() if TLS 1.3 is enabled.
84 * When the new compilation option MBEDTLS_PSA_KEY_STORE_DYNAMIC is enabled,
86 of increased code size. This option is off by default, but enabled in
116 * MBEDTLS_ASN1_PARSE_C and MBEDTLS_ASN1_WRITE_C are now automatically enabled
117 as soon as MBEDTLS_RSA_C is enabled. Fixes #9041.
124 (feature enabled by MBEDTLS_PSA_CRYPTO_SE_C). In a low memory condition,
131 * Fix a compilation warning in pk.c when PSA is enabled and RSA is disabled.
132 * Fix the build when MBEDTLS_PSA_CRYPTO_CONFIG is enabled and the built-in
133 CMAC is enabled, but no built-in unauthenticated cipher is enabled.
140 when MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS is enabled and
144 * Fix Clang compilation error when MBEDTLS_USE_PSA_CRYPTO is enabled
146 * Fix server mode only build when MBEDTLS_SSL_SRV_C is enabled but
148 * When MBEDTLS_PSA_CRYPTO_C was disabled and MBEDTLS_ECDSA_C enabled,
262 MBEDTLS_PSA_CRYPTO can now be enabled without MBEDTLS_CIPHER_C if all
314 MBEDTLS_PSA_CRYPTO_CLIENT is enabled at build time and psa_crypto_init() is
372 * Fix the build with CMake when Everest or P256-m is enabled through
409 the RSA context. Before, if MBEDTLS_USE_PSA_CRYPTO was enabled and the
434 individually enabled in order to enable respective support; also the
440 PSA (MBEDTLS_PSA_CRYPTO_C) is enabled.
448 saving code size when those are not otherwise enabled.
456 * The TLS 1.3 protocol is now enabled in the default configuration.
525 drivers when MBEDTLS_PSA_CRYPTO_C is enabled and psa_crypto_init() has
548 TLS 1.3 protocols are enabled, the TLS server now selects TLS 1.2 or
593 This is automatically enabled as soon as PSA_WANT_ALG_FFDH
594 and the ephemeral or psk-ephemeral key exchange mode are enabled.
665 MBEDTLS_USE_PSA_CRYPTO and ECDH enabled but DHM and RSA disabled,
685 MBEDTLS_USE_PSA_CRYPTO is enabled.
715 symmetric encryption algorithm and the PSA configuration enabled.
723 is called with zero length and padlock is not enabled.
739 enabled, where some low-level modules required by requested PSA crypto
740 features were not getting automatically enabled. Fixes #7420.
748 * Fix the build with CMake when Everest or P256-m is enabled through
841 and TLS to fully work, this requires MBEDTLS_USE_PSA_CRYPTO to be enabled.
857 to be enabled.
876 MBEDTLS_DEBUG_C is enabled. This may result in an application crash.
881 * MBEDTLS_AESNI_C, which is enabled by default, was silently ignored on
938 MBEDTLS_SSL_RENEGOTIATION was enabled. Fixes #6200.
952 enabled, which required specifying compiler flags enabling SHA3 Crypto
1039 * When MBEDTLS_USE_PSA_CRYPTO is enabled, X.509, TLS 1.2 and TLS 1.3 now
1061 MBEDTLS_SSL_SESSION_TICKETS is enabled.
1081 MBEDTLS_SSL_DTLS_CONNECTION_ID (enabled by default) and configured with
1094 MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
1130 MBEDTLS_DEPRECATED_REMOVED is enabled.
1132 MBEDTLS_AES_ALT is enabled, it could call mbedtls_aes_free() on an
1137 configurations with only one encryption type enabled in TLS 1.2.
1219 * Secure element drivers enabled by MBEDTLS_PSA_CRYPTO_SE_C are deprecated.
1221 documented as such. Use opaque drivers with the interface enabled by
1256 PSA Crypto is enabled.
1273 * When MBEDTLS_PSA_CRYPTO_CONFIG is enabled, you may list the PSA crypto
1288 TLS 1.3 protocols are enabled in the build of Mbed TLS, the TLS client now
1328 MBEDTLS_USE_PSA_CRYPTO is enabled, an opaque key (created with
1333 MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled. An unauthenticated client
1362 in reduced configurations when MBEDTLS_USE_PSA_CRYPTO is enabled.
1364 enabled and an ECDHE-ECDSA or ECDHE-RSA key exchange was used, the
1386 * In configurations with MBEDTLS_SSL_DTLS_CONNECTION_ID enabled but not
1504 the macro MBEDTLS_CHECK_RETURN. The warnings are always enabled
1564 * Fix mbedtls_cipher_crypt: AES-ECB when MBEDTLS_USE_PSA_CRYPTO is enabled.
1566 functions enabled with MBEDTLS_AES_ENCRYPT_ALT, MBEDTLS_AES_DECRYPT_ALT,
1586 MBEDTLS_ERROR_STRERROR_DUMMY is enabled.
1900 behave as if they were always enabled. Fixes #4405.
2008 when SHA-1 was disabled and was offered when SHA-1 was enabled but SHA-384
2056 * When MBEDTLS_PSA_CRYPTO_SPM is enabled, crypto_spe.h was not included
2197 is enabled, on platforms where initializing a mutex allocates resources.
2203 enabled on platforms where freeing a mutex twice is not safe.
2205 when MBEDTLS_THREADING_C is enabled on platforms where initializing
2319 enabled but ECDSA is disabled. Contributed by jdurkop. Fixes #3294.
2469 * Fix build errors when the only enabled elliptic curves are Montgomery
2472 * Fix self-test failure when the only enabled short Weierstrass elliptic
2617 * The ECP module, enabled by `MBEDTLS_ECP_C`, now depends on
2642 happen when MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE was enabled in config.h
2659 MBEDTLS_SSL_HW_RECORD_ACCEL are enabled.
2712 * Fix build failure with MBEDTLS_ZLIB_SUPPORT enabled. Reported by
2754 timings on the comparison in the key generation enabled the attacker to
2855 The feature is enabled at compile-time by MBEDTLS_SSL_RECORD_CHECKING
2858 (https://project-everest.github.io/). It can be enabled at compile time
2983 changed its IP or port. The feature is enabled at compile-time by setting
3047 from the default list (enabled by default). See
3055 option MBEDTLS_SSL_KEEP_PEER_CERTIFICATE (enabled by default for
3119 they are enabled.
3256 but can be enabled by MBEDTLS_ECP_RESTARTABLE at compile time and
3378 enabled by default.
3386 the use of datagram packing (enabled by default).
3492 MBEDTLS_CIPHER_NULL_CIPHER is enabled. Found by TrinityTonic in #1719.
3676 MBEDTLS_ASN1_PARSE_C is not enabled. This allows the use of PBKDF2
3755 is not enabled. Set MBEDTLS_SSL_MIN_MAJOR_VERSION
3792 extension. When the truncated HMAC extension is enabled and CBC is used,
3806 default enabled) maximum fragment length extension is disabled in the
4071 The issue could only happen client-side with renegotiation enabled.
4267 enabled unless others were also present. Found by David Fernandez. #428
4292 * Fix compilation without MBEDTLS_SELF_TEST enabled.
4334 * Fix memory leak that occurred only when ECJPAKE was enabled and ECDHE and
4672 * Configuration option POLARSSL_HAVE_IPV6 was removed (always enabled).
4700 enabled in the default configuration, this is only noticeable if using a
4734 thread-safe if MBEDTLS_THREADING_C is enabled.
4775 * Fix bug in entropy.c when THREADING_C is also enabled that caused
4802 POLARSSL_SSL_SSESSION_TICKETS where both enabled in config.h (introduced
4834 (only possible if POLARSSL_MEMORY_BUFFER_ALLOC_C is enabled, which it is
4885 key exchanges enabled needs certificates. This fixes a possible interop
5153 * ssl_cache was creating entries when max_entries=0 if TIMING_C was enabled.
5341 client to crash the server remotely if client authentication is enabled
5384 key exchanges enabled needs certificates. This fixes a possible interop
5595 disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL
5746 disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL