@@ -141,14 +141,6 @@ public boolean verifySignature(byte[] signature)
141141
142142 msgDigest .update (ds_message , 0 , ds_message .length );
143143
144- MLDSAEngine engine = pubKey .getParameters ().getEngine (random );
145-
146- byte [] ctx = pubKey .getContext ();
147- if (ctx .length > 255 )
148- {
149- throw new RuntimeException ("Context too long" );
150- }
151-
152144 return engine .verifyInternal (signature , signature .length , msgDigest , pubKey .rho , pubKey .t1 );
153145 }
154146
@@ -161,18 +153,18 @@ public void reset()
161153 digest .reset ();
162154 }
163155
164-
165- public byte [] internalGenerateSignature (byte [] message , byte [] random )
166- {
167- MLDSAEngine engine = privKey .getParameters ().getEngine (this .random );
168-
169- return engine .signInternal (message , message .length , privKey .rho , privKey .k , privKey .t0 , privKey .s1 , privKey .s2 , random );
170- }
171-
172- public boolean internalVerifySignature (byte [] message , byte [] signature )
173- {
174- MLDSAEngine engine = pubKey .getParameters ().getEngine (random );
175-
176- return engine .verifyInternal (signature , signature .length , message , message .length , pubKey .rho , pubKey .t1 );
177- }
156+ // TODO: these are probably no longer correct and also need to be marked as protected
157+ // public byte[] internalGenerateSignature(byte[] message, byte[] random)
158+ // {
159+ // MLDSAEngine engine = privKey.getParameters().getEngine(this.random);
160+ //
161+ // return engine.signInternal(message, message.length, privKey.rho, privKey.k, privKey.t0, privKey.s1, privKey.s2, random);
162+ // }
163+ //
164+ // public boolean internalVerifySignature(byte[] message, byte[] signature)
165+ // {
166+ // MLDSAEngine engine = pubKey.getParameters().getEngine(random);
167+ //
168+ // return engine.verifyInternal(signature, signature.length, message, message.length, pubKey.rho, pubKey.t1);
169+ // }
178170}
0 commit comments