Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions AwsCryptographicMaterialProviders/runtimes/rust/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@ name = "aws-mpl-legacy"
version = "0.1.0"
rust-version = "1.88.0"
edition = "2021"
keywords = ["crypto", "cryptography", "security", "encryption", "client-side", "clientside"]
keywords = ["crypto", "cryptography", "security", "encryption", "client-side"]
license = "ISC AND (Apache-2.0 OR ISC)"
description = "aws-mpl-rs is a low level library for implementing client side encryption."
description = "aws-mpl-legacy is a low level library for implementing client side encryption."
authors = ["AWS-CryptoTools"]
documentation = "https://docs.rs/crate/aws-mpl-rs"
documentation = "https://docs.rs/crate/aws-mpl-legacy"
readme = "README.md"

# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
Expand All @@ -23,14 +23,14 @@ aws-smithy-runtime-api = {version = "1.9.3", features = ["client"] }
aws-smithy-types = "1.3.5"
chrono = "0.4.42"
cpu-time = "1.0.0"
dafny_runtime = { path = "../../../smithy-dafny/TestModels/dafny-dependencies/dafny_runtime_rust", features = ["sync","small-int"]}
dashmap = "6.1.0"
pem = "3.0.6"
tokio = {version = "1.49.0", features = ["full"] }
uuid = { version = "1.19.0", features = ["v4"] }
timeout = "0.1.0"
rand = "0.9.2"
futures = "0.3"
dafny-runtime = { version = "0.3.1", features = ["sync", "small-int"] }

[features]
fips = ["aws-lc-rs/fips", "dep:aws-lc-fips-sys"]
Expand Down
29 changes: 7 additions & 22 deletions AwsCryptographicMaterialProviders/runtimes/rust/README.md
Original file line number Diff line number Diff line change
@@ -1,30 +1,15 @@
# AWS Encryption SDK for Rust

[![build status](https://github.com/aws/aws-cryptographic-material-providers-library/actions/workflows/daily_ci.yml/badge.svg?branch=mainline)](https://github.com/aws/aws-cryptographic-material-providers-library/actions/workflows/daily_ci.yml)
[![crates.io](https://img.shields.io/crates/v/aws-mpl-legacy.svg)](https://crates.io/crates/aws-mpl-legacy)
[![docs](https://docs.rs/aws-mpl-legacy/badge.svg)](https://docs.rs/aws-mpl-legacy)
[![rustc](https://img.shields.io/badge/rust-1.81%2B-orange.svg)](https://img.shields.io/badge/rust-1.81%2B-orange.svg)

This is the official [AWS Cryptographic Material Providers Legacy Library for Rust](https://crates.io/crates/aws-mpl-legacy).

## [CHANGELOG](https://github.com/aws/aws-cryptographic-material-providers-library/tree/main/AwsCryptographicMaterialProviders/runtimes/rust/CHANGELOG.md)

## Overview
**DO NOT** take a standalone dependency on this library.

The AWS Cryptographic Material Providers Library abstracts lower level cryptographic materials management of encryption and decryption materials.
It uses cryptographic best practices to protect the data keys that protect your data.
The data key is protected with a key encryption key called a _wrapping key_.
The encryption method returns the data key and one or more encrypted data keys.
Supported libraries use this information to perform envelope encryption.
The data key is used to protect your data,
and the encrypted data keys are stored alongside your data
so you don't need to keep track of the data keys separately.
You can use AWS KMS keys in [AWS Key Management Service](https://aws.amazon.com/kms/)(AWS KMS) as wrapping keys.
The AWS Cryptographic Material Providers Library
also provides APIs to define and use wrapping keys from other key providers.

The AWS Cryptographic Material Providers Library provides methods for encrypting and decrypting cryptographic materials used in higher level client side encryption libraries.
[Security issue notifications](./CONTRIBUTING.md#security-issue-notifications)

## License
## Security

This library is licensed under the Apache 2.0 License.
If you discover a potential security issue in this project
we ask that you notify AWS/Amazon Security via our
[vulnerability reporting page](http://aws.amazon.com/security/vulnerability-reporting/).
Please **do not** create a public GitHub issue.
6 changes: 3 additions & 3 deletions releases/rust/mpl/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@ name = "aws-mpl-legacy"
version = "0.1.0"
rust-version = "1.88.0"
edition = "2021"
keywords = ["crypto", "cryptography", "security", "encryption", "client-side", "clientside"]
keywords = ["crypto", "cryptography", "security", "encryption", "client-side"]
license = "ISC AND (Apache-2.0 OR ISC)"
description = "aws-mpl-rs is a low level library for implementing client side encryption."
description = "aws-mpl-legacy is a low level library for implementing client side encryption."
authors = ["AWS-CryptoTools"]
documentation = "https://docs.rs/crate/aws-mpl-rs"
documentation = "https://docs.rs/crate/aws-mpl-legacy"
readme = "README.md"

# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
Expand Down
29 changes: 7 additions & 22 deletions releases/rust/mpl/README.md
Original file line number Diff line number Diff line change
@@ -1,30 +1,15 @@
# AWS Encryption SDK for Rust

[![build status](https://github.com/aws/aws-cryptographic-material-providers-library/actions/workflows/daily_ci.yml/badge.svg?branch=mainline)](https://github.com/aws/aws-cryptographic-material-providers-library/actions/workflows/daily_ci.yml)
[![crates.io](https://img.shields.io/crates/v/aws-mpl-legacy.svg)](https://crates.io/crates/aws-mpl-legacy)
[![docs](https://docs.rs/aws-mpl-legacy/badge.svg)](https://docs.rs/aws-mpl-legacy)
[![rustc](https://img.shields.io/badge/rust-1.81%2B-orange.svg)](https://img.shields.io/badge/rust-1.81%2B-orange.svg)

This is the official [AWS Cryptographic Material Providers Legacy Library for Rust](https://crates.io/crates/aws-mpl-legacy).

## [CHANGELOG](https://github.com/aws/aws-cryptographic-material-providers-library/tree/main/AwsCryptographicMaterialProviders/runtimes/rust/CHANGELOG.md)

## Overview
**DO NOT** take a standalone dependency on this library.

The AWS Cryptographic Material Providers Library abstracts lower level cryptographic materials management of encryption and decryption materials.
It uses cryptographic best practices to protect the data keys that protect your data.
The data key is protected with a key encryption key called a _wrapping key_.
The encryption method returns the data key and one or more encrypted data keys.
Supported libraries use this information to perform envelope encryption.
The data key is used to protect your data,
and the encrypted data keys are stored alongside your data
so you don't need to keep track of the data keys separately.
You can use AWS KMS keys in [AWS Key Management Service](https://aws.amazon.com/kms/)(AWS KMS) as wrapping keys.
The AWS Cryptographic Material Providers Library
also provides APIs to define and use wrapping keys from other key providers.

The AWS Cryptographic Material Providers Library provides methods for encrypting and decrypting cryptographic materials used in higher level client side encryption libraries.
[Security issue notifications](./CONTRIBUTING.md#security-issue-notifications)

## License
## Security

This library is licensed under the Apache 2.0 License.
If you discover a potential security issue in this project
we ask that you notify AWS/Amazon Security via our
[vulnerability reporting page](http://aws.amazon.com/security/vulnerability-reporting/).
Please **do not** create a public GitHub issue.
Loading