aws-sdk-kms 1.104.0 → 1.105.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: '078565816f5e2b8088394a3ad96087913c750455d6d152add0d12a1003a43939'
4
- data.tar.gz: cc7e1460281395c5073cbaa6d3b3f3d1ad8fbeb5f3b74e28bfaefddd94eb8712
3
+ metadata.gz: 6331c0f383f2fd8b5dab1615773be873e0c6ce311a925149fc85395af789c1e4
4
+ data.tar.gz: 86568fac92b7e542850dc896ce2df41b63d6520560f87b6e0b90dfc004540957
5
5
  SHA512:
6
- metadata.gz: 414d53c3331e7333e29e8eef5d8f3ef0c9a6c5964cd4dc2eb3d2545b2ba010d85af5450f1f8a44e0e8314bb4dc184821c6e1ea8873ac685d1f4ca36ad16c1064
7
- data.tar.gz: 7c28a1ccc919555dce3593a571df81b744bee10e01552310a6f895c04bb583b791dfca939ca9255bd409ccf55fb42852927b061ea8b0bbedb61f4f24a2500ae5
6
+ metadata.gz: 2baa1bbe70fc7b7b5d21c1edaf96eb806d8429b5036ccbbeb7ee03f5d1b41b627700d9ce02e57b3bd91d583e972ae4ef67c1ee1c3e4e7e4f6dc7bc4299581fb8
7
+ data.tar.gz: fa84328e25889582146f85efad204401551d70d76fc7d99bfeacacbef58553dd874872b8cace82443edecb0f35a297fbaed6a99d303548267de71de48c9cfae3
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.105.0 (2025-06-12)
5
+ ------------------
6
+
7
+ * Feature - AWS KMS announces the support of ML-DSA key pairs that creates post-quantum safe digital signatures.
8
+
4
9
  1.104.0 (2025-06-06)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.104.0
1
+ 1.105.0
@@ -1555,20 +1555,21 @@ module Aws::KMS
1555
1555
  # properties after the KMS key is created.
1556
1556
  #
1557
1557
  # Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC)
1558
- # key pair, or an SM2 key pair (China Regions only). The private key
1559
- # in an asymmetric KMS key never leaves KMS unencrypted. However, you
1560
- # can use the GetPublicKey operation to download the public key so it
1561
- # can be used outside of KMS. Each KMS key can have only one key
1562
- # usage. KMS keys with RSA key pairs can be used to encrypt and
1563
- # decrypt data or sign and verify messages (but not both). KMS keys
1564
- # with NIST-recommended ECC key pairs can be used to sign and verify
1565
- # messages or derive shared secrets (but not both). KMS keys with
1566
- # `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS
1567
- # keys with SM2 key pairs (China Regions only) can be used to either
1568
- # encrypt and decrypt data, sign and verify messages, or derive shared
1569
- # secrets (you must choose one key usage type). For information about
1570
- # asymmetric KMS keys, see [Asymmetric KMS keys][2] in the *Key
1571
- # Management Service Developer Guide*.
1558
+ # key pair, ML-DSA key pair or an SM2 key pair (China Regions only).
1559
+ # The private key in an asymmetric KMS key never leaves KMS
1560
+ # unencrypted. However, you can use the GetPublicKey operation to
1561
+ # download the public key so it can be used outside of KMS. Each KMS
1562
+ # key can have only one key usage. KMS keys with RSA key pairs can be
1563
+ # used to encrypt and decrypt data or sign and verify messages (but
1564
+ # not both). KMS keys with NIST-recommended ECC key pairs can be used
1565
+ # to sign and verify messages or derive shared secrets (but not both).
1566
+ # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1567
+ # messages. KMS keys with ML-DSA key pairs can be used to sign and
1568
+ # verify messages. KMS keys with SM2 key pairs (China Regions only)
1569
+ # can be used to either encrypt and decrypt data, sign and verify
1570
+ # messages, or derive shared secrets (you must choose one key usage
1571
+ # type). For information about asymmetric KMS keys, see [Asymmetric
1572
+ # KMS keys][2] in the *Key Management Service Developer Guide*.
1572
1573
  #
1573
1574
  #
1574
1575
  #
@@ -1812,7 +1813,10 @@ module Aws::KMS
1812
1813
  # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1813
1814
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1814
1815
  #
1815
- # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
1816
+ # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1817
+ # `SIGN_VERIFY`.
1818
+ #
1819
+ # * For asymmetric KMS keys with ML-DSA key pairs, specify
1816
1820
  # `SIGN_VERIFY`.
1817
1821
  #
1818
1822
  # * For asymmetric KMS keys with SM2 key pairs (China Regions only),
@@ -1889,6 +1893,13 @@ module Aws::KMS
1889
1893
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
1890
1894
  #
1891
1895
  # ^
1896
+ # * Asymmetric ML-DSA key pairs (signing and verification)
1897
+ #
1898
+ # * `ML_DSA_44`
1899
+ #
1900
+ # * `ML_DSA_65`
1901
+ #
1902
+ # * `ML_DSA_87`
1892
1903
  # * SM2 key pairs (encryption and decryption -or- signing and
1893
1904
  # verification -or- deriving shared secrets)
1894
1905
  #
@@ -2094,6 +2105,7 @@ module Aws::KMS
2094
2105
  # aws_account_id: "111122223333",
2095
2106
  # arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
2096
2107
  # creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
2108
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
2097
2109
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
2098
2110
  # description: "",
2099
2111
  # enabled: true,
@@ -2146,8 +2158,7 @@ module Aws::KMS
2146
2158
  # @example Example: To create an asymmetric elliptic curve KMS key for signing and verification
2147
2159
  #
2148
2160
  # # This example creates a KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification.
2149
- # # The key usage is required even though "SIGN_VERIFY" is the only valid value for ECC KMS keys. The key spec and key usage
2150
- # # can't be changed after the key is created.
2161
+ # # The key spec and key usage can't be changed after the key is created.
2151
2162
  #
2152
2163
  # resp = client.create_key({
2153
2164
  # key_spec: "ECC_NIST_P521", # Describes the type of key material in the KMS key.
@@ -2208,6 +2219,38 @@ module Aws::KMS
2208
2219
  # }, # Detailed information about the KMS key that this operation creates.
2209
2220
  # }
2210
2221
  #
2222
+ # @example Example: To create an asymmetric ML-DSA KMS key for signing and verification
2223
+ #
2224
+ # # This example creates a module-lattice digital signature algorithm (ML-DSA) key for signing and verification. The
2225
+ # # key-usage parameter is required even though SIGN_VERIFY is the only valid value for ML-DSA keys.
2226
+ #
2227
+ # resp = client.create_key({
2228
+ # key_spec: "ML_DSA_65", # Describes the type of key material in the KMS key.
2229
+ # key_usage: "SIGN_VERIFY", # The cryptographic operations for which you can use the KMS key.
2230
+ # })
2231
+ #
2232
+ # resp.to_h outputs the following:
2233
+ # {
2234
+ # key_metadata: {
2235
+ # aws_account_id: "111122223333",
2236
+ # arn: "arn:aws:kms:us-east-1:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
2237
+ # creation_date: Time.parse(1748371316.734),
2238
+ # customer_master_key_spec: "ML_DSA_65",
2239
+ # description: "",
2240
+ # enabled: true,
2241
+ # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab",
2242
+ # key_manager: "CUSTOMER",
2243
+ # key_spec: "ML_DSA_65",
2244
+ # key_state: "Enabled",
2245
+ # key_usage: "SIGN_VERIFY",
2246
+ # multi_region: false,
2247
+ # origin: "AWS_KMS",
2248
+ # signing_algorithms: [
2249
+ # "ML_DSA_SHAKE_256",
2250
+ # ],
2251
+ # }, # Detailed information about the KMS key that this operation creates.
2252
+ # }
2253
+ #
2211
2254
  # @example Example: To create a multi-Region primary KMS key
2212
2255
  #
2213
2256
  # # This example creates a multi-Region primary symmetric encryption key. Because the default values for all parameters
@@ -2223,6 +2266,7 @@ module Aws::KMS
2223
2266
  # aws_account_id: "111122223333",
2224
2267
  # arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef12345678990ab",
2225
2268
  # creation_date: Time.parse("2021-09-02T016:15:21-09:00"),
2269
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
2226
2270
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
2227
2271
  # description: "",
2228
2272
  # enabled: true,
@@ -2359,7 +2403,7 @@ module Aws::KMS
2359
2403
  # description: "DescriptionType",
2360
2404
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2361
2405
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2362
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2406
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2363
2407
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2364
2408
  # custom_key_store_id: "CustomKeyStoreIdType",
2365
2409
  # bypass_policy_lockout_safety_check: false,
@@ -2391,11 +2435,11 @@ module Aws::KMS
2391
2435
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2392
2436
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2393
2437
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2394
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2438
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2395
2439
  # resp.key_metadata.encryption_algorithms #=> Array
2396
2440
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2397
2441
  # resp.key_metadata.signing_algorithms #=> Array
2398
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
2442
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2399
2443
  # resp.key_metadata.key_agreement_algorithms #=> Array
2400
2444
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2401
2445
  # resp.key_metadata.multi_region #=> Boolean
@@ -2660,6 +2704,7 @@ module Aws::KMS
2660
2704
  # {
2661
2705
  # encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.
2662
2706
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.
2707
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to decrypt the ciphertext.
2663
2708
  # plaintext: "<binary data>", # The decrypted (plaintext) data.
2664
2709
  # }
2665
2710
  #
@@ -2993,6 +3038,7 @@ module Aws::KMS
2993
3038
  #
2994
3039
  # resp = client.delete_imported_key_material({
2995
3040
  # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key whose imported key material you are deleting. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
3041
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the deleted key material.
2996
3042
  # })
2997
3043
  #
2998
3044
  # @example Request syntax with placeholder values
@@ -3652,6 +3698,7 @@ module Aws::KMS
3652
3698
  # aws_account_id: "111122223333",
3653
3699
  # arn: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
3654
3700
  # creation_date: Time.parse("2017-07-05T14:04:55-07:00"),
3701
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
3655
3702
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
3656
3703
  # description: "",
3657
3704
  # enabled: true,
@@ -3718,6 +3765,7 @@ module Aws::KMS
3718
3765
  # aws_account_id: "111122223333",
3719
3766
  # arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
3720
3767
  # creation_date: Time.parse(1586329200.918),
3768
+ # current_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
3721
3769
  # customer_master_key_spec: "SYMMETRIC_DEFAULT",
3722
3770
  # description: "",
3723
3771
  # enabled: true,
@@ -3874,11 +3922,11 @@ module Aws::KMS
3874
3922
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3875
3923
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3876
3924
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3877
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3925
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3878
3926
  # resp.key_metadata.encryption_algorithms #=> Array
3879
3927
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3880
3928
  # resp.key_metadata.signing_algorithms #=> Array
3881
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
3929
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
3882
3930
  # resp.key_metadata.key_agreement_algorithms #=> Array
3883
3931
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3884
3932
  # resp.key_metadata.multi_region #=> Boolean
@@ -4901,6 +4949,7 @@ module Aws::KMS
4901
4949
  # {
4902
4950
  # ciphertext_blob: "<binary data>", # The encrypted data key.
4903
4951
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
4952
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
4904
4953
  # plaintext: "<binary data>", # The unencrypted (plaintext) data key.
4905
4954
  # }
4906
4955
  #
@@ -5118,10 +5167,11 @@ module Aws::KMS
5118
5167
  # Determines the type of data key pair that is generated.
5119
5168
  #
5120
5169
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
5121
- # to encrypt and decrypt or to sign and verify (but not both), and the
5122
- # rule that permits you to use ECC KMS keys only to sign and verify, are
5123
- # not effective on data key pairs, which are used outside of KMS. The
5124
- # SM2 key spec is only available in China Regions.
5170
+ # to encrypt and decrypt or to sign and verify (but not both), the rule
5171
+ # that permits you to use ECC KMS keys only to sign and verify, and the
5172
+ # rule that permits you to use ML-DSA key pairs to sign and verify only
5173
+ # are not effective on data key pairs, which are used outside of KMS.
5174
+ # The SM2 key spec is only available in China Regions.
5125
5175
  #
5126
5176
  # @option params [Array<String>] :grant_tokens
5127
5177
  # A list of grant tokens.
@@ -5203,6 +5253,7 @@ module Aws::KMS
5203
5253
  # resp.to_h outputs the following:
5204
5254
  # {
5205
5255
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the private key.
5256
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5206
5257
  # key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
5207
5258
  # private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the RSA data key pair.
5208
5259
  # private_key_plaintext: "<binary data>", # The plaintext private key of the RSA data key pair.
@@ -5230,6 +5281,7 @@ module Aws::KMS
5230
5281
  # {
5231
5282
  # ciphertext_for_recipient: "<binary data>", # The private key of the RSA data key pair encrypted by the public key from the attestation document
5232
5283
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.
5284
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5233
5285
  # key_pair_spec: "RSA_3072", # The actual key spec of the RSA data key pair.
5234
5286
  # private_key_ciphertext_blob: "<binary data>", # The private key of the RSA data key pair encrypted by the KMS key.
5235
5287
  # private_key_plaintext: "", # This field is null or empty
@@ -5396,10 +5448,11 @@ module Aws::KMS
5396
5448
  # Determines the type of data key pair that is generated.
5397
5449
  #
5398
5450
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys
5399
- # to encrypt and decrypt or to sign and verify (but not both), and the
5400
- # rule that permits you to use ECC KMS keys only to sign and verify, are
5401
- # not effective on data key pairs, which are used outside of KMS. The
5402
- # SM2 key spec is only available in China Regions.
5451
+ # to encrypt and decrypt or to sign and verify (but not both), the rule
5452
+ # that permits you to use ECC KMS keys only to sign and verify, and the
5453
+ # rule that permits you to use ML-DSA key pairs to sign and verify only
5454
+ # are not effective on data key pairs, which are used outside of KMS.
5455
+ # The SM2 key spec is only available in China Regions.
5403
5456
  #
5404
5457
  # @option params [Array<String>] :grant_tokens
5405
5458
  # A list of grant tokens.
@@ -5447,6 +5500,7 @@ module Aws::KMS
5447
5500
  # resp.to_h outputs the following:
5448
5501
  # {
5449
5502
  # key_id: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The key ARN of the symmetric encryption KMS key that encrypted the private key in the ECC asymmetric data key pair.
5503
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the private key.
5450
5504
  # key_pair_spec: "ECC_NIST_P521", # The actual key spec of the ECC asymmetric data key pair.
5451
5505
  # private_key_ciphertext_blob: "<binary data>", # The encrypted private key of the asymmetric ECC data key pair.
5452
5506
  # public_key: "<binary data>", # The public key (plaintext).
@@ -5668,6 +5722,7 @@ module Aws::KMS
5668
5722
  # {
5669
5723
  # ciphertext_blob: "<binary data>", # The encrypted data key.
5670
5724
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was used to encrypt the data key.
5725
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to encrypt the data key.
5671
5726
  # }
5672
5727
  #
5673
5728
  # @example Request syntax with placeholder values
@@ -6629,12 +6684,12 @@ module Aws::KMS
6629
6684
  # resp.key_id #=> String
6630
6685
  # resp.public_key #=> String
6631
6686
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6632
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6687
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6633
6688
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6634
6689
  # resp.encryption_algorithms #=> Array
6635
6690
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6636
6691
  # resp.signing_algorithms #=> Array
6637
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
6692
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6638
6693
  # resp.key_agreement_algorithms #=> Array
6639
6694
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6640
6695
  #
@@ -6902,6 +6957,12 @@ module Aws::KMS
6902
6957
  # key_id: "1234abcd-12ab-34cd-56ef-1234567890ab", # The identifier of the KMS key to import the key material into. You can use the key ID or the Amazon Resource Name (ARN) of the KMS key.
6903
6958
  # })
6904
6959
  #
6960
+ # resp.to_h outputs the following:
6961
+ # {
6962
+ # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
6963
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
6964
+ # }
6965
+ #
6905
6966
  # @example Example: To import key material into a KMS key
6906
6967
  #
6907
6968
  # # The following example imports key material that expires in 3 days. It might be part of an application that frequently
@@ -6915,6 +6976,12 @@ module Aws::KMS
6915
6976
  # valid_to: Time.parse("2023-09-30T00:00:00-00:00"), # Specifies the date and time when the imported key material expires.
6916
6977
  # })
6917
6978
  #
6979
+ # resp.to_h outputs the following:
6980
+ # {
6981
+ # key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The Amazon Resource Name (ARN) of the KMS key into which key material was imported.
6982
+ # key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # Identifies the imported key material.
6983
+ # }
6984
+ #
6918
6985
  # @example Request syntax with placeholder values
6919
6986
  #
6920
6987
  # resp = client.import_key_material({
@@ -8397,8 +8464,12 @@ module Aws::KMS
8397
8464
  # resp.to_h outputs the following:
8398
8465
  # {
8399
8466
  # ciphertext_blob: "<binary data>", # The reencrypted data.
8467
+ # destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to reencrypt the data.
8468
+ # destination_key_material_id: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to reencrypt the data.
8400
8469
  # key_id: "arn:aws:kms:us-east-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321", # The ARN of the KMS key that was used to reencrypt the data.
8470
+ # source_encryption_algorithm: "SYMMETRIC_DEFAULT", # The encryption algorithm that was used to decrypt the ciphertext before it was reencrypted.
8401
8471
  # source_key_id: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab", # The ARN of the KMS key that was originally used to encrypt the data.
8472
+ # source_key_material_id: "1c6be7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6", # The identifier of the key material used to originally encrypt the data.
8402
8473
  # }
8403
8474
  #
8404
8475
  # @example Request syntax with placeholder values
@@ -8790,11 +8861,11 @@ module Aws::KMS
8790
8861
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8791
8862
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8792
8863
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8793
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8864
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8794
8865
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8795
8866
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8796
8867
  # resp.replica_key_metadata.signing_algorithms #=> Array
8797
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
8868
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8798
8869
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8799
8870
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8800
8871
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9354,11 +9425,11 @@ module Aws::KMS
9354
9425
  # Developer Guide*.
9355
9426
  #
9356
9427
  # Digital signatures are generated and verified by using asymmetric key
9357
- # pair, such as an RSA or ECC pair that is represented by an asymmetric
9358
- # KMS key. The key owner (or an authorized user) uses their private key
9359
- # to sign a message. Anyone with the public key can verify that the
9360
- # message was signed with that particular private key and that the
9361
- # message hasn't changed since it was signed.
9428
+ # pair, such as an RSA, ECC, or ML-DSA pair that is represented by an
9429
+ # asymmetric KMS key. The key owner (or an authorized user) uses their
9430
+ # private key to sign a message. Anyone with the public key can verify
9431
+ # that the message was signed with that particular private key and that
9432
+ # the message hasn't changed since it was signed.
9362
9433
  #
9363
9434
  # To use the `Sign` operation, provide the following information:
9364
9435
  #
@@ -9371,8 +9442,8 @@ module Aws::KMS
9371
9442
  # to sign. You can submit messages of up to 4096 bytes. To sign a
9372
9443
  # larger message, generate a hash digest of the message, and then
9373
9444
  # provide the hash digest in the `Message` parameter. To indicate
9374
- # whether the message is a full message or a digest, use the
9375
- # `MessageType` parameter.
9445
+ # whether the message is a full message, a digest, or an ML-DSA
9446
+ # EXTERNAL\_MU, use the `MessageType` parameter.
9376
9447
  #
9377
9448
  # * Choose a signing algorithm that is compatible with the KMS key.
9378
9449
  #
@@ -9452,26 +9523,34 @@ module Aws::KMS
9452
9523
  # @option params [String] :message_type
9453
9524
  # Tells KMS whether the value of the `Message` parameter should be
9454
9525
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
9455
- # messages; use `DIGEST` for message digests, which are already hashed.
9526
+ # messages; use `DIGEST` for message digests, which are already hashed;
9527
+ # use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
9528
+ # as defined in NIST FIPS 204 Section 6.2.
9456
9529
  #
9457
9530
  # When the value of `MessageType` is `RAW`, KMS uses the standard
9458
9531
  # signing algorithm, which begins with a hash function. When the value
9459
- # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
9532
+ # is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
9533
+ # the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
9534
+ # public key hash and the message done in the ML-DSA signing algorithm.
9460
9535
  #
9461
- # Use the `DIGEST` value only when the value of the `Message` parameter
9462
- # is a message digest. If you use the `DIGEST` value with an unhashed
9463
- # message, the security of the signing operation can be compromised.
9536
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
9537
+ # `Message` parameter is a message digest. If you use the `DIGEST` value
9538
+ # with an unhashed message, the security of the signing operation can be
9539
+ # compromised.
9464
9540
  #
9465
- # When the value of `MessageType`is `DIGEST`, the length of the
9541
+ # When the value of `MessageType` is `DIGEST`, the length of the
9466
9542
  # `Message` value must match the length of hashed messages for the
9467
9543
  # specified signing algorithm.
9468
9544
  #
9545
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
9546
+ # `Message` value must be 64 bytes.
9547
+ #
9469
9548
  # You can submit a message digest and omit the `MessageType` or specify
9470
9549
  # `RAW` so the digest is hashed again while signing. However, this can
9471
9550
  # cause verification failures when verifying with a system that assumes
9472
9551
  # a single hash.
9473
9552
  #
9474
- # The hashing algorithm in that `Sign` uses is based on the
9553
+ # The hashing algorithm that `Sign` uses is based on the
9475
9554
  # `SigningAlgorithm` value.
9476
9555
  #
9477
9556
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -9483,6 +9562,9 @@ module Aws::KMS
9483
9562
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
9484
9563
  # algorithm.
9485
9564
  #
9565
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
9566
+ # algorithm.
9567
+ #
9486
9568
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
9487
9569
  # verification with SM2 key pairs][1].
9488
9570
  #
@@ -9573,9 +9655,9 @@ module Aws::KMS
9573
9655
  # resp = client.sign({
9574
9656
  # key_id: "KeyIdType", # required
9575
9657
  # message: "data", # required
9576
- # message_type: "RAW", # accepts RAW, DIGEST
9658
+ # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9577
9659
  # grant_tokens: ["GrantTokenType"],
9578
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
9660
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9579
9661
  # dry_run: false,
9580
9662
  # })
9581
9663
  #
@@ -9583,7 +9665,7 @@ module Aws::KMS
9583
9665
  #
9584
9666
  # resp.key_id #=> String
9585
9667
  # resp.signature #=> String
9586
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
9668
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9587
9669
  #
9588
9670
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9589
9671
  #
@@ -10627,27 +10709,34 @@ module Aws::KMS
10627
10709
  # @option params [String] :message_type
10628
10710
  # Tells KMS whether the value of the `Message` parameter should be
10629
10711
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
10630
- # messages; use `DIGEST` for message digests, which are already hashed.
10712
+ # messages; use `DIGEST` for message digests, which are already hashed;
10713
+ # use `EXTERNAL_MU` for 64-byte representative μ used in ML-DSA signing
10714
+ # as defined in NIST FIPS 204 Section 6.2.
10631
10715
  #
10632
10716
  # When the value of `MessageType` is `RAW`, KMS uses the standard
10633
10717
  # signing algorithm, which begins with a hash function. When the value
10634
- # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
10718
+ # is `DIGEST`, KMS skips the hashing step in the signing algorithm. When
10719
+ # the value is `EXTERNAL_MU` KMS skips the concatenated hashing of the
10720
+ # public key hash and the message done in the ML-DSA signing algorithm.
10635
10721
  #
10636
- # Use the `DIGEST` value only when the value of the `Message` parameter
10637
- # is a message digest. If you use the `DIGEST` value with an unhashed
10638
- # message, the security of the verification operation can be
10722
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
10723
+ # `Message` parameter is a message digest. If you use the `DIGEST` value
10724
+ # with an unhashed message, the security of the signing operation can be
10639
10725
  # compromised.
10640
10726
  #
10641
- # When the value of `MessageType`is `DIGEST`, the length of the
10727
+ # When the value of `MessageType` is `DIGEST`, the length of the
10642
10728
  # `Message` value must match the length of hashed messages for the
10643
10729
  # specified signing algorithm.
10644
10730
  #
10731
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
10732
+ # `Message` value must be 64 bytes.
10733
+ #
10645
10734
  # You can submit a message digest and omit the `MessageType` or specify
10646
10735
  # `RAW` so the digest is hashed again while signing. However, if the
10647
10736
  # signed message is hashed once while signing, but twice while
10648
10737
  # verifying, verification fails, even when the message hasn't changed.
10649
10738
  #
10650
- # The hashing algorithm in that `Verify` uses is based on the
10739
+ # The hashing algorithm that `Verify` uses is based on the
10651
10740
  # `SigningAlgorithm` value.
10652
10741
  #
10653
10742
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -10659,6 +10748,9 @@ module Aws::KMS
10659
10748
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
10660
10749
  # algorithm.
10661
10750
  #
10751
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256 hashing
10752
+ # algorithm.
10753
+ #
10662
10754
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
10663
10755
  # verification with SM2 key pairs][1].
10664
10756
  #
@@ -10750,9 +10842,9 @@ module Aws::KMS
10750
10842
  # resp = client.verify({
10751
10843
  # key_id: "KeyIdType", # required
10752
10844
  # message: "data", # required
10753
- # message_type: "RAW", # accepts RAW, DIGEST
10845
+ # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10754
10846
  # signature: "data", # required
10755
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
10847
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10756
10848
  # grant_tokens: ["GrantTokenType"],
10757
10849
  # dry_run: false,
10758
10850
  # })
@@ -10761,7 +10853,7 @@ module Aws::KMS
10761
10853
  #
10762
10854
  # resp.key_id #=> String
10763
10855
  # resp.signature_valid #=> Boolean
10764
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA"
10856
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10765
10857
  #
10766
10858
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10767
10859
  #
@@ -10930,7 +11022,7 @@ module Aws::KMS
10930
11022
  tracer: tracer
10931
11023
  )
10932
11024
  context[:gem_name] = 'aws-sdk-kms'
10933
- context[:gem_version] = '1.104.0'
11025
+ context[:gem_version] = '1.105.0'
10934
11026
  Seahorse::Client::Request.new(handlers, context)
10935
11027
  end
10936
11028
 
@@ -863,7 +863,10 @@ module Aws::KMS
863
863
  # * For asymmetric KMS keys with NIST-recommended elliptic curve key
864
864
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
865
865
  #
866
- # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs specify
866
+ # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
867
+ # `SIGN_VERIFY`.
868
+ #
869
+ # * For asymmetric KMS keys with ML-DSA key pairs, specify
867
870
  # `SIGN_VERIFY`.
868
871
  #
869
872
  # * For asymmetric KMS keys with SM2 key pairs (China Regions only),
@@ -945,6 +948,13 @@ module Aws::KMS
945
948
  # cryptocurrencies.
946
949
  #
947
950
  # ^
951
+ # * Asymmetric ML-DSA key pairs (signing and verification)
952
+ #
953
+ # * `ML_DSA_44`
954
+ #
955
+ # * `ML_DSA_65`
956
+ #
957
+ # * `ML_DSA_87`
948
958
  # * SM2 key pairs (encryption and decryption -or- signing and
949
959
  # verification -or- deriving shared secrets)
950
960
  #
@@ -2540,9 +2550,11 @@ module Aws::KMS
2540
2550
  #
2541
2551
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2542
2552
  # keys to encrypt and decrypt or to sign and verify (but not both),
2543
- # and the rule that permits you to use ECC KMS keys only to sign and
2544
- # verify, are not effective on data key pairs, which are used outside
2545
- # of KMS. The SM2 key spec is only available in China Regions.
2553
+ # the rule that permits you to use ECC KMS keys only to sign and
2554
+ # verify, and the rule that permits you to use ML-DSA key pairs to
2555
+ # sign and verify only are not effective on data key pairs, which are
2556
+ # used outside of KMS. The SM2 key spec is only available in China
2557
+ # Regions.
2546
2558
  # @return [String]
2547
2559
  #
2548
2560
  # @!attribute [rw] grant_tokens
@@ -2671,8 +2683,6 @@ module Aws::KMS
2671
2683
  #
2672
2684
  # @!attribute [rw] key_material_id
2673
2685
  # The identifier of the key material used to encrypt the private key.
2674
- # This field is omitted if the request includes the `Recipient`
2675
- # parameter.
2676
2686
  # @return [String]
2677
2687
  #
2678
2688
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairResponse AWS API Documentation
@@ -2745,9 +2755,11 @@ module Aws::KMS
2745
2755
  #
2746
2756
  # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2747
2757
  # keys to encrypt and decrypt or to sign and verify (but not both),
2748
- # and the rule that permits you to use ECC KMS keys only to sign and
2749
- # verify, are not effective on data key pairs, which are used outside
2750
- # of KMS. The SM2 key spec is only available in China Regions.
2758
+ # the rule that permits you to use ECC KMS keys only to sign and
2759
+ # verify, and the rule that permits you to use ML-DSA key pairs to
2760
+ # sign and verify only are not effective on data key pairs, which are
2761
+ # used outside of KMS. The SM2 key spec is only available in China
2762
+ # Regions.
2751
2763
  # @return [String]
2752
2764
  #
2753
2765
  # @!attribute [rw] grant_tokens
@@ -6133,27 +6145,34 @@ module Aws::KMS
6133
6145
  # Tells KMS whether the value of the `Message` parameter should be
6134
6146
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
6135
6147
  # messages; use `DIGEST` for message digests, which are already
6136
- # hashed.
6148
+ # hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
6149
+ # ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
6137
6150
  #
6138
6151
  # When the value of `MessageType` is `RAW`, KMS uses the standard
6139
6152
  # signing algorithm, which begins with a hash function. When the value
6140
6153
  # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
6154
+ # When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
6155
+ # of the public key hash and the message done in the ML-DSA signing
6156
+ # algorithm.
6141
6157
  #
6142
- # Use the `DIGEST` value only when the value of the `Message`
6143
- # parameter is a message digest. If you use the `DIGEST` value with an
6144
- # unhashed message, the security of the signing operation can be
6145
- # compromised.
6158
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
6159
+ # `Message` parameter is a message digest. If you use the `DIGEST`
6160
+ # value with an unhashed message, the security of the signing
6161
+ # operation can be compromised.
6146
6162
  #
6147
- # When the value of `MessageType`is `DIGEST`, the length of the
6163
+ # When the value of `MessageType` is `DIGEST`, the length of the
6148
6164
  # `Message` value must match the length of hashed messages for the
6149
6165
  # specified signing algorithm.
6150
6166
  #
6167
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
6168
+ # `Message` value must be 64 bytes.
6169
+ #
6151
6170
  # You can submit a message digest and omit the `MessageType` or
6152
6171
  # specify `RAW` so the digest is hashed again while signing. However,
6153
6172
  # this can cause verification failures when verifying with a system
6154
6173
  # that assumes a single hash.
6155
6174
  #
6156
- # The hashing algorithm in that `Sign` uses is based on the
6175
+ # The hashing algorithm that `Sign` uses is based on the
6157
6176
  # `SigningAlgorithm` value.
6158
6177
  #
6159
6178
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -6165,6 +6184,9 @@ module Aws::KMS
6165
6184
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
6166
6185
  # algorithm.
6167
6186
  #
6187
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
6188
+ # hashing algorithm.
6189
+ #
6168
6190
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
6169
6191
  # verification with SM2 key pairs][1].
6170
6192
  #
@@ -6806,28 +6828,35 @@ module Aws::KMS
6806
6828
  # Tells KMS whether the value of the `Message` parameter should be
6807
6829
  # hashed as part of the signing algorithm. Use `RAW` for unhashed
6808
6830
  # messages; use `DIGEST` for message digests, which are already
6809
- # hashed.
6831
+ # hashed; use `EXTERNAL_MU` for 64-byte representative μ used in
6832
+ # ML-DSA signing as defined in NIST FIPS 204 Section 6.2.
6810
6833
  #
6811
6834
  # When the value of `MessageType` is `RAW`, KMS uses the standard
6812
6835
  # signing algorithm, which begins with a hash function. When the value
6813
6836
  # is `DIGEST`, KMS skips the hashing step in the signing algorithm.
6837
+ # When the value is `EXTERNAL_MU` KMS skips the concatenated hashing
6838
+ # of the public key hash and the message done in the ML-DSA signing
6839
+ # algorithm.
6814
6840
  #
6815
- # Use the `DIGEST` value only when the value of the `Message`
6816
- # parameter is a message digest. If you use the `DIGEST` value with an
6817
- # unhashed message, the security of the verification operation can be
6818
- # compromised.
6841
+ # Use the `DIGEST` or `EXTERNAL_MU` value only when the value of the
6842
+ # `Message` parameter is a message digest. If you use the `DIGEST`
6843
+ # value with an unhashed message, the security of the signing
6844
+ # operation can be compromised.
6819
6845
  #
6820
- # When the value of `MessageType`is `DIGEST`, the length of the
6846
+ # When the value of `MessageType` is `DIGEST`, the length of the
6821
6847
  # `Message` value must match the length of hashed messages for the
6822
6848
  # specified signing algorithm.
6823
6849
  #
6850
+ # When the value of `MessageType` is `EXTERNAL_MU` the length of the
6851
+ # `Message` value must be 64 bytes.
6852
+ #
6824
6853
  # You can submit a message digest and omit the `MessageType` or
6825
6854
  # specify `RAW` so the digest is hashed again while signing. However,
6826
6855
  # if the signed message is hashed once while signing, but twice while
6827
6856
  # verifying, verification fails, even when the message hasn't
6828
6857
  # changed.
6829
6858
  #
6830
- # The hashing algorithm in that `Verify` uses is based on the
6859
+ # The hashing algorithm that `Verify` uses is based on the
6831
6860
  # `SigningAlgorithm` value.
6832
6861
  #
6833
6862
  # * Signing algorithms that end in SHA\_256 use the SHA\_256 hashing
@@ -6839,6 +6868,9 @@ module Aws::KMS
6839
6868
  # * Signing algorithms that end in SHA\_512 use the SHA\_512 hashing
6840
6869
  # algorithm.
6841
6870
  #
6871
+ # * Signing algorithms that end in SHAKE\_256 use the SHAKE\_256
6872
+ # hashing algorithm.
6873
+ #
6842
6874
  # * SM2DSA uses the SM3 hashing algorithm. For details, see [Offline
6843
6875
  # verification with SM2 key pairs][1].
6844
6876
  #
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.104.0'
57
+ GEM_VERSION = '1.105.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -157,7 +157,7 @@ module Aws
157
157
  ?description: ::String,
158
158
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
159
159
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
160
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
160
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
161
161
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
162
162
  ?custom_key_store_id: ::String,
163
163
  ?bypass_policy_lockout_safety_check: bool,
@@ -481,10 +481,10 @@ module Aws
481
481
  def key_id: () -> ::String
482
482
  def public_key: () -> ::String
483
483
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
484
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
484
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
485
485
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
486
486
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
487
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
487
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
488
488
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
489
489
  end
490
490
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -712,15 +712,15 @@ module Aws
712
712
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
713
713
  def key_id: () -> ::String
714
714
  def signature: () -> ::String
715
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
715
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
716
716
  end
717
717
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
718
718
  def sign: (
719
719
  key_id: ::String,
720
720
  message: ::String,
721
- ?message_type: ("RAW" | "DIGEST"),
721
+ ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
722
722
  ?grant_tokens: Array[::String],
723
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
723
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
724
724
  ?dry_run: bool
725
725
  ) -> _SignResponseSuccess
726
726
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -789,15 +789,15 @@ module Aws
789
789
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
790
790
  def key_id: () -> ::String
791
791
  def signature_valid: () -> bool
792
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
792
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
793
793
  end
794
794
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
795
795
  def verify: (
796
796
  key_id: ::String,
797
797
  message: ::String,
798
- ?message_type: ("RAW" | "DIGEST"),
798
+ ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
799
799
  signature: ::String,
800
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA"),
800
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
801
801
  ?grant_tokens: Array[::String],
802
802
  ?dry_run: bool
803
803
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -118,7 +118,7 @@ module Aws::KMS
118
118
  attr_accessor description: ::String
119
119
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
120
120
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
122
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
123
123
  attr_accessor custom_key_store_id: ::String
124
124
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -478,10 +478,10 @@ module Aws::KMS
478
478
  attr_accessor key_id: ::String
479
479
  attr_accessor public_key: ::String
480
480
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
482
482
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
483
483
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
484
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
484
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
485
485
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
486
486
  SENSITIVE: []
487
487
  end
@@ -621,9 +621,9 @@ module Aws::KMS
621
621
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
622
622
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
623
623
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
625
625
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
626
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")]
626
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
627
627
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
628
628
  attr_accessor multi_region: bool
629
629
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -870,9 +870,9 @@ module Aws::KMS
870
870
  class SignRequest
871
871
  attr_accessor key_id: ::String
872
872
  attr_accessor message: ::String
873
- attr_accessor message_type: ("RAW" | "DIGEST")
873
+ attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
874
874
  attr_accessor grant_tokens: ::Array[::String]
875
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
875
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
876
876
  attr_accessor dry_run: bool
877
877
  SENSITIVE: [:message]
878
878
  end
@@ -880,7 +880,7 @@ module Aws::KMS
880
880
  class SignResponse
881
881
  attr_accessor key_id: ::String
882
882
  attr_accessor signature: ::String
883
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
883
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
884
884
  SENSITIVE: []
885
885
  end
886
886
 
@@ -966,9 +966,9 @@ module Aws::KMS
966
966
  class VerifyRequest
967
967
  attr_accessor key_id: ::String
968
968
  attr_accessor message: ::String
969
- attr_accessor message_type: ("RAW" | "DIGEST")
969
+ attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
970
970
  attr_accessor signature: ::String
971
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
971
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
972
972
  attr_accessor grant_tokens: ::Array[::String]
973
973
  attr_accessor dry_run: bool
974
974
  SENSITIVE: [:message]
@@ -977,7 +977,7 @@ module Aws::KMS
977
977
  class VerifyResponse
978
978
  attr_accessor key_id: ::String
979
979
  attr_accessor signature_valid: bool
980
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA")
980
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
981
981
  SENSITIVE: []
982
982
  end
983
983
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.104.0
4
+ version: 1.105.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services