You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Examples/runtimes/java/DynamoDbEncryption/src/main/java/software/amazon/cryptography/examples/keyring/KmsEcdhKeyringExample.java
+4-4
Original file line number
Diff line number
Diff line change
@@ -129,13 +129,13 @@ public static void KmsEcdhKeyringGetItemPutItem(
129
129
// Create a KMS ECDH keyring.
130
130
// This keyring uses the KmsPrivateKeyToStaticPublicKey configuration. This configuration calls for both of
131
131
// the keys to be on the same curve (P256, P384, P521).
132
-
// On encrypt, the keyring calls AWS KMS to derive the shared from the sender's KMS ECC Key ARN and the recipient's public key.
133
-
// For this example, on decrypt, the keyring calls AWS KMS to derive the shared from the sender's KMS ECC Key ARN and the recipient's public key;
134
-
// however, on decrypt the recipient can construct a keyring such that the shared secret is calculated with
132
+
// On encrypt, the keyring calls AWS KMS to derive the shared secret from the sender's KMS ECC Key ARN and the recipient's public key.
133
+
// For this example, on decrypt, the keyring calls AWS KMS to derive the shared secret from the sender's KMS ECC Key ARN and the recipient's public key;
134
+
// however, on decrypt, the recipient can construct a keyring such that the shared secret is calculated with
135
135
// the recipient's private key and the sender's public key. In both scenarios the shared secret will be the same.
136
136
// For more information on this configuration see:
Copy file name to clipboardExpand all lines: Examples/runtimes/java/DynamoDbEncryption/src/main/java/software/amazon/cryptography/examples/keyring/RawEcdhKeyringExample.java
+2-2
Original file line number
Diff line number
Diff line change
@@ -736,8 +736,8 @@ public static boolean shouldGenerateNewEccKeyPairs() {
736
736
737
737
// If keys already exist: do not overwrite existing keys
0 commit comments