- 2.79.0 (latest)
- 2.77.0
- 2.76.0
- 2.75.0
- 2.74.0
- 2.73.0
- 2.71.0
- 2.69.0
- 2.68.0
- 2.65.0
- 2.64.0
- 2.63.0
- 2.61.0
- 2.60.0
- 2.59.0
- 2.58.0
- 2.57.0
- 2.56.0
- 2.55.0
- 2.54.0
- 2.53.0
- 2.52.0
- 2.50.0
- 2.49.0
- 2.48.0
- 2.47.0
- 2.46.0
- 2.45.0
- 2.44.0
- 2.43.0
- 2.42.0
- 2.41.0
- 2.40.0
- 2.38.0
- 2.37.0
- 2.36.0
- 2.35.0
- 2.34.0
- 2.33.0
- 2.32.0
- 2.31.0
- 2.30.0
- 2.29.0
- 2.28.0
- 2.25.0
- 2.24.0
- 2.23.0
- 2.22.0
- 2.21.0
- 2.20.0
- 2.19.0
- 2.18.0
- 2.17.0
- 2.16.0
- 2.15.0
- 2.14.0
- 2.13.0
- 2.12.0
- 2.11.0
- 2.10.0
- 2.9.0
- 2.8.0
- 2.7.0
- 2.6.0
- 2.5.0
- 2.4.10
- 2.3.1
- 2.2.16
public interface PgpSignedAttestationOrBuilder extends MessageOrBuilderImplements
MessageOrBuilderMethods
getContentType()
public abstract PgpSignedAttestation.ContentType getContentType()Type (for example schema) of the attestation payload that was signed. The verifier must ensure that the provided type is one that the verifier supports, and that the attestation payload is a valid instantiation of that type (for example by validating a JSON schema).
 .grafeas.v1beta1.attestation.PgpSignedAttestation.ContentType content_type = 3;
| Type | Description | 
| PgpSignedAttestation.ContentType | The contentType. | 
getContentTypeValue()
public abstract int getContentTypeValue()Type (for example schema) of the attestation payload that was signed. The verifier must ensure that the provided type is one that the verifier supports, and that the attestation payload is a valid instantiation of that type (for example by validating a JSON schema).
 .grafeas.v1beta1.attestation.PgpSignedAttestation.ContentType content_type = 3;
| Type | Description | 
| int | The enum numeric value on the wire for contentType. | 
getKeyIdCase()
public abstract PgpSignedAttestation.KeyIdCase getKeyIdCase()| Type | Description | 
| PgpSignedAttestation.KeyIdCase | 
getPgpKeyId()
public abstract String getPgpKeyId() The cryptographic fingerprint of the key used to generate the signature,
 as output by, e.g. gpg --list-keys. This should be the version 4, full
 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
 https://tools.ietf.org/html/rfc4880#section-12.2 for details.
 Implementations may choose to acknowledge "LONG", "SHORT", or other
 abbreviated key IDs, but only the full fingerprint is guaranteed to work.
 In gpg, the full fingerprint can be retrieved from the fpr field
 returned when calling --list-keys with --with-colons.  For example:
 <code><code>
 gpg --with-colons --with-fingerprint --force-v4-certs \
     --list-keys attester@example.com
 tru::1:1513631572:0:3:1:5
 pub:...<SNIP>...
 fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
 </code></code><code>
 Above, the fingerprint is </code>24FF6481B76AC91E66A00AC657A93A81EF3AE6FB.
 string pgp_key_id = 2;
| Type | Description | 
| String | The pgpKeyId. | 
getPgpKeyIdBytes()
public abstract ByteString getPgpKeyIdBytes() The cryptographic fingerprint of the key used to generate the signature,
 as output by, e.g. gpg --list-keys. This should be the version 4, full
 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
 https://tools.ietf.org/html/rfc4880#section-12.2 for details.
 Implementations may choose to acknowledge "LONG", "SHORT", or other
 abbreviated key IDs, but only the full fingerprint is guaranteed to work.
 In gpg, the full fingerprint can be retrieved from the fpr field
 returned when calling --list-keys with --with-colons.  For example:
 <code><code>
 gpg --with-colons --with-fingerprint --force-v4-certs \
     --list-keys attester@example.com
 tru::1:1513631572:0:3:1:5
 pub:...<SNIP>...
 fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
 </code></code><code>
 Above, the fingerprint is </code>24FF6481B76AC91E66A00AC657A93A81EF3AE6FB.
 string pgp_key_id = 2;
| Type | Description | 
| ByteString | The bytes for pgpKeyId. | 
getSignature()
public abstract String getSignature() Required. The raw content of the signature, as output by GNU Privacy Guard
 (GPG) or equivalent. Since this message only supports attached signatures,
 the payload that was signed must be attached. While the signature format
 supported is dependent on the verification implementation, currently only
 ASCII-armored (--armor to gpg), non-clearsigned (--sign rather than
 --clearsign to gpg) are supported. Concretely, gpg --sign --armor
 --output=signature.gpg payload.json will create the signature content
 expected in this field in signature.gpg for the payload.json
 attestation payload.
 string signature = 1;
| Type | Description | 
| String | The signature. | 
getSignatureBytes()
public abstract ByteString getSignatureBytes() Required. The raw content of the signature, as output by GNU Privacy Guard
 (GPG) or equivalent. Since this message only supports attached signatures,
 the payload that was signed must be attached. While the signature format
 supported is dependent on the verification implementation, currently only
 ASCII-armored (--armor to gpg), non-clearsigned (--sign rather than
 --clearsign to gpg) are supported. Concretely, gpg --sign --armor
 --output=signature.gpg payload.json will create the signature content
 expected in this field in signature.gpg for the payload.json
 attestation payload.
 string signature = 1;
| Type | Description | 
| ByteString | The bytes for signature. |