Mark Luko
Mark Luko
The current function `hss_reserve_signature` implementation doesn't fail if requested reserve value increment, exceeds the key counter above the maximum value. It increments it to the maximum value without any user...
Either the library should provide means to check `aux data` integrity before passing it to `hss_load_private_key` or `hss_load_private_key` shall return an indication that `aux data` is corrupted. Something like https://github.com/cisco/hash-sigs/blob/73310fdf7f83013adba5b393264955b9ca5f54cf/hss_generate.c#L400...
This is a follow-up of the https://github.com/usnistgov/ACVP-Server/issues/279 issue. The code was fixed, but the sample JSON files were not updated. They still show 32 byte seed for N=24 https://github.com/usnistgov/ACVP-Server/blob/master/gen-val/json-files/LMS-keyGen-1.0/prompt.json
NIST implemented LMS in ACVP server produces different results for `seed` and `i` parameters than this library. Example of NIST test vector: ``` "tgId": 1, "testType": "AFT", "lmsMode": "LMS_SHA256_M24_H5", "lmOtsMode":...