Versions in this module Expand all Collapse all v0 v0.6.4 Dec 16, 2016 v0.6.3 Dec 6, 2016 Changes in this version + const ErrTooOld + const Kdf_hkdf_sha256 + const Kdf_hmac_sha256_counter + const KeyType_AES256_GCM96 + const KeyType_ECDSA_P256 + type KeyEntry struct + AESKey []byte + CreationTime int64 + EC_D *big.Int + EC_X *big.Int + EC_Y *big.Int + FormattedPublicKey string + HMACKey []byte + type KeyType int + func (kt KeyType) DecryptionSupported() bool + func (kt KeyType) DerivationSupported() bool + func (kt KeyType) EncryptionSupported() bool + func (kt KeyType) SigningSupported() bool + func (kt KeyType) String() string + type LockManager struct + func NewLockManager(cacheDisabled bool) *LockManager + func (lm *LockManager) CacheActive() bool + func (lm *LockManager) DeletePolicy(storage logical.Storage, name string) error + func (lm *LockManager) GetPolicyExclusive(storage logical.Storage, name string) (*Policy, *sync.RWMutex, error) + func (lm *LockManager) GetPolicyShared(storage logical.Storage, name string) (*Policy, *sync.RWMutex, error) + func (lm *LockManager) GetPolicyUpsert(req PolicyRequest) (*Policy, *sync.RWMutex, bool, error) + func (lm *LockManager) UnlockPolicy(lock *sync.RWMutex, lockType bool) + type Policy struct + ArchiveVersion int + ConvergentEncryption bool + ConvergentVersion int + DeletionAllowed bool + Derived bool + KDF int + Key []byte + Keys keyEntryMap + LatestVersion int + MinDecryptionVersion int + Name string + Type KeyType + func (p *Policy) Decrypt(context, nonce []byte, value string) (string, error) + func (p *Policy) DeriveKey(context []byte, ver int) ([]byte, error) + func (p *Policy) Encrypt(context, nonce []byte, value string) (string, error) + func (p *Policy) HMACKey(version int) ([]byte, error) + func (p *Policy) LoadArchive(storage logical.Storage) (*archivedKeys, error) + func (p *Policy) MigrateKeyToKeysMap() + func (p *Policy) NeedsUpgrade() bool + func (p *Policy) Persist(storage logical.Storage) error + func (p *Policy) Rotate(storage logical.Storage) error + func (p *Policy) Serialize() ([]byte, error) + func (p *Policy) Sign(hashedInput []byte) (string, error) + func (p *Policy) Upgrade(storage logical.Storage) error + func (p *Policy) VerifySignature(hashedInput []byte, sig string) (bool, error) + type PolicyRequest struct + Convergent bool + Derived bool + KeyType KeyType + Name string + Storage logical.Storage + Upsert bool