(decrypt encrypted-bytes)decypt ciphertext made using encrypt-sym
decypt ciphertext made using `encrypt-sym`
(decrypt-backup {:keys [encrypted-bytes backup-full-keychain]})Decodes an encrypted ciphertext using the OFFLINE full backup key.
Decodes an encrypted ciphertext using the OFFLINE full backup key.
(encrypt secret-data & {:keys [include-backup?]})Encrypt data using the loaded server keychain.
Note: This data is implicitly recoverable via the backup key because the keychain itself is recoverable.
If include-backup? is truthy, also perform asymmetric encryption
using the backup key. This adds overhead, but guarantees the data
can be decrypted even if BOTH the password AND the server keychain
are lost.
Encrypt data using the loaded server keychain. Note: This data is implicitly recoverable via the backup key because the keychain itself is recoverable. If `include-backup?` is truthy, also perform asymmetric encryption using the backup key. This adds overhead, but guarantees the data can be decrypted even if BOTH the password AND the server keychain are lost.
(init! {:keys [keychain-path read-server-password!!]})Initialize server encryption keys. Should be called on server startup
Initialize server encryption keys. Should be called on server startup
(load-backup-public-key)Loads the baked-in public key from the Uberjar classpath.
Loads the baked-in public key from the Uberjar classpath.
(recover-keychain-file path-to-encrypted-keychain
path-to-offline-backup-keychain
backup-password)Decodes an encrypted keychain file using the OFFLINE full backup key. Returns the usable server keychain.
Decodes an encrypted keychain file using the OFFLINE full backup key. Returns the usable server keychain.
(rotate-server-keys! read-server-password!!)Generates a fresh symmetric key, promotes it to primary, and demotes existing keys. Updates the encrypted file on disk and the running in-memory atom.
Requires the TPM password to re-encrypt the updated keychain file.
Generates a fresh symmetric key, promotes it to primary, and demotes existing keys. Updates the encrypted file on disk and the running in-memory atom. Requires the TPM password to re-encrypt the updated keychain file.
cljdoc builds & hosts documentation for Clojure/Script libraries
| Ctrl+k | Jump to recent docs |
| ← | Move to previous article |
| → | Move to next article |
| Ctrl+/ | Jump to the search field |