The demo program takes a name of hash function, private RSA key in PEM format, and input from the command line. The input is then signed and verified:
The demo program takes a name of a hash function, a private RSA key in PEM format, and input from the command line. The input is then signed and verified: