aws-sdk-kms 1.103.0 → 1.105.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 229aaad60e5f6baf55a4f3d2aab7a5423fec7645afb6a4614f983f77ea6a20fa
4
- data.tar.gz: 85e63690b08a5ecc2f1670a922b5f83240dda980d1914586c1bc2912b55b6604
3
+ metadata.gz: 6331c0f383f2fd8b5dab1615773be873e0c6ce311a925149fc85395af789c1e4
4
+ data.tar.gz: 86568fac92b7e542850dc896ce2df41b63d6520560f87b6e0b90dfc004540957
5
5
  SHA512:
6
- metadata.gz: 6838464aaa5690cd56e97ed47421e94e2601e3d01c5e1814ecc810c85633f114dfa0331f7ecf205106ee540046a6a677ffeebbcbc3dd72600057cd4f938cb52a
7
- data.tar.gz: ec060b617a644f72d4301645fab8cf00602832816d6ed71ef79a3916f9ea02382402ab3c0d63007ef9b1e1fa7545b06f860f4104d0c177db55e70741b06f42c8
6
+ metadata.gz: 2baa1bbe70fc7b7b5d21c1edaf96eb806d8429b5036ccbbeb7ee03f5d1b41b627700d9ce02e57b3bd91d583e972ae4ef67c1ee1c3e4e7e4f6dc7bc4299581fb8
7
+ data.tar.gz: fa84328e25889582146f85efad204401551d70d76fc7d99bfeacacbef58553dd874872b8cace82443edecb0f35a297fbaed6a99d303548267de71de48c9cfae3
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.105.0 (2025-06-12)
5
+ ------------------
6
+
7
+ * Feature - AWS KMS announces the support of ML-DSA key pairs that creates post-quantum safe digital signatures.
8
+
9
+ 1.104.0 (2025-06-06)
10
+ ------------------
11
+
12
+ * Feature - Remove unpopulated KeyMaterialId from Encrypt Response
13
+
4
14
  1.103.0 (2025-06-05)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.103.0
1
+ 1.105.0
@@ -1555,20 +1555,21 @@ module Aws::KMS
1555
1555
  # properties after the KMS key is created.
1556
1556
  #
1557
1557
  # Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC)
1558
- # key pair, or an SM2 key pair (China Regions only). The private key
1559
- # in an asymmetric KMS key never leaves KMS unencrypted. However, you
1560
- # can use the GetPublicKey operation to download the public key so it
1561
- # can be used outside of KMS. Each KMS key can have only one key
1562
- # usage. KMS keys with RSA key pairs can be used to encrypt and
1563
- # decrypt data or sign and verify messages (but not both). KMS keys
1564
- # with NIST-recommended ECC key pairs can be used to sign and verify
1565
- # messages or derive shared secrets (but not both). KMS keys with
1566
- # `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS
1567
- # keys with SM2 key pairs (China Regions only) can be used to either
1568
- # encrypt and decrypt data, sign and verify messages, or derive shared
1569
- # secrets (you must choose one key usage type). For information about
1570
- # asymmetric KMS keys, see [Asymmetric KMS keys][2] in the *Key
1571
- # Management Service Developer Guide*.
1558
+ # key pair, ML-DSA key pair or an SM2 key pair (China Regions only).
1559
+ # The private key in an asymmetric KMS key never leaves KMS
1560
+ # unencrypted. However, you can use the GetPublicKey operation to
1561
+ # download the public key so it can be used outside of KMS. Each KMS
1562
+ # key can have only one key usage. KMS keys with RSA key pairs can be
1563
+ # used to encrypt and decrypt data or sign and verify messages (but
1564
+ # not both). KMS keys with NIST-recommended ECC key pairs can be used
1565
+ # to sign and verify messages or derive shared secrets (but not both).
1566
+ # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1567
+ # messages. KMS keys with ML-DSA key pairs can be used to sign and
1568
+ # verify messages. KMS keys with SM2 key pairs (China Regions only)
1569
+ # can be used to either encrypt and decrypt data, sign and verify
1570
+ # messages, or derive shared secrets (you must choose one key usage
1571
+ # type). For information about asymmetric KMS keys, see [Asymmetric
1572
+ # KMS keys][2] in the *Key Management Service Developer Guide*.
1572
1573
  #
1573
1574
  #
1574
1575
  #
@@ -1812,7 +1813,10 @@ module Aws::KMS
1812
1813
  # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1813
1814
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1814
1815
  #
1815
- # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
1816
+ # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1817
+ # `SIGN_VERIFY`.
1818
+ #
1819
+ # * For asymmetric KMS keys with ML-DSA key pairs, specify
1816
1820
  # `SIGN_VERIFY`.
1817
1821
  #
1818
1822
  # * For asymmetric KMS keys with SM2 key pairs (China Regions only),
@@ -1889,6 +1893,13 @@ module Aws::KMS
1889
1893
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
1890
1894
  #
1891
1895
  # ^
1896
+ # * Asymmetric ML-DSA key pairs (signing and verification)
1897
+ #
1898
+ # * `ML_DSA_44`
1899
+ #
1900
+ # * `ML_DSA_65`
1901
+ #
1902
+ # * `ML_DSA_87`
1892
1903
  # * SM2 key pairs (encryption and decryption -or- signing and
1893
1904
  # verification -or- deriving shared secrets)
1894
1905
  #
@@ -2094,6 +2105,7 @@ module Aws::KMS
2094
2105
  # aws_account_id: "111122223333",
2095
2106
  # arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
2096
2107
  # creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
2108
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
2097
2109
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
2098
2110
  # description: "",
2099
2111
  # enabled: true,
@@ -2146,8 +2158,7 @@ module Aws::KMS
2146
2158
  # @example Example: To create an asymmetric elliptic curve KMS key for signing and verification
2147
2159
  #
2148
2160
  # # This example creates a KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification.
2149
- # # The key usage is required even though "SIGN_VERIFY" is the only valid value for ECC KMS keys. The key spec and key usage
2150
- # # can't be changed after the key is created.
2161
+ # # The key spec and key usage can't be changed after the key is created.
2151
2162
  #
2152
2163
  # resp = client.create_key({
2153
2164
  # key_spec: "ECC_NIST_P521", # Describes the type of key material in the KMS key.
@@ -2208,6 +2219,38 @@ module Aws::KMS
2208
2219
  # }, # Detailed information about the KMS key that this operation creates.
2209
2220
  # }
2210
2221
  #
2222
+ # @example Example: To create an asymmetric ML-DSA KMS key for signing and verification
2223
+ #
2224
+ # # This example creates a module-lattice digital signature algorithm (ML-DSA) key for signing and verification. The
2225
+ # # key-usage parameter is required even though SIGN_VERIFY is the only valid value for ML-DSA keys.
2226
+ #
2227
+ # resp = client.create_key({
2228
+ # key_spec: "ML_DSA_65", # Describes the type of key material in the KMS key.
2229
+ # key_usage: "SIGN_VERIFY", # The cryptographic operations for which you can use the KMS key.
2230
+ # })
2231
+ #
2232
+ # resp.to_h outputs the following:
2233
+ # {
2234
+ # key_metadata: {
2235
+ # aws_account_id: "111122223333",
2236
+ # arn: "arn:aws:kms:us-east-1:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
2237
+ # creation_date: Time.parse(1748371316.734),
2238
+ # customer_master_key_spec: "ML_DSA_65",
2239
+ # description: "",
2240
+ # enabled: true,
2241
+ # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab",
2242
+ # key_manager: "CUSTOMER",
2243
+ # key_spec: "ML_DSA_65",
2244
+ # key_state: "Enabled",
2245
+ # key_usage: "SIGN_VERIFY",
2246
+ # multi_region: false,
2247
+ # origin: "AWS_KMS",
2248
+ # signing_algorithms: [
2249
+ # "ML_DSA_SHAKE_256",
2250
+ # ],
2251
+ # }, # Detailed information about the KMS key that this operation creates.
2252
+ # }
2253
+ #
2211
2254
  # @example Example: To create a multi-Region primary KMS key
2212
2255
  #
2213
2256
  # # This example creates a multi-Region primary symmetric encryption key. Because the default values for all parameters
@@ -2223,6 +2266,7 @@ module Aws::KMS
2223
2266
  # aws_account_id: "111122223333",
2224
2267
  # arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef12345678990ab",
2225
2268
  # creation_date: Time.parse("2021-09-02T016:15:21-09:00"),
2269
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
2226
2270
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
2227
2271
  # description: "",
2228
2272
  # enabled: true,
@@ -2359,7 +2403,7 @@ module Aws::KMS
2359
2403
  # description: "DescriptionType",
2360
2404
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2361
2405
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2362
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2406
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2363
2407
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2364
2408
  # custom_key_store_id: "CustomKeyStoreIdType",
2365
2409
  # bypass_policy_lockout_safety_check: false,
@@ -2391,11 +2435,11 @@ module Aws::KMS
2391
2435
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2392
2436
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2393
2437
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2394
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2438
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2395
2439
  # resp.key_metadata.encryption_algorithms #=> Array
2396
2440
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2397
2441
  # resp.key_metadata.signing_algorithms #=> Array
2398
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
2442
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2399
2443
  # resp.key_metadata.key_agreement_algorithms #=> Array
2400
2444
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2401
2445
  # resp.key_metadata.multi_region #=> Boolean
@@ -2660,6 +2704,7 @@ module Aws::KMS
2660
2704
  # {
2661
2705
  # encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.
2662
2706
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.
2707
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to decrypt the ciphertext.
2663
2708
  # plaintext: "<binary data>", # The decrypted (plaintext) data.
2664
2709
  # }
2665
2710
  #
@@ -2993,6 +3038,7 @@ module Aws::KMS
2993
3038
  #
2994
3039
  # resp = client.delete_imported_key_material({
2995
3040
  # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key whose imported key material you are deleting. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
3041
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the deleted key material.
2996
3042
  # })
2997
3043
  #
2998
3044
  # @example Request syntax with placeholder values
@@ -3652,6 +3698,7 @@ module Aws::KMS
3652
3698
  # aws_account_id: "111122223333",
3653
3699
  # arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
3654
3700
  # creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
3701
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
3655
3702
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
3656
3703
  # description: "",
3657
3704
  # enabled: true,
@@ -3718,6 +3765,7 @@ module Aws::KMS
3718
3765
  # aws_account_id: "111122223333",
3719
3766
  # arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
3720
3767
  # creation_date: Time.parse(1586329200.918),
3768
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
3721
3769
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
3722
3770
  # description: "",
3723
3771
  # enabled: true,
@@ -3874,11 +3922,11 @@ module Aws::KMS
3874
3922
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3875
3923
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3876
3924
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3877
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3925
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3878
3926
  # resp.key_metadata.encryption_algorithms #=> Array
3879
3927
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3880
3928
  # resp.key_metadata.signing_algorithms #=> Array
3881
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
3929
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
3882
3930
  # resp.key_metadata.key_agreement_algorithms #=> Array
3883
3931
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3884
3932
  # resp.key_metadata.multi_region #=> Boolean
@@ -4582,7 +4630,6 @@ module Aws::KMS
4582
4630
  # * {Types::EncryptResponse#ciphertext_blob #ciphertext_blob} => String
4583
4631
  # * {Types::EncryptResponse#key_id #key_id} => String
4584
4632
  # * {Types::EncryptResponse#encryption_algorithm #encryption_algorithm} => String
4585
- # * {Types::EncryptResponse#key_material_id #key_material_id} => String
4586
4633
  #
4587
4634
  #
4588
4635
  # @example Example: To encrypt data with a symmetric encryption KMS key
@@ -4637,7 +4684,6 @@ module Aws::KMS
4637
4684
  # resp.ciphertext_blob #=> String
4638
4685
  # resp.key_id #=> String
4639
4686
  # resp.encryption_algorithm #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
4640
- # resp.key_material_id #=> String
4641
4687
  #
4642
4688
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Encrypt AWS API Documentation
4643
4689
  #
@@ -4903,6 +4949,7 @@ module Aws::KMS
4903
4949
  # {
4904
4950
  # ciphertext_blob: "<binary data>", # The encrypted data key.
4905
4951
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
4952
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
4906
4953
  # plaintext: "<binary data>", # The unencrypted (plaintext) data key.
4907
4954
  # }
4908
4955
  #
@@ -5120,10 +5167,11 @@ module Aws::KMS
5120
5167
  # Determines the type of data key pair that is generated.
5121
5168
  #
5122
5169
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
5123
- # to encrypt and decrypt or to sign and verify (but not both), and the
5124
- # rule that permits you to use ECC KMS keys only to sign and verify, are
5125
- # not effective on data key pairs, which are used outside of KMS. The
5126
- # SM2 key spec is only available in China Regions.
5170
+ # to encrypt and decrypt or to sign and verify (but not both), the rule
5171
+ # that permits you to use ECC KMS keys only to sign and verify, and the
5172
+ # rule that permits you to use ML-DSA key pairs to sign and verify only
5173
+ # are not effective on data key pairs, which are used outside of KMS.
5174
+ # The SM2 key spec is only available in China Regions.
5127
5175
  #
5128
5176
  # @option params [Array<String>] :grant_tokens
5129
5177
  # A list of grant tokens.
@@ -5205,6 +5253,7 @@ module Aws::KMS
5205
5253
  # resp.to_h outputs the following:
5206
5254
  # {
5207
5255
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the private key.
5256
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5208
5257
  # key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
5209
5258
  # private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the RSA data key pair.
5210
5259
  # private_key_plaintext: "<binary data>", # The plaintext private key of the RSA data key pair.
@@ -5232,6 +5281,7 @@ module Aws::KMS
5232
5281
  # {
5233
5282
  # ciphertext_for_recipient: "<binary data>", # The private key of the RSA data key pair encrypted by the public key from the attestation document
5234
5283
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.
5284
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5235
5285
  # key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
5236
5286
  # private_key_ciphertext_blob: "<binary data>", # The private key of the RSA data key pair encrypted by the KMS key.
5237
5287
  # private_key_plaintext: "", # This field is null or empty
@@ -5398,10 +5448,11 @@ module Aws::KMS
5398
5448
  # Determines the type of data key pair that is generated.
5399
5449
  #
5400
5450
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
5401
- # to encrypt and decrypt or to sign and verify (but not both), and the
5402
- # rule that permits you to use ECC KMS keys only to sign and verify, are
5403
- # not effective on data key pairs, which are used outside of KMS. The
5404
- # SM2 key spec is only available in China Regions.
5451
+ # to encrypt and decrypt or to sign and verify (but not both), the rule
5452
+ # that permits you to use ECC KMS keys only to sign and verify, and the
5453
+ # rule that permits you to use ML-DSA key pairs to sign and verify only
5454
+ # are not effective on data key pairs, which are used outside of KMS.
5455
+ # The SM2 key spec is only available in China Regions.
5405
5456
  #
5406
5457
  # @option params [Array<String>] :grant_tokens
5407
5458
  # A list of grant tokens.
@@ -5449,6 +5500,7 @@ module Aws::KMS
5449
5500
  # resp.to_h outputs the following:
5450
5501
  # {
5451
5502
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that encrypted the private key in the ECC asymmetric data key pair.
5503
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5452
5504
  # key_pair_spec: "ECC_NIST_P521", # The actual key spec of the ECC asymmetric data key pair.
5453
5505
  # private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the asymmetric ECC data key pair.
5454
5506
  # public_key: "<binary data>", # The public key (plaintext).
@@ -5670,6 +5722,7 @@ module Aws::KMS
5670
5722
  # {
5671
5723
  # ciphertext_blob: "<binary data>", # The encrypted data key.
5672
5724
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
5725
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
5673
5726
  # }
5674
5727
  #
5675
5728
  # @example Request syntax with placeholder values
@@ -6631,12 +6684,12 @@ module Aws::KMS
6631
6684
  # resp.key_id #=> String
6632
6685
  # resp.public_key #=> String
6633
6686
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6634
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6687
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6635
6688
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6636
6689
  # resp.encryption_algorithms #=> Array
6637
6690
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6638
6691
  # resp.signing_algorithms #=> Array
6639
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
6692
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6640
6693
  # resp.key_agreement_algorithms #=> Array
6641
6694
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6642
6695
  #
@@ -6904,6 +6957,12 @@ module Aws::KMS
6904
6957
  # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key to import the key material into. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
6905
6958
  # })
6906
6959
  #
6960
+ # resp.to_h outputs the following:
6961
+ # {
6962
+ # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
6963
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
6964
+ # }
6965
+ #
6907
6966
  # @example Example: To import key material into a KMS key
6908
6967
  #
6909
6968
  # # The following example imports key material that expires in 3 days. It might be part of an application that frequently
@@ -6917,6 +6976,12 @@ module Aws::KMS
6917
6976
  # valid_to: Time.parse("2023-09-30T00:00:00-00:00"), # Specifies the date and time when the imported key material expires.
6918
6977
  # })
6919
6978
  #
6979
+ # resp.to_h outputs the following:
6980
+ # {
6981
+ # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
6982
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
6983
+ # }
6984
+ #
6920
6985
  # @example Request syntax with placeholder values
6921
6986
  #
6922
6987
  # resp = client.import_key_material({
@@ -8399,8 +8464,12 @@ module Aws::KMS
8399
8464
  # resp.to_h outputs the following:
8400
8465
  # {
8401
8466
  # ciphertext_blob: "<binary data>", # The reencrypted data.
8467
+ # destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to reencrypt the data.
8468
+ # destination_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to reencrypt the data.
8402
8469
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321", # The ARN of the KMS key that was used to reencrypt the data.
8470
+ # source_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext before it was reencrypted.
8403
8471
  # source_key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was originally used to encrypt the data.
8472
+ # source_key_material_id: "1c6be7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to originally encrypt the data.
8404
8473
  # }
8405
8474
  #
8406
8475
  # @example Request syntax with placeholder values
@@ -8792,11 +8861,11 @@ module Aws::KMS
8792
8861
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8793
8862
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8794
8863
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8795
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8864
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8796
8865
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8797
8866
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8798
8867
  # resp.replica_key_metadata.signing_algorithms #=> Array
8799
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
8868
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8800
8869
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8801
8870
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8802
8871
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9356,11 +9425,11 @@ module Aws::KMS
9356
9425
  # Developer Guide*.
9357
9426
  #
9358
9427
  # Digital signatures are generated and verified by using asymmetric key
9359
- # pair, such as an RSA or ECC pair that is represented by an asymmetric
9360
- # KMS key. The key owner (or an authorized user) uses their private key
9361
- # to sign a message. Anyone with the public key can verify that the
9362
- # message was signed with that particular private key and that the
9363
- # message hasn't changed since it was signed.
9428
+ # pair, such as an RSA, ECC, or ML-DSA pair that is represented by an
9429
+ # asymmetric KMS key. The key owner (or an authorized user) uses their
9430
+ # private key to sign a message. Anyone with the public key can verify
9431
+ # that the message was signed with that particular private key and that
9432
+ # the message hasn't changed since it was signed.
9364
9433
  #
9365
9434
  # To use the `Sign` operation, provide the following information:
9366
9435
  #
@@ -9373,8 +9442,8 @@ module Aws::KMS
9373
9442
  # to sign. You can submit messages of up to 4096 bytes. To sign a
9374
9443
  # larger message, generate a hash digest of the message, and then
9375
9444
  # provide the hash digest in the `Message` parameter. To indicate
9376
- # whether the message is a full message or a digest, use the
9377
- # `MessageType` parameter.
9445
+ # whether the message is a full message, a digest, or an ML-DSA
9446
+ # EXTERNAL\_MU, use the `MessageType` parameter.
9378
9447
  #
9379
9448
  # * Choose a signing algorithm that is compatible with the KMS key.
9380
9449
  #
@@ -9454,26 +9523,34 @@ module Aws::KMS
9454
9523
  # @option params [String] :message_type
9455
9524
  # Tells KMS whether the value of the `Message` parameter should be
9456
9525
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
9457
- # messages; use `DIGEST` for message digests, which are already hashed.
9526
+ # messages; use `DIGEST` for message digests, which are already hashed;
9527
+ # use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
9528
+ # as defined in NIST FIPS 204 Section 6.2.
9458
9529
  #
9459
9530
  # When the value of `MessageType` is `RAW`, KMS uses the standard
9460
9531
  # signing algorithm, which begins with a hash function. When the value
9461
- # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
9532
+ # is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
9533
+ # the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
9534
+ # public key hash and the message done in the ML-DSA signing algorithm.
9462
9535
  #
9463
- # Use the `DIGEST` value only when the value of the `Message` parameter
9464
- # is a message digest. If you use the `DIGEST` value with an unhashed
9465
- # message, the security of the signing operation can be compromised.
9536
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
9537
+ # `Message` parameter is a message digest. If you use the `DIGEST` value
9538
+ # with an unhashed message, the security of the signing operation can be
9539
+ # compromised.
9466
9540
  #
9467
- # When the value of `MessageType`is `DIGEST`, the length of the
9541
+ # When the value of `MessageType` is `DIGEST`, the length of the
9468
9542
  # `Message` value must match the length of hashed messages for the
9469
9543
  # specified signing algorithm.
9470
9544
  #
9545
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
9546
+ # `Message` value must be 64 bytes.
9547
+ #
9471
9548
  # You can submit a message digest and omit the `MessageType` or specify
9472
9549
  # `RAW` so the digest is hashed again while signing. However, this can
9473
9550
  # cause verification failures when verifying with a system that assumes
9474
9551
  # a single hash.
9475
9552
  #
9476
- # The hashing algorithm in that `Sign` uses is based on the
9553
+ # The hashing algorithm that `Sign` uses is based on the
9477
9554
  # `SigningAlgorithm` value.
9478
9555
  #
9479
9556
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -9485,6 +9562,9 @@ module Aws::KMS
9485
9562
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
9486
9563
  # algorithm.
9487
9564
  #
9565
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
9566
+ # algorithm.
9567
+ #
9488
9568
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
9489
9569
  # verification with SM2 key pairs][1].
9490
9570
  #
@@ -9575,9 +9655,9 @@ module Aws::KMS
9575
9655
  # resp = client.sign({
9576
9656
  # key_id: "KeyIdType", # required
9577
9657
  # message: "data", # required
9578
- # message_type: "RAW", # accepts RAW, DIGEST
9658
+ # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9579
9659
  # grant_tokens: ["GrantTokenType"],
9580
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
9660
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9581
9661
  # dry_run: false,
9582
9662
  # })
9583
9663
  #
@@ -9585,7 +9665,7 @@ module Aws::KMS
9585
9665
  #
9586
9666
  # resp.key_id #=> String
9587
9667
  # resp.signature #=> String
9588
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
9668
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9589
9669
  #
9590
9670
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9591
9671
  #
@@ -10629,27 +10709,34 @@ module Aws::KMS
10629
10709
  # @option params [String] :message_type
10630
10710
  # Tells KMS whether the value of the `Message` parameter should be
10631
10711
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
10632
- # messages; use `DIGEST` for message digests, which are already hashed.
10712
+ # messages; use `DIGEST` for message digests, which are already hashed;
10713
+ # use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
10714
+ # as defined in NIST FIPS 204 Section 6.2.
10633
10715
  #
10634
10716
  # When the value of `MessageType` is `RAW`, KMS uses the standard
10635
10717
  # signing algorithm, which begins with a hash function. When the value
10636
- # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
10718
+ # is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
10719
+ # the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
10720
+ # public key hash and the message done in the ML-DSA signing algorithm.
10637
10721
  #
10638
- # Use the `DIGEST` value only when the value of the `Message` parameter
10639
- # is a message digest. If you use the `DIGEST` value with an unhashed
10640
- # message, the security of the verification operation can be
10722
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
10723
+ # `Message` parameter is a message digest. If you use the `DIGEST` value
10724
+ # with an unhashed message, the security of the signing operation can be
10641
10725
  # compromised.
10642
10726
  #
10643
- # When the value of `MessageType`is `DIGEST`, the length of the
10727
+ # When the value of `MessageType` is `DIGEST`, the length of the
10644
10728
  # `Message` value must match the length of hashed messages for the
10645
10729
  # specified signing algorithm.
10646
10730
  #
10731
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
10732
+ # `Message` value must be 64 bytes.
10733
+ #
10647
10734
  # You can submit a message digest and omit the `MessageType` or specify
10648
10735
  # `RAW` so the digest is hashed again while signing. However, if the
10649
10736
  # signed message is hashed once while signing, but twice while
10650
10737
  # verifying, verification fails, even when the message hasn't changed.
10651
10738
  #
10652
- # The hashing algorithm in that `Verify` uses is based on the
10739
+ # The hashing algorithm that `Verify` uses is based on the
10653
10740
  # `SigningAlgorithm` value.
10654
10741
  #
10655
10742
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -10661,6 +10748,9 @@ module Aws::KMS
10661
10748
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
10662
10749
  # algorithm.
10663
10750
  #
10751
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
10752
+ # algorithm.
10753
+ #
10664
10754
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
10665
10755
  # verification with SM2 key pairs][1].
10666
10756
  #
@@ -10752,9 +10842,9 @@ module Aws::KMS
10752
10842
  # resp = client.verify({
10753
10843
  # key_id: "KeyIdType", # required
10754
10844
  # message: "data", # required
10755
- # message_type: "RAW", # accepts RAW, DIGEST
10845
+ # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10756
10846
  # signature: "data", # required
10757
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
10847
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10758
10848
  # grant_tokens: ["GrantTokenType"],
10759
10849
  # dry_run: false,
10760
10850
  # })
@@ -10763,7 +10853,7 @@ module Aws::KMS
10763
10853
  #
10764
10854
  # resp.key_id #=> String
10765
10855
  # resp.signature_valid #=> Boolean
10766
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
10856
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10767
10857
  #
10768
10858
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10769
10859
  #
@@ -10932,7 +11022,7 @@ module Aws::KMS
10932
11022
  tracer: tracer
10933
11023
  )
10934
11024
  context[:gem_name] = 'aws-sdk-kms'
10935
- context[:gem_version] = '1.103.0'
11025
+ context[:gem_version] = '1.105.0'
10936
11026
  Seahorse::Client::Request.new(handlers, context)
10937
11027
  end
10938
11028
 
@@ -473,7 +473,6 @@ module Aws::KMS
473
473
  EncryptResponse.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
474
474
  EncryptResponse.add_member(:key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "KeyId"))
475
475
  EncryptResponse.add_member(:encryption_algorithm, Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec, location_name: "EncryptionAlgorithm"))
476
- EncryptResponse.add_member(:key_material_id, Shapes::ShapeRef.new(shape: BackingKeyIdType, location_name: "KeyMaterialId"))
477
476
  EncryptResponse.struct_class = Types::EncryptResponse
478
477
 
479
478
  EncryptionAlgorithmSpecList.member = Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec)
@@ -863,7 +863,10 @@ module Aws::KMS
863
863
  # * For asymmetric KMS keys with NIST-recommended elliptic curve key
864
864
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
865
865
  #
866
- # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
866
+ # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
867
+ # `SIGN_VERIFY`.
868
+ #
869
+ # * For asymmetric KMS keys with ML-DSA key pairs, specify
867
870
  # `SIGN_VERIFY`.
868
871
  #
869
872
  # * For asymmetric KMS keys with SM2 key pairs (China Regions only),
@@ -945,6 +948,13 @@ module Aws::KMS
945
948
  # cryptocurrencies.
946
949
  #
947
950
  # ^
951
+ # * Asymmetric ML-DSA key pairs (signing and verification)
952
+ #
953
+ # * `ML_DSA_44`
954
+ #
955
+ # * `ML_DSA_65`
956
+ #
957
+ # * `ML_DSA_87`
948
958
  # * SM2 key pairs (encryption and decryption -or- signing and
949
959
  # verification -or- deriving shared secrets)
950
960
  #
@@ -1703,7 +1713,8 @@ module Aws::KMS
1703
1713
  # @!attribute [rw] key_material_id
1704
1714
  # The identifier of the key material used to decrypt the ciphertext.
1705
1715
  # This field is present only when the operation uses a symmetric
1706
- # encryption KMS key.
1716
+ # encryption KMS key. This field is omitted if the request includes
1717
+ # the `Recipient` parameter.
1707
1718
  # @return [String]
1708
1719
  #
1709
1720
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/DecryptResponse AWS API Documentation
@@ -2457,19 +2468,12 @@ module Aws::KMS
2457
2468
  # The encryption algorithm that was used to encrypt the plaintext.
2458
2469
  # @return [String]
2459
2470
  #
2460
- # @!attribute [rw] key_material_id
2461
- # The identifier of the key material used to encrypt the ciphertext.
2462
- # This field is present only when the operation uses a symmetric
2463
- # encryption KMS key.
2464
- # @return [String]
2465
- #
2466
2471
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/EncryptResponse AWS API Documentation
2467
2472
  #
2468
2473
  class EncryptResponse < Struct.new(
2469
2474
  :ciphertext_blob,
2470
2475
  :key_id,
2471
- :encryption_algorithm,
2472
- :key_material_id)
2476
+ :encryption_algorithm)
2473
2477
  SENSITIVE = []
2474
2478
  include Aws::Structure
2475
2479
  end
@@ -2546,9 +2550,11 @@ module Aws::KMS
2546
2550
  #
2547
2551
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2548
2552
  # keys to encrypt and decrypt or to sign and verify (but not both),
2549
- # and the rule that permits you to use ECC KMS keys only to sign and
2550
- # verify, are not effective on data key pairs, which are used outside
2551
- # of KMS. The SM2 key spec is only available in China Regions.
2553
+ # the rule that permits you to use ECC KMS keys only to sign and
2554
+ # verify, and the rule that permits you to use ML-DSA key pairs to
2555
+ # sign and verify only are not effective on data key pairs, which are
2556
+ # used outside of KMS. The SM2 key spec is only available in China
2557
+ # Regions.
2552
2558
  # @return [String]
2553
2559
  #
2554
2560
  # @!attribute [rw] grant_tokens
@@ -2749,9 +2755,11 @@ module Aws::KMS
2749
2755
  #
2750
2756
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2751
2757
  # keys to encrypt and decrypt or to sign and verify (but not both),
2752
- # and the rule that permits you to use ECC KMS keys only to sign and
2753
- # verify, are not effective on data key pairs, which are used outside
2754
- # of KMS. The SM2 key spec is only available in China Regions.
2758
+ # the rule that permits you to use ECC KMS keys only to sign and
2759
+ # verify, and the rule that permits you to use ML-DSA key pairs to
2760
+ # sign and verify only are not effective on data key pairs, which are
2761
+ # used outside of KMS. The SM2 key spec is only available in China
2762
+ # Regions.
2755
2763
  # @return [String]
2756
2764
  #
2757
2765
  # @!attribute [rw] grant_tokens
@@ -3017,6 +3025,8 @@ module Aws::KMS
3017
3025
  #
3018
3026
  # @!attribute [rw] key_material_id
3019
3027
  # The identifier of the key material used to encrypt the data key.
3028
+ # This field is omitted if the request includes the `Recipient`
3029
+ # parameter.
3020
3030
  # @return [String]
3021
3031
  #
3022
3032
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyResponse AWS API Documentation
@@ -6135,27 +6145,34 @@ module Aws::KMS
6135
6145
  # Tells KMS whether the value of the `Message` parameter should be
6136
6146
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
6137
6147
  # messages; use `DIGEST` for message digests, which are already
6138
- # hashed.
6148
+ # hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
6149
+ # ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
6139
6150
  #
6140
6151
  # When the value of `MessageType` is `RAW`, KMS uses the standard
6141
6152
  # signing algorithm, which begins with a hash function. When the value
6142
6153
  # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
6154
+ # When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
6155
+ # of the public key hash and the message done in the ML-DSA signing
6156
+ # algorithm.
6143
6157
  #
6144
- # Use the `DIGEST` value only when the value of the `Message`
6145
- # parameter is a message digest. If you use the `DIGEST` value with an
6146
- # unhashed message, the security of the signing operation can be
6147
- # compromised.
6158
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
6159
+ # `Message` parameter is a message digest. If you use the `DIGEST`
6160
+ # value with an unhashed message, the security of the signing
6161
+ # operation can be compromised.
6148
6162
  #
6149
- # When the value of `MessageType`is `DIGEST`, the length of the
6163
+ # When the value of `MessageType` is `DIGEST`, the length of the
6150
6164
  # `Message` value must match the length of hashed messages for the
6151
6165
  # specified signing algorithm.
6152
6166
  #
6167
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
6168
+ # `Message` value must be 64 bytes.
6169
+ #
6153
6170
  # You can submit a message digest and omit the `MessageType` or
6154
6171
  # specify `RAW` so the digest is hashed again while signing. However,
6155
6172
  # this can cause verification failures when verifying with a system
6156
6173
  # that assumes a single hash.
6157
6174
  #
6158
- # The hashing algorithm in that `Sign` uses is based on the
6175
+ # The hashing algorithm that `Sign` uses is based on the
6159
6176
  # `SigningAlgorithm` value.
6160
6177
  #
6161
6178
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -6167,6 +6184,9 @@ module Aws::KMS
6167
6184
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
6168
6185
  # algorithm.
6169
6186
  #
6187
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
6188
+ # hashing algorithm.
6189
+ #
6170
6190
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
6171
6191
  # verification with SM2 key pairs][1].
6172
6192
  #
@@ -6808,28 +6828,35 @@ module Aws::KMS
6808
6828
  # Tells KMS whether the value of the `Message` parameter should be
6809
6829
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
6810
6830
  # messages; use `DIGEST` for message digests, which are already
6811
- # hashed.
6831
+ # hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
6832
+ # ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
6812
6833
  #
6813
6834
  # When the value of `MessageType` is `RAW`, KMS uses the standard
6814
6835
  # signing algorithm, which begins with a hash function. When the value
6815
6836
  # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
6837
+ # When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
6838
+ # of the public key hash and the message done in the ML-DSA signing
6839
+ # algorithm.
6816
6840
  #
6817
- # Use the `DIGEST` value only when the value of the `Message`
6818
- # parameter is a message digest. If you use the `DIGEST` value with an
6819
- # unhashed message, the security of the verification operation can be
6820
- # compromised.
6841
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
6842
+ # `Message` parameter is a message digest. If you use the `DIGEST`
6843
+ # value with an unhashed message, the security of the signing
6844
+ # operation can be compromised.
6821
6845
  #
6822
- # When the value of `MessageType`is `DIGEST`, the length of the
6846
+ # When the value of `MessageType` is `DIGEST`, the length of the
6823
6847
  # `Message` value must match the length of hashed messages for the
6824
6848
  # specified signing algorithm.
6825
6849
  #
6850
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
6851
+ # `Message` value must be 64 bytes.
6852
+ #
6826
6853
  # You can submit a message digest and omit the `MessageType` or
6827
6854
  # specify `RAW` so the digest is hashed again while signing. However,
6828
6855
  # if the signed message is hashed once while signing, but twice while
6829
6856
  # verifying, verification fails, even when the message hasn't
6830
6857
  # changed.
6831
6858
  #
6832
- # The hashing algorithm in that `Verify` uses is based on the
6859
+ # The hashing algorithm that `Verify` uses is based on the
6833
6860
  # `SigningAlgorithm` value.
6834
6861
  #
6835
6862
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -6841,6 +6868,9 @@ module Aws::KMS
6841
6868
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
6842
6869
  # algorithm.
6843
6870
  #
6871
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
6872
+ # hashing algorithm.
6873
+ #
6844
6874
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
6845
6875
  # verification with SM2 key pairs][1].
6846
6876
  #
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.103.0'
57
+ GEM_VERSION = '1.105.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -157,7 +157,7 @@ module Aws
157
157
  ?description: ::String,
158
158
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
159
159
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
160
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
160
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
161
161
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
162
162
  ?custom_key_store_id: ::String,
163
163
  ?bypass_policy_lockout_safety_check: bool,
@@ -309,7 +309,6 @@ module Aws
309
309
  def ciphertext_blob: () -> ::String
310
310
  def key_id: () -> ::String
311
311
  def encryption_algorithm: () -> ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
312
- def key_material_id: () -> ::String
313
312
  end
314
313
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#encrypt-instance_method
315
314
  def encrypt: (
@@ -482,10 +481,10 @@ module Aws
482
481
  def key_id: () -> ::String
483
482
  def public_key: () -> ::String
484
483
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
485
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
484
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
486
485
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
487
486
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
488
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
487
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
489
488
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
490
489
  end
491
490
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -713,15 +712,15 @@ module Aws
713
712
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
714
713
  def key_id: () -> ::String
715
714
  def signature: () -> ::String
716
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
715
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
717
716
  end
718
717
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
719
718
  def sign: (
720
719
  key_id: ::String,
721
720
  message: ::String,
722
- ?message_type: ("RAW" | "DIGEST"),
721
+ ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
723
722
  ?grant_tokens: Array[::String],
724
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
723
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
725
724
  ?dry_run: bool
726
725
  ) -> _SignResponseSuccess
727
726
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -790,15 +789,15 @@ module Aws
790
789
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
791
790
  def key_id: () -> ::String
792
791
  def signature_valid: () -> bool
793
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
792
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
794
793
  end
795
794
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
796
795
  def verify: (
797
796
  key_id: ::String,
798
797
  message: ::String,
799
- ?message_type: ("RAW" | "DIGEST"),
798
+ ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
800
799
  signature: ::String,
801
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
800
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
802
801
  ?grant_tokens: Array[::String],
803
802
  ?dry_run: bool
804
803
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -118,7 +118,7 @@ module Aws::KMS
118
118
  attr_accessor description: ::String
119
119
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
120
120
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
122
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
123
123
  attr_accessor custom_key_store_id: ::String
124
124
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -314,7 +314,6 @@ module Aws::KMS
314
314
  attr_accessor ciphertext_blob: ::String
315
315
  attr_accessor key_id: ::String
316
316
  attr_accessor encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
317
- attr_accessor key_material_id: ::String
318
317
  SENSITIVE: []
319
318
  end
320
319
 
@@ -479,10 +478,10 @@ module Aws::KMS
479
478
  attr_accessor key_id: ::String
480
479
  attr_accessor public_key: ::String
481
480
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
482
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
483
482
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
484
483
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
485
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
484
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
486
485
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
487
486
  SENSITIVE: []
488
487
  end
@@ -622,9 +621,9 @@ module Aws::KMS
622
621
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
623
622
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
624
623
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
625
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
626
625
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
627
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
626
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
628
627
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
629
628
  attr_accessor multi_region: bool
630
629
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -871,9 +870,9 @@ module Aws::KMS
871
870
  class SignRequest
872
871
  attr_accessor key_id: ::String
873
872
  attr_accessor message: ::String
874
- attr_accessor message_type: ("RAW" | "DIGEST")
873
+ attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
875
874
  attr_accessor grant_tokens: ::Array[::String]
876
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
875
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
877
876
  attr_accessor dry_run: bool
878
877
  SENSITIVE: [:message]
879
878
  end
@@ -881,7 +880,7 @@ module Aws::KMS
881
880
  class SignResponse
882
881
  attr_accessor key_id: ::String
883
882
  attr_accessor signature: ::String
884
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
883
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
885
884
  SENSITIVE: []
886
885
  end
887
886
 
@@ -967,9 +966,9 @@ module Aws::KMS
967
966
  class VerifyRequest
968
967
  attr_accessor key_id: ::String
969
968
  attr_accessor message: ::String
970
- attr_accessor message_type: ("RAW" | "DIGEST")
969
+ attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
971
970
  attr_accessor signature: ::String
972
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
971
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
973
972
  attr_accessor grant_tokens: ::Array[::String]
974
973
  attr_accessor dry_run: bool
975
974
  SENSITIVE: [:message]
@@ -978,7 +977,7 @@ module Aws::KMS
978
977
  class VerifyResponse
979
978
  attr_accessor key_id: ::String
980
979
  attr_accessor signature_valid: bool
981
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
980
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
982
981
  SENSITIVE: []
983
982
  end
984
983
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.103.0
4
+ version: 1.105.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services