summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorStuart Stock <stuart@int08h.com>2019-08-11 18:06:43 -0500
committerStuart Stock <stuart@int08h.com>2019-08-11 18:06:43 -0500
commitb7b89a52058b4d2f86cd9e59cd39aeae04113342 (patch)
tree76f83651841af8ecd2c3c2dc405f42a7a08e1126 /src
parent6ff01af5253d667818f47c86a32ecbacd4a1ac4f (diff)
downloadroughenough-b7b89a52058b4d2f86cd9e59cd39aeae04113342.zip
Update module docs when KMS feature is disabled
Diffstat (limited to 'src')
-rw-r--r--src/kms/mod.rs12
1 files changed, 1 insertions, 11 deletions
diff --git a/src/kms/mod.rs b/src/kms/mod.rs
index 6cd3773..96d732c 100644
--- a/src/kms/mod.rs
+++ b/src/kms/mod.rs
@@ -202,17 +202,7 @@ pub fn load_seed(config: &Box<ServerConfig>) -> Result<Vec<u8>, error::Error> {
/// The only supported `kms_protection` value in this build is `plaintext`. Any
/// other value will cause a runtime error.
///
-/// ## Background
-///
-/// Loading behavior depends on the value of `config.kms_protection()`:
-///
-/// * If `config.kms_protection() == Plaintext` then the value returned from `config.seed()`
-/// is used as-is and assumed to be a 32-byte hexadecimal value.
-///
-/// * Otherwise `config.seed()` is assumed to be an encrypted opaque blob generated from
-/// a prior `EnvelopeEncryption::encrypt_seed` call. The value of `config.kms_protection()`
-/// is parsed as a KMS key id and `EnvelopeEncryption::decrypt_seed` is called to obtain
-/// the plaintext seed value.
+/// * `config.seed()` is used as-is and assumed to be a 32-byte hexadecimal value
///
#[cfg(not(any(feature = "awskms", feature = "gcpkms")))]
pub fn load_seed(config: &Box<ServerConfig>) -> Result<Vec<u8>, error::Error> {