aws-sdk-kms 1.116.0 → 1.117.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +63 -38
- data/lib/aws-sdk-kms/types.rb +31 -4
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +11 -11
- data/sig/types.rbs +13 -13
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 9190b06b6236c6657d8775c0e0b82387d3a287a06d941c2d6ca9ee5ab86fbe92
|
|
4
|
+
data.tar.gz: 96ac5a0f1ffa0d94902d0d85a2ae32fb9e1d90bae3b31ab3777f6da3d2a8a1f6
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 22f84927d2c55a566453f0147279ae7f7e01d69b0cab21c0a6501414d3ecf359bbf0c800ef2bb5c246f68ee650056743f93210b67057a1969fc3f1d262036741
|
|
7
|
+
data.tar.gz: a75a199790f08b1d8623917c0b366371c7827be29b31075d4c7a9698c517cbc38c67b02c0813a621b4a6fc9bcb19d49172792b2d14b3a90de2076e5c4a65b044
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.117.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
|
@@ -1576,8 +1576,8 @@ module Aws::KMS
|
|
|
1576
1576
|
# download the public key so it can be used outside of KMS. Each KMS
|
|
1577
1577
|
# key can have only one key usage. KMS keys with RSA key pairs can be
|
|
1578
1578
|
# used to encrypt and decrypt data or sign and verify messages (but
|
|
1579
|
-
# not both). KMS keys with NIST-
|
|
1580
|
-
#
|
|
1579
|
+
# not both). KMS keys with NIST-standard ECC key pairs can be used to
|
|
1580
|
+
# sign and verify messages or derive shared secrets (but not both).
|
|
1581
1581
|
# KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
|
|
1582
1582
|
# messages. KMS keys with ML-DSA key pairs can be used to sign and
|
|
1583
1583
|
# verify messages. KMS keys with SM2 key pairs (China Regions only)
|
|
@@ -1827,8 +1827,8 @@ module Aws::KMS
|
|
|
1827
1827
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
1828
1828
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
1829
1829
|
#
|
|
1830
|
-
# * For asymmetric KMS keys with NIST-
|
|
1831
|
-
#
|
|
1830
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
|
|
1831
|
+
# specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
1832
1832
|
#
|
|
1833
1833
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
1834
1834
|
# `SIGN_VERIFY`.
|
|
@@ -1899,7 +1899,7 @@ module Aws::KMS
|
|
|
1899
1899
|
# * `RSA_3072`
|
|
1900
1900
|
#
|
|
1901
1901
|
# * `RSA_4096`
|
|
1902
|
-
# * Asymmetric NIST-
|
|
1902
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
1903
1903
|
# verification -or- deriving shared secrets)
|
|
1904
1904
|
#
|
|
1905
1905
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -1907,6 +1907,17 @@ module Aws::KMS
|
|
|
1907
1907
|
# * `ECC_NIST_P384` (secp384r1)
|
|
1908
1908
|
#
|
|
1909
1909
|
# * `ECC_NIST_P521` (secp521r1)
|
|
1910
|
+
#
|
|
1911
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
|
|
1912
|
+
#
|
|
1913
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
1914
|
+
# ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
|
|
1915
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
1916
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
1917
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
1918
|
+
# These message types cannot be used interchangeably.
|
|
1919
|
+
#
|
|
1920
|
+
# ^
|
|
1910
1921
|
# * Other asymmetric elliptic curve key pairs (signing and verification)
|
|
1911
1922
|
#
|
|
1912
1923
|
# * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
|
|
@@ -2422,7 +2433,7 @@ module Aws::KMS
|
|
|
2422
2433
|
# description: "DescriptionType",
|
|
2423
2434
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
|
|
2424
2435
|
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
|
2425
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
|
|
2436
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
|
|
2426
2437
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
|
|
2427
2438
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
|
2428
2439
|
# bypass_policy_lockout_safety_check: false,
|
|
@@ -2454,11 +2465,11 @@ module Aws::KMS
|
|
|
2454
2465
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
2455
2466
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
2456
2467
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
2457
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
2468
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
2458
2469
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
2459
2470
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
2460
2471
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
2461
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
2472
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
2462
2473
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
2463
2474
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
2464
2475
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -3086,8 +3097,8 @@ module Aws::KMS
|
|
|
3086
3097
|
|
|
3087
3098
|
# Derives a shared secret using a key agreement algorithm.
|
|
3088
3099
|
#
|
|
3089
|
-
# <note markdown="1"> You must use an asymmetric NIST-
|
|
3090
|
-
#
|
|
3100
|
+
# <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
|
|
3101
|
+
# (China Regions only) KMS key pair with a `KeyUsage` value of
|
|
3091
3102
|
# `KEY_AGREEMENT` to call DeriveSharedSecret.
|
|
3092
3103
|
#
|
|
3093
3104
|
# </note>
|
|
@@ -3108,15 +3119,15 @@ module Aws::KMS
|
|
|
3108
3119
|
# 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
|
|
3109
3120
|
# with a `KeyUsage` value of `KEY_AGREEMENT`.
|
|
3110
3121
|
#
|
|
3111
|
-
# The asymmetric KMS key must use a NIST-
|
|
3122
|
+
# The asymmetric KMS key must use a NIST-standard elliptic curve
|
|
3112
3123
|
# (ECC) or SM2 (China Regions only) key spec.
|
|
3113
3124
|
#
|
|
3114
3125
|
# 2. **Bob** creates an elliptic curve key pair.
|
|
3115
3126
|
#
|
|
3116
3127
|
# Bob can call CreateKey to create an asymmetric KMS key pair or
|
|
3117
3128
|
# generate a key pair outside of KMS. Bob's key pair must use the
|
|
3118
|
-
# same NIST-
|
|
3119
|
-
#
|
|
3129
|
+
# same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
|
|
3130
|
+
# curve as Alice.
|
|
3120
3131
|
#
|
|
3121
3132
|
# 3. Alice and Bob **exchange their public keys** through an insecure
|
|
3122
3133
|
# communication channel (like the internet).
|
|
@@ -3143,12 +3154,12 @@ module Aws::KMS
|
|
|
3143
3154
|
# his private key and Alice's public key.
|
|
3144
3155
|
#
|
|
3145
3156
|
# To derive a shared secret you must provide a key agreement algorithm,
|
|
3146
|
-
# the private key of the caller's asymmetric NIST-
|
|
3157
|
+
# the private key of the caller's asymmetric NIST-standard elliptic
|
|
3147
3158
|
# curve or SM2 (China Regions only) KMS key pair, and the public key
|
|
3148
|
-
# from your peer's NIST-
|
|
3149
|
-
#
|
|
3150
|
-
#
|
|
3151
|
-
#
|
|
3159
|
+
# from your peer's NIST-standard elliptic curve or SM2 (China Regions
|
|
3160
|
+
# only) key pair. The public key can be from another asymmetric KMS key
|
|
3161
|
+
# pair or from a key pair generated outside of KMS, but both key pairs
|
|
3162
|
+
# must be on the same elliptic curve.
|
|
3152
3163
|
#
|
|
3153
3164
|
# The KMS key that you use for this operation must be in a compatible
|
|
3154
3165
|
# key state. For details, see [Key states of KMS keys][3] in the *Key
|
|
@@ -3180,9 +3191,9 @@ module Aws::KMS
|
|
|
3180
3191
|
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
3181
3192
|
#
|
|
3182
3193
|
# @option params [required, String] :key_id
|
|
3183
|
-
# Identifies an asymmetric NIST-
|
|
3184
|
-
#
|
|
3185
|
-
#
|
|
3194
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
|
|
3195
|
+
# KMS key. KMS uses the private key in the specified key pair to derive
|
|
3196
|
+
# the shared secret. The key usage of the KMS key must be
|
|
3186
3197
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
3187
3198
|
# DescribeKey operation.
|
|
3188
3199
|
#
|
|
@@ -3210,8 +3221,8 @@ module Aws::KMS
|
|
|
3210
3221
|
# secret. The only valid value is `ECDH`.
|
|
3211
3222
|
#
|
|
3212
3223
|
# @option params [required, String, StringIO, File] :public_key
|
|
3213
|
-
# Specifies the public key in your peer's NIST-
|
|
3214
|
-
#
|
|
3224
|
+
# Specifies the public key in your peer's NIST-standard elliptic curve
|
|
3225
|
+
# (ECC) or SM2 (China Regions only) key pair.
|
|
3215
3226
|
#
|
|
3216
3227
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
3217
3228
|
# `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
|
|
@@ -3975,11 +3986,11 @@ module Aws::KMS
|
|
|
3975
3986
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
3976
3987
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
3977
3988
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
3978
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
3989
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
3979
3990
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
3980
3991
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
3981
3992
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
3982
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
3993
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
3983
3994
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
3984
3995
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
3985
3996
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -5358,7 +5369,7 @@ module Aws::KMS
|
|
|
5358
5369
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5359
5370
|
# },
|
|
5360
5371
|
# key_id: "KeyIdType", # required
|
|
5361
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5372
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5362
5373
|
# grant_tokens: ["GrantTokenType"],
|
|
5363
5374
|
# recipient: {
|
|
5364
5375
|
# key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
|
|
@@ -5373,7 +5384,7 @@ module Aws::KMS
|
|
|
5373
5384
|
# resp.private_key_plaintext #=> String
|
|
5374
5385
|
# resp.public_key #=> String
|
|
5375
5386
|
# resp.key_id #=> String
|
|
5376
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5387
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5377
5388
|
# resp.ciphertext_for_recipient #=> String
|
|
5378
5389
|
# resp.key_material_id #=> String
|
|
5379
5390
|
#
|
|
@@ -5576,7 +5587,7 @@ module Aws::KMS
|
|
|
5576
5587
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5577
5588
|
# },
|
|
5578
5589
|
# key_id: "KeyIdType", # required
|
|
5579
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5590
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5580
5591
|
# grant_tokens: ["GrantTokenType"],
|
|
5581
5592
|
# dry_run: false,
|
|
5582
5593
|
# })
|
|
@@ -5586,7 +5597,7 @@ module Aws::KMS
|
|
|
5586
5597
|
# resp.private_key_ciphertext_blob #=> String
|
|
5587
5598
|
# resp.public_key #=> String
|
|
5588
5599
|
# resp.key_id #=> String
|
|
5589
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5600
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5590
5601
|
# resp.key_material_id #=> String
|
|
5591
5602
|
#
|
|
5592
5603
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
|
|
@@ -6750,12 +6761,12 @@ module Aws::KMS
|
|
|
6750
6761
|
# resp.key_id #=> String
|
|
6751
6762
|
# resp.public_key #=> String
|
|
6752
6763
|
# resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
6753
|
-
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
6764
|
+
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
6754
6765
|
# resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
|
|
6755
6766
|
# resp.encryption_algorithms #=> Array
|
|
6756
6767
|
# resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
6757
6768
|
# resp.signing_algorithms #=> Array
|
|
6758
|
-
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
6769
|
+
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
6759
6770
|
# resp.key_agreement_algorithms #=> Array
|
|
6760
6771
|
# resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
6761
6772
|
#
|
|
@@ -8928,11 +8939,11 @@ module Aws::KMS
|
|
|
8928
8939
|
# resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
8929
8940
|
# resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
8930
8941
|
# resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
8931
|
-
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
8942
|
+
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
8932
8943
|
# resp.replica_key_metadata.encryption_algorithms #=> Array
|
|
8933
8944
|
# resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
8934
8945
|
# resp.replica_key_metadata.signing_algorithms #=> Array
|
|
8935
|
-
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
8946
|
+
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
8936
8947
|
# resp.replica_key_metadata.key_agreement_algorithms #=> Array
|
|
8937
8948
|
# resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
8938
8949
|
# resp.replica_key_metadata.multi_region #=> Boolean
|
|
@@ -9605,6 +9616,13 @@ module Aws::KMS
|
|
|
9605
9616
|
# with an unhashed message, the security of the signing operation can be
|
|
9606
9617
|
# compromised.
|
|
9607
9618
|
#
|
|
9619
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
9620
|
+
#
|
|
9621
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
9622
|
+
#
|
|
9623
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
9624
|
+
# `MessageType:DIGEST`
|
|
9625
|
+
#
|
|
9608
9626
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
9609
9627
|
# `Message` value must match the length of hashed messages for the
|
|
9610
9628
|
# specified signing algorithm.
|
|
@@ -9724,7 +9742,7 @@ module Aws::KMS
|
|
|
9724
9742
|
# message: "data", # required
|
|
9725
9743
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
9726
9744
|
# grant_tokens: ["GrantTokenType"],
|
|
9727
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
9745
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
9728
9746
|
# dry_run: false,
|
|
9729
9747
|
# })
|
|
9730
9748
|
#
|
|
@@ -9732,7 +9750,7 @@ module Aws::KMS
|
|
|
9732
9750
|
#
|
|
9733
9751
|
# resp.key_id #=> String
|
|
9734
9752
|
# resp.signature #=> String
|
|
9735
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
9753
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
9736
9754
|
#
|
|
9737
9755
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
|
|
9738
9756
|
#
|
|
@@ -10801,6 +10819,13 @@ module Aws::KMS
|
|
|
10801
10819
|
# with an unhashed message, the security of the signing operation can be
|
|
10802
10820
|
# compromised.
|
|
10803
10821
|
#
|
|
10822
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
10823
|
+
#
|
|
10824
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
10825
|
+
#
|
|
10826
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
10827
|
+
# `MessageType:DIGEST`
|
|
10828
|
+
#
|
|
10804
10829
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
10805
10830
|
# `Message` value must match the length of hashed messages for the
|
|
10806
10831
|
# specified signing algorithm.
|
|
@@ -10921,7 +10946,7 @@ module Aws::KMS
|
|
|
10921
10946
|
# message: "data", # required
|
|
10922
10947
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
10923
10948
|
# signature: "data", # required
|
|
10924
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
10949
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
10925
10950
|
# grant_tokens: ["GrantTokenType"],
|
|
10926
10951
|
# dry_run: false,
|
|
10927
10952
|
# })
|
|
@@ -10930,7 +10955,7 @@ module Aws::KMS
|
|
|
10930
10955
|
#
|
|
10931
10956
|
# resp.key_id #=> String
|
|
10932
10957
|
# resp.signature_valid #=> Boolean
|
|
10933
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
10958
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
10934
10959
|
#
|
|
10935
10960
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
|
|
10936
10961
|
#
|
|
@@ -11099,7 +11124,7 @@ module Aws::KMS
|
|
|
11099
11124
|
tracer: tracer
|
|
11100
11125
|
)
|
|
11101
11126
|
context[:gem_name] = 'aws-sdk-kms'
|
|
11102
|
-
context[:gem_version] = '1.
|
|
11127
|
+
context[:gem_version] = '1.117.0'
|
|
11103
11128
|
Seahorse::Client::Request.new(handlers, context)
|
|
11104
11129
|
end
|
|
11105
11130
|
|
data/lib/aws-sdk-kms/types.rb
CHANGED
|
@@ -872,7 +872,7 @@ module Aws::KMS
|
|
|
872
872
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
873
873
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
874
874
|
#
|
|
875
|
-
# * For asymmetric KMS keys with NIST-
|
|
875
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key
|
|
876
876
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
877
877
|
#
|
|
878
878
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
@@ -947,7 +947,7 @@ module Aws::KMS
|
|
|
947
947
|
# * `RSA_3072`
|
|
948
948
|
#
|
|
949
949
|
# * `RSA_4096`
|
|
950
|
-
# * Asymmetric NIST-
|
|
950
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
951
951
|
# verification -or- deriving shared secrets)
|
|
952
952
|
#
|
|
953
953
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -955,6 +955,19 @@ module Aws::KMS
|
|
|
955
955
|
# * `ECC_NIST_P384` (secp384r1)
|
|
956
956
|
#
|
|
957
957
|
# * `ECC_NIST_P521` (secp521r1)
|
|
958
|
+
#
|
|
959
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
|
|
960
|
+
# only
|
|
961
|
+
#
|
|
962
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
963
|
+
# ED25519\_SHA\_512 signing algorithm requires [
|
|
964
|
+
# `MessageType:RAW`
|
|
965
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
966
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
967
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
968
|
+
# These message types cannot be used interchangeably.
|
|
969
|
+
#
|
|
970
|
+
# ^
|
|
958
971
|
# * Other asymmetric elliptic curve key pairs (signing and
|
|
959
972
|
# verification)
|
|
960
973
|
#
|
|
@@ -1850,7 +1863,7 @@ module Aws::KMS
|
|
|
1850
1863
|
end
|
|
1851
1864
|
|
|
1852
1865
|
# @!attribute [rw] key_id
|
|
1853
|
-
# Identifies an asymmetric NIST-
|
|
1866
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
|
|
1854
1867
|
# only) KMS key. KMS uses the private key in the specified key pair to
|
|
1855
1868
|
# derive the shared secret. The key usage of the KMS key must be
|
|
1856
1869
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
@@ -1882,7 +1895,7 @@ module Aws::KMS
|
|
|
1882
1895
|
# @return [String]
|
|
1883
1896
|
#
|
|
1884
1897
|
# @!attribute [rw] public_key
|
|
1885
|
-
# Specifies the public key in your peer's NIST-
|
|
1898
|
+
# Specifies the public key in your peer's NIST-standard elliptic
|
|
1886
1899
|
# curve (ECC) or SM2 (China Regions only) key pair.
|
|
1887
1900
|
#
|
|
1888
1901
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
@@ -6198,6 +6211,13 @@ module Aws::KMS
|
|
|
6198
6211
|
# value with an unhashed message, the security of the signing
|
|
6199
6212
|
# operation can be compromised.
|
|
6200
6213
|
#
|
|
6214
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6215
|
+
#
|
|
6216
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6217
|
+
#
|
|
6218
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6219
|
+
# `MessageType:DIGEST`
|
|
6220
|
+
#
|
|
6201
6221
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6202
6222
|
# `Message` value must match the length of hashed messages for the
|
|
6203
6223
|
# specified signing algorithm.
|
|
@@ -6892,6 +6912,13 @@ module Aws::KMS
|
|
|
6892
6912
|
# value with an unhashed message, the security of the signing
|
|
6893
6913
|
# operation can be compromised.
|
|
6894
6914
|
#
|
|
6915
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6916
|
+
#
|
|
6917
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6918
|
+
#
|
|
6919
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6920
|
+
# `MessageType:DIGEST`
|
|
6921
|
+
#
|
|
6895
6922
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6896
6923
|
# `Message` value must match the length of hashed messages for the
|
|
6897
6924
|
# specified signing algorithm.
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -159,7 +159,7 @@ module Aws
|
|
|
159
159
|
?description: ::String,
|
|
160
160
|
?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
|
|
161
161
|
?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
|
162
|
-
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
|
|
162
|
+
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
|
|
163
163
|
?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
|
|
164
164
|
?custom_key_store_id: ::String,
|
|
165
165
|
?bypass_policy_lockout_safety_check: bool,
|
|
@@ -352,7 +352,7 @@ module Aws
|
|
|
352
352
|
def private_key_plaintext: () -> ::String
|
|
353
353
|
def public_key: () -> ::String
|
|
354
354
|
def key_id: () -> ::String
|
|
355
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
355
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
356
356
|
def ciphertext_for_recipient: () -> ::String
|
|
357
357
|
def key_material_id: () -> ::String
|
|
358
358
|
end
|
|
@@ -360,7 +360,7 @@ module Aws
|
|
|
360
360
|
def generate_data_key_pair: (
|
|
361
361
|
?encryption_context: Hash[::String, ::String],
|
|
362
362
|
key_id: ::String,
|
|
363
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
363
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
364
364
|
?grant_tokens: Array[::String],
|
|
365
365
|
?recipient: {
|
|
366
366
|
key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
|
|
@@ -375,14 +375,14 @@ module Aws
|
|
|
375
375
|
def private_key_ciphertext_blob: () -> ::String
|
|
376
376
|
def public_key: () -> ::String
|
|
377
377
|
def key_id: () -> ::String
|
|
378
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
378
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
379
379
|
def key_material_id: () -> ::String
|
|
380
380
|
end
|
|
381
381
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
|
|
382
382
|
def generate_data_key_pair_without_plaintext: (
|
|
383
383
|
?encryption_context: Hash[::String, ::String],
|
|
384
384
|
key_id: ::String,
|
|
385
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
385
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
386
386
|
?grant_tokens: Array[::String],
|
|
387
387
|
?dry_run: bool
|
|
388
388
|
) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
|
|
@@ -483,10 +483,10 @@ module Aws
|
|
|
483
483
|
def key_id: () -> ::String
|
|
484
484
|
def public_key: () -> ::String
|
|
485
485
|
def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
486
|
-
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
486
|
+
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
487
487
|
def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
488
488
|
def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
489
|
-
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
489
|
+
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
490
490
|
def key_agreement_algorithms: () -> ::Array[("ECDH")]
|
|
491
491
|
end
|
|
492
492
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
|
|
@@ -714,7 +714,7 @@ module Aws
|
|
|
714
714
|
include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
|
|
715
715
|
def key_id: () -> ::String
|
|
716
716
|
def signature: () -> ::String
|
|
717
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
717
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
718
718
|
end
|
|
719
719
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
|
|
720
720
|
def sign: (
|
|
@@ -722,7 +722,7 @@ module Aws
|
|
|
722
722
|
message: ::String,
|
|
723
723
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
724
724
|
?grant_tokens: Array[::String],
|
|
725
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
725
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
726
726
|
?dry_run: bool
|
|
727
727
|
) -> _SignResponseSuccess
|
|
728
728
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
|
|
@@ -792,7 +792,7 @@ module Aws
|
|
|
792
792
|
include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
|
|
793
793
|
def key_id: () -> ::String
|
|
794
794
|
def signature_valid: () -> bool
|
|
795
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
795
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
796
796
|
end
|
|
797
797
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
|
|
798
798
|
def verify: (
|
|
@@ -800,7 +800,7 @@ module Aws
|
|
|
800
800
|
message: ::String,
|
|
801
801
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
802
802
|
signature: ::String,
|
|
803
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
803
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
804
804
|
?grant_tokens: Array[::String],
|
|
805
805
|
?dry_run: bool
|
|
806
806
|
) -> _VerifyResponseSuccess
|
data/sig/types.rbs
CHANGED
|
@@ -119,7 +119,7 @@ module Aws::KMS
|
|
|
119
119
|
attr_accessor description: ::String
|
|
120
120
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
121
121
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
122
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
122
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
123
123
|
attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
|
|
124
124
|
attr_accessor custom_key_store_id: ::String
|
|
125
125
|
attr_accessor bypass_policy_lockout_safety_check: bool
|
|
@@ -326,7 +326,7 @@ module Aws::KMS
|
|
|
326
326
|
class GenerateDataKeyPairRequest
|
|
327
327
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
328
328
|
attr_accessor key_id: ::String
|
|
329
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
329
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
330
330
|
attr_accessor grant_tokens: ::Array[::String]
|
|
331
331
|
attr_accessor recipient: Types::RecipientInfo
|
|
332
332
|
attr_accessor dry_run: bool
|
|
@@ -338,7 +338,7 @@ module Aws::KMS
|
|
|
338
338
|
attr_accessor private_key_plaintext: ::String
|
|
339
339
|
attr_accessor public_key: ::String
|
|
340
340
|
attr_accessor key_id: ::String
|
|
341
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
341
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
342
342
|
attr_accessor ciphertext_for_recipient: ::String
|
|
343
343
|
attr_accessor key_material_id: ::String
|
|
344
344
|
SENSITIVE: [:private_key_plaintext]
|
|
@@ -347,7 +347,7 @@ module Aws::KMS
|
|
|
347
347
|
class GenerateDataKeyPairWithoutPlaintextRequest
|
|
348
348
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
349
349
|
attr_accessor key_id: ::String
|
|
350
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
350
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
351
351
|
attr_accessor grant_tokens: ::Array[::String]
|
|
352
352
|
attr_accessor dry_run: bool
|
|
353
353
|
SENSITIVE: []
|
|
@@ -357,7 +357,7 @@ module Aws::KMS
|
|
|
357
357
|
attr_accessor private_key_ciphertext_blob: ::String
|
|
358
358
|
attr_accessor public_key: ::String
|
|
359
359
|
attr_accessor key_id: ::String
|
|
360
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
360
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
361
361
|
attr_accessor key_material_id: ::String
|
|
362
362
|
SENSITIVE: []
|
|
363
363
|
end
|
|
@@ -479,10 +479,10 @@ module Aws::KMS
|
|
|
479
479
|
attr_accessor key_id: ::String
|
|
480
480
|
attr_accessor public_key: ::String
|
|
481
481
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
482
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
482
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
483
483
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
484
484
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
485
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
485
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
486
486
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
487
487
|
SENSITIVE: []
|
|
488
488
|
end
|
|
@@ -622,9 +622,9 @@ module Aws::KMS
|
|
|
622
622
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
|
623
623
|
attr_accessor key_manager: ("AWS" | "CUSTOMER")
|
|
624
624
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
625
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
625
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
626
626
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
627
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
627
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
628
628
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
629
629
|
attr_accessor multi_region: bool
|
|
630
630
|
attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
|
|
@@ -873,7 +873,7 @@ module Aws::KMS
|
|
|
873
873
|
attr_accessor message: ::String
|
|
874
874
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
875
875
|
attr_accessor grant_tokens: ::Array[::String]
|
|
876
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
876
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
877
877
|
attr_accessor dry_run: bool
|
|
878
878
|
SENSITIVE: [:message]
|
|
879
879
|
end
|
|
@@ -881,7 +881,7 @@ module Aws::KMS
|
|
|
881
881
|
class SignResponse
|
|
882
882
|
attr_accessor key_id: ::String
|
|
883
883
|
attr_accessor signature: ::String
|
|
884
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
884
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
885
885
|
SENSITIVE: []
|
|
886
886
|
end
|
|
887
887
|
|
|
@@ -970,7 +970,7 @@ module Aws::KMS
|
|
|
970
970
|
attr_accessor message: ::String
|
|
971
971
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
972
972
|
attr_accessor signature: ::String
|
|
973
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
973
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
974
974
|
attr_accessor grant_tokens: ::Array[::String]
|
|
975
975
|
attr_accessor dry_run: bool
|
|
976
976
|
SENSITIVE: [:message]
|
|
@@ -979,7 +979,7 @@ module Aws::KMS
|
|
|
979
979
|
class VerifyResponse
|
|
980
980
|
attr_accessor key_id: ::String
|
|
981
981
|
attr_accessor signature_valid: bool
|
|
982
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
982
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
983
983
|
SENSITIVE: []
|
|
984
984
|
end
|
|
985
985
|
|