cdk-comprehend-s3olap 2.0.140 → 2.0.142

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -61,7 +61,7 @@
61
61
  "CreateCustomKeyStore": [
62
62
  {
63
63
  "input": {
64
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
64
+ "CloudHsmClusterId": "cluster-234abcdefABC",
65
65
  "CustomKeyStoreName": "ExampleKeyStore",
66
66
  "KeyStorePassword": "kmsPswd",
67
67
  "TrustAnchorCertificate": "<certificate-goes-here>"
@@ -423,7 +423,7 @@
423
423
  "KeyMetadata": {
424
424
  "AWSAccountId": "111122223333",
425
425
  "Arn": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
426
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
426
+ "CloudHsmClusterId": "cluster-234abcdefABC",
427
427
  "CreationDate": "2019-12-02T07:48:55-07:00",
428
428
  "CustomKeyStoreId": "cks-1234567890abcdef0",
429
429
  "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
@@ -506,6 +506,7 @@
506
506
  "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
507
507
  },
508
508
  "output": {
509
+ "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
509
510
  "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
510
511
  "Plaintext": "<binary data>"
511
512
  },
@@ -515,13 +516,71 @@
515
516
  "KeyId": "A key identifier for the KMS key to use to decrypt the data."
516
517
  },
517
518
  "output": {
519
+ "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.",
518
520
  "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
519
521
  "Plaintext": "The decrypted (plaintext) data."
520
522
  }
521
523
  },
522
- "description": "The following example decrypts data that was encrypted with a KMS key.",
523
- "id": "to-decrypt-data-1478281622886",
524
- "title": "To decrypt data"
524
+ "description": "The following example decrypts data that was encrypted with a symmetric encryption KMS key. The KeyId is not required when decrypting with a symmetric encryption key, but it is a best practice.",
525
+ "id": "to-decrypt-data-1",
526
+ "title": "To decrypt data with a symmetric encryption KMS key"
527
+ },
528
+ {
529
+ "input": {
530
+ "CiphertextBlob": "<binary data>",
531
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
532
+ "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321"
533
+ },
534
+ "output": {
535
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
536
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
537
+ "Plaintext": "<binary data>"
538
+ },
539
+ "comments": {
540
+ "input": {
541
+ "CiphertextBlob": "The encrypted data (ciphertext).",
542
+ "EncryptionAlgorithm": "The encryption algorithm that was used to encrypt the data. This parameter is required to decrypt with an asymmetric KMS key.",
543
+ "KeyId": "A key identifier for the KMS key to use to decrypt the data. This parameter is required to decrypt with an asymmetric KMS key."
544
+ },
545
+ "output": {
546
+ "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext.",
547
+ "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
548
+ "Plaintext": "The decrypted (plaintext) data."
549
+ }
550
+ },
551
+ "description": "The following example decrypts data that was encrypted with an asymmetric encryption KMS key. When the KMS encryption key is asymmetric, you must specify the KMS key ID and the encryption algorithm that was used to encrypt the data.",
552
+ "id": "to-decrypt-data-2",
553
+ "title": "To decrypt data with an asymmetric encryption KMS key"
554
+ },
555
+ {
556
+ "input": {
557
+ "CiphertextBlob": "<binary data>",
558
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
559
+ "Recipient": {
560
+ "AttestationDocument": "<attestation document>",
561
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
562
+ }
563
+ },
564
+ "output": {
565
+ "CiphertextForRecipient": "<binary data>",
566
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
567
+ "Plaintext": ""
568
+ },
569
+ "comments": {
570
+ "input": {
571
+ "CiphertextBlob": "The encrypted data. This ciphertext was encrypted with the KMS key",
572
+ "KeyId": "The KMS key to use to decrypt the ciphertext",
573
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
574
+ },
575
+ "output": {
576
+ "CiphertextForRecipient": "The decrypted CiphertextBlob encrypted with the public key from the attestation document",
577
+ "KeyId": "The KMS key that was used to decrypt the encrypted data (CiphertextBlob)",
578
+ "Plaintext": "This field is null or empty"
579
+ }
580
+ },
581
+ "description": "The following Decrypt example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning the decrypted data in plaintext (Plaintext), the operation returns the decrypted data encrypted by the public key from the attestation document (CiphertextForRecipient).",
582
+ "id": "to-decrypt-data-for-a-nitro-enclave-2",
583
+ "title": "To decrypt data for a Nitro enclave"
525
584
  }
526
585
  ],
527
586
  "DeleteAlias": [
@@ -600,7 +659,7 @@
600
659
  "output": {
601
660
  "CustomKeyStores": [
602
661
  {
603
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
662
+ "CloudHsmClusterId": "cluster-234abcdefABC",
604
663
  "ConnectionState": "CONNECTED",
605
664
  "CreationDate": "1.499288695918E9",
606
665
  "CustomKeyStoreId": "cks-1234567890abcdef0",
@@ -867,7 +926,7 @@
867
926
  "KeyMetadata": {
868
927
  "AWSAccountId": "123456789012",
869
928
  "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
870
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
929
+ "CloudHsmClusterId": "cluster-234abcdefABC",
871
930
  "CreationDate": 1646160362.664,
872
931
  "CustomKeyStoreId": "cks-1234567890abcdef0",
873
932
  "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
@@ -983,7 +1042,7 @@
983
1042
  }
984
1043
  },
985
1044
  "description": "This example disconnects an AWS KMS custom key store from its backing key store. For an AWS CloudHSM key store, it disconnects the key store from its AWS CloudHSM cluster. For an external key store, it disconnects the key store from the external key store proxy that communicates with your external key manager. This operation doesn't return any data. To verify that the custom key store is disconnected, use the <code>DescribeCustomKeyStores</code> operation.",
986
- "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster-1628627955156",
1045
+ "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster-234abcdefABC",
987
1046
  "title": "To disconnect a custom key store from its CloudHSM cluster"
988
1047
  }
989
1048
  ],
@@ -1025,6 +1084,7 @@
1025
1084
  },
1026
1085
  "output": {
1027
1086
  "CiphertextBlob": "<binary data>",
1087
+ "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
1028
1088
  "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
1029
1089
  },
1030
1090
  "comments": {
@@ -1034,12 +1094,40 @@
1034
1094
  },
1035
1095
  "output": {
1036
1096
  "CiphertextBlob": "The encrypted data (ciphertext).",
1097
+ "EncryptionAlgorithm": "The encryption algorithm that was used in the operation. For symmetric encryption keys, the encryption algorithm is always SYMMETRIC_DEFAULT.",
1098
+ "KeyId": "The ARN of the KMS key that was used to encrypt the data."
1099
+ }
1100
+ },
1101
+ "description": "The following example encrypts data with the specified symmetric encryption KMS key.",
1102
+ "id": "to-encrypt-data-1",
1103
+ "title": "To encrypt data with a symmetric encryption KMS key"
1104
+ },
1105
+ {
1106
+ "input": {
1107
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
1108
+ "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321",
1109
+ "Plaintext": "<binary data>"
1110
+ },
1111
+ "output": {
1112
+ "CiphertextBlob": "<binary data>",
1113
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
1114
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321"
1115
+ },
1116
+ "comments": {
1117
+ "input": {
1118
+ "EncryptionAlgorithm": "The encryption algorithm to use in the operation.",
1119
+ "KeyId": "The identifier of the KMS key to use for encryption. You can use the key ID or Amazon Resource Name (ARN) of the KMS key, or the name or ARN of an alias that refers to the KMS key.",
1120
+ "Plaintext": "The data to encrypt."
1121
+ },
1122
+ "output": {
1123
+ "CiphertextBlob": "The encrypted data (ciphertext).",
1124
+ "EncryptionAlgorithm": "The encryption algorithm that was used in the operation.",
1037
1125
  "KeyId": "The ARN of the KMS key that was used to encrypt the data."
1038
1126
  }
1039
1127
  },
1040
- "description": "The following example encrypts data with the specified KMS key.",
1041
- "id": "to-encrypt-data-1478906026012",
1042
- "title": "To encrypt data"
1128
+ "description": "The following example encrypts data with the specified RSA asymmetric KMS key. When you encrypt with an asymmetric key, you must specify the encryption algorithm.",
1129
+ "id": "to-encrypt-data-2",
1130
+ "title": "To encrypt data with an asymmetric encryption KMS key"
1043
1131
  }
1044
1132
  ],
1045
1133
  "GenerateDataKey": [
@@ -1065,8 +1153,40 @@
1065
1153
  }
1066
1154
  },
1067
1155
  "description": "The following example generates a 256-bit symmetric data encryption key (data key) in two formats. One is the unencrypted (plainext) data key, and the other is the data key encrypted with the specified KMS key.",
1068
- "id": "to-generate-a-data-key-1478912956062",
1156
+ "id": "to-generate-a-data-key-1",
1069
1157
  "title": "To generate a data key"
1158
+ },
1159
+ {
1160
+ "input": {
1161
+ "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1162
+ "KeySpec": "AES_256",
1163
+ "Recipient": {
1164
+ "AttestationDocument": "<attestation document>",
1165
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
1166
+ }
1167
+ },
1168
+ "output": {
1169
+ "CiphertextBlob": "<binary data>",
1170
+ "CiphertextForRecipient": "<binary data>",
1171
+ "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1172
+ "Plaintext": ""
1173
+ },
1174
+ "comments": {
1175
+ "input": {
1176
+ "KeyId": "Identifies the KMS key used to encrypt the encrypted data key (CiphertextBlob)",
1177
+ "KeySpec": "Specifies the type of data key to return",
1178
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
1179
+ },
1180
+ "output": {
1181
+ "CiphertextBlob": "The data key encrypted by the specified KMS key",
1182
+ "CiphertextForRecipient": "The plaintext data key encrypted by the public key from the attestation document",
1183
+ "KeyId": "The KMS key used to encrypt the CiphertextBlob (encrypted data key)",
1184
+ "Plaintext": "This field is null or empty"
1185
+ }
1186
+ },
1187
+ "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a copy of the data key encrypted by the KMS key and a plaintext copy of the data key, GenerateDataKey returns one copy of the data key encrypted by the KMS key (CiphertextBlob) and one copy of the data key encrypted by the public key from the attestation document (CiphertextForRecipient). The operation doesn't return a plaintext data key. ",
1188
+ "id": "to-generate-a-data-key-for-a-nitro-enclave-2",
1189
+ "title": "To generate a data key pair for a Nitro enclave"
1070
1190
  }
1071
1191
  ],
1072
1192
  "GenerateDataKeyPair": [
@@ -1096,8 +1216,44 @@
1096
1216
  }
1097
1217
  },
1098
1218
  "description": "This example generates an RSA data key pair for encryption and decryption. The operation returns a plaintext public key and private key, and a copy of the private key that is encrypted under a symmetric encryption KMS key that you specify.",
1099
- "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption-1628619376878",
1219
+ "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption-1",
1100
1220
  "title": "To generate an RSA key pair for encryption and decryption"
1221
+ },
1222
+ {
1223
+ "input": {
1224
+ "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1225
+ "KeyPairSpec": "RSA_3072",
1226
+ "Recipient": {
1227
+ "AttestationDocument": "<attestation document>",
1228
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
1229
+ }
1230
+ },
1231
+ "output": {
1232
+ "CiphertextForRecipient": "<binary data>",
1233
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1234
+ "KeyPairSpec": "RSA_3072",
1235
+ "PrivateKeyCiphertextBlob": "<binary data>",
1236
+ "PrivateKeyPlaintext": "",
1237
+ "PublicKey": "<binary data>"
1238
+ },
1239
+ "comments": {
1240
+ "input": {
1241
+ "KeyId": "The key ID of the symmetric encryption KMS key that encrypts the private RSA key in the data key pair.",
1242
+ "KeyPairSpec": "The requested key spec of the RSA data key pair.",
1243
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document."
1244
+ },
1245
+ "output": {
1246
+ "CiphertextForRecipient": "The private key of the RSA data key pair encrypted by the public key from the attestation document",
1247
+ "KeyId": "The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.",
1248
+ "KeyPairSpec": "The actual key spec of the RSA data key pair.",
1249
+ "PrivateKeyCiphertextBlob": "The private key of the RSA data key pair encrypted by the KMS key.",
1250
+ "PrivateKeyPlaintext": "This field is null or empty",
1251
+ "PublicKey": "The public key (plaintext) of the RSA data key pair."
1252
+ }
1253
+ },
1254
+ "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext copy of the private data key, GenerateDataKeyPair returns a copy of the private data key encrypted by the public key from the attestation document (CiphertextForRecipient). It returns the public data key (PublicKey) and a copy of private data key encrypted under the specified KMS key (PrivateKeyCiphertextBlob), as usual, but plaintext private data key field (PrivateKeyPlaintext) is null or empty. ",
1255
+ "id": "to-generate-a-data-key-pair-for-a-nitro-enclave-2",
1256
+ "title": "To generate a data key pair for a Nitro enclave"
1101
1257
  }
1102
1258
  ],
1103
1259
  "GenerateDataKeyPairWithoutPlaintext": [
@@ -1200,7 +1356,33 @@
1200
1356
  }
1201
1357
  },
1202
1358
  "description": "The following example generates 32 bytes of random data.",
1203
- "id": "to-generate-random-data-1479163645600",
1359
+ "id": "to-generate-random-data-1",
1360
+ "title": "To generate random data"
1361
+ },
1362
+ {
1363
+ "input": {
1364
+ "NumberOfBytes": 1024,
1365
+ "Recipient": {
1366
+ "AttestationDocument": "<attestation document>",
1367
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
1368
+ }
1369
+ },
1370
+ "output": {
1371
+ "CiphertextForRecipient": "<binary data>",
1372
+ "Plaintext": ""
1373
+ },
1374
+ "comments": {
1375
+ "input": {
1376
+ "NumberOfBytes": "The length of the random byte string",
1377
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
1378
+ },
1379
+ "output": {
1380
+ "CiphertextForRecipient": "The random data encrypted under the public key from the attestation document",
1381
+ "Plaintext": "This field is null or empty"
1382
+ }
1383
+ },
1384
+ "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext (unencrypted) byte string, GenerateRandom returns the byte string encrypted by the public key from the enclave's attestation document.",
1385
+ "id": "to-generate-random-data-2",
1204
1386
  "title": "To generate random data"
1205
1387
  }
1206
1388
  ],
@@ -1932,7 +2114,7 @@
1932
2114
  },
1933
2115
  {
1934
2116
  "input": {
1935
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
2117
+ "CloudHsmClusterId": "cluster-234abcdefABC",
1936
2118
  "CustomKeyStoreId": "cks-1234567890abcdef0"
1937
2119
  },
1938
2120
  "output": {
@@ -173,7 +173,10 @@
173
173
  "shape": "Sv"
174
174
  },
175
175
  "KeyId": {},
176
- "EncryptionAlgorithm": {}
176
+ "EncryptionAlgorithm": {},
177
+ "Recipient": {
178
+ "shape": "S21"
179
+ }
177
180
  }
178
181
  },
179
182
  "output": {
@@ -181,9 +184,12 @@
181
184
  "members": {
182
185
  "KeyId": {},
183
186
  "Plaintext": {
184
- "shape": "S22"
187
+ "shape": "S25"
185
188
  },
186
- "EncryptionAlgorithm": {}
189
+ "EncryptionAlgorithm": {},
190
+ "CiphertextForRecipient": {
191
+ "type": "blob"
192
+ }
187
193
  }
188
194
  }
189
195
  },
@@ -367,7 +373,7 @@
367
373
  "members": {
368
374
  "KeyId": {},
369
375
  "Plaintext": {
370
- "shape": "S22"
376
+ "shape": "S25"
371
377
  },
372
378
  "EncryptionContext": {
373
379
  "shape": "Ss"
@@ -406,6 +412,9 @@
406
412
  "KeySpec": {},
407
413
  "GrantTokens": {
408
414
  "shape": "Sv"
415
+ },
416
+ "Recipient": {
417
+ "shape": "S21"
409
418
  }
410
419
  }
411
420
  },
@@ -416,9 +425,12 @@
416
425
  "type": "blob"
417
426
  },
418
427
  "Plaintext": {
419
- "shape": "S22"
428
+ "shape": "S25"
420
429
  },
421
- "KeyId": {}
430
+ "KeyId": {},
431
+ "CiphertextForRecipient": {
432
+ "type": "blob"
433
+ }
422
434
  }
423
435
  }
424
436
  },
@@ -437,6 +449,9 @@
437
449
  "KeyPairSpec": {},
438
450
  "GrantTokens": {
439
451
  "shape": "Sv"
452
+ },
453
+ "Recipient": {
454
+ "shape": "S21"
440
455
  }
441
456
  }
442
457
  },
@@ -447,13 +462,16 @@
447
462
  "type": "blob"
448
463
  },
449
464
  "PrivateKeyPlaintext": {
450
- "shape": "S22"
465
+ "shape": "S25"
451
466
  },
452
467
  "PublicKey": {
453
468
  "type": "blob"
454
469
  },
455
470
  "KeyId": {},
456
- "KeyPairSpec": {}
471
+ "KeyPairSpec": {},
472
+ "CiphertextForRecipient": {
473
+ "type": "blob"
474
+ }
457
475
  }
458
476
  }
459
477
  },
@@ -529,7 +547,7 @@
529
547
  ],
530
548
  "members": {
531
549
  "Message": {
532
- "shape": "S22"
550
+ "shape": "S25"
533
551
  },
534
552
  "KeyId": {},
535
553
  "MacAlgorithm": {},
@@ -556,14 +574,20 @@
556
574
  "NumberOfBytes": {
557
575
  "type": "integer"
558
576
  },
559
- "CustomKeyStoreId": {}
577
+ "CustomKeyStoreId": {},
578
+ "Recipient": {
579
+ "shape": "S21"
580
+ }
560
581
  }
561
582
  },
562
583
  "output": {
563
584
  "type": "structure",
564
585
  "members": {
565
586
  "Plaintext": {
566
- "shape": "S22"
587
+ "shape": "S25"
588
+ },
589
+ "CiphertextForRecipient": {
590
+ "type": "blob"
567
591
  }
568
592
  }
569
593
  }
@@ -628,7 +652,7 @@
628
652
  "type": "blob"
629
653
  },
630
654
  "PublicKey": {
631
- "shape": "S22"
655
+ "shape": "S25"
632
656
  },
633
657
  "ParametersValidTo": {
634
658
  "type": "timestamp"
@@ -754,7 +778,7 @@
754
778
  }
755
779
  },
756
780
  "output": {
757
- "shape": "S3o"
781
+ "shape": "S3r"
758
782
  }
759
783
  },
760
784
  "ListKeyPolicies": {
@@ -857,7 +881,7 @@
857
881
  }
858
882
  },
859
883
  "output": {
860
- "shape": "S3o"
884
+ "shape": "S3r"
861
885
  }
862
886
  },
863
887
  "PutKeyPolicy": {
@@ -1011,7 +1035,7 @@
1011
1035
  "members": {
1012
1036
  "KeyId": {},
1013
1037
  "Message": {
1014
- "shape": "S22"
1038
+ "shape": "S25"
1015
1039
  },
1016
1040
  "MessageType": {},
1017
1041
  "GrantTokens": {
@@ -1140,7 +1164,7 @@
1140
1164
  "members": {
1141
1165
  "KeyId": {},
1142
1166
  "Message": {
1143
- "shape": "S22"
1167
+ "shape": "S25"
1144
1168
  },
1145
1169
  "MessageType": {},
1146
1170
  "Signature": {
@@ -1174,7 +1198,7 @@
1174
1198
  ],
1175
1199
  "members": {
1176
1200
  "Message": {
1177
- "shape": "S22"
1201
+ "shape": "S25"
1178
1202
  },
1179
1203
  "KeyId": {},
1180
1204
  "MacAlgorithm": {},
@@ -1355,11 +1379,20 @@
1355
1379
  "Region": {}
1356
1380
  }
1357
1381
  },
1358
- "S22": {
1382
+ "S21": {
1383
+ "type": "structure",
1384
+ "members": {
1385
+ "KeyEncryptionAlgorithm": {},
1386
+ "AttestationDocument": {
1387
+ "type": "blob"
1388
+ }
1389
+ }
1390
+ },
1391
+ "S25": {
1359
1392
  "type": "blob",
1360
1393
  "sensitive": true
1361
1394
  },
1362
- "S3o": {
1395
+ "S3r": {
1363
1396
  "type": "structure",
1364
1397
  "members": {
1365
1398
  "Grants": {