package
0.0.0-20211130232802-bd9b0526fedf
Repository: https://github.com/pkopriv2/golang-sdk.git
Documentation: pkg.go.dev
# Functions
Converts a raw crypto private key into an internal private key.
Converts a raw crypto public key into an internal public key.
Decodes a key in PKCS1 form per https://tools.ietf.org/html/rfc8017.
No description provided by the author
Destroys the object.
Encodes a key in PKCS1 form per https://tools.ietf.org/html/rfc8017.
No description provided by the author
Symmetrically encrypts the message with the given key.
Generates an array of diceware words.
Generates an array of diceware words.
No description provided by the author
Creates a new random nonce of size bytes.
No description provided by the author
No description provided by the author
No description provided by the author
Generates a new salt.
Marshals a private key into a PEM encoded binary block.
No description provided by the author
Returns a pem decoder capable of decrypting an encrypted private key - whose plaintext format is the same as DefaultPemDecoder.
No description provided by the author
Generates a new encrypted key pair.
Parses a base64 encoded string.
Parses a cipher from its standard string format.
Parses the hash algorithm from its standard string format.
No description provided by the author
No description provided by the author
No description provided by the author
Reads a PEM-encoded private key from a generic reader.
Reads a PEM-encoded private key from the filesystem.
Reads a PEM-encoded private key from the filesystem.
Reads a PEM-encoded private key from the filesystem.
Signs the object with the signer and hash.
Parses a binary PEM block into a private key.
Reads the format of a private key from a pem encoded block.
Verifies the object with the signer and hash.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Writes a pem encoded private key onto the filesystem.
Writes a pem encoded private key onto the filesystem.
# Constants
Supported symmetric ciphers.
Supported symmetric ciphers.
Supported symmetric ciphers.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Currently supported hash algorithms.
Currently supported hash algorithms.
Currently supported hash algorithms.
No description provided by the author
No description provided by the author
# Variables
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Rand is is a secure random number generator.
# Structs
A CipherText is a symmetrically encrypted message.
No description provided by the author
A KeyExchange contains the data necessary to exchange a symmetric cipher key via a public/private key pair.
A KeyPair is a PublicKey along with an encrypted PrivateKey.
Basic options for generating a key/pair.
No description provided by the author
Private key implementation.
Public RSA key implementation.
A Salt is a source of randomness that may be used to improve the randomness of hashing functions.
A SaltedCipherText has been encrypted with a key that has had a salt applied to it.
No description provided by the author
A signature is a cryptographically secure structure that may be used to both prove the authenticity of an accompanying document, as well as the identity of the signer.
A SignedKeyPair.
# Interfaces
A Destroyer allows callers to destroy internal state (especially important when handling secure data).
Private keys represent proof of ownership of a public key and form the basis of how authentication, confidentiality and integrity concerns are managed within the ecosystem.
Public keys are the basis of identity within the trust ecosystem.
A a signable object is one that has a consistent format for signing and verifying.
A signer contains the knowledge necessary to digitally sign messages.
# Type aliases
Useful cryptographic binary functions.
Symmetric Cipher Type.
Hash is a convenience type to group all the common hashing functions together.
A KeyType represents a supported public/private key pair algorithm.
No description provided by the author
Standard pem decoder interface.
Standard pem decoder interface.
Various key encoding formats.
No description provided by the author
No description provided by the author