aws-sdk-kms 1.104.0 → 1.106.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: '078565816f5e2b8088394a3ad96087913c750455d6d152add0d12a1003a43939'
4
- data.tar.gz: cc7e1460281395c5073cbaa6d3b3f3d1ad8fbeb5f3b74e28bfaefddd94eb8712
3
+ metadata.gz: 201524fcd7a495dca2dd60546a1056631fcd9d5d70bdcef9b46c77fc08716b19
4
+ data.tar.gz: 3d6c1641f2d79bbef429d71379a933451de6151f7690a829cb67ad8bce4f6ce0
5
5
  SHA512:
6
- metadata.gz: 414d53c3331e7333e29e8eef5d8f3ef0c9a6c5964cd4dc2eb3d2545b2ba010d85af5450f1f8a44e0e8314bb4dc184821c6e1ea8873ac685d1f4ca36ad16c1064
7
- data.tar.gz: 7c28a1ccc919555dce3593a571df81b744bee10e01552310a6f895c04bb583b791dfca939ca9255bd409ccf55fb42852927b061ea8b0bbedb61f4f24a2500ae5
6
+ metadata.gz: 17b3468e36b9929f90e68dc867df1368aa9ba865c45e1c78cd4cee22fd3e54cb8ffbc98330789c35bdcdd61e078db1281220e0a0362ed07b41fb0f83c69aafd2
7
+ data.tar.gz: e9c97588b4eb8000829bf24febd171652b39d5a3809bf0169e89aeeccdf9b93a63fb30f05085ddd2510a16e0c7900131562072351dc3046124a949f78e9fff0b
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.106.0 (2025-06-26)
5
+ ------------------
6
+
7
+ * Feature - This release updates AWS CLI examples for KMS APIs.
8
+
9
+ 1.105.0 (2025-06-12)
10
+ ------------------
11
+
12
+ * Feature - AWS KMS announces the support of ML-DSA key pairs that creates post-quantum safe digital signatures.
13
+
4
14
  1.104.0 (2025-06-06)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.104.0
1
+ 1.106.0
@@ -1555,20 +1555,21 @@ module Aws::KMS
1555
1555
  # properties after the KMS key is created.
1556
1556
  #
1557
1557
  # Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC)
1558
- # key pair, or an SM2 key pair (China Regions only). The private key
1559
- # in an asymmetric KMS key never leaves KMS unencrypted. However, you
1560
- # can use the GetPublicKey operation to download the public key so it
1561
- # can be used outside of KMS. Each KMS key can have only one key
1562
- # usage. KMS keys with RSA key pairs can be used to encrypt and
1563
- # decrypt data or sign and verify messages (but not both). KMS keys
1564
- # with NIST-recommended ECC key pairs can be used to sign and verify
1565
- # messages or derive shared secrets (but not both). KMS keys with
1566
- # `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS
1567
- # keys with SM2 key pairs (China Regions only) can be used to either
1568
- # encrypt and decrypt data, sign and verify messages, or derive shared
1569
- # secrets (you must choose one key usage type). For information about
1570
- # asymmetric KMS keys, see [Asymmetric KMS keys][2] in the *Key
1571
- # Management Service Developer Guide*.
1558
+ # key pair, ML-DSA key pair or an SM2 key pair (China Regions only).
1559
+ # The private key in an asymmetric KMS key never leaves KMS
1560
+ # unencrypted. However, you can use the GetPublicKey operation to
1561
+ # download the public key so it can be used outside of KMS. Each KMS
1562
+ # key can have only one key usage. KMS keys with RSA key pairs can be
1563
+ # used to encrypt and decrypt data or sign and verify messages (but
1564
+ # not both). KMS keys with NIST-recommended ECC key pairs can be used
1565
+ # to sign and verify messages or derive shared secrets (but not both).
1566
+ # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1567
+ # messages. KMS keys with ML-DSA key pairs can be used to sign and
1568
+ # verify messages. KMS keys with SM2 key pairs (China Regions only)
1569
+ # can be used to either encrypt and decrypt data, sign and verify
1570
+ # messages, or derive shared secrets (you must choose one key usage
1571
+ # type). For information about asymmetric KMS keys, see [Asymmetric
1572
+ # KMS keys][2] in the *Key Management Service Developer Guide*.
1572
1573
  #
1573
1574
  #
1574
1575
  #
@@ -1812,7 +1813,10 @@ module Aws::KMS
1812
1813
  # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1813
1814
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1814
1815
  #
1815
- # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
1816
+ # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1817
+ # `SIGN_VERIFY`.
1818
+ #
1819
+ # * For asymmetric KMS keys with ML-DSA key pairs, specify
1816
1820
  # `SIGN_VERIFY`.
1817
1821
  #
1818
1822
  # * For asymmetric KMS keys with SM2 key pairs (China Regions only),
@@ -1889,6 +1893,13 @@ module Aws::KMS
1889
1893
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
1890
1894
  #
1891
1895
  # ^
1896
+ # * Asymmetric ML-DSA key pairs (signing and verification)
1897
+ #
1898
+ # * `ML_DSA_44`
1899
+ #
1900
+ # * `ML_DSA_65`
1901
+ #
1902
+ # * `ML_DSA_87`
1892
1903
  # * SM2 key pairs (encryption and decryption -or- signing and
1893
1904
  # verification -or- deriving shared secrets)
1894
1905
  #
@@ -2094,6 +2105,7 @@ module Aws::KMS
2094
2105
  # aws_account_id: "111122223333",
2095
2106
  # arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
2096
2107
  # creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
2108
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
2097
2109
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
2098
2110
  # description: "",
2099
2111
  # enabled: true,
@@ -2146,8 +2158,7 @@ module Aws::KMS
2146
2158
  # @example Example: To create an asymmetric elliptic curve KMS key for signing and verification
2147
2159
  #
2148
2160
  # # This example creates a KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification.
2149
- # # The key usage is required even though "SIGN_VERIFY" is the only valid value for ECC KMS keys. The key spec and key usage
2150
- # # can't be changed after the key is created.
2161
+ # # The key spec and key usage can't be changed after the key is created.
2151
2162
  #
2152
2163
  # resp = client.create_key({
2153
2164
  # key_spec: "ECC_NIST_P521", # Describes the type of key material in the KMS key.
@@ -2208,6 +2219,38 @@ module Aws::KMS
2208
2219
  # }, # Detailed information about the KMS key that this operation creates.
2209
2220
  # }
2210
2221
  #
2222
+ # @example Example: To create an asymmetric ML-DSA KMS key for signing and verification
2223
+ #
2224
+ # # This example creates a module-lattice digital signature algorithm (ML-DSA) key for signing and verification. The
2225
+ # # key-usage parameter is required even though SIGN_VERIFY is the only valid value for ML-DSA keys.
2226
+ #
2227
+ # resp = client.create_key({
2228
+ # key_spec: "ML_DSA_65", # Describes the type of key material in the KMS key.
2229
+ # key_usage: "SIGN_VERIFY", # The cryptographic operations for which you can use the KMS key.
2230
+ # })
2231
+ #
2232
+ # resp.to_h outputs the following:
2233
+ # {
2234
+ # key_metadata: {
2235
+ # aws_account_id: "111122223333",
2236
+ # arn: "arn:aws:kms:us-east-1:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
2237
+ # creation_date: Time.parse(1748371316.734),
2238
+ # customer_master_key_spec: "ML_DSA_65",
2239
+ # description: "",
2240
+ # enabled: true,
2241
+ # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab",
2242
+ # key_manager: "CUSTOMER",
2243
+ # key_spec: "ML_DSA_65",
2244
+ # key_state: "Enabled",
2245
+ # key_usage: "SIGN_VERIFY",
2246
+ # multi_region: false,
2247
+ # origin: "AWS_KMS",
2248
+ # signing_algorithms: [
2249
+ # "ML_DSA_SHAKE_256",
2250
+ # ],
2251
+ # }, # Detailed information about the KMS key that this operation creates.
2252
+ # }
2253
+ #
2211
2254
  # @example Example: To create a multi-Region primary KMS key
2212
2255
  #
2213
2256
  # # This example creates a multi-Region primary symmetric encryption key. Because the default values for all parameters
@@ -2223,6 +2266,7 @@ module Aws::KMS
2223
2266
  # aws_account_id: "111122223333",
2224
2267
  # arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef12345678990ab",
2225
2268
  # creation_date: Time.parse("2021-09-02T016:15:21-09:00"),
2269
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
2226
2270
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
2227
2271
  # description: "",
2228
2272
  # enabled: true,
@@ -2359,7 +2403,7 @@ module Aws::KMS
2359
2403
  # description: "DescriptionType",
2360
2404
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2361
2405
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2362
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2406
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2363
2407
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2364
2408
  # custom_key_store_id: "CustomKeyStoreIdType",
2365
2409
  # bypass_policy_lockout_safety_check: false,
@@ -2391,11 +2435,11 @@ module Aws::KMS
2391
2435
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2392
2436
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2393
2437
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2394
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2438
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2395
2439
  # resp.key_metadata.encryption_algorithms #=> Array
2396
2440
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2397
2441
  # resp.key_metadata.signing_algorithms #=> Array
2398
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
2442
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2399
2443
  # resp.key_metadata.key_agreement_algorithms #=> Array
2400
2444
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2401
2445
  # resp.key_metadata.multi_region #=> Boolean
@@ -2660,6 +2704,7 @@ module Aws::KMS
2660
2704
  # {
2661
2705
  # encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.
2662
2706
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.
2707
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to decrypt the ciphertext.
2663
2708
  # plaintext: "<binary data>", # The decrypted (plaintext) data.
2664
2709
  # }
2665
2710
  #
@@ -2993,6 +3038,7 @@ module Aws::KMS
2993
3038
  #
2994
3039
  # resp = client.delete_imported_key_material({
2995
3040
  # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key whose imported key material you are deleting. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
3041
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the deleted key material.
2996
3042
  # })
2997
3043
  #
2998
3044
  # @example Request syntax with placeholder values
@@ -3652,6 +3698,7 @@ module Aws::KMS
3652
3698
  # aws_account_id: "111122223333",
3653
3699
  # arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
3654
3700
  # creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
3701
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
3655
3702
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
3656
3703
  # description: "",
3657
3704
  # enabled: true,
@@ -3718,6 +3765,7 @@ module Aws::KMS
3718
3765
  # aws_account_id: "111122223333",
3719
3766
  # arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
3720
3767
  # creation_date: Time.parse(1586329200.918),
3768
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
3721
3769
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
3722
3770
  # description: "",
3723
3771
  # enabled: true,
@@ -3874,11 +3922,11 @@ module Aws::KMS
3874
3922
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3875
3923
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3876
3924
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3877
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3925
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3878
3926
  # resp.key_metadata.encryption_algorithms #=> Array
3879
3927
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3880
3928
  # resp.key_metadata.signing_algorithms #=> Array
3881
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
3929
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
3882
3930
  # resp.key_metadata.key_agreement_algorithms #=> Array
3883
3931
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3884
3932
  # resp.key_metadata.multi_region #=> Boolean
@@ -4901,6 +4949,7 @@ module Aws::KMS
4901
4949
  # {
4902
4950
  # ciphertext_blob: "<binary data>", # The encrypted data key.
4903
4951
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
4952
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
4904
4953
  # plaintext: "<binary data>", # The unencrypted (plaintext) data key.
4905
4954
  # }
4906
4955
  #
@@ -5118,10 +5167,11 @@ module Aws::KMS
5118
5167
  # Determines the type of data key pair that is generated.
5119
5168
  #
5120
5169
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
5121
- # to encrypt and decrypt or to sign and verify (but not both), and the
5122
- # rule that permits you to use ECC KMS keys only to sign and verify, are
5123
- # not effective on data key pairs, which are used outside of KMS. The
5124
- # SM2 key spec is only available in China Regions.
5170
+ # to encrypt and decrypt or to sign and verify (but not both), the rule
5171
+ # that permits you to use ECC KMS keys only to sign and verify, and the
5172
+ # rule that permits you to use ML-DSA key pairs to sign and verify only
5173
+ # are not effective on data key pairs, which are used outside of KMS.
5174
+ # The SM2 key spec is only available in China Regions.
5125
5175
  #
5126
5176
  # @option params [Array<String>] :grant_tokens
5127
5177
  # A list of grant tokens.
@@ -5203,6 +5253,7 @@ module Aws::KMS
5203
5253
  # resp.to_h outputs the following:
5204
5254
  # {
5205
5255
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the private key.
5256
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5206
5257
  # key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
5207
5258
  # private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the RSA data key pair.
5208
5259
  # private_key_plaintext: "<binary data>", # The plaintext private key of the RSA data key pair.
@@ -5230,6 +5281,7 @@ module Aws::KMS
5230
5281
  # {
5231
5282
  # ciphertext_for_recipient: "<binary data>", # The private key of the RSA data key pair encrypted by the public key from the attestation document
5232
5283
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.
5284
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5233
5285
  # key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
5234
5286
  # private_key_ciphertext_blob: "<binary data>", # The private key of the RSA data key pair encrypted by the KMS key.
5235
5287
  # private_key_plaintext: "", # This field is null or empty
@@ -5396,10 +5448,11 @@ module Aws::KMS
5396
5448
  # Determines the type of data key pair that is generated.
5397
5449
  #
5398
5450
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
5399
- # to encrypt and decrypt or to sign and verify (but not both), and the
5400
- # rule that permits you to use ECC KMS keys only to sign and verify, are
5401
- # not effective on data key pairs, which are used outside of KMS. The
5402
- # SM2 key spec is only available in China Regions.
5451
+ # to encrypt and decrypt or to sign and verify (but not both), the rule
5452
+ # that permits you to use ECC KMS keys only to sign and verify, and the
5453
+ # rule that permits you to use ML-DSA key pairs to sign and verify only
5454
+ # are not effective on data key pairs, which are used outside of KMS.
5455
+ # The SM2 key spec is only available in China Regions.
5403
5456
  #
5404
5457
  # @option params [Array<String>] :grant_tokens
5405
5458
  # A list of grant tokens.
@@ -5447,6 +5500,7 @@ module Aws::KMS
5447
5500
  # resp.to_h outputs the following:
5448
5501
  # {
5449
5502
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that encrypted the private key in the ECC asymmetric data key pair.
5503
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5450
5504
  # key_pair_spec: "ECC_NIST_P521", # The actual key spec of the ECC asymmetric data key pair.
5451
5505
  # private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the asymmetric ECC data key pair.
5452
5506
  # public_key: "<binary data>", # The public key (plaintext).
@@ -5668,6 +5722,7 @@ module Aws::KMS
5668
5722
  # {
5669
5723
  # ciphertext_blob: "<binary data>", # The encrypted data key.
5670
5724
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
5725
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
5671
5726
  # }
5672
5727
  #
5673
5728
  # @example Request syntax with placeholder values
@@ -6629,12 +6684,12 @@ module Aws::KMS
6629
6684
  # resp.key_id #=> String
6630
6685
  # resp.public_key #=> String
6631
6686
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6632
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6687
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6633
6688
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6634
6689
  # resp.encryption_algorithms #=> Array
6635
6690
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6636
6691
  # resp.signing_algorithms #=> Array
6637
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
6692
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6638
6693
  # resp.key_agreement_algorithms #=> Array
6639
6694
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6640
6695
  #
@@ -6853,10 +6908,11 @@ module Aws::KMS
6853
6908
  # @option params [String] :import_type
6854
6909
  # Indicates whether the key material being imported is previously
6855
6910
  # associated with this KMS key or not. This parameter is optional and
6856
- # only usable with symmetric encryption keys. The default is
6857
- # `EXISTING_KEY_MATERIAL`. If no key material has ever been imported
6858
- # into the KMS key, and this parameter is omitted, the parameter
6859
- # defaults to `NEW_KEY_MATERIAL`.
6911
+ # only usable with symmetric encryption keys. If no key material has
6912
+ # ever been imported into the KMS key, and this parameter is omitted,
6913
+ # the parameter defaults to `NEW_KEY_MATERIAL`. After the first key
6914
+ # material is imported, if this parameter is omitted then the parameter
6915
+ # defaults to `EXISTING_KEY_MATERIAL`.
6860
6916
  #
6861
6917
  # @option params [String] :key_material_description
6862
6918
  # Description for the key material being imported. This parameter is
@@ -6902,6 +6958,12 @@ module Aws::KMS
6902
6958
  # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key to import the key material into. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
6903
6959
  # })
6904
6960
  #
6961
+ # resp.to_h outputs the following:
6962
+ # {
6963
+ # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
6964
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
6965
+ # }
6966
+ #
6905
6967
  # @example Example: To import key material into a KMS key
6906
6968
  #
6907
6969
  # # The following example imports key material that expires in 3 days. It might be part of an application that frequently
@@ -6915,6 +6977,12 @@ module Aws::KMS
6915
6977
  # valid_to: Time.parse("2023-09-30T00:00:00-00:00"), # Specifies the date and time when the imported key material expires.
6916
6978
  # })
6917
6979
  #
6980
+ # resp.to_h outputs the following:
6981
+ # {
6982
+ # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
6983
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
6984
+ # }
6985
+ #
6918
6986
  # @example Request syntax with placeholder values
6919
6987
  #
6920
6988
  # resp = client.import_key_material({
@@ -8397,8 +8465,12 @@ module Aws::KMS
8397
8465
  # resp.to_h outputs the following:
8398
8466
  # {
8399
8467
  # ciphertext_blob: "<binary data>", # The reencrypted data.
8468
+ # destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to reencrypt the data.
8469
+ # destination_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to reencrypt the data.
8400
8470
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321", # The ARN of the KMS key that was used to reencrypt the data.
8471
+ # source_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext before it was reencrypted.
8401
8472
  # source_key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was originally used to encrypt the data.
8473
+ # source_key_material_id: "1c6be7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to originally encrypt the data.
8402
8474
  # }
8403
8475
  #
8404
8476
  # @example Request syntax with placeholder values
@@ -8790,11 +8862,11 @@ module Aws::KMS
8790
8862
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8791
8863
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8792
8864
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8793
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8865
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8794
8866
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8795
8867
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8796
8868
  # resp.replica_key_metadata.signing_algorithms #=> Array
8797
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
8869
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8798
8870
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8799
8871
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8800
8872
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9354,11 +9426,11 @@ module Aws::KMS
9354
9426
  # Developer Guide*.
9355
9427
  #
9356
9428
  # Digital signatures are generated and verified by using asymmetric key
9357
- # pair, such as an RSA or ECC pair that is represented by an asymmetric
9358
- # KMS key. The key owner (or an authorized user) uses their private key
9359
- # to sign a message. Anyone with the public key can verify that the
9360
- # message was signed with that particular private key and that the
9361
- # message hasn't changed since it was signed.
9429
+ # pair, such as an RSA, ECC, or ML-DSA pair that is represented by an
9430
+ # asymmetric KMS key. The key owner (or an authorized user) uses their
9431
+ # private key to sign a message. Anyone with the public key can verify
9432
+ # that the message was signed with that particular private key and that
9433
+ # the message hasn't changed since it was signed.
9362
9434
  #
9363
9435
  # To use the `Sign` operation, provide the following information:
9364
9436
  #
@@ -9371,8 +9443,8 @@ module Aws::KMS
9371
9443
  # to sign. You can submit messages of up to 4096 bytes. To sign a
9372
9444
  # larger message, generate a hash digest of the message, and then
9373
9445
  # provide the hash digest in the `Message` parameter. To indicate
9374
- # whether the message is a full message or a digest, use the
9375
- # `MessageType` parameter.
9446
+ # whether the message is a full message, a digest, or an ML-DSA
9447
+ # EXTERNAL\_MU, use the `MessageType` parameter.
9376
9448
  #
9377
9449
  # * Choose a signing algorithm that is compatible with the KMS key.
9378
9450
  #
@@ -9452,26 +9524,34 @@ module Aws::KMS
9452
9524
  # @option params [String] :message_type
9453
9525
  # Tells KMS whether the value of the `Message` parameter should be
9454
9526
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
9455
- # messages; use `DIGEST` for message digests, which are already hashed.
9527
+ # messages; use `DIGEST` for message digests, which are already hashed;
9528
+ # use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
9529
+ # as defined in NIST FIPS 204 Section 6.2.
9456
9530
  #
9457
9531
  # When the value of `MessageType` is `RAW`, KMS uses the standard
9458
9532
  # signing algorithm, which begins with a hash function. When the value
9459
- # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
9533
+ # is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
9534
+ # the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
9535
+ # public key hash and the message done in the ML-DSA signing algorithm.
9460
9536
  #
9461
- # Use the `DIGEST` value only when the value of the `Message` parameter
9462
- # is a message digest. If you use the `DIGEST` value with an unhashed
9463
- # message, the security of the signing operation can be compromised.
9537
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
9538
+ # `Message` parameter is a message digest. If you use the `DIGEST` value
9539
+ # with an unhashed message, the security of the signing operation can be
9540
+ # compromised.
9464
9541
  #
9465
- # When the value of `MessageType`is `DIGEST`, the length of the
9542
+ # When the value of `MessageType` is `DIGEST`, the length of the
9466
9543
  # `Message` value must match the length of hashed messages for the
9467
9544
  # specified signing algorithm.
9468
9545
  #
9546
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
9547
+ # `Message` value must be 64 bytes.
9548
+ #
9469
9549
  # You can submit a message digest and omit the `MessageType` or specify
9470
9550
  # `RAW` so the digest is hashed again while signing. However, this can
9471
9551
  # cause verification failures when verifying with a system that assumes
9472
9552
  # a single hash.
9473
9553
  #
9474
- # The hashing algorithm in that `Sign` uses is based on the
9554
+ # The hashing algorithm that `Sign` uses is based on the
9475
9555
  # `SigningAlgorithm` value.
9476
9556
  #
9477
9557
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -9483,6 +9563,9 @@ module Aws::KMS
9483
9563
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
9484
9564
  # algorithm.
9485
9565
  #
9566
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
9567
+ # algorithm.
9568
+ #
9486
9569
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
9487
9570
  # verification with SM2 key pairs][1].
9488
9571
  #
@@ -9573,9 +9656,9 @@ module Aws::KMS
9573
9656
  # resp = client.sign({
9574
9657
  # key_id: "KeyIdType", # required
9575
9658
  # message: "data", # required
9576
- # message_type: "RAW", # accepts RAW, DIGEST
9659
+ # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9577
9660
  # grant_tokens: ["GrantTokenType"],
9578
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
9661
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9579
9662
  # dry_run: false,
9580
9663
  # })
9581
9664
  #
@@ -9583,7 +9666,7 @@ module Aws::KMS
9583
9666
  #
9584
9667
  # resp.key_id #=> String
9585
9668
  # resp.signature #=> String
9586
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
9669
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9587
9670
  #
9588
9671
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9589
9672
  #
@@ -10627,27 +10710,34 @@ module Aws::KMS
10627
10710
  # @option params [String] :message_type
10628
10711
  # Tells KMS whether the value of the `Message` parameter should be
10629
10712
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
10630
- # messages; use `DIGEST` for message digests, which are already hashed.
10713
+ # messages; use `DIGEST` for message digests, which are already hashed;
10714
+ # use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
10715
+ # as defined in NIST FIPS 204 Section 6.2.
10631
10716
  #
10632
10717
  # When the value of `MessageType` is `RAW`, KMS uses the standard
10633
10718
  # signing algorithm, which begins with a hash function. When the value
10634
- # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
10719
+ # is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
10720
+ # the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
10721
+ # public key hash and the message done in the ML-DSA signing algorithm.
10635
10722
  #
10636
- # Use the `DIGEST` value only when the value of the `Message` parameter
10637
- # is a message digest. If you use the `DIGEST` value with an unhashed
10638
- # message, the security of the verification operation can be
10723
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
10724
+ # `Message` parameter is a message digest. If you use the `DIGEST` value
10725
+ # with an unhashed message, the security of the signing operation can be
10639
10726
  # compromised.
10640
10727
  #
10641
- # When the value of `MessageType`is `DIGEST`, the length of the
10728
+ # When the value of `MessageType` is `DIGEST`, the length of the
10642
10729
  # `Message` value must match the length of hashed messages for the
10643
10730
  # specified signing algorithm.
10644
10731
  #
10732
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
10733
+ # `Message` value must be 64 bytes.
10734
+ #
10645
10735
  # You can submit a message digest and omit the `MessageType` or specify
10646
10736
  # `RAW` so the digest is hashed again while signing. However, if the
10647
10737
  # signed message is hashed once while signing, but twice while
10648
10738
  # verifying, verification fails, even when the message hasn't changed.
10649
10739
  #
10650
- # The hashing algorithm in that `Verify` uses is based on the
10740
+ # The hashing algorithm that `Verify` uses is based on the
10651
10741
  # `SigningAlgorithm` value.
10652
10742
  #
10653
10743
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -10659,6 +10749,9 @@ module Aws::KMS
10659
10749
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
10660
10750
  # algorithm.
10661
10751
  #
10752
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
10753
+ # algorithm.
10754
+ #
10662
10755
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
10663
10756
  # verification with SM2 key pairs][1].
10664
10757
  #
@@ -10750,9 +10843,9 @@ module Aws::KMS
10750
10843
  # resp = client.verify({
10751
10844
  # key_id: "KeyIdType", # required
10752
10845
  # message: "data", # required
10753
- # message_type: "RAW", # accepts RAW, DIGEST
10846
+ # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10754
10847
  # signature: "data", # required
10755
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
10848
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10756
10849
  # grant_tokens: ["GrantTokenType"],
10757
10850
  # dry_run: false,
10758
10851
  # })
@@ -10761,7 +10854,7 @@ module Aws::KMS
10761
10854
  #
10762
10855
  # resp.key_id #=> String
10763
10856
  # resp.signature_valid #=> Boolean
10764
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
10857
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10765
10858
  #
10766
10859
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10767
10860
  #
@@ -10930,7 +11023,7 @@ module Aws::KMS
10930
11023
  tracer: tracer
10931
11024
  )
10932
11025
  context[:gem_name] = 'aws-sdk-kms'
10933
- context[:gem_version] = '1.104.0'
11026
+ context[:gem_version] = '1.106.0'
10934
11027
  Seahorse::Client::Request.new(handlers, context)
10935
11028
  end
10936
11029
 
@@ -863,7 +863,10 @@ module Aws::KMS
863
863
  # * For asymmetric KMS keys with NIST-recommended elliptic curve key
864
864
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
865
865
  #
866
- # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
866
+ # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
867
+ # `SIGN_VERIFY`.
868
+ #
869
+ # * For asymmetric KMS keys with ML-DSA key pairs, specify
867
870
  # `SIGN_VERIFY`.
868
871
  #
869
872
  # * For asymmetric KMS keys with SM2 key pairs (China Regions only),
@@ -945,6 +948,13 @@ module Aws::KMS
945
948
  # cryptocurrencies.
946
949
  #
947
950
  # ^
951
+ # * Asymmetric ML-DSA key pairs (signing and verification)
952
+ #
953
+ # * `ML_DSA_44`
954
+ #
955
+ # * `ML_DSA_65`
956
+ #
957
+ # * `ML_DSA_87`
948
958
  # * SM2 key pairs (encryption and decryption -or- signing and
949
959
  # verification -or- deriving shared secrets)
950
960
  #
@@ -2540,9 +2550,11 @@ module Aws::KMS
2540
2550
  #
2541
2551
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2542
2552
  # keys to encrypt and decrypt or to sign and verify (but not both),
2543
- # and the rule that permits you to use ECC KMS keys only to sign and
2544
- # verify, are not effective on data key pairs, which are used outside
2545
- # of KMS. The SM2 key spec is only available in China Regions.
2553
+ # the rule that permits you to use ECC KMS keys only to sign and
2554
+ # verify, and the rule that permits you to use ML-DSA key pairs to
2555
+ # sign and verify only are not effective on data key pairs, which are
2556
+ # used outside of KMS. The SM2 key spec is only available in China
2557
+ # Regions.
2546
2558
  # @return [String]
2547
2559
  #
2548
2560
  # @!attribute [rw] grant_tokens
@@ -2671,8 +2683,6 @@ module Aws::KMS
2671
2683
  #
2672
2684
  # @!attribute [rw] key_material_id
2673
2685
  # The identifier of the key material used to encrypt the private key.
2674
- # This field is omitted if the request includes the `Recipient`
2675
- # parameter.
2676
2686
  # @return [String]
2677
2687
  #
2678
2688
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairResponse AWS API Documentation
@@ -2745,9 +2755,11 @@ module Aws::KMS
2745
2755
  #
2746
2756
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2747
2757
  # keys to encrypt and decrypt or to sign and verify (but not both),
2748
- # and the rule that permits you to use ECC KMS keys only to sign and
2749
- # verify, are not effective on data key pairs, which are used outside
2750
- # of KMS. The SM2 key spec is only available in China Regions.
2758
+ # the rule that permits you to use ECC KMS keys only to sign and
2759
+ # verify, and the rule that permits you to use ML-DSA key pairs to
2760
+ # sign and verify only are not effective on data key pairs, which are
2761
+ # used outside of KMS. The SM2 key spec is only available in China
2762
+ # Regions.
2751
2763
  # @return [String]
2752
2764
  #
2753
2765
  # @!attribute [rw] grant_tokens
@@ -3928,10 +3940,11 @@ module Aws::KMS
3928
3940
  # @!attribute [rw] import_type
3929
3941
  # Indicates whether the key material being imported is previously
3930
3942
  # associated with this KMS key or not. This parameter is optional and
3931
- # only usable with symmetric encryption keys. The default is
3932
- # `EXISTING_KEY_MATERIAL`. If no key material has ever been imported
3933
- # into the KMS key, and this parameter is omitted, the parameter
3934
- # defaults to `NEW_KEY_MATERIAL`.
3943
+ # only usable with symmetric encryption keys. If no key material has
3944
+ # ever been imported into the KMS key, and this parameter is omitted,
3945
+ # the parameter defaults to `NEW_KEY_MATERIAL`. After the first key
3946
+ # material is imported, if this parameter is omitted then the
3947
+ # parameter defaults to `EXISTING_KEY_MATERIAL`.
3935
3948
  # @return [String]
3936
3949
  #
3937
3950
  # @!attribute [rw] key_material_description
@@ -6133,27 +6146,34 @@ module Aws::KMS
6133
6146
  # Tells KMS whether the value of the `Message` parameter should be
6134
6147
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
6135
6148
  # messages; use `DIGEST` for message digests, which are already
6136
- # hashed.
6149
+ # hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
6150
+ # ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
6137
6151
  #
6138
6152
  # When the value of `MessageType` is `RAW`, KMS uses the standard
6139
6153
  # signing algorithm, which begins with a hash function. When the value
6140
6154
  # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
6155
+ # When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
6156
+ # of the public key hash and the message done in the ML-DSA signing
6157
+ # algorithm.
6141
6158
  #
6142
- # Use the `DIGEST` value only when the value of the `Message`
6143
- # parameter is a message digest. If you use the `DIGEST` value with an
6144
- # unhashed message, the security of the signing operation can be
6145
- # compromised.
6159
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
6160
+ # `Message` parameter is a message digest. If you use the `DIGEST`
6161
+ # value with an unhashed message, the security of the signing
6162
+ # operation can be compromised.
6146
6163
  #
6147
- # When the value of `MessageType`is `DIGEST`, the length of the
6164
+ # When the value of `MessageType` is `DIGEST`, the length of the
6148
6165
  # `Message` value must match the length of hashed messages for the
6149
6166
  # specified signing algorithm.
6150
6167
  #
6168
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
6169
+ # `Message` value must be 64 bytes.
6170
+ #
6151
6171
  # You can submit a message digest and omit the `MessageType` or
6152
6172
  # specify `RAW` so the digest is hashed again while signing. However,
6153
6173
  # this can cause verification failures when verifying with a system
6154
6174
  # that assumes a single hash.
6155
6175
  #
6156
- # The hashing algorithm in that `Sign` uses is based on the
6176
+ # The hashing algorithm that `Sign` uses is based on the
6157
6177
  # `SigningAlgorithm` value.
6158
6178
  #
6159
6179
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -6165,6 +6185,9 @@ module Aws::KMS
6165
6185
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
6166
6186
  # algorithm.
6167
6187
  #
6188
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
6189
+ # hashing algorithm.
6190
+ #
6168
6191
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
6169
6192
  # verification with SM2 key pairs][1].
6170
6193
  #
@@ -6806,28 +6829,35 @@ module Aws::KMS
6806
6829
  # Tells KMS whether the value of the `Message` parameter should be
6807
6830
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
6808
6831
  # messages; use `DIGEST` for message digests, which are already
6809
- # hashed.
6832
+ # hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
6833
+ # ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
6810
6834
  #
6811
6835
  # When the value of `MessageType` is `RAW`, KMS uses the standard
6812
6836
  # signing algorithm, which begins with a hash function. When the value
6813
6837
  # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
6838
+ # When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
6839
+ # of the public key hash and the message done in the ML-DSA signing
6840
+ # algorithm.
6814
6841
  #
6815
- # Use the `DIGEST` value only when the value of the `Message`
6816
- # parameter is a message digest. If you use the `DIGEST` value with an
6817
- # unhashed message, the security of the verification operation can be
6818
- # compromised.
6842
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
6843
+ # `Message` parameter is a message digest. If you use the `DIGEST`
6844
+ # value with an unhashed message, the security of the signing
6845
+ # operation can be compromised.
6819
6846
  #
6820
- # When the value of `MessageType`is `DIGEST`, the length of the
6847
+ # When the value of `MessageType` is `DIGEST`, the length of the
6821
6848
  # `Message` value must match the length of hashed messages for the
6822
6849
  # specified signing algorithm.
6823
6850
  #
6851
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
6852
+ # `Message` value must be 64 bytes.
6853
+ #
6824
6854
  # You can submit a message digest and omit the `MessageType` or
6825
6855
  # specify `RAW` so the digest is hashed again while signing. However,
6826
6856
  # if the signed message is hashed once while signing, but twice while
6827
6857
  # verifying, verification fails, even when the message hasn't
6828
6858
  # changed.
6829
6859
  #
6830
- # The hashing algorithm in that `Verify` uses is based on the
6860
+ # The hashing algorithm that `Verify` uses is based on the
6831
6861
  # `SigningAlgorithm` value.
6832
6862
  #
6833
6863
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -6839,6 +6869,9 @@ module Aws::KMS
6839
6869
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
6840
6870
  # algorithm.
6841
6871
  #
6872
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
6873
+ # hashing algorithm.
6874
+ #
6842
6875
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
6843
6876
  # verification with SM2 key pairs][1].
6844
6877
  #
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.104.0'
57
+ GEM_VERSION = '1.106.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -157,7 +157,7 @@ module Aws
157
157
  ?description: ::String,
158
158
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
159
159
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
160
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
160
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
161
161
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
162
162
  ?custom_key_store_id: ::String,
163
163
  ?bypass_policy_lockout_safety_check: bool,
@@ -481,10 +481,10 @@ module Aws
481
481
  def key_id: () -> ::String
482
482
  def public_key: () -> ::String
483
483
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
484
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
484
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
485
485
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
486
486
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
487
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
487
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
488
488
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
489
489
  end
490
490
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -712,15 +712,15 @@ module Aws
712
712
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
713
713
  def key_id: () -> ::String
714
714
  def signature: () -> ::String
715
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
715
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
716
716
  end
717
717
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
718
718
  def sign: (
719
719
  key_id: ::String,
720
720
  message: ::String,
721
- ?message_type: ("RAW" | "DIGEST"),
721
+ ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
722
722
  ?grant_tokens: Array[::String],
723
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
723
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
724
724
  ?dry_run: bool
725
725
  ) -> _SignResponseSuccess
726
726
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -789,15 +789,15 @@ module Aws
789
789
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
790
790
  def key_id: () -> ::String
791
791
  def signature_valid: () -> bool
792
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
792
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
793
793
  end
794
794
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
795
795
  def verify: (
796
796
  key_id: ::String,
797
797
  message: ::String,
798
- ?message_type: ("RAW" | "DIGEST"),
798
+ ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
799
799
  signature: ::String,
800
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
800
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
801
801
  ?grant_tokens: Array[::String],
802
802
  ?dry_run: bool
803
803
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -118,7 +118,7 @@ module Aws::KMS
118
118
  attr_accessor description: ::String
119
119
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
120
120
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
122
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
123
123
  attr_accessor custom_key_store_id: ::String
124
124
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -478,10 +478,10 @@ module Aws::KMS
478
478
  attr_accessor key_id: ::String
479
479
  attr_accessor public_key: ::String
480
480
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
482
482
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
483
483
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
484
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
484
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
485
485
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
486
486
  SENSITIVE: []
487
487
  end
@@ -621,9 +621,9 @@ module Aws::KMS
621
621
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
622
622
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
623
623
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
625
625
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
626
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
626
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
627
627
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
628
628
  attr_accessor multi_region: bool
629
629
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -870,9 +870,9 @@ module Aws::KMS
870
870
  class SignRequest
871
871
  attr_accessor key_id: ::String
872
872
  attr_accessor message: ::String
873
- attr_accessor message_type: ("RAW" | "DIGEST")
873
+ attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
874
874
  attr_accessor grant_tokens: ::Array[::String]
875
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
875
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
876
876
  attr_accessor dry_run: bool
877
877
  SENSITIVE: [:message]
878
878
  end
@@ -880,7 +880,7 @@ module Aws::KMS
880
880
  class SignResponse
881
881
  attr_accessor key_id: ::String
882
882
  attr_accessor signature: ::String
883
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
883
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
884
884
  SENSITIVE: []
885
885
  end
886
886
 
@@ -966,9 +966,9 @@ module Aws::KMS
966
966
  class VerifyRequest
967
967
  attr_accessor key_id: ::String
968
968
  attr_accessor message: ::String
969
- attr_accessor message_type: ("RAW" | "DIGEST")
969
+ attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
970
970
  attr_accessor signature: ::String
971
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
971
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
972
972
  attr_accessor grant_tokens: ::Array[::String]
973
973
  attr_accessor dry_run: bool
974
974
  SENSITIVE: [:message]
@@ -977,7 +977,7 @@ module Aws::KMS
977
977
  class VerifyResponse
978
978
  attr_accessor key_id: ::String
979
979
  attr_accessor signature_valid: bool
980
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
980
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
981
981
  SENSITIVE: []
982
982
  end
983
983
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.104.0
4
+ version: 1.106.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services