/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ /* * Do not modify this file. This file is generated from the kms-2014-11-01.normal.json service model. */ using System; using System.Collections.Generic; using System.Xml.Serialization; using System.Text; using System.IO; using System.Net; using Amazon.Runtime; using Amazon.Runtime.Internal; namespace Amazon.KeyManagementService.Model { /// /// Container for the parameters to the Encrypt operation. /// Encrypts plaintext of up to 4,096 bytes using a KMS key. You can use a symmetric or /// asymmetric KMS key with a KeyUsage of ENCRYPT_DECRYPT. /// /// /// /// You can use this operation to encrypt small amounts of arbitrary data, such as a personal /// identifier or database password, or other sensitive information. You don't need to /// use the Encrypt operation to encrypt a data key. The GenerateDataKey /// and GenerateDataKeyPair operations return a plaintext data key and an encrypted /// copy of that data key. /// /// /// /// If you use a symmetric encryption KMS key, you can use an encryption context to add /// additional security to your encryption operation. If you specify an EncryptionContext /// when encrypting data, you must specify the same encryption context (a case-sensitive /// exact match) when decrypting the data. Otherwise, the request to decrypt fails with /// an InvalidCiphertextException. For more information, see Encryption /// Context in the Key Management Service Developer Guide. /// /// /// /// If you specify an asymmetric KMS key, you must also specify the encryption algorithm. /// The algorithm must be compatible with the KMS key spec. /// /// /// /// When you use an asymmetric KMS key to encrypt or reencrypt data, be sure to record /// the KMS key and encryption algorithm that you choose. You will be required to provide /// the same KMS key and encryption algorithm when you decrypt the data. If the KMS key /// and algorithm do not match the values used to encrypt the data, the decrypt operation /// fails. /// /// /// /// You are not required to supply the key ID and encryption algorithm when you decrypt /// with symmetric encryption KMS keys because KMS stores this information in the ciphertext /// blob. KMS cannot store metadata in ciphertext generated with asymmetric keys. The /// standard format for asymmetric key ciphertext does not include configurable fields. /// /// /// /// The maximum size of the data that you can encrypt varies with the type of KMS key /// and the encryption algorithm that you choose. /// /// /// /// The KMS key that you use for this operation must be in a compatible key state. For /// details, see Key /// states of KMS keys in the Key Management Service Developer Guide. /// /// /// /// Cross-account use: Yes. To perform this operation with a KMS key in a different /// Amazon Web Services account, specify the key ARN or alias ARN in the value of the /// KeyId parameter. /// /// /// /// Required permissions: kms:Encrypt /// (key policy) /// /// /// /// Related operations: /// /// /// public partial class EncryptRequest : AmazonKeyManagementServiceRequest { private bool? _dryRun; private EncryptionAlgorithmSpec _encryptionAlgorithm; private Dictionary _encryptionContext = new Dictionary(); private List _grantTokens = new List(); private string _keyId; private MemoryStream _plaintext; /// /// Gets and sets the property DryRun. /// /// Checks if your request will succeed. DryRun is an optional parameter. /// /// /// /// /// To learn more about how to use this parameter, see Testing /// your KMS API calls in the Key Management Service Developer Guide. /// /// public bool DryRun { get { return this._dryRun.GetValueOrDefault(); } set { this._dryRun = value; } } // Check to see if DryRun property is set internal bool IsSetDryRun() { return this._dryRun.HasValue; } /// /// Gets and sets the property EncryptionAlgorithm. /// /// Specifies the encryption algorithm that KMS will use to encrypt the plaintext message. /// The algorithm must be compatible with the KMS key that you specify. /// /// /// /// This parameter is required only for asymmetric KMS keys. The default value, SYMMETRIC_DEFAULT, /// is the algorithm used for symmetric encryption KMS keys. If you are using an asymmetric /// KMS key, we recommend RSAES_OAEP_SHA_256. /// /// /// /// The SM2PKE algorithm is only available in China Regions. /// /// public EncryptionAlgorithmSpec EncryptionAlgorithm { get { return this._encryptionAlgorithm; } set { this._encryptionAlgorithm = value; } } // Check to see if EncryptionAlgorithm property is set internal bool IsSetEncryptionAlgorithm() { return this._encryptionAlgorithm != null; } /// /// Gets and sets the property EncryptionContext. /// /// Specifies the encryption context that will be used to encrypt the data. An encryption /// context is valid only for cryptographic /// operations with a symmetric encryption KMS key. The standard asymmetric encryption /// algorithms and HMAC algorithms that KMS uses do not support an encryption context. /// /// /// /// /// Do not include confidential or sensitive information in this field. This field may /// be displayed in plaintext in CloudTrail logs and other output. /// /// /// /// An encryption context is a collection of non-secret key-value pairs that represent /// additional authenticated data. When you use an encryption context to encrypt data, /// you must specify the same (an exact case-sensitive match) encryption context to decrypt /// the data. An encryption context is supported only on operations with symmetric encryption /// KMS keys. On operations with symmetric encryption KMS keys, an encryption context /// is optional, but it is strongly recommended. /// /// /// /// For more information, see Encryption /// context in the Key Management Service Developer Guide. /// /// public Dictionary EncryptionContext { get { return this._encryptionContext; } set { this._encryptionContext = value; } } // Check to see if EncryptionContext property is set internal bool IsSetEncryptionContext() { return this._encryptionContext != null && this._encryptionContext.Count > 0; } /// /// Gets and sets the property GrantTokens. /// /// A list of grant tokens. /// /// /// /// Use a grant token when your permission to call this operation comes from a new grant /// that has not yet achieved eventual consistency. For more information, see Grant /// token and Using /// a grant token in the Key Management Service Developer Guide. /// /// [AWSProperty(Min=0, Max=10)] public List GrantTokens { get { return this._grantTokens; } set { this._grantTokens = value; } } // Check to see if GrantTokens property is set internal bool IsSetGrantTokens() { return this._grantTokens != null && this._grantTokens.Count > 0; } /// /// Gets and sets the property KeyId. /// /// Identifies the KMS key to use in the encryption operation. The KMS key must have a /// KeyUsage of ENCRYPT_DECRYPT. To find the KeyUsage /// of a KMS key, use the DescribeKey operation. /// /// /// /// To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using /// an alias name, prefix it with "alias/". To specify a KMS key in a different /// Amazon Web Services account, you must use the key ARN or alias ARN. /// /// /// /// For example: /// ///
  • /// /// Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab /// ///
  • /// /// Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab /// /// ///
  • /// /// Alias name: alias/ExampleAlias /// ///
  • /// /// Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias /// ///
/// /// To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. /// To get the alias name and alias ARN, use ListAliases. /// ///
[AWSProperty(Required=true, Min=1, Max=2048)] public string KeyId { get { return this._keyId; } set { this._keyId = value; } } // Check to see if KeyId property is set internal bool IsSetKeyId() { return this._keyId != null; } /// /// Gets and sets the property Plaintext. /// /// Data to be encrypted. /// /// [AWSProperty(Required=true, Sensitive=true, Min=1, Max=4096)] public MemoryStream Plaintext { get { return this._plaintext; } set { this._plaintext = value; } } // Check to see if Plaintext property is set internal bool IsSetPlaintext() { return this._plaintext != null; } } }