class Aws::KMS::Types::ReEncryptRequest

@note When making an API call, you may pass ReEncryptRequest

data as a hash:

    {
      ciphertext_blob: "data", # required
      source_encryption_context: {
        "EncryptionContextKey" => "EncryptionContextValue",
      },
      source_key_id: "KeyIdType",
      destination_key_id: "KeyIdType", # required
      destination_encryption_context: {
        "EncryptionContextKey" => "EncryptionContextValue",
      },
      source_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
      destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
      grant_tokens: ["GrantTokenType"],
    }

@!attribute [rw] ciphertext_blob

Ciphertext of the data to reencrypt.
@return [String]

@!attribute [rw] source_encryption_context

Specifies the encryption context to use to decrypt the ciphertext.
Enter the same encryption context that was used to encrypt the
ciphertext.

An *encryption context* is a collection of non-secret key-value
pairs that represents additional authenticated data. When you use an
encryption context to encrypt data, you must specify the same (an
exact case-sensitive match) encryption context to decrypt the data.
An encryption context is optional when encrypting with a symmetric
KMS key, but it is highly recommended.

For more information, see [Encryption Context][1] in the *Key
Management Service Developer Guide*.

[1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context
@return [Hash<String,String>]

@!attribute [rw] source_key_id

Specifies the KMS key that KMS will use to decrypt the ciphertext
before it is re-encrypted. Enter a key ID of the KMS key that was
used to encrypt the ciphertext.

This parameter is required only when the ciphertext was encrypted
under an asymmetric KMS key. If you used a symmetric KMS key, KMS
can get the KMS key from metadata that it adds to the symmetric
ciphertext blob. However, it is always recommended as a best
practice. This practice ensures that you use the KMS key that you
intend.

To specify a KMS key, use its key ID, key ARN, alias name, or alias
ARN. When using an alias name, prefix it with `"alias/"`. To specify
a KMS key in a different Amazon Web Services account, you must use
the key ARN or alias ARN.

For example:

* Key ID: `1234abcd-12ab-34cd-56ef-1234567890ab`

* Key ARN:
  `arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`

* Alias name: `alias/ExampleAlias`

* Alias ARN: `arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias`

To get the key ID and key ARN for a KMS key, use ListKeys or
DescribeKey. To get the alias name and alias ARN, use ListAliases.
@return [String]

@!attribute [rw] destination_key_id

A unique identifier for the KMS key that is used to reencrypt the
data. Specify a symmetric or asymmetric KMS key with a `KeyUsage`
value of `ENCRYPT_DECRYPT`. To find the `KeyUsage` value of a KMS
key, use the DescribeKey operation.

To specify a KMS key, use its key ID, key ARN, alias name, or alias
ARN. When using an alias name, prefix it with `"alias/"`. To specify
a KMS key in a different Amazon Web Services account, you must use
the key ARN or alias ARN.

For example:

* Key ID: `1234abcd-12ab-34cd-56ef-1234567890ab`

* Key ARN:
  `arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`

* Alias name: `alias/ExampleAlias`

* Alias ARN: `arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias`

To get the key ID and key ARN for a KMS key, use ListKeys or
DescribeKey. To get the alias name and alias ARN, use ListAliases.
@return [String]

@!attribute [rw] destination_encryption_context

Specifies that encryption context to use when the reencrypting the
data.

A destination encryption context is valid only when the destination
KMS key is a symmetric KMS key. The standard ciphertext format for
asymmetric KMS keys does not include fields for metadata.

An *encryption context* is a collection of non-secret key-value
pairs that represents additional authenticated data. When you use an
encryption context to encrypt data, you must specify the same (an
exact case-sensitive match) encryption context to decrypt the data.
An encryption context is optional when encrypting with a symmetric
KMS key, but it is highly recommended.

For more information, see [Encryption Context][1] in the *Key
Management Service Developer Guide*.

[1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context
@return [Hash<String,String>]

@!attribute [rw] source_encryption_algorithm

Specifies the encryption algorithm that KMS will use to decrypt the
ciphertext before it is reencrypted. The default value,
`SYMMETRIC_DEFAULT`, represents the algorithm used for symmetric KMS
keys.

Specify the same algorithm that was used to encrypt the ciphertext.
If you specify a different algorithm, the decrypt attempt fails.

This parameter is required only when the ciphertext was encrypted
under an asymmetric KMS key.
@return [String]

@!attribute [rw] destination_encryption_algorithm

Specifies the encryption algorithm that KMS will use to reecrypt the
data after it has decrypted it. The default value,
`SYMMETRIC_DEFAULT`, represents the encryption algorithm used for
symmetric KMS keys.

This parameter is required only when the destination KMS key is an
asymmetric KMS key.
@return [String]

@!attribute [rw] grant_tokens

A list of grant tokens.

Use a grant token when your permission to call this operation comes
from a new grant that has not yet achieved *eventual consistency*.
For more information, see [Grant token][1] and [Using a grant
token][2] in the *Key Management Service Developer Guide*.

[1]: https://docs.aws.amazon.com/kms/latest/developerguide/grants.html#grant_token
[2]: https://docs.aws.amazon.com/kms/latest/developerguide/grant-manage.html#using-grant-token
@return [Array<String>]

@see docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/ReEncryptRequest AWS API Documentation

Constants

SENSITIVE