@@ -48,8 +48,8 @@ func ExampleNewRestAPIClientWithHttp() {
48
48
}
49
49
50
50
// Generate an 256 bits AES key
51
- func ExampleRestAPIClient_CreateImportServiceKey_generateAES () {
52
- var kmsClient * okms.RestAPIClient // Initialize client
51
+ func ExampleClient_CreateImportServiceKey_generateAES () {
52
+ var kmsClient * okms.Client // Initialize client
53
53
kType := types .Oct
54
54
kSize := types .N256
55
55
ops := []types.CryptographicUsages {types .Encrypt , types .Decrypt , types .WrapKey , types .UnwrapKey }
@@ -67,13 +67,13 @@ func ExampleRestAPIClient_CreateImportServiceKey_generateAES() {
67
67
}
68
68
69
69
// Generate a 2048 bits RSA key pair
70
- func ExampleRestAPIClient_CreateImportServiceKey_generateRSA () {
71
- var kmsClient * okms.RestAPIClient // Initialize client
70
+ func ExampleClient_CreateImportServiceKey_generateRSA () {
71
+ var kmsClient * okms.Client // Initialize client
72
72
kType := types .RSA
73
73
kSize := types .N2048
74
74
ops := []types.CryptographicUsages {types .Sign , types .Verify }
75
75
// Create a new RSA 2048 key-pair
76
- respAes , err := kmsClient .CreateImportServiceKey (context .Background (), nil , types.CreateImportServiceKeyRequest {
76
+ respRSA , err := kmsClient .CreateImportServiceKey (context .Background (), nil , types.CreateImportServiceKeyRequest {
77
77
Name : "RSA key-pair example" ,
78
78
Type : & kType ,
79
79
Size : & kSize ,
@@ -82,17 +82,17 @@ func ExampleRestAPIClient_CreateImportServiceKey_generateRSA() {
82
82
if err != nil {
83
83
panic (err )
84
84
}
85
- fmt .Println ("RSA KEY:" , respAes .Id )
85
+ fmt .Println ("RSA KEY:" , respRSA .Id )
86
86
}
87
87
88
88
// Generate an ECDSA key pair on the P-256 curve
89
- func ExampleRestAPIClient_CreateImportServiceKey_generateECDSA () {
90
- var kmsClient * okms.RestAPIClient // Initialize client
89
+ func ExampleClient_CreateImportServiceKey_generateECDSA () {
90
+ var kmsClient * okms.Client // Initialize client
91
91
kType := types .EC
92
92
curve := types .P256
93
93
ops := []types.CryptographicUsages {types .Sign , types .Verify }
94
94
// Create a new ECDSA P-256 key-pair
95
- respAes , err := kmsClient .CreateImportServiceKey (context .Background (), nil , types.CreateImportServiceKeyRequest {
95
+ respEC , err := kmsClient .CreateImportServiceKey (context .Background (), nil , types.CreateImportServiceKeyRequest {
96
96
Name : "ECDSA key-pair example" ,
97
97
Type : & kType ,
98
98
Curve : & curve ,
@@ -101,23 +101,23 @@ func ExampleRestAPIClient_CreateImportServiceKey_generateECDSA() {
101
101
if err != nil {
102
102
panic (err )
103
103
}
104
- fmt .Println ("ECDSA KEY:" , respAes .Id )
104
+ fmt .Println ("ECDSA KEY:" , respEC .Id )
105
105
}
106
106
107
- func ExampleRestAPIClient_Sign () {
108
- var kmsClient * okms.RestAPIClient // Initialize client
109
- data := "Hello World !!!" // Data to sign
107
+ func ExampleClient_Sign () {
108
+ var kmsClient * okms.Client // Initialize client
109
+ data := "Hello World !!!" // Data to sign
110
110
signResponse , err := kmsClient .Sign (context .Background (), uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ), types .ES256 , false , []byte (data ))
111
111
if err != nil {
112
112
panic (err )
113
113
}
114
114
fmt .Println ("Signature:" , signResponse )
115
115
}
116
116
117
- func ExampleRestAPIClient_Verify () {
118
- var kmsClient * okms.RestAPIClient // Initialize client
119
- var signature string // Base64 encoded signature
120
- data := "Hello World !!!" // Data to sign
117
+ func ExampleClient_Verify () {
118
+ var kmsClient * okms.Client // Initialize client
119
+ var signature string // Base64 encoded signature
120
+ data := "Hello World !!!" // Data to sign
121
121
result , err := kmsClient .Verify (context .Background (), uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ), types .ES256 , false , []byte (data ), signature )
122
122
if err != nil {
123
123
panic (err )
@@ -126,10 +126,10 @@ func ExampleRestAPIClient_Verify() {
126
126
}
127
127
128
128
func ExampleDataKeyProvider_helpers () {
129
- var kmsClient * okms.RestAPIClient // Initialize client
129
+ var kmsClient * okms.Client // Initialize client
130
130
131
131
data := "Hello World !!!" // Data to encrypt
132
- dkProvider := okms . NewDataKeyProvider ( kmsClient , uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ))
132
+ dkProvider := kmsClient . DataKeys ( uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ))
133
133
134
134
// Unless you want to use another algorithm than AES-GCM 256 bits, you can use the 2 following helper methods:
135
135
encryptedData , encryptedKey , nonce , err := dkProvider .EncryptGCM (context .Background (), "Example DK" , []byte (data ), []byte ("Some additional data" ))
@@ -145,9 +145,9 @@ func ExampleDataKeyProvider_helpers() {
145
145
}
146
146
147
147
func ExampleDataKeyProvider_GenerateDataKey () {
148
- var kmsClient * okms.RestAPIClient // Initialize client
149
- data := "Hello World !!!" // Data to encrypt
150
- dkProvider := okms . NewDataKeyProvider ( kmsClient , uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ))
148
+ var kmsClient * okms.Client // Initialize client
149
+ data := "Hello World !!!" // Data to encrypt
150
+ dkProvider := kmsClient . DataKeys ( uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ))
151
151
152
152
// Generate a new datakey
153
153
plain , encrypted , err := dkProvider .GenerateDataKey (context .Background (), "Example DK" , 256 )
@@ -178,11 +178,11 @@ func ExampleDataKeyProvider_GenerateDataKey() {
178
178
}
179
179
180
180
func ExampleDataKeyProvider_DecryptDataKey () {
181
- var kmsClient * okms.RestAPIClient // Initialize client
182
- var encryptedData []byte // Some encrypted data
183
- var encryptedKey []byte // Encrypted datakey
184
- var nonce []byte // Nonce used for data encryption
185
- dkProvider := okms . NewDataKeyProvider ( kmsClient , uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ))
181
+ var kmsClient * okms.Client // Initialize client
182
+ var encryptedData []byte // Some encrypted data
183
+ var encryptedKey []byte // Encrypted datakey
184
+ var nonce []byte // Nonce used for data encryption
185
+ dkProvider := kmsClient . DataKeys ( uuid .MustParse ("2dab95dc-d7d3-482b-a07b-6b4dfae89d58" ))
186
186
187
187
// Decrypt data key
188
188
plain , err := dkProvider .DecryptDataKey (context .Background (), encryptedKey )
0 commit comments