⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deprecated.txt

📁 含有多种公开密钥算法、多种块加密、多种数据流加密、多种HASH函数、多种CheckSum校验、多种MAC校验等几十种加密算法的程序
💻 TXT
字号:
The following functions/classes/headers/macros/names are deprecated, and willbe removed in a later release. If there is a suggested replacement API, it ismentioned here.Most everything in here is scheduled to be removed during the 1.1.xversions. Most will probably go out in 1.1.0. If this is an issue, staywith the 1.0.x releases, which will still be maintained.Deprecated APIs, workarounds, and estimated removal times----------------------------------------------------Deprecated: OpenCL compatibility: opencl.h, OpenCL::, OPENCL_* macrosInstead use: botan.h, Botan::, BOTAN_*Version for removal: late 1.1.xDeprecated: BigInt::ten()Deprecated: Creating a PK_* object by passing a EME*, EMSA*, or KDF*Instead use: The ones that pass the name for the algorithm in question as             a stringNotes: You probably weren't using this anyway.Deprecated: Counter in ofb.hInstead use: CTR in ctr.hNotes: ofb.h knows about Counter and CTR, while ctr.h only knows about CTRDeprecated: Using the three argument form of EMSA4 (to specify a non-default            seed size)Instead: Use the single argument (hash function) or two argument (hash + mgf         name) versions.Notes: I mostly included support for alternate seed sizes in order to test that       we could verify messages with different seed sizes. The security of       EMSA4 is not as good when using a smaller seed. With Botan you can       verify a message signed with a arbitrarily sized seed, but there is no       reason to support creating a signature with any seed size other than the       current default (which is a seed the same length as output of the       underlying hash function)Deprecated: Doing a lookup for "HAVAL-n", where n is the bitsize of the desired            hash (128, 160, 192, 224, 256)Instead use: "HAVAL(m)" where m is the bytesize of the desired hash             (16, 20, 24, 28, 32).Deprecated: Creating a DL_Group, RSA key, or RW key smaller than 512 bitsInstead: Use a sane keysize, obviouslyNotes: The only use for anything smaller is for testing. Smaller keys will       still be accepted as input, I suppose. Currently keys as small as 64       bits can be generated.Deprecated:         Pipe::read(msg, buffer, size)         Pipe::read(msg, byte_out)         Pipe::peek(msg, buffer, size)         Pipe::peek(msg, byte_out)Instead use:         Pipe::read(buffer, size, msg)         Pipe::read(byte_out, msg)         Pipe::peek(buffer, size, msg)         Pipe::peek(byte_out, msg)Notes: Putting the message number last lets us make a default for it. This, in       turn, makes it possible to merge pairs of functions, like the read()       function that took a message number and the one that didn't.       The changes to the peek functions are mostly to make everything       consitent WRT how the arguments are handled. It also lets us support       peeking on the default message number, which peek did not support       before. (Calling peek() with only two arguments will result in peeking       at the default message).       The deprecated functions are now all just stubs that reorder their       arguments and call the correct function.Deprecated:         Passing only two arguments (a DL_Group and a secret key) to         DH_PrivateKeyInstead: Pass all three arguments

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -