/* * Copyright 2010-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ package com.amazonaws.services.kms.model; import java.io.Serializable; import com.amazonaws.AmazonWebServiceRequest; /** *
* Returns a unique symmetric data key for use outside of KMS. This operation * returns a plaintext copy of the data key and a copy that is encrypted under a * symmetric encryption KMS key that you specify. The bytes in the plaintext key * are random; they are not related to the caller or the KMS key. You can use * the plaintext key to encrypt your data outside of KMS and store the encrypted * data key with the encrypted data. *
** To generate a data key, specify the symmetric encryption KMS key that will be * used to encrypt the data key. You cannot use an asymmetric KMS key to encrypt * data keys. To get the type of your KMS key, use the DescribeKey * operation. *
*
* You must also specify the length of the data key. Use either the
* KeySpec
or NumberOfBytes
parameters (but not both).
* For 128-bit and 256-bit data keys, use the KeySpec
parameter.
*
* To generate a 128-bit SM4 data key (China Regions only), specify a
* KeySpec
value of AES_128
or a
* NumberOfBytes
value of 16
. The symmetric encryption
* key used in China Regions to encrypt your data key is an SM4 encryption key.
*
* To get only an encrypted copy of the data key, use * GenerateDataKeyWithoutPlaintext. To generate an asymmetric data key * pair, use the GenerateDataKeyPair or * GenerateDataKeyPairWithoutPlaintext operation. To get a * cryptographically secure random byte string, use GenerateRandom. *
*
* You can use an optional encryption context to add additional security to the
* encryption operation. If you specify an EncryptionContext
, you
* must specify the same encryption context (a case-sensitive exact match) when
* decrypting the encrypted data key. Otherwise, the request to decrypt fails
* with an InvalidCiphertextException
. For more information, see Encryption Context in the Key Management Service Developer Guide.
*
* GenerateDataKey
also supports Amazon Web Services Nitro Enclaves, which provide an isolated compute
* environment in Amazon EC2. To call GenerateDataKey
for an Amazon
* Web Services Nitro enclave, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services SDK.
* Use the Recipient
parameter to provide the attestation document
* for the enclave. GenerateDataKey
returns a copy of the data key
* encrypted under the specified KMS key, as usual. But instead of a plaintext
* copy of the data key, the response includes a copy of the data key encrypted
* under the public key from the attestation document (
* CiphertextForRecipient
). For information about the interaction
* between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key Management
* Service Developer Guide..
*
* The KMS key that you use for this operation must be in a compatible key * state. For details, see Key states of KMS keys in the Key Management Service Developer * Guide. *
** How to use your data key *
** We recommend that you use the following pattern to encrypt data locally in * your application. You can write your own code or use a client-side encryption * library, such as the Amazon Web Services Encryption SDK, the Amazon DynamoDB Encryption Client, or Amazon S3 client-side encryption to do these tasks for you. *
** To encrypt data outside of KMS: *
*
* Use the GenerateDataKey
operation to get a data key.
*
* Use the plaintext data key (in the Plaintext
field of the
* response) to encrypt your data outside of KMS. Then erase the plaintext data
* key from memory.
*
* Store the encrypted data key (in the CiphertextBlob
field of the
* response) with the encrypted data.
*
* To decrypt data outside of KMS: *
** Use the Decrypt operation to decrypt the encrypted data key. The * operation returns a plaintext copy of the data key. *
** Use the plaintext data key to decrypt data outside of KMS, then erase the * plaintext data key from memory. *
*
* Cross-account use: Yes. To perform this operation with a KMS key in a
* different Amazon Web Services account, specify the key ARN or alias ARN in
* the value of the KeyId
parameter.
*
* Required permissions: kms:GenerateDataKey (key policy) *
** Related operations: *
* */ public class GenerateDataKeyRequest extends AmazonWebServiceRequest implements Serializable { /** ** Specifies the symmetric encryption KMS key that encrypts the data key. * You cannot specify an asymmetric KMS key or a KMS key in a custom key * store. To get the type and origin of your KMS key, use the * DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN.
* When using an alias name, prefix it with "alias/"
. To
* specify a KMS key in a different Amazon Web Services account, you must
* use the key ARN or alias ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *
*
* Constraints:
* Length: 1 - 2048
*/
private String keyId;
/**
*
* Specifies the encryption context that will be used when encrypting the * data key. *
** Do not include confidential or sensitive information in this field. This * field may be displayed in plaintext in CloudTrail logs and other output. *
** An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *
** For more information, see Encryption context in the Key Management Service Developer * Guide. *
*/ private java.util.Map
* Specifies the length of the data key in bytes. For example, use the value
* 64 to generate a 512-bit data key (64 bytes is 512 bits). For 128-bit
* (16-byte) and 256-bit (32-byte) data keys, use the KeySpec
* parameter.
*
* You must specify either the KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Constraints:
* Range: 1 - 1024
*/
private Integer numberOfBytes;
/**
*
* Specifies the length of the data key. Use AES_128
to
* generate a 128-bit symmetric key, or AES_256
to generate a
* 256-bit symmetric key.
*
* You must specify either the KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Constraints:
* Allowed Values: AES_256, AES_128
*/
private String keySpec;
/**
*
* A list of grant tokens. *
** Use a grant token when your permission to call this operation comes from * a new grant that has not yet achieved eventual consistency. For * more information, see Grant token and Using a grant token in the Key Management Service Developer * Guide. *
*/ private java.util.List
* A signed attestation document from an Amazon Web Services Nitro enclave and
* the encryption algorithm to use with the enclave's public key. The only
* valid encryption algorithm is RSAES_OAEP_SHA_256
.
*
* This parameter only supports attestation documents for Amazon Web * Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services * SDK. *
*
* When you use this parameter, instead of returning the plaintext data key,
* KMS encrypts the plaintext data key under the public key in the
* attestation document, and returns the resulting ciphertext in the
* CiphertextForRecipient
field in the response. This
* ciphertext can be decrypted only with the private key in the enclave. The
* CiphertextBlob
field in the response contains a copy of the
* data key encrypted under the KMS key specified by the KeyId
* parameter. The Plaintext
field in the response is null or
* empty.
*
* For information about the interaction between KMS and Amazon Web Services * Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key * Management Service Developer Guide. *
*/ private RecipientInfo recipient; /** *
* Checks if your request will succeed. DryRun
is an optional
* parameter.
*
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service * Developer Guide. *
*/ private Boolean dryRun; /** ** Specifies the symmetric encryption KMS key that encrypts the data key. * You cannot specify an asymmetric KMS key or a KMS key in a custom key * store. To get the type and origin of your KMS key, use the * DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN.
* When using an alias name, prefix it with "alias/"
. To
* specify a KMS key in a different Amazon Web Services account, you must
* use the key ARN or alias ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *
*
* Constraints:
* Length: 1 - 2048
*
* @return
* Specifies the symmetric encryption KMS key that encrypts the data * key. You cannot specify an asymmetric KMS key or a KMS key in a * custom key store. To get the type and origin of your KMS key, use * the DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or
* alias ARN. When using an alias name, prefix it with
* "alias/"
. To specify a KMS key in a different Amazon
* Web Services account, you must use the key ARN or alias ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use ListKeys * or DescribeKey. To get the alias name and alias ARN, use * ListAliases. *
*/ public String getKeyId() { return keyId; } /** ** Specifies the symmetric encryption KMS key that encrypts the data key. * You cannot specify an asymmetric KMS key or a KMS key in a custom key * store. To get the type and origin of your KMS key, use the * DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN.
* When using an alias name, prefix it with "alias/"
. To
* specify a KMS key in a different Amazon Web Services account, you must
* use the key ARN or alias ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *
*
* Constraints:
* Length: 1 - 2048
*
* @param keyId
* Specifies the symmetric encryption KMS key that encrypts the * data key. You cannot specify an asymmetric KMS key or a KMS * key in a custom key store. To get the type and origin of your * KMS key, use the DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or
* alias ARN. When using an alias name, prefix it with
* "alias/"
. To specify a KMS key in a different
* Amazon Web Services account, you must use the key ARN or alias
* ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use * ListKeys or DescribeKey. To get the alias name * and alias ARN, use ListAliases. *
*/ public void setKeyId(String keyId) { this.keyId = keyId; } /** ** Specifies the symmetric encryption KMS key that encrypts the data key. * You cannot specify an asymmetric KMS key or a KMS key in a custom key * store. To get the type and origin of your KMS key, use the * DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN.
* When using an alias name, prefix it with "alias/"
. To
* specify a KMS key in a different Amazon Web Services account, you must
* use the key ARN or alias ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use ListKeys or * DescribeKey. To get the alias name and alias ARN, use * ListAliases. *
** Returns a reference to this object so that method calls can be chained * together. *
* Constraints:
* Length: 1 - 2048
*
* @param keyId
* Specifies the symmetric encryption KMS key that encrypts the * data key. You cannot specify an asymmetric KMS key or a KMS * key in a custom key store. To get the type and origin of your * KMS key, use the DescribeKey operation. *
*
* To specify a KMS key, use its key ID, key ARN, alias name, or
* alias ARN. When using an alias name, prefix it with
* "alias/"
. To specify a KMS key in a different
* Amazon Web Services account, you must use the key ARN or alias
* ARN.
*
* For example: *
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
* Key ARN:
* arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
* Alias name: alias/ExampleAlias
*
* Alias ARN:
* arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
*
* To get the key ID and key ARN for a KMS key, use * ListKeys or DescribeKey. To get the alias name * and alias ARN, use ListAliases. *
* @return A reference to this updated object so that method calls can be * chained together. */ public GenerateDataKeyRequest withKeyId(String keyId) { this.keyId = keyId; return this; } /** ** Specifies the encryption context that will be used when encrypting the * data key. *
** Do not include confidential or sensitive information in this field. This * field may be displayed in plaintext in CloudTrail logs and other output. *
** An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *
** For more information, see Encryption context in the Key Management Service Developer * Guide. *
* * @return* Specifies the encryption context that will be used when * encrypting the data key. *
** Do not include confidential or sensitive information in this * field. This field may be displayed in plaintext in CloudTrail * logs and other output. *
** An encryption context is a collection of non-secret * key-value pairs that represent additional authenticated data. * When you use an encryption context to encrypt data, you must * specify the same (an exact case-sensitive match) encryption * context to decrypt the data. An encryption context is supported * only on operations with symmetric encryption KMS keys. On * operations with symmetric encryption KMS keys, an encryption * context is optional, but it is strongly recommended. *
** For more information, see Encryption context in the Key Management Service * Developer Guide. *
*/ public java.util.Map* Specifies the encryption context that will be used when encrypting the * data key. *
** Do not include confidential or sensitive information in this field. This * field may be displayed in plaintext in CloudTrail logs and other output. *
** An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *
** For more information, see Encryption context in the Key Management Service Developer * Guide. *
* * @param encryptionContext* Specifies the encryption context that will be used when * encrypting the data key. *
** Do not include confidential or sensitive information in this * field. This field may be displayed in plaintext in CloudTrail * logs and other output. *
** An encryption context is a collection of non-secret * key-value pairs that represent additional authenticated data. * When you use an encryption context to encrypt data, you must * specify the same (an exact case-sensitive match) encryption * context to decrypt the data. An encryption context is * supported only on operations with symmetric encryption KMS * keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly * recommended. *
** For more information, see Encryption context in the Key Management Service * Developer Guide. *
*/ public void setEncryptionContext(java.util.Map* Specifies the encryption context that will be used when encrypting the * data key. *
** Do not include confidential or sensitive information in this field. This * field may be displayed in plaintext in CloudTrail logs and other output. *
** An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *
** For more information, see Encryption context in the Key Management Service Developer * Guide. *
** Returns a reference to this object so that method calls can be chained * together. * * @param encryptionContext
* Specifies the encryption context that will be used when * encrypting the data key. *
** Do not include confidential or sensitive information in this * field. This field may be displayed in plaintext in CloudTrail * logs and other output. *
** An encryption context is a collection of non-secret * key-value pairs that represent additional authenticated data. * When you use an encryption context to encrypt data, you must * specify the same (an exact case-sensitive match) encryption * context to decrypt the data. An encryption context is * supported only on operations with symmetric encryption KMS * keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly * recommended. *
** For more information, see Encryption context in the Key Management Service * Developer Guide. *
* @return A reference to this updated object so that method calls can be * chained together. */ public GenerateDataKeyRequest withEncryptionContext( java.util.Map* Specifies the encryption context that will be used when encrypting the * data key. *
** Do not include confidential or sensitive information in this field. This * field may be displayed in plaintext in CloudTrail logs and other output. *
** An encryption context is a collection of non-secret key-value * pairs that represent additional authenticated data. When you use an * encryption context to encrypt data, you must specify the same (an exact * case-sensitive match) encryption context to decrypt the data. An * encryption context is supported only on operations with symmetric * encryption KMS keys. On operations with symmetric encryption KMS keys, an * encryption context is optional, but it is strongly recommended. *
** For more information, see Encryption context in the Key Management Service Developer * Guide. *
*
* The method adds a new key-value pair into EncryptionContext parameter,
* and returns a reference to this object so that method calls can be
* chained together.
*
* @param key The key of the entry to be added into EncryptionContext.
* @param value The corresponding value of the entry to be added into
* EncryptionContext.
* @return A reference to this updated object so that method calls can be
* chained together.
*/
public GenerateDataKeyRequest addEncryptionContextEntry(String key, String value) {
if (null == this.encryptionContext) {
this.encryptionContext = new java.util.HashMap
* Returns a reference to this object so that method calls can be chained
* together.
*/
public GenerateDataKeyRequest clearEncryptionContextEntries() {
this.encryptionContext = null;
return this;
}
/**
*
* Specifies the length of the data key in bytes. For example, use the value
* 64 to generate a 512-bit data key (64 bytes is 512 bits). For 128-bit
* (16-byte) and 256-bit (32-byte) data keys, use the
* You must specify either the
* Constraints:
* Specifies the length of the data key in bytes. For example, use
* the value 64 to generate a 512-bit data key (64 bytes is 512
* bits). For 128-bit (16-byte) and 256-bit (32-byte) data keys, use
* the
* You must specify either the
* Specifies the length of the data key in bytes. For example, use the value
* 64 to generate a 512-bit data key (64 bytes is 512 bits). For 128-bit
* (16-byte) and 256-bit (32-byte) data keys, use the
* You must specify either the
* Constraints:
* Specifies the length of the data key in bytes. For example,
* use the value 64 to generate a 512-bit data key (64 bytes is
* 512 bits). For 128-bit (16-byte) and 256-bit (32-byte) data
* keys, use the
* You must specify either the
* Specifies the length of the data key in bytes. For example, use the value
* 64 to generate a 512-bit data key (64 bytes is 512 bits). For 128-bit
* (16-byte) and 256-bit (32-byte) data keys, use the
* You must specify either the
* Returns a reference to this object so that method calls can be chained
* together.
*
* Constraints:
* Specifies the length of the data key in bytes. For example,
* use the value 64 to generate a 512-bit data key (64 bytes is
* 512 bits). For 128-bit (16-byte) and 256-bit (32-byte) data
* keys, use the
* You must specify either the
* Specifies the length of the data key. Use
* You must specify either the
* Constraints:
* Specifies the length of the data key. Use
* You must specify either the
* Specifies the length of the data key. Use
* You must specify either the
* Constraints:
* Specifies the length of the data key. Use
* You must specify either the
* Specifies the length of the data key. Use
* You must specify either the
* Returns a reference to this object so that method calls can be chained
* together.
*
* Constraints:
* Specifies the length of the data key. Use
* You must specify either the
* Specifies the length of the data key. Use
* You must specify either the
* Constraints:
* Specifies the length of the data key. Use
* You must specify either the
* Specifies the length of the data key. Use
* You must specify either the
* Returns a reference to this object so that method calls can be chained
* together.
*
* Constraints:
* Specifies the length of the data key. Use
* You must specify either the
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation comes from
* a new grant that has not yet achieved eventual consistency. For
* more information, see Grant token and Using a grant token in the Key Management Service Developer
* Guide.
*
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation
* comes from a new grant that has not yet achieved eventual
* consistency. For more information, see Grant token and Using a grant token in the Key Management Service
* Developer Guide.
*
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation comes from
* a new grant that has not yet achieved eventual consistency. For
* more information, see Grant token and Using a grant token in the Key Management Service Developer
* Guide.
*
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation
* comes from a new grant that has not yet achieved eventual
* consistency. For more information, see Grant token and Using a grant token in the Key Management Service
* Developer Guide.
*
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation comes from
* a new grant that has not yet achieved eventual consistency. For
* more information, see Grant token and Using a grant token in the Key Management Service Developer
* Guide.
*
* Returns a reference to this object so that method calls can be chained
* together.
*
* @param grantTokens
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation
* comes from a new grant that has not yet achieved eventual
* consistency. For more information, see Grant token and Using a grant token in the Key Management Service
* Developer Guide.
*
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation comes from
* a new grant that has not yet achieved eventual consistency. For
* more information, see Grant token and Using a grant token in the Key Management Service Developer
* Guide.
*
* Returns a reference to this object so that method calls can be chained
* together.
*
* @param grantTokens
* A list of grant tokens.
*
* Use a grant token when your permission to call this operation
* comes from a new grant that has not yet achieved eventual
* consistency. For more information, see Grant token and Using a grant token in the Key Management Service
* Developer Guide.
*
* A signed attestation document from an Amazon Web Services Nitro enclave and
* the encryption algorithm to use with the enclave's public key. The only
* valid encryption algorithm is
* This parameter only supports attestation documents for Amazon Web
* Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services
* SDK.
*
* When you use this parameter, instead of returning the plaintext data key,
* KMS encrypts the plaintext data key under the public key in the
* attestation document, and returns the resulting ciphertext in the
*
* For information about the interaction between KMS and Amazon Web Services
* Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key
* Management Service Developer Guide.
*
* A signed attestation document from an Amazon Web Services Nitro
* enclave and the encryption algorithm to use with the enclave's
* public key. The only valid encryption algorithm is
*
* This parameter only supports attestation documents for Amazon Web
* Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web
* Services SDK.
*
* When you use this parameter, instead of returning the plaintext
* data key, KMS encrypts the plaintext data key under the public
* key in the attestation document, and returns the resulting
* ciphertext in the
* For information about the interaction between KMS and Amazon Web
* Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the
* Key Management Service Developer Guide.
*
* A signed attestation document from an Amazon Web Services Nitro enclave and
* the encryption algorithm to use with the enclave's public key. The only
* valid encryption algorithm is
* This parameter only supports attestation documents for Amazon Web
* Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services
* SDK.
*
* When you use this parameter, instead of returning the plaintext data key,
* KMS encrypts the plaintext data key under the public key in the
* attestation document, and returns the resulting ciphertext in the
*
* For information about the interaction between KMS and Amazon Web Services
* Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key
* Management Service Developer Guide.
*
* A signed attestation document from an Amazon Web Services Nitro
* enclave and the encryption algorithm to use with the enclave's
* public key. The only valid encryption algorithm is
*
* This parameter only supports attestation documents for Amazon
* Web Services Nitro Enclaves. To include this parameter, use
* the Amazon Web Services Nitro Enclaves SDK or any Amazon Web
* Services SDK.
*
* When you use this parameter, instead of returning the
* plaintext data key, KMS encrypts the plaintext data key under
* the public key in the attestation document, and returns the
* resulting ciphertext in the
*
* For information about the interaction between KMS and Amazon
* Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the
* Key Management Service Developer Guide.
*
* A signed attestation document from an Amazon Web Services Nitro enclave and
* the encryption algorithm to use with the enclave's public key. The only
* valid encryption algorithm is
* This parameter only supports attestation documents for Amazon Web
* Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services
* SDK.
*
* When you use this parameter, instead of returning the plaintext data key,
* KMS encrypts the plaintext data key under the public key in the
* attestation document, and returns the resulting ciphertext in the
*
* For information about the interaction between KMS and Amazon Web Services
* Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key
* Management Service Developer Guide.
*
* Returns a reference to this object so that method calls can be chained
* together.
*
* @param recipient
* A signed attestation document from an Amazon Web Services Nitro
* enclave and the encryption algorithm to use with the enclave's
* public key. The only valid encryption algorithm is
*
* This parameter only supports attestation documents for Amazon
* Web Services Nitro Enclaves. To include this parameter, use
* the Amazon Web Services Nitro Enclaves SDK or any Amazon Web
* Services SDK.
*
* When you use this parameter, instead of returning the
* plaintext data key, KMS encrypts the plaintext data key under
* the public key in the attestation document, and returns the
* resulting ciphertext in the
*
* For information about the interaction between KMS and Amazon
* Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the
* Key Management Service Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service
* Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service
* Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service
* Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service
* Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service
* Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management
* Service Developer Guide.
*
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service
* Developer Guide.
*
* Returns a reference to this object so that method calls can be chained
* together.
*
* @param dryRun
* Checks if your request will succeed.
* To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management
* Service Developer Guide.
* KeySpec
* parameter.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Range: 1 - 1024
*
* @return KeySpec
parameter.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* KeySpec
* parameter.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Range: 1 - 1024
*
* @param numberOfBytes KeySpec
parameter.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* KeySpec
* parameter.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Range: 1 - 1024
*
* @param numberOfBytes KeySpec
parameter.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* AES_128
to
* generate a 128-bit symmetric key, or AES_256
to generate a
* 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Allowed Values: AES_256, AES_128
*
* @return AES_128
to
* generate a 128-bit symmetric key, or AES_256
to
* generate a 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* AES_128
to
* generate a 128-bit symmetric key, or AES_256
to generate a
* 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Allowed Values: AES_256, AES_128
*
* @param keySpec AES_128
* to generate a 128-bit symmetric key, or AES_256
* to generate a 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* AES_128
to
* generate a 128-bit symmetric key, or AES_256
to generate a
* 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Allowed Values: AES_256, AES_128
*
* @param keySpec AES_128
* to generate a 128-bit symmetric key, or AES_256
* to generate a 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* AES_128
to
* generate a 128-bit symmetric key, or AES_256
to generate a
* 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Allowed Values: AES_256, AES_128
*
* @param keySpec AES_128
* to generate a 128-bit symmetric key, or AES_256
* to generate a 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* AES_128
to
* generate a 128-bit symmetric key, or AES_256
to generate a
* 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
*
* Allowed Values: AES_256, AES_128
*
* @param keySpec AES_128
* to generate a 128-bit symmetric key, or AES_256
* to generate a 256-bit symmetric key.
* KeySpec
or the
* NumberOfBytes
parameter (but not both) in every
* GenerateDataKey
request.
* RSAES_OAEP_SHA_256
.
* CiphertextForRecipient
field in the response. This
* ciphertext can be decrypted only with the private key in the enclave. The
* CiphertextBlob
field in the response contains a copy of the
* data key encrypted under the KMS key specified by the KeyId
* parameter. The Plaintext
field in the response is null or
* empty.
* RSAES_OAEP_SHA_256
.
* CiphertextForRecipient
field in
* the response. This ciphertext can be decrypted only with the
* private key in the enclave. The CiphertextBlob
field
* in the response contains a copy of the data key encrypted under
* the KMS key specified by the KeyId
parameter. The
* Plaintext
field in the response is null or empty.
* RSAES_OAEP_SHA_256
.
* CiphertextForRecipient
field in the response. This
* ciphertext can be decrypted only with the private key in the enclave. The
* CiphertextBlob
field in the response contains a copy of the
* data key encrypted under the KMS key specified by the KeyId
* parameter. The Plaintext
field in the response is null or
* empty.
* RSAES_OAEP_SHA_256
.
* CiphertextForRecipient
field in the response.
* This ciphertext can be decrypted only with the private key in
* the enclave. The CiphertextBlob
field in the
* response contains a copy of the data key encrypted under the
* KMS key specified by the KeyId
parameter. The
* Plaintext
field in the response is null or empty.
* RSAES_OAEP_SHA_256
.
* CiphertextForRecipient
field in the response. This
* ciphertext can be decrypted only with the private key in the enclave. The
* CiphertextBlob
field in the response contains a copy of the
* data key encrypted under the KMS key specified by the KeyId
* parameter. The Plaintext
field in the response is null or
* empty.
* RSAES_OAEP_SHA_256
.
* CiphertextForRecipient
field in the response.
* This ciphertext can be decrypted only with the private key in
* the enclave. The CiphertextBlob
field in the
* response contains a copy of the data key encrypted under the
* KMS key specified by the KeyId
parameter. The
* Plaintext
field in the response is null or empty.
* DryRun
is an optional
* parameter.
* DryRun
is an
* optional parameter.
* DryRun
is an optional
* parameter.
* DryRun
is an
* optional parameter.
* DryRun
is an optional
* parameter.
* DryRun
is an
* optional parameter.
* DryRun
is an optional
* parameter.
* DryRun
is an
* optional parameter.
*