Blame SOURCES/perl-Crypt-OpenSSL-RSA-openssl30.patch

0d2978
diff --git a/README b/README
0d2978
index c7d4bb7..3da6d1d 100644
0d2978
--- a/README
0d2978
+++ b/README
0d2978
@@ -10,7 +10,6 @@ SYNOPSIS
0d2978
       Crypt::OpenSSL::Random::random_seed($good_entropy);
0d2978
       Crypt::OpenSSL::RSA->import_random_seed();
0d2978
       $rsa_pub = Crypt::OpenSSL::RSA->new_public_key($key_string);
0d2978
-      $rsa_pub->use_sslv23_padding(); # use_pkcs1_oaep_padding is the default
0d2978
       $ciphertext = $rsa->encrypt($plaintext);
0d2978
 
0d2978
       $rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string);
0d2978
@@ -140,10 +139,6 @@ Instance Methods
0d2978
         all new applications. It is the default mode used by
0d2978
         "Crypt::OpenSSL::RSA".
0d2978
 
0d2978
-    use_sslv23_padding
0d2978
-        Use PKCS #1 v1.5 padding with an SSL-specific modification that
0d2978
-        denotes that the server is SSL3 capable.
0d2978
-
0d2978
     use_md5_hash
0d2978
         Use the RFC 1321 MD5 hashing algorithm by Ron Rivest when signing
0d2978
         and verifying messages.
0d2978
@@ -168,7 +163,7 @@ Instance Methods
0d2978
         pkcs1_oaep_padding
0d2978
             at most 42 bytes less than this size.
0d2978
 
0d2978
-        pkcs1_padding or sslv23_padding
0d2978
+        pkcs1_padding
0d2978
             at most 11 bytes less than this size.
0d2978
 
0d2978
         no_padding
0d2978
diff --git a/RSA.pm b/RSA.pm
0d2978
index 31e6949..1b63e99 100644
0d2978
--- a/RSA.pm
0d2978
+++ b/RSA.pm
0d2978
@@ -34,8 +34,7 @@ Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL libraries
0d2978
   Crypt::OpenSSL::Random::random_seed($good_entropy);
0d2978
   Crypt::OpenSSL::RSA->import_random_seed();
0d2978
   $rsa_pub = Crypt::OpenSSL::RSA->new_public_key($key_string);
0d2978
-  $rsa_pub->use_sslv23_padding(); # use_pkcs1_oaep_padding is the default
0d2978
-  $ciphertext = $rsa->encrypt($plaintext);
0d2978
+    $ciphertext = $rsa->encrypt($plaintext);
0d2978
 
0d2978
   $rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string);
0d2978
   $plaintext = $rsa->encrypt($ciphertext);
0d2978
@@ -220,11 +219,6 @@ an empty encoding parameter. This mode of padding is recommended for
0d2978
 all new applications.  It is the default mode used by
0d2978
 C<Crypt::OpenSSL::RSA>.
0d2978
 
0d2978
-=item use_sslv23_padding
0d2978
-
0d2978
-Use C<PKCS #1 v1.5> padding with an SSL-specific modification that
0d2978
-denotes that the server is SSL3 capable.
0d2978
-
0d2978
 =item use_md5_hash
0d2978
 
0d2978
 Use the RFC 1321 MD5 hashing algorithm by Ron Rivest when signing and
0d2978
@@ -267,7 +261,7 @@ the text to be encrypted should be:
0d2978
 
0d2978
 at most 42 bytes less than this size.
0d2978
 
0d2978
-=item pkcs1_padding or sslv23_padding
0d2978
+=item pkcs1_padding
0d2978
 
0d2978
 at most 11 bytes less than this size.
0d2978
 
0d2978
diff --git a/RSA.xs b/RSA.xs
0d2978
index d474d11..711e4e7 100644
0d2978
--- a/RSA.xs
0d2978
+++ b/RSA.xs
0d2978
@@ -640,12 +640,6 @@ use_pkcs1_oaep_padding(p_rsa)
0d2978
   CODE:
0d2978
     p_rsa->padding = RSA_PKCS1_OAEP_PADDING;
0d2978
 
0d2978
-void
0d2978
-use_sslv23_padding(p_rsa)
0d2978
-    rsaData* p_rsa;
0d2978
-  CODE:
0d2978
-    p_rsa->padding = RSA_SSLV23_PADDING;
0d2978
-
0d2978
 # Sign text. Returns the signature.
0d2978
 
0d2978
 SV*