Skip to content

Commit 6ac671f

Browse files
author
awstools
committed
feat(client-kms): AWS KMS announces the support of ML-DSA key pairs that creates post-quantum safe digital signatures.
1 parent 37ffc30 commit 6ac671f

18 files changed

+201
-92
lines changed

clients/client-kms/src/commands/CreateKeyCommand.ts

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -66,18 +66,19 @@ export interface CreateKeyCommandOutput extends CreateKeyResponse, __MetadataBea
6666
* the type of key material in the KMS key. Then, use the <code>KeyUsage</code> parameter
6767
* to determine whether the KMS key will be used to encrypt and decrypt or sign and verify.
6868
* You can't change these properties after the KMS key is created.</p>
69-
* <p>Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair, or an
70-
* SM2 key pair (China Regions only). The private key in an asymmetric KMS key never leaves
71-
* KMS unencrypted. However, you can use the <a>GetPublicKey</a> operation to
72-
* download the public key so it can be used outside of KMS. Each KMS key can have only
73-
* one key usage. KMS keys with RSA key pairs can be used to encrypt and decrypt data or
74-
* sign and verify messages (but not both). KMS keys with NIST-recommended ECC key pairs
75-
* can be used to sign and verify messages or derive shared secrets (but not both). KMS
76-
* keys with <code>ECC_SECG_P256K1</code> can be used only to sign and verify messages. KMS
77-
* keys with SM2 key pairs (China Regions only) can be used to either encrypt and decrypt
78-
* data, sign and verify messages, or derive shared secrets (you must choose one key usage
79-
* type). For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the
80-
* <i>Key Management Service Developer Guide</i>.</p>
69+
* <p>Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair, ML-DSA
70+
* key pair or an SM2 key pair (China Regions only). The private key in an asymmetric KMS
71+
* key never leaves KMS unencrypted. However, you can use the <a>GetPublicKey</a> operation to download the public key so it can be used
72+
* outside of KMS. Each KMS key can have only one key usage. KMS keys with RSA key pairs
73+
* can be used to encrypt and decrypt data or sign and verify messages (but not both). KMS
74+
* keys with NIST-recommended ECC key pairs can be used to sign and verify messages or
75+
* derive shared secrets (but not both). KMS keys with <code>ECC_SECG_P256K1</code> can be
76+
* used only to sign and verify messages. KMS keys with ML-DSA key pairs can be used to
77+
* sign and verify messages. KMS keys with SM2 key pairs (China Regions only) can be used
78+
* to either encrypt and decrypt data, sign and verify messages, or derive shared secrets
79+
* (you must choose one key usage type). For information about asymmetric KMS keys, see
80+
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric
81+
* KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
8182
* <p> </p>
8283
* </dd>
8384
* <dt>HMAC KMS key</dt>
@@ -208,7 +209,7 @@ export interface CreateKeyCommandOutput extends CreateKeyResponse, __MetadataBea
208209
* Description: "STRING_VALUE",
209210
* KeyUsage: "SIGN_VERIFY" || "ENCRYPT_DECRYPT" || "GENERATE_VERIFY_MAC" || "KEY_AGREEMENT",
210211
* CustomerMasterKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
211-
* KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
212+
* KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2" || "ML_DSA_44" || "ML_DSA_65" || "ML_DSA_87",
212213
* Origin: "AWS_KMS" || "EXTERNAL" || "AWS_CLOUDHSM" || "EXTERNAL_KEY_STORE",
213214
* CustomKeyStoreId: "STRING_VALUE",
214215
* BypassPolicyLockoutSafetyCheck: true || false,
@@ -241,12 +242,12 @@ export interface CreateKeyCommandOutput extends CreateKeyResponse, __MetadataBea
241242
* // ExpirationModel: "KEY_MATERIAL_EXPIRES" || "KEY_MATERIAL_DOES_NOT_EXPIRE",
242243
* // KeyManager: "AWS" || "CUSTOMER",
243244
* // CustomerMasterKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
244-
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
245+
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2" || "ML_DSA_44" || "ML_DSA_65" || "ML_DSA_87",
245246
* // EncryptionAlgorithms: [ // EncryptionAlgorithmSpecList
246247
* // "SYMMETRIC_DEFAULT" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "SM2PKE",
247248
* // ],
248249
* // SigningAlgorithms: [ // SigningAlgorithmSpecList
249-
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA",
250+
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA" || "ML_DSA_SHAKE_256",
250251
* // ],
251252
* // KeyAgreementAlgorithms: [ // KeyAgreementAlgorithmSpecList
252253
* // "ECDH",

clients/client-kms/src/commands/DecryptCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -282,6 +282,7 @@ export interface DecryptCommandOutput extends DecryptResponse, __MetadataBearer
282282
* {
283283
* EncryptionAlgorithm: "SYMMETRIC_DEFAULT",
284284
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
285+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
285286
* Plaintext: "<binary data>"
286287
* }
287288
* *\/

clients/client-kms/src/commands/DeleteImportedKeyMaterialCommand.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,8 @@ export interface DeleteImportedKeyMaterialCommandOutput extends DeleteImportedKe
137137
* ```javascript
138138
* // The following example deletes the imported key material from the specified KMS key.
139139
* const input = {
140-
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab"
140+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
141+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6"
141142
* };
142143
* const command = new DeleteImportedKeyMaterialCommand(input);
143144
* const response = await client.send(command);

clients/client-kms/src/commands/DescribeKeyCommand.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,12 +144,12 @@ export interface DescribeKeyCommandOutput extends DescribeKeyResponse, __Metadat
144144
* // ExpirationModel: "KEY_MATERIAL_EXPIRES" || "KEY_MATERIAL_DOES_NOT_EXPIRE",
145145
* // KeyManager: "AWS" || "CUSTOMER",
146146
* // CustomerMasterKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
147-
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
147+
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2" || "ML_DSA_44" || "ML_DSA_65" || "ML_DSA_87",
148148
* // EncryptionAlgorithms: [ // EncryptionAlgorithmSpecList
149149
* // "SYMMETRIC_DEFAULT" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "SM2PKE",
150150
* // ],
151151
* // SigningAlgorithms: [ // SigningAlgorithmSpecList
152-
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA",
152+
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA" || "ML_DSA_SHAKE_256",
153153
* // ],
154154
* // KeyAgreementAlgorithms: [ // KeyAgreementAlgorithmSpecList
155155
* // "ECDH",
@@ -291,6 +291,7 @@ export interface DescribeKeyCommandOutput extends DescribeKeyResponse, __Metadat
291291
* AWSAccountId: "111122223333",
292292
* Arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
293293
* CreationDate: 1.586329200918E9,
294+
* CurrentKeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
294295
* CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
295296
* Description: "",
296297
* Enabled: true,

clients/client-kms/src/commands/GenerateDataKeyCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -262,6 +262,7 @@ export interface GenerateDataKeyCommandOutput extends GenerateDataKeyResponse, _
262262
* {
263263
* CiphertextBlob: "<binary data>",
264264
* KeyId: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
265+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
265266
* Plaintext: "<binary data>"
266267
* }
267268
* *\/

clients/client-kms/src/commands/GenerateDataKeyPairCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -245,6 +245,7 @@ export interface GenerateDataKeyPairCommandOutput extends GenerateDataKeyPairRes
245245
* /* response is
246246
* {
247247
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
248+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
248249
* KeyPairSpec: "RSA_3072",
249250
* PrivateKeyCiphertextBlob: "<binary data>",
250251
* PrivateKeyPlaintext: "<binary data>",

clients/client-kms/src/commands/GenerateDataKeyPairWithoutPlaintextCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -225,6 +225,7 @@ export interface GenerateDataKeyPairWithoutPlaintextCommandOutput
225225
* /* response is
226226
* {
227227
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
228+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
228229
* KeyPairSpec: "ECC_NIST_P521",
229230
* PrivateKeyCiphertextBlob: "<binary data>",
230231
* PublicKey: "<binary data>"

clients/client-kms/src/commands/GenerateDataKeyWithoutPlaintextCommand.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,8 @@ export interface GenerateDataKeyWithoutPlaintextCommandOutput
226226
* /* response is
227227
* {
228228
* CiphertextBlob: "<binary data>",
229-
* KeyId: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
229+
* KeyId: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
230+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6"
230231
* }
231232
* *\/
232233
* ```

clients/client-kms/src/commands/GetPublicKeyCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,13 +98,13 @@ export interface GetPublicKeyCommandOutput extends GetPublicKeyResponse, __Metad
9898
* // KeyId: "STRING_VALUE",
9999
* // PublicKey: new Uint8Array(),
100100
* // CustomerMasterKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
101-
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
101+
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2" || "ML_DSA_44" || "ML_DSA_65" || "ML_DSA_87",
102102
* // KeyUsage: "SIGN_VERIFY" || "ENCRYPT_DECRYPT" || "GENERATE_VERIFY_MAC" || "KEY_AGREEMENT",
103103
* // EncryptionAlgorithms: [ // EncryptionAlgorithmSpecList
104104
* // "SYMMETRIC_DEFAULT" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "SM2PKE",
105105
* // ],
106106
* // SigningAlgorithms: [ // SigningAlgorithmSpecList
107-
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA",
107+
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA" || "ML_DSA_SHAKE_256",
108108
* // ],
109109
* // KeyAgreementAlgorithms: [ // KeyAgreementAlgorithmSpecList
110110
* // "ECDH",

clients/client-kms/src/commands/ImportKeyMaterialCommand.ts

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,10 @@ export interface ImportKeyMaterialCommandOutput extends ImportKeyMaterialRespons
250250
* const command = new ImportKeyMaterialCommand(input);
251251
* const response = await client.send(command);
252252
* /* response is
253-
* { /* metadata only *\/ }
253+
* {
254+
* KeyId: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
255+
* KeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6"
256+
* }
254257
* *\/
255258
* ```
256259
*

clients/client-kms/src/commands/ReEncryptCommand.ts

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,8 +263,12 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
263263
* /* response is
264264
* {
265265
* CiphertextBlob: "<binary data>",
266+
* DestinationEncryptionAlgorithm: "SYMMETRIC_DEFAULT",
267+
* DestinationKeyMaterialId: "0b7fd7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6",
266268
* KeyId: "arn:aws:kms:us-east-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
267-
* SourceKeyId: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
269+
* SourceEncryptionAlgorithm: "SYMMETRIC_DEFAULT",
270+
* SourceKeyId: "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
271+
* SourceKeyMaterialId: "1c6be7ddbac6eef27907413567cad8c810e2883dc8a7534067a82ee1142fc1e6"
268272
* }
269273
* *\/
270274
* ```

clients/client-kms/src/commands/ReplicateKeyCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,12 +149,12 @@ export interface ReplicateKeyCommandOutput extends ReplicateKeyResponse, __Metad
149149
* // ExpirationModel: "KEY_MATERIAL_EXPIRES" || "KEY_MATERIAL_DOES_NOT_EXPIRE",
150150
* // KeyManager: "AWS" || "CUSTOMER",
151151
* // CustomerMasterKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
152-
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2",
152+
* // KeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "ECC_NIST_P256" || "ECC_NIST_P384" || "ECC_NIST_P521" || "ECC_SECG_P256K1" || "SYMMETRIC_DEFAULT" || "HMAC_224" || "HMAC_256" || "HMAC_384" || "HMAC_512" || "SM2" || "ML_DSA_44" || "ML_DSA_65" || "ML_DSA_87",
153153
* // EncryptionAlgorithms: [ // EncryptionAlgorithmSpecList
154154
* // "SYMMETRIC_DEFAULT" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "SM2PKE",
155155
* // ],
156156
* // SigningAlgorithms: [ // SigningAlgorithmSpecList
157-
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA",
157+
* // "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA" || "ML_DSA_SHAKE_256",
158158
* // ],
159159
* // KeyAgreementAlgorithms: [ // KeyAgreementAlgorithmSpecList
160160
* // "ECDH",

clients/client-kms/src/commands/RotateKeyOnDemandCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ export interface RotateKeyOnDemandCommandOutput extends RotateKeyOnDemandRespons
3030
/**
3131
* <p>Immediately initiates rotation of the key material of the specified symmetric encryption
3232
* KMS key.</p>
33-
* <p>You can perform <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-on-demand.html">on-demand rotation</a> of
34-
* the key material in customer managed KMS keys, regardless of whether or not <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html">automatic key
33+
* <p>You can perform <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-on-demand.html">on-demand rotation</a> of the key
34+
* material in customer managed KMS keys, regardless of whether or not <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html">automatic key
3535
* rotation</a> is enabled. On-demand rotations do not change existing automatic rotation
3636
* schedules. For example, consider a KMS key that has automatic key rotation enabled with a
3737
* rotation period of 730 days. If the key is scheduled to automatically rotate on April 14,

0 commit comments

Comments
 (0)