Files
mbedtls/include
Hanno Becker ce0c9dbeb6 Add documentation warnings for weak algorithms
MD2, MD4, MD5, DES and SHA-1 are considered weak and their use
constitutes a security risk. If possible, we recommend avoiding
dependencies on them, and considering stronger message digests and
ciphers instead.
2018-01-30 10:38:40 +00:00
..
2015-01-27 15:44:46 +00:00