aboutsummaryrefslogtreecommitdiffstats
path: root/src/pubkey/rw/rw.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2010-03-21 21:54:47 +0000
committerlloyd <[email protected]>2010-03-21 21:54:47 +0000
commitc23ae85c0529071b3170e88d361342d6a792f417 (patch)
tree5f731b328266809df9fd82cd1e1e5d4dc6c8e88b /src/pubkey/rw/rw.cpp
parent8b0d3575e794073f6e6658544d8167e399762ce0 (diff)
KeyPair::check_key's behavior of throwing an exception upon failure was
not useful; in all cases, we immediately caught it and then returned false. Modify as follows: - Create the pubkey objects inside the checking code, so calling code doesn't need to do it. - Return true/false for pass/fail Also add consistency checking for ECDSA keys
Diffstat (limited to 'src/pubkey/rw/rw.cpp')
-rw-r--r--src/pubkey/rw/rw.cpp16
1 files changed, 1 insertions, 15 deletions
diff --git a/src/pubkey/rw/rw.cpp b/src/pubkey/rw/rw.cpp
index 508244112..91cebc5a8 100644
--- a/src/pubkey/rw/rw.cpp
+++ b/src/pubkey/rw/rw.cpp
@@ -56,21 +56,7 @@ bool RW_PrivateKey::check_key(RandomNumberGenerator& rng, bool strong) const
if((e * d) % (lcm(p - 1, q - 1) / 2) != 1)
return false;
- try
- {
- PK_Signer this_signer(*this, "EMSA2(SHA-1)");
- PK_Verifier this_verifier(*this, "EMSA2(SHA-1)");
-
- KeyPair::check_key(rng,
- this_signer,
- this_verifier);
- }
- catch(Self_Test_Failure)
- {
- return false;
- }
-
- return true;
+ return KeyPair::signature_consistency_check(rng, *this, "EMSA2(SHA-1)");
}
RW_Signature_Operation::RW_Signature_Operation(const RW_PrivateKey& rw) :