All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.kms.model.DeriveSharedSecretRequest Maven / Gradle / Ivy

Go to download

The AWS Java SDK for AWS KMS module holds the client classes that are used for communicating with AWS Key Management Service

There is a newer version: 1.12.778
Show newest version
/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.kms.model;

import java.io.Serializable;
import javax.annotation.Generated;

import com.amazonaws.AmazonWebServiceRequest;

/**
 * 
 * @see AWS API
 *      Documentation
 */
@Generated("com.amazonaws:aws-java-sdk-code-generator")
public class DeriveSharedSecretRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable {

    /**
     * 

* Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private key in * the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey operation. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

*/ private String keyId; /** *

* Specifies the key agreement algorithm used to derive the shared secret. The only valid value is ECDH * . *

*/ private String keyAgreementAlgorithm; /** *

* Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) key * pair. *

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo (SPKI), as * defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded format. *

* *

* If you use Amazon Web Services CLI * version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the Amazon Web Services * CLI Base64-encodes the public key a second time, resulting in a ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb (fileb://<path-to-file>) * or in-line using a Base64 encoded string. *

*/ private java.nio.ByteBuffer publicKey; /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved * eventual consistency. For more information, see Grant token and Using a grant * token in the Key Management Service Developer Guide. *

*/ private com.amazonaws.internal.SdkInternalList grantTokens; /** *

* Checks if your request will succeed. DryRun is an optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. *

*/ private Boolean dryRun; /** *

* A signed attestation * document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web Services * Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter from any Amazon * Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting ciphertext in * the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the * private key in the enclave. The CiphertextBlob field in the response contains the encrypted shared * secret derived from the KMS key specified by the KeyId parameter and public key specified by the * PublicKey parameter. The SharedSecret field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services * Nitro Enclaves uses KMS in the Key Management Service Developer Guide. *

*/ private RecipientInfo recipient; /** *

* Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private key in * the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey operation. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

* * @param keyId * Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private * key in the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey * operation.

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix * it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias * name and alias ARN, use ListAliases. */ public void setKeyId(String keyId) { this.keyId = keyId; } /** *

* Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private key in * the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey operation. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

* * @return Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private * key in the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey * operation.

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix * it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias * name and alias ARN, use ListAliases. */ public String getKeyId() { return this.keyId; } /** *

* Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private key in * the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey operation. *

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with * "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN * or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and * alias ARN, use ListAliases. *

* * @param keyId * Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions only) KMS key. KMS uses the private * key in the specified key pair to derive the shared secret. The key usage of the KMS key must be * KEY_AGREEMENT. To find the KeyUsage of a KMS key, use the DescribeKey * operation.

*

* To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix * it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must * use the key ARN or alias ARN. *

*

* For example: *

*
    *
  • *

    * Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab *

    *
  • *
  • *

    * Alias name: alias/ExampleAlias *

    *
  • *
  • *

    * Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias *

    *
  • *
*

* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias * name and alias ARN, use ListAliases. * @return Returns a reference to this object so that method calls can be chained together. */ public DeriveSharedSecretRequest withKeyId(String keyId) { setKeyId(keyId); return this; } /** *

* Specifies the key agreement algorithm used to derive the shared secret. The only valid value is ECDH * . *

* * @param keyAgreementAlgorithm * Specifies the key agreement algorithm used to derive the shared secret. The only valid value is * ECDH. * @see KeyAgreementAlgorithmSpec */ public void setKeyAgreementAlgorithm(String keyAgreementAlgorithm) { this.keyAgreementAlgorithm = keyAgreementAlgorithm; } /** *

* Specifies the key agreement algorithm used to derive the shared secret. The only valid value is ECDH * . *

* * @return Specifies the key agreement algorithm used to derive the shared secret. The only valid value is * ECDH. * @see KeyAgreementAlgorithmSpec */ public String getKeyAgreementAlgorithm() { return this.keyAgreementAlgorithm; } /** *

* Specifies the key agreement algorithm used to derive the shared secret. The only valid value is ECDH * . *

* * @param keyAgreementAlgorithm * Specifies the key agreement algorithm used to derive the shared secret. The only valid value is * ECDH. * @return Returns a reference to this object so that method calls can be chained together. * @see KeyAgreementAlgorithmSpec */ public DeriveSharedSecretRequest withKeyAgreementAlgorithm(String keyAgreementAlgorithm) { setKeyAgreementAlgorithm(keyAgreementAlgorithm); return this; } /** *

* Specifies the key agreement algorithm used to derive the shared secret. The only valid value is ECDH * . *

* * @param keyAgreementAlgorithm * Specifies the key agreement algorithm used to derive the shared secret. The only valid value is * ECDH. * @return Returns a reference to this object so that method calls can be chained together. * @see KeyAgreementAlgorithmSpec */ public DeriveSharedSecretRequest withKeyAgreementAlgorithm(KeyAgreementAlgorithmSpec keyAgreementAlgorithm) { this.keyAgreementAlgorithm = keyAgreementAlgorithm.toString(); return this; } /** *

* Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) key * pair. *

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo (SPKI), as * defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded format. *

* *

* If you use Amazon Web Services CLI * version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the Amazon Web Services * CLI Base64-encodes the public key a second time, resulting in a ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb (fileb://<path-to-file>) * or in-line using a Base64 encoded string. *

*

* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service. * Users of the SDK should not perform Base64 encoding on this field. *

*

* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will * be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or * ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future * major version of the SDK. *

* * @param publicKey * Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) * key pair.

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo * (SPKI), as defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded * format. *

* *

* If you use Amazon Web * Services CLI version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the * Amazon Web Services CLI Base64-encodes the public key a second time, resulting in a * ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb ( * fileb://<path-to-file>) or in-line using a Base64 encoded string. */ public void setPublicKey(java.nio.ByteBuffer publicKey) { this.publicKey = publicKey; } /** *

* Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) key * pair. *

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo (SPKI), as * defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded format. *

* *

* If you use Amazon Web Services CLI * version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the Amazon Web Services * CLI Base64-encodes the public key a second time, resulting in a ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb (fileb://<path-to-file>) * or in-line using a Base64 encoded string. *

*

* {@code ByteBuffer}s are stateful. Calling their {@code get} methods changes their {@code position}. We recommend * using {@link java.nio.ByteBuffer#asReadOnlyBuffer()} to create a read-only view of the buffer with an independent * {@code position}, and calling {@code get} methods on this rather than directly on the returned {@code ByteBuffer}. * Doing so will ensure that anyone else using the {@code ByteBuffer} will not be affected by changes to the * {@code position}. *

* * @return Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) * key pair.

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo * (SPKI), as defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded * format. *

* *

* If you use Amazon Web * Services CLI version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the * Amazon Web Services CLI Base64-encodes the public key a second time, resulting in a * ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb ( * fileb://<path-to-file>) or in-line using a Base64 encoded string. */ public java.nio.ByteBuffer getPublicKey() { return this.publicKey; } /** *

* Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) key * pair. *

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo (SPKI), as * defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded format. *

* *

* If you use Amazon Web Services CLI * version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the Amazon Web Services * CLI Base64-encodes the public key a second time, resulting in a ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb (fileb://<path-to-file>) * or in-line using a Base64 encoded string. *

*

* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service. * Users of the SDK should not perform Base64 encoding on this field. *

*

* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will * be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or * ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future * major version of the SDK. *

* * @param publicKey * Specifies the public key in your peer's NIST-recommended elliptic curve (ECC) or SM2 (China Regions only) * key pair.

*

* The public key must be a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo * (SPKI), as defined in RFC 5280. *

*

* GetPublicKey returns the public key of an asymmetric KMS key pair in the required DER-encoded * format. *

* *

* If you use Amazon Web * Services CLI version 1, you must provide the DER-encoded X.509 public key in a file. Otherwise, the * Amazon Web Services CLI Base64-encodes the public key a second time, resulting in a * ValidationException. *

*
*

* You can specify the public key as binary data in a file using fileb ( * fileb://<path-to-file>) or in-line using a Base64 encoded string. * @return Returns a reference to this object so that method calls can be chained together. */ public DeriveSharedSecretRequest withPublicKey(java.nio.ByteBuffer publicKey) { setPublicKey(publicKey); return this; } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved * eventual consistency. For more information, see Grant token and Using a grant * token in the Key Management Service Developer Guide. *

* * @return A list of grant tokens.

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet * achieved eventual consistency. For more information, see Grant token and * Using * a grant token in the Key Management Service Developer Guide. */ public java.util.List getGrantTokens() { if (grantTokens == null) { grantTokens = new com.amazonaws.internal.SdkInternalList(); } return grantTokens; } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved * eventual consistency. For more information, see Grant token and Using a grant * token in the Key Management Service Developer Guide. *

* * @param grantTokens * A list of grant tokens.

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet * achieved eventual consistency. For more information, see Grant token and * Using * a grant token in the Key Management Service Developer Guide. */ public void setGrantTokens(java.util.Collection grantTokens) { if (grantTokens == null) { this.grantTokens = null; return; } this.grantTokens = new com.amazonaws.internal.SdkInternalList(grantTokens); } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved * eventual consistency. For more information, see Grant token and Using a grant * token in the Key Management Service Developer Guide. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setGrantTokens(java.util.Collection)} or {@link #withGrantTokens(java.util.Collection)} if you want to * override the existing values. *

* * @param grantTokens * A list of grant tokens.

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet * achieved eventual consistency. For more information, see Grant token and * Using * a grant token in the Key Management Service Developer Guide. * @return Returns a reference to this object so that method calls can be chained together. */ public DeriveSharedSecretRequest withGrantTokens(String... grantTokens) { if (this.grantTokens == null) { setGrantTokens(new com.amazonaws.internal.SdkInternalList(grantTokens.length)); } for (String ele : grantTokens) { this.grantTokens.add(ele); } return this; } /** *

* A list of grant tokens. *

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved * eventual consistency. For more information, see Grant token and Using a grant * token in the Key Management Service Developer Guide. *

* * @param grantTokens * A list of grant tokens.

*

* Use a grant token when your permission to call this operation comes from a new grant that has not yet * achieved eventual consistency. For more information, see Grant token and * Using * a grant token in the Key Management Service Developer Guide. * @return Returns a reference to this object so that method calls can be chained together. */ public DeriveSharedSecretRequest withGrantTokens(java.util.Collection grantTokens) { setGrantTokens(grantTokens); return this; } /** *

* Checks if your request will succeed. DryRun is an optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. *

* * @param dryRun * Checks if your request will succeed. DryRun is an optional parameter.

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. */ public void setDryRun(Boolean dryRun) { this.dryRun = dryRun; } /** *

* Checks if your request will succeed. DryRun is an optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. *

* * @return Checks if your request will succeed. DryRun is an optional parameter.

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. */ public Boolean getDryRun() { return this.dryRun; } /** *

* Checks if your request will succeed. DryRun is an optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. *

* * @param dryRun * Checks if your request will succeed. DryRun is an optional parameter.

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. * @return Returns a reference to this object so that method calls can be chained together. */ public DeriveSharedSecretRequest withDryRun(Boolean dryRun) { setDryRun(dryRun); return this; } /** *

* Checks if your request will succeed. DryRun is an optional parameter. *

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. *

* * @return Checks if your request will succeed. DryRun is an optional parameter.

*

* To learn more about how to use this parameter, see Testing your KMS API * calls in the Key Management Service Developer Guide. */ public Boolean isDryRun() { return this.dryRun; } /** *

* A signed attestation * document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web Services * Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter from any Amazon * Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting ciphertext in * the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the * private key in the enclave. The CiphertextBlob field in the response contains the encrypted shared * secret derived from the KMS key specified by the KeyId parameter and public key specified by the * PublicKey parameter. The SharedSecret field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services * Nitro Enclaves uses KMS in the Key Management Service Developer Guide. *

* * @param recipient * A signed attestation document from an Amazon Web Services Nitro enclave and the encryption algorithm to use * with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web * Services Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter * from any Amazon Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting * ciphertext in the CiphertextForRecipient field in the response. This ciphertext can be * decrypted only with the private key in the enclave. The CiphertextBlob field in the response * contains the encrypted shared secret derived from the KMS key specified by the KeyId * parameter and public key specified by the PublicKey parameter. The SharedSecret * field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web * Services Nitro Enclaves uses KMS in the Key Management Service Developer Guide. */ public void setRecipient(RecipientInfo recipient) { this.recipient = recipient; } /** *

* A signed attestation * document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web Services * Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter from any Amazon * Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting ciphertext in * the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the * private key in the enclave. The CiphertextBlob field in the response contains the encrypted shared * secret derived from the KMS key specified by the KeyId parameter and public key specified by the * PublicKey parameter. The SharedSecret field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services * Nitro Enclaves uses KMS in the Key Management Service Developer Guide. *

* * @return A signed attestation document from an Amazon Web Services Nitro enclave and the encryption algorithm to use * with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web * Services Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter * from any Amazon Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting * ciphertext in the CiphertextForRecipient field in the response. This ciphertext can be * decrypted only with the private key in the enclave. The CiphertextBlob field in the response * contains the encrypted shared secret derived from the KMS key specified by the KeyId * parameter and public key specified by the PublicKey parameter. The SharedSecret * field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web * Services Nitro Enclaves uses KMS in the Key Management Service Developer Guide. */ public RecipientInfo getRecipient() { return this.recipient; } /** *

* A signed attestation * document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's * public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web Services * Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter from any Amazon * Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting ciphertext in * the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the * private key in the enclave. The CiphertextBlob field in the response contains the encrypted shared * secret derived from the KMS key specified by the KeyId parameter and public key specified by the * PublicKey parameter. The SharedSecret field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services * Nitro Enclaves uses KMS in the Key Management Service Developer Guide. *

* * @param recipient * A signed attestation document from an Amazon Web Services Nitro enclave and the encryption algorithm to use * with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. *

*

* This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To call * DeriveSharedSecret for an Amazon Web Services Nitro Enclaves, use the Amazon Web * Services Nitro Enclaves SDK to generate the attestation document and then use the Recipient parameter * from any Amazon Web Services SDK to provide the attestation document for the enclave. *

*

* When you use this parameter, instead of returning a plaintext copy of the shared secret, KMS encrypts the * plaintext shared secret under the public key in the attestation document, and returns the resulting * ciphertext in the CiphertextForRecipient field in the response. This ciphertext can be * decrypted only with the private key in the enclave. The CiphertextBlob field in the response * contains the encrypted shared secret derived from the KMS key specified by the KeyId * parameter and public key specified by the PublicKey parameter. The SharedSecret * field in the response is null or empty. *

*

* For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web * Services Nitro Enclaves uses KMS in the Key Management Service Developer Guide. * @return Returns a reference to this object so that method calls can be chained together. */ public DeriveSharedSecretRequest withRecipient(RecipientInfo recipient) { setRecipient(recipient); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getKeyId() != null) sb.append("KeyId: ").append(getKeyId()).append(","); if (getKeyAgreementAlgorithm() != null) sb.append("KeyAgreementAlgorithm: ").append(getKeyAgreementAlgorithm()).append(","); if (getPublicKey() != null) sb.append("PublicKey: ").append(getPublicKey()).append(","); if (getGrantTokens() != null) sb.append("GrantTokens: ").append(getGrantTokens()).append(","); if (getDryRun() != null) sb.append("DryRun: ").append(getDryRun()).append(","); if (getRecipient() != null) sb.append("Recipient: ").append(getRecipient()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof DeriveSharedSecretRequest == false) return false; DeriveSharedSecretRequest other = (DeriveSharedSecretRequest) obj; if (other.getKeyId() == null ^ this.getKeyId() == null) return false; if (other.getKeyId() != null && other.getKeyId().equals(this.getKeyId()) == false) return false; if (other.getKeyAgreementAlgorithm() == null ^ this.getKeyAgreementAlgorithm() == null) return false; if (other.getKeyAgreementAlgorithm() != null && other.getKeyAgreementAlgorithm().equals(this.getKeyAgreementAlgorithm()) == false) return false; if (other.getPublicKey() == null ^ this.getPublicKey() == null) return false; if (other.getPublicKey() != null && other.getPublicKey().equals(this.getPublicKey()) == false) return false; if (other.getGrantTokens() == null ^ this.getGrantTokens() == null) return false; if (other.getGrantTokens() != null && other.getGrantTokens().equals(this.getGrantTokens()) == false) return false; if (other.getDryRun() == null ^ this.getDryRun() == null) return false; if (other.getDryRun() != null && other.getDryRun().equals(this.getDryRun()) == false) return false; if (other.getRecipient() == null ^ this.getRecipient() == null) return false; if (other.getRecipient() != null && other.getRecipient().equals(this.getRecipient()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getKeyId() == null) ? 0 : getKeyId().hashCode()); hashCode = prime * hashCode + ((getKeyAgreementAlgorithm() == null) ? 0 : getKeyAgreementAlgorithm().hashCode()); hashCode = prime * hashCode + ((getPublicKey() == null) ? 0 : getPublicKey().hashCode()); hashCode = prime * hashCode + ((getGrantTokens() == null) ? 0 : getGrantTokens().hashCode()); hashCode = prime * hashCode + ((getDryRun() == null) ? 0 : getDryRun().hashCode()); hashCode = prime * hashCode + ((getRecipient() == null) ? 0 : getRecipient().hashCode()); return hashCode; } @Override public DeriveSharedSecretRequest clone() { return (DeriveSharedSecretRequest) super.clone(); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy