/* * Copyright 2010-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ package com.amazonaws.services.kms.model; import java.io.Serializable; import com.amazonaws.AmazonWebServiceRequest; /** *

* Decrypts ciphertext that was encrypted by a KMS key using any of the * following operations: *

* *

* You can use this operation to decrypt ciphertext that was encrypted under a * symmetric encryption KMS key or an asymmetric encryption KMS key. When the * KMS key is asymmetric, you must specify the KMS key and the encryption * algorithm that was used to encrypt the ciphertext. For information about * asymmetric KMS keys, see Asymmetric KMS keys in the Key Management Service Developer * Guide. *

*

* The Decrypt operation also decrypts ciphertext that was * encrypted outside of KMS by the public key in an KMS asymmetric KMS key. * However, it cannot decrypt symmetric ciphertext produced by other libraries, * such as the Amazon Web Services Encryption SDK or Amazon S3 client-side encryption. These libraries return a ciphertext * format that is incompatible with KMS. *

*

* If the ciphertext was encrypted under a symmetric encryption KMS key, the * KeyId parameter is optional. KMS can get this information from * metadata that it adds to the symmetric ciphertext blob. This feature adds * durability to your implementation by ensuring that authorized users can * decrypt ciphertext decades after it was encrypted, even if they've lost track * of the key ID. However, specifying the KMS key is always recommended as a * best practice. When you use the KeyId parameter to specify a KMS * key, KMS only uses the KMS key you specify. If the ciphertext was encrypted * under a different KMS key, the Decrypt operation fails. This * practice ensures that you use the KMS key that you intend. *

*

* Whenever possible, use key policies to give users permission to call the * Decrypt operation on a particular KMS key, instead of using * &IAM; policies. Otherwise, you might create an &IAM; policy that * gives the user Decrypt permission on all KMS keys. This user * could decrypt ciphertext that was encrypted by KMS keys in other accounts if * the key policy for the cross-account KMS key permits it. If you must use an * IAM policy for Decrypt permissions, limit the user to particular * KMS keys or particular trusted accounts. For details, see Best practices for IAM policies in the Key Management Service * Developer Guide. *

*

* Decrypt also supports Amazon Web Services Nitro Enclaves, which provide an isolated compute * environment in Amazon EC2. To call Decrypt for a Nitro enclave, * use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. * Use the Recipient parameter to provide the attestation document * for the enclave. Instead of the plaintext data, the response includes the * plaintext data encrypted with the public key from the attestation document ( * CiphertextForRecipient).For information about the interaction * between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key Management * Service Developer Guide.. *

*

* The KMS key that you use for this operation must be in a compatible key * state. For details, see Key states of KMS keys in the Key Management Service Developer * Guide. *

*

* Cross-account use: Yes. If you use the KeyId parameter to * identify a KMS key in a different Amazon Web Services account, specify the * key ARN or the alias ARN of the KMS key. *

*

* Required permissions: kms:Decrypt (key policy) *

*

* Related operations: *

* */ public class DecryptRequest extends AmazonWebServiceRequest implements Serializable { /** *

* Ciphertext to be decrypted. The blob includes metadata. *

*

* Constraints:
* Length: 1 - 6144
*/ private java.nio.ByteBuffer ciphertextBlob; /** *

* Specifies the encryption context to use when decrypting the data. An * encryption context is valid only for cryptographic operations with a symmetric encryption KMS key. The * standard asymmetric encryption algorithms and HMAC algorithms that KMS * uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *

*

* For more information, see Encryption context in the Key Management Service Developer * Guide. *

*/ private java.util.Map encryptionContext = new java.util.HashMap(); /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from * a new grant that has not yet achieved eventual consistency. For * more information, see Grant token and Using a grant token in the Key Management Service Developer * Guide. *

*/ private java.util.List grantTokens = new java.util.ArrayList(); /** *

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the ciphertext. If * you identify a different KMS key, the Decrypt operation * throws an IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. If you used a symmetric encryption KMS key, KMS * can get the KMS key from metadata that it adds to the symmetric * ciphertext blob. However, it is always recommended as a best practice. * This practice ensures that you use the KMS key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. * When using an alias name, prefix it with "alias/". To * specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *

*

* Constraints:
* Length: 1 - 2048
*/ private String keyId; /** *

* Specifies the encryption algorithm that will be used to decrypt the * ciphertext. Specify the same algorithm that was used to encrypt the data. * If you specify a different algorithm, the Decrypt operation * fails. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. The default value, SYMMETRIC_DEFAULT, * represents the only supported algorithm that is valid for symmetric * encryption KMS keys. *

*

* Constraints:
* Allowed Values: SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, * RSAES_OAEP_SHA_256, SM2PKE */ private String encryptionAlgorithm; /** *

* A signed attestation document from an Amazon Web Services Nitro enclave and * the encryption algorithm to use with the enclave's public key. The only * valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web * Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services * SDK. *

*

* When you use this parameter, instead of returning the plaintext data, KMS * encrypts the plaintext data with the public key in the attestation * document, and returns the resulting ciphertext in the * CiphertextForRecipient field in the response. This * ciphertext can be decrypted only with the private key in the enclave. The * Plaintext field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services * Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key * Management Service Developer Guide. *

*/ private RecipientInfo recipient; /** *

* Checks if your request will succeed. DryRun is an optional * parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

*/ private Boolean dryRun; /** *

* Ciphertext to be decrypted. The blob includes metadata. *

*

* Constraints:
* Length: 1 - 6144
* * @return

* Ciphertext to be decrypted. The blob includes metadata. *

*/ public java.nio.ByteBuffer getCiphertextBlob() { return ciphertextBlob; } /** *

* Ciphertext to be decrypted. The blob includes metadata. *

*

* Constraints:
* Length: 1 - 6144
* * @param ciphertextBlob

* Ciphertext to be decrypted. The blob includes metadata. *

*/ public void setCiphertextBlob(java.nio.ByteBuffer ciphertextBlob) { this.ciphertextBlob = ciphertextBlob; } /** *

* Ciphertext to be decrypted. The blob includes metadata. *

*

* Returns a reference to this object so that method calls can be chained * together. *

* Constraints:
* Length: 1 - 6144
* * @param ciphertextBlob

* Ciphertext to be decrypted. The blob includes metadata. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withCiphertextBlob(java.nio.ByteBuffer ciphertextBlob) { this.ciphertextBlob = ciphertextBlob; return this; } /** *

* Specifies the encryption context to use when decrypting the data. An * encryption context is valid only for cryptographic operations with a symmetric encryption KMS key. The * standard asymmetric encryption algorithms and HMAC algorithms that KMS * uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *

*

* For more information, see Encryption context in the Key Management Service Developer * Guide. *

* * @return

* Specifies the encryption context to use when decrypting the data. * An encryption context is valid only for cryptographic operations with a symmetric encryption KMS * key. The standard asymmetric encryption algorithms and HMAC * algorithms that KMS uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret * key-value pairs that represent additional authenticated data. * When you use an encryption context to encrypt data, you must * specify the same (an exact case-sensitive match) encryption * context to decrypt the data. An encryption context is supported * only on operations with symmetric encryption KMS keys. On * operations with symmetric encryption KMS keys, an encryption * context is optional, but it is strongly recommended. *

*

* For more information, see Encryption context in the Key Management Service * Developer Guide. *

*/ public java.util.Map getEncryptionContext() { return encryptionContext; } /** *

* Specifies the encryption context to use when decrypting the data. An * encryption context is valid only for cryptographic operations with a symmetric encryption KMS key. The * standard asymmetric encryption algorithms and HMAC algorithms that KMS * uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *

*

* For more information, see Encryption context in the Key Management Service Developer * Guide. *

* * @param encryptionContext

* Specifies the encryption context to use when decrypting the * data. An encryption context is valid only for cryptographic operations with a symmetric encryption KMS * key. The standard asymmetric encryption algorithms and HMAC * algorithms that KMS uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret * key-value pairs that represent additional authenticated data. * When you use an encryption context to encrypt data, you must * specify the same (an exact case-sensitive match) encryption * context to decrypt the data. An encryption context is * supported only on operations with symmetric encryption KMS * keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly * recommended. *

*

* For more information, see Encryption context in the Key Management Service * Developer Guide. *

*/ public void setEncryptionContext(java.util.Map encryptionContext) { this.encryptionContext = encryptionContext; } /** *

* Specifies the encryption context to use when decrypting the data. An * encryption context is valid only for cryptographic operations with a symmetric encryption KMS key. The * standard asymmetric encryption algorithms and HMAC algorithms that KMS * uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *

*

* For more information, see Encryption context in the Key Management Service Developer * Guide. *

*

* Returns a reference to this object so that method calls can be chained * together. * * @param encryptionContext

* Specifies the encryption context to use when decrypting the * data. An encryption context is valid only for cryptographic operations with a symmetric encryption KMS * key. The standard asymmetric encryption algorithms and HMAC * algorithms that KMS uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret * key-value pairs that represent additional authenticated data. * When you use an encryption context to encrypt data, you must * specify the same (an exact case-sensitive match) encryption * context to decrypt the data. An encryption context is * supported only on operations with symmetric encryption KMS * keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly * recommended. *

*

* For more information, see Encryption context in the Key Management Service * Developer Guide. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withEncryptionContext(java.util.Map encryptionContext) { this.encryptionContext = encryptionContext; return this; } /** *

* Specifies the encryption context to use when decrypting the data. An * encryption context is valid only for cryptographic operations with a symmetric encryption KMS key. The * standard asymmetric encryption algorithms and HMAC algorithms that KMS * uses do not support an encryption context. *

*

* An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *

*

* For more information, see Encryption context in the Key Management Service Developer * Guide. *

*

* The method adds a new key-value pair into EncryptionContext parameter, * and returns a reference to this object so that method calls can be * chained together. * * @param key The key of the entry to be added into EncryptionContext. * @param value The corresponding value of the entry to be added into * EncryptionContext. * @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest addEncryptionContextEntry(String key, String value) { if (null == this.encryptionContext) { this.encryptionContext = new java.util.HashMap(); } if (this.encryptionContext.containsKey(key)) throw new IllegalArgumentException("Duplicated keys (" + key.toString() + ") are provided."); this.encryptionContext.put(key, value); return this; } /** * Removes all the entries added into EncryptionContext. *

* Returns a reference to this object so that method calls can be chained * together. */ public DecryptRequest clearEncryptionContextEntries() { this.encryptionContext = null; return this; } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from * a new grant that has not yet achieved eventual consistency. For * more information, see Grant token and Using a grant token in the Key Management Service Developer * Guide. *

* * @return

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation * comes from a new grant that has not yet achieved eventual * consistency. For more information, see Grant token and Using a grant token in the Key Management Service * Developer Guide. *

*/ public java.util.List getGrantTokens() { return grantTokens; } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from * a new grant that has not yet achieved eventual consistency. For * more information, see Grant token and Using a grant token in the Key Management Service Developer * Guide. *

* * @param grantTokens

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation * comes from a new grant that has not yet achieved eventual * consistency. For more information, see Grant token and Using a grant token in the Key Management Service * Developer Guide. *

*/ public void setGrantTokens(java.util.Collection grantTokens) { if (grantTokens == null) { this.grantTokens = null; return; } this.grantTokens = new java.util.ArrayList(grantTokens); } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from * a new grant that has not yet achieved eventual consistency. For * more information, see Grant token and Using a grant token in the Key Management Service Developer * Guide. *

*

* Returns a reference to this object so that method calls can be chained * together. * * @param grantTokens

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation * comes from a new grant that has not yet achieved eventual * consistency. For more information, see Grant token and Using a grant token in the Key Management Service * Developer Guide. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withGrantTokens(String... grantTokens) { if (getGrantTokens() == null) { this.grantTokens = new java.util.ArrayList(grantTokens.length); } for (String value : grantTokens) { this.grantTokens.add(value); } return this; } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from * a new grant that has not yet achieved eventual consistency. For * more information, see Grant token and Using a grant token in the Key Management Service Developer * Guide. *

*

* Returns a reference to this object so that method calls can be chained * together. * * @param grantTokens

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation * comes from a new grant that has not yet achieved eventual * consistency. For more information, see Grant token and Using a grant token in the Key Management Service * Developer Guide. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withGrantTokens(java.util.Collection grantTokens) { setGrantTokens(grantTokens); return this; } /** *

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the ciphertext. If * you identify a different KMS key, the Decrypt operation * throws an IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. If you used a symmetric encryption KMS key, KMS * can get the KMS key from metadata that it adds to the symmetric * ciphertext blob. However, it is always recommended as a best practice. * This practice ensures that you use the KMS key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. * When using an alias name, prefix it with "alias/". To * specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *

*

* Constraints:
* Length: 1 - 2048
* * @return

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the * ciphertext. If you identify a different KMS key, the * Decrypt operation throws an * IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was encrypted * under an asymmetric KMS key. If you used a symmetric encryption * KMS key, KMS can get the KMS key from metadata that it adds to * the symmetric ciphertext blob. However, it is always recommended * as a best practice. This practice ensures that you use the KMS * key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or * alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon * Web Services account, you must use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys * or DescribeKey. To get the alias name and alias ARN, use * ListAliases. *

*/ public String getKeyId() { return keyId; } /** *

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the ciphertext. If * you identify a different KMS key, the Decrypt operation * throws an IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. If you used a symmetric encryption KMS key, KMS * can get the KMS key from metadata that it adds to the symmetric * ciphertext blob. However, it is always recommended as a best practice. * This practice ensures that you use the KMS key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. * When using an alias name, prefix it with "alias/". To * specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *

*

* Constraints:
* Length: 1 - 2048
* * @param keyId

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the * ciphertext. If you identify a different KMS key, the * Decrypt operation throws an * IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was * encrypted under an asymmetric KMS key. If you used a symmetric * encryption KMS key, KMS can get the KMS key from metadata that * it adds to the symmetric ciphertext blob. However, it is * always recommended as a best practice. This practice ensures * that you use the KMS key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or * alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different * Amazon Web Services account, you must use the key ARN or alias * ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use * ListKeys or DescribeKey. To get the alias name * and alias ARN, use ListAliases. *

*/ public void setKeyId(String keyId) { this.keyId = keyId; } /** *

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the ciphertext. If * you identify a different KMS key, the Decrypt operation * throws an IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. If you used a symmetric encryption KMS key, KMS * can get the KMS key from metadata that it adds to the symmetric * ciphertext blob. However, it is always recommended as a best practice. * This practice ensures that you use the KMS key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. * When using an alias name, prefix it with "alias/". To * specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *

*

* Returns a reference to this object so that method calls can be chained * together. *

* Constraints:
* Length: 1 - 2048
* * @param keyId

* Specifies the KMS key that KMS uses to decrypt the ciphertext. *

*

* Enter a key ID of the KMS key that was used to encrypt the * ciphertext. If you identify a different KMS key, the * Decrypt operation throws an * IncorrectKeyException. *

*

* This parameter is required only when the ciphertext was * encrypted under an asymmetric KMS key. If you used a symmetric * encryption KMS key, KMS can get the KMS key from metadata that * it adds to the symmetric ciphertext blob. However, it is * always recommended as a best practice. This practice ensures * that you use the KMS key that you intend. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or * alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different * Amazon Web Services account, you must use the key ARN or alias * ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: * arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: * arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use * ListKeys or DescribeKey. To get the alias name * and alias ARN, use ListAliases. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withKeyId(String keyId) { this.keyId = keyId; return this; } /** *

* Specifies the encryption algorithm that will be used to decrypt the * ciphertext. Specify the same algorithm that was used to encrypt the data. * If you specify a different algorithm, the Decrypt operation * fails. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. The default value, SYMMETRIC_DEFAULT, * represents the only supported algorithm that is valid for symmetric * encryption KMS keys. *

*

* Constraints:
* Allowed Values: SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, * RSAES_OAEP_SHA_256, SM2PKE * * @return

* Specifies the encryption algorithm that will be used to decrypt * the ciphertext. Specify the same algorithm that was used to * encrypt the data. If you specify a different algorithm, the * Decrypt operation fails. *

*

* This parameter is required only when the ciphertext was encrypted * under an asymmetric KMS key. The default value, * SYMMETRIC_DEFAULT, represents the only supported * algorithm that is valid for symmetric encryption KMS keys. *

* @see EncryptionAlgorithmSpec */ public String getEncryptionAlgorithm() { return encryptionAlgorithm; } /** *

* Specifies the encryption algorithm that will be used to decrypt the * ciphertext. Specify the same algorithm that was used to encrypt the data. * If you specify a different algorithm, the Decrypt operation * fails. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. The default value, SYMMETRIC_DEFAULT, * represents the only supported algorithm that is valid for symmetric * encryption KMS keys. *

*

* Constraints:
* Allowed Values: SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, * RSAES_OAEP_SHA_256, SM2PKE * * @param encryptionAlgorithm

* Specifies the encryption algorithm that will be used to * decrypt the ciphertext. Specify the same algorithm that was * used to encrypt the data. If you specify a different * algorithm, the Decrypt operation fails. *

*

* This parameter is required only when the ciphertext was * encrypted under an asymmetric KMS key. The default value, * SYMMETRIC_DEFAULT, represents the only supported * algorithm that is valid for symmetric encryption KMS keys. *

* @see EncryptionAlgorithmSpec */ public void setEncryptionAlgorithm(String encryptionAlgorithm) { this.encryptionAlgorithm = encryptionAlgorithm; } /** *

* Specifies the encryption algorithm that will be used to decrypt the * ciphertext. Specify the same algorithm that was used to encrypt the data. * If you specify a different algorithm, the Decrypt operation * fails. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. The default value, SYMMETRIC_DEFAULT, * represents the only supported algorithm that is valid for symmetric * encryption KMS keys. *

*

* Returns a reference to this object so that method calls can be chained * together. *

* Constraints:
* Allowed Values: SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, * RSAES_OAEP_SHA_256, SM2PKE * * @param encryptionAlgorithm

* Specifies the encryption algorithm that will be used to * decrypt the ciphertext. Specify the same algorithm that was * used to encrypt the data. If you specify a different * algorithm, the Decrypt operation fails. *

*

* This parameter is required only when the ciphertext was * encrypted under an asymmetric KMS key. The default value, * SYMMETRIC_DEFAULT, represents the only supported * algorithm that is valid for symmetric encryption KMS keys. *

* @return A reference to this updated object so that method calls can be * chained together. * @see EncryptionAlgorithmSpec */ public DecryptRequest withEncryptionAlgorithm(String encryptionAlgorithm) { this.encryptionAlgorithm = encryptionAlgorithm; return this; } /** *

* Specifies the encryption algorithm that will be used to decrypt the * ciphertext. Specify the same algorithm that was used to encrypt the data. * If you specify a different algorithm, the Decrypt operation * fails. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. The default value, SYMMETRIC_DEFAULT, * represents the only supported algorithm that is valid for symmetric * encryption KMS keys. *

*

* Constraints:
* Allowed Values: SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, * RSAES_OAEP_SHA_256, SM2PKE * * @param encryptionAlgorithm

* Specifies the encryption algorithm that will be used to * decrypt the ciphertext. Specify the same algorithm that was * used to encrypt the data. If you specify a different * algorithm, the Decrypt operation fails. *

*

* This parameter is required only when the ciphertext was * encrypted under an asymmetric KMS key. The default value, * SYMMETRIC_DEFAULT, represents the only supported * algorithm that is valid for symmetric encryption KMS keys. *

* @see EncryptionAlgorithmSpec */ public void setEncryptionAlgorithm(EncryptionAlgorithmSpec encryptionAlgorithm) { this.encryptionAlgorithm = encryptionAlgorithm.toString(); } /** *

* Specifies the encryption algorithm that will be used to decrypt the * ciphertext. Specify the same algorithm that was used to encrypt the data. * If you specify a different algorithm, the Decrypt operation * fails. *

*

* This parameter is required only when the ciphertext was encrypted under * an asymmetric KMS key. The default value, SYMMETRIC_DEFAULT, * represents the only supported algorithm that is valid for symmetric * encryption KMS keys. *

*

* Returns a reference to this object so that method calls can be chained * together. *

* Constraints:
* Allowed Values: SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, * RSAES_OAEP_SHA_256, SM2PKE * * @param encryptionAlgorithm

* Specifies the encryption algorithm that will be used to * decrypt the ciphertext. Specify the same algorithm that was * used to encrypt the data. If you specify a different * algorithm, the Decrypt operation fails. *

*

* This parameter is required only when the ciphertext was * encrypted under an asymmetric KMS key. The default value, * SYMMETRIC_DEFAULT, represents the only supported * algorithm that is valid for symmetric encryption KMS keys. *

* @return A reference to this updated object so that method calls can be * chained together. * @see EncryptionAlgorithmSpec */ public DecryptRequest withEncryptionAlgorithm(EncryptionAlgorithmSpec encryptionAlgorithm) { this.encryptionAlgorithm = encryptionAlgorithm.toString(); return this; } /** *

* A signed attestation document from an Amazon Web Services Nitro enclave and * the encryption algorithm to use with the enclave's public key. The only * valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web * Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services * SDK. *

*

* When you use this parameter, instead of returning the plaintext data, KMS * encrypts the plaintext data with the public key in the attestation * document, and returns the resulting ciphertext in the * CiphertextForRecipient field in the response. This * ciphertext can be decrypted only with the private key in the enclave. The * Plaintext field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services * Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key * Management Service Developer Guide. *

* * @return

* A signed attestation document from an Amazon Web Services Nitro * enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is * RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web * Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web * Services SDK. *

*

* When you use this parameter, instead of returning the plaintext * data, KMS encrypts the plaintext data with the public key in the * attestation document, and returns the resulting ciphertext in the * CiphertextForRecipient field in the response. This * ciphertext can be decrypted only with the private key in the * enclave. The Plaintext field in the response is null * or empty. *

*

* For information about the interaction between KMS and Amazon Web * Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the * Key Management Service Developer Guide. *

*/ public RecipientInfo getRecipient() { return recipient; } /** *

* A signed attestation document from an Amazon Web Services Nitro enclave and * the encryption algorithm to use with the enclave's public key. The only * valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web * Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services * SDK. *

*

* When you use this parameter, instead of returning the plaintext data, KMS * encrypts the plaintext data with the public key in the attestation * document, and returns the resulting ciphertext in the * CiphertextForRecipient field in the response. This * ciphertext can be decrypted only with the private key in the enclave. The * Plaintext field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services * Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key * Management Service Developer Guide. *

* * @param recipient

* A signed attestation document from an Amazon Web Services Nitro * enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is * RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon * Web Services Nitro Enclaves. To include this parameter, use * the Amazon Web Services Nitro Enclaves SDK or any Amazon Web * Services SDK. *

*

* When you use this parameter, instead of returning the * plaintext data, KMS encrypts the plaintext data with the * public key in the attestation document, and returns the * resulting ciphertext in the * CiphertextForRecipient field in the response. * This ciphertext can be decrypted only with the private key in * the enclave. The Plaintext field in the response * is null or empty. *

*

* For information about the interaction between KMS and Amazon * Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the * Key Management Service Developer Guide. *

*/ public void setRecipient(RecipientInfo recipient) { this.recipient = recipient; } /** *

* A signed attestation document from an Amazon Web Services Nitro enclave and * the encryption algorithm to use with the enclave's public key. The only * valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web * Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services * SDK. *

*

* When you use this parameter, instead of returning the plaintext data, KMS * encrypts the plaintext data with the public key in the attestation * document, and returns the resulting ciphertext in the * CiphertextForRecipient field in the response. This * ciphertext can be decrypted only with the private key in the enclave. The * Plaintext field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services * Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key * Management Service Developer Guide. *

*

* Returns a reference to this object so that method calls can be chained * together. * * @param recipient

* A signed attestation document from an Amazon Web Services Nitro * enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is * RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon * Web Services Nitro Enclaves. To include this parameter, use * the Amazon Web Services Nitro Enclaves SDK or any Amazon Web * Services SDK. *

*

* When you use this parameter, instead of returning the * plaintext data, KMS encrypts the plaintext data with the * public key in the attestation document, and returns the * resulting ciphertext in the * CiphertextForRecipient field in the response. * This ciphertext can be decrypted only with the private key in * the enclave. The Plaintext field in the response * is null or empty. *

*

* For information about the interaction between KMS and Amazon * Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the * Key Management Service Developer Guide. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withRecipient(RecipientInfo recipient) { this.recipient = recipient; return this; } /** *

* Checks if your request will succeed. DryRun is an optional * parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

* * @return

* Checks if your request will succeed. DryRun is an * optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

*/ public Boolean isDryRun() { return dryRun; } /** *

* Checks if your request will succeed. DryRun is an optional * parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

* * @return

* Checks if your request will succeed. DryRun is an * optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

*/ public Boolean getDryRun() { return dryRun; } /** *

* Checks if your request will succeed. DryRun is an optional * parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

* * @param dryRun

* Checks if your request will succeed. DryRun is an * optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management * Service Developer Guide. *

*/ public void setDryRun(Boolean dryRun) { this.dryRun = dryRun; } /** *

* Checks if your request will succeed. DryRun is an optional * parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *

*

* Returns a reference to this object so that method calls can be chained * together. * * @param dryRun

* Checks if your request will succeed. DryRun is an * optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management * Service Developer Guide. *

* @return A reference to this updated object so that method calls can be * chained together. */ public DecryptRequest withDryRun(Boolean dryRun) { this.dryRun = dryRun; return this; } /** * Returns a string representation of this object; useful for testing and * debugging. * * @return A string representation of this object. * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getCiphertextBlob() != null) sb.append("CiphertextBlob: " + getCiphertextBlob() + ","); if (getEncryptionContext() != null) sb.append("EncryptionContext: " + getEncryptionContext() + ","); if (getGrantTokens() != null) sb.append("GrantTokens: " + getGrantTokens() + ","); if (getKeyId() != null) sb.append("KeyId: " + getKeyId() + ","); if (getEncryptionAlgorithm() != null) sb.append("EncryptionAlgorithm: " + getEncryptionAlgorithm() + ","); if (getRecipient() != null) sb.append("Recipient: " + getRecipient() + ","); if (getDryRun() != null) sb.append("DryRun: " + getDryRun()); sb.append("}"); return sb.toString(); } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getCiphertextBlob() == null) ? 0 : getCiphertextBlob().hashCode()); hashCode = prime * hashCode + ((getEncryptionContext() == null) ? 0 : getEncryptionContext().hashCode()); hashCode = prime * hashCode + ((getGrantTokens() == null) ? 0 : getGrantTokens().hashCode()); hashCode = prime * hashCode + ((getKeyId() == null) ? 0 : getKeyId().hashCode()); hashCode = prime * hashCode + ((getEncryptionAlgorithm() == null) ? 0 : getEncryptionAlgorithm().hashCode()); hashCode = prime * hashCode + ((getRecipient() == null) ? 0 : getRecipient().hashCode()); hashCode = prime * hashCode + ((getDryRun() == null) ? 0 : getDryRun().hashCode()); return hashCode; } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof DecryptRequest == false) return false; DecryptRequest other = (DecryptRequest) obj; if (other.getCiphertextBlob() == null ^ this.getCiphertextBlob() == null) return false; if (other.getCiphertextBlob() != null && other.getCiphertextBlob().equals(this.getCiphertextBlob()) == false) return false; if (other.getEncryptionContext() == null ^ this.getEncryptionContext() == null) return false; if (other.getEncryptionContext() != null && other.getEncryptionContext().equals(this.getEncryptionContext()) == false) return false; if (other.getGrantTokens() == null ^ this.getGrantTokens() == null) return false; if (other.getGrantTokens() != null && other.getGrantTokens().equals(this.getGrantTokens()) == false) return false; if (other.getKeyId() == null ^ this.getKeyId() == null) return false; if (other.getKeyId() != null && other.getKeyId().equals(this.getKeyId()) == false) return false; if (other.getEncryptionAlgorithm() == null ^ this.getEncryptionAlgorithm() == null) return false; if (other.getEncryptionAlgorithm() != null && other.getEncryptionAlgorithm().equals(this.getEncryptionAlgorithm()) == false) return false; if (other.getRecipient() == null ^ this.getRecipient() == null) return false; if (other.getRecipient() != null && other.getRecipient().equals(this.getRecipient()) == false) return false; if (other.getDryRun() == null ^ this.getDryRun() == null) return false; if (other.getDryRun() != null && other.getDryRun().equals(this.getDryRun()) == false) return false; return true; } }