You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(client-kms): This feature allows customers to use their keys stored in KMS to derive a shared secret which can then be used to establish a secured channel for communication, provide proof of possession, or establish trust with other parties.
* <p>Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair, or an
72
72
* SM2 key pair (China Regions only). The private key in an asymmetric KMS key never leaves
73
73
* KMS unencrypted. However, you can use the <a>GetPublicKey</a> operation to
74
-
* download the public key so it can be used outside of KMS. KMS keys with RSA or SM2 key
75
-
* pairs can be used to encrypt or decrypt data or sign and verify messages (but not both).
76
-
* KMS keys with ECC key pairs can be used only to sign and verify messages. For
74
+
* download the public key so it can be used outside of KMS. Each KMS key can have only one key usage. KMS keys with RSA key
75
+
* pairs can be used to encrypt and decrypt data or sign and verify messages (but not both).
76
+
* KMS keys with NIST-recommended ECC key pairs can be used to sign and verify messages or
77
+
* derive shared secrets (but not both). KMS keys with <code>ECC_SECG_P256K1</code>
78
+
* can be used only to sign and verify messages. KMS keys with SM2 key pairs (China Regions only)
79
+
* can be used to either encrypt and decrypt data, sign and verify messages, or derive shared secrets (you must choose one key usage type). For
77
80
* information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the
78
81
* <i>Key Management Service Developer Guide</i>.</p>
0 commit comments