@@ -184,15 +184,16 @@ public function createAlias($input): Result
184
184
* Then, use the `KeyUsage` parameter to determine whether the KMS key will be used to encrypt and decrypt or sign and
185
185
* verify. You can't change these properties after the KMS key is created.
186
186
*
187
- * Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair, or an SM2 key pair (China Regions
188
- * only). The private key in an asymmetric KMS key never leaves KMS unencrypted. However, you can use the GetPublicKey
189
- * operation to download the public key so it can be used outside of KMS. Each KMS key can have only one key usage.
190
- * KMS keys with RSA key pairs can be used to encrypt and decrypt data or sign and verify messages (but not both). KMS
191
- * keys with NIST-recommended ECC key pairs can be used to sign and verify messages or derive shared secrets (but not
192
- * both). KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS keys with SM2 key pairs
193
- * (China Regions only) can be used to either encrypt and decrypt data, sign and verify messages, or derive shared
194
- * secrets (you must choose one key usage type). For information about asymmetric KMS keys, see Asymmetric KMS keys
195
- * [^2] in the *Key Management Service Developer Guide*.
187
+ * Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair, ML-DSA key pair or an SM2 key pair
188
+ * (China Regions only). The private key in an asymmetric KMS key never leaves KMS unencrypted. However, you can use
189
+ * the GetPublicKey operation to download the public key so it can be used outside of KMS. Each KMS key can have only
190
+ * one key usage. KMS keys with RSA key pairs can be used to encrypt and decrypt data or sign and verify messages (but
191
+ * not both). KMS keys with NIST-recommended ECC key pairs can be used to sign and verify messages or derive shared
192
+ * secrets (but not both). KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS keys with
193
+ * ML-DSA key pairs can be used to sign and verify messages. KMS keys with SM2 key pairs (China Regions only) can be
194
+ * used to either encrypt and decrypt data, sign and verify messages, or derive shared secrets (you must choose one
195
+ * key usage type). For information about asymmetric KMS keys, see Asymmetric KMS keys [^2] in the *Key Management
196
+ * Service Developer Guide*.
196
197
*
197
198
* - `HMAC KMS key`:
198
199
*
@@ -875,10 +876,10 @@ public function listAliases($input = []): ListAliasesResponse
875
876
* outside of KMS. For information about asymmetric KMS keys, see Asymmetric KMS keys [^2] in the *Key Management
876
877
* Service Developer Guide*.
877
878
*
878
- * Digital signatures are generated and verified by using asymmetric key pair, such as an RSA or ECC pair that is
879
- * represented by an asymmetric KMS key. The key owner (or an authorized user) uses their private key to sign a message.
880
- * Anyone with the public key can verify that the message was signed with that particular private key and that the
881
- * message hasn't changed since it was signed.
879
+ * Digital signatures are generated and verified by using asymmetric key pair, such as an RSA, ECC, or ML-DSA pair that
880
+ * is represented by an asymmetric KMS key. The key owner (or an authorized user) uses their private key to sign a
881
+ * message. Anyone with the public key can verify that the message was signed with that particular private key and that
882
+ * the message hasn't changed since it was signed.
882
883
*
883
884
* To use the `Sign` operation, provide the following information:
884
885
*
@@ -887,8 +888,8 @@ public function listAliases($input = []): ListAliasesResponse
887
888
* key.
888
889
* - Use the `Message` parameter to specify the message or message digest to sign. You can submit messages of up to 4096
889
890
* bytes. To sign a larger message, generate a hash digest of the message, and then provide the hash digest in the
890
- * `Message` parameter. To indicate whether the message is a full message or a digest, use the `MessageType`
891
- * parameter.
891
+ * `Message` parameter. To indicate whether the message is a full message, a digest, or an ML-DSA EXTERNAL_MU, use the
892
+ * `MessageType` parameter.
892
893
* - Choose a signing algorithm that is compatible with the KMS key.
893
894
*
894
895
* ! When signing a message, be sure to record the KMS key and the signing algorithm. This information is required to
0 commit comments