Lines Matching refs:default

92 This change does not affect users who use the default configuration; it only
95 The option `MBEDTLS_CHECK_PARAMS` (disabled by default) enabled certain kinds
104 value causes a silent default to one of the valid values.
106 The default reaction to a failed check was to call a function
125 This does not affect users who use the default `mbedtls_config.h`, as this option was
126 already off by default.
136 This doesn't affect people using the default configuration as it was already
137 disabled by default.
211 This does not affect users who use the default `mbedtls_config.h`. `MBEDTLS_SHA256_C`
212 was enabled by default. Now both `MBEDTLS_SHA256_C` and `MBEDTLS_SHA224_C` are
222 This does not affect users who use the default `mbedtls_config.h`.
223 `MBEDTLS_SHA512_NO_SHA384` was disabled by default, now `MBEDTLS_SHA384_C` is
224 enabled by default.
256 This doesn't affect users of the default configuration; it only affects people
369 encoding and its hash. It just selects the PKCS#1 v1.5 encoding by default. If
565 This change does not affect users of the default configuration; it only affects
569 they don't recognize, and this is what Mbed TLS does by default. This option
600 This change does not affect users who were using the default configuration, as
601 this option was already disabled by default. Also, it does not affect users who
606 parsing error in all configurations, as it did previously in the default
612 ### Strengthen default algorithm selection for X.509
614 …is is described in the section [Strengthen default algorithm selection for X.509 and TLS](#strengt…
618 This doesn't affect people using the default configuration as it was already
619 disabled by default.
658 This doesn't affect people using the default configuration as it was already
659 disabled by default.
668 This doesn't affect people using the default configuration as it was already
669 disabled by default.
688 This doesn't affect people using the default configuration as it was already
689 disabled by default.
700 This does not affect people who used the default `mbedtls_config.h` and the default
710 This doesn't affect people using the default configuration as it was already
711 disabled by default.
719 This doesn't affect people using the default configuration as it was already
720 disabled by default.
728 This doesn't affect people using the default configuration.
735 This change affects users who modified the default `mbedtls_config.h` padding granularity
749 The default preference order for curves in TLS now favors resource usage (performance and memory co…
820 This does not affect users who use the default `mbedtls_config.h`, as this option was
821 already off by default.
865 This change does not affect users who used the default `mbedtls_config.h`, as the option
866 `MBEDTLS_SSL_DTLS_BADMAC_LIMIT` was already on by default.
884 ### Remove `MBEDTLS_SSL_RECORD_CHECKING` option and enable its action by default
886 This change does not affect users who use the default `mbedtls_config.h`, as the
887 option `MBEDTLS_SSL_RECORD_CHECKING` was already on by default.
894 Users who changed the default setting of the option need to change the config/
1009 has the same effect as enabling the removed option. The default state is to use
1012 ### Strengthen default algorithm selection for X.509 and TLS
1014 The default X.509 verification profile (`mbedtls_x509_crt_profile_default`) and the default curve a…
1016 …55 bits (security strength less than 128 bits) are no longer accepted by default. The following ha…
1020 The curve secp256k1 has also been removed from the default X.509 and TLS profiles. [RFC 8422](https…
1022 …cept certificates signed with algorithms that have been removed from the default profile, call `mb…
1028 If you still need to allow hashes and curves in TLS that have been removed from the default configu…
1032 This change does not affect users using default settings for 3DES in `mbedtls_config.h`