Remove EVP_PKEY_missing_parameters in ssl3_check_certificate_for_cipher.

This is a remnant of DSA support. It's not possible to parse out an incomplete
public key for the more reasonable X.509 key types.

Change-Id: I4f4c7b9d3795f5f0635f80a4cec9ca4c778e6c69
Reviewed-on: https://boringssl-review.googlesource.com/5050
Reviewed-by: Adam Langley <agl@google.com>
diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c
index 124c763..f0c36ef 100644
--- a/ssl/s3_clnt.c
+++ b/ssl/s3_clnt.c
@@ -917,9 +917,7 @@
                                              const SSL_CIPHER *cipher) {
   int ret = 0;
   EVP_PKEY *pkey = X509_get_pubkey(leaf);
-  if (pkey == NULL || EVP_PKEY_missing_parameters(pkey)) {
-    OPENSSL_PUT_ERROR(SSL, ssl3_get_server_certificate,
-                      SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS);
+  if (pkey == NULL) {
     goto err;
   }