/* * Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.kms.model; import java.io.Serializable; import javax.annotation.Generated; import com.amazonaws.AmazonWebServiceRequest; /** * * @see AWS API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class VerifyRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable { /** *

* Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key that * was used to generate the signature. If you specify a different KMS key, the signature verification fails. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

*/ private String keyId; /** *

* Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest of the * message. If you submit a digest, use the MessageType parameter with a value of DIGEST. *

*

* If the message specified here is different from the message that was signed, the signature verification fails. A * message and its hash digest are considered to be the same message. *

*/ private java.nio.ByteBuffer message; /** *

* Tells KMS whether the value of the Message parameter should be hashed as part of the signing * algorithm. Use RAW for unhashed messages; use DIGEST for message digests, which are * already hashed. *

*

* When the value of MessageType is RAW, KMS uses the standard signing algorithm, which * begins with a hash function. When the value is DIGEST, KMS skips the hashing step in the signing * algorithm. *

* *

* Use the DIGEST value only when the value of the Message parameter is a message digest. * If you use the DIGEST value with an unhashed message, the security of the verification operation can * be compromised. *

*
*

* When the value of MessageTypeis DIGEST, the length of the Message value * must match the length of hashed messages for the specified signing algorithm. *

*

* You can submit a message digest and omit the MessageType or specify RAW so the digest * is hashed again while signing. However, if the signed message is hashed once while signing, but twice while * verifying, verification fails, even when the message hasn't changed. *

*

* The hashing algorithm in that Verify uses is based on the SigningAlgorithm value. *

* */ private String messageType; /** *

* The signature that the Sign operation generated. *

*/ private java.nio.ByteBuffer signature; /** *

* The signing algorithm that was used to sign the message. If you submit a different algorithm, the signature * verification fails. *

*/ private String signingAlgorithm; /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved * eventual consistency. For more information, see Grant token and Using a grant * token in the Key Management Service Developer Guide. *

*/ private com.amazonaws.internal.SdkInternalList grantTokens; /** *

* Checks if your request will succeed. DryRun is an optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. *

*/ private Boolean dryRun; /** *

* Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key that * was used to generate the signature. If you specify a different KMS key, the signature verification fails. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

* * @param keyId * Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key * that was used to generate the signature. If you specify a different KMS key, the signature verification * fails.

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix * it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias * name and alias ARN, use ListAliases. */ public void setKeyId(String keyId) { this.keyId = keyId; } /** *

* Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key that * was used to generate the signature. If you specify a different KMS key, the signature verification fails. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

* * @return Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS * key that was used to generate the signature. If you specify a different KMS key, the signature * verification fails.

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix * it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias * name and alias ARN, use ListAliases. */ public String getKeyId() { return this.keyId; } /** *

* Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key that * was used to generate the signature. If you specify a different KMS key, the signature verification fails. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

* * @param keyId * Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key * that was used to generate the signature. If you specify a different KMS key, the signature verification * fails.

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix * it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

* *

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias * name and alias ARN, use ListAliases. * @return Returns a reference to this object so that method calls can be chained together. */ public VerifyRequest withKeyId(String keyId) { setKeyId(keyId); return this; } /** *

* Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest of the * message. If you submit a digest, use the MessageType parameter with a value of DIGEST. *

*

* If the message specified here is different from the message that was signed, the signature verification fails. A * message and its hash digest are considered to be the same message. *

*

* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service. * Users of the SDK should not perform Base64 encoding on this field. *

*

* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will * be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or * ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future * major version of the SDK. *

* * @param message * Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest * of the message. If you submit a digest, use the MessageType parameter with a value of * DIGEST.

*

* If the message specified here is different from the message that was signed, the signature verification * fails. A message and its hash digest are considered to be the same message. */ public void setMessage(java.nio.ByteBuffer message) { this.message = message; } /** *

* Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest of the * message. If you submit a digest, use the MessageType parameter with a value of DIGEST. *

*

* If the message specified here is different from the message that was signed, the signature verification fails. A * message and its hash digest are considered to be the same message. *

*

* {@code ByteBuffer}s are stateful. Calling their {@code get} methods changes their {@code position}. We recommend * using {@link java.nio.ByteBuffer#asReadOnlyBuffer()} to create a read-only view of the buffer with an independent * {@code position}, and calling {@code get} methods on this rather than directly on the returned {@code ByteBuffer}. * Doing so will ensure that anyone else using the {@code ByteBuffer} will not be affected by changes to the * {@code position}. *

* * @return Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest * of the message. If you submit a digest, use the MessageType parameter with a value of * DIGEST.

*

* If the message specified here is different from the message that was signed, the signature verification * fails. A message and its hash digest are considered to be the same message. */ public java.nio.ByteBuffer getMessage() { return this.message; } /** *

* Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest of the * message. If you submit a digest, use the MessageType parameter with a value of DIGEST. *

*

* If the message specified here is different from the message that was signed, the signature verification fails. A * message and its hash digest are considered to be the same message. *

*

* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service. * Users of the SDK should not perform Base64 encoding on this field. *

*

* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will * be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or * ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future * major version of the SDK. *

* * @param message * Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest * of the message. If you submit a digest, use the MessageType parameter with a value of * DIGEST.

*

* If the message specified here is different from the message that was signed, the signature verification * fails. A message and its hash digest are considered to be the same message. * @return Returns a reference to this object so that method calls can be chained together. */ public VerifyRequest withMessage(java.nio.ByteBuffer message) { setMessage(message); return this; } /** *

* Tells KMS whether the value of the Message parameter should be hashed as part of the signing * algorithm. Use RAW for unhashed messages; use DIGEST for message digests, which are * already hashed. *

*

* When the value of MessageType is RAW, KMS uses the standard signing algorithm, which * begins with a hash function. When the value is DIGEST, KMS skips the hashing step in the signing * algorithm. *

* *

* Use the DIGEST value only when the value of the Message parameter is a message digest. * If you use the DIGEST value with an unhashed message, the security of the verification operation can * be compromised. *

*
*

* When the value of MessageTypeis DIGEST, the length of the Message value * must match the length of hashed messages for the specified signing algorithm. *

*

* You can submit a message digest and omit the MessageType or specify RAW so the digest * is hashed again while signing. However, if the signed message is hashed once while signing, but twice while * verifying, verification fails, even when the message hasn't changed. *

*

* The hashing algorithm in that Verify uses is based on the SigningAlgorithm value. *

* * * @param messageType * Tells KMS whether the value of the Message parameter should be hashed as part of the signing * algorithm. Use RAW for unhashed messages; use DIGEST for message digests, which * are already hashed.

*

* When the value of MessageType is RAW, KMS uses the standard signing algorithm, * which begins with a hash function. When the value is DIGEST, KMS skips the hashing step in * the signing algorithm. *

* *

* Use the DIGEST value only when the value of the Message parameter is a message * digest. If you use the DIGEST value with an unhashed message, the security of the * verification operation can be compromised. *

*
*

* When the value of MessageTypeis DIGEST, the length of the Message * value must match the length of hashed messages for the specified signing algorithm. *

*

* You can submit a message digest and omit the MessageType or specify RAW so the * digest is hashed again while signing. However, if the signed message is hashed once while signing, but * twice while verifying, verification fails, even when the message hasn't changed. *

*

* The hashing algorithm in that Verify uses is based on the SigningAlgorithm * value. *

*