aws-sdk-kms 1.103.0 → 1.105.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +154 -64
- data/lib/aws-sdk-kms/client_api.rb +0 -1
- data/lib/aws-sdk-kms/types.rb +60 -30
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +9 -10
- data/sig/types.rbs +11 -12
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6331c0f383f2fd8b5dab1615773be873e0c6ce311a925149fc85395af789c1e4
|
4
|
+
data.tar.gz: 86568fac92b7e542850dc896ce2df41b63d6520560f87b6e0b90dfc004540957
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 2baa1bbe70fc7b7b5d21c1edaf96eb806d8429b5036ccbbeb7ee03f5d1b41b627700d9ce02e57b3bd91d583e972ae4ef67c1ee1c3e4e7e4f6dc7bc4299581fb8
|
7
|
+
data.tar.gz: fa84328e25889582146f85efad204401551d70d76fc7d99bfeacacbef58553dd874872b8cace82443edecb0f35a297fbaed6a99d303548267de71de48c9cfae3
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.105.0 (2025-06-12)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - AWS KMS announces the support of ML-DSA key pairs that creates post-quantum safe digital signatures.
|
8
|
+
|
9
|
+
1.104.0 (2025-06-06)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Remove unpopulated KeyMaterialId from Encrypt Response
|
13
|
+
|
4
14
|
1.103.0 (2025-06-05)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.105.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
@@ -1555,20 +1555,21 @@ module Aws::KMS
|
|
1555
1555
|
# properties after the KMS key is created.
|
1556
1556
|
#
|
1557
1557
|
# Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC)
|
1558
|
-
# key pair, or an SM2 key pair (China Regions only).
|
1559
|
-
# in an asymmetric KMS key never leaves KMS
|
1560
|
-
# can use the GetPublicKey operation to
|
1561
|
-
# can be used outside of KMS. Each KMS
|
1562
|
-
# usage. KMS keys with RSA key pairs can be
|
1563
|
-
# decrypt data or sign and verify messages (but
|
1564
|
-
# with NIST-recommended ECC key pairs can be used
|
1565
|
-
# messages or derive shared secrets (but not both).
|
1566
|
-
# `ECC_SECG_P256K1` can be used only to sign and verify
|
1567
|
-
# keys with
|
1568
|
-
#
|
1569
|
-
#
|
1570
|
-
#
|
1571
|
-
#
|
1558
|
+
# key pair, ML-DSA key pair or an SM2 key pair (China Regions only).
|
1559
|
+
# The private key in an asymmetric KMS key never leaves KMS
|
1560
|
+
# unencrypted. However, you can use the GetPublicKey operation to
|
1561
|
+
# download the public key so it can be used outside of KMS. Each KMS
|
1562
|
+
# key can have only one key usage. KMS keys with RSA key pairs can be
|
1563
|
+
# used to encrypt and decrypt data or sign and verify messages (but
|
1564
|
+
# not both). KMS keys with NIST-recommended ECC key pairs can be used
|
1565
|
+
# to sign and verify messages or derive shared secrets (but not both).
|
1566
|
+
# KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
|
1567
|
+
# messages. KMS keys with ML-DSA key pairs can be used to sign and
|
1568
|
+
# verify messages. KMS keys with SM2 key pairs (China Regions only)
|
1569
|
+
# can be used to either encrypt and decrypt data, sign and verify
|
1570
|
+
# messages, or derive shared secrets (you must choose one key usage
|
1571
|
+
# type). For information about asymmetric KMS keys, see [Asymmetric
|
1572
|
+
# KMS keys][2] in the *Key Management Service Developer Guide*.
|
1572
1573
|
#
|
1573
1574
|
#
|
1574
1575
|
#
|
@@ -1812,7 +1813,10 @@ module Aws::KMS
|
|
1812
1813
|
# * For asymmetric KMS keys with NIST-recommended elliptic curve key
|
1813
1814
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
1814
1815
|
#
|
1815
|
-
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
|
1816
|
+
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
1817
|
+
# `SIGN_VERIFY`.
|
1818
|
+
#
|
1819
|
+
# * For asymmetric KMS keys with ML-DSA key pairs, specify
|
1816
1820
|
# `SIGN_VERIFY`.
|
1817
1821
|
#
|
1818
1822
|
# * For asymmetric KMS keys with SM2 key pairs (China Regions only),
|
@@ -1889,6 +1893,13 @@ module Aws::KMS
|
|
1889
1893
|
# * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
|
1890
1894
|
#
|
1891
1895
|
# ^
|
1896
|
+
# * Asymmetric ML-DSA key pairs (signing and verification)
|
1897
|
+
#
|
1898
|
+
# * `ML_DSA_44`
|
1899
|
+
#
|
1900
|
+
# * `ML_DSA_65`
|
1901
|
+
#
|
1902
|
+
# * `ML_DSA_87`
|
1892
1903
|
# * SM2 key pairs (encryption and decryption -or- signing and
|
1893
1904
|
# verification -or- deriving shared secrets)
|
1894
1905
|
#
|
@@ -2094,6 +2105,7 @@ module Aws::KMS
|
|
2094
2105
|
# aws_account_id: "111122223333",
|
2095
2106
|
# arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
2096
2107
|
# creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
|
2108
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
2097
2109
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
2098
2110
|
# description: "",
|
2099
2111
|
# enabled: true,
|
@@ -2146,8 +2158,7 @@ module Aws::KMS
|
|
2146
2158
|
# @example Example: To create an asymmetric elliptic curve KMS key for signing and verification
|
2147
2159
|
#
|
2148
2160
|
# # This example creates a KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification.
|
2149
|
-
# # The key
|
2150
|
-
# # can't be changed after the key is created.
|
2161
|
+
# # The key spec and key usage can't be changed after the key is created.
|
2151
2162
|
#
|
2152
2163
|
# resp = client.create_key({
|
2153
2164
|
# key_spec: "ECC_NIST_P521", # Describes the type of key material in the KMS key.
|
@@ -2208,6 +2219,38 @@ module Aws::KMS
|
|
2208
2219
|
# }, # Detailed information about the KMS key that this operation creates.
|
2209
2220
|
# }
|
2210
2221
|
#
|
2222
|
+
# @example Example: To create an asymmetric ML-DSA KMS key for signing and verification
|
2223
|
+
#
|
2224
|
+
# # This example creates a module-lattice digital signature algorithm (ML-DSA) key for signing and verification. The
|
2225
|
+
# # key-usage parameter is required even though SIGN_VERIFY is the only valid value for ML-DSA keys.
|
2226
|
+
#
|
2227
|
+
# resp = client.create_key({
|
2228
|
+
# key_spec: "ML_DSA_65", # Describes the type of key material in the KMS key.
|
2229
|
+
# key_usage: "SIGN_VERIFY", # The cryptographic operations for which you can use the KMS key.
|
2230
|
+
# })
|
2231
|
+
#
|
2232
|
+
# resp.to_h outputs the following:
|
2233
|
+
# {
|
2234
|
+
# key_metadata: {
|
2235
|
+
# aws_account_id: "111122223333",
|
2236
|
+
# arn: "arn:aws:kms:us-east-1:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
2237
|
+
# creation_date: Time.parse(1748371316.734),
|
2238
|
+
# customer_master_key_spec: "ML_DSA_65",
|
2239
|
+
# description: "",
|
2240
|
+
# enabled: true,
|
2241
|
+
# key_id: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
2242
|
+
# key_manager: "CUSTOMER",
|
2243
|
+
# key_spec: "ML_DSA_65",
|
2244
|
+
# key_state: "Enabled",
|
2245
|
+
# key_usage: "SIGN_VERIFY",
|
2246
|
+
# multi_region: false,
|
2247
|
+
# origin: "AWS_KMS",
|
2248
|
+
# signing_algorithms: [
|
2249
|
+
# "ML_DSA_SHAKE_256",
|
2250
|
+
# ],
|
2251
|
+
# }, # Detailed information about the KMS key that this operation creates.
|
2252
|
+
# }
|
2253
|
+
#
|
2211
2254
|
# @example Example: To create a multi-Region primary KMS key
|
2212
2255
|
#
|
2213
2256
|
# # This example creates a multi-Region primary symmetric encryption key. Because the default values for all parameters
|
@@ -2223,6 +2266,7 @@ module Aws::KMS
|
|
2223
2266
|
# aws_account_id: "111122223333",
|
2224
2267
|
# arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef12345678990ab",
|
2225
2268
|
# creation_date: Time.parse("2021-09-02T016:15:21-09:00"),
|
2269
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
2226
2270
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
2227
2271
|
# description: "",
|
2228
2272
|
# enabled: true,
|
@@ -2359,7 +2403,7 @@ module Aws::KMS
|
|
2359
2403
|
# description: "DescriptionType",
|
2360
2404
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
|
2361
2405
|
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
2362
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
2406
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
|
2363
2407
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
|
2364
2408
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
2365
2409
|
# bypass_policy_lockout_safety_check: false,
|
@@ -2391,11 +2435,11 @@ module Aws::KMS
|
|
2391
2435
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
2392
2436
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
2393
2437
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
2394
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
2438
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
2395
2439
|
# resp.key_metadata.encryption_algorithms #=> Array
|
2396
2440
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
2397
2441
|
# resp.key_metadata.signing_algorithms #=> Array
|
2398
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
2442
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
2399
2443
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
2400
2444
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
2401
2445
|
# resp.key_metadata.multi_region #=> Boolean
|
@@ -2660,6 +2704,7 @@ module Aws::KMS
|
|
2660
2704
|
# {
|
2661
2705
|
# encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.
|
2662
2706
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.
|
2707
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to decrypt the ciphertext.
|
2663
2708
|
# plaintext: "<binary data>", # The decrypted (plaintext) data.
|
2664
2709
|
# }
|
2665
2710
|
#
|
@@ -2993,6 +3038,7 @@ module Aws::KMS
|
|
2993
3038
|
#
|
2994
3039
|
# resp = client.delete_imported_key_material({
|
2995
3040
|
# key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key whose imported key material you are deleting. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
|
3041
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the deleted key material.
|
2996
3042
|
# })
|
2997
3043
|
#
|
2998
3044
|
# @example Request syntax with placeholder values
|
@@ -3652,6 +3698,7 @@ module Aws::KMS
|
|
3652
3698
|
# aws_account_id: "111122223333",
|
3653
3699
|
# arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
3654
3700
|
# creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
|
3701
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
3655
3702
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
3656
3703
|
# description: "",
|
3657
3704
|
# enabled: true,
|
@@ -3718,6 +3765,7 @@ module Aws::KMS
|
|
3718
3765
|
# aws_account_id: "111122223333",
|
3719
3766
|
# arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
3720
3767
|
# creation_date: Time.parse(1586329200.918),
|
3768
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
3721
3769
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
3722
3770
|
# description: "",
|
3723
3771
|
# enabled: true,
|
@@ -3874,11 +3922,11 @@ module Aws::KMS
|
|
3874
3922
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
3875
3923
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
3876
3924
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
3877
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
3925
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
3878
3926
|
# resp.key_metadata.encryption_algorithms #=> Array
|
3879
3927
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
3880
3928
|
# resp.key_metadata.signing_algorithms #=> Array
|
3881
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
3929
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
3882
3930
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
3883
3931
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
3884
3932
|
# resp.key_metadata.multi_region #=> Boolean
|
@@ -4582,7 +4630,6 @@ module Aws::KMS
|
|
4582
4630
|
# * {Types::EncryptResponse#ciphertext_blob #ciphertext_blob} => String
|
4583
4631
|
# * {Types::EncryptResponse#key_id #key_id} => String
|
4584
4632
|
# * {Types::EncryptResponse#encryption_algorithm #encryption_algorithm} => String
|
4585
|
-
# * {Types::EncryptResponse#key_material_id #key_material_id} => String
|
4586
4633
|
#
|
4587
4634
|
#
|
4588
4635
|
# @example Example: To encrypt data with a symmetric encryption KMS key
|
@@ -4637,7 +4684,6 @@ module Aws::KMS
|
|
4637
4684
|
# resp.ciphertext_blob #=> String
|
4638
4685
|
# resp.key_id #=> String
|
4639
4686
|
# resp.encryption_algorithm #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
4640
|
-
# resp.key_material_id #=> String
|
4641
4687
|
#
|
4642
4688
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Encrypt AWS API Documentation
|
4643
4689
|
#
|
@@ -4903,6 +4949,7 @@ module Aws::KMS
|
|
4903
4949
|
# {
|
4904
4950
|
# ciphertext_blob: "<binary data>", # The encrypted data key.
|
4905
4951
|
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
|
4952
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
|
4906
4953
|
# plaintext: "<binary data>", # The unencrypted (plaintext) data key.
|
4907
4954
|
# }
|
4908
4955
|
#
|
@@ -5120,10 +5167,11 @@ module Aws::KMS
|
|
5120
5167
|
# Determines the type of data key pair that is generated.
|
5121
5168
|
#
|
5122
5169
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
|
5123
|
-
# to encrypt and decrypt or to sign and verify (but not both),
|
5124
|
-
#
|
5125
|
-
#
|
5126
|
-
#
|
5170
|
+
# to encrypt and decrypt or to sign and verify (but not both), the rule
|
5171
|
+
# that permits you to use ECC KMS keys only to sign and verify, and the
|
5172
|
+
# rule that permits you to use ML-DSA key pairs to sign and verify only
|
5173
|
+
# are not effective on data key pairs, which are used outside of KMS.
|
5174
|
+
# The SM2 key spec is only available in China Regions.
|
5127
5175
|
#
|
5128
5176
|
# @option params [Array<String>] :grant_tokens
|
5129
5177
|
# A list of grant tokens.
|
@@ -5205,6 +5253,7 @@ module Aws::KMS
|
|
5205
5253
|
# resp.to_h outputs the following:
|
5206
5254
|
# {
|
5207
5255
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the private key.
|
5256
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
|
5208
5257
|
# key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
|
5209
5258
|
# private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the RSA data key pair.
|
5210
5259
|
# private_key_plaintext: "<binary data>", # The plaintext private key of the RSA data key pair.
|
@@ -5232,6 +5281,7 @@ module Aws::KMS
|
|
5232
5281
|
# {
|
5233
5282
|
# ciphertext_for_recipient: "<binary data>", # The private key of the RSA data key pair encrypted by the public key from the attestation document
|
5234
5283
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.
|
5284
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
|
5235
5285
|
# key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
|
5236
5286
|
# private_key_ciphertext_blob: "<binary data>", # The private key of the RSA data key pair encrypted by the KMS key.
|
5237
5287
|
# private_key_plaintext: "", # This field is null or empty
|
@@ -5398,10 +5448,11 @@ module Aws::KMS
|
|
5398
5448
|
# Determines the type of data key pair that is generated.
|
5399
5449
|
#
|
5400
5450
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
|
5401
|
-
# to encrypt and decrypt or to sign and verify (but not both),
|
5402
|
-
#
|
5403
|
-
#
|
5404
|
-
#
|
5451
|
+
# to encrypt and decrypt or to sign and verify (but not both), the rule
|
5452
|
+
# that permits you to use ECC KMS keys only to sign and verify, and the
|
5453
|
+
# rule that permits you to use ML-DSA key pairs to sign and verify only
|
5454
|
+
# are not effective on data key pairs, which are used outside of KMS.
|
5455
|
+
# The SM2 key spec is only available in China Regions.
|
5405
5456
|
#
|
5406
5457
|
# @option params [Array<String>] :grant_tokens
|
5407
5458
|
# A list of grant tokens.
|
@@ -5449,6 +5500,7 @@ module Aws::KMS
|
|
5449
5500
|
# resp.to_h outputs the following:
|
5450
5501
|
# {
|
5451
5502
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that encrypted the private key in the ECC asymmetric data key pair.
|
5503
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
|
5452
5504
|
# key_pair_spec: "ECC_NIST_P521", # The actual key spec of the ECC asymmetric data key pair.
|
5453
5505
|
# private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the asymmetric ECC data key pair.
|
5454
5506
|
# public_key: "<binary data>", # The public key (plaintext).
|
@@ -5670,6 +5722,7 @@ module Aws::KMS
|
|
5670
5722
|
# {
|
5671
5723
|
# ciphertext_blob: "<binary data>", # The encrypted data key.
|
5672
5724
|
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
|
5725
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
|
5673
5726
|
# }
|
5674
5727
|
#
|
5675
5728
|
# @example Request syntax with placeholder values
|
@@ -6631,12 +6684,12 @@ module Aws::KMS
|
|
6631
6684
|
# resp.key_id #=> String
|
6632
6685
|
# resp.public_key #=> String
|
6633
6686
|
# resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
6634
|
-
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
6687
|
+
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
6635
6688
|
# resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
|
6636
6689
|
# resp.encryption_algorithms #=> Array
|
6637
6690
|
# resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
6638
6691
|
# resp.signing_algorithms #=> Array
|
6639
|
-
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
6692
|
+
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
6640
6693
|
# resp.key_agreement_algorithms #=> Array
|
6641
6694
|
# resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
6642
6695
|
#
|
@@ -6904,6 +6957,12 @@ module Aws::KMS
|
|
6904
6957
|
# key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key to import the key material into. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
|
6905
6958
|
# })
|
6906
6959
|
#
|
6960
|
+
# resp.to_h outputs the following:
|
6961
|
+
# {
|
6962
|
+
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
|
6963
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
|
6964
|
+
# }
|
6965
|
+
#
|
6907
6966
|
# @example Example: To import key material into a KMS key
|
6908
6967
|
#
|
6909
6968
|
# # The following example imports key material that expires in 3 days. It might be part of an application that frequently
|
@@ -6917,6 +6976,12 @@ module Aws::KMS
|
|
6917
6976
|
# valid_to: Time.parse("2023-09-30T00:00:00-00:00"), # Specifies the date and time when the imported key material expires.
|
6918
6977
|
# })
|
6919
6978
|
#
|
6979
|
+
# resp.to_h outputs the following:
|
6980
|
+
# {
|
6981
|
+
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
|
6982
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
|
6983
|
+
# }
|
6984
|
+
#
|
6920
6985
|
# @example Request syntax with placeholder values
|
6921
6986
|
#
|
6922
6987
|
# resp = client.import_key_material({
|
@@ -8399,8 +8464,12 @@ module Aws::KMS
|
|
8399
8464
|
# resp.to_h outputs the following:
|
8400
8465
|
# {
|
8401
8466
|
# ciphertext_blob: "<binary data>", # The reencrypted data.
|
8467
|
+
# destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to reencrypt the data.
|
8468
|
+
# destination_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to reencrypt the data.
|
8402
8469
|
# key_id: "arn:aws:kms:us-east-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321", # The ARN of the KMS key that was used to reencrypt the data.
|
8470
|
+
# source_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext before it was reencrypted.
|
8403
8471
|
# source_key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was originally used to encrypt the data.
|
8472
|
+
# source_key_material_id: "1c6be7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to originally encrypt the data.
|
8404
8473
|
# }
|
8405
8474
|
#
|
8406
8475
|
# @example Request syntax with placeholder values
|
@@ -8792,11 +8861,11 @@ module Aws::KMS
|
|
8792
8861
|
# resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
8793
8862
|
# resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
8794
8863
|
# resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
8795
|
-
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
8864
|
+
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
8796
8865
|
# resp.replica_key_metadata.encryption_algorithms #=> Array
|
8797
8866
|
# resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
8798
8867
|
# resp.replica_key_metadata.signing_algorithms #=> Array
|
8799
|
-
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
8868
|
+
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
8800
8869
|
# resp.replica_key_metadata.key_agreement_algorithms #=> Array
|
8801
8870
|
# resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
8802
8871
|
# resp.replica_key_metadata.multi_region #=> Boolean
|
@@ -9356,11 +9425,11 @@ module Aws::KMS
|
|
9356
9425
|
# Developer Guide*.
|
9357
9426
|
#
|
9358
9427
|
# Digital signatures are generated and verified by using asymmetric key
|
9359
|
-
# pair, such as an RSA or
|
9360
|
-
# KMS key. The key owner (or an authorized user) uses their
|
9361
|
-
# to sign a message. Anyone with the public key can verify
|
9362
|
-
# message was signed with that particular private key and that
|
9363
|
-
# message hasn't changed since it was signed.
|
9428
|
+
# pair, such as an RSA, ECC, or ML-DSA pair that is represented by an
|
9429
|
+
# asymmetric KMS key. The key owner (or an authorized user) uses their
|
9430
|
+
# private key to sign a message. Anyone with the public key can verify
|
9431
|
+
# that the message was signed with that particular private key and that
|
9432
|
+
# the message hasn't changed since it was signed.
|
9364
9433
|
#
|
9365
9434
|
# To use the `Sign` operation, provide the following information:
|
9366
9435
|
#
|
@@ -9373,8 +9442,8 @@ module Aws::KMS
|
|
9373
9442
|
# to sign. You can submit messages of up to 4096 bytes. To sign a
|
9374
9443
|
# larger message, generate a hash digest of the message, and then
|
9375
9444
|
# provide the hash digest in the `Message` parameter. To indicate
|
9376
|
-
# whether the message is a full message
|
9377
|
-
# `MessageType` parameter.
|
9445
|
+
# whether the message is a full message, a digest, or an ML-DSA
|
9446
|
+
# EXTERNAL\_MU, use the `MessageType` parameter.
|
9378
9447
|
#
|
9379
9448
|
# * Choose a signing algorithm that is compatible with the KMS key.
|
9380
9449
|
#
|
@@ -9454,26 +9523,34 @@ module Aws::KMS
|
|
9454
9523
|
# @option params [String] :message_type
|
9455
9524
|
# Tells KMS whether the value of the `Message` parameter should be
|
9456
9525
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
9457
|
-
# messages; use `DIGEST` for message digests, which are already hashed
|
9526
|
+
# messages; use `DIGEST` for message digests, which are already hashed;
|
9527
|
+
# use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
|
9528
|
+
# as defined in NIST FIPS 204 Section 6.2.
|
9458
9529
|
#
|
9459
9530
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
9460
9531
|
# signing algorithm, which begins with a hash function. When the value
|
9461
|
-
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
9532
|
+
# is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
|
9533
|
+
# the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
|
9534
|
+
# public key hash and the message done in the ML-DSA signing algorithm.
|
9462
9535
|
#
|
9463
|
-
# Use the `DIGEST` value only when the value of the
|
9464
|
-
# is a message digest. If you use the `DIGEST` value
|
9465
|
-
# message, the security of the signing operation can be
|
9536
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
9537
|
+
# `Message` parameter is a message digest. If you use the `DIGEST` value
|
9538
|
+
# with an unhashed message, the security of the signing operation can be
|
9539
|
+
# compromised.
|
9466
9540
|
#
|
9467
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
9541
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
9468
9542
|
# `Message` value must match the length of hashed messages for the
|
9469
9543
|
# specified signing algorithm.
|
9470
9544
|
#
|
9545
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
9546
|
+
# `Message` value must be 64 bytes.
|
9547
|
+
#
|
9471
9548
|
# You can submit a message digest and omit the `MessageType` or specify
|
9472
9549
|
# `RAW` so the digest is hashed again while signing. However, this can
|
9473
9550
|
# cause verification failures when verifying with a system that assumes
|
9474
9551
|
# a single hash.
|
9475
9552
|
#
|
9476
|
-
# The hashing algorithm
|
9553
|
+
# The hashing algorithm that `Sign` uses is based on the
|
9477
9554
|
# `SigningAlgorithm` value.
|
9478
9555
|
#
|
9479
9556
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -9485,6 +9562,9 @@ module Aws::KMS
|
|
9485
9562
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
9486
9563
|
# algorithm.
|
9487
9564
|
#
|
9565
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
|
9566
|
+
# algorithm.
|
9567
|
+
#
|
9488
9568
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
9489
9569
|
# verification with SM2 key pairs][1].
|
9490
9570
|
#
|
@@ -9575,9 +9655,9 @@ module Aws::KMS
|
|
9575
9655
|
# resp = client.sign({
|
9576
9656
|
# key_id: "KeyIdType", # required
|
9577
9657
|
# message: "data", # required
|
9578
|
-
# message_type: "RAW", # accepts RAW, DIGEST
|
9658
|
+
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
9579
9659
|
# grant_tokens: ["GrantTokenType"],
|
9580
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
|
9660
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
9581
9661
|
# dry_run: false,
|
9582
9662
|
# })
|
9583
9663
|
#
|
@@ -9585,7 +9665,7 @@ module Aws::KMS
|
|
9585
9665
|
#
|
9586
9666
|
# resp.key_id #=> String
|
9587
9667
|
# resp.signature #=> String
|
9588
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
9668
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
9589
9669
|
#
|
9590
9670
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
|
9591
9671
|
#
|
@@ -10629,27 +10709,34 @@ module Aws::KMS
|
|
10629
10709
|
# @option params [String] :message_type
|
10630
10710
|
# Tells KMS whether the value of the `Message` parameter should be
|
10631
10711
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
10632
|
-
# messages; use `DIGEST` for message digests, which are already hashed
|
10712
|
+
# messages; use `DIGEST` for message digests, which are already hashed;
|
10713
|
+
# use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
|
10714
|
+
# as defined in NIST FIPS 204 Section 6.2.
|
10633
10715
|
#
|
10634
10716
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
10635
10717
|
# signing algorithm, which begins with a hash function. When the value
|
10636
|
-
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
10718
|
+
# is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
|
10719
|
+
# the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
|
10720
|
+
# public key hash and the message done in the ML-DSA signing algorithm.
|
10637
10721
|
#
|
10638
|
-
# Use the `DIGEST` value only when the value of the
|
10639
|
-
# is a message digest. If you use the `DIGEST` value
|
10640
|
-
# message, the security of the
|
10722
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
10723
|
+
# `Message` parameter is a message digest. If you use the `DIGEST` value
|
10724
|
+
# with an unhashed message, the security of the signing operation can be
|
10641
10725
|
# compromised.
|
10642
10726
|
#
|
10643
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
10727
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
10644
10728
|
# `Message` value must match the length of hashed messages for the
|
10645
10729
|
# specified signing algorithm.
|
10646
10730
|
#
|
10731
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
10732
|
+
# `Message` value must be 64 bytes.
|
10733
|
+
#
|
10647
10734
|
# You can submit a message digest and omit the `MessageType` or specify
|
10648
10735
|
# `RAW` so the digest is hashed again while signing. However, if the
|
10649
10736
|
# signed message is hashed once while signing, but twice while
|
10650
10737
|
# verifying, verification fails, even when the message hasn't changed.
|
10651
10738
|
#
|
10652
|
-
# The hashing algorithm
|
10739
|
+
# The hashing algorithm that `Verify` uses is based on the
|
10653
10740
|
# `SigningAlgorithm` value.
|
10654
10741
|
#
|
10655
10742
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -10661,6 +10748,9 @@ module Aws::KMS
|
|
10661
10748
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
10662
10749
|
# algorithm.
|
10663
10750
|
#
|
10751
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
|
10752
|
+
# algorithm.
|
10753
|
+
#
|
10664
10754
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
10665
10755
|
# verification with SM2 key pairs][1].
|
10666
10756
|
#
|
@@ -10752,9 +10842,9 @@ module Aws::KMS
|
|
10752
10842
|
# resp = client.verify({
|
10753
10843
|
# key_id: "KeyIdType", # required
|
10754
10844
|
# message: "data", # required
|
10755
|
-
# message_type: "RAW", # accepts RAW, DIGEST
|
10845
|
+
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
10756
10846
|
# signature: "data", # required
|
10757
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
|
10847
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
10758
10848
|
# grant_tokens: ["GrantTokenType"],
|
10759
10849
|
# dry_run: false,
|
10760
10850
|
# })
|
@@ -10763,7 +10853,7 @@ module Aws::KMS
|
|
10763
10853
|
#
|
10764
10854
|
# resp.key_id #=> String
|
10765
10855
|
# resp.signature_valid #=> Boolean
|
10766
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
10856
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
10767
10857
|
#
|
10768
10858
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
|
10769
10859
|
#
|
@@ -10932,7 +11022,7 @@ module Aws::KMS
|
|
10932
11022
|
tracer: tracer
|
10933
11023
|
)
|
10934
11024
|
context[:gem_name] = 'aws-sdk-kms'
|
10935
|
-
context[:gem_version] = '1.
|
11025
|
+
context[:gem_version] = '1.105.0'
|
10936
11026
|
Seahorse::Client::Request.new(handlers, context)
|
10937
11027
|
end
|
10938
11028
|
|
@@ -473,7 +473,6 @@ module Aws::KMS
|
|
473
473
|
EncryptResponse.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
|
474
474
|
EncryptResponse.add_member(:key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "KeyId"))
|
475
475
|
EncryptResponse.add_member(:encryption_algorithm, Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec, location_name: "EncryptionAlgorithm"))
|
476
|
-
EncryptResponse.add_member(:key_material_id, Shapes::ShapeRef.new(shape: BackingKeyIdType, location_name: "KeyMaterialId"))
|
477
476
|
EncryptResponse.struct_class = Types::EncryptResponse
|
478
477
|
|
479
478
|
EncryptionAlgorithmSpecList.member = Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec)
|
data/lib/aws-sdk-kms/types.rb
CHANGED
@@ -863,7 +863,10 @@ module Aws::KMS
|
|
863
863
|
# * For asymmetric KMS keys with NIST-recommended elliptic curve key
|
864
864
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
865
865
|
#
|
866
|
-
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
|
866
|
+
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
867
|
+
# `SIGN_VERIFY`.
|
868
|
+
#
|
869
|
+
# * For asymmetric KMS keys with ML-DSA key pairs, specify
|
867
870
|
# `SIGN_VERIFY`.
|
868
871
|
#
|
869
872
|
# * For asymmetric KMS keys with SM2 key pairs (China Regions only),
|
@@ -945,6 +948,13 @@ module Aws::KMS
|
|
945
948
|
# cryptocurrencies.
|
946
949
|
#
|
947
950
|
# ^
|
951
|
+
# * Asymmetric ML-DSA key pairs (signing and verification)
|
952
|
+
#
|
953
|
+
# * `ML_DSA_44`
|
954
|
+
#
|
955
|
+
# * `ML_DSA_65`
|
956
|
+
#
|
957
|
+
# * `ML_DSA_87`
|
948
958
|
# * SM2 key pairs (encryption and decryption -or- signing and
|
949
959
|
# verification -or- deriving shared secrets)
|
950
960
|
#
|
@@ -1703,7 +1713,8 @@ module Aws::KMS
|
|
1703
1713
|
# @!attribute [rw] key_material_id
|
1704
1714
|
# The identifier of the key material used to decrypt the ciphertext.
|
1705
1715
|
# This field is present only when the operation uses a symmetric
|
1706
|
-
# encryption KMS key.
|
1716
|
+
# encryption KMS key. This field is omitted if the request includes
|
1717
|
+
# the `Recipient` parameter.
|
1707
1718
|
# @return [String]
|
1708
1719
|
#
|
1709
1720
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/DecryptResponse AWS API Documentation
|
@@ -2457,19 +2468,12 @@ module Aws::KMS
|
|
2457
2468
|
# The encryption algorithm that was used to encrypt the plaintext.
|
2458
2469
|
# @return [String]
|
2459
2470
|
#
|
2460
|
-
# @!attribute [rw] key_material_id
|
2461
|
-
# The identifier of the key material used to encrypt the ciphertext.
|
2462
|
-
# This field is present only when the operation uses a symmetric
|
2463
|
-
# encryption KMS key.
|
2464
|
-
# @return [String]
|
2465
|
-
#
|
2466
2471
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/EncryptResponse AWS API Documentation
|
2467
2472
|
#
|
2468
2473
|
class EncryptResponse < Struct.new(
|
2469
2474
|
:ciphertext_blob,
|
2470
2475
|
:key_id,
|
2471
|
-
:encryption_algorithm
|
2472
|
-
:key_material_id)
|
2476
|
+
:encryption_algorithm)
|
2473
2477
|
SENSITIVE = []
|
2474
2478
|
include Aws::Structure
|
2475
2479
|
end
|
@@ -2546,9 +2550,11 @@ module Aws::KMS
|
|
2546
2550
|
#
|
2547
2551
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
|
2548
2552
|
# keys to encrypt and decrypt or to sign and verify (but not both),
|
2549
|
-
#
|
2550
|
-
# verify,
|
2551
|
-
#
|
2553
|
+
# the rule that permits you to use ECC KMS keys only to sign and
|
2554
|
+
# verify, and the rule that permits you to use ML-DSA key pairs to
|
2555
|
+
# sign and verify only are not effective on data key pairs, which are
|
2556
|
+
# used outside of KMS. The SM2 key spec is only available in China
|
2557
|
+
# Regions.
|
2552
2558
|
# @return [String]
|
2553
2559
|
#
|
2554
2560
|
# @!attribute [rw] grant_tokens
|
@@ -2749,9 +2755,11 @@ module Aws::KMS
|
|
2749
2755
|
#
|
2750
2756
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
|
2751
2757
|
# keys to encrypt and decrypt or to sign and verify (but not both),
|
2752
|
-
#
|
2753
|
-
# verify,
|
2754
|
-
#
|
2758
|
+
# the rule that permits you to use ECC KMS keys only to sign and
|
2759
|
+
# verify, and the rule that permits you to use ML-DSA key pairs to
|
2760
|
+
# sign and verify only are not effective on data key pairs, which are
|
2761
|
+
# used outside of KMS. The SM2 key spec is only available in China
|
2762
|
+
# Regions.
|
2755
2763
|
# @return [String]
|
2756
2764
|
#
|
2757
2765
|
# @!attribute [rw] grant_tokens
|
@@ -3017,6 +3025,8 @@ module Aws::KMS
|
|
3017
3025
|
#
|
3018
3026
|
# @!attribute [rw] key_material_id
|
3019
3027
|
# The identifier of the key material used to encrypt the data key.
|
3028
|
+
# This field is omitted if the request includes the `Recipient`
|
3029
|
+
# parameter.
|
3020
3030
|
# @return [String]
|
3021
3031
|
#
|
3022
3032
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyResponse AWS API Documentation
|
@@ -6135,27 +6145,34 @@ module Aws::KMS
|
|
6135
6145
|
# Tells KMS whether the value of the `Message` parameter should be
|
6136
6146
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
6137
6147
|
# messages; use `DIGEST` for message digests, which are already
|
6138
|
-
# hashed
|
6148
|
+
# hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
|
6149
|
+
# ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
|
6139
6150
|
#
|
6140
6151
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
6141
6152
|
# signing algorithm, which begins with a hash function. When the value
|
6142
6153
|
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
6154
|
+
# When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
|
6155
|
+
# of the public key hash and the message done in the ML-DSA signing
|
6156
|
+
# algorithm.
|
6143
6157
|
#
|
6144
|
-
# Use the `DIGEST` value only when the value of the
|
6145
|
-
# parameter is a message digest. If you use the `DIGEST`
|
6146
|
-
# unhashed message, the security of the signing
|
6147
|
-
# compromised.
|
6158
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
6159
|
+
# `Message` parameter is a message digest. If you use the `DIGEST`
|
6160
|
+
# value with an unhashed message, the security of the signing
|
6161
|
+
# operation can be compromised.
|
6148
6162
|
#
|
6149
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
6163
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
6150
6164
|
# `Message` value must match the length of hashed messages for the
|
6151
6165
|
# specified signing algorithm.
|
6152
6166
|
#
|
6167
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
6168
|
+
# `Message` value must be 64 bytes.
|
6169
|
+
#
|
6153
6170
|
# You can submit a message digest and omit the `MessageType` or
|
6154
6171
|
# specify `RAW` so the digest is hashed again while signing. However,
|
6155
6172
|
# this can cause verification failures when verifying with a system
|
6156
6173
|
# that assumes a single hash.
|
6157
6174
|
#
|
6158
|
-
# The hashing algorithm
|
6175
|
+
# The hashing algorithm that `Sign` uses is based on the
|
6159
6176
|
# `SigningAlgorithm` value.
|
6160
6177
|
#
|
6161
6178
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -6167,6 +6184,9 @@ module Aws::KMS
|
|
6167
6184
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
6168
6185
|
# algorithm.
|
6169
6186
|
#
|
6187
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
|
6188
|
+
# hashing algorithm.
|
6189
|
+
#
|
6170
6190
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
6171
6191
|
# verification with SM2 key pairs][1].
|
6172
6192
|
#
|
@@ -6808,28 +6828,35 @@ module Aws::KMS
|
|
6808
6828
|
# Tells KMS whether the value of the `Message` parameter should be
|
6809
6829
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
6810
6830
|
# messages; use `DIGEST` for message digests, which are already
|
6811
|
-
# hashed
|
6831
|
+
# hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
|
6832
|
+
# ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
|
6812
6833
|
#
|
6813
6834
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
6814
6835
|
# signing algorithm, which begins with a hash function. When the value
|
6815
6836
|
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
6837
|
+
# When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
|
6838
|
+
# of the public key hash and the message done in the ML-DSA signing
|
6839
|
+
# algorithm.
|
6816
6840
|
#
|
6817
|
-
# Use the `DIGEST` value only when the value of the
|
6818
|
-
# parameter is a message digest. If you use the `DIGEST`
|
6819
|
-
# unhashed message, the security of the
|
6820
|
-
# compromised.
|
6841
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
6842
|
+
# `Message` parameter is a message digest. If you use the `DIGEST`
|
6843
|
+
# value with an unhashed message, the security of the signing
|
6844
|
+
# operation can be compromised.
|
6821
6845
|
#
|
6822
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
6846
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
6823
6847
|
# `Message` value must match the length of hashed messages for the
|
6824
6848
|
# specified signing algorithm.
|
6825
6849
|
#
|
6850
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
6851
|
+
# `Message` value must be 64 bytes.
|
6852
|
+
#
|
6826
6853
|
# You can submit a message digest and omit the `MessageType` or
|
6827
6854
|
# specify `RAW` so the digest is hashed again while signing. However,
|
6828
6855
|
# if the signed message is hashed once while signing, but twice while
|
6829
6856
|
# verifying, verification fails, even when the message hasn't
|
6830
6857
|
# changed.
|
6831
6858
|
#
|
6832
|
-
# The hashing algorithm
|
6859
|
+
# The hashing algorithm that `Verify` uses is based on the
|
6833
6860
|
# `SigningAlgorithm` value.
|
6834
6861
|
#
|
6835
6862
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -6841,6 +6868,9 @@ module Aws::KMS
|
|
6841
6868
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
6842
6869
|
# algorithm.
|
6843
6870
|
#
|
6871
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
|
6872
|
+
# hashing algorithm.
|
6873
|
+
#
|
6844
6874
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
6845
6875
|
# verification with SM2 key pairs][1].
|
6846
6876
|
#
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -157,7 +157,7 @@ module Aws
|
|
157
157
|
?description: ::String,
|
158
158
|
?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
|
159
159
|
?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
160
|
-
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
160
|
+
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
|
161
161
|
?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
|
162
162
|
?custom_key_store_id: ::String,
|
163
163
|
?bypass_policy_lockout_safety_check: bool,
|
@@ -309,7 +309,6 @@ module Aws
|
|
309
309
|
def ciphertext_blob: () -> ::String
|
310
310
|
def key_id: () -> ::String
|
311
311
|
def encryption_algorithm: () -> ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
|
312
|
-
def key_material_id: () -> ::String
|
313
312
|
end
|
314
313
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#encrypt-instance_method
|
315
314
|
def encrypt: (
|
@@ -482,10 +481,10 @@ module Aws
|
|
482
481
|
def key_id: () -> ::String
|
483
482
|
def public_key: () -> ::String
|
484
483
|
def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
485
|
-
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
484
|
+
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
486
485
|
def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
487
486
|
def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
488
|
-
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
|
487
|
+
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
489
488
|
def key_agreement_algorithms: () -> ::Array[("ECDH")]
|
490
489
|
end
|
491
490
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
|
@@ -713,15 +712,15 @@ module Aws
|
|
713
712
|
include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
|
714
713
|
def key_id: () -> ::String
|
715
714
|
def signature: () -> ::String
|
716
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
715
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
717
716
|
end
|
718
717
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
|
719
718
|
def sign: (
|
720
719
|
key_id: ::String,
|
721
720
|
message: ::String,
|
722
|
-
?message_type: ("RAW" | "DIGEST"),
|
721
|
+
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
723
722
|
?grant_tokens: Array[::String],
|
724
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
|
723
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
725
724
|
?dry_run: bool
|
726
725
|
) -> _SignResponseSuccess
|
727
726
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
|
@@ -790,15 +789,15 @@ module Aws
|
|
790
789
|
include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
|
791
790
|
def key_id: () -> ::String
|
792
791
|
def signature_valid: () -> bool
|
793
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
792
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
794
793
|
end
|
795
794
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
|
796
795
|
def verify: (
|
797
796
|
key_id: ::String,
|
798
797
|
message: ::String,
|
799
|
-
?message_type: ("RAW" | "DIGEST"),
|
798
|
+
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
800
799
|
signature: ::String,
|
801
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
|
800
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
802
801
|
?grant_tokens: Array[::String],
|
803
802
|
?dry_run: bool
|
804
803
|
) -> _VerifyResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -118,7 +118,7 @@ module Aws::KMS
|
|
118
118
|
attr_accessor description: ::String
|
119
119
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
120
120
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
121
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
121
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
122
122
|
attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
|
123
123
|
attr_accessor custom_key_store_id: ::String
|
124
124
|
attr_accessor bypass_policy_lockout_safety_check: bool
|
@@ -314,7 +314,6 @@ module Aws::KMS
|
|
314
314
|
attr_accessor ciphertext_blob: ::String
|
315
315
|
attr_accessor key_id: ::String
|
316
316
|
attr_accessor encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
|
317
|
-
attr_accessor key_material_id: ::String
|
318
317
|
SENSITIVE: []
|
319
318
|
end
|
320
319
|
|
@@ -479,10 +478,10 @@ module Aws::KMS
|
|
479
478
|
attr_accessor key_id: ::String
|
480
479
|
attr_accessor public_key: ::String
|
481
480
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
482
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
481
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
483
482
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
484
483
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
485
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
|
484
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
486
485
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
487
486
|
SENSITIVE: []
|
488
487
|
end
|
@@ -622,9 +621,9 @@ module Aws::KMS
|
|
622
621
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
623
622
|
attr_accessor key_manager: ("AWS" | "CUSTOMER")
|
624
623
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
625
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
624
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
626
625
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
627
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
|
626
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
628
627
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
629
628
|
attr_accessor multi_region: bool
|
630
629
|
attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
|
@@ -871,9 +870,9 @@ module Aws::KMS
|
|
871
870
|
class SignRequest
|
872
871
|
attr_accessor key_id: ::String
|
873
872
|
attr_accessor message: ::String
|
874
|
-
attr_accessor message_type: ("RAW" | "DIGEST")
|
873
|
+
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
875
874
|
attr_accessor grant_tokens: ::Array[::String]
|
876
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
875
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
877
876
|
attr_accessor dry_run: bool
|
878
877
|
SENSITIVE: [:message]
|
879
878
|
end
|
@@ -881,7 +880,7 @@ module Aws::KMS
|
|
881
880
|
class SignResponse
|
882
881
|
attr_accessor key_id: ::String
|
883
882
|
attr_accessor signature: ::String
|
884
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
883
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
885
884
|
SENSITIVE: []
|
886
885
|
end
|
887
886
|
|
@@ -967,9 +966,9 @@ module Aws::KMS
|
|
967
966
|
class VerifyRequest
|
968
967
|
attr_accessor key_id: ::String
|
969
968
|
attr_accessor message: ::String
|
970
|
-
attr_accessor message_type: ("RAW" | "DIGEST")
|
969
|
+
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
971
970
|
attr_accessor signature: ::String
|
972
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
971
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
973
972
|
attr_accessor grant_tokens: ::Array[::String]
|
974
973
|
attr_accessor dry_run: bool
|
975
974
|
SENSITIVE: [:message]
|
@@ -978,7 +977,7 @@ module Aws::KMS
|
|
978
977
|
class VerifyResponse
|
979
978
|
attr_accessor key_id: ::String
|
980
979
|
attr_accessor signature_valid: bool
|
981
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
980
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
982
981
|
SENSITIVE: []
|
983
982
|
end
|
984
983
|
|