Lines Matching refs:now

99 the EVP APIs are now considered legacy and their use is strongly discouraged.
263 application now supports -legacy option that restores the previous
303 L<EVP_PKEY_public_check(3)> and L<EVP_PKEY_param_check(3)> now work for
312 This code is now always set to zero. Related functions are deprecated.
334 The Miller-Rabin test now uses 64 rounds, which is used for all prime generation,
354 Smaller sizes now result in an error.
365 to generate EVP_PKEY_SM2 parameters and keys. Applications must now generate
374 now correctly rejected.
386 internally by libcrypto. From OpenSSL 3.0 this key may now be held in a
391 Where the EVP_PKEY holds a provider managed key, then these functions now return
424 From now on, running it without arguments is equivalent to B<openssl help>.
429 invalid inputs, now return -1 indicating a generic error condition instead.
433 Previously (in 1.1.1) these conflicting parameters were allowed, but will now
456 The function code part of the error code is now always set to 0. For that
533 /* This line will now generate compiler errors */
972 are now deprecated and can be replaced by using providers instead.
990 Functions that access low-level objects directly such as L<RSA_get0_n(3)> are now
1004 are now deprecated. Applications should use L<EVP_PKEY_fromdata(3)> to create
1498 EC_METHOD is now an internal-only concept and a suitable EC_METHOD is assigned
1661 OpenSSL now loads error strings automatically so these functions are not needed.
2230 For example, the DH parameters output from B<openssl dhparam> now lists 'P',
2234 The B<openssl> commands that read keys, certificates, and CRLs now
2246 B<openssl genrsa> and B<openssl rsa> now write PKCS #8 keys by default.
2250 "SHA256" is now the default digest for TS query used by B<openssl ts>.
2257 now in maintenance mode and no new features will be added to them.
2279 SSL and SSL_CTX options are now 64 bit instead of 32 bit.
2295 These functions now take IP literal addresses as well as actual hostnames.
2316 Secure renegotiation is now required by default for TLS connections
2318 Support for RFC 5746 secure renegotiation is now required by default for
2329 connections with TLSv1.3. However OpenSSL now supports "pluggable" groups
2340 The methods now ignore unknown ciphers.