Lines Matching refs:new
34 need to enable the handling of TLS 1.3 tickets through the new
84 * When the new compilation option MBEDTLS_PSA_KEY_STORE_DYNAMIC is enabled,
121 non-existent key while concurrently creating a new key could potentially
240 * Add new mbedtls_x509_csr_parse_der_with_ext_cb() routine which allows
242 * Enable the new option MBEDTLS_BLOCK_CIPHER_NO_DECRYPT to omit
288 * The new function mbedtls_rsa_get_bitlen() returns the length of the modulus
294 * The new functions mbedtls_pk_get_psa_attributes() and
302 * The new function psa_generate_key_ext() allows generating an RSA
304 * The new function mbedtls_ecp_write_key_ext() is similar to
307 * Add new accessor to expose the private group id member of
309 * Add new accessor to expose the `MBEDTLS_PRIVATE(ca_istrue)` member of
318 * The new functions mbedtls_pk_copy_from_psa() and
321 * Add new accessors to expose the private session-id,
324 Add new accessor to expose the ciphersuite-id of
417 generating a new random after a HelloRetryRequest. Fixes #8669.
451 improvement. The new default value of MBEDTLS_MPI_WINDOW_SIZE roughly
496 * Add new millisecond time type `mbedtls_ms_time_t` and `mbedtls_ms_time()`
514 maximum size of any supported block cipher) or the new name
529 provided - these limitations are lifted in this version. A new set of
574 A new configuration option, MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH, can be
625 new implementation with a much smaller footprint, but some minor
626 usage restrictions. See the documentation of the new configuration
641 to the new functions mbedtls_pkcs5_pbes2_ext() or mbedtls_pkcs12_pbe_ext()
847 * Add new API mbedtls_ssl_cache_remove for cache entry removal by
851 64-bit Arm. A new configuration option, MBEDTLS_AESCE_C, can
868 ECJPAKE key exchange, using the new API function
975 * The C code follows a new coding style. This is transparent for users but
1065 corresponding new public API call has been added in the library,
1073 * The new functions mbedtls_asn1_free_named_data_list() and
1274 feature requirements in the file named by the new macro
1476 * You can configure groups for a TLS key exchange with the new function
1506 value is almost always a bug. Enable the new configuration option
1516 * Add new API mbedtls_ct_memcmp for constant time buffer comparison.
1589 that it produces when signing, as documented. Use the new algorithm
1594 PSA_ALG_ECDSA_ANY. The new predicate macro PSA_ALG_IS_SIGN_HASH covers
1638 * The mbedcrypto library includes a new source code module constant_time.c,
1713 new function mbedtls_gcm_update_ad().
1746 mbedtls_ssl_get_output_max_frag_len(), and add a new API
1760 supported, use the new function mbedtls_dhm_get_len() .
1778 replaced by a new API mbedtls_ssl_set_export_keys_cb().
1932 * The new function mbedtls_mpi_random() generates a random value in a
1939 * The new functions mbedtls_dhm_get_len() and mbedtls_dhm_get_bitlen()
1941 * The new function mbedtls_dhm_get_value() copy a field out of a
1943 * Use the new function mbedtls_ecjpake_set_point_format() to select the
2082 MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY with a new single unified option
2145 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
2159 minimum MAC or tag length thanks to the new wildcards
2208 both the old SE interface and the new PSA driver interface, external keys were
2219 * A new library C file psa_crypto_client.c has been created to contain
2248 mbedtls_cipher_auth_decrypt() are deprecated in favour of the new
2251 these new functions always append the tag to the ciphertext, and include
2255 * Partial implementation of the new PSA Crypto accelerator APIs. (Symmetric
2409 * The new function mbedtls_ecp_write_key() exports private ECC keys back to
2442 attackers. The new countermeasure defends against local attackers, even
2521 * The new utility programs/ssl/ssl_context_info prints a human-readable
2524 * Add new mbedtls_x509_crt_parse_der_with_ext_cb() routine which allows
2620 be avoided by enabling the new option `MBEDTLS_ECP_NO_INTERNAL_RNG`.
2638 * Fix issue in DTLS handling of new associations with the same parameters
2653 * The new build option MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH automatically
2698 * The new build option MBEDTLS_SHA512_NO_SHA384 allows building SHA-512
2702 * Change the encoding of key types and curves in the PSA API. The new
2848 * Add new API functions mbedtls_ssl_session_save() and
2852 * Add a new API function mbedtls_ssl_check_record() to allow checking that
2878 * The new function mbedtls_ecdsa_sign_det_ext() is similar to
2985 through the new APIs mbedtls_ssl_conf_cid() and mbedtls_ssl_set_cid().
3040 * Add a new X.509 API call `mbedtls_x509_parse_der_nocopy()`
3044 * Add a new function mbedtls_asn1_write_named_bitstring() to write ASN.1
3051 * Add a new X.509 API call `mbedtls_x509_parse_der_nocopy()`.
3054 for the benefit of saving RAM, by disabling the new compile-time
3124 * Add a new config.h option of MBEDTLS_CHECK_PARAMS that enables validation
3135 deprecated and replaced as shown below. The new functions change
3219 * The new functions mbedtls_ctr_drbg_update_ret() and
3221 and mbedtls_hmac_drbg_update() respectively, but the new functions
3223 applications use the new functions.
3257 configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
3283 supported are deprecated and are now replaced by the new equivalent
3372 with the peer, as well as by a new per-connection MTU option, set using
3464 * Add new crypto primitives from RFC 7539: stream cipher Chacha20, one-time
3481 * Fix compilation error on C++, because of a variable named new.
3845 * Add support for alternative implementations for ECDSA, controlled by new
3852 new configuration flags MBEDTLS_ECDH_COMPUTE_SHARED_ALT and
3858 the new configuration flag MBEDTLS_ECJPAKE_ALT.
3873 The new functions change the return type from void to int to allow
3897 accepting DHM parameters in binary form, matching the new constants.
3981 new ones with return codes. In particular, this modifies the
4009 by the user in a platform_alt.h file. These new functions are required in
4133 * Add a new configuration option to 'mbedtls_ssl_config' to enable
4139 by the functions shown below. The new functions change the return type from
4295 * Extended test coverage of special cases, and added new timing test suite.
4501 MBEDTLS_ERR_SSL_CLIENT_RECONNECT - it is then possible to start a new
4611 * The SSL debug callback gained two new arguments (file name, line number).
4628 * net_accept() gained new arguments for the size of the client_ip buffer.
4639 strings; use the new *_len variables instead of strlen().
4651 * net_connect() and net_bind() have a new 'proto' argument to choose
4720 new prototype, and mbedtls_ssl_set_read_timeout().
4865 * Added new error codes and debug messages about selection of
4942 * Ciphersuites using RSA-PSK key exchange new require TLS 1.x (the spec is
5843 * Moved all examples programs to use the new entropy and CTR_DRBG
6233 * Added new bignum import and export helper functions