/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
/*
* Do not modify this file. This file is generated from the kms-2014-11-01.normal.json service model.
*/
using System;
using System.Collections.Generic;
using System.Xml.Serialization;
using System.Text;
using System.IO;
using System.Net;
using Amazon.Runtime;
using Amazon.Runtime.Internal;
namespace Amazon.KeyManagementService.Model
{
///
/// Container for the parameters to the Encrypt operation.
/// Encrypts plaintext of up to 4,096 bytes using a KMS key. You can use a symmetric or
/// asymmetric KMS key with a KeyUsage
of ENCRYPT_DECRYPT
.
///
///
///
/// You can use this operation to encrypt small amounts of arbitrary data, such as a personal
/// identifier or database password, or other sensitive information. You don't need to
/// use the Encrypt
operation to encrypt a data key. The GenerateDataKey
/// and GenerateDataKeyPair operations return a plaintext data key and an encrypted
/// copy of that data key.
///
///
///
/// If you use a symmetric encryption KMS key, you can use an encryption context to add
/// additional security to your encryption operation. If you specify an EncryptionContext
/// when encrypting data, you must specify the same encryption context (a case-sensitive
/// exact match) when decrypting the data. Otherwise, the request to decrypt fails with
/// an InvalidCiphertextException
. For more information, see Encryption
/// Context in the Key Management Service Developer Guide.
///
///
///
/// If you specify an asymmetric KMS key, you must also specify the encryption algorithm.
/// The algorithm must be compatible with the KMS key spec.
///
///
///
/// When you use an asymmetric KMS key to encrypt or reencrypt data, be sure to record
/// the KMS key and encryption algorithm that you choose. You will be required to provide
/// the same KMS key and encryption algorithm when you decrypt the data. If the KMS key
/// and algorithm do not match the values used to encrypt the data, the decrypt operation
/// fails.
///
///
///
/// You are not required to supply the key ID and encryption algorithm when you decrypt
/// with symmetric encryption KMS keys because KMS stores this information in the ciphertext
/// blob. KMS cannot store metadata in ciphertext generated with asymmetric keys. The
/// standard format for asymmetric key ciphertext does not include configurable fields.
///
///
///
/// The maximum size of the data that you can encrypt varies with the type of KMS key
/// and the encryption algorithm that you choose.
///
/// -
///
/// Symmetric encryption KMS keys
///
///
-
///
///
SYMMETRIC_DEFAULT
: 4096 bytes
///
///
-
///
///
RSA_2048
///
/// -
///
///
RSAES_OAEP_SHA_1
: 214 bytes
///
/// -
///
///
RSAES_OAEP_SHA_256
: 190 bytes
///
///
-
///
///
RSA_3072
///
/// -
///
///
RSAES_OAEP_SHA_1
: 342 bytes
///
/// -
///
///
RSAES_OAEP_SHA_256
: 318 bytes
///
///
-
///
///
RSA_4096
///
/// -
///
///
RSAES_OAEP_SHA_1
: 470 bytes
///
/// -
///
///
RSAES_OAEP_SHA_256
: 446 bytes
///
///
-
///
///
SM2PKE
: 1024 bytes (China Regions only)
///
///
///
/// The KMS key that you use for this operation must be in a compatible key state. For
/// details, see Key
/// states of KMS keys in the Key Management Service Developer Guide.
///
///
///
/// Cross-account use: Yes. To perform this operation with a KMS key in a different
/// Amazon Web Services account, specify the key ARN or alias ARN in the value of the
/// KeyId
parameter.
///
///
///
/// Required permissions: kms:Encrypt
/// (key policy)
///
///
///
/// Related operations:
///
///
///
public partial class EncryptRequest : AmazonKeyManagementServiceRequest
{
private bool? _dryRun;
private EncryptionAlgorithmSpec _encryptionAlgorithm;
private Dictionary _encryptionContext = new Dictionary();
private List _grantTokens = new List();
private string _keyId;
private MemoryStream _plaintext;
///
/// Gets and sets the property DryRun.
///
/// Checks if your request will succeed. DryRun
is an optional parameter.
///
///
///
///
/// To learn more about how to use this parameter, see Testing
/// your KMS API calls in the Key Management Service Developer Guide.
///
///
public bool DryRun
{
get { return this._dryRun.GetValueOrDefault(); }
set { this._dryRun = value; }
}
// Check to see if DryRun property is set
internal bool IsSetDryRun()
{
return this._dryRun.HasValue;
}
///
/// Gets and sets the property EncryptionAlgorithm.
///
/// Specifies the encryption algorithm that KMS will use to encrypt the plaintext message.
/// The algorithm must be compatible with the KMS key that you specify.
///
///
///
/// This parameter is required only for asymmetric KMS keys. The default value, SYMMETRIC_DEFAULT
,
/// is the algorithm used for symmetric encryption KMS keys. If you are using an asymmetric
/// KMS key, we recommend RSAES_OAEP_SHA_256.
///
///
///
/// The SM2PKE algorithm is only available in China Regions.
///
///
public EncryptionAlgorithmSpec EncryptionAlgorithm
{
get { return this._encryptionAlgorithm; }
set { this._encryptionAlgorithm = value; }
}
// Check to see if EncryptionAlgorithm property is set
internal bool IsSetEncryptionAlgorithm()
{
return this._encryptionAlgorithm != null;
}
///
/// Gets and sets the property EncryptionContext.
///
/// Specifies the encryption context that will be used to encrypt the data. An encryption
/// context is valid only for cryptographic
/// operations with a symmetric encryption KMS key. The standard asymmetric encryption
/// algorithms and HMAC algorithms that KMS uses do not support an encryption context.
///
///
///
///
/// Do not include confidential or sensitive information in this field. This field may
/// be displayed in plaintext in CloudTrail logs and other output.
///
///
///
/// An encryption context is a collection of non-secret key-value pairs that represent
/// additional authenticated data. When you use an encryption context to encrypt data,
/// you must specify the same (an exact case-sensitive match) encryption context to decrypt
/// the data. An encryption context is supported only on operations with symmetric encryption
/// KMS keys. On operations with symmetric encryption KMS keys, an encryption context
/// is optional, but it is strongly recommended.
///
///
///
/// For more information, see Encryption
/// context in the Key Management Service Developer Guide.
///
///
public Dictionary EncryptionContext
{
get { return this._encryptionContext; }
set { this._encryptionContext = value; }
}
// Check to see if EncryptionContext property is set
internal bool IsSetEncryptionContext()
{
return this._encryptionContext != null && this._encryptionContext.Count > 0;
}
///
/// Gets and sets the property GrantTokens.
///
/// A list of grant tokens.
///
///
///
/// Use a grant token when your permission to call this operation comes from a new grant
/// that has not yet achieved eventual consistency. For more information, see Grant
/// token and Using
/// a grant token in the Key Management Service Developer Guide.
///
///
[AWSProperty(Min=0, Max=10)]
public List GrantTokens
{
get { return this._grantTokens; }
set { this._grantTokens = value; }
}
// Check to see if GrantTokens property is set
internal bool IsSetGrantTokens()
{
return this._grantTokens != null && this._grantTokens.Count > 0;
}
///
/// Gets and sets the property KeyId.
///
/// Identifies the KMS key to use in the encryption operation. The KMS key must have a
/// KeyUsage
of ENCRYPT_DECRYPT
. To find the KeyUsage
/// of a KMS key, use the DescribeKey operation.
///
///
///
/// To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using
/// an alias name, prefix it with "alias/"
. To specify a KMS key in a different
/// Amazon Web Services account, you must use the key ARN or alias ARN.
///
///
///
/// For example:
///
/// -
///
/// Key ID:
1234abcd-12ab-34cd-56ef-1234567890ab
///
/// -
///
/// Key ARN:
arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
///
///
/// -
///
/// Alias name:
alias/ExampleAlias
///
/// -
///
/// Alias ARN:
arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
///
///
///
/// To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
/// To get the alias name and alias ARN, use ListAliases.
///
///
[AWSProperty(Required=true, Min=1, Max=2048)]
public string KeyId
{
get { return this._keyId; }
set { this._keyId = value; }
}
// Check to see if KeyId property is set
internal bool IsSetKeyId()
{
return this._keyId != null;
}
///
/// Gets and sets the property Plaintext.
///
/// Data to be encrypted.
///
///
[AWSProperty(Required=true, Sensitive=true, Min=1, Max=4096)]
public MemoryStream Plaintext
{
get { return this._plaintext; }
set { this._plaintext = value; }
}
// Check to see if Plaintext property is set
internal bool IsSetPlaintext()
{
return this._plaintext != null;
}
}
}