openssl/providers/implementations
Shane Lontis 3a37ddde91 Fix DSA EVP_PKEY_param_check() when defaults are used for param generation.
Fixes #14480

An internal flag that is set during param gen was not being tested, so
the wrong type was used to select the dsa domain param validation method.

In the default provider - if no gen_type is set then by default the fips186_4 gentype
will be selected when pbits >=2048 otherwise it selects fips186_2.
The fips provider ignores the gen_type and always uses fips186_4.

Before this change dsa used fips186_2 by default in the default
provider.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14508)
2021-03-15 09:01:51 +10:00
..
asymciphers
ciphers support params argument to AES cipher init calls 2021-03-12 08:27:21 +10:00
digests prov: update digests to support modified ctx params 2021-03-12 08:27:21 +10:00
encode_decode
exchange
include/prov prov: support param argument to digest init calls 2021-03-12 08:27:11 +10:00
kdfs prov: add extra params argument to KDF implementations 2021-03-12 08:27:21 +10:00
kem prov: update KEM to support params on init() 2021-03-12 08:27:11 +10:00
keymgmt Fix DSA EVP_PKEY_param_check() when defaults are used for param generation. 2021-03-15 09:01:51 +10:00
macs update set_ctx_param MAC calls to return 1 for a NULL params 2021-03-12 08:27:30 +10:00
rands update set_ctx_param DRBG calls to return 1 for a NULL params 2021-03-12 08:27:30 +10:00
signature prov: support params arguments to signature init calls 2021-03-12 08:27:21 +10:00
storemgmt update set_ctx_param store management calls to return 1 for a NULL params 2021-03-12 08:27:30 +10:00
build.info