&ciphertext, &ciphertext_len);
assert_eq(ret, YACA_ERROR_NONE);
- /*
- * YACA_PADDING_PKCS1_SSLV23 is compatible with YACA_PADDING_PKCS1. It is used to detect if
- * both the encrypting and decrypting side used YACA_PADDING_PKCS1_SSLV23, that is, both are
- * SSL3 capable but use the SSL2 (rollback attack detection).
- */
- ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1_SSLV23, prv_key,
+ ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1, prv_key,
ciphertext, ciphertext_len,
&plaintext, &plaintext_len);
assert_eq(ret, YACA_ERROR_NONE);
&plaintext, &plaintext_len);
assert_eq(ret, YACA_ERROR_INVALID_PARAMETER);
- ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1_SSLV23, NULL, ciphertext, ciphertext_len,
+ ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1, NULL, ciphertext, ciphertext_len,
&plaintext, &plaintext_len);
assert_eq(ret, YACA_ERROR_INVALID_PARAMETER);
- ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1_SSLV23, prv_key, NULL, ciphertext_len,
+ ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1, prv_key, NULL, ciphertext_len,
&plaintext, &plaintext_len);
assert_eq(ret, YACA_ERROR_INVALID_PARAMETER);
- ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1_SSLV23, prv_key, ciphertext, 0,
+ ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1, prv_key, ciphertext, 0,
&plaintext, &plaintext_len);
assert_eq(ret, YACA_ERROR_INVALID_PARAMETER);
- ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1_SSLV23, prv_key, ciphertext, ciphertext_len,
+ ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1, prv_key, ciphertext, ciphertext_len,
NULL, &plaintext_len);
assert_eq(ret, YACA_ERROR_INVALID_PARAMETER);
- ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1_SSLV23, prv_key, ciphertext, ciphertext_len,
+ ret = yaca_rsa_private_decrypt(YACA_PADDING_PKCS1, prv_key, ciphertext, ciphertext_len,
&plaintext, NULL);
assert_eq(ret, YACA_ERROR_INVALID_PARAMETER);