+do-backs\r
Integrity protected container, analogue to ASN.1-based CMS DigestedData.
=> https://datatracker.ietf.org/doc/html/rfc5652 CMS\r
"/a" tells what algorithms will be used to hash the data.
"/t" tells the type of the data inside.
"/hash" contains the hash values for all corresponding "/a" algorithms.
-
-do-backs\r
+do-backs\r
Private key container.
<< [schemas/av.tcl]\r
Stored in a file, it should begin with "cm/prv" [encoding/MAGIC].
-
-do-backs\r
+do-backs\r
Public key is the [cm/signed/] structure.
Stored in a file, it should begin with "cm/pub" [encoding/MAGIC].
}}
}}
}
-
-do-backs\r
+do-backs\r
Signed container, some kind of analogue to ASN.1-based CMS SignedData.
=> https://datatracker.ietf.org/doc/html/rfc5652 CMS\r
If signed data is also intended to be [cm/encrypted/], then
"/sigs/*/tbs/encrypted-to" should be set to corresponding recipient's
public key fingerprint(s).
-
-do-backs\r