/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ /* * Do not modify this file. This file is generated from the kms-2014-11-01.normal.json service model. */ using System; using System.Collections.Generic; using System.Xml.Serialization; using System.Text; using System.IO; using System.Net; using Amazon.Runtime; using Amazon.Runtime.Internal; namespace Amazon.KeyManagementService.Model { /// /// Container for the parameters to the Decrypt operation. /// Decrypts ciphertext that was encrypted by a KMS key using any of the following operations: /// /// /// /// You can use this operation to decrypt ciphertext that was encrypted under a symmetric /// encryption KMS key or an asymmetric encryption KMS key. When the KMS key is asymmetric, /// you must specify the KMS key and the encryption algorithm that was used to encrypt /// the ciphertext. For information about asymmetric KMS keys, see Asymmetric /// KMS keys in the Key Management Service Developer Guide. /// /// /// /// The Decrypt operation also decrypts ciphertext that was encrypted outside /// of KMS by the public key in an KMS asymmetric KMS key. However, it cannot decrypt /// symmetric ciphertext produced by other libraries, such as the Amazon /// Web Services Encryption SDK or Amazon /// S3 client-side encryption. These libraries return a ciphertext format that is /// incompatible with KMS. /// /// /// /// If the ciphertext was encrypted under a symmetric encryption KMS key, the KeyId /// parameter is optional. KMS can get this information from metadata that it adds to /// the symmetric ciphertext blob. This feature adds durability to your implementation /// by ensuring that authorized users can decrypt ciphertext decades after it was encrypted, /// even if they've lost track of the key ID. However, specifying the KMS key is always /// recommended as a best practice. When you use the KeyId parameter to specify /// a KMS key, KMS only uses the KMS key you specify. If the ciphertext was encrypted /// under a different KMS key, the Decrypt operation fails. This practice /// ensures that you use the KMS key that you intend. /// /// /// /// Whenever possible, use key policies to give users permission to call the Decrypt /// operation on a particular KMS key, instead of using &IAM; policies. Otherwise, /// you might create an &IAM; policy that gives the user Decrypt permission /// on all KMS keys. This user could decrypt ciphertext that was encrypted by KMS keys /// in other accounts if the key policy for the cross-account KMS key permits it. If you /// must use an IAM policy for Decrypt permissions, limit the user to particular /// KMS keys or particular trusted accounts. For details, see Best /// practices for IAM policies in the Key Management Service Developer Guide. /// /// /// /// Decrypt also supports Amazon /// Web Services Nitro Enclaves, which provide an isolated compute environment in /// Amazon EC2. To call Decrypt for a Nitro enclave, use the Amazon /// Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. Use the Recipient /// parameter to provide the attestation document for the enclave. Instead of the plaintext /// data, the response includes the plaintext data encrypted with the public key from /// the attestation document (CiphertextForRecipient).For information about /// the interaction between KMS and Amazon Web Services Nitro Enclaves, see How /// Amazon Web Services Nitro Enclaves uses KMS in the Key Management Service Developer /// Guide.. /// /// /// /// The KMS key that you use for this operation must be in a compatible key state. For /// details, see Key /// states of KMS keys in the Key Management Service Developer Guide. /// /// /// /// Cross-account use: Yes. If you use the KeyId parameter to identify /// a KMS key in a different Amazon Web Services account, specify the key ARN or the alias /// ARN of the KMS key. /// /// /// /// Required permissions: kms:Decrypt /// (key policy) /// /// /// /// Related operations: /// /// /// public partial class DecryptRequest : AmazonKeyManagementServiceRequest { private MemoryStream _ciphertextBlob; private bool? _dryRun; private EncryptionAlgorithmSpec _encryptionAlgorithm; private Dictionary _encryptionContext = new Dictionary(); private List _grantTokens = new List(); private string _keyId; private RecipientInfo _recipient; /// /// Gets and sets the property CiphertextBlob. /// /// Ciphertext to be decrypted. The blob includes metadata. /// /// [AWSProperty(Required=true, Min=1, Max=6144)] public MemoryStream CiphertextBlob { get { return this._ciphertextBlob; } set { this._ciphertextBlob = value; } } // Check to see if CiphertextBlob property is set internal bool IsSetCiphertextBlob() { return this._ciphertextBlob != null; } /// /// Gets and sets the property DryRun. /// /// Checks if your request will succeed. DryRun is an optional parameter. /// /// /// /// /// To learn more about how to use this parameter, see Testing /// your KMS API calls in the Key Management Service Developer Guide. /// /// public bool DryRun { get { return this._dryRun.GetValueOrDefault(); } set { this._dryRun = value; } } // Check to see if DryRun property is set internal bool IsSetDryRun() { return this._dryRun.HasValue; } /// /// Gets and sets the property EncryptionAlgorithm. /// /// Specifies the encryption algorithm that will be used to decrypt the ciphertext. Specify /// the same algorithm that was used to encrypt the data. If you specify a different algorithm, /// the Decrypt operation fails. /// /// /// /// This parameter is required only when the ciphertext was encrypted under an asymmetric /// KMS key. The default value, SYMMETRIC_DEFAULT, represents the only supported /// algorithm that is valid for symmetric encryption KMS keys. /// /// public EncryptionAlgorithmSpec EncryptionAlgorithm { get { return this._encryptionAlgorithm; } set { this._encryptionAlgorithm = value; } } // Check to see if EncryptionAlgorithm property is set internal bool IsSetEncryptionAlgorithm() { return this._encryptionAlgorithm != null; } /// /// Gets and sets the property EncryptionContext. /// /// Specifies the encryption context to use when decrypting the data. An encryption context /// is valid only for cryptographic /// operations with a symmetric encryption KMS key. The standard asymmetric encryption /// algorithms and HMAC algorithms that KMS uses do not support an encryption context. /// /// /// /// An encryption context is a collection of non-secret key-value pairs that represent /// additional authenticated data. When you use an encryption context to encrypt data, /// you must specify the same (an exact case-sensitive match) encryption context to decrypt /// the data. An encryption context is supported only on operations with symmetric encryption /// KMS keys. On operations with symmetric encryption KMS keys, an encryption context /// is optional, but it is strongly recommended. /// /// /// /// For more information, see Encryption /// context in the Key Management Service Developer Guide. /// /// public Dictionary EncryptionContext { get { return this._encryptionContext; } set { this._encryptionContext = value; } } // Check to see if EncryptionContext property is set internal bool IsSetEncryptionContext() { return this._encryptionContext != null && this._encryptionContext.Count > 0; } /// /// Gets and sets the property GrantTokens. /// /// A list of grant tokens. /// /// /// /// Use a grant token when your permission to call this operation comes from a new grant /// that has not yet achieved eventual consistency. For more information, see Grant /// token and Using /// a grant token in the Key Management Service Developer Guide. /// /// [AWSProperty(Min=0, Max=10)] public List GrantTokens { get { return this._grantTokens; } set { this._grantTokens = value; } } // Check to see if GrantTokens property is set internal bool IsSetGrantTokens() { return this._grantTokens != null && this._grantTokens.Count > 0; } /// /// Gets and sets the property KeyId. /// /// Specifies the KMS key that KMS uses to decrypt the ciphertext. /// /// /// /// Enter a key ID of the KMS key that was used to encrypt the ciphertext. If you identify /// a different KMS key, the Decrypt operation throws an IncorrectKeyException. /// /// /// /// This parameter is required only when the ciphertext was encrypted under an asymmetric /// KMS key. If you used a symmetric encryption KMS key, KMS can get the KMS key from /// metadata that it adds to the symmetric ciphertext blob. However, it is always recommended /// as a best practice. This practice ensures that you use the KMS key that you intend. /// /// /// /// To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using /// an alias name, prefix it with "alias/". To specify a KMS key in a different /// Amazon Web Services account, you must use the key ARN or alias ARN. /// /// /// /// For example: /// ///
  • /// /// Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab /// ///
  • /// /// Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab /// /// ///
  • /// /// Alias name: alias/ExampleAlias /// ///
  • /// /// Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias /// ///
/// /// To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. /// To get the alias name and alias ARN, use ListAliases. /// ///
[AWSProperty(Min=1, Max=2048)] public string KeyId { get { return this._keyId; } set { this._keyId = value; } } // Check to see if KeyId property is set internal bool IsSetKeyId() { return this._keyId != null; } /// /// Gets and sets the property Recipient. /// /// A signed attestation /// document from an Amazon Web Services Nitro enclave and the encryption algorithm /// to use with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. /// /// /// /// /// This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. /// To include this parameter, use the Amazon /// Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. /// /// /// /// When you use this parameter, instead of returning the plaintext data, KMS encrypts /// the plaintext data with the public key in the attestation document, and returns the /// resulting ciphertext in the CiphertextForRecipient field in the response. /// This ciphertext can be decrypted only with the private key in the enclave. The Plaintext /// field in the response is null or empty. /// /// /// /// For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, /// see How /// Amazon Web Services Nitro Enclaves uses KMS in the Key Management Service Developer /// Guide. /// /// public RecipientInfo Recipient { get { return this._recipient; } set { this._recipient = value; } } // Check to see if Recipient property is set internal bool IsSetRecipient() { return this._recipient != null; } } }