diff options
author | Jack Lloyd <[email protected]> | 2018-12-10 07:08:05 -0500 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2018-12-10 07:14:42 -0500 |
commit | b5bdefe234f6ea07b57c5bebfc06221298295e88 (patch) | |
tree | f335236a9c584241c08a1bf3fffcb9795b2607b9 /src/lib/pubkey | |
parent | df760ea61ae294f7d23572cf9104d55c63e94632 (diff) |
Work around a problem when built with OpenSSL
It appears OpenSSL has a different interpretation from us of how the
message representative is formed for P-521 when given a hash to sign
that is larger than the group order; signatures generated by us do
not verify with OpenSSL and vice versa.
Diffstat (limited to 'src/lib/pubkey')
-rw-r--r-- | src/lib/pubkey/ecdsa/ecdsa.cpp | 6 |
1 files changed, 1 insertions, 5 deletions
diff --git a/src/lib/pubkey/ecdsa/ecdsa.cpp b/src/lib/pubkey/ecdsa/ecdsa.cpp index 70196f55b..fadf1dd10 100644 --- a/src/lib/pubkey/ecdsa/ecdsa.cpp +++ b/src/lib/pubkey/ecdsa/ecdsa.cpp @@ -71,11 +71,7 @@ PointGFp recover_ecdsa_public_key(const EC_Group& group, const BigInt ne = group.mod_order(group_order - e); return r_inv * RG_mul.multi_exp(s, ne); } - catch(Illegal_Point&) - { - // continue on and throw - } - catch(Decoding_Error&) + catch(...) { // continue on and throw } |