openssl/providers/implementations
Tomas Mraz 9a48544058 Make EVP_PKEY_missing_parameters work properly on provided RSA keys
This requires changing semantics of the keymgmt_has()
function a little in the sense that it now returns 1
if the selection has no meaning for the key type. It
was already doing so for ECX keys for example.

The keymgmt_validate function semantics is changed
similarly to allow passing validation on the same
selection that the key returns 1 for.

Fixes #14509

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14511)
2021-03-17 14:57:47 +01:00
..
asymciphers prov: asym ciphers take an extra init() params argument 2021-03-12 08:27:11 +10:00
ciphers support params argument to AES cipher init calls 2021-03-12 08:27:21 +10:00
digests prov: update digests to support modified ctx params 2021-03-12 08:27:21 +10:00
encode_decode Update copyright year 2021-03-11 13:27:36 +00:00
exchange prov: update exchange algorithms to support params on the init call 2021-03-12 08:27:11 +10:00
include/prov prov: support param argument to digest init calls 2021-03-12 08:27:11 +10:00
kdfs prov: add extra params argument to KDF implementations 2021-03-12 08:27:21 +10:00
kem prov: update KEM to support params on init() 2021-03-12 08:27:11 +10:00
keymgmt Make EVP_PKEY_missing_parameters work properly on provided RSA keys 2021-03-17 14:57:47 +01:00
macs Fix a TODO(3.0) in the siphash code 2021-03-17 10:16:21 +10:00
rands update set_ctx_param DRBG calls to return 1 for a NULL params 2021-03-12 08:27:30 +10:00
signature prov: support params arguments to signature init calls 2021-03-12 08:27:21 +10:00
storemgmt update set_ctx_param store management calls to return 1 for a NULL params 2021-03-12 08:27:30 +10:00
build.info Add KEM (Key encapsulation mechanism) support to providers 2020-09-19 18:08:46 +10:00