Struct aws_sdk_kms::input::VerifyInput
source · [−]#[non_exhaustive]pub struct VerifyInput {
pub key_id: Option<String>,
pub message: Option<Blob>,
pub message_type: Option<MessageType>,
pub signature: Option<Blob>,
pub signing_algorithm: Option<SigningAlgorithmSpec>,
pub grant_tokens: Option<Vec<String>>,
}Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.key_id: Option<String>Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key that was used to generate the signature. If you specify a different KMS key, the signature verification fails.
To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
For example:
-
Key ID:
1234abcd-12ab-34cd-56ef-1234567890ab -
Key ARN:
arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab -
Alias name:
alias/ExampleAlias -
Alias ARN:
arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and alias ARN, use ListAliases.
message: Option<Blob>Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest of the message. If you submit a digest, use the MessageType parameter with a value of DIGEST.
If the message specified here is different from the message that was signed, the signature verification fails. A message and its hash digest are considered to be the same message.
message_type: Option<MessageType>Tells KMS whether the value of the Message parameter is a message or message digest. The default value, RAW, indicates a message. To indicate a message digest, enter DIGEST.
Use the DIGEST value only when the value of the Message parameter is a message digest. If you use the DIGEST value with a raw message, the security of the verification operation can be compromised.
signature: Option<Blob>The signature that the Sign operation generated.
signing_algorithm: Option<SigningAlgorithmSpec>The signing algorithm that was used to sign the message. If you submit a different algorithm, the signature verification fails.
grant_tokens: Option<Vec<String>>A list of grant tokens.
Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
Implementations
sourceimpl VerifyInput
impl VerifyInput
sourcepub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<Verify, AwsErrorRetryPolicy>, BuildError>
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<Verify, AwsErrorRetryPolicy>, BuildError>
Consumes the builder and constructs an Operation<Verify>
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture VerifyInput
sourceimpl VerifyInput
impl VerifyInput
sourcepub fn key_id(&self) -> Option<&str>
pub fn key_id(&self) -> Option<&str>
Identifies the asymmetric KMS key that will be used to verify the signature. This must be the same KMS key that was used to generate the signature. If you specify a different KMS key, the signature verification fails.
To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with "alias/". To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
For example:
-
Key ID:
1234abcd-12ab-34cd-56ef-1234567890ab -
Key ARN:
arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab -
Alias name:
alias/ExampleAlias -
Alias ARN:
arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and alias ARN, use ListAliases.
sourcepub fn message(&self) -> Option<&Blob>
pub fn message(&self) -> Option<&Blob>
Specifies the message that was signed. You can submit a raw message of up to 4096 bytes, or a hash digest of the message. If you submit a digest, use the MessageType parameter with a value of DIGEST.
If the message specified here is different from the message that was signed, the signature verification fails. A message and its hash digest are considered to be the same message.
sourcepub fn message_type(&self) -> Option<&MessageType>
pub fn message_type(&self) -> Option<&MessageType>
Tells KMS whether the value of the Message parameter is a message or message digest. The default value, RAW, indicates a message. To indicate a message digest, enter DIGEST.
Use the DIGEST value only when the value of the Message parameter is a message digest. If you use the DIGEST value with a raw message, the security of the verification operation can be compromised.
sourcepub fn signing_algorithm(&self) -> Option<&SigningAlgorithmSpec>
pub fn signing_algorithm(&self) -> Option<&SigningAlgorithmSpec>
The signing algorithm that was used to sign the message. If you submit a different algorithm, the signature verification fails.
sourcepub fn grant_tokens(&self) -> Option<&[String]>
pub fn grant_tokens(&self) -> Option<&[String]>
A list of grant tokens.
Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
Trait Implementations
sourceimpl Clone for VerifyInput
impl Clone for VerifyInput
sourcefn clone(&self) -> VerifyInput
fn clone(&self) -> VerifyInput
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source. Read more
sourceimpl Debug for VerifyInput
impl Debug for VerifyInput
sourceimpl PartialEq<VerifyInput> for VerifyInput
impl PartialEq<VerifyInput> for VerifyInput
sourcefn eq(&self, other: &VerifyInput) -> bool
fn eq(&self, other: &VerifyInput) -> bool
This method tests for self and other values to be equal, and is used
by ==. Read more
sourcefn ne(&self, other: &VerifyInput) -> bool
fn ne(&self, other: &VerifyInput) -> bool
This method tests for !=.
impl StructuralPartialEq for VerifyInput
Auto Trait Implementations
impl RefUnwindSafe for VerifyInput
impl Send for VerifyInput
impl Sync for VerifyInput
impl Unpin for VerifyInput
impl UnwindSafe for VerifyInput
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more