Lines Matching full:instead

170 your code to use the high level APIs instead.
183 Applications using the EVP APIs to access these algorithms should instead use
238 instead the patch level is indicated by the final number in the version. A
442 model. Applications should instead use
457 Change PBKDF2 to conform to SP800\-132 instead of the older PKCS5 RFC2898
458 .IX Subsection "Change PBKDF2 to conform to SP800-132 instead of the older PKCS5 RFC2898"
523 this the code should be modified to use a const pointer instead.
553 invalid inputs, now return \-1 indicating a generic error condition instead.
613 … low level APIs. In this case you will need to rewrite your code to use the high level APIs instead
643 stack allocate some structures. Instead they must be heap allocated through some
727 \&\fBd2i_X509_PUBKEY\fR\|(3). If NULL is passed instead then the created object will be
944 Applications using engines should instead use providers.
948 are now deprecated and can be replaced by using providers instead.
954 have been deprecated. Applications should instead use the \fBOSSL_DECODER\fR\|(3) and
962 or \fBEVP_PKEY_get0()\fR) should instead use the OSSL_ENCODER
1006 \&\fBRSA_up_ref\fR\|(3) and \fBRSA_free\fR\|(3). Applications should instead use the
1021 instead use the high level EVP APIs \fBEVP_EncryptInit_ex\fR\|(3),
1029 informally discouraged from use for a long time. Applications should instead
1040 informally discouraged for a long time. Instead applications should use
1049 Applications should instead use the new \fBEVP_MAC\fR\|(3) interface, using
1064 discouraged from use for a long time. Applications should instead use the high-level
1074 time. Applications should instead use \fBEVP_PKEY_derive\fR\|(3).
1081 time. Applications should instead use \fBEVP_PKEY_keygen_init\fR\|(3) and
1092 \&\fBPEM_read_DSA_PUBKEY()\fR) should be replaced. Applications should instead use
1142 Use \fBASN1_STRING_set\fR\|(3) or \fBASN1_STRING_set0\fR\|(3) instead.
1173 Use \fBEVP_PKEY_keygen\fR\|(3) instead.
1211 \&\fBEVP_CipherFinal_ex()\fR instead.
1283 Applications should instead set the \fBOSSL_PKEY_PARAM_GROUP_NAME\fR as specified in
1289 Applications should use \fBEVP_PKEY_CTX_set_dh_kdf_type\fR\|(3) instead.
1313 and \fBEVP_PKEY_dup\fR\|(3) instead.
1337 and \fBEVP_PKEY_dup\fR\|(3) instead.
1384 Use \fBEC_GROUP_free\fR\|(3) instead.
1394 These functions are not widely used. Applications should instead switch to
1405 Applications should use \fBEVP_PKEY_can_sign\fR\|(3) instead.
1423 and \fBEVP_PKEY_dup\fR\|(3) instead.
1447 Use \fBEC_GROUP_get_field_type\fR\|(3) instead.
1486 \&\fBEC_POINT_set_affine_coordinates\fR\|(3) instead.
1490 These functions are not widely used. Applications should instead use the
1501 Applications should use \fBEC_POINT_set_compressed_coordinates\fR\|(3) instead.
1505 This function is not widely used. Applications should instead use the
1529 Applications should instead use \fBEVP_CIPHER_CTX_get_updated_iv\fR\|(3),
1555 Applications should use \fBEVP_PKEY_CTX_set1_rsa_keygen_pubexp\fR\|(3) instead.
1559 Applications should use \fBEVP_PKEY_eq\fR\|(3) and \fBEVP_PKEY_parameters_eq\fR\|(3) instead.
1565 \&\fBEVP_PKEY_decrypt_init\fR\|(3) and \fBEVP_PKEY_decrypt\fR\|(3) instead.
1689 Use \fBOSSL_HTTP_parse_url\fR\|(3) instead.
1744 Applications should instead use \fBRAND_set_DRBG_type\fR\|(3),
1887 servers requiring ephemeral DH keys. Instead applications should consider using
1899 Use the new \fBSSL_CTX_set_tlsext_ticket_key_evp_cb\fR\|(3) function instead.
1910 and \fBX509_get0_signature\fR\|(3) instead.
1914 Use \fBX509_load_http\fR\|(3) and \fBX509_CRL_load_http\fR\|(3) instead.
1974 \&'Q', 'G' and 'pcounter' instead of 'prime', 'generator', 'subgroup order' and
1999 \&\fBopenssl rsautl\fR is deprecated, use \fBopenssl pkeyutl\fR instead.
2016 SSL and SSL_CTX options are now 64 bit instead of 32 bit.
2073 security operation and it passed a DH object instead. This is incorrect
2076 pass an EVP_PKEY instead.
2082 instead and so the returned error becomes SSL_ERROR_ZERO_RETURN.
2087 working at the default security level of 1 and instead requires security