- 2.74.0 (latest)
- 2.73.0
- 2.71.0
- 2.69.0
- 2.68.0
- 2.65.0
- 2.64.0
- 2.63.0
- 2.61.0
- 2.60.0
- 2.59.0
- 2.58.0
- 2.57.0
- 2.56.0
- 2.55.0
- 2.54.0
- 2.53.0
- 2.52.0
- 2.50.0
- 2.49.0
- 2.48.0
- 2.47.0
- 2.46.0
- 2.45.0
- 2.44.0
- 2.43.0
- 2.42.0
- 2.41.0
- 2.40.0
- 2.38.0
- 2.37.0
- 2.36.0
- 2.35.0
- 2.34.0
- 2.33.0
- 2.32.0
- 2.31.0
- 2.30.0
- 2.29.0
- 2.28.0
- 2.25.0
- 2.24.0
- 2.23.0
- 2.22.0
- 2.21.0
- 2.20.0
- 2.19.0
- 2.18.0
- 2.17.0
- 2.16.0
- 2.15.0
- 2.14.0
- 2.13.0
- 2.12.0
- 2.10.0
- 2.9.0
- 2.8.0
- 2.7.0
- 2.6.0
- 2.5.0
- 2.4.5
- 2.3.1
- 2.2.3
- 2.1.3
public
static
final
class
Signature
.
Builder
extends
GeneratedMessageV3
.
Builder<Signature
.
Builder
>
implements
SignatureOrBuilder
Verifiers (e.g. Kritis implementations) MUST verify signatures
with respect to the trust anchors defined in policy (e.g. a Kritis policy).
Typically this means that the verifier has been configured with a map from public_key_id
to public key material (and any required parameters, e.g.
signing algorithm).
In particular, verification implementations MUST NOT treat the signature public_key_id
as anything more than a key lookup hint. The public_key_id
DOES NOT validate or authenticate a public key; it only provides a mechanism
for quickly selecting a public key ALREADY CONFIGURED on the verifier through
a trusted channel. Verification implementations MUST reject signatures in any
of the following circumstances:
- The
public_key_id
is not recognized by the verifier. -
The public key that
public_key_id
refers to does not verify the signature with respect to the payload.The
signature
contents SHOULD NOT be "attached" (where the payload is included with the serializedsignature
bytes). Verifiers MUST ignore any "attached" payload and only verify signatures with respect to explicitly provided payload (e.g. apayload
field on the proto message that holds this Signature, or the canonical serialization of the proto message that holds this signature).
Protobuf type grafeas.v1.Signature
Inheritance
Object > AbstractMessageLite.Builder<MessageType,BuilderType> > AbstractMessage.Builder<BuilderType> > GeneratedMessageV3.Builder > Signature.BuilderImplements
SignatureOrBuilderStatic Methods
getDescriptor()
public
static
final
Descriptors
.
Descriptor
getDescriptor
()
Methods
addRepeatedField(Descriptors.FieldDescriptor field, Object value)
public
Signature
.
Builder
addRepeatedField
(
Descriptors
.
FieldDescriptor
field
,
Object
value
)
build()
public
Signature
build
()
buildPartial()
public
Signature
buildPartial
()
clear()
public
Signature
.
Builder
clear
()
clearField(Descriptors.FieldDescriptor field)
public
Signature
.
Builder
clearField
(
Descriptors
.
FieldDescriptor
field
)
clearOneof(Descriptors.OneofDescriptor oneof)
public
Signature
.
Builder
clearOneof
(
Descriptors
.
OneofDescriptor
oneof
)
clearPublicKeyId()
public
Signature
.
Builder
clearPublicKeyId
()
The identifier for the public key that verifies this signature.
- The
public_key_id
is required. - The
public_key_id
SHOULD be an RFC3986 conformant URI. -
When possible, the
public_key_id
SHOULD be an immutable reference, such as a cryptographic digest.Examples of valid
public_key_id
s:OpenPGP V4 public key fingerprint:
-
"openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more details on this scheme.
RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER serialization):
- "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
string public_key_id = 2;
clearSignature()
public
Signature
.
Builder
clearSignature
()
The content of the signature, an opaque bytestring. The payload that this signature verifies MUST be unambiguously provided with the Signature during verification. A wrapper message might provide the payload explicitly. Alternatively, a message might have a canonical serialization that can always be unambiguously computed to derive the payload.
bytes signature = 1;
clone()
public
Signature
.
Builder
clone
()
getDefaultInstanceForType()
public
Signature
getDefaultInstanceForType
()
getDescriptorForType()
public
Descriptors
.
Descriptor
getDescriptorForType
()
getPublicKeyId()
public
String
getPublicKeyId
()
The identifier for the public key that verifies this signature.
- The
public_key_id
is required. - The
public_key_id
SHOULD be an RFC3986 conformant URI. -
When possible, the
public_key_id
SHOULD be an immutable reference, such as a cryptographic digest.Examples of valid
public_key_id
s:OpenPGP V4 public key fingerprint:
-
"openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more details on this scheme.
RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER serialization):
- "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
string public_key_id = 2;
getPublicKeyIdBytes()
public
ByteString
getPublicKeyIdBytes
()
The identifier for the public key that verifies this signature.
- The
public_key_id
is required. - The
public_key_id
SHOULD be an RFC3986 conformant URI. -
When possible, the
public_key_id
SHOULD be an immutable reference, such as a cryptographic digest.Examples of valid
public_key_id
s:OpenPGP V4 public key fingerprint:
-
"openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more details on this scheme.
RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER serialization):
- "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
string public_key_id = 2;
getSignature()
public
ByteString
getSignature
()
The content of the signature, an opaque bytestring. The payload that this signature verifies MUST be unambiguously provided with the Signature during verification. A wrapper message might provide the payload explicitly. Alternatively, a message might have a canonical serialization that can always be unambiguously computed to derive the payload.
bytes signature = 1;
internalGetFieldAccessorTable()
protected
GeneratedMessageV3
.
FieldAccessorTable
internalGetFieldAccessorTable
()
isInitialized()
public
final
boolean
isInitialized
()
mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
public
Signature
.
Builder
mergeFrom
(
CodedInputStream
input
,
ExtensionRegistryLite
extensionRegistry
)
mergeFrom(Message other)
public
Signature
.
Builder
mergeFrom
(
Message
other
)
mergeFrom(Signature other)
public
Signature
.
Builder
mergeFrom
(
Signature
other
)
mergeUnknownFields(UnknownFieldSet unknownFields)
public
final
Signature
.
Builder
mergeUnknownFields
(
UnknownFieldSet
unknownFields
)
setField(Descriptors.FieldDescriptor field, Object value)
public
Signature
.
Builder
setField
(
Descriptors
.
FieldDescriptor
field
,
Object
value
)
setPublicKeyId(String value)
public
Signature
.
Builder
setPublicKeyId
(
String
value
)
The identifier for the public key that verifies this signature.
- The
public_key_id
is required. - The
public_key_id
SHOULD be an RFC3986 conformant URI. -
When possible, the
public_key_id
SHOULD be an immutable reference, such as a cryptographic digest.Examples of valid
public_key_id
s:OpenPGP V4 public key fingerprint:
-
"openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more details on this scheme.
RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER serialization):
- "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
string public_key_id = 2;
setPublicKeyIdBytes(ByteString value)
public
Signature
.
Builder
setPublicKeyIdBytes
(
ByteString
value
)
The identifier for the public key that verifies this signature.
- The
public_key_id
is required. - The
public_key_id
SHOULD be an RFC3986 conformant URI. -
When possible, the
public_key_id
SHOULD be an immutable reference, such as a cryptographic digest.Examples of valid
public_key_id
s:OpenPGP V4 public key fingerprint:
-
"openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more details on this scheme.
RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER serialization):
- "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
string public_key_id = 2;
setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
public
Signature
.
Builder
setRepeatedField
(
Descriptors
.
FieldDescriptor
field
,
int
index
,
Object
value
)
setSignature(ByteString value)
public
Signature
.
Builder
setSignature
(
ByteString
value
)
The content of the signature, an opaque bytestring. The payload that this signature verifies MUST be unambiguously provided with the Signature during verification. A wrapper message might provide the payload explicitly. Alternatively, a message might have a canonical serialization that can always be unambiguously computed to derive the payload.
bytes signature = 1;
setUnknownFields(UnknownFieldSet unknownFields)
public
final
Signature
.
Builder
setUnknownFields
(
UnknownFieldSet
unknownFields
)