aws-sdk-kms 1.116.0 → 1.117.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c4eb2a648acbddead266bcb95a6608654f439f91fb9d091d55a4967849ec3855
4
- data.tar.gz: faec355b13ce018945e5390e66d7496371665c3ecd2be47e8005c4a6b309e827
3
+ metadata.gz: 9190b06b6236c6657d8775c0e0b82387d3a287a06d941c2d6ca9ee5ab86fbe92
4
+ data.tar.gz: 96ac5a0f1ffa0d94902d0d85a2ae32fb9e1d90bae3b31ab3777f6da3d2a8a1f6
5
5
  SHA512:
6
- metadata.gz: 144ddfd505186599b73146764f9a50db60d70675fc33d6cc203d3a2791c98cd1203d646702ef1f0274d831e49bd3eeb09431b1e652d4463c6065c53945825ee3
7
- data.tar.gz: c99f71427bb4f99df68a00b2a135ea29c387c1627a9c4f7dc587f24b3b5b31346c769f34aa262c5dfffcd40090426df8ae2b1fd21709c381f56eff0b3b016562
6
+ metadata.gz: 22f84927d2c55a566453f0147279ae7f7e01d69b0cab21c0a6501414d3ecf359bbf0c800ef2bb5c246f68ee650056743f93210b67057a1969fc3f1d262036741
7
+ data.tar.gz: a75a199790f08b1d8623917c0b366371c7827be29b31075d4c7a9698c517cbc38c67b02c0813a621b4a6fc9bcb19d49172792b2d14b3a90de2076e5c4a65b044
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.117.0 (2025-11-07)
5
+ ------------------
6
+
7
+ * Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
8
+
4
9
  1.116.0 (2025-10-30)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.116.0
1
+ 1.117.0
@@ -1576,8 +1576,8 @@ module Aws::KMS
1576
1576
  # download the public key so it can be used outside of KMS. Each KMS
1577
1577
  # key can have only one key usage. KMS keys with RSA key pairs can be
1578
1578
  # used to encrypt and decrypt data or sign and verify messages (but
1579
- # not both). KMS keys with NIST-recommended ECC key pairs can be used
1580
- # to sign and verify messages or derive shared secrets (but not both).
1579
+ # not both). KMS keys with NIST-standard ECC key pairs can be used to
1580
+ # sign and verify messages or derive shared secrets (but not both).
1581
1581
  # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1582
1582
  # messages. KMS keys with ML-DSA key pairs can be used to sign and
1583
1583
  # verify messages. KMS keys with SM2 key pairs (China Regions only)
@@ -1827,8 +1827,8 @@ module Aws::KMS
1827
1827
  # * For asymmetric KMS keys with RSA key pairs, specify
1828
1828
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
1829
1829
  #
1830
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1831
- # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1830
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
1831
+ # specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1832
1832
  #
1833
1833
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1834
1834
  # `SIGN_VERIFY`.
@@ -1899,7 +1899,7 @@ module Aws::KMS
1899
1899
  # * `RSA_3072`
1900
1900
  #
1901
1901
  # * `RSA_4096`
1902
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
1902
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
1903
1903
  # verification -or- deriving shared secrets)
1904
1904
  #
1905
1905
  # * `ECC_NIST_P256` (secp256r1)
@@ -1907,6 +1907,17 @@ module Aws::KMS
1907
1907
  # * `ECC_NIST_P384` (secp384r1)
1908
1908
  #
1909
1909
  # * `ECC_NIST_P521` (secp521r1)
1910
+ #
1911
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
1912
+ #
1913
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
1914
+ # ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
1915
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
1916
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
1917
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
1918
+ # These message types cannot be used interchangeably.
1919
+ #
1920
+ # ^
1910
1921
  # * Other asymmetric elliptic curve key pairs (signing and verification)
1911
1922
  #
1912
1923
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
@@ -2422,7 +2433,7 @@ module Aws::KMS
2422
2433
  # description: "DescriptionType",
2423
2434
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2424
2435
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2425
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2436
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
2426
2437
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2427
2438
  # custom_key_store_id: "CustomKeyStoreIdType",
2428
2439
  # bypass_policy_lockout_safety_check: false,
@@ -2454,11 +2465,11 @@ module Aws::KMS
2454
2465
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2455
2466
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2456
2467
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2457
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2468
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
2458
2469
  # resp.key_metadata.encryption_algorithms #=> Array
2459
2470
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2460
2471
  # resp.key_metadata.signing_algorithms #=> Array
2461
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2472
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
2462
2473
  # resp.key_metadata.key_agreement_algorithms #=> Array
2463
2474
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2464
2475
  # resp.key_metadata.multi_region #=> Boolean
@@ -3086,8 +3097,8 @@ module Aws::KMS
3086
3097
 
3087
3098
  # Derives a shared secret using a key agreement algorithm.
3088
3099
  #
3089
- # <note markdown="1"> You must use an asymmetric NIST-recommended elliptic curve (ECC) or
3090
- # SM2 (China Regions only) KMS key pair with a `KeyUsage` value of
3100
+ # <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
3101
+ # (China Regions only) KMS key pair with a `KeyUsage` value of
3091
3102
  # `KEY_AGREEMENT` to call DeriveSharedSecret.
3092
3103
  #
3093
3104
  # </note>
@@ -3108,15 +3119,15 @@ module Aws::KMS
3108
3119
  # 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
3109
3120
  # with a `KeyUsage` value of `KEY_AGREEMENT`.
3110
3121
  #
3111
- # The asymmetric KMS key must use a NIST-recommended elliptic curve
3122
+ # The asymmetric KMS key must use a NIST-standard elliptic curve
3112
3123
  # (ECC) or SM2 (China Regions only) key spec.
3113
3124
  #
3114
3125
  # 2. **Bob** creates an elliptic curve key pair.
3115
3126
  #
3116
3127
  # Bob can call CreateKey to create an asymmetric KMS key pair or
3117
3128
  # generate a key pair outside of KMS. Bob's key pair must use the
3118
- # same NIST-recommended elliptic curve (ECC) or SM2 (China Regions
3119
- # ony) curve as Alice.
3129
+ # same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
3130
+ # curve as Alice.
3120
3131
  #
3121
3132
  # 3. Alice and Bob **exchange their public keys** through an insecure
3122
3133
  # communication channel (like the internet).
@@ -3143,12 +3154,12 @@ module Aws::KMS
3143
3154
  # his private key and Alice's public key.
3144
3155
  #
3145
3156
  # To derive a shared secret you must provide a key agreement algorithm,
3146
- # the private key of the caller's asymmetric NIST-recommended elliptic
3157
+ # the private key of the caller's asymmetric NIST-standard elliptic
3147
3158
  # curve or SM2 (China Regions only) KMS key pair, and the public key
3148
- # from your peer's NIST-recommended elliptic curve or SM2 (China
3149
- # Regions only) key pair. The public key can be from another asymmetric
3150
- # KMS key pair or from a key pair generated outside of KMS, but both key
3151
- # pairs must be on the same elliptic curve.
3159
+ # from your peer's NIST-standard elliptic curve or SM2 (China Regions
3160
+ # only) key pair. The public key can be from another asymmetric KMS key
3161
+ # pair or from a key pair generated outside of KMS, but both key pairs
3162
+ # must be on the same elliptic curve.
3152
3163
  #
3153
3164
  # The KMS key that you use for this operation must be in a compatible
3154
3165
  # key state. For details, see [Key states of KMS keys][3] in the *Key
@@ -3180,9 +3191,9 @@ module Aws::KMS
3180
3191
  # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
3181
3192
  #
3182
3193
  # @option params [required, String] :key_id
3183
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
3184
- # only) KMS key. KMS uses the private key in the specified key pair to
3185
- # derive the shared secret. The key usage of the KMS key must be
3194
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
3195
+ # KMS key. KMS uses the private key in the specified key pair to derive
3196
+ # the shared secret. The key usage of the KMS key must be
3186
3197
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
3187
3198
  # DescribeKey operation.
3188
3199
  #
@@ -3210,8 +3221,8 @@ module Aws::KMS
3210
3221
  # secret. The only valid value is `ECDH`.
3211
3222
  #
3212
3223
  # @option params [required, String, StringIO, File] :public_key
3213
- # Specifies the public key in your peer's NIST-recommended elliptic
3214
- # curve (ECC) or SM2 (China Regions only) key pair.
3224
+ # Specifies the public key in your peer's NIST-standard elliptic curve
3225
+ # (ECC) or SM2 (China Regions only) key pair.
3215
3226
  #
3216
3227
  # The public key must be a DER-encoded X.509 public key, also known as
3217
3228
  # `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
@@ -3975,11 +3986,11 @@ module Aws::KMS
3975
3986
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3976
3987
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3977
3988
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3978
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3989
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
3979
3990
  # resp.key_metadata.encryption_algorithms #=> Array
3980
3991
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3981
3992
  # resp.key_metadata.signing_algorithms #=> Array
3982
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
3993
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
3983
3994
  # resp.key_metadata.key_agreement_algorithms #=> Array
3984
3995
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3985
3996
  # resp.key_metadata.multi_region #=> Boolean
@@ -5358,7 +5369,7 @@ module Aws::KMS
5358
5369
  # "EncryptionContextKey" => "EncryptionContextValue",
5359
5370
  # },
5360
5371
  # key_id: "KeyIdType", # required
5361
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5372
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5362
5373
  # grant_tokens: ["GrantTokenType"],
5363
5374
  # recipient: {
5364
5375
  # key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
@@ -5373,7 +5384,7 @@ module Aws::KMS
5373
5384
  # resp.private_key_plaintext #=> String
5374
5385
  # resp.public_key #=> String
5375
5386
  # resp.key_id #=> String
5376
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5387
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5377
5388
  # resp.ciphertext_for_recipient #=> String
5378
5389
  # resp.key_material_id #=> String
5379
5390
  #
@@ -5576,7 +5587,7 @@ module Aws::KMS
5576
5587
  # "EncryptionContextKey" => "EncryptionContextValue",
5577
5588
  # },
5578
5589
  # key_id: "KeyIdType", # required
5579
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5590
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5580
5591
  # grant_tokens: ["GrantTokenType"],
5581
5592
  # dry_run: false,
5582
5593
  # })
@@ -5586,7 +5597,7 @@ module Aws::KMS
5586
5597
  # resp.private_key_ciphertext_blob #=> String
5587
5598
  # resp.public_key #=> String
5588
5599
  # resp.key_id #=> String
5589
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5600
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5590
5601
  # resp.key_material_id #=> String
5591
5602
  #
5592
5603
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
@@ -6750,12 +6761,12 @@ module Aws::KMS
6750
6761
  # resp.key_id #=> String
6751
6762
  # resp.public_key #=> String
6752
6763
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6753
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6764
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
6754
6765
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6755
6766
  # resp.encryption_algorithms #=> Array
6756
6767
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6757
6768
  # resp.signing_algorithms #=> Array
6758
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6769
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
6759
6770
  # resp.key_agreement_algorithms #=> Array
6760
6771
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6761
6772
  #
@@ -8928,11 +8939,11 @@ module Aws::KMS
8928
8939
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8929
8940
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8930
8941
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8931
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8942
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
8932
8943
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8933
8944
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8934
8945
  # resp.replica_key_metadata.signing_algorithms #=> Array
8935
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8946
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
8936
8947
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8937
8948
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8938
8949
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9605,6 +9616,13 @@ module Aws::KMS
9605
9616
  # with an unhashed message, the security of the signing operation can be
9606
9617
  # compromised.
9607
9618
  #
9619
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
9620
+ #
9621
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
9622
+ #
9623
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
9624
+ # `MessageType:DIGEST`
9625
+ #
9608
9626
  # When the value of `MessageType` is `DIGEST`, the length of the
9609
9627
  # `Message` value must match the length of hashed messages for the
9610
9628
  # specified signing algorithm.
@@ -9724,7 +9742,7 @@ module Aws::KMS
9724
9742
  # message: "data", # required
9725
9743
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9726
9744
  # grant_tokens: ["GrantTokenType"],
9727
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9745
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
9728
9746
  # dry_run: false,
9729
9747
  # })
9730
9748
  #
@@ -9732,7 +9750,7 @@ module Aws::KMS
9732
9750
  #
9733
9751
  # resp.key_id #=> String
9734
9752
  # resp.signature #=> String
9735
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9753
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
9736
9754
  #
9737
9755
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9738
9756
  #
@@ -10801,6 +10819,13 @@ module Aws::KMS
10801
10819
  # with an unhashed message, the security of the signing operation can be
10802
10820
  # compromised.
10803
10821
  #
10822
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
10823
+ #
10824
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
10825
+ #
10826
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
10827
+ # `MessageType:DIGEST`
10828
+ #
10804
10829
  # When the value of `MessageType` is `DIGEST`, the length of the
10805
10830
  # `Message` value must match the length of hashed messages for the
10806
10831
  # specified signing algorithm.
@@ -10921,7 +10946,7 @@ module Aws::KMS
10921
10946
  # message: "data", # required
10922
10947
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10923
10948
  # signature: "data", # required
10924
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10949
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
10925
10950
  # grant_tokens: ["GrantTokenType"],
10926
10951
  # dry_run: false,
10927
10952
  # })
@@ -10930,7 +10955,7 @@ module Aws::KMS
10930
10955
  #
10931
10956
  # resp.key_id #=> String
10932
10957
  # resp.signature_valid #=> Boolean
10933
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10958
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
10934
10959
  #
10935
10960
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10936
10961
  #
@@ -11099,7 +11124,7 @@ module Aws::KMS
11099
11124
  tracer: tracer
11100
11125
  )
11101
11126
  context[:gem_name] = 'aws-sdk-kms'
11102
- context[:gem_version] = '1.116.0'
11127
+ context[:gem_version] = '1.117.0'
11103
11128
  Seahorse::Client::Request.new(handlers, context)
11104
11129
  end
11105
11130
 
@@ -872,7 +872,7 @@ module Aws::KMS
872
872
  # * For asymmetric KMS keys with RSA key pairs, specify
873
873
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
874
874
  #
875
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
875
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key
876
876
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
877
877
  #
878
878
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
@@ -947,7 +947,7 @@ module Aws::KMS
947
947
  # * `RSA_3072`
948
948
  #
949
949
  # * `RSA_4096`
950
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
950
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
951
951
  # verification -or- deriving shared secrets)
952
952
  #
953
953
  # * `ECC_NIST_P256` (secp256r1)
@@ -955,6 +955,19 @@ module Aws::KMS
955
955
  # * `ECC_NIST_P384` (secp384r1)
956
956
  #
957
957
  # * `ECC_NIST_P521` (secp521r1)
958
+ #
959
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
960
+ # only
961
+ #
962
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
963
+ # ED25519\_SHA\_512 signing algorithm requires [
964
+ # `MessageType:RAW`
965
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
966
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
967
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
968
+ # These message types cannot be used interchangeably.
969
+ #
970
+ # ^
958
971
  # * Other asymmetric elliptic curve key pairs (signing and
959
972
  # verification)
960
973
  #
@@ -1850,7 +1863,7 @@ module Aws::KMS
1850
1863
  end
1851
1864
 
1852
1865
  # @!attribute [rw] key_id
1853
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
1866
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
1854
1867
  # only) KMS key. KMS uses the private key in the specified key pair to
1855
1868
  # derive the shared secret. The key usage of the KMS key must be
1856
1869
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
@@ -1882,7 +1895,7 @@ module Aws::KMS
1882
1895
  # @return [String]
1883
1896
  #
1884
1897
  # @!attribute [rw] public_key
1885
- # Specifies the public key in your peer's NIST-recommended elliptic
1898
+ # Specifies the public key in your peer's NIST-standard elliptic
1886
1899
  # curve (ECC) or SM2 (China Regions only) key pair.
1887
1900
  #
1888
1901
  # The public key must be a DER-encoded X.509 public key, also known as
@@ -6198,6 +6211,13 @@ module Aws::KMS
6198
6211
  # value with an unhashed message, the security of the signing
6199
6212
  # operation can be compromised.
6200
6213
  #
6214
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6215
+ #
6216
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6217
+ #
6218
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6219
+ # `MessageType:DIGEST`
6220
+ #
6201
6221
  # When the value of `MessageType` is `DIGEST`, the length of the
6202
6222
  # `Message` value must match the length of hashed messages for the
6203
6223
  # specified signing algorithm.
@@ -6892,6 +6912,13 @@ module Aws::KMS
6892
6912
  # value with an unhashed message, the security of the signing
6893
6913
  # operation can be compromised.
6894
6914
  #
6915
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6916
+ #
6917
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6918
+ #
6919
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6920
+ # `MessageType:DIGEST`
6921
+ #
6895
6922
  # When the value of `MessageType` is `DIGEST`, the length of the
6896
6923
  # `Message` value must match the length of hashed messages for the
6897
6924
  # specified signing algorithm.
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.116.0'
57
+ GEM_VERSION = '1.117.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -159,7 +159,7 @@ module Aws
159
159
  ?description: ::String,
160
160
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
161
161
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
162
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
162
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
163
163
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
164
164
  ?custom_key_store_id: ::String,
165
165
  ?bypass_policy_lockout_safety_check: bool,
@@ -352,7 +352,7 @@ module Aws
352
352
  def private_key_plaintext: () -> ::String
353
353
  def public_key: () -> ::String
354
354
  def key_id: () -> ::String
355
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
355
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
356
356
  def ciphertext_for_recipient: () -> ::String
357
357
  def key_material_id: () -> ::String
358
358
  end
@@ -360,7 +360,7 @@ module Aws
360
360
  def generate_data_key_pair: (
361
361
  ?encryption_context: Hash[::String, ::String],
362
362
  key_id: ::String,
363
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
363
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
364
364
  ?grant_tokens: Array[::String],
365
365
  ?recipient: {
366
366
  key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
@@ -375,14 +375,14 @@ module Aws
375
375
  def private_key_ciphertext_blob: () -> ::String
376
376
  def public_key: () -> ::String
377
377
  def key_id: () -> ::String
378
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
378
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
379
379
  def key_material_id: () -> ::String
380
380
  end
381
381
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
382
382
  def generate_data_key_pair_without_plaintext: (
383
383
  ?encryption_context: Hash[::String, ::String],
384
384
  key_id: ::String,
385
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
385
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
386
386
  ?grant_tokens: Array[::String],
387
387
  ?dry_run: bool
388
388
  ) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
@@ -483,10 +483,10 @@ module Aws
483
483
  def key_id: () -> ::String
484
484
  def public_key: () -> ::String
485
485
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
486
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
486
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
487
487
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
488
488
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
489
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
489
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
490
490
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
491
491
  end
492
492
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -714,7 +714,7 @@ module Aws
714
714
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
715
715
  def key_id: () -> ::String
716
716
  def signature: () -> ::String
717
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
717
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
718
718
  end
719
719
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
720
720
  def sign: (
@@ -722,7 +722,7 @@ module Aws
722
722
  message: ::String,
723
723
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
724
724
  ?grant_tokens: Array[::String],
725
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
725
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
726
726
  ?dry_run: bool
727
727
  ) -> _SignResponseSuccess
728
728
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -792,7 +792,7 @@ module Aws
792
792
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
793
793
  def key_id: () -> ::String
794
794
  def signature_valid: () -> bool
795
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
795
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
796
796
  end
797
797
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
798
798
  def verify: (
@@ -800,7 +800,7 @@ module Aws
800
800
  message: ::String,
801
801
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
802
802
  signature: ::String,
803
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
803
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
804
804
  ?grant_tokens: Array[::String],
805
805
  ?dry_run: bool
806
806
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -119,7 +119,7 @@ module Aws::KMS
119
119
  attr_accessor description: ::String
120
120
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
121
121
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
122
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
123
123
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
124
124
  attr_accessor custom_key_store_id: ::String
125
125
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -326,7 +326,7 @@ module Aws::KMS
326
326
  class GenerateDataKeyPairRequest
327
327
  attr_accessor encryption_context: ::Hash[::String, ::String]
328
328
  attr_accessor key_id: ::String
329
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
329
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
330
330
  attr_accessor grant_tokens: ::Array[::String]
331
331
  attr_accessor recipient: Types::RecipientInfo
332
332
  attr_accessor dry_run: bool
@@ -338,7 +338,7 @@ module Aws::KMS
338
338
  attr_accessor private_key_plaintext: ::String
339
339
  attr_accessor public_key: ::String
340
340
  attr_accessor key_id: ::String
341
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
341
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
342
342
  attr_accessor ciphertext_for_recipient: ::String
343
343
  attr_accessor key_material_id: ::String
344
344
  SENSITIVE: [:private_key_plaintext]
@@ -347,7 +347,7 @@ module Aws::KMS
347
347
  class GenerateDataKeyPairWithoutPlaintextRequest
348
348
  attr_accessor encryption_context: ::Hash[::String, ::String]
349
349
  attr_accessor key_id: ::String
350
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
350
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
351
351
  attr_accessor grant_tokens: ::Array[::String]
352
352
  attr_accessor dry_run: bool
353
353
  SENSITIVE: []
@@ -357,7 +357,7 @@ module Aws::KMS
357
357
  attr_accessor private_key_ciphertext_blob: ::String
358
358
  attr_accessor public_key: ::String
359
359
  attr_accessor key_id: ::String
360
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
360
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
361
361
  attr_accessor key_material_id: ::String
362
362
  SENSITIVE: []
363
363
  end
@@ -479,10 +479,10 @@ module Aws::KMS
479
479
  attr_accessor key_id: ::String
480
480
  attr_accessor public_key: ::String
481
481
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
482
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
482
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
483
483
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
484
484
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
485
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
485
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
486
486
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
487
487
  SENSITIVE: []
488
488
  end
@@ -622,9 +622,9 @@ module Aws::KMS
622
622
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
623
623
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
624
624
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
625
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
625
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
626
626
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
627
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
627
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
628
628
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
629
629
  attr_accessor multi_region: bool
630
630
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -873,7 +873,7 @@ module Aws::KMS
873
873
  attr_accessor message: ::String
874
874
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
875
875
  attr_accessor grant_tokens: ::Array[::String]
876
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
876
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
877
877
  attr_accessor dry_run: bool
878
878
  SENSITIVE: [:message]
879
879
  end
@@ -881,7 +881,7 @@ module Aws::KMS
881
881
  class SignResponse
882
882
  attr_accessor key_id: ::String
883
883
  attr_accessor signature: ::String
884
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
884
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
885
885
  SENSITIVE: []
886
886
  end
887
887
 
@@ -970,7 +970,7 @@ module Aws::KMS
970
970
  attr_accessor message: ::String
971
971
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
972
972
  attr_accessor signature: ::String
973
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
973
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
974
974
  attr_accessor grant_tokens: ::Array[::String]
975
975
  attr_accessor dry_run: bool
976
976
  SENSITIVE: [:message]
@@ -979,7 +979,7 @@ module Aws::KMS
979
979
  class VerifyResponse
980
980
  attr_accessor key_id: ::String
981
981
  attr_accessor signature_valid: bool
982
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
982
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
983
983
  SENSITIVE: []
984
984
  end
985
985
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.116.0
4
+ version: 1.117.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services