Get desktop application:
View/edit binary Protocol Buffers messages
A convenience proto for encoding Diffie-Hellman public keys, for use only when Elliptic Curve based key exchanges are not possible. (Note that the group parameters must be specified separately)
Used in:
Big-endian two's complement encoded group element
A convenience proto for encoding NIST P-256 elliptic curve public keys
Used in:
x and y are encoded in big-endian two's complement (slightly wasteful) Client MUST verify (x,y) is a valid point on NIST P256
Supported encryption schemes
Used in:
No encryption
Used in:
,Use only as a last resort
Used in:
Identifies the verification key
Identifies the decryption key
Encryption may use an IV
Arbitrary per-protocol public data, to be sent with the plain-text header
The length of some associated data this is not sent in this SecureMessage, but which will be bound to the signature.
Public data about this message (to be bound in the signature)
Payload data
Must be kept wire-format compatible with HeaderAndBody. Provides the SecureMessage code with a consistent wire-format representation that remains stable irrespective of protobuf implementation choices. This low-level representation of a HeaderAndBody should not be used by any code outside of the SecureMessage library implementation/tests.
A raw (wire-format) byte encoding of a Header, suitable for hashing
Payload data
A list of supported public key types
Used in:
2048-bit MODP group 14, from RFC 3526
Must contain a HeaderAndBody message
Signature of header_and_body
Supported "signature" schemes (both symmetric key and public key based)
Used in:
Not recommended -- use ECDSA_P256_SHA256 instead
A convenience proto for encoding RSA public keys with small exponents
Used in:
Encoded in big-endian two's complement