Move subsection
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
This commit is contained in:
parent
68547187f6
commit
507827e75a
1 changed files with 13 additions and 13 deletions
|
@ -284,6 +284,19 @@ Alternative implementations of the SHA256 and SHA512 modules must adjust their f
|
||||||
- The macros `MBEDTLS_ERR_xxx_HW_ACCEL_FAILED` from various crypto modules
|
- The macros `MBEDTLS_ERR_xxx_HW_ACCEL_FAILED` from various crypto modules
|
||||||
were removed; `MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED` is now used instead.
|
were removed; `MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED` is now used instead.
|
||||||
|
|
||||||
|
### Remove the mode parameter from RSA functions
|
||||||
|
|
||||||
|
This affects all users who use the RSA encryption, decryption, sign and
|
||||||
|
verify APIs.
|
||||||
|
|
||||||
|
The RSA module no longer supports private-key operations with the public key or
|
||||||
|
vice versa. As a consequence, RSA operation functions no longer have a mode
|
||||||
|
parameter. If you were calling RSA operations with the normal mode (public key
|
||||||
|
for verification or encryption, private key for signature or decryption), remove
|
||||||
|
the `MBEDTLS_MODE_PUBLIC` or `MBEDTLS_MODE_PRIVATE` argument. If you were calling
|
||||||
|
RSA operations with the wrong mode, which rarely makes sense from a security
|
||||||
|
perspective, this is no longer supported.
|
||||||
|
|
||||||
|
|
||||||
## High-level crypto
|
## High-level crypto
|
||||||
|
|
||||||
|
@ -305,19 +318,6 @@ Currently the output is always 0 bytes, but it may be more when alternative
|
||||||
implementations of the underlying primitives are in use, or with future
|
implementations of the underlying primitives are in use, or with future
|
||||||
versions of the library.
|
versions of the library.
|
||||||
|
|
||||||
### Remove the mode parameter from RSA functions
|
|
||||||
|
|
||||||
This affects all users who use the RSA encryption, decryption, sign and
|
|
||||||
verify APIs.
|
|
||||||
|
|
||||||
The RSA module no longer supports private-key operations with the public key or
|
|
||||||
vice versa. As a consequence, RSA operation functions no longer have a mode
|
|
||||||
parameter. If you were calling RSA operations with the normal mode (public key
|
|
||||||
for verification or encryption, private key for signature or decryption), remove
|
|
||||||
the `MBEDTLS_MODE_PUBLIC` or `MBEDTLS_MODE_PRIVATE` argument. If you were calling
|
|
||||||
RSA operations with the wrong mode, which rarely makes sense from a security
|
|
||||||
perspective, this is no longer supported.
|
|
||||||
|
|
||||||
### Remove the RNG parameter from RSA verify functions
|
### Remove the RNG parameter from RSA verify functions
|
||||||
|
|
||||||
RSA verification functions also no longer take random generator arguments (this
|
RSA verification functions also no longer take random generator arguments (this
|
||||||
|
|
Loading…
Reference in a new issue