aws-sdk-kms 1.104.0 → 1.105.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +154 -62
- data/lib/aws-sdk-kms/types.rb +55 -23
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +9 -9
- data/sig/types.rbs +11 -11
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6331c0f383f2fd8b5dab1615773be873e0c6ce311a925149fc85395af789c1e4
|
4
|
+
data.tar.gz: 86568fac92b7e542850dc896ce2df41b63d6520560f87b6e0b90dfc004540957
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 2baa1bbe70fc7b7b5d21c1edaf96eb806d8429b5036ccbbeb7ee03f5d1b41b627700d9ce02e57b3bd91d583e972ae4ef67c1ee1c3e4e7e4f6dc7bc4299581fb8
|
7
|
+
data.tar.gz: fa84328e25889582146f85efad204401551d70d76fc7d99bfeacacbef58553dd874872b8cace82443edecb0f35a297fbaed6a99d303548267de71de48c9cfae3
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.105.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
@@ -1555,20 +1555,21 @@ module Aws::KMS
|
|
1555
1555
|
# properties after the KMS key is created.
|
1556
1556
|
#
|
1557
1557
|
# Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC)
|
1558
|
-
# key pair, or an SM2 key pair (China Regions only).
|
1559
|
-
# in an asymmetric KMS key never leaves KMS
|
1560
|
-
# can use the GetPublicKey operation to
|
1561
|
-
# can be used outside of KMS. Each KMS
|
1562
|
-
# usage. KMS keys with RSA key pairs can be
|
1563
|
-
# decrypt data or sign and verify messages (but
|
1564
|
-
# with NIST-recommended ECC key pairs can be used
|
1565
|
-
# messages or derive shared secrets (but not both).
|
1566
|
-
# `ECC_SECG_P256K1` can be used only to sign and verify
|
1567
|
-
# keys with
|
1568
|
-
#
|
1569
|
-
#
|
1570
|
-
#
|
1571
|
-
#
|
1558
|
+
# key pair, ML-DSA key pair or an SM2 key pair (China Regions only).
|
1559
|
+
# The private key in an asymmetric KMS key never leaves KMS
|
1560
|
+
# unencrypted. However, you can use the GetPublicKey operation to
|
1561
|
+
# download the public key so it can be used outside of KMS. Each KMS
|
1562
|
+
# key can have only one key usage. KMS keys with RSA key pairs can be
|
1563
|
+
# used to encrypt and decrypt data or sign and verify messages (but
|
1564
|
+
# not both). KMS keys with NIST-recommended ECC key pairs can be used
|
1565
|
+
# to sign and verify messages or derive shared secrets (but not both).
|
1566
|
+
# KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
|
1567
|
+
# messages. KMS keys with ML-DSA key pairs can be used to sign and
|
1568
|
+
# verify messages. KMS keys with SM2 key pairs (China Regions only)
|
1569
|
+
# can be used to either encrypt and decrypt data, sign and verify
|
1570
|
+
# messages, or derive shared secrets (you must choose one key usage
|
1571
|
+
# type). For information about asymmetric KMS keys, see [Asymmetric
|
1572
|
+
# KMS keys][2] in the *Key Management Service Developer Guide*.
|
1572
1573
|
#
|
1573
1574
|
#
|
1574
1575
|
#
|
@@ -1812,7 +1813,10 @@ module Aws::KMS
|
|
1812
1813
|
# * For asymmetric KMS keys with NIST-recommended elliptic curve key
|
1813
1814
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
1814
1815
|
#
|
1815
|
-
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
|
1816
|
+
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
1817
|
+
# `SIGN_VERIFY`.
|
1818
|
+
#
|
1819
|
+
# * For asymmetric KMS keys with ML-DSA key pairs, specify
|
1816
1820
|
# `SIGN_VERIFY`.
|
1817
1821
|
#
|
1818
1822
|
# * For asymmetric KMS keys with SM2 key pairs (China Regions only),
|
@@ -1889,6 +1893,13 @@ module Aws::KMS
|
|
1889
1893
|
# * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
|
1890
1894
|
#
|
1891
1895
|
# ^
|
1896
|
+
# * Asymmetric ML-DSA key pairs (signing and verification)
|
1897
|
+
#
|
1898
|
+
# * `ML_DSA_44`
|
1899
|
+
#
|
1900
|
+
# * `ML_DSA_65`
|
1901
|
+
#
|
1902
|
+
# * `ML_DSA_87`
|
1892
1903
|
# * SM2 key pairs (encryption and decryption -or- signing and
|
1893
1904
|
# verification -or- deriving shared secrets)
|
1894
1905
|
#
|
@@ -2094,6 +2105,7 @@ module Aws::KMS
|
|
2094
2105
|
# aws_account_id: "111122223333",
|
2095
2106
|
# arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
2096
2107
|
# creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
|
2108
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
2097
2109
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
2098
2110
|
# description: "",
|
2099
2111
|
# enabled: true,
|
@@ -2146,8 +2158,7 @@ module Aws::KMS
|
|
2146
2158
|
# @example Example: To create an asymmetric elliptic curve KMS key for signing and verification
|
2147
2159
|
#
|
2148
2160
|
# # This example creates a KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification.
|
2149
|
-
# # The key
|
2150
|
-
# # can't be changed after the key is created.
|
2161
|
+
# # The key spec and key usage can't be changed after the key is created.
|
2151
2162
|
#
|
2152
2163
|
# resp = client.create_key({
|
2153
2164
|
# key_spec: "ECC_NIST_P521", # Describes the type of key material in the KMS key.
|
@@ -2208,6 +2219,38 @@ module Aws::KMS
|
|
2208
2219
|
# }, # Detailed information about the KMS key that this operation creates.
|
2209
2220
|
# }
|
2210
2221
|
#
|
2222
|
+
# @example Example: To create an asymmetric ML-DSA KMS key for signing and verification
|
2223
|
+
#
|
2224
|
+
# # This example creates a module-lattice digital signature algorithm (ML-DSA) key for signing and verification. The
|
2225
|
+
# # key-usage parameter is required even though SIGN_VERIFY is the only valid value for ML-DSA keys.
|
2226
|
+
#
|
2227
|
+
# resp = client.create_key({
|
2228
|
+
# key_spec: "ML_DSA_65", # Describes the type of key material in the KMS key.
|
2229
|
+
# key_usage: "SIGN_VERIFY", # The cryptographic operations for which you can use the KMS key.
|
2230
|
+
# })
|
2231
|
+
#
|
2232
|
+
# resp.to_h outputs the following:
|
2233
|
+
# {
|
2234
|
+
# key_metadata: {
|
2235
|
+
# aws_account_id: "111122223333",
|
2236
|
+
# arn: "arn:aws:kms:us-east-1:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
2237
|
+
# creation_date: Time.parse(1748371316.734),
|
2238
|
+
# customer_master_key_spec: "ML_DSA_65",
|
2239
|
+
# description: "",
|
2240
|
+
# enabled: true,
|
2241
|
+
# key_id: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
2242
|
+
# key_manager: "CUSTOMER",
|
2243
|
+
# key_spec: "ML_DSA_65",
|
2244
|
+
# key_state: "Enabled",
|
2245
|
+
# key_usage: "SIGN_VERIFY",
|
2246
|
+
# multi_region: false,
|
2247
|
+
# origin: "AWS_KMS",
|
2248
|
+
# signing_algorithms: [
|
2249
|
+
# "ML_DSA_SHAKE_256",
|
2250
|
+
# ],
|
2251
|
+
# }, # Detailed information about the KMS key that this operation creates.
|
2252
|
+
# }
|
2253
|
+
#
|
2211
2254
|
# @example Example: To create a multi-Region primary KMS key
|
2212
2255
|
#
|
2213
2256
|
# # This example creates a multi-Region primary symmetric encryption key. Because the default values for all parameters
|
@@ -2223,6 +2266,7 @@ module Aws::KMS
|
|
2223
2266
|
# aws_account_id: "111122223333",
|
2224
2267
|
# arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef12345678990ab",
|
2225
2268
|
# creation_date: Time.parse("2021-09-02T016:15:21-09:00"),
|
2269
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
2226
2270
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
2227
2271
|
# description: "",
|
2228
2272
|
# enabled: true,
|
@@ -2359,7 +2403,7 @@ module Aws::KMS
|
|
2359
2403
|
# description: "DescriptionType",
|
2360
2404
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
|
2361
2405
|
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
2362
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
2406
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
|
2363
2407
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
|
2364
2408
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
2365
2409
|
# bypass_policy_lockout_safety_check: false,
|
@@ -2391,11 +2435,11 @@ module Aws::KMS
|
|
2391
2435
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
2392
2436
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
2393
2437
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
2394
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
2438
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
2395
2439
|
# resp.key_metadata.encryption_algorithms #=> Array
|
2396
2440
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
2397
2441
|
# resp.key_metadata.signing_algorithms #=> Array
|
2398
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
2442
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
2399
2443
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
2400
2444
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
2401
2445
|
# resp.key_metadata.multi_region #=> Boolean
|
@@ -2660,6 +2704,7 @@ module Aws::KMS
|
|
2660
2704
|
# {
|
2661
2705
|
# encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.
|
2662
2706
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.
|
2707
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to decrypt the ciphertext.
|
2663
2708
|
# plaintext: "<binary data>", # The decrypted (plaintext) data.
|
2664
2709
|
# }
|
2665
2710
|
#
|
@@ -2993,6 +3038,7 @@ module Aws::KMS
|
|
2993
3038
|
#
|
2994
3039
|
# resp = client.delete_imported_key_material({
|
2995
3040
|
# key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key whose imported key material you are deleting. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
|
3041
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the deleted key material.
|
2996
3042
|
# })
|
2997
3043
|
#
|
2998
3044
|
# @example Request syntax with placeholder values
|
@@ -3652,6 +3698,7 @@ module Aws::KMS
|
|
3652
3698
|
# aws_account_id: "111122223333",
|
3653
3699
|
# arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
3654
3700
|
# creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
|
3701
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
3655
3702
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
3656
3703
|
# description: "",
|
3657
3704
|
# enabled: true,
|
@@ -3718,6 +3765,7 @@ module Aws::KMS
|
|
3718
3765
|
# aws_account_id: "111122223333",
|
3719
3766
|
# arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
3720
3767
|
# creation_date: Time.parse(1586329200.918),
|
3768
|
+
# current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
|
3721
3769
|
# customer_master_key_spec: "SYMMETRIC_DEFAULT",
|
3722
3770
|
# description: "",
|
3723
3771
|
# enabled: true,
|
@@ -3874,11 +3922,11 @@ module Aws::KMS
|
|
3874
3922
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
3875
3923
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
3876
3924
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
3877
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
3925
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
3878
3926
|
# resp.key_metadata.encryption_algorithms #=> Array
|
3879
3927
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
3880
3928
|
# resp.key_metadata.signing_algorithms #=> Array
|
3881
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
3929
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
3882
3930
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
3883
3931
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
3884
3932
|
# resp.key_metadata.multi_region #=> Boolean
|
@@ -4901,6 +4949,7 @@ module Aws::KMS
|
|
4901
4949
|
# {
|
4902
4950
|
# ciphertext_blob: "<binary data>", # The encrypted data key.
|
4903
4951
|
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
|
4952
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
|
4904
4953
|
# plaintext: "<binary data>", # The unencrypted (plaintext) data key.
|
4905
4954
|
# }
|
4906
4955
|
#
|
@@ -5118,10 +5167,11 @@ module Aws::KMS
|
|
5118
5167
|
# Determines the type of data key pair that is generated.
|
5119
5168
|
#
|
5120
5169
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
|
5121
|
-
# to encrypt and decrypt or to sign and verify (but not both),
|
5122
|
-
#
|
5123
|
-
#
|
5124
|
-
#
|
5170
|
+
# to encrypt and decrypt or to sign and verify (but not both), the rule
|
5171
|
+
# that permits you to use ECC KMS keys only to sign and verify, and the
|
5172
|
+
# rule that permits you to use ML-DSA key pairs to sign and verify only
|
5173
|
+
# are not effective on data key pairs, which are used outside of KMS.
|
5174
|
+
# The SM2 key spec is only available in China Regions.
|
5125
5175
|
#
|
5126
5176
|
# @option params [Array<String>] :grant_tokens
|
5127
5177
|
# A list of grant tokens.
|
@@ -5203,6 +5253,7 @@ module Aws::KMS
|
|
5203
5253
|
# resp.to_h outputs the following:
|
5204
5254
|
# {
|
5205
5255
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the private key.
|
5256
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
|
5206
5257
|
# key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
|
5207
5258
|
# private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the RSA data key pair.
|
5208
5259
|
# private_key_plaintext: "<binary data>", # The plaintext private key of the RSA data key pair.
|
@@ -5230,6 +5281,7 @@ module Aws::KMS
|
|
5230
5281
|
# {
|
5231
5282
|
# ciphertext_for_recipient: "<binary data>", # The private key of the RSA data key pair encrypted by the public key from the attestation document
|
5232
5283
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.
|
5284
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
|
5233
5285
|
# key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
|
5234
5286
|
# private_key_ciphertext_blob: "<binary data>", # The private key of the RSA data key pair encrypted by the KMS key.
|
5235
5287
|
# private_key_plaintext: "", # This field is null or empty
|
@@ -5396,10 +5448,11 @@ module Aws::KMS
|
|
5396
5448
|
# Determines the type of data key pair that is generated.
|
5397
5449
|
#
|
5398
5450
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
|
5399
|
-
# to encrypt and decrypt or to sign and verify (but not both),
|
5400
|
-
#
|
5401
|
-
#
|
5402
|
-
#
|
5451
|
+
# to encrypt and decrypt or to sign and verify (but not both), the rule
|
5452
|
+
# that permits you to use ECC KMS keys only to sign and verify, and the
|
5453
|
+
# rule that permits you to use ML-DSA key pairs to sign and verify only
|
5454
|
+
# are not effective on data key pairs, which are used outside of KMS.
|
5455
|
+
# The SM2 key spec is only available in China Regions.
|
5403
5456
|
#
|
5404
5457
|
# @option params [Array<String>] :grant_tokens
|
5405
5458
|
# A list of grant tokens.
|
@@ -5447,6 +5500,7 @@ module Aws::KMS
|
|
5447
5500
|
# resp.to_h outputs the following:
|
5448
5501
|
# {
|
5449
5502
|
# key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that encrypted the private key in the ECC asymmetric data key pair.
|
5503
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
|
5450
5504
|
# key_pair_spec: "ECC_NIST_P521", # The actual key spec of the ECC asymmetric data key pair.
|
5451
5505
|
# private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the asymmetric ECC data key pair.
|
5452
5506
|
# public_key: "<binary data>", # The public key (plaintext).
|
@@ -5668,6 +5722,7 @@ module Aws::KMS
|
|
5668
5722
|
# {
|
5669
5723
|
# ciphertext_blob: "<binary data>", # The encrypted data key.
|
5670
5724
|
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
|
5725
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
|
5671
5726
|
# }
|
5672
5727
|
#
|
5673
5728
|
# @example Request syntax with placeholder values
|
@@ -6629,12 +6684,12 @@ module Aws::KMS
|
|
6629
6684
|
# resp.key_id #=> String
|
6630
6685
|
# resp.public_key #=> String
|
6631
6686
|
# resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
6632
|
-
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
6687
|
+
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
6633
6688
|
# resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
|
6634
6689
|
# resp.encryption_algorithms #=> Array
|
6635
6690
|
# resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
6636
6691
|
# resp.signing_algorithms #=> Array
|
6637
|
-
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
6692
|
+
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
6638
6693
|
# resp.key_agreement_algorithms #=> Array
|
6639
6694
|
# resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
6640
6695
|
#
|
@@ -6902,6 +6957,12 @@ module Aws::KMS
|
|
6902
6957
|
# key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key to import the key material into. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
|
6903
6958
|
# })
|
6904
6959
|
#
|
6960
|
+
# resp.to_h outputs the following:
|
6961
|
+
# {
|
6962
|
+
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
|
6963
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
|
6964
|
+
# }
|
6965
|
+
#
|
6905
6966
|
# @example Example: To import key material into a KMS key
|
6906
6967
|
#
|
6907
6968
|
# # The following example imports key material that expires in 3 days. It might be part of an application that frequently
|
@@ -6915,6 +6976,12 @@ module Aws::KMS
|
|
6915
6976
|
# valid_to: Time.parse("2023-09-30T00:00:00-00:00"), # Specifies the date and time when the imported key material expires.
|
6916
6977
|
# })
|
6917
6978
|
#
|
6979
|
+
# resp.to_h outputs the following:
|
6980
|
+
# {
|
6981
|
+
# key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
|
6982
|
+
# key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
|
6983
|
+
# }
|
6984
|
+
#
|
6918
6985
|
# @example Request syntax with placeholder values
|
6919
6986
|
#
|
6920
6987
|
# resp = client.import_key_material({
|
@@ -8397,8 +8464,12 @@ module Aws::KMS
|
|
8397
8464
|
# resp.to_h outputs the following:
|
8398
8465
|
# {
|
8399
8466
|
# ciphertext_blob: "<binary data>", # The reencrypted data.
|
8467
|
+
# destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to reencrypt the data.
|
8468
|
+
# destination_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to reencrypt the data.
|
8400
8469
|
# key_id: "arn:aws:kms:us-east-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321", # The ARN of the KMS key that was used to reencrypt the data.
|
8470
|
+
# source_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext before it was reencrypted.
|
8401
8471
|
# source_key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was originally used to encrypt the data.
|
8472
|
+
# source_key_material_id: "1c6be7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to originally encrypt the data.
|
8402
8473
|
# }
|
8403
8474
|
#
|
8404
8475
|
# @example Request syntax with placeholder values
|
@@ -8790,11 +8861,11 @@ module Aws::KMS
|
|
8790
8861
|
# resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
8791
8862
|
# resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
8792
8863
|
# resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
8793
|
-
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
8864
|
+
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
8794
8865
|
# resp.replica_key_metadata.encryption_algorithms #=> Array
|
8795
8866
|
# resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
8796
8867
|
# resp.replica_key_metadata.signing_algorithms #=> Array
|
8797
|
-
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
8868
|
+
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
8798
8869
|
# resp.replica_key_metadata.key_agreement_algorithms #=> Array
|
8799
8870
|
# resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
8800
8871
|
# resp.replica_key_metadata.multi_region #=> Boolean
|
@@ -9354,11 +9425,11 @@ module Aws::KMS
|
|
9354
9425
|
# Developer Guide*.
|
9355
9426
|
#
|
9356
9427
|
# Digital signatures are generated and verified by using asymmetric key
|
9357
|
-
# pair, such as an RSA or
|
9358
|
-
# KMS key. The key owner (or an authorized user) uses their
|
9359
|
-
# to sign a message. Anyone with the public key can verify
|
9360
|
-
# message was signed with that particular private key and that
|
9361
|
-
# message hasn't changed since it was signed.
|
9428
|
+
# pair, such as an RSA, ECC, or ML-DSA pair that is represented by an
|
9429
|
+
# asymmetric KMS key. The key owner (or an authorized user) uses their
|
9430
|
+
# private key to sign a message. Anyone with the public key can verify
|
9431
|
+
# that the message was signed with that particular private key and that
|
9432
|
+
# the message hasn't changed since it was signed.
|
9362
9433
|
#
|
9363
9434
|
# To use the `Sign` operation, provide the following information:
|
9364
9435
|
#
|
@@ -9371,8 +9442,8 @@ module Aws::KMS
|
|
9371
9442
|
# to sign. You can submit messages of up to 4096 bytes. To sign a
|
9372
9443
|
# larger message, generate a hash digest of the message, and then
|
9373
9444
|
# provide the hash digest in the `Message` parameter. To indicate
|
9374
|
-
# whether the message is a full message
|
9375
|
-
# `MessageType` parameter.
|
9445
|
+
# whether the message is a full message, a digest, or an ML-DSA
|
9446
|
+
# EXTERNAL\_MU, use the `MessageType` parameter.
|
9376
9447
|
#
|
9377
9448
|
# * Choose a signing algorithm that is compatible with the KMS key.
|
9378
9449
|
#
|
@@ -9452,26 +9523,34 @@ module Aws::KMS
|
|
9452
9523
|
# @option params [String] :message_type
|
9453
9524
|
# Tells KMS whether the value of the `Message` parameter should be
|
9454
9525
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
9455
|
-
# messages; use `DIGEST` for message digests, which are already hashed
|
9526
|
+
# messages; use `DIGEST` for message digests, which are already hashed;
|
9527
|
+
# use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
|
9528
|
+
# as defined in NIST FIPS 204 Section 6.2.
|
9456
9529
|
#
|
9457
9530
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
9458
9531
|
# signing algorithm, which begins with a hash function. When the value
|
9459
|
-
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
9532
|
+
# is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
|
9533
|
+
# the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
|
9534
|
+
# public key hash and the message done in the ML-DSA signing algorithm.
|
9460
9535
|
#
|
9461
|
-
# Use the `DIGEST` value only when the value of the
|
9462
|
-
# is a message digest. If you use the `DIGEST` value
|
9463
|
-
# message, the security of the signing operation can be
|
9536
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
9537
|
+
# `Message` parameter is a message digest. If you use the `DIGEST` value
|
9538
|
+
# with an unhashed message, the security of the signing operation can be
|
9539
|
+
# compromised.
|
9464
9540
|
#
|
9465
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
9541
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
9466
9542
|
# `Message` value must match the length of hashed messages for the
|
9467
9543
|
# specified signing algorithm.
|
9468
9544
|
#
|
9545
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
9546
|
+
# `Message` value must be 64 bytes.
|
9547
|
+
#
|
9469
9548
|
# You can submit a message digest and omit the `MessageType` or specify
|
9470
9549
|
# `RAW` so the digest is hashed again while signing. However, this can
|
9471
9550
|
# cause verification failures when verifying with a system that assumes
|
9472
9551
|
# a single hash.
|
9473
9552
|
#
|
9474
|
-
# The hashing algorithm
|
9553
|
+
# The hashing algorithm that `Sign` uses is based on the
|
9475
9554
|
# `SigningAlgorithm` value.
|
9476
9555
|
#
|
9477
9556
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -9483,6 +9562,9 @@ module Aws::KMS
|
|
9483
9562
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
9484
9563
|
# algorithm.
|
9485
9564
|
#
|
9565
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
|
9566
|
+
# algorithm.
|
9567
|
+
#
|
9486
9568
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
9487
9569
|
# verification with SM2 key pairs][1].
|
9488
9570
|
#
|
@@ -9573,9 +9655,9 @@ module Aws::KMS
|
|
9573
9655
|
# resp = client.sign({
|
9574
9656
|
# key_id: "KeyIdType", # required
|
9575
9657
|
# message: "data", # required
|
9576
|
-
# message_type: "RAW", # accepts RAW, DIGEST
|
9658
|
+
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
9577
9659
|
# grant_tokens: ["GrantTokenType"],
|
9578
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
|
9660
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
9579
9661
|
# dry_run: false,
|
9580
9662
|
# })
|
9581
9663
|
#
|
@@ -9583,7 +9665,7 @@ module Aws::KMS
|
|
9583
9665
|
#
|
9584
9666
|
# resp.key_id #=> String
|
9585
9667
|
# resp.signature #=> String
|
9586
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
9668
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
9587
9669
|
#
|
9588
9670
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
|
9589
9671
|
#
|
@@ -10627,27 +10709,34 @@ module Aws::KMS
|
|
10627
10709
|
# @option params [String] :message_type
|
10628
10710
|
# Tells KMS whether the value of the `Message` parameter should be
|
10629
10711
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
10630
|
-
# messages; use `DIGEST` for message digests, which are already hashed
|
10712
|
+
# messages; use `DIGEST` for message digests, which are already hashed;
|
10713
|
+
# use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
|
10714
|
+
# as defined in NIST FIPS 204 Section 6.2.
|
10631
10715
|
#
|
10632
10716
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
10633
10717
|
# signing algorithm, which begins with a hash function. When the value
|
10634
|
-
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
10718
|
+
# is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
|
10719
|
+
# the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
|
10720
|
+
# public key hash and the message done in the ML-DSA signing algorithm.
|
10635
10721
|
#
|
10636
|
-
# Use the `DIGEST` value only when the value of the
|
10637
|
-
# is a message digest. If you use the `DIGEST` value
|
10638
|
-
# message, the security of the
|
10722
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
10723
|
+
# `Message` parameter is a message digest. If you use the `DIGEST` value
|
10724
|
+
# with an unhashed message, the security of the signing operation can be
|
10639
10725
|
# compromised.
|
10640
10726
|
#
|
10641
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
10727
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
10642
10728
|
# `Message` value must match the length of hashed messages for the
|
10643
10729
|
# specified signing algorithm.
|
10644
10730
|
#
|
10731
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
10732
|
+
# `Message` value must be 64 bytes.
|
10733
|
+
#
|
10645
10734
|
# You can submit a message digest and omit the `MessageType` or specify
|
10646
10735
|
# `RAW` so the digest is hashed again while signing. However, if the
|
10647
10736
|
# signed message is hashed once while signing, but twice while
|
10648
10737
|
# verifying, verification fails, even when the message hasn't changed.
|
10649
10738
|
#
|
10650
|
-
# The hashing algorithm
|
10739
|
+
# The hashing algorithm that `Verify` uses is based on the
|
10651
10740
|
# `SigningAlgorithm` value.
|
10652
10741
|
#
|
10653
10742
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -10659,6 +10748,9 @@ module Aws::KMS
|
|
10659
10748
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
10660
10749
|
# algorithm.
|
10661
10750
|
#
|
10751
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
|
10752
|
+
# algorithm.
|
10753
|
+
#
|
10662
10754
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
10663
10755
|
# verification with SM2 key pairs][1].
|
10664
10756
|
#
|
@@ -10750,9 +10842,9 @@ module Aws::KMS
|
|
10750
10842
|
# resp = client.verify({
|
10751
10843
|
# key_id: "KeyIdType", # required
|
10752
10844
|
# message: "data", # required
|
10753
|
-
# message_type: "RAW", # accepts RAW, DIGEST
|
10845
|
+
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
10754
10846
|
# signature: "data", # required
|
10755
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
|
10847
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
10756
10848
|
# grant_tokens: ["GrantTokenType"],
|
10757
10849
|
# dry_run: false,
|
10758
10850
|
# })
|
@@ -10761,7 +10853,7 @@ module Aws::KMS
|
|
10761
10853
|
#
|
10762
10854
|
# resp.key_id #=> String
|
10763
10855
|
# resp.signature_valid #=> Boolean
|
10764
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
|
10856
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
10765
10857
|
#
|
10766
10858
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
|
10767
10859
|
#
|
@@ -10930,7 +11022,7 @@ module Aws::KMS
|
|
10930
11022
|
tracer: tracer
|
10931
11023
|
)
|
10932
11024
|
context[:gem_name] = 'aws-sdk-kms'
|
10933
|
-
context[:gem_version] = '1.
|
11025
|
+
context[:gem_version] = '1.105.0'
|
10934
11026
|
Seahorse::Client::Request.new(handlers, context)
|
10935
11027
|
end
|
10936
11028
|
|
data/lib/aws-sdk-kms/types.rb
CHANGED
@@ -863,7 +863,10 @@ module Aws::KMS
|
|
863
863
|
# * For asymmetric KMS keys with NIST-recommended elliptic curve key
|
864
864
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
865
865
|
#
|
866
|
-
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
|
866
|
+
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
867
|
+
# `SIGN_VERIFY`.
|
868
|
+
#
|
869
|
+
# * For asymmetric KMS keys with ML-DSA key pairs, specify
|
867
870
|
# `SIGN_VERIFY`.
|
868
871
|
#
|
869
872
|
# * For asymmetric KMS keys with SM2 key pairs (China Regions only),
|
@@ -945,6 +948,13 @@ module Aws::KMS
|
|
945
948
|
# cryptocurrencies.
|
946
949
|
#
|
947
950
|
# ^
|
951
|
+
# * Asymmetric ML-DSA key pairs (signing and verification)
|
952
|
+
#
|
953
|
+
# * `ML_DSA_44`
|
954
|
+
#
|
955
|
+
# * `ML_DSA_65`
|
956
|
+
#
|
957
|
+
# * `ML_DSA_87`
|
948
958
|
# * SM2 key pairs (encryption and decryption -or- signing and
|
949
959
|
# verification -or- deriving shared secrets)
|
950
960
|
#
|
@@ -2540,9 +2550,11 @@ module Aws::KMS
|
|
2540
2550
|
#
|
2541
2551
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
|
2542
2552
|
# keys to encrypt and decrypt or to sign and verify (but not both),
|
2543
|
-
#
|
2544
|
-
# verify,
|
2545
|
-
#
|
2553
|
+
# the rule that permits you to use ECC KMS keys only to sign and
|
2554
|
+
# verify, and the rule that permits you to use ML-DSA key pairs to
|
2555
|
+
# sign and verify only are not effective on data key pairs, which are
|
2556
|
+
# used outside of KMS. The SM2 key spec is only available in China
|
2557
|
+
# Regions.
|
2546
2558
|
# @return [String]
|
2547
2559
|
#
|
2548
2560
|
# @!attribute [rw] grant_tokens
|
@@ -2671,8 +2683,6 @@ module Aws::KMS
|
|
2671
2683
|
#
|
2672
2684
|
# @!attribute [rw] key_material_id
|
2673
2685
|
# The identifier of the key material used to encrypt the private key.
|
2674
|
-
# This field is omitted if the request includes the `Recipient`
|
2675
|
-
# parameter.
|
2676
2686
|
# @return [String]
|
2677
2687
|
#
|
2678
2688
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairResponse AWS API Documentation
|
@@ -2745,9 +2755,11 @@ module Aws::KMS
|
|
2745
2755
|
#
|
2746
2756
|
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
|
2747
2757
|
# keys to encrypt and decrypt or to sign and verify (but not both),
|
2748
|
-
#
|
2749
|
-
# verify,
|
2750
|
-
#
|
2758
|
+
# the rule that permits you to use ECC KMS keys only to sign and
|
2759
|
+
# verify, and the rule that permits you to use ML-DSA key pairs to
|
2760
|
+
# sign and verify only are not effective on data key pairs, which are
|
2761
|
+
# used outside of KMS. The SM2 key spec is only available in China
|
2762
|
+
# Regions.
|
2751
2763
|
# @return [String]
|
2752
2764
|
#
|
2753
2765
|
# @!attribute [rw] grant_tokens
|
@@ -6133,27 +6145,34 @@ module Aws::KMS
|
|
6133
6145
|
# Tells KMS whether the value of the `Message` parameter should be
|
6134
6146
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
6135
6147
|
# messages; use `DIGEST` for message digests, which are already
|
6136
|
-
# hashed
|
6148
|
+
# hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
|
6149
|
+
# ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
|
6137
6150
|
#
|
6138
6151
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
6139
6152
|
# signing algorithm, which begins with a hash function. When the value
|
6140
6153
|
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
6154
|
+
# When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
|
6155
|
+
# of the public key hash and the message done in the ML-DSA signing
|
6156
|
+
# algorithm.
|
6141
6157
|
#
|
6142
|
-
# Use the `DIGEST` value only when the value of the
|
6143
|
-
# parameter is a message digest. If you use the `DIGEST`
|
6144
|
-
# unhashed message, the security of the signing
|
6145
|
-
# compromised.
|
6158
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
6159
|
+
# `Message` parameter is a message digest. If you use the `DIGEST`
|
6160
|
+
# value with an unhashed message, the security of the signing
|
6161
|
+
# operation can be compromised.
|
6146
6162
|
#
|
6147
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
6163
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
6148
6164
|
# `Message` value must match the length of hashed messages for the
|
6149
6165
|
# specified signing algorithm.
|
6150
6166
|
#
|
6167
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
6168
|
+
# `Message` value must be 64 bytes.
|
6169
|
+
#
|
6151
6170
|
# You can submit a message digest and omit the `MessageType` or
|
6152
6171
|
# specify `RAW` so the digest is hashed again while signing. However,
|
6153
6172
|
# this can cause verification failures when verifying with a system
|
6154
6173
|
# that assumes a single hash.
|
6155
6174
|
#
|
6156
|
-
# The hashing algorithm
|
6175
|
+
# The hashing algorithm that `Sign` uses is based on the
|
6157
6176
|
# `SigningAlgorithm` value.
|
6158
6177
|
#
|
6159
6178
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -6165,6 +6184,9 @@ module Aws::KMS
|
|
6165
6184
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
6166
6185
|
# algorithm.
|
6167
6186
|
#
|
6187
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
|
6188
|
+
# hashing algorithm.
|
6189
|
+
#
|
6168
6190
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
6169
6191
|
# verification with SM2 key pairs][1].
|
6170
6192
|
#
|
@@ -6806,28 +6828,35 @@ module Aws::KMS
|
|
6806
6828
|
# Tells KMS whether the value of the `Message` parameter should be
|
6807
6829
|
# hashed as part of the signing algorithm. Use `RAW` for unhashed
|
6808
6830
|
# messages; use `DIGEST` for message digests, which are already
|
6809
|
-
# hashed
|
6831
|
+
# hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
|
6832
|
+
# ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
|
6810
6833
|
#
|
6811
6834
|
# When the value of `MessageType` is `RAW`, KMS uses the standard
|
6812
6835
|
# signing algorithm, which begins with a hash function. When the value
|
6813
6836
|
# is `DIGEST`, KMS skips the hashing step in the signing algorithm.
|
6837
|
+
# When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
|
6838
|
+
# of the public key hash and the message done in the ML-DSA signing
|
6839
|
+
# algorithm.
|
6814
6840
|
#
|
6815
|
-
# Use the `DIGEST` value only when the value of the
|
6816
|
-
# parameter is a message digest. If you use the `DIGEST`
|
6817
|
-
# unhashed message, the security of the
|
6818
|
-
# compromised.
|
6841
|
+
# Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
|
6842
|
+
# `Message` parameter is a message digest. If you use the `DIGEST`
|
6843
|
+
# value with an unhashed message, the security of the signing
|
6844
|
+
# operation can be compromised.
|
6819
6845
|
#
|
6820
|
-
# When the value of `MessageType`is `DIGEST`, the length of the
|
6846
|
+
# When the value of `MessageType` is `DIGEST`, the length of the
|
6821
6847
|
# `Message` value must match the length of hashed messages for the
|
6822
6848
|
# specified signing algorithm.
|
6823
6849
|
#
|
6850
|
+
# When the value of `MessageType` is `EXTERNAL_MU` the length of the
|
6851
|
+
# `Message` value must be 64 bytes.
|
6852
|
+
#
|
6824
6853
|
# You can submit a message digest and omit the `MessageType` or
|
6825
6854
|
# specify `RAW` so the digest is hashed again while signing. However,
|
6826
6855
|
# if the signed message is hashed once while signing, but twice while
|
6827
6856
|
# verifying, verification fails, even when the message hasn't
|
6828
6857
|
# changed.
|
6829
6858
|
#
|
6830
|
-
# The hashing algorithm
|
6859
|
+
# The hashing algorithm that `Verify` uses is based on the
|
6831
6860
|
# `SigningAlgorithm` value.
|
6832
6861
|
#
|
6833
6862
|
# * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
|
@@ -6839,6 +6868,9 @@ module Aws::KMS
|
|
6839
6868
|
# * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
|
6840
6869
|
# algorithm.
|
6841
6870
|
#
|
6871
|
+
# * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
|
6872
|
+
# hashing algorithm.
|
6873
|
+
#
|
6842
6874
|
# * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
|
6843
6875
|
# verification with SM2 key pairs][1].
|
6844
6876
|
#
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -157,7 +157,7 @@ module Aws
|
|
157
157
|
?description: ::String,
|
158
158
|
?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
|
159
159
|
?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
160
|
-
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
160
|
+
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
|
161
161
|
?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
|
162
162
|
?custom_key_store_id: ::String,
|
163
163
|
?bypass_policy_lockout_safety_check: bool,
|
@@ -481,10 +481,10 @@ module Aws
|
|
481
481
|
def key_id: () -> ::String
|
482
482
|
def public_key: () -> ::String
|
483
483
|
def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
484
|
-
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
484
|
+
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
485
485
|
def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
486
486
|
def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
487
|
-
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
|
487
|
+
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
488
488
|
def key_agreement_algorithms: () -> ::Array[("ECDH")]
|
489
489
|
end
|
490
490
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
|
@@ -712,15 +712,15 @@ module Aws
|
|
712
712
|
include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
|
713
713
|
def key_id: () -> ::String
|
714
714
|
def signature: () -> ::String
|
715
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
715
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
716
716
|
end
|
717
717
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
|
718
718
|
def sign: (
|
719
719
|
key_id: ::String,
|
720
720
|
message: ::String,
|
721
|
-
?message_type: ("RAW" | "DIGEST"),
|
721
|
+
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
722
722
|
?grant_tokens: Array[::String],
|
723
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
|
723
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
724
724
|
?dry_run: bool
|
725
725
|
) -> _SignResponseSuccess
|
726
726
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
|
@@ -789,15 +789,15 @@ module Aws
|
|
789
789
|
include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
|
790
790
|
def key_id: () -> ::String
|
791
791
|
def signature_valid: () -> bool
|
792
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
792
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
793
793
|
end
|
794
794
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
|
795
795
|
def verify: (
|
796
796
|
key_id: ::String,
|
797
797
|
message: ::String,
|
798
|
-
?message_type: ("RAW" | "DIGEST"),
|
798
|
+
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
799
799
|
signature: ::String,
|
800
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
|
800
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
801
801
|
?grant_tokens: Array[::String],
|
802
802
|
?dry_run: bool
|
803
803
|
) -> _VerifyResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -118,7 +118,7 @@ module Aws::KMS
|
|
118
118
|
attr_accessor description: ::String
|
119
119
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
120
120
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
121
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
121
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
122
122
|
attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
|
123
123
|
attr_accessor custom_key_store_id: ::String
|
124
124
|
attr_accessor bypass_policy_lockout_safety_check: bool
|
@@ -478,10 +478,10 @@ module Aws::KMS
|
|
478
478
|
attr_accessor key_id: ::String
|
479
479
|
attr_accessor public_key: ::String
|
480
480
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
481
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
481
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
482
482
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
483
483
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
484
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
|
484
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
485
485
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
486
486
|
SENSITIVE: []
|
487
487
|
end
|
@@ -621,9 +621,9 @@ module Aws::KMS
|
|
621
621
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
622
622
|
attr_accessor key_manager: ("AWS" | "CUSTOMER")
|
623
623
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
624
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
624
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
625
625
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
626
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
|
626
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
627
627
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
628
628
|
attr_accessor multi_region: bool
|
629
629
|
attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
|
@@ -870,9 +870,9 @@ module Aws::KMS
|
|
870
870
|
class SignRequest
|
871
871
|
attr_accessor key_id: ::String
|
872
872
|
attr_accessor message: ::String
|
873
|
-
attr_accessor message_type: ("RAW" | "DIGEST")
|
873
|
+
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
874
874
|
attr_accessor grant_tokens: ::Array[::String]
|
875
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
875
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
876
876
|
attr_accessor dry_run: bool
|
877
877
|
SENSITIVE: [:message]
|
878
878
|
end
|
@@ -880,7 +880,7 @@ module Aws::KMS
|
|
880
880
|
class SignResponse
|
881
881
|
attr_accessor key_id: ::String
|
882
882
|
attr_accessor signature: ::String
|
883
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
883
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
884
884
|
SENSITIVE: []
|
885
885
|
end
|
886
886
|
|
@@ -966,9 +966,9 @@ module Aws::KMS
|
|
966
966
|
class VerifyRequest
|
967
967
|
attr_accessor key_id: ::String
|
968
968
|
attr_accessor message: ::String
|
969
|
-
attr_accessor message_type: ("RAW" | "DIGEST")
|
969
|
+
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
970
970
|
attr_accessor signature: ::String
|
971
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
971
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
972
972
|
attr_accessor grant_tokens: ::Array[::String]
|
973
973
|
attr_accessor dry_run: bool
|
974
974
|
SENSITIVE: [:message]
|
@@ -977,7 +977,7 @@ module Aws::KMS
|
|
977
977
|
class VerifyResponse
|
978
978
|
attr_accessor key_id: ::String
|
979
979
|
attr_accessor signature_valid: bool
|
980
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
|
980
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
981
981
|
SENSITIVE: []
|
982
982
|
end
|
983
983
|
|