openssl/util/perl/OpenSSL
Richard Levitte e675aabb87 Implement functionality for direct use of composite signature algorithms
The following API groups are extended with a new init function, as well
as an update and final function, to allow the use of explicitly fetched
signature implementations for any composite signature algorithm, like
"sha1WithRSAEncryption":

- EVP_PKEY_sign
- EVP_PKEY_verify
- EVP_PKEY_verify_recover

To support this, providers are required to add a few new functions, not
the least one that declares what key types an signature implementation
supports.

While at this, the validity check in evp_signature_from_algorithm() is
also refactored; the SIGNATURE provider functionality is too complex for
counters.  It's better, or at least more readable, to check function
combinations.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23416)
2024-08-21 08:21:06 +02:00
..
Config
Test OpenSSL::Test: Avoid running IPv6 related tests if IPv6 was explicitly disabled 2024-06-29 08:36:00 +02:00
Util
Glob.pm
OID.pm
Ordinals.pm Copyright year updates 2023-09-07 09:59:15 +01:00
ParseC.pm util/perl/OpenSSL/ParseC.pm: correctly parse OSSL_DEPRECATEDIN_..._FOR 2024-05-30 18:31:21 +02:00
Template.pm
Test.pm Enhance the srctop, bldtop, data and result functions to check the result 2021-09-09 11:25:18 +02:00
Util.pm Copyright year updates 2023-09-07 09:59:15 +01:00
config.pm Copyright year updates 2024-04-09 13:43:26 +02:00
copyright.pm Update copyright year 2022-05-03 13:34:51 +01:00
fallback.pm
paramnames.pm Implement functionality for direct use of composite signature algorithms 2024-08-21 08:21:06 +02:00
stackhash.pm Copyright year updates 2024-04-09 13:43:26 +02:00