Skip to content

Commit 2acfce2

Browse files
authored
fix transit key types in docs (#1174)
1 parent 430c2c9 commit 2acfce2

File tree

3 files changed

+6
-2
lines changed

3 files changed

+6
-2
lines changed

content/vault/v1.20.x/content/docs/secrets/transit/index.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,7 @@ types also generate separate HMAC keys):
9393
- `aes256-cmac`: CMAC with a 256-bit AES key; supporting CMAC generation and verification. <EnterpriseAlert inline="true" />
9494
- `ml-dsa` - ML-DSA; supports signing and signature verification (experimental) <EnterpriseAlert inline="true" />
9595
- `hybrid` - combination of two signature algorithms; supports signing and signature verification (experimental) <EnterpriseAlert inline="true" />
96+
- `slh-dsa` - SLH-DSA (asymmetric) (experimental) <EnterpriseAlert inline="true" />
9697

9798
~> **Note**: In FIPS 140-3 mode, the following algorithms are not certified
9899
and thus should not be used: `chacha20-poly1305` and `ed25519`.

content/vault/v1.21.x/content/api-docs/secret/transit.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,8 +71,8 @@ values set here cannot be changed after key creation.
7171
- `ml-dsa` - ML-DSA (asymmetric) (experimental) <EnterpriseAlert inline="true" />
7272
- `hybrid` - hybrid signatures combining a post-quantum algorithm and an elliptic curve algorithm (asymmetric) (experimental) <EnterpriseAlert inline="true" />
7373
- `slh-dsa` - SLH-DSA (asymmetric) (experimental) <EnterpriseAlert inline="true" />
74-
- `aes128-cbc` - AES-128 in CBC mode (symmetric, supports derivation and convergent encryption)
75-
- `aes256-cbc` - AES-256 in CBC mode (symmetric, supports derivation and convergent encryption)
74+
- `aes128-cbc` - AES-128 in CBC mode (symmetric, supports derivation and convergent encryption) <EnterpriseAlert inline="true" />
75+
- `aes256-cbc` - AES-256 in CBC mode (symmetric, supports derivation and convergent encryption) <EnterpriseAlert inline="true" />
7676

7777
~> **Note**: In FIPS 140-3 mode, the following algorithms are not certified
7878
and thus should not be used: `chacha20-poly1305`.

content/vault/v1.21.x/content/docs/secrets/transit/index.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,9 @@ types also generate separate HMAC keys):
9393
- `aes256-cmac`: CMAC with a 256-bit AES key; supporting CMAC generation and verification. <EnterpriseAlert inline="true" />
9494
- `ml-dsa` - ML-DSA; supports signing and signature verification (experimental) <EnterpriseAlert inline="true" />
9595
- `hybrid` - combination of two signature algorithms; supports signing and signature verification (experimental) <EnterpriseAlert inline="true" />
96+
- `slh-dsa` - SLH-DSA (asymmetric) (experimental) <EnterpriseAlert inline="true" />
97+
- `aes128-cbc` - AES-128 in CBC mode (symmetric, supports derivation and convergent encryption) <EnterpriseAlert inline="true" />
98+
- `aes256-cbc` - AES-256 in CBC mode (symmetric, supports derivation and convergent encryption) <EnterpriseAlert inline="true" />
9699

97100
~> **Note**: In FIPS 140-3 mode, the following algorithms are not certified
98101
and thus should not be used: `chacha20-poly1305` and `ed25519`.

0 commit comments

Comments
 (0)