Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(419)

Unified Diff: components/proximity_auth/cryptauth/proto/securemessage.proto

Issue 2502343003: Moved //components/proximity_auth/cryptauth to //components/cryptauth. (Closed)
Patch Set: Fixed proto #includes. Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/proximity_auth/cryptauth/proto/securemessage.proto
diff --git a/components/proximity_auth/cryptauth/proto/securemessage.proto b/components/proximity_auth/cryptauth/proto/securemessage.proto
deleted file mode 100644
index c086145a06a8d5a258c5e47019bc8b69599efb35..0000000000000000000000000000000000000000
--- a/components/proximity_auth/cryptauth/proto/securemessage.proto
+++ /dev/null
@@ -1,116 +0,0 @@
-// Copyright 2015 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-// Definitions related to the SecureMessage format, used by CryptAuth. Do not
-// edit unless transcribing from server definitions.
-syntax = "proto2";
-
-package securemessage;
-
-option optimize_for = LITE_RUNTIME;
-
-message SecureMessage {
- // Must contain a HeaderAndBody message.
- required bytes header_and_body = 1;
- // Signature of header_and_body.
- required bytes signature = 2;
-}
-
-// Supported "signature" schemes (both symmetric key and public key based).
-enum SigScheme {
- HMAC_SHA256 = 1;
- ECDSA_P256_SHA256 = 2;
- // Not recommended -- use ECDSA_P256_SHA256 instead
- RSA2048_SHA256 = 3;
-}
-
-// Supported encryption schemes.
-enum EncScheme {
- // No encryption.
- NONE = 1;
- AES_256_CBC = 2;
-}
-
-message Header {
- required SigScheme signature_scheme = 1;
- required EncScheme encryption_scheme = 2;
- // Identifies the verification key.
- optional bytes verification_key_id = 3;
- // Identifies the decryption key.
- optional bytes decryption_key_id = 4;
- // Encryption may use an IV.
- optional bytes iv = 5;
- // Arbitrary per-protocol public data, to be sent with the plain-text header.
- optional bytes public_metadata = 6;
- // The length of some associated data that is not sent in this SecureMessage,
- // but which will be bound to the signature.
- optional uint32 associated_data_length = 7 [default = 0];
-}
-
-message HeaderAndBody {
- // Public data about this message (to be bound in the signature).
- required Header header = 1;
- // Payload data.
- required bytes body = 2;
-}
-
-// A list of supported public key types.
-enum PublicKeyType {
- EC_P256 = 1;
- RSA2048 = 2;
- // 2048-bit MODP group 14, from RFC 3526.
- DH2048_MODP = 3;
-}
-
-// A convenience proto for encoding NIST P-256 elliptic curve public keys.
-message EcP256PublicKey {
- // x and y are encoded in big-endian two's complement (slightly wasteful)
- // Client MUST verify (x,y) is a valid point on NIST P256.
- required bytes x = 1;
- required bytes y = 2;
-}
-
-// A convenience proto for encoding RSA public keys with small exponents.
-message SimpleRsaPublicKey {
- // Encoded in big-endian two's complement.
- required bytes n = 1;
- optional int32 e = 2 [default = 65537];
-}
-
-// A convenience proto for encoding Diffie-Hellman public keys,
-// for use only when Elliptic Curve based key exchanges are not possible.
-// (Note that the group parameters must be specified separately).
-message DhPublicKey {
- // Big-endian two's complement encoded group element.
- required bytes y = 1;
-}
-
-message GenericPublicKey {
- required PublicKeyType type = 1;
- optional EcP256PublicKey ec_p256_public_key = 2;
- optional SimpleRsaPublicKey rsa2048_public_key = 3;
- // Use only as a last resort.
- optional DhPublicKey dh2048_public_key = 4;
-}
-
-// Used by protocols for communicating between a pair of devices.
-message DeviceToDeviceMessage {
- // The payload of the message.
- optional bytes message = 1;
-
- // The sequence number of the message - must be increasing.
- optional int32 sequence_number = 2;
-}
-
-// Sent as the first message from initiator to responder in an unauthenticated
-// Diffie-Hellman Key Exchange.
-message InitiatorHello {
- optional GenericPublicKey public_dh_key = 1;
-}
-
-// Sent inside the header of the first message from the responder to the
-// initiator in an unauthenticated Diffie-Hellman Key Exchange.
-message ResponderHello {
- optional GenericPublicKey public_dh_key = 1;
-}

Powered by Google App Engine
This is Rietveld 408576698