diff options
author | Brian Warner <warner@lothar.com> | 2012-10-30 13:47:27 -0700 |
---|---|---|
committer | Brian Warner <warner@lothar.com> | 2012-10-30 13:47:27 -0700 |
commit | c729de4e213dc5da1979dbdd4612bcee9b7a6a30 (patch) | |
tree | 22d2d4e33a5dbf3dc7c6a682dd54b1f760260f79 | |
parent | f50eecd8be2b53bc98a2343d1df9ae336ed11825 (diff) | |
download | ecdsa-c729de4e213dc5da1979dbdd4612bcee9b7a6a30.tar.gz |
README: fix vk.verify() example (not sk.verify)
Thanks to SysTheron for the catch. Closes #7.
-rw-r--r-- | README | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -95,7 +95,7 @@ signature string: it either returns True or raises BadSignatureError. sk = SigningKey.generate() # uses NIST192p vk = sk.get_verifying_key() signature = sk.sign("message") - assert sk.verify(signature, "message") + assert vk.verify(signature, "message") Each SigningKey/VerifyingKey is associated with a specific curve, like NIST192p (the default one). Longer curves are more secure, but take longer to @@ -105,7 +105,7 @@ use, and result in longer keys and signatures. sk = SigningKey.generate(curve=NIST384p) vk = sk.get_verifying_key() signature = sk.sign("message") - assert sk.verify(signature, "message") + assert vk.verify(signature, "message") The SigningKey can be serialized into several different formats: the shortest is to call s=sk.to_string(), and then re-create it with |