Lines Matching refs:signature
3 # message, and verifies the signature.
8 # signs the message, and verifies the signature.
14 …./framework/data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature
15 # uses leaf key 0, so must be the first signature generated by the key if the
16 # signature is to be reproduced. Message data is random. Note that pyhsslms
18 # word at the start of the key/sig. We strip these 4 bytes from the signature
21 # To produce another signature with this message and key (note that the actual
22 # signature bytes will differ due to randomization):
39 # The signature uses leaf key 1, so must be the second signature generated by
40 # the key if the signature is to be reproduced.
42 # To produce another signature with this message and key (note that the actual
43 # signature bytes will differ due to randomization), after generating the
44 # first signature:
54 …./framework/data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature
55 # uses leaf key 2, so must be the third signature generated by the key if the
56 # signature is to be reproduced. Message data is random. Note that hash-sigs
59 # signature and the public key before including them in a the test data.
61 # To produce another signature with this message and key (note that the actual
62 # signature bytes will differ due to randomization):
66 # * hsslms sign tmp/lms.prv message.bin (incorrect signature using leaf node 0)
68 # * hsslms sign tmp/lms.prv message.bin (incorrect signature using leaf node 1)
70 # * hsslms sign tmp/lms.prv message.bin (correct signature using leaf node 2)
73 # To validate the signature:
74 # * <Save signature in binary format>
87 # signature uses leaf key 0, so must be the first signature generated by the key
88 # if the signature is to be reproduced. Message data is random. Note that
91 # the signature and the public key before including them in a the test data.
93 # To produce another signature with this message and key (note that the actual
94 # signature bytes will differ due to randomization):
102 # To validate the signature:
103 # * Save message and signature in binary format
115 # signature uses leaf key 1, so must be the second signature generated by the key
116 # if the signature is to be reproduced. Message data is random. Note that
119 # the signature and the public key before including them in a the test data.
121 # To produce another signature with this message and key (note that the actual
122 # signature bytes will differ due to randomization):
127 # * <hash-sigs>/demo sign tmp/lms message.bin (incorrect signature using leaf node 0)
129 # * <hash-sigs>/demo sign tmp/lms message.bin (correct signature using leaf node 1)
132 # To validate the signature:
133 # * Save message and signature in binary format
145 # To produce another signature with this message and key (note that the actual
146 # signature bytes will differ due to randomization):
168 # To produce another signature with this message and key (note that the actual
169 # signature bytes will differ due to randomization):
212 # test should fail to verify the signature.