Lines Matching full:on
21 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
67 * division on a 32-bit platform, 128-bit division on a 64-bit platform).
83 * Furthermore, a 64-bit type is always required even on a 32-bit
100 * operands with a 64-bit result in order to speed up computations. On some
105 * removes the dependency of that library on platforms that lack a hardware
108 * Note that depending on the compiler, this may decrease performance compared
188 * This makes sure there are no linking errors on platforms that do not support
213 * \note MBEDTLS_PLATFORM_SNPRINTF_ALT is required on Windows;
244 * Uncomment to get warnings on using deprecated functions.
256 * Uncomment to get errors on using deprecated functions.
270 * library. On the other hand, it doesn't attempt to validate parameters whose
370 * avoiding dependencies on them, and considering stronger message
441 * dependencies on them, and considering stronger message digests
522 * This permits use of the library on platforms before an entropy source has
574 * ROM / RAM (depending on the value of \c MBEDTLS_AES_ROM_TABLES)
575 * by computing their values on the fly during operations
583 * depends on the system and memory details.
705 * This flag removes the ciphersuites based on RC4 from the default list as
718 * This flag removes the ciphersuites based on 3DES from the default list as
724 * a TLS connection using a 3DES based cipher suite (see "On the Practical
760 * Depending on the prime and architecture, makes operations 4 to 8 times
761 * faster on the corresponding curve.
781 * for too long on ECC (and, hence, X.509 or SSL/TLS) operations.
803 * (56 bytes on a 32-bit platform). In future versions of the library, it
1095 * \warning This is currently experimental. EC J-PAKE support is based on the
1186 * On 32-bit systems SHA-256 can be much faster than SHA-512. Use this option
1200 * This is crucial (if not required) on systems that do not have a
1207 * compile-time depending on the flags (MBEDTLS_PLATFORM_NV_SEED_*) used.
1226 * (to stderr) all (fatal) messages on memory allocation issues. Enables
1296 * required on systems that do not have a built-in entropy source (TRNG).
1297 * This feature is currently not supported on systems that have a built-in
1331 * the expense of performance. Eg on Cortex-M4 it reduces the size of
1415 * that state to a live context for resuming read/write operations on the
1443 * Uncomment this macro to report all debug messages on errors introducing
1455 * on the padding or underlying cipher.
1514 * \note This option has no influence on the protection against the
1551 * The two main uses of renegotiation are (1) refresh keys on long-lived
1639 * (Depends on ciphersuites)
1687 * Enable support for HelloVerifyRequest on DTLS servers.
1782 * (2^80 brute force attack on the HMAC key used for a single,
1834 * \warning This option enables new Mbed TLS APIs that are dependent on the
1875 * \warning Depending on your PKI use, enabling this can be a security risk!
1908 * \warning Depending on your PKI use, disabling this can be a security risk!
1921 * \warning Depending on your PKI use, disabling this can be a security risk!
1973 * Enable AES-NI support on x86-64.
1980 * This modules adds support for the AES-NI instructions on x86-64
2081 * security risk. If possible, we recommend avoidng dependencies on
2447 * \warning This is currently experimental. EC J-PAKE support is based on the
2523 * Warning: the HAVEGE random generator is dependent on timing and specific
2603 * security risk. If possible, we recommend avoiding dependencies on
2620 * security risk. If possible, we recommend avoiding dependencies on
2637 * depending on the handshake parameters. Further, it is used for checking
2642 * security risk. If possible, we recommend avoiding dependencies on
2669 * \note This module only works on POSIX/Unix (including Linux, BSD and OS X)
2709 * Enable VIA Padlock support on x86.
2716 * This modules adds support for the VIA PadLock on x86.
2853 * \note This abstraction layer must be enabled on Windows (including MSYS2)
2854 * as other module rely on it for a fixed snprintf implementation.
2958 * depending on the handshake parameters, and for SHA1-signed certificates.
2962 * on it, and considering stronger message digests instead.
3104 * \note The provided implementation only works on POSIX/Unix (including Linux,
3105 * BSD and OS X) and Windows. On other platforms, you can either disable that
3255 * Please check the respective header file for documentation on these
3289 //#define MBEDTLS_MEMORY_ALIGN_MULTIPLE 4 /**< Align on multiples of this value */
3350 * just silently return early on invalid parameters, which
3376 * \note When using a value less than the default of 16KB on the client, it is
3378 * inform the server about this limitation. On the server, there
3380 * restriction on the maximum size of incoming messages, and unless
3401 * \note When using a value less than the default of 16KB on the client, it is
3403 * inform the server about this limitation. On the server, there
3405 * restriction on the maximum size of incoming messages, and unless
3440 * Note: On systems lacking division instructions,
3462 * The specific size requirement depends on the configured ciphers and any
3494 * \warning No dependency checking is done on that field! This option can only
3512 * through mbedtls_ssl_conf_cert_profile. Turning on this option is not
3518 * on it, and considering stronger message digests instead.
3528 * default. At the time of writing, there is no practical attack on the use
3529 * of SHA-1 in handshake signatures, hence this option is turned on by default
3535 * on it, and considering stronger message digests instead.