-
Notifications
You must be signed in to change notification settings - Fork 80
/
verify_data_details.go
111 lines (92 loc) · 5.92 KB
/
verify_data_details.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
// Copyright (c) 2016, 2018, 2021, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// Vault Service Key Management API
//
// API for managing and performing operations with keys and vaults. (For the API for managing secrets, see the Vault Service
// Secret Management API. For the API for retrieving secrets, see the Vault Service Secret Retrieval API.)
//
package keymanagement
import (
"github.com/oracle/oci-go-sdk/v43/common"
)
// VerifyDataDetails The representation of VerifyDataDetails
type VerifyDataDetails struct {
// The OCID of the key used to sign the message.
KeyId *string `mandatory:"true" json:"keyId"`
// The OCID of the key version used to sign the message.
KeyVersionId *string `mandatory:"true" json:"keyVersionId"`
// The base64-encoded binary data object denoting the cryptographic signature generated for the message.
Signature *string `mandatory:"true" json:"signature"`
// The base64-encoded binary data object denoting the message or message digest to sign. You can have a message up to 4096 bytes in size. To sign a larger message, provide the message digest.
Message *string `mandatory:"true" json:"message"`
// The algorithm to use to sign the message or message digest.
// For RSA keys, supported signature schemes include PKCS #1 and RSASSA-PSS, along with
// different hashing algorithms.
// For ECDSA keys, ECDSA is the supported signature scheme with different hashing algorithms.
// When you pass a message digest for signing, ensure that you specify the same hashing algorithm
// as used when creating the message digest.
SigningAlgorithm VerifyDataDetailsSigningAlgorithmEnum `mandatory:"true" json:"signingAlgorithm"`
// Denotes whether the value of the message parameter is a raw message or a message digest.
// The default value, `RAW`, indicates a message. To indicate a message digest, use `DIGEST`.
MessageType VerifyDataDetailsMessageTypeEnum `mandatory:"false" json:"messageType,omitempty"`
}
func (m VerifyDataDetails) String() string {
return common.PointerString(m)
}
// VerifyDataDetailsMessageTypeEnum Enum with underlying type: string
type VerifyDataDetailsMessageTypeEnum string
// Set of constants representing the allowable values for VerifyDataDetailsMessageTypeEnum
const (
VerifyDataDetailsMessageTypeRaw VerifyDataDetailsMessageTypeEnum = "RAW"
VerifyDataDetailsMessageTypeDigest VerifyDataDetailsMessageTypeEnum = "DIGEST"
)
var mappingVerifyDataDetailsMessageType = map[string]VerifyDataDetailsMessageTypeEnum{
"RAW": VerifyDataDetailsMessageTypeRaw,
"DIGEST": VerifyDataDetailsMessageTypeDigest,
}
// GetVerifyDataDetailsMessageTypeEnumValues Enumerates the set of values for VerifyDataDetailsMessageTypeEnum
func GetVerifyDataDetailsMessageTypeEnumValues() []VerifyDataDetailsMessageTypeEnum {
values := make([]VerifyDataDetailsMessageTypeEnum, 0)
for _, v := range mappingVerifyDataDetailsMessageType {
values = append(values, v)
}
return values
}
// VerifyDataDetailsSigningAlgorithmEnum Enum with underlying type: string
type VerifyDataDetailsSigningAlgorithmEnum string
// Set of constants representing the allowable values for VerifyDataDetailsSigningAlgorithmEnum
const (
VerifyDataDetailsSigningAlgorithmSha224RsaPkcsPss VerifyDataDetailsSigningAlgorithmEnum = "SHA_224_RSA_PKCS_PSS"
VerifyDataDetailsSigningAlgorithmSha256RsaPkcsPss VerifyDataDetailsSigningAlgorithmEnum = "SHA_256_RSA_PKCS_PSS"
VerifyDataDetailsSigningAlgorithmSha384RsaPkcsPss VerifyDataDetailsSigningAlgorithmEnum = "SHA_384_RSA_PKCS_PSS"
VerifyDataDetailsSigningAlgorithmSha512RsaPkcsPss VerifyDataDetailsSigningAlgorithmEnum = "SHA_512_RSA_PKCS_PSS"
VerifyDataDetailsSigningAlgorithmSha224RsaPkcs1V15 VerifyDataDetailsSigningAlgorithmEnum = "SHA_224_RSA_PKCS1_V1_5"
VerifyDataDetailsSigningAlgorithmSha256RsaPkcs1V15 VerifyDataDetailsSigningAlgorithmEnum = "SHA_256_RSA_PKCS1_V1_5"
VerifyDataDetailsSigningAlgorithmSha384RsaPkcs1V15 VerifyDataDetailsSigningAlgorithmEnum = "SHA_384_RSA_PKCS1_V1_5"
VerifyDataDetailsSigningAlgorithmSha512RsaPkcs1V15 VerifyDataDetailsSigningAlgorithmEnum = "SHA_512_RSA_PKCS1_V1_5"
VerifyDataDetailsSigningAlgorithmEcdsaSha256 VerifyDataDetailsSigningAlgorithmEnum = "ECDSA_SHA_256"
VerifyDataDetailsSigningAlgorithmEcdsaSha384 VerifyDataDetailsSigningAlgorithmEnum = "ECDSA_SHA_384"
VerifyDataDetailsSigningAlgorithmEcdsaSha512 VerifyDataDetailsSigningAlgorithmEnum = "ECDSA_SHA_512"
)
var mappingVerifyDataDetailsSigningAlgorithm = map[string]VerifyDataDetailsSigningAlgorithmEnum{
"SHA_224_RSA_PKCS_PSS": VerifyDataDetailsSigningAlgorithmSha224RsaPkcsPss,
"SHA_256_RSA_PKCS_PSS": VerifyDataDetailsSigningAlgorithmSha256RsaPkcsPss,
"SHA_384_RSA_PKCS_PSS": VerifyDataDetailsSigningAlgorithmSha384RsaPkcsPss,
"SHA_512_RSA_PKCS_PSS": VerifyDataDetailsSigningAlgorithmSha512RsaPkcsPss,
"SHA_224_RSA_PKCS1_V1_5": VerifyDataDetailsSigningAlgorithmSha224RsaPkcs1V15,
"SHA_256_RSA_PKCS1_V1_5": VerifyDataDetailsSigningAlgorithmSha256RsaPkcs1V15,
"SHA_384_RSA_PKCS1_V1_5": VerifyDataDetailsSigningAlgorithmSha384RsaPkcs1V15,
"SHA_512_RSA_PKCS1_V1_5": VerifyDataDetailsSigningAlgorithmSha512RsaPkcs1V15,
"ECDSA_SHA_256": VerifyDataDetailsSigningAlgorithmEcdsaSha256,
"ECDSA_SHA_384": VerifyDataDetailsSigningAlgorithmEcdsaSha384,
"ECDSA_SHA_512": VerifyDataDetailsSigningAlgorithmEcdsaSha512,
}
// GetVerifyDataDetailsSigningAlgorithmEnumValues Enumerates the set of values for VerifyDataDetailsSigningAlgorithmEnum
func GetVerifyDataDetailsSigningAlgorithmEnumValues() []VerifyDataDetailsSigningAlgorithmEnum {
values := make([]VerifyDataDetailsSigningAlgorithmEnum, 0)
for _, v := range mappingVerifyDataDetailsSigningAlgorithm {
values = append(values, v)
}
return values
}