#[non_exhaustive]pub struct GetPublicKeyOutput {
pub key_id: Option<String>,
pub public_key: Option<Blob>,
pub customer_master_key_spec: Option<CustomerMasterKeySpec>,
pub key_spec: Option<KeySpec>,
pub key_usage: Option<KeyUsageType>,
pub encryption_algorithms: Option<Vec<EncryptionAlgorithmSpec>>,
pub signing_algorithms: Option<Vec<SigningAlgorithmSpec>>,
pub key_agreement_algorithms: Option<Vec<KeyAgreementAlgorithmSpec>>,
/* private fields */
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.key_id: Option<String>
The Amazon Resource Name (key ARN) of the asymmetric KMS key from which the public key was downloaded.
public_key: Option<Blob>
The exported public key.
The value is a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo
(SPKI), as defined in RFC 5280. When you use the HTTP API or the Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it is not Base64-encoded.
customer_master_key_spec: Option<CustomerMasterKeySpec>
Instead, use the KeySpec
field in the GetPublicKey
response.
The KeySpec
and CustomerMasterKeySpec
fields have the same value. We recommend that you use the KeySpec
field in your code. However, to avoid breaking changes, KMS supports both fields.
key_spec: Option<KeySpec>
The type of the of the public key that was downloaded.
key_usage: Option<KeyUsageType>
The permitted use of the public key. Valid values for asymmetric key pairs are ENCRYPT_DECRYPT
, SIGN_VERIFY
, and KEY_AGREEMENT
.
This information is critical. For example, if a public key with SIGN_VERIFY
key usage encrypts data outside of KMS, the ciphertext cannot be decrypted.
encryption_algorithms: Option<Vec<EncryptionAlgorithmSpec>>
The encryption algorithms that KMS supports for this key.
This information is critical. If a public key encrypts data outside of KMS by using an unsupported encryption algorithm, the ciphertext cannot be decrypted.
This field appears in the response only when the KeyUsage
of the public key is ENCRYPT_DECRYPT
.
signing_algorithms: Option<Vec<SigningAlgorithmSpec>>
The signing algorithms that KMS supports for this key.
This field appears in the response only when the KeyUsage
of the public key is SIGN_VERIFY
.
key_agreement_algorithms: Option<Vec<KeyAgreementAlgorithmSpec>>
The key agreement algorithm used to derive a shared secret. This field is present only when the KMS key has a KeyUsage
value of KEY_AGREEMENT
.
Implementations§
Source§impl GetPublicKeyOutput
impl GetPublicKeyOutput
Sourcepub fn key_id(&self) -> Option<&str>
pub fn key_id(&self) -> Option<&str>
The Amazon Resource Name (key ARN) of the asymmetric KMS key from which the public key was downloaded.
Sourcepub fn public_key(&self) -> Option<&Blob>
pub fn public_key(&self) -> Option<&Blob>
The exported public key.
The value is a DER-encoded X.509 public key, also known as SubjectPublicKeyInfo
(SPKI), as defined in RFC 5280. When you use the HTTP API or the Amazon Web Services CLI, the value is Base64-encoded. Otherwise, it is not Base64-encoded.
Sourcepub fn customer_master_key_spec(&self) -> Option<&CustomerMasterKeySpec>
👎Deprecated: This field has been deprecated. Instead, use the KeySpec field.
pub fn customer_master_key_spec(&self) -> Option<&CustomerMasterKeySpec>
Instead, use the KeySpec
field in the GetPublicKey
response.
The KeySpec
and CustomerMasterKeySpec
fields have the same value. We recommend that you use the KeySpec
field in your code. However, to avoid breaking changes, KMS supports both fields.
Sourcepub fn key_spec(&self) -> Option<&KeySpec>
pub fn key_spec(&self) -> Option<&KeySpec>
The type of the of the public key that was downloaded.
Sourcepub fn key_usage(&self) -> Option<&KeyUsageType>
pub fn key_usage(&self) -> Option<&KeyUsageType>
The permitted use of the public key. Valid values for asymmetric key pairs are ENCRYPT_DECRYPT
, SIGN_VERIFY
, and KEY_AGREEMENT
.
This information is critical. For example, if a public key with SIGN_VERIFY
key usage encrypts data outside of KMS, the ciphertext cannot be decrypted.
Sourcepub fn encryption_algorithms(&self) -> &[EncryptionAlgorithmSpec]
pub fn encryption_algorithms(&self) -> &[EncryptionAlgorithmSpec]
The encryption algorithms that KMS supports for this key.
This information is critical. If a public key encrypts data outside of KMS by using an unsupported encryption algorithm, the ciphertext cannot be decrypted.
This field appears in the response only when the KeyUsage
of the public key is ENCRYPT_DECRYPT
.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .encryption_algorithms.is_none()
.
Sourcepub fn signing_algorithms(&self) -> &[SigningAlgorithmSpec]
pub fn signing_algorithms(&self) -> &[SigningAlgorithmSpec]
The signing algorithms that KMS supports for this key.
This field appears in the response only when the KeyUsage
of the public key is SIGN_VERIFY
.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .signing_algorithms.is_none()
.
Sourcepub fn key_agreement_algorithms(&self) -> &[KeyAgreementAlgorithmSpec]
pub fn key_agreement_algorithms(&self) -> &[KeyAgreementAlgorithmSpec]
The key agreement algorithm used to derive a shared secret. This field is present only when the KMS key has a KeyUsage
value of KEY_AGREEMENT
.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .key_agreement_algorithms.is_none()
.
Source§impl GetPublicKeyOutput
impl GetPublicKeyOutput
Sourcepub fn builder() -> GetPublicKeyOutputBuilder
pub fn builder() -> GetPublicKeyOutputBuilder
Creates a new builder-style object to manufacture GetPublicKeyOutput
.
Trait Implementations§
Source§impl Clone for GetPublicKeyOutput
impl Clone for GetPublicKeyOutput
Source§fn clone(&self) -> GetPublicKeyOutput
fn clone(&self) -> GetPublicKeyOutput
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for GetPublicKeyOutput
impl Debug for GetPublicKeyOutput
Source§impl PartialEq for GetPublicKeyOutput
impl PartialEq for GetPublicKeyOutput
Source§impl RequestId for GetPublicKeyOutput
impl RequestId for GetPublicKeyOutput
Source§fn request_id(&self) -> Option<&str>
fn request_id(&self) -> Option<&str>
None
if the service could not be reached.impl StructuralPartialEq for GetPublicKeyOutput
Auto Trait Implementations§
impl Freeze for GetPublicKeyOutput
impl RefUnwindSafe for GetPublicKeyOutput
impl Send for GetPublicKeyOutput
impl Sync for GetPublicKeyOutput
impl Unpin for GetPublicKeyOutput
impl UnwindSafe for GetPublicKeyOutput
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more