Lines Matching full:instead

228 your code to use the high level APIs instead.
241 Applications using the \s-1EVP\s0 APIs to access these algorithms should instead use
288 instead the patch level is indicated by the final number in the version. A
492 model. Applications should instead use
507 Change \s-1PBKDF2\s0 to conform to \s-1SP800\-132\s0 instead of the older \s-1PKCS5 RFC2898\s0
508 .IX Subsection "Change PBKDF2 to conform to SP800-132 instead of the older PKCS5 RFC2898"
573 this the code should be modified to use a const pointer instead.
603 invalid inputs, now return \-1 indicating a generic error condition instead.
663 … low level APIs. In this case you will need to rewrite your code to use the high level APIs instead
693 stack allocate some structures. Instead they must be heap allocated through some
777 \&\fBd2i_X509_PUBKEY\fR\|(3). If \s-1NULL\s0 is passed instead then the created object will be
994 Applications using engines should instead use providers.
998 are now deprecated and can be replaced by using providers instead.
1004 have been deprecated. Applications should instead use the \s-1\fBOSSL_DECODER\s0\fR\|(3) and
1012 or \fBEVP_PKEY_get0()\fR) should instead use the \s-1OSSL_ENCODER\s0
1046 \&\fBRSA_up_ref\fR\|(3) and \fBRSA_free\fR\|(3). Applications should instead use the
1061 instead use the high level \s-1EVP\s0 APIs \fBEVP_EncryptInit_ex\fR\|(3),
1069 informally discouraged from use for a long time. Applications should instead
1080 informally discouraged for a long time. Instead applications should use
1089 Applications should instead use the new \s-1\fBEVP_MAC\s0\fR\|(3) interface, using
1104 discouraged from use for a long time. Applications should instead use the high-level
1114 time. Applications should instead use \fBEVP_PKEY_derive\fR\|(3).
1121 time. Applications should instead use \fBEVP_PKEY_keygen_init\fR\|(3) and
1132 \&\fBPEM_read_DSA_PUBKEY()\fR) should be replaced. Applications should instead use
1182 Use \fBASN1_STRING_set\fR\|(3) or \fBASN1_STRING_set0\fR\|(3) instead.
1213 Use \fBEVP_PKEY_keygen\fR\|(3) instead.
1251 \&\fBEVP_CipherFinal_ex()\fR instead.
1318 Applications should instead set the \fB\s-1OSSL_PKEY_PARAM_GROUP_NAME\s0\fR as specified in
1324 Applications should use \fBEVP_PKEY_CTX_set_dh_kdf_type\fR\|(3) instead.
1348 and \fBEVP_PKEY_dup\fR\|(3) instead.
1372 and \fBEVP_PKEY_dup\fR\|(3) instead.
1419 Use \fBEC_GROUP_free\fR\|(3) instead.
1429 These functions are not widely used. Applications should instead switch to
1440 Applications should use \fBEVP_PKEY_can_sign\fR\|(3) instead.
1458 and \fBEVP_PKEY_dup\fR\|(3) instead.
1482 Use \fBEC_GROUP_get_field_type\fR\|(3) instead.
1521 \&\fBEC_POINT_set_affine_coordinates\fR\|(3) instead.
1525 These functions are not widely used. Applications should instead use the
1536 Applications should use \fBEC_POINT_set_compressed_coordinates\fR\|(3) instead.
1540 This function is not widely used. Applications should instead use the
1564 Applications should instead use \fBEVP_CIPHER_CTX_get_updated_iv\fR\|(3),
1590 Applications should use \fBEVP_PKEY_CTX_set1_rsa_keygen_pubexp\fR\|(3) instead.
1594 Applications should use \fBEVP_PKEY_eq\fR\|(3) and \fBEVP_PKEY_parameters_eq\fR\|(3) instead.
1600 \&\fBEVP_PKEY_decrypt_init\fR\|(3) and \fBEVP_PKEY_decrypt\fR\|(3) instead.
1719 Use \fBOSSL_HTTP_parse_url\fR\|(3) instead.
1774 Applications should instead use \fBRAND_set_DRBG_type\fR\|(3),
1917 servers requiring ephemeral \s-1DH\s0 keys. Instead applications should consider using
1929 Use the new \fBSSL_CTX_set_tlsext_ticket_key_evp_cb\fR\|(3) function instead.
1940 and \fBX509_get0_signature\fR\|(3) instead.
1944 Use \fBX509_load_http\fR\|(3) and \fBX509_CRL_load_http\fR\|(3) instead.
2004 \&'Q', 'G' and 'pcounter' instead of 'prime', 'generator', 'subgroup order' and
2029 \&\fBopenssl rsautl\fR is deprecated, use \fBopenssl pkeyutl\fR instead.
2046 \&\s-1SSL\s0 and \s-1SSL_CTX\s0 options are now 64 bit instead of 32 bit.
2103 security operation and it passed a \s-1DH\s0 object instead. This is incorrect
2106 pass an \s-1EVP_PKEY\s0 instead.
2112 instead and so the returned error becomes \s-1SSL_ERROR_ZERO_RETURN.\s0
2117 working at the default security level of 1 and instead requires security