github.com/hashicorp/vault/sdk@v0.11.0/helper/keysutil/managed_key_util.go (about) 1 // Copyright (c) HashiCorp, Inc. 2 // SPDX-License-Identifier: MPL-2.0 3 4 //go:build !enterprise 5 6 package keysutil 7 8 import ( 9 "context" 10 "errors" 11 12 "github.com/hashicorp/vault/sdk/logical" 13 ) 14 15 type ManagedKeyParameters struct { 16 ManagedKeySystemView logical.ManagedKeySystemView 17 BackendUUID string 18 Context context.Context 19 } 20 21 var errEntOnly = errors.New("managed keys are supported within enterprise edition only") 22 23 func (p *Policy) decryptWithManagedKey(params ManagedKeyParameters, keyEntry KeyEntry, ciphertext []byte, nonce []byte, aad []byte) (plaintext []byte, err error) { 24 return nil, errEntOnly 25 } 26 27 func (p *Policy) encryptWithManagedKey(params ManagedKeyParameters, keyEntry KeyEntry, plaintext []byte, nonce []byte, aad []byte) (ciphertext []byte, err error) { 28 return nil, errEntOnly 29 } 30 31 func (p *Policy) signWithManagedKey(options *SigningOptions, keyEntry KeyEntry, input []byte) (sig []byte, err error) { 32 return nil, errEntOnly 33 } 34 35 func (p *Policy) verifyWithManagedKey(options *SigningOptions, keyEntry KeyEntry, input, sig []byte) (verified bool, err error) { 36 return false, errEntOnly 37 } 38 39 func (p *Policy) HMACWithManagedKey(ctx context.Context, ver int, managedKeySystemView logical.ManagedKeySystemView, backendUUID string, algorithm string, data []byte) (hmacBytes []byte, err error) { 40 return nil, errEntOnly 41 } 42 43 func (p *Policy) RotateManagedKey(ctx context.Context, storage logical.Storage, managedKeyUUID string) error { 44 return errEntOnly 45 }