github.com/hashicorp/vault/sdk@v0.11.0/helper/keysutil/managed_key_util.go (about)

     1  // Copyright (c) HashiCorp, Inc.
     2  // SPDX-License-Identifier: MPL-2.0
     3  
     4  //go:build !enterprise
     5  
     6  package keysutil
     7  
     8  import (
     9  	"context"
    10  	"errors"
    11  
    12  	"github.com/hashicorp/vault/sdk/logical"
    13  )
    14  
    15  type ManagedKeyParameters struct {
    16  	ManagedKeySystemView logical.ManagedKeySystemView
    17  	BackendUUID          string
    18  	Context              context.Context
    19  }
    20  
    21  var errEntOnly = errors.New("managed keys are supported within enterprise edition only")
    22  
    23  func (p *Policy) decryptWithManagedKey(params ManagedKeyParameters, keyEntry KeyEntry, ciphertext []byte, nonce []byte, aad []byte) (plaintext []byte, err error) {
    24  	return nil, errEntOnly
    25  }
    26  
    27  func (p *Policy) encryptWithManagedKey(params ManagedKeyParameters, keyEntry KeyEntry, plaintext []byte, nonce []byte, aad []byte) (ciphertext []byte, err error) {
    28  	return nil, errEntOnly
    29  }
    30  
    31  func (p *Policy) signWithManagedKey(options *SigningOptions, keyEntry KeyEntry, input []byte) (sig []byte, err error) {
    32  	return nil, errEntOnly
    33  }
    34  
    35  func (p *Policy) verifyWithManagedKey(options *SigningOptions, keyEntry KeyEntry, input, sig []byte) (verified bool, err error) {
    36  	return false, errEntOnly
    37  }
    38  
    39  func (p *Policy) HMACWithManagedKey(ctx context.Context, ver int, managedKeySystemView logical.ManagedKeySystemView, backendUUID string, algorithm string, data []byte) (hmacBytes []byte, err error) {
    40  	return nil, errEntOnly
    41  }
    42  
    43  func (p *Policy) RotateManagedKey(ctx context.Context, storage logical.Storage, managedKeyUUID string) error {
    44  	return errEntOnly
    45  }