openssl/providers
afshinpir a3207163ef Updated rsa_has() for correct validation
CLA: trivial
In RSA, `(n,e)` and `(n,d)` identify public key and private key.
Modulus `n` is the common part. So I updated `rsa_has()` to validate
these pairs correctly. `OSSL_KEYMGMT_SELECT_KEYPAIR` is common part
for both public and private key, so I changed it to check `n` of
RSA and for `OSSL_KEYMGMT_SELECT_PUBLIC_KEY`, `e` is checked. Before
this change, if `selection` was `OSSL_KEYMGMT_SELECT_PRIVATE_KEY` and
only `e` and `d` was in the RSA structure, the function returns 1
while it was incorrect.

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20455)
2023-03-15 08:28:39 +11:00
..
common Add option to FIPS module to enforce EMS check during KDF TLS1_PRF. 2023-03-07 18:24:45 +01:00
fips fips: Use salt >= 16 bytes in PBKDF2 selftest 2023-03-07 18:28:54 +01:00
implementations Updated rsa_has() for correct validation 2023-03-15 08:28:39 +11:00
baseprov.c
build.info
decoders.inc
defltprov.c
encoders.inc
fips-sources.checksums Rationalize FIPS sources 2023-02-08 16:20:55 +01:00
fips.checksum Rationalize FIPS sources 2023-02-08 16:20:55 +01:00
fips.module.sources Rationalize FIPS sources 2023-02-08 16:20:55 +01:00
legacyprov.c
nullprov.c
prov_running.c
stores.inc