Lines Matching refs:now
120 the EVP APIs are now considered legacy and their use is strongly discouraged.
316 application now supports -legacy option that restores the previous
365 L<EVP_PKEY_public_check(3)> and L<EVP_PKEY_param_check(3)> now work for
374 This code is now always set to zero. Related functions are deprecated.
396 The Miller-Rabin test now uses 64 rounds, which is used for all prime generation,
416 Smaller sizes now result in an error.
427 to generate EVP_PKEY_SM2 parameters and keys. Applications must now generate
436 now correctly rejected.
448 internally by libcrypto. From OpenSSL 3.0 this key may now be held in a
453 Where the EVP_PKEY holds a provider managed key, then these functions now return
486 From now on, running it without arguments is equivalent to B<openssl help>.
491 invalid inputs, now return -1 indicating a generic error condition instead.
495 Previously (in 1.1.1) these conflicting parameters were allowed, but will now
518 The function code part of the error code is now always set to 0. For that
603 /* This line will now generate compiler errors */
1042 are now deprecated and can be replaced by using providers instead.
1060 Functions that access low-level objects directly such as L<RSA_get0_n(3)> are now
1074 are now deprecated. Applications should use L<EVP_PKEY_fromdata(3)> to create
1576 EC_METHOD is now an internal-only concept and a suitable EC_METHOD is assigned
1739 OpenSSL now loads error strings automatically so these functions are not needed.
2291 L<EVP_PKEY_get_id(3)> might now also return the value -1
2337 For example, the DH parameters output from B<openssl dhparam> now lists 'P',
2341 The B<openssl> commands that read keys, certificates, and CRLs now
2353 B<openssl genrsa> and B<openssl rsa> now write PKCS #8 keys by default.
2357 "SHA256" is now the default digest for TS query used by B<openssl ts>.
2364 now in maintenance mode and no new features will be added to them.
2386 SSL and SSL_CTX options are now 64 bit instead of 32 bit.
2402 These functions now take IP literal addresses as well as actual hostnames.
2423 Secure renegotiation is now required by default for TLS connections
2425 Support for RFC 5746 secure renegotiation is now required by default for
2436 connections with TLSv1.3. However OpenSSL now supports "pluggable" groups
2447 The methods now ignore unknown ciphers.