| Index: components/proximity_auth/cryptauth/proto/securemessage.proto
|
| diff --git a/components/proximity_auth/cryptauth/proto/securemessage.proto b/components/proximity_auth/cryptauth/proto/securemessage.proto
|
| deleted file mode 100644
|
| index c086145a06a8d5a258c5e47019bc8b69599efb35..0000000000000000000000000000000000000000
|
| --- a/components/proximity_auth/cryptauth/proto/securemessage.proto
|
| +++ /dev/null
|
| @@ -1,116 +0,0 @@
|
| -// Copyright 2015 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -// Definitions related to the SecureMessage format, used by CryptAuth. Do not
|
| -// edit unless transcribing from server definitions.
|
| -syntax = "proto2";
|
| -
|
| -package securemessage;
|
| -
|
| -option optimize_for = LITE_RUNTIME;
|
| -
|
| -message SecureMessage {
|
| - // Must contain a HeaderAndBody message.
|
| - required bytes header_and_body = 1;
|
| - // Signature of header_and_body.
|
| - required bytes signature = 2;
|
| -}
|
| -
|
| -// Supported "signature" schemes (both symmetric key and public key based).
|
| -enum SigScheme {
|
| - HMAC_SHA256 = 1;
|
| - ECDSA_P256_SHA256 = 2;
|
| - // Not recommended -- use ECDSA_P256_SHA256 instead
|
| - RSA2048_SHA256 = 3;
|
| -}
|
| -
|
| -// Supported encryption schemes.
|
| -enum EncScheme {
|
| - // No encryption.
|
| - NONE = 1;
|
| - AES_256_CBC = 2;
|
| -}
|
| -
|
| -message Header {
|
| - required SigScheme signature_scheme = 1;
|
| - required EncScheme encryption_scheme = 2;
|
| - // Identifies the verification key.
|
| - optional bytes verification_key_id = 3;
|
| - // Identifies the decryption key.
|
| - optional bytes decryption_key_id = 4;
|
| - // Encryption may use an IV.
|
| - optional bytes iv = 5;
|
| - // Arbitrary per-protocol public data, to be sent with the plain-text header.
|
| - optional bytes public_metadata = 6;
|
| - // The length of some associated data that is not sent in this SecureMessage,
|
| - // but which will be bound to the signature.
|
| - optional uint32 associated_data_length = 7 [default = 0];
|
| -}
|
| -
|
| -message HeaderAndBody {
|
| - // Public data about this message (to be bound in the signature).
|
| - required Header header = 1;
|
| - // Payload data.
|
| - required bytes body = 2;
|
| -}
|
| -
|
| -// A list of supported public key types.
|
| -enum PublicKeyType {
|
| - EC_P256 = 1;
|
| - RSA2048 = 2;
|
| - // 2048-bit MODP group 14, from RFC 3526.
|
| - DH2048_MODP = 3;
|
| -}
|
| -
|
| -// A convenience proto for encoding NIST P-256 elliptic curve public keys.
|
| -message EcP256PublicKey {
|
| - // x and y are encoded in big-endian two's complement (slightly wasteful)
|
| - // Client MUST verify (x,y) is a valid point on NIST P256.
|
| - required bytes x = 1;
|
| - required bytes y = 2;
|
| -}
|
| -
|
| -// A convenience proto for encoding RSA public keys with small exponents.
|
| -message SimpleRsaPublicKey {
|
| - // Encoded in big-endian two's complement.
|
| - required bytes n = 1;
|
| - optional int32 e = 2 [default = 65537];
|
| -}
|
| -
|
| -// A convenience proto for encoding Diffie-Hellman public keys,
|
| -// for use only when Elliptic Curve based key exchanges are not possible.
|
| -// (Note that the group parameters must be specified separately).
|
| -message DhPublicKey {
|
| - // Big-endian two's complement encoded group element.
|
| - required bytes y = 1;
|
| -}
|
| -
|
| -message GenericPublicKey {
|
| - required PublicKeyType type = 1;
|
| - optional EcP256PublicKey ec_p256_public_key = 2;
|
| - optional SimpleRsaPublicKey rsa2048_public_key = 3;
|
| - // Use only as a last resort.
|
| - optional DhPublicKey dh2048_public_key = 4;
|
| -}
|
| -
|
| -// Used by protocols for communicating between a pair of devices.
|
| -message DeviceToDeviceMessage {
|
| - // The payload of the message.
|
| - optional bytes message = 1;
|
| -
|
| - // The sequence number of the message - must be increasing.
|
| - optional int32 sequence_number = 2;
|
| -}
|
| -
|
| -// Sent as the first message from initiator to responder in an unauthenticated
|
| -// Diffie-Hellman Key Exchange.
|
| -message InitiatorHello {
|
| - optional GenericPublicKey public_dh_key = 1;
|
| -}
|
| -
|
| -// Sent inside the header of the first message from the responder to the
|
| -// initiator in an unauthenticated Diffie-Hellman Key Exchange.
|
| -message ResponderHello {
|
| - optional GenericPublicKey public_dh_key = 1;
|
| -}
|
|
|