Lines Matching full:instead

92 your code to use the high level APIs instead.
104 Applications using the EVP APIs to access these algorithms should instead use
156 instead the patch level is indicated by the final number in the version. A
369 model. Applications should instead use
383 =head4 Change PBKDF2 to conform to SP800-132 instead of the older PKCS5 RFC2898
444 this the code should be modified to use a const pointer instead.
470 invalid inputs, now return -1 indicating a generic error condition instead.
535 … low level APIs. In this case you will need to rewrite your code to use the high level APIs instead
573 stack allocate some structures. Instead they must be heap allocated through some
656 L<d2i_X509_PUBKEY(3)>. If NULL is passed instead then the created object will be
1017 Applications using engines should instead use providers.
1021 are now deprecated and can be replaced by using providers instead.
1026 have been deprecated. Applications should instead use the L<OSSL_DECODER(3)> and
1033 or EVP_PKEY_get0()) should instead use the OSSL_ENCODER
1064 L<RSA_up_ref(3)> and L<RSA_free(3)>. Applications should instead use the
1078 instead use the high level EVP APIs L<EVP_EncryptInit_ex(3)>,
1085 informally discouraged from use for a long time. Applications should instead
1095 informally discouraged for a long time. Instead applications should use
1103 Applications should instead use the new L<EVP_MAC(3)> interface, using
1117 discouraged from use for a long time. Applications should instead use the high-level
1126 time. Applications should instead use L<EVP_PKEY_derive(3)>.
1132 time. Applications should instead use L<EVP_PKEY_keygen_init(3)> and
1142 PEM_read_DSA_PUBKEY()) should be replaced. Applications should instead use
1204 Use L<ASN1_STRING_set(3)> or L<ASN1_STRING_set0(3)> instead.
1247 Use L<EVP_PKEY_keygen(3)> instead.
1297 EVP_CipherFinal_ex() instead.
1391 Applications should instead set the B<OSSL_PKEY_PARAM_GROUP_NAME> as specified in
1399 Applications should use L<EVP_PKEY_CTX_set_dh_kdf_type(3)> instead.
1433 and L<EVP_PKEY_dup(3)> instead.
1467 and L<EVP_PKEY_dup(3)> instead.
1534 Use L<EC_GROUP_free(3)> instead.
1548 These functions are not widely used. Applications should instead switch to
1563 Applications should use L<EVP_PKEY_can_sign(3)> instead.
1587 and L<EVP_PKEY_dup(3)> instead.
1621 Use L<EC_GROUP_get_field_type(3)> instead.
1676 L<EC_POINT_set_affine_coordinates(3)> instead.
1682 These functions are not widely used. Applications should instead use the
1697 Applications should use L<EC_POINT_set_compressed_coordinates(3)> instead.
1703 This function is not widely used. Applications should instead use the
1735 Applications should instead use L<EVP_CIPHER_CTX_get_updated_iv(3)>,
1769 Applications should use L<EVP_PKEY_CTX_set1_rsa_keygen_pubexp(3)> instead.
1775 Applications should use L<EVP_PKEY_eq(3)> and L<EVP_PKEY_parameters_eq(3)> instead.
1783 L<EVP_PKEY_decrypt_init(3)> and L<EVP_PKEY_decrypt(3)> instead.
1955 Use L<OSSL_HTTP_parse_url(3)> instead.
2022 Applications should instead use L<RAND_set_DRBG_type(3)>,
2217 servers requiring ephemeral DH keys. Instead applications should consider using
2231 Use the new L<SSL_CTX_set_tlsext_ticket_key_evp_cb(3)> function instead.
2246 and L<X509_get0_signature(3)> instead.
2252 Use L<X509_load_http(3)> and L<X509_CRL_load_http(3)> instead.
2317 'Q', 'G' and 'pcounter' instead of 'prime', 'generator', 'subgroup order' and
2340 B<openssl rsautl> is deprecated, use B<openssl pkeyutl> instead.
2365 SSL and SSL_CTX options are now 64 bit instead of 32 bit.
2436 security operation and it passed a DH object instead. This is incorrect
2439 pass an EVP_PKEY instead.
2447 instead and so the returned error becomes SSL_ERROR_ZERO_RETURN.
2454 working at the default security level of 1 and instead requires security