Lines Matching full:were

70 If you were accessing structure fields directly, and these fields are not documented as public, you…
82 If you were relying on these functions, you'll now need to change to using your
128 If you were using the `MBEDTLS_TEST_NULL_ENTROPY` option and your platform
161 ### Deprecated functions were removed from bignum
167 ### Deprecated functions were removed from DRBGs
170 were renamed to replace the corresponding functions without `_ret` appended. Please call
173 ### Deprecated hex-encoded primes were removed from DHM
178 `MBEDTLS_DHM_RFC3526_MODP_4096_P `and `MBEDTLS_DHM_RFC3526_MODP_4096_G` were
185 ### Deprecated functions were removed from hashing modules
190 `mbedtls_xxx_finish_ret()` and `mbedtls_xxx_ret()` were renamed to replace
194 - The functions `mbedtls_xxx_process()` were removed. You normally don't need
215 If you were using custom config file with `MBEDTLS_SHA256_C` enabled, then
226 If you were using a config file with both `MBEDTLS_SHA512_C` and
228 If you were using a config file with `MBEDTLS_SHA512_C` and without
257 who were explicitly setting this option.
270 ### Deprecated error codes for hardware failures were removed
273 were removed; `MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED` is now used
278 were removed; `MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED` is now used instead.
280 ### Deprecated error codes for invalid input data were removed
283 modules were removed; `MBEDTLS_ERR_xxx_BAD_INPUT_DATA` is now used instead.
292 parameter. If you were calling RSA operations with the normal mode (public key
294 the `MBEDTLS_RSA_PUBLIC` or `MBEDTLS_RSA_PRIVATE` argument. If you were calling
298 ### Deprecated functions were removed from AES
300 The functions `mbedtls_aes_encrypt()` and `mbedtls_aes_decrypt()` were
311 ### Deprecated functions were removed from ECDSA
314 `mbedtls_ecdsa_sign_det()` were removed. They were superseded by
320 This change affects users who were using the `mbedtls_*_ret()` cryptography
323 Those functions were created based on now-deprecated functions according to a
370 you were using the PKCS#1 v2.1 encoding you now need, subsequently to the call
427 ### Deprecated functions were removed from cipher
430 `mbedtls_cipher_auth_decrypt()` were removed. They were superseded by
468 ### Some function parameters were made const
510 ### Deprecated names for PSA constants and types were removed
512 Some constants and types that were present in beta versions of the PSA Crypto
513 API were removed from version 1.0 of specification. Please switch to the new
519 ### Internal / alt-focused headers were moved to a private location
522 were documented as internal, despite being in the public include directory.
548 keys included there were never suitable for production use.
587 configuration options are removed and the X.509 code now behaves as if they were
600 This change does not affect users who were using the default configuration, as
604 Extensions were added in V3 of the X.509 specification, so pre-V3 certificates
605 containing extensions were never compliant. Mbed TLS now rejects them with a
701 list of ciphersuites, as RC4-based ciphersuites were already not negotiated in
739 `MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY` were combined into one option because
823 If you were using a weak cipher, please switch to any of the modern,
827 If you were using a ciphersuite without encryption, you just have to
874 ### Deprecated functions were removed from SSL
1000 This change affects users who were enabling `MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE`
1016 …key exchanges but not for certificate signatures), SHA-224 (weaker hashes were already not accepte…
1033 because the 3DES ciphersuites were disabled by that.