You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Examples/runtimes/java/DynamoDbEncryption/src/main/java/software/amazon/cryptography/examples/keyring/KmsEcdhKeyringExample.java
+4-3
Original file line number
Diff line number
Diff line change
@@ -178,9 +178,8 @@ public static void KmsEcdhKeyringGetItemPutItem(
178
178
}
179
179
180
180
/*
181
-
This example takes in the recipient's KMS ECC key ARN,
182
-
and the algorithm definition where the ECC keys lie.
183
-
The eccRecipientKeyArn parameter takes in the sender's KMS ECC key ARN
181
+
This example takes in the recipient's KMS ECC key ARN via
182
+
the eccRecipientKeyArn parameter.
184
183
185
184
This example attempts to decrypt a test item using the provided eccRecipientKeyArn,
186
185
it does so by checking if the message header contains the recipient's public key.
Copy file name to clipboardExpand all lines: Examples/runtimes/java/DynamoDbEncryption/src/main/java/software/amazon/cryptography/examples/keyring/RawEcdhKeyringExample.java
+4-4
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ public static void RawEcdhKeyringGetItemPutItem(
195
195
196
196
/*
197
197
This example takes in the recipient's public key located at EXAMPLE_ECC_PUBLIC_KEY_FILENAME_RECIPIENT
198
-
as a UTF8 PEM-encoded (PKCS #8 PrivateKeyInfo structures), and the Curve Specification where the key lies.
198
+
as a UTF8 PEM-encoded X.509 public key, and the Curve Specification where the key lies.
199
199
200
200
This examples creates a RawECDH keyring with the EphemeralPrivateKeyToStaticPublicKey key agreement scheme.
201
201
This configuration will always create a new key pair as the sender key pair for the key agreement operation.
@@ -252,7 +252,7 @@ public static void EphemeralRawEcdhKeyringPutItem(
252
252
// This keyring uses an ephemeral configuration. This configuration will always create a new
253
253
// key pair as the sender key pair for the key agreement operation. The ephemeral configuration can only
254
254
// encrypt data and CANNOT decrypt messages.
255
-
// The DynamoDb encryption client uses this to encrypt and decrypt items.
255
+
// The DynamoDb encryption client uses this to encrypt items.
0 commit comments