21 lines
1.3 KiB
Text
21 lines
1.3 KiB
Text
|
Features
|
||
|
* Some crypto modules that previously depended on MD or a low-level hash
|
||
|
module, either unconditionally (RSA, PK, PKCS5, PKCS12, EC J-PAKE), or
|
||
|
for some features (PEM for encrypted files), are now able to use PSA
|
||
|
Crypto instead when the legacy API is not available. This means it is
|
||
|
now possible to use all features from those modules in configurations
|
||
|
where the built-in implementations of hashes are excluded and the hashes
|
||
|
are only provided by PSA drivers. In these configurations, you need to
|
||
|
call `psa_crypto_init()` before you call any function from those
|
||
|
modules; this is not required in configurations where the built-in
|
||
|
implementation is still available. Note that some crypto modules and
|
||
|
features still depend on the built-in implementation of hashes:
|
||
|
MBEDTLS_HKDF_C (but the PSA HKDF function do not depend on it),
|
||
|
MBEDTLS_ENTROPY_C, MBEDTLS_HMAC_DRBG_C and MBEDTLS_ECDSA_DETERMINISTIC.
|
||
|
In particular, for now, compiling without built-in hashes requires use
|
||
|
of MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG.
|
||
|
* When MBEDTLS_USE_PSA_CRYPTO is enabled, X.509, TLS 1.2 and TLS 1.3 no
|
||
|
longer depend on MD. This means it is now possible to use them in
|
||
|
configurations where the built-in implementations of hashes are excluded
|
||
|
and the hashes are only provided by PSA drivers.
|