Documentation
¶
Index ¶
- Constants
- func NewKeyStore(kvs idriver.Keystore) crypto.KeyStore
- type AuditInfo
- type AuditInfoDeserializer
- type AuditInfoMatcher
- type AuditMatcherDeserializer
- type IdentityDeserializer
- type KeyManager
- func (p *KeyManager) Anonymous() bool
- func (p *KeyManager) DeserializeSigner(raw []byte) (driver.Signer, error)
- func (p *KeyManager) DeserializeVerifier(raw []byte) (driver.Verifier, error)
- func (p *KeyManager) EnrollmentID() string
- func (p *KeyManager) Identity(context.Context, []byte) (driver.Identity, []byte, error)
- func (p *KeyManager) IdentityType() identity.Type
- func (p *KeyManager) Info(raw []byte, auditInfo []byte) (string, error)
- func (p *KeyManager) IsRemote() bool
- func (p *KeyManager) SigningIdentity() driver.SigningIdentity
- func (p *KeyManager) String() string
- type KeyManagerProvider
- type SignerService
Constants ¶
View Source
const ( KeystoreFullFolder = "keystoreFull" PrivateKeyFileName = "priv_sk" KeystoreFolder = "keystore" ExtraPathElement = "msp" )
View Source
const (
IdentityType identity.Type = "x509"
)
Variables ¶
This section is empty.
Functions ¶
Types ¶
type AuditInfoDeserializer ¶
type AuditInfoDeserializer struct{}
func (*AuditInfoDeserializer) DeserializeAuditInfo ¶
func (a *AuditInfoDeserializer) DeserializeAuditInfo(raw []byte) (driver2.AuditInfo, error)
type AuditInfoMatcher ¶
type AuditInfoMatcher struct {
EnrollmentID string
}
func (*AuditInfoMatcher) Match ¶
func (a *AuditInfoMatcher) Match(id []byte) error
type AuditMatcherDeserializer ¶
type AuditMatcherDeserializer struct{}
func (*AuditMatcherDeserializer) GetAuditInfoMatcher ¶
type IdentityDeserializer ¶
type IdentityDeserializer struct{}
IdentityDeserializer takes an identity and returns an ECDSA verifier
func (*IdentityDeserializer) DeserializeVerifier ¶
type KeyManager ¶
type KeyManager struct {
// contains filtered or unexported fields
}
func NewKeyManager ¶
func NewKeyManager( path string, signerService SignerService, bccspConfig *crypto.BCCSP, keyStore crypto.KeyStore, ) (*KeyManager, *crypto.Config, error)
NewKeyManager returns a new X509 provider with the passed BCCSP configuration. If the configuration path contains the secret key, then the provider can generate also signatures, otherwise it cannot.
func NewKeyManagerFromConf ¶
func (*KeyManager) Anonymous ¶
func (p *KeyManager) Anonymous() bool
func (*KeyManager) DeserializeSigner ¶
func (p *KeyManager) DeserializeSigner(raw []byte) (driver.Signer, error)
func (*KeyManager) DeserializeVerifier ¶
func (p *KeyManager) DeserializeVerifier(raw []byte) (driver.Verifier, error)
func (*KeyManager) EnrollmentID ¶
func (p *KeyManager) EnrollmentID() string
func (*KeyManager) IdentityType ¶
func (p *KeyManager) IdentityType() identity.Type
func (*KeyManager) IsRemote ¶
func (p *KeyManager) IsRemote() bool
func (*KeyManager) SigningIdentity ¶
func (p *KeyManager) SigningIdentity() driver.SigningIdentity
func (*KeyManager) String ¶
func (p *KeyManager) String() string
type KeyManagerProvider ¶
type KeyManagerProvider struct {
// contains filtered or unexported fields
}
func NewKeyManagerProvider ¶
func NewKeyManagerProvider(config idriver.Config, signerService idriver.SigService, keyStore crypto.KeyStore, ignoreVerifyOnlyWallet bool) *KeyManagerProvider
func (*KeyManagerProvider) Get ¶
func (k *KeyManagerProvider) Get(idConfig *driver.IdentityConfiguration) (membership.KeyManager, error)
Click to show internal directories.
Click to hide internal directories.