Optional. The optional name of
an existing CryptoKeyVersion to
target for an import operation. If this field is not present, a new
CryptoKeyVersion containing the
supplied key material is created.
If this field is present, the supplied key material is imported into
the existing CryptoKeyVersion. To
import into an existing
CryptoKeyVersion, the
CryptoKeyVersion must be a child of
ImportCryptoKeyVersionRequest.parent,
have been previously created via [ImportCryptoKeyVersion][], and be in
DESTROYED
or
IMPORT_FAILED
state. The key material and algorithm must match the previous
CryptoKeyVersion exactly if the
CryptoKeyVersion has ever contained
key material.
Optional. The optional name of
an existing CryptoKeyVersion to
target for an import operation. If this field is not present, a new
CryptoKeyVersion containing the
supplied key material is created.
If this field is present, the supplied key material is imported into
the existing CryptoKeyVersion. To
import into an existing
CryptoKeyVersion, the
CryptoKeyVersion must be a child of
ImportCryptoKeyVersionRequest.parent,
have been previously created via [ImportCryptoKeyVersion][], and be in
DESTROYED
or
IMPORT_FAILED
state. The key material and algorithm must match the previous
CryptoKeyVersion exactly if the
CryptoKeyVersion has ever contained
key material.
Wrapped key material produced with
RSA_OAEP_3072_SHA1_AES_256
or
RSA_OAEP_4096_SHA1_AES_256.
This field contains the concatenation of two wrapped keys:
<ol>
<li>An ephemeral AES-256 wrapping key wrapped with the
public_key using
RSAES-OAEP with SHA-1/SHA-256, MGF1 with SHA-1/SHA-256, and an
empty label.
</li>
<li>The key to be imported, wrapped with the ephemeral AES-256 key
using AES-KWP (RFC 5649).
</li>
</ol>
If importing symmetric key material, it is expected that the unwrapped
key contains plain bytes. If importing asymmetric key material, it is
expected that the unwrapped key is in PKCS#8-encoded DER format (the
PrivateKeyInfo structure from RFC 5208).
This format is the same as the format produced by PKCS#11 mechanism
CKM_RSA_AES_KEY_WRAP.
Wrapped key material produced with
RSA_OAEP_3072_SHA1_AES_256
or
RSA_OAEP_4096_SHA1_AES_256.
This field contains the concatenation of two wrapped keys:
<ol>
<li>An ephemeral AES-256 wrapping key wrapped with the
public_key using
RSAES-OAEP with SHA-1/SHA-256, MGF1 with SHA-1/SHA-256, and an
empty label.
</li>
<li>The key to be imported, wrapped with the ephemeral AES-256 key
using AES-KWP (RFC 5649).
</li>
</ol>
If importing symmetric key material, it is expected that the unwrapped
key contains plain bytes. If importing asymmetric key material, it is
expected that the unwrapped key is in PKCS#8-encoded DER format (the
PrivateKeyInfo structure from RFC 5208).
This format is the same as the format produced by PKCS#11 mechanism
CKM_RSA_AES_KEY_WRAP.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-01-27 UTC."],[],[]]