Request message for [KeyManagementService.ImportCryptoKeyVersion][goog
le.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion].
.. attribute:: parent
Required. The name of
the CryptoKey to be imported
into.
Required. The name of
the ImportJob that was used
to wrap this key material.
Wrapped key material produced with [RSA_OAEP_3072_SHA1_AES
_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3
072_SHA1_AES_256] or [RSA_OAEP_4096_SHA1_AES_256][goog
le.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_
AES_256]. This field contains the concatenation of two
wrapped keys: .. raw:: html
.. raw:: html
An ephemeral AES-256 wrapping key wrapped with the
[public_key][google.cloud.kms.v1.ImportJob.public_key] using
RSAES-OAEP with SHA-1, MGF1 with SHA-1, and an empty label.
.. raw:: html
.. raw:: html
The key to be
imported, wrapped with the ephemeral AES-256 key using AES-KWP
(RFC 5649). .. raw:: html
.. raw:: html
If importing symmetric key material, it is expected that the
unwrapped key contains plain bytes. If importing asymmetric
key material, it is expected that the unwrapped key is in
PKCS#8-encoded DER format (the PrivateKeyInfo structure from
RFC 5208). This format is the same as the format produced by
PKCS#11 mechanism CKM_RSA_AES_KEY_WRAP.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-10-30 UTC."],[],[]]