aws-sdk-paymentcryptography 1.11.0 → 1.13.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -22,6 +22,7 @@ require 'aws-sdk-core/plugins/endpoint_pattern.rb'
22
22
  require 'aws-sdk-core/plugins/response_paging.rb'
23
23
  require 'aws-sdk-core/plugins/stub_responses.rb'
24
24
  require 'aws-sdk-core/plugins/idempotency_token.rb'
25
+ require 'aws-sdk-core/plugins/invocation_id.rb'
25
26
  require 'aws-sdk-core/plugins/jsonvalue_converter.rb'
26
27
  require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
28
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
@@ -72,6 +73,7 @@ module Aws::PaymentCryptography
72
73
  add_plugin(Aws::Plugins::ResponsePaging)
73
74
  add_plugin(Aws::Plugins::StubResponses)
74
75
  add_plugin(Aws::Plugins::IdempotencyToken)
76
+ add_plugin(Aws::Plugins::InvocationId)
75
77
  add_plugin(Aws::Plugins::JsonvalueConverter)
76
78
  add_plugin(Aws::Plugins::ClientMetricsPlugin)
77
79
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
@@ -196,10 +198,17 @@ module Aws::PaymentCryptography
196
198
  # When set to 'true' the request body will not be compressed
197
199
  # for supported operations.
198
200
  #
199
- # @option options [String] :endpoint
200
- # The client endpoint is normally constructed from the `:region`
201
- # option. You should only configure an `:endpoint` when connecting
202
- # to test or custom endpoints. This should be a valid HTTP(S) URI.
201
+ # @option options [String, URI::HTTPS, URI::HTTP] :endpoint
202
+ # Normally you should not configure the `:endpoint` option
203
+ # directly. This is normally constructed from the `:region`
204
+ # option. Configuring `:endpoint` is normally reserved for
205
+ # connecting to test or custom endpoints. The endpoint should
206
+ # be a URI formatted like:
207
+ #
208
+ # 'http://example.com'
209
+ # 'https://example.com'
210
+ # 'http://example.com:123'
211
+ #
203
212
  #
204
213
  # @option options [Integer] :endpoint_cache_max_entries (1000)
205
214
  # Used for the maximum size limit of the LRU cache storing endpoints data
@@ -292,8 +301,9 @@ module Aws::PaymentCryptography
292
301
  #
293
302
  # @option options [String] :sdk_ua_app_id
294
303
  # A unique and opaque application ID that is appended to the
295
- # User-Agent header as app/<sdk_ua_app_id>. It should have a
296
- # maximum length of 50.
304
+ # User-Agent header as app/sdk_ua_app_id. It should have a
305
+ # maximum length of 50. This variable is sourced from environment
306
+ # variable AWS_SDK_UA_APP_ID or the shared config profile attribute sdk_ua_app_id.
297
307
  #
298
308
  # @option options [String] :secret_access_key
299
309
  #
@@ -347,50 +357,65 @@ module Aws::PaymentCryptography
347
357
  # @option options [Aws::PaymentCryptography::EndpointProvider] :endpoint_provider
348
358
  # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::PaymentCryptography::EndpointParameters`
349
359
  #
350
- # @option options [URI::HTTP,String] :http_proxy A proxy to send
351
- # requests through. Formatted like 'http://proxy.com:123'.
352
- #
353
- # @option options [Float] :http_open_timeout (15) The number of
354
- # seconds to wait when opening a HTTP session before raising a
355
- # `Timeout::Error`.
356
- #
357
- # @option options [Float] :http_read_timeout (60) The default
358
- # number of seconds to wait for response data. This value can
359
- # safely be set per-request on the session.
360
- #
361
- # @option options [Float] :http_idle_timeout (5) The number of
362
- # seconds a connection is allowed to sit idle before it is
363
- # considered stale. Stale connections are closed and removed
364
- # from the pool before making a request.
365
- #
366
- # @option options [Float] :http_continue_timeout (1) The number of
367
- # seconds to wait for a 100-continue response before sending the
368
- # request body. This option has no effect unless the request has
369
- # "Expect" header set to "100-continue". Defaults to `nil` which
370
- # disables this behaviour. This value can safely be set per
371
- # request on the session.
372
- #
373
- # @option options [Float] :ssl_timeout (nil) Sets the SSL timeout
374
- # in seconds.
375
- #
376
- # @option options [Boolean] :http_wire_trace (false) When `true`,
377
- # HTTP debug output will be sent to the `:logger`.
360
+ # @option options [Float] :http_continue_timeout (1)
361
+ # The number of seconds to wait for a 100-continue response before sending the
362
+ # request body. This option has no effect unless the request has "Expect"
363
+ # header set to "100-continue". Defaults to `nil` which disables this
364
+ # behaviour. This value can safely be set per request on the session.
365
+ #
366
+ # @option options [Float] :http_idle_timeout (5)
367
+ # The number of seconds a connection is allowed to sit idle before it
368
+ # is considered stale. Stale connections are closed and removed from the
369
+ # pool before making a request.
370
+ #
371
+ # @option options [Float] :http_open_timeout (15)
372
+ # The default number of seconds to wait for response data.
373
+ # This value can safely be set per-request on the session.
374
+ #
375
+ # @option options [URI::HTTP,String] :http_proxy
376
+ # A proxy to send requests through. Formatted like 'http://proxy.com:123'.
377
+ #
378
+ # @option options [Float] :http_read_timeout (60)
379
+ # The default number of seconds to wait for response data.
380
+ # This value can safely be set per-request on the session.
381
+ #
382
+ # @option options [Boolean] :http_wire_trace (false)
383
+ # When `true`, HTTP debug output will be sent to the `:logger`.
384
+ #
385
+ # @option options [Proc] :on_chunk_received
386
+ # When a Proc object is provided, it will be used as callback when each chunk
387
+ # of the response body is received. It provides three arguments: the chunk,
388
+ # the number of bytes received, and the total number of
389
+ # bytes in the response (or nil if the server did not send a `content-length`).
390
+ #
391
+ # @option options [Proc] :on_chunk_sent
392
+ # When a Proc object is provided, it will be used as callback when each chunk
393
+ # of the request body is sent. It provides three arguments: the chunk,
394
+ # the number of bytes read from the body, and the total number of
395
+ # bytes in the body.
396
+ #
397
+ # @option options [Boolean] :raise_response_errors (true)
398
+ # When `true`, response errors are raised.
399
+ #
400
+ # @option options [String] :ssl_ca_bundle
401
+ # Full path to the SSL certificate authority bundle file that should be used when
402
+ # verifying peer certificates. If you do not pass `:ssl_ca_bundle` or
403
+ # `:ssl_ca_directory` the the system default will be used if available.
404
+ #
405
+ # @option options [String] :ssl_ca_directory
406
+ # Full path of the directory that contains the unbundled SSL certificate
407
+ # authority files for verifying peer certificates. If you do
408
+ # not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the system
409
+ # default will be used if available.
378
410
  #
379
- # @option options [Boolean] :ssl_verify_peer (true) When `true`,
380
- # SSL peer certificates are verified when establishing a
381
- # connection.
411
+ # @option options [String] :ssl_ca_store
412
+ # Sets the X509::Store to verify peer certificate.
382
413
  #
383
- # @option options [String] :ssl_ca_bundle Full path to the SSL
384
- # certificate authority bundle file that should be used when
385
- # verifying peer certificates. If you do not pass
386
- # `:ssl_ca_bundle` or `:ssl_ca_directory` the the system default
387
- # will be used if available.
414
+ # @option options [Float] :ssl_timeout
415
+ # Sets the SSL timeout in seconds
388
416
  #
389
- # @option options [String] :ssl_ca_directory Full path of the
390
- # directory that contains the unbundled SSL certificate
391
- # authority files for verifying peer certificates. If you do
392
- # not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the
393
- # system default will be used if available.
417
+ # @option options [Boolean] :ssl_verify_peer (true)
418
+ # When `true`, SSL peer certificates are verified when establishing a connection.
394
419
  #
395
420
  def initialize(*args)
396
421
  super
@@ -410,28 +435,32 @@ module Aws::PaymentCryptography
410
435
  # Services Region, but you can create another alias with the same name
411
436
  # in a different Amazon Web Services Region.
412
437
  #
413
- # To change the key that's associated with the alias, call UpdateAlias.
414
- # To delete the alias, call DeleteAlias. These operations don't affect
415
- # the underlying key. To get the alias that you created, call
416
- # ListAliases.
438
+ # To change the key that's associated with the alias, call
439
+ # [UpdateAlias][3]. To delete the alias, call [DeleteAlias][4]. These
440
+ # operations don't affect the underlying key. To get the alias that you
441
+ # created, call [ListAliases][5].
417
442
  #
418
443
  # **Cross-account use**: This operation can't be used across different
419
444
  # Amazon Web Services accounts.
420
445
  #
421
446
  # **Related operations:**
422
447
  #
423
- # * DeleteAlias
448
+ # * [DeleteAlias][4]
424
449
  #
425
- # * GetAlias
450
+ # * [GetAlias][6]
426
451
  #
427
- # * ListAliases
452
+ # * [ListAliases][5]
428
453
  #
429
- # * UpdateAlias
454
+ # * [UpdateAlias][3]
430
455
  #
431
456
  #
432
457
  #
433
458
  # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/DataAPIReference/API_EncryptData.html
434
459
  # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/DataAPIReference/API_DecryptData.html
460
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html
461
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html
462
+ # [5]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html
463
+ # [6]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html
435
464
  #
436
465
  # @option params [required, String] :alias_name
437
466
  # A friendly name that you can use to refer to a key. An alias must
@@ -503,23 +532,18 @@ module Aws::PaymentCryptography
503
532
  #
504
533
  # **Related operations:**
505
534
  #
506
- # * DeleteKey
535
+ # * [DeleteKey][2]
507
536
  #
508
- # * GetKey
537
+ # * [GetKey][3]
509
538
  #
510
- # * ListKeys
539
+ # * [ListKeys][4]
511
540
  #
512
541
  #
513
542
  #
514
543
  # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html
515
- #
516
- # @option params [Boolean] :enabled
517
- # Specifies whether to enable the key. If the key is enabled, it is
518
- # activated for use within the service. If the key is not enabled, then
519
- # it is created but not activated. The default value is enabled.
520
- #
521
- # @option params [required, Boolean] :exportable
522
- # Specifies whether the key is exportable from the service.
544
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html
545
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetKey.html
546
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListKeys.html
523
547
  #
524
548
  # @option params [required, Types::KeyAttributes] :key_attributes
525
549
  # The role of the key, the algorithm it supports, and the cryptographic
@@ -537,11 +561,19 @@ module Aws::PaymentCryptography
537
561
  # using a CMAC algorithm where the input data is 16 bytes of zero and
538
562
  # retaining the 3 highest order bytes of the encrypted result.
539
563
  #
564
+ # @option params [required, Boolean] :exportable
565
+ # Specifies whether the key is exportable from the service.
566
+ #
567
+ # @option params [Boolean] :enabled
568
+ # Specifies whether to enable the key. If the key is enabled, it is
569
+ # activated for use within the service. If the key is not enabled, then
570
+ # it is created but not activated. The default value is enabled.
571
+ #
540
572
  # @option params [Array<Types::Tag>] :tags
541
573
  # Assigns one or more tags to the Amazon Web Services Payment
542
574
  # Cryptography key. Use this parameter to tag a key when it is created.
543
575
  # To tag an existing Amazon Web Services Payment Cryptography key, use
544
- # the TagResource operation.
576
+ # the [TagResource][1] operation.
545
577
  #
546
578
  # Each tag consists of a tag key and a tag value. Both the tag key and
547
579
  # the tag value are required, but the tag value can be an empty (null)
@@ -557,6 +589,10 @@ module Aws::PaymentCryptography
557
589
  #
558
590
  # </note>
559
591
  #
592
+ #
593
+ #
594
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html
595
+ #
560
596
  # @return [Types::CreateKeyOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
561
597
  #
562
598
  # * {Types::CreateKeyOutput#key #key} => Types::Key
@@ -564,25 +600,25 @@ module Aws::PaymentCryptography
564
600
  # @example Request syntax with placeholder values
565
601
  #
566
602
  # resp = client.create_key({
567
- # enabled: false,
568
- # exportable: false, # required
569
603
  # key_attributes: { # required
570
- # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
604
+ # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
571
605
  # key_class: "SYMMETRIC_KEY", # required, accepts SYMMETRIC_KEY, ASYMMETRIC_KEY_PAIR, PRIVATE_KEY, PUBLIC_KEY
606
+ # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
572
607
  # key_modes_of_use: { # required
573
- # decrypt: false,
574
- # derive_key: false,
575
608
  # encrypt: false,
609
+ # decrypt: false,
610
+ # wrap: false,
611
+ # unwrap: false,
576
612
  # generate: false,
577
- # no_restrictions: false,
578
613
  # sign: false,
579
- # unwrap: false,
580
614
  # verify: false,
581
- # wrap: false,
615
+ # derive_key: false,
616
+ # no_restrictions: false,
582
617
  # },
583
- # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
584
618
  # },
585
619
  # key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
620
+ # exportable: false, # required
621
+ # enabled: false,
586
622
  # tags: [
587
623
  # {
588
624
  # key: "TagKey", # required
@@ -593,30 +629,30 @@ module Aws::PaymentCryptography
593
629
  #
594
630
  # @example Response structure
595
631
  #
596
- # resp.key.create_timestamp #=> Time
597
- # resp.key.delete_pending_timestamp #=> Time
598
- # resp.key.delete_timestamp #=> Time
599
- # resp.key.enabled #=> Boolean
600
- # resp.key.exportable #=> Boolean
601
632
  # resp.key.key_arn #=> String
602
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
633
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
603
634
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
604
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
605
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
635
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
606
636
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
637
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
638
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
639
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
607
640
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
608
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
609
641
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
610
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
611
642
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
612
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
613
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
643
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
644
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
614
645
  # resp.key.key_check_value #=> String
615
646
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
616
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
647
+ # resp.key.enabled #=> Boolean
648
+ # resp.key.exportable #=> Boolean
617
649
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
650
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
651
+ # resp.key.create_timestamp #=> Time
618
652
  # resp.key.usage_start_timestamp #=> Time
619
653
  # resp.key.usage_stop_timestamp #=> Time
654
+ # resp.key.delete_pending_timestamp #=> Time
655
+ # resp.key.delete_timestamp #=> Time
620
656
  #
621
657
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/CreateKey AWS API Documentation
622
658
  #
@@ -630,23 +666,31 @@ module Aws::PaymentCryptography
630
666
  # Deletes the alias, but doesn't affect the underlying key.
631
667
  #
632
668
  # Each key can have multiple aliases. To get the aliases of all keys,
633
- # use the ListAliases operation. To change the alias of a key, first use
634
- # DeleteAlias to delete the current alias and then use CreateAlias to
635
- # create a new alias. To associate an existing alias with a different
636
- # key, call UpdateAlias.
669
+ # use the [UpdateAlias][1] operation. To change the alias of a key,
670
+ # first use [DeleteAlias][2] to delete the current alias and then use
671
+ # [CreateAlias][3] to create a new alias. To associate an existing alias
672
+ # with a different key, call [UpdateAlias][1].
637
673
  #
638
674
  # **Cross-account use:** This operation can't be used across different
639
675
  # Amazon Web Services accounts.
640
676
  #
641
677
  # **Related operations:**
642
678
  #
643
- # * CreateAlias
679
+ # * [CreateAlias][3]
680
+ #
681
+ # * [GetAlias][4]
682
+ #
683
+ # * [ListAliases][5]
644
684
  #
645
- # * GetAlias
685
+ # * [UpdateAlias][1]
646
686
  #
647
- # * ListAliases
648
687
  #
649
- # * UpdateAlias
688
+ #
689
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html
690
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html
691
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html
692
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html
693
+ # [5]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html
650
694
  #
651
695
  # @option params [required, String] :alias_name
652
696
  # A friendly name that you can use to refer Amazon Web Services Payment
@@ -689,25 +733,31 @@ module Aws::PaymentCryptography
689
733
  # You should delete a key only when you are sure that you don't need to
690
734
  # use it anymore and no other parties are utilizing this key. If you
691
735
  # aren't sure, consider deactivating it instead by calling
692
- # StopKeyUsage.
736
+ # [StopKeyUsage][1].
693
737
  #
694
738
  # **Cross-account use:** This operation can't be used across different
695
739
  # Amazon Web Services accounts.
696
740
  #
697
741
  # **Related operations:**
698
742
  #
699
- # * RestoreKey
743
+ # * [RestoreKey][2]
700
744
  #
701
- # * StartKeyUsage
745
+ # * [StartKeyUsage][3]
746
+ #
747
+ # * [StopKeyUsage][1]
702
748
  #
703
- # * StopKeyUsage
704
749
  #
705
- # @option params [Integer] :delete_key_in_days
706
- # The waiting period for key deletion. The default value is seven days.
750
+ #
751
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StopKeyUsage.html
752
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_RestoreKey.html
753
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html
707
754
  #
708
755
  # @option params [required, String] :key_identifier
709
756
  # The `KeyARN` of the key that is scheduled for deletion.
710
757
  #
758
+ # @option params [Integer] :delete_key_in_days
759
+ # The waiting period for key deletion. The default value is seven days.
760
+ #
711
761
  # @return [Types::DeleteKeyOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
712
762
  #
713
763
  # * {Types::DeleteKeyOutput#key #key} => Types::Key
@@ -715,36 +765,36 @@ module Aws::PaymentCryptography
715
765
  # @example Request syntax with placeholder values
716
766
  #
717
767
  # resp = client.delete_key({
718
- # delete_key_in_days: 1,
719
768
  # key_identifier: "KeyArnOrKeyAliasType", # required
769
+ # delete_key_in_days: 1,
720
770
  # })
721
771
  #
722
772
  # @example Response structure
723
773
  #
724
- # resp.key.create_timestamp #=> Time
725
- # resp.key.delete_pending_timestamp #=> Time
726
- # resp.key.delete_timestamp #=> Time
727
- # resp.key.enabled #=> Boolean
728
- # resp.key.exportable #=> Boolean
729
774
  # resp.key.key_arn #=> String
730
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
775
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
731
776
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
732
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
733
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
777
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
734
778
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
779
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
780
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
781
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
735
782
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
736
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
737
783
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
738
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
739
784
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
740
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
741
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
785
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
786
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
742
787
  # resp.key.key_check_value #=> String
743
788
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
744
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
789
+ # resp.key.enabled #=> Boolean
790
+ # resp.key.exportable #=> Boolean
745
791
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
792
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
793
+ # resp.key.create_timestamp #=> Time
746
794
  # resp.key.usage_start_timestamp #=> Time
747
795
  # resp.key.usage_stop_timestamp #=> Time
796
+ # resp.key.delete_pending_timestamp #=> Time
797
+ # resp.key.delete_timestamp #=> Time
748
798
  #
749
799
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/DeleteKey AWS API Documentation
750
800
  #
@@ -791,6 +841,25 @@ module Aws::PaymentCryptography
791
841
  # within Amazon Web Services Payment Cryptography and has to be
792
842
  # re-generated each time during export.
793
843
  #
844
+ # For key exchange using TR-31 or TR-34 key blocks, you can also export
845
+ # optional blocks within the key block header which contain additional
846
+ # attribute information about the key. The `KeyVersion` within
847
+ # `KeyBlockHeaders` indicates the version of the key within the key
848
+ # block. Furthermore, `KeyExportability` within `KeyBlockHeaders` can be
849
+ # used to further restrict exportability of the key after export from
850
+ # Amazon Web Services Payment Cryptography.
851
+ #
852
+ # The `OptionalBlocks` contain the additional data related to the key.
853
+ # For information on data type that can be included within optional
854
+ # blocks, refer to [ASC X9.143-2022][1].
855
+ #
856
+ # <note markdown="1"> Data included in key block headers is signed but transmitted in clear
857
+ # text. Sensitive or confidential information should not be included in
858
+ # optional blocks. Refer to ASC X9.143-2022 standard for information on
859
+ # allowed data type.
860
+ #
861
+ # </note>
862
+ #
794
863
  # **To export initial keys (KEK) or IPEK using TR-34**
795
864
  #
796
865
  # Using this operation, you can export initial key using TR-34
@@ -803,26 +872,26 @@ module Aws::PaymentCryptography
803
872
  # the key.
804
873
  #
805
874
  # To initiate TR-34 key export, the KRD must obtain an export token by
806
- # calling GetParametersForExport. This operation also generates a key
807
- # pair for the purpose of key export, signs the key and returns back the
808
- # signing public key certificate (also known as KDH signing certificate)
809
- # and root certificate chain. The KDH uses the private key to sign the
810
- # the export payload and the signing public key certificate is provided
811
- # to KRD to verify the signature. The KRD can import the root
812
- # certificate into its Hardware Security Module (HSM), as required. The
813
- # export token and the associated KDH signing certificate expires after
814
- # 7 days.
875
+ # calling [GetParametersForExport][2]. This operation also generates a
876
+ # key pair for the purpose of key export, signs the key and returns back
877
+ # the signing public key certificate (also known as KDH signing
878
+ # certificate) and root certificate chain. The KDH uses the private key
879
+ # to sign the the export payload and the signing public key certificate
880
+ # is provided to KRD to verify the signature. The KRD can import the
881
+ # root certificate into its Hardware Security Module (HSM), as required.
882
+ # The export token and the associated KDH signing certificate expires
883
+ # after 7 days.
815
884
  #
816
885
  # Next the KRD generates a key pair for the the purpose of encrypting
817
886
  # the KDH key and provides the public key cerificate (also known as KRD
818
887
  # wrapping certificate) back to KDH. The KRD will also import the root
819
888
  # cerificate chain into Amazon Web Services Payment Cryptography by
820
- # calling ImportKey for `RootCertificatePublicKey`. The KDH, Amazon Web
821
- # Services Payment Cryptography, will use the KRD wrapping cerificate to
822
- # encrypt (wrap) the key under export and signs it with signing private
823
- # key to generate a TR-34 WrappedKeyBlock. For more information on TR-34
824
- # key export, see section [Exporting symmetric keys][1] in the *Amazon
825
- # Web Services Payment Cryptography User Guide*.
889
+ # calling [ImportKey][3] for `RootCertificatePublicKey`. The KDH, Amazon
890
+ # Web Services Payment Cryptography, will use the KRD wrapping
891
+ # cerificate to encrypt (wrap) the key under export and signs it with
892
+ # signing private key to generate a TR-34 WrappedKeyBlock. For more
893
+ # information on TR-34 key export, see section [Exporting symmetric
894
+ # keys][4] in the *Amazon Web Services Payment Cryptography User Guide*.
826
895
  #
827
896
  # Set the following parameters:
828
897
  #
@@ -837,7 +906,8 @@ module Aws::PaymentCryptography
837
906
  # * `CertificateAuthorityPublicKeyIdentifier`: The `KeyARN` of the
838
907
  # certificate chain that signed the KRD wrapping key certificate.
839
908
  #
840
- # * `ExportToken`: Obtained from KDH by calling GetParametersForImport.
909
+ # * `ExportToken`: Obtained from KDH by calling
910
+ # [GetParametersForImport][5].
841
911
  #
842
912
  # * `WrappingKeyCertificate`: The public key certificate in PEM format
843
913
  # (base64 encoded) of the KRD wrapping key Amazon Web Services Payment
@@ -856,7 +926,7 @@ module Aws::PaymentCryptography
856
926
  # asymmetric key pair on the receiving HSM and obtain the public key
857
927
  # certificate in PEM format (base64 encoded) for the purpose of wrapping
858
928
  # and the root certifiate chain. Import the root certificate into Amazon
859
- # Web Services Payment Cryptography by calling ImportKey for
929
+ # Web Services Payment Cryptography by calling [ImportKey][3] for
860
930
  # `RootCertificatePublicKey`.
861
931
  #
862
932
  # Next call `ExportKey` and set the following parameters:
@@ -880,7 +950,7 @@ module Aws::PaymentCryptography
880
950
  # Using this operation, you can export working keys or IPEK using TR-31
881
951
  # symmetric key exchange. In TR-31, you must use an initial key such as
882
952
  # KEK to encrypt or wrap the key under export. To establish a KEK, you
883
- # can use CreateKey or ImportKey.
953
+ # can use [CreateKey][6] or [ImportKey][3].
884
954
  #
885
955
  # Set the following parameters:
886
956
  #
@@ -901,24 +971,29 @@ module Aws::PaymentCryptography
901
971
  #
902
972
  # **Related operations:**
903
973
  #
904
- # * GetParametersForExport
974
+ # * [GetParametersForExport][2]
905
975
  #
906
- # * ImportKey
976
+ # * [ImportKey][3]
907
977
  #
908
978
  #
909
979
  #
910
- # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-export.html
980
+ # [1]: https://webstore.ansi.org/standards/ascx9/ansix91432022
981
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html
982
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html
983
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-export.html
984
+ # [5]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html
985
+ # [6]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html
911
986
  #
912
- # @option params [Types::ExportAttributes] :export_attributes
913
- # The attributes for IPEK generation during export.
987
+ # @option params [required, Types::ExportKeyMaterial] :key_material
988
+ # The key block format type, for example, TR-34 or TR-31, to use during
989
+ # key material export.
914
990
  #
915
991
  # @option params [required, String] :export_key_identifier
916
992
  # The `KeyARN` of the key under export from Amazon Web Services Payment
917
993
  # Cryptography.
918
994
  #
919
- # @option params [required, Types::ExportKeyMaterial] :key_material
920
- # The key block format type, for example, TR-34 or TR-31, to use during
921
- # key material export.
995
+ # @option params [Types::ExportAttributes] :export_attributes
996
+ # The attributes for IPEK generation during export.
922
997
  #
923
998
  # @return [Types::ExportKeyOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
924
999
  #
@@ -927,39 +1002,75 @@ module Aws::PaymentCryptography
927
1002
  # @example Request syntax with placeholder values
928
1003
  #
929
1004
  # resp = client.export_key({
930
- # export_attributes: {
931
- # export_dukpt_initial_key: {
932
- # key_serial_number: "HexLength20Or24", # required
933
- # },
934
- # key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
935
- # },
936
- # export_key_identifier: "KeyArnOrKeyAliasType", # required
937
1005
  # key_material: { # required
938
- # key_cryptogram: {
939
- # certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
940
- # wrapping_key_certificate: "CertificateType", # required
941
- # wrapping_spec: "RSA_OAEP_SHA_256", # accepts RSA_OAEP_SHA_256, RSA_OAEP_SHA_512
942
- # },
943
1006
  # tr_31_key_block: {
944
1007
  # wrapping_key_identifier: "KeyArnOrKeyAliasType", # required
1008
+ # key_block_headers: {
1009
+ # key_modes_of_use: {
1010
+ # encrypt: false,
1011
+ # decrypt: false,
1012
+ # wrap: false,
1013
+ # unwrap: false,
1014
+ # generate: false,
1015
+ # sign: false,
1016
+ # verify: false,
1017
+ # derive_key: false,
1018
+ # no_restrictions: false,
1019
+ # },
1020
+ # key_exportability: "EXPORTABLE", # accepts EXPORTABLE, NON_EXPORTABLE, SENSITIVE
1021
+ # key_version: "KeyVersion",
1022
+ # optional_blocks: {
1023
+ # "OptionalBlockId" => "OptionalBlockValue",
1024
+ # },
1025
+ # },
945
1026
  # },
946
1027
  # tr_34_key_block: {
947
1028
  # certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
1029
+ # wrapping_key_certificate: "CertificateType", # required
948
1030
  # export_token: "ExportTokenId", # required
949
1031
  # key_block_format: "X9_TR34_2012", # required, accepts X9_TR34_2012
950
1032
  # random_nonce: "HexLength16",
1033
+ # key_block_headers: {
1034
+ # key_modes_of_use: {
1035
+ # encrypt: false,
1036
+ # decrypt: false,
1037
+ # wrap: false,
1038
+ # unwrap: false,
1039
+ # generate: false,
1040
+ # sign: false,
1041
+ # verify: false,
1042
+ # derive_key: false,
1043
+ # no_restrictions: false,
1044
+ # },
1045
+ # key_exportability: "EXPORTABLE", # accepts EXPORTABLE, NON_EXPORTABLE, SENSITIVE
1046
+ # key_version: "KeyVersion",
1047
+ # optional_blocks: {
1048
+ # "OptionalBlockId" => "OptionalBlockValue",
1049
+ # },
1050
+ # },
1051
+ # },
1052
+ # key_cryptogram: {
1053
+ # certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
951
1054
  # wrapping_key_certificate: "CertificateType", # required
1055
+ # wrapping_spec: "RSA_OAEP_SHA_256", # accepts RSA_OAEP_SHA_256, RSA_OAEP_SHA_512
1056
+ # },
1057
+ # },
1058
+ # export_key_identifier: "KeyArnOrKeyAliasType", # required
1059
+ # export_attributes: {
1060
+ # export_dukpt_initial_key: {
1061
+ # key_serial_number: "HexLength20Or24", # required
952
1062
  # },
1063
+ # key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
953
1064
  # },
954
1065
  # })
955
1066
  #
956
1067
  # @example Response structure
957
1068
  #
1069
+ # resp.wrapped_key.wrapping_key_arn #=> String
1070
+ # resp.wrapped_key.wrapped_key_material_format #=> String, one of "KEY_CRYPTOGRAM", "TR31_KEY_BLOCK", "TR34_KEY_BLOCK"
1071
+ # resp.wrapped_key.key_material #=> String
958
1072
  # resp.wrapped_key.key_check_value #=> String
959
1073
  # resp.wrapped_key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
960
- # resp.wrapped_key.key_material #=> String
961
- # resp.wrapped_key.wrapped_key_material_format #=> String, one of "KEY_CRYPTOGRAM", "TR31_KEY_BLOCK", "TR34_KEY_BLOCK"
962
- # resp.wrapped_key.wrapping_key_arn #=> String
963
1074
  #
964
1075
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/ExportKey AWS API Documentation
965
1076
  #
@@ -978,13 +1089,20 @@ module Aws::PaymentCryptography
978
1089
  #
979
1090
  # **Related operations:**
980
1091
  #
981
- # * CreateAlias
1092
+ # * [CreateAlias][1]
1093
+ #
1094
+ # * [DeleteAlias][2]
1095
+ #
1096
+ # * [ListAliases][3]
982
1097
  #
983
- # * DeleteAlias
1098
+ # * [UpdateAlias][4]
984
1099
  #
985
- # * ListAliases
986
1100
  #
987
- # * UpdateAlias
1101
+ #
1102
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html
1103
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html
1104
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html
1105
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html
988
1106
  #
989
1107
  # @option params [required, String] :alias_name
990
1108
  # The alias of the Amazon Web Services Payment Cryptography key.
@@ -1022,11 +1140,17 @@ module Aws::PaymentCryptography
1022
1140
  #
1023
1141
  # **Related operations:**
1024
1142
  #
1025
- # * CreateKey
1143
+ # * [CreateKey][1]
1144
+ #
1145
+ # * [DeleteKey][2]
1146
+ #
1147
+ # * [ListKeys][3]
1148
+ #
1026
1149
  #
1027
- # * DeleteKey
1028
1150
  #
1029
- # * ListKeys
1151
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html
1152
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html
1153
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListKeys.html
1030
1154
  #
1031
1155
  # @option params [required, String] :key_identifier
1032
1156
  # The `KeyARN` of the Amazon Web Services Payment Cryptography key.
@@ -1043,30 +1167,30 @@ module Aws::PaymentCryptography
1043
1167
  #
1044
1168
  # @example Response structure
1045
1169
  #
1046
- # resp.key.create_timestamp #=> Time
1047
- # resp.key.delete_pending_timestamp #=> Time
1048
- # resp.key.delete_timestamp #=> Time
1049
- # resp.key.enabled #=> Boolean
1050
- # resp.key.exportable #=> Boolean
1051
1170
  # resp.key.key_arn #=> String
1052
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1171
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1053
1172
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
1054
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1055
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
1173
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1056
1174
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
1175
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1176
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1177
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1057
1178
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
1058
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1059
1179
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
1060
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1061
1180
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
1062
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1063
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1181
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
1182
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1064
1183
  # resp.key.key_check_value #=> String
1065
1184
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
1066
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
1185
+ # resp.key.enabled #=> Boolean
1186
+ # resp.key.exportable #=> Boolean
1067
1187
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
1188
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
1189
+ # resp.key.create_timestamp #=> Time
1068
1190
  # resp.key.usage_start_timestamp #=> Time
1069
1191
  # resp.key.usage_stop_timestamp #=> Time
1192
+ # resp.key.delete_pending_timestamp #=> Time
1193
+ # resp.key.delete_timestamp #=> Time
1070
1194
  #
1071
1195
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/GetKey AWS API Documentation
1072
1196
  #
@@ -1082,18 +1206,23 @@ module Aws::PaymentCryptography
1082
1206
  #
1083
1207
  # The signing key certificate signs the wrapped key under export within
1084
1208
  # the TR-34 key payload. The export token and signing key certificate
1085
- # must be in place and operational before calling ExportKey. The export
1086
- # token expires in 7 days. You can use the same export token to export
1087
- # multiple keys from your service account.
1209
+ # must be in place and operational before calling [ExportKey][1]. The
1210
+ # export token expires in 7 days. You can use the same export token to
1211
+ # export multiple keys from your service account.
1088
1212
  #
1089
1213
  # **Cross-account use:** This operation can't be used across different
1090
1214
  # Amazon Web Services accounts.
1091
1215
  #
1092
1216
  # **Related operations:**
1093
1217
  #
1094
- # * ExportKey
1218
+ # * [ExportKey][1]
1219
+ #
1220
+ # * [GetParametersForImport][2]
1221
+ #
1095
1222
  #
1096
- # * GetParametersForImport
1223
+ #
1224
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html
1225
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html
1097
1226
  #
1098
1227
  # @option params [required, String] :key_material_type
1099
1228
  # The key block format type (for example, TR-34 or TR-31) to use during
@@ -1108,11 +1237,11 @@ module Aws::PaymentCryptography
1108
1237
  #
1109
1238
  # @return [Types::GetParametersForExportOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1110
1239
  #
1111
- # * {Types::GetParametersForExportOutput#export_token #export_token} => String
1112
- # * {Types::GetParametersForExportOutput#parameters_valid_until_timestamp #parameters_valid_until_timestamp} => Time
1113
- # * {Types::GetParametersForExportOutput#signing_key_algorithm #signing_key_algorithm} => String
1114
1240
  # * {Types::GetParametersForExportOutput#signing_key_certificate #signing_key_certificate} => String
1115
1241
  # * {Types::GetParametersForExportOutput#signing_key_certificate_chain #signing_key_certificate_chain} => String
1242
+ # * {Types::GetParametersForExportOutput#signing_key_algorithm #signing_key_algorithm} => String
1243
+ # * {Types::GetParametersForExportOutput#export_token #export_token} => String
1244
+ # * {Types::GetParametersForExportOutput#parameters_valid_until_timestamp #parameters_valid_until_timestamp} => Time
1116
1245
  #
1117
1246
  # @example Request syntax with placeholder values
1118
1247
  #
@@ -1123,11 +1252,11 @@ module Aws::PaymentCryptography
1123
1252
  #
1124
1253
  # @example Response structure
1125
1254
  #
1126
- # resp.export_token #=> String
1127
- # resp.parameters_valid_until_timestamp #=> Time
1128
- # resp.signing_key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1129
1255
  # resp.signing_key_certificate #=> String
1130
1256
  # resp.signing_key_certificate_chain #=> String
1257
+ # resp.signing_key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1258
+ # resp.export_token #=> String
1259
+ # resp.parameters_valid_until_timestamp #=> Time
1131
1260
  #
1132
1261
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/GetParametersForExport AWS API Documentation
1133
1262
  #
@@ -1145,18 +1274,23 @@ module Aws::PaymentCryptography
1145
1274
  #
1146
1275
  # The wrapping key certificate wraps the key under import. The import
1147
1276
  # token and wrapping key certificate must be in place and operational
1148
- # before calling ImportKey. The import token expires in 7 days. You can
1149
- # use the same import token to import multiple keys into your service
1150
- # account.
1277
+ # before calling [ImportKey][1]. The import token expires in 7 days. You
1278
+ # can use the same import token to import multiple keys into your
1279
+ # service account.
1151
1280
  #
1152
1281
  # **Cross-account use:** This operation can't be used across different
1153
1282
  # Amazon Web Services accounts.
1154
1283
  #
1155
1284
  # **Related operations:**
1156
1285
  #
1157
- # * GetParametersForExport
1286
+ # * [GetParametersForExport][2]
1287
+ #
1288
+ # * [ImportKey][1]
1289
+ #
1290
+ #
1158
1291
  #
1159
- # * ImportKey
1292
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html
1293
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html
1160
1294
  #
1161
1295
  # @option params [required, String] :key_material_type
1162
1296
  # The method to use for key material import. Import token is only
@@ -1177,11 +1311,11 @@ module Aws::PaymentCryptography
1177
1311
  #
1178
1312
  # @return [Types::GetParametersForImportOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1179
1313
  #
1180
- # * {Types::GetParametersForImportOutput#import_token #import_token} => String
1181
- # * {Types::GetParametersForImportOutput#parameters_valid_until_timestamp #parameters_valid_until_timestamp} => Time
1182
- # * {Types::GetParametersForImportOutput#wrapping_key_algorithm #wrapping_key_algorithm} => String
1183
1314
  # * {Types::GetParametersForImportOutput#wrapping_key_certificate #wrapping_key_certificate} => String
1184
1315
  # * {Types::GetParametersForImportOutput#wrapping_key_certificate_chain #wrapping_key_certificate_chain} => String
1316
+ # * {Types::GetParametersForImportOutput#wrapping_key_algorithm #wrapping_key_algorithm} => String
1317
+ # * {Types::GetParametersForImportOutput#import_token #import_token} => String
1318
+ # * {Types::GetParametersForImportOutput#parameters_valid_until_timestamp #parameters_valid_until_timestamp} => Time
1185
1319
  #
1186
1320
  # @example Request syntax with placeholder values
1187
1321
  #
@@ -1192,11 +1326,11 @@ module Aws::PaymentCryptography
1192
1326
  #
1193
1327
  # @example Response structure
1194
1328
  #
1195
- # resp.import_token #=> String
1196
- # resp.parameters_valid_until_timestamp #=> Time
1197
- # resp.wrapping_key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1198
1329
  # resp.wrapping_key_certificate #=> String
1199
1330
  # resp.wrapping_key_certificate_chain #=> String
1331
+ # resp.wrapping_key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1332
+ # resp.import_token #=> String
1333
+ # resp.parameters_valid_until_timestamp #=> Time
1200
1334
  #
1201
1335
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/GetParametersForImport AWS API Documentation
1202
1336
  #
@@ -1333,13 +1467,13 @@ module Aws::PaymentCryptography
1333
1467
  # Amazon Web Services Payment Cryptography who receives the key.
1334
1468
  #
1335
1469
  # To initiate TR-34 key import, the KDH must obtain an import token by
1336
- # calling GetParametersForImport. This operation generates an encryption
1337
- # keypair for the purpose of key import, signs the key and returns back
1338
- # the wrapping key certificate (also known as KRD wrapping certificate)
1339
- # and the root certificate chain. The KDH must trust and install the KRD
1340
- # wrapping certificate on its HSM and use it to encrypt (wrap) the KDH
1341
- # key during TR-34 WrappedKeyBlock generation. The import token and
1342
- # associated KRD wrapping certificate expires after 7 days.
1470
+ # calling [GetParametersForImport][1]. This operation generates an
1471
+ # encryption keypair for the purpose of key import, signs the key and
1472
+ # returns back the wrapping key certificate (also known as KRD wrapping
1473
+ # certificate) and the root certificate chain. The KDH must trust and
1474
+ # install the KRD wrapping certificate on its HSM and use it to encrypt
1475
+ # (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import
1476
+ # token and associated KRD wrapping certificate expires after 7 days.
1343
1477
  #
1344
1478
  # Next the KDH generates a key pair for the purpose of signing the
1345
1479
  # encrypted KDH key and provides the public certificate of the signing
@@ -1347,7 +1481,7 @@ module Aws::PaymentCryptography
1347
1481
  # need to import the root certificate chain of the KDH signing
1348
1482
  # certificate by calling `ImportKey` for `RootCertificatePublicKey`. For
1349
1483
  # more information on TR-34 key import, see section [Importing symmetric
1350
- # keys][1] in the *Amazon Web Services Payment Cryptography User Guide*.
1484
+ # keys][2] in the *Amazon Web Services Payment Cryptography User Guide*.
1351
1485
  #
1352
1486
  # Set the following parameters:
1353
1487
  #
@@ -1356,7 +1490,8 @@ module Aws::PaymentCryptography
1356
1490
  # * `CertificateAuthorityPublicKeyIdentifier`: The `KeyARN` of the
1357
1491
  # certificate chain that signed the KDH signing key certificate.
1358
1492
  #
1359
- # * `ImportToken`: Obtained from KRD by calling GetParametersForImport.
1493
+ # * `ImportToken`: Obtained from KRD by calling
1494
+ # [GetParametersForImport][1].
1360
1495
  #
1361
1496
  # * `WrappedKeyBlock`: The TR-34 wrapped key material from KDH. It
1362
1497
  # contains the KDH key under import, wrapped with KRD wrapping
@@ -1374,12 +1509,12 @@ module Aws::PaymentCryptography
1374
1509
  #
1375
1510
  # Using this operation, you can import initial key using asymmetric RSA
1376
1511
  # wrap and unwrap key exchange method. To initiate import, call
1377
- # GetParametersForImport with `KeyMaterial` set to `KEY_CRYPTOGRAM` to
1378
- # generate an import token. This operation also generates an encryption
1379
- # keypair for the purpose of key import, signs the key and returns back
1380
- # the wrapping key certificate in PEM format (base64 encoded) and its
1381
- # root certificate chain. The import token and associated KRD wrapping
1382
- # certificate expires after 7 days.
1512
+ # [GetParametersForImport][1] with `KeyMaterial` set to `KEY_CRYPTOGRAM`
1513
+ # to generate an import token. This operation also generates an
1514
+ # encryption keypair for the purpose of key import, signs the key and
1515
+ # returns back the wrapping key certificate in PEM format (base64
1516
+ # encoded) and its root certificate chain. The import token and
1517
+ # associated KRD wrapping certificate expires after 7 days.
1383
1518
  #
1384
1519
  # You must trust and install the wrapping certificate and its
1385
1520
  # certificate chain on the sending HSM and use it to wrap the key under
@@ -1392,8 +1527,8 @@ module Aws::PaymentCryptography
1392
1527
  # Amazon Web Services Payment Cryptography uses TR-31 symmetric key
1393
1528
  # exchange norm to import working keys. A KEK must be established within
1394
1529
  # Amazon Web Services Payment Cryptography by using TR-34 key import or
1395
- # by using CreateKey. To initiate a TR-31 key import, set the following
1396
- # parameters:
1530
+ # by using [CreateKey][3]. To initiate a TR-31 key import, set the
1531
+ # following parameters:
1397
1532
  #
1398
1533
  # * `KeyMaterial`: Use `Tr31KeyBlock` parameters.
1399
1534
  #
@@ -1411,16 +1546,20 @@ module Aws::PaymentCryptography
1411
1546
  #
1412
1547
  # **Related operations:**
1413
1548
  #
1414
- # * ExportKey
1549
+ # * [ExportKey][4]
1415
1550
  #
1416
- # * GetParametersForImport
1551
+ # * [GetParametersForImport][1]
1417
1552
  #
1418
1553
  #
1419
1554
  #
1420
- # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-import.html
1555
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html
1556
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-import.html
1557
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html
1558
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html
1421
1559
  #
1422
- # @option params [Boolean] :enabled
1423
- # Specifies whether import key is enabled.
1560
+ # @option params [required, Types::ImportKeyMaterial] :key_material
1561
+ # The key or public key certificate type to use during key material
1562
+ # import, for example TR-34 or RootCertificatePublicKey.
1424
1563
  #
1425
1564
  # @option params [String] :key_check_value_algorithm
1426
1565
  # The algorithm that Amazon Web Services Payment Cryptography uses to
@@ -1433,15 +1572,14 @@ module Aws::PaymentCryptography
1433
1572
  # using a CMAC algorithm where the input data is 16 bytes of zero and
1434
1573
  # retaining the 3 highest order bytes of the encrypted result.
1435
1574
  #
1436
- # @option params [required, Types::ImportKeyMaterial] :key_material
1437
- # The key or public key certificate type to use during key material
1438
- # import, for example TR-34 or RootCertificatePublicKey.
1439
- #
1575
+ # @option params [Boolean] :enabled
1576
+ # Specifies whether import key is enabled.
1577
+ #
1440
1578
  # @option params [Array<Types::Tag>] :tags
1441
1579
  # Assigns one or more tags to the Amazon Web Services Payment
1442
1580
  # Cryptography key. Use this parameter to tag a key when it is imported.
1443
1581
  # To tag an existing Amazon Web Services Payment Cryptography key, use
1444
- # the TagResource operation.
1582
+ # the [TagResource][1] operation.
1445
1583
  #
1446
1584
  # Each tag consists of a tag key and a tag value. Both the tag key and
1447
1585
  # the tag value are required, but the tag value can be an empty (null)
@@ -1460,6 +1598,10 @@ module Aws::PaymentCryptography
1460
1598
  #
1461
1599
  # </note>
1462
1600
  #
1601
+ #
1602
+ #
1603
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html
1604
+ #
1463
1605
  # @return [Types::ImportKeyOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1464
1606
  #
1465
1607
  # * {Types::ImportKeyOutput#key #key} => Types::Key
@@ -1467,83 +1609,83 @@ module Aws::PaymentCryptography
1467
1609
  # @example Request syntax with placeholder values
1468
1610
  #
1469
1611
  # resp = client.import_key({
1470
- # enabled: false,
1471
- # key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
1472
1612
  # key_material: { # required
1473
- # key_cryptogram: {
1474
- # exportable: false, # required
1475
- # import_token: "ImportTokenId", # required
1613
+ # root_certificate_public_key: {
1476
1614
  # key_attributes: { # required
1477
- # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
1615
+ # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
1478
1616
  # key_class: "SYMMETRIC_KEY", # required, accepts SYMMETRIC_KEY, ASYMMETRIC_KEY_PAIR, PRIVATE_KEY, PUBLIC_KEY
1617
+ # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
1479
1618
  # key_modes_of_use: { # required
1480
- # decrypt: false,
1481
- # derive_key: false,
1482
1619
  # encrypt: false,
1620
+ # decrypt: false,
1621
+ # wrap: false,
1622
+ # unwrap: false,
1483
1623
  # generate: false,
1484
- # no_restrictions: false,
1485
1624
  # sign: false,
1486
- # unwrap: false,
1487
1625
  # verify: false,
1488
- # wrap: false,
1626
+ # derive_key: false,
1627
+ # no_restrictions: false,
1489
1628
  # },
1490
- # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
1491
1629
  # },
1492
- # wrapped_key_cryptogram: "WrappedKeyCryptogram", # required
1493
- # wrapping_spec: "RSA_OAEP_SHA_256", # accepts RSA_OAEP_SHA_256, RSA_OAEP_SHA_512
1630
+ # public_key_certificate: "CertificateType", # required
1494
1631
  # },
1495
- # root_certificate_public_key: {
1632
+ # trusted_certificate_public_key: {
1496
1633
  # key_attributes: { # required
1497
- # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
1634
+ # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
1498
1635
  # key_class: "SYMMETRIC_KEY", # required, accepts SYMMETRIC_KEY, ASYMMETRIC_KEY_PAIR, PRIVATE_KEY, PUBLIC_KEY
1636
+ # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
1499
1637
  # key_modes_of_use: { # required
1500
- # decrypt: false,
1501
- # derive_key: false,
1502
1638
  # encrypt: false,
1639
+ # decrypt: false,
1640
+ # wrap: false,
1641
+ # unwrap: false,
1503
1642
  # generate: false,
1504
- # no_restrictions: false,
1505
1643
  # sign: false,
1506
- # unwrap: false,
1507
1644
  # verify: false,
1508
- # wrap: false,
1645
+ # derive_key: false,
1646
+ # no_restrictions: false,
1509
1647
  # },
1510
- # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
1511
1648
  # },
1512
1649
  # public_key_certificate: "CertificateType", # required
1650
+ # certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
1513
1651
  # },
1514
1652
  # tr_31_key_block: {
1515
- # wrapped_key_block: "Tr31WrappedKeyBlock", # required
1516
1653
  # wrapping_key_identifier: "KeyArnOrKeyAliasType", # required
1654
+ # wrapped_key_block: "Tr31WrappedKeyBlock", # required
1517
1655
  # },
1518
1656
  # tr_34_key_block: {
1519
1657
  # certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
1658
+ # signing_key_certificate: "CertificateType", # required
1520
1659
  # import_token: "ImportTokenId", # required
1660
+ # wrapped_key_block: "Tr34WrappedKeyBlock", # required
1521
1661
  # key_block_format: "X9_TR34_2012", # required, accepts X9_TR34_2012
1522
1662
  # random_nonce: "HexLength16",
1523
- # signing_key_certificate: "CertificateType", # required
1524
- # wrapped_key_block: "Tr34WrappedKeyBlock", # required
1525
1663
  # },
1526
- # trusted_certificate_public_key: {
1527
- # certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
1664
+ # key_cryptogram: {
1528
1665
  # key_attributes: { # required
1529
- # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
1666
+ # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
1530
1667
  # key_class: "SYMMETRIC_KEY", # required, accepts SYMMETRIC_KEY, ASYMMETRIC_KEY_PAIR, PRIVATE_KEY, PUBLIC_KEY
1668
+ # key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256, RSA_2048, RSA_3072, RSA_4096
1531
1669
  # key_modes_of_use: { # required
1532
- # decrypt: false,
1533
- # derive_key: false,
1534
1670
  # encrypt: false,
1671
+ # decrypt: false,
1672
+ # wrap: false,
1673
+ # unwrap: false,
1535
1674
  # generate: false,
1536
- # no_restrictions: false,
1537
1675
  # sign: false,
1538
- # unwrap: false,
1539
1676
  # verify: false,
1540
- # wrap: false,
1677
+ # derive_key: false,
1678
+ # no_restrictions: false,
1541
1679
  # },
1542
- # key_usage: "TR31_B0_BASE_DERIVATION_KEY", # required, accepts TR31_B0_BASE_DERIVATION_KEY, TR31_C0_CARD_VERIFICATION_KEY, TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY, TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION, TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS, TR31_E1_EMV_MKEY_CONFIDENTIALITY, TR31_E2_EMV_MKEY_INTEGRITY, TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS, TR31_E5_EMV_MKEY_CARD_PERSONALIZATION, TR31_E6_EMV_MKEY_OTHER, TR31_K0_KEY_ENCRYPTION_KEY, TR31_K1_KEY_BLOCK_PROTECTION_KEY, TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT, TR31_M3_ISO_9797_3_MAC_KEY, TR31_M1_ISO_9797_1_MAC_KEY, TR31_M6_ISO_9797_5_CMAC_KEY, TR31_M7_HMAC_KEY, TR31_P0_PIN_ENCRYPTION_KEY, TR31_P1_PIN_GENERATION_KEY, TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE, TR31_V1_IBM3624_PIN_VERIFICATION_KEY, TR31_V2_VISA_PIN_VERIFICATION_KEY, TR31_K2_TR34_ASYMMETRIC_KEY
1543
1680
  # },
1544
- # public_key_certificate: "CertificateType", # required
1681
+ # exportable: false, # required
1682
+ # wrapped_key_cryptogram: "WrappedKeyCryptogram", # required
1683
+ # import_token: "ImportTokenId", # required
1684
+ # wrapping_spec: "RSA_OAEP_SHA_256", # accepts RSA_OAEP_SHA_256, RSA_OAEP_SHA_512
1545
1685
  # },
1546
1686
  # },
1687
+ # key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
1688
+ # enabled: false,
1547
1689
  # tags: [
1548
1690
  # {
1549
1691
  # key: "TagKey", # required
@@ -1554,30 +1696,30 @@ module Aws::PaymentCryptography
1554
1696
  #
1555
1697
  # @example Response structure
1556
1698
  #
1557
- # resp.key.create_timestamp #=> Time
1558
- # resp.key.delete_pending_timestamp #=> Time
1559
- # resp.key.delete_timestamp #=> Time
1560
- # resp.key.enabled #=> Boolean
1561
- # resp.key.exportable #=> Boolean
1562
1699
  # resp.key.key_arn #=> String
1563
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1700
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1564
1701
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
1565
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1566
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
1702
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1567
1703
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
1704
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1705
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1706
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1568
1707
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
1569
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1570
1708
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
1571
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1572
1709
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
1573
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1574
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1710
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
1711
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1575
1712
  # resp.key.key_check_value #=> String
1576
1713
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
1577
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
1714
+ # resp.key.enabled #=> Boolean
1715
+ # resp.key.exportable #=> Boolean
1578
1716
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
1717
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
1718
+ # resp.key.create_timestamp #=> Time
1579
1719
  # resp.key.usage_start_timestamp #=> Time
1580
1720
  # resp.key.usage_stop_timestamp #=> Time
1721
+ # resp.key.delete_pending_timestamp #=> Time
1722
+ # resp.key.delete_timestamp #=> Time
1581
1723
  #
1582
1724
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/ImportKey AWS API Documentation
1583
1725
  #
@@ -1605,17 +1747,26 @@ module Aws::PaymentCryptography
1605
1747
  #
1606
1748
  # **Related operations:**
1607
1749
  #
1608
- # * CreateAlias
1750
+ # * [CreateAlias][2]
1609
1751
  #
1610
- # * DeleteAlias
1752
+ # * [DeleteAlias][3]
1611
1753
  #
1612
- # * GetAlias
1754
+ # * [GetAlias][4]
1613
1755
  #
1614
- # * UpdateAlias
1756
+ # * [UpdateAlias][5]
1615
1757
  #
1616
1758
  #
1617
1759
  #
1618
1760
  # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-managealias.html
1761
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html
1762
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html
1763
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html
1764
+ # [5]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html
1765
+ #
1766
+ # @option params [String] :next_token
1767
+ # Use this parameter in a subsequent request after you receive a
1768
+ # response with truncated results. Set it to the value of `NextToken`
1769
+ # from the truncated response you just received.
1619
1770
  #
1620
1771
  # @option params [Integer] :max_results
1621
1772
  # Use this parameter to specify the maximum number of items to return.
@@ -1626,11 +1777,6 @@ module Aws::PaymentCryptography
1626
1777
  # This value is optional. If you include a value, it must be between 1
1627
1778
  # and 100, inclusive. If you do not include a value, it defaults to 50.
1628
1779
  #
1629
- # @option params [String] :next_token
1630
- # Use this parameter in a subsequent request after you receive a
1631
- # response with truncated results. Set it to the value of `NextToken`
1632
- # from the truncated response you just received.
1633
- #
1634
1780
  # @return [Types::ListAliasesOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1635
1781
  #
1636
1782
  # * {Types::ListAliasesOutput#aliases #aliases} => Array&lt;Types::Alias&gt;
@@ -1641,8 +1787,8 @@ module Aws::PaymentCryptography
1641
1787
  # @example Request syntax with placeholder values
1642
1788
  #
1643
1789
  # resp = client.list_aliases({
1644
- # max_results: 1,
1645
1790
  # next_token: "NextToken",
1791
+ # max_results: 1,
1646
1792
  # })
1647
1793
  #
1648
1794
  # @example Response structure
@@ -1676,15 +1822,26 @@ module Aws::PaymentCryptography
1676
1822
  #
1677
1823
  # **Related operations:**
1678
1824
  #
1679
- # * CreateKey
1825
+ # * [CreateKey][1]
1680
1826
  #
1681
- # * DeleteKey
1827
+ # * [DeleteKey][2]
1682
1828
  #
1683
- # * GetKey
1829
+ # * [GetKey][3]
1830
+ #
1831
+ #
1832
+ #
1833
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html
1834
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html
1835
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetKey.html
1684
1836
  #
1685
1837
  # @option params [String] :key_state
1686
1838
  # The key state of the keys you want to list.
1687
1839
  #
1840
+ # @option params [String] :next_token
1841
+ # Use this parameter in a subsequent request after you receive a
1842
+ # response with truncated results. Set it to the value of `NextToken`
1843
+ # from the truncated response you just received.
1844
+ #
1688
1845
  # @option params [Integer] :max_results
1689
1846
  # Use this parameter to specify the maximum number of items to return.
1690
1847
  # When this value is present, Amazon Web Services Payment Cryptography
@@ -1694,11 +1851,6 @@ module Aws::PaymentCryptography
1694
1851
  # This value is optional. If you include a value, it must be between 1
1695
1852
  # and 100, inclusive. If you do not include a value, it defaults to 50.
1696
1853
  #
1697
- # @option params [String] :next_token
1698
- # Use this parameter in a subsequent request after you receive a
1699
- # response with truncated results. Set it to the value of `NextToken`
1700
- # from the truncated response you just received.
1701
- #
1702
1854
  # @return [Types::ListKeysOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1703
1855
  #
1704
1856
  # * {Types::ListKeysOutput#keys #keys} => Array&lt;Types::KeySummary&gt;
@@ -1710,30 +1862,30 @@ module Aws::PaymentCryptography
1710
1862
  #
1711
1863
  # resp = client.list_keys({
1712
1864
  # key_state: "CREATE_IN_PROGRESS", # accepts CREATE_IN_PROGRESS, CREATE_COMPLETE, DELETE_PENDING, DELETE_COMPLETE
1713
- # max_results: 1,
1714
1865
  # next_token: "NextToken",
1866
+ # max_results: 1,
1715
1867
  # })
1716
1868
  #
1717
1869
  # @example Response structure
1718
1870
  #
1719
1871
  # resp.keys #=> Array
1720
- # resp.keys[0].enabled #=> Boolean
1721
- # resp.keys[0].exportable #=> Boolean
1722
1872
  # resp.keys[0].key_arn #=> String
1723
- # resp.keys[0].key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1873
+ # resp.keys[0].key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
1874
+ # resp.keys[0].key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1724
1875
  # resp.keys[0].key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
1725
- # resp.keys[0].key_attributes.key_modes_of_use.decrypt #=> Boolean
1726
- # resp.keys[0].key_attributes.key_modes_of_use.derive_key #=> Boolean
1876
+ # resp.keys[0].key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1727
1877
  # resp.keys[0].key_attributes.key_modes_of_use.encrypt #=> Boolean
1878
+ # resp.keys[0].key_attributes.key_modes_of_use.decrypt #=> Boolean
1879
+ # resp.keys[0].key_attributes.key_modes_of_use.wrap #=> Boolean
1880
+ # resp.keys[0].key_attributes.key_modes_of_use.unwrap #=> Boolean
1728
1881
  # resp.keys[0].key_attributes.key_modes_of_use.generate #=> Boolean
1729
- # resp.keys[0].key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1730
1882
  # resp.keys[0].key_attributes.key_modes_of_use.sign #=> Boolean
1731
- # resp.keys[0].key_attributes.key_modes_of_use.unwrap #=> Boolean
1732
1883
  # resp.keys[0].key_attributes.key_modes_of_use.verify #=> Boolean
1733
- # resp.keys[0].key_attributes.key_modes_of_use.wrap #=> Boolean
1734
- # resp.keys[0].key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1884
+ # resp.keys[0].key_attributes.key_modes_of_use.derive_key #=> Boolean
1885
+ # resp.keys[0].key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1735
1886
  # resp.keys[0].key_check_value #=> String
1736
- # resp.keys[0].key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
1887
+ # resp.keys[0].exportable #=> Boolean
1888
+ # resp.keys[0].enabled #=> Boolean
1737
1889
  # resp.next_token #=> String
1738
1890
  #
1739
1891
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/ListKeys AWS API Documentation
@@ -1759,9 +1911,22 @@ module Aws::PaymentCryptography
1759
1911
  #
1760
1912
  # **Related operations:**
1761
1913
  #
1762
- # * TagResource
1914
+ # * [TagResource][1]
1915
+ #
1916
+ # * [UntagResource][2]
1917
+ #
1763
1918
  #
1764
- # * UntagResource
1919
+ #
1920
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html
1921
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UntagResource.html
1922
+ #
1923
+ # @option params [required, String] :resource_arn
1924
+ # The `KeyARN` of the key whose tags you are getting.
1925
+ #
1926
+ # @option params [String] :next_token
1927
+ # Use this parameter in a subsequent request after you receive a
1928
+ # response with truncated results. Set it to the value of `NextToken`
1929
+ # from the truncated response you just received.
1765
1930
  #
1766
1931
  # @option params [Integer] :max_results
1767
1932
  # Use this parameter to specify the maximum number of items to return.
@@ -1772,35 +1937,27 @@ module Aws::PaymentCryptography
1772
1937
  # This value is optional. If you include a value, it must be between 1
1773
1938
  # and 100, inclusive. If you do not include a value, it defaults to 50.
1774
1939
  #
1775
- # @option params [String] :next_token
1776
- # Use this parameter in a subsequent request after you receive a
1777
- # response with truncated results. Set it to the value of `NextToken`
1778
- # from the truncated response you just received.
1779
- #
1780
- # @option params [required, String] :resource_arn
1781
- # The `KeyARN` of the key whose tags you are getting.
1782
- #
1783
1940
  # @return [Types::ListTagsForResourceOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1784
1941
  #
1785
- # * {Types::ListTagsForResourceOutput#next_token #next_token} => String
1786
1942
  # * {Types::ListTagsForResourceOutput#tags #tags} => Array&lt;Types::Tag&gt;
1943
+ # * {Types::ListTagsForResourceOutput#next_token #next_token} => String
1787
1944
  #
1788
1945
  # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
1789
1946
  #
1790
1947
  # @example Request syntax with placeholder values
1791
1948
  #
1792
1949
  # resp = client.list_tags_for_resource({
1793
- # max_results: 1,
1794
- # next_token: "NextToken",
1795
1950
  # resource_arn: "ResourceArn", # required
1951
+ # next_token: "NextToken",
1952
+ # max_results: 1,
1796
1953
  # })
1797
1954
  #
1798
1955
  # @example Response structure
1799
1956
  #
1800
- # resp.next_token #=> String
1801
1957
  # resp.tags #=> Array
1802
1958
  # resp.tags[0].key #=> String
1803
1959
  # resp.tags[0].value #=> String
1960
+ # resp.next_token #=> String
1804
1961
  #
1805
1962
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/ListTagsForResource AWS API Documentation
1806
1963
  #
@@ -1825,11 +1982,17 @@ module Aws::PaymentCryptography
1825
1982
  #
1826
1983
  # **Related operations:**
1827
1984
  #
1828
- # * DeleteKey
1985
+ # * [DeleteKey][1]
1986
+ #
1987
+ # * [StartKeyUsage][2]
1988
+ #
1989
+ # * [StopKeyUsage][3]
1990
+ #
1829
1991
  #
1830
- # * StartKeyUsage
1831
1992
  #
1832
- # * StopKeyUsage
1993
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html
1994
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html
1995
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StopKeyUsage.html
1833
1996
  #
1834
1997
  # @option params [required, String] :key_identifier
1835
1998
  # The `KeyARN` of the key to be restored within Amazon Web Services
@@ -1847,30 +2010,30 @@ module Aws::PaymentCryptography
1847
2010
  #
1848
2011
  # @example Response structure
1849
2012
  #
1850
- # resp.key.create_timestamp #=> Time
1851
- # resp.key.delete_pending_timestamp #=> Time
1852
- # resp.key.delete_timestamp #=> Time
1853
- # resp.key.enabled #=> Boolean
1854
- # resp.key.exportable #=> Boolean
1855
2013
  # resp.key.key_arn #=> String
1856
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
2014
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1857
2015
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
1858
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1859
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
2016
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1860
2017
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
2018
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
2019
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
2020
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1861
2021
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
1862
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1863
2022
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
1864
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1865
2023
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
1866
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1867
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
2024
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
2025
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1868
2026
  # resp.key.key_check_value #=> String
1869
2027
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
1870
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
2028
+ # resp.key.enabled #=> Boolean
2029
+ # resp.key.exportable #=> Boolean
1871
2030
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
2031
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
2032
+ # resp.key.create_timestamp #=> Time
1872
2033
  # resp.key.usage_start_timestamp #=> Time
1873
2034
  # resp.key.usage_stop_timestamp #=> Time
2035
+ # resp.key.delete_pending_timestamp #=> Time
2036
+ # resp.key.delete_timestamp #=> Time
1874
2037
  #
1875
2038
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/RestoreKey AWS API Documentation
1876
2039
  #
@@ -1890,10 +2053,14 @@ module Aws::PaymentCryptography
1890
2053
  #
1891
2054
  # **Related operations:**
1892
2055
  #
1893
- # * StopKeyUsage
2056
+ # * [StopKeyUsage][1]
1894
2057
  #
1895
2058
  # ^
1896
2059
  #
2060
+ #
2061
+ #
2062
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StopKeyUsage.html
2063
+ #
1897
2064
  # @option params [required, String] :key_identifier
1898
2065
  # The `KeyArn` of the key.
1899
2066
  #
@@ -1909,30 +2076,30 @@ module Aws::PaymentCryptography
1909
2076
  #
1910
2077
  # @example Response structure
1911
2078
  #
1912
- # resp.key.create_timestamp #=> Time
1913
- # resp.key.delete_pending_timestamp #=> Time
1914
- # resp.key.delete_timestamp #=> Time
1915
- # resp.key.enabled #=> Boolean
1916
- # resp.key.exportable #=> Boolean
1917
2079
  # resp.key.key_arn #=> String
1918
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
2080
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1919
2081
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
1920
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1921
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
2082
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1922
2083
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
2084
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
2085
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
2086
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1923
2087
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
1924
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1925
2088
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
1926
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1927
2089
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
1928
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1929
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
2090
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
2091
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1930
2092
  # resp.key.key_check_value #=> String
1931
2093
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
1932
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
2094
+ # resp.key.enabled #=> Boolean
2095
+ # resp.key.exportable #=> Boolean
1933
2096
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
2097
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
2098
+ # resp.key.create_timestamp #=> Time
1934
2099
  # resp.key.usage_start_timestamp #=> Time
1935
2100
  # resp.key.usage_stop_timestamp #=> Time
2101
+ # resp.key.delete_pending_timestamp #=> Time
2102
+ # resp.key.delete_timestamp #=> Time
1936
2103
  #
1937
2104
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/StartKeyUsage AWS API Documentation
1938
2105
  #
@@ -1946,17 +2113,23 @@ module Aws::PaymentCryptography
1946
2113
  # Disables an Amazon Web Services Payment Cryptography key, which makes
1947
2114
  # it inactive within Amazon Web Services Payment Cryptography.
1948
2115
  #
1949
- # You can use this operation instead of DeleteKey to deactivate a key.
1950
- # You can enable the key in the future by calling StartKeyUsage.
2116
+ # You can use this operation instead of [DeleteKey][1] to deactivate a
2117
+ # key. You can enable the key in the future by calling
2118
+ # [StartKeyUsage][2].
1951
2119
  #
1952
2120
  # **Cross-account use:** This operation can't be used across different
1953
2121
  # Amazon Web Services accounts.
1954
2122
  #
1955
2123
  # **Related operations:**
1956
2124
  #
1957
- # * DeleteKey
2125
+ # * [DeleteKey][1]
2126
+ #
2127
+ # * [StartKeyUsage][2]
2128
+ #
1958
2129
  #
1959
- # * StartKeyUsage
2130
+ #
2131
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html
2132
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html
1960
2133
  #
1961
2134
  # @option params [required, String] :key_identifier
1962
2135
  # The `KeyArn` of the key.
@@ -1973,30 +2146,30 @@ module Aws::PaymentCryptography
1973
2146
  #
1974
2147
  # @example Response structure
1975
2148
  #
1976
- # resp.key.create_timestamp #=> Time
1977
- # resp.key.delete_pending_timestamp #=> Time
1978
- # resp.key.delete_timestamp #=> Time
1979
- # resp.key.enabled #=> Boolean
1980
- # resp.key.exportable #=> Boolean
1981
2149
  # resp.key.key_arn #=> String
1982
- # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
2150
+ # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
1983
2151
  # resp.key.key_attributes.key_class #=> String, one of "SYMMETRIC_KEY", "ASYMMETRIC_KEY_PAIR", "PRIVATE_KEY", "PUBLIC_KEY"
1984
- # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
1985
- # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
2152
+ # resp.key.key_attributes.key_algorithm #=> String, one of "TDES_2KEY", "TDES_3KEY", "AES_128", "AES_192", "AES_256", "RSA_2048", "RSA_3072", "RSA_4096"
1986
2153
  # resp.key.key_attributes.key_modes_of_use.encrypt #=> Boolean
2154
+ # resp.key.key_attributes.key_modes_of_use.decrypt #=> Boolean
2155
+ # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
2156
+ # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1987
2157
  # resp.key.key_attributes.key_modes_of_use.generate #=> Boolean
1988
- # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1989
2158
  # resp.key.key_attributes.key_modes_of_use.sign #=> Boolean
1990
- # resp.key.key_attributes.key_modes_of_use.unwrap #=> Boolean
1991
2159
  # resp.key.key_attributes.key_modes_of_use.verify #=> Boolean
1992
- # resp.key.key_attributes.key_modes_of_use.wrap #=> Boolean
1993
- # resp.key.key_attributes.key_usage #=> String, one of "TR31_B0_BASE_DERIVATION_KEY", "TR31_C0_CARD_VERIFICATION_KEY", "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY", "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION", "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS", "TR31_E1_EMV_MKEY_CONFIDENTIALITY", "TR31_E2_EMV_MKEY_INTEGRITY", "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS", "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION", "TR31_E6_EMV_MKEY_OTHER", "TR31_K0_KEY_ENCRYPTION_KEY", "TR31_K1_KEY_BLOCK_PROTECTION_KEY", "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT", "TR31_M3_ISO_9797_3_MAC_KEY", "TR31_M1_ISO_9797_1_MAC_KEY", "TR31_M6_ISO_9797_5_CMAC_KEY", "TR31_M7_HMAC_KEY", "TR31_P0_PIN_ENCRYPTION_KEY", "TR31_P1_PIN_GENERATION_KEY", "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE", "TR31_V1_IBM3624_PIN_VERIFICATION_KEY", "TR31_V2_VISA_PIN_VERIFICATION_KEY", "TR31_K2_TR34_ASYMMETRIC_KEY"
2160
+ # resp.key.key_attributes.key_modes_of_use.derive_key #=> Boolean
2161
+ # resp.key.key_attributes.key_modes_of_use.no_restrictions #=> Boolean
1994
2162
  # resp.key.key_check_value #=> String
1995
2163
  # resp.key.key_check_value_algorithm #=> String, one of "CMAC", "ANSI_X9_24"
1996
- # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
2164
+ # resp.key.enabled #=> Boolean
2165
+ # resp.key.exportable #=> Boolean
1997
2166
  # resp.key.key_state #=> String, one of "CREATE_IN_PROGRESS", "CREATE_COMPLETE", "DELETE_PENDING", "DELETE_COMPLETE"
2167
+ # resp.key.key_origin #=> String, one of "EXTERNAL", "AWS_PAYMENT_CRYPTOGRAPHY"
2168
+ # resp.key.create_timestamp #=> Time
1998
2169
  # resp.key.usage_start_timestamp #=> Time
1999
2170
  # resp.key.usage_stop_timestamp #=> Time
2171
+ # resp.key.delete_pending_timestamp #=> Time
2172
+ # resp.key.delete_timestamp #=> Time
2000
2173
  #
2001
2174
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-2021-09-14/StopKeyUsage AWS API Documentation
2002
2175
  #
@@ -2019,16 +2192,22 @@ module Aws::PaymentCryptography
2019
2192
  # To add a tag, specify a new tag key and a tag value. To edit a tag,
2020
2193
  # specify an existing tag key and a new tag value. You can also add tags
2021
2194
  # to an Amazon Web Services Payment Cryptography key when you create it
2022
- # with CreateKey.
2195
+ # with [CreateKey][1].
2023
2196
  #
2024
2197
  # **Cross-account use:** This operation can't be used across different
2025
2198
  # Amazon Web Services accounts.
2026
2199
  #
2027
2200
  # **Related operations:**
2028
2201
  #
2029
- # * ListTagsForResource
2202
+ # * [ListTagsForResource][2]
2203
+ #
2204
+ # * [UntagResource][3]
2205
+ #
2206
+ #
2030
2207
  #
2031
- # * UntagResource
2208
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html
2209
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListTagsForResource.html
2210
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UntagResource.html
2032
2211
  #
2033
2212
  # @option params [required, String] :resource_arn
2034
2213
  # The `KeyARN` of the key whose tags are being updated.
@@ -2045,13 +2224,17 @@ module Aws::PaymentCryptography
2045
2224
  # field. This field may be displayed in plaintext in CloudTrail logs and
2046
2225
  # other output.
2047
2226
  #
2048
- # To use this parameter, you must have TagResource permission in an IAM
2049
- # policy.
2227
+ # To use this parameter, you must have [TagResource][1] permission in an
2228
+ # IAM policy.
2050
2229
  #
2051
2230
  # Don't include personal, confidential or sensitive information in this
2052
2231
  # field. This field may be displayed in plaintext in CloudTrail logs and
2053
2232
  # other output.
2054
2233
  #
2234
+ #
2235
+ #
2236
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html
2237
+ #
2055
2238
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2056
2239
  #
2057
2240
  # @example Request syntax with placeholder values
@@ -2087,9 +2270,14 @@ module Aws::PaymentCryptography
2087
2270
  #
2088
2271
  # **Related operations:**
2089
2272
  #
2090
- # * ListTagsForResource
2273
+ # * [ListTagsForResource][1]
2274
+ #
2275
+ # * [TagResource][2]
2091
2276
  #
2092
- # * TagResource
2277
+ #
2278
+ #
2279
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListTagsForResource.html
2280
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html
2093
2281
  #
2094
2282
  # @option params [required, String] :resource_arn
2095
2283
  # The `KeyARN` of the key whose tags are being removed.
@@ -2100,7 +2288,11 @@ module Aws::PaymentCryptography
2100
2288
  # If the Amazon Web Services Payment Cryptography key doesn't have the
2101
2289
  # specified tag key, Amazon Web Services Payment Cryptography doesn't
2102
2290
  # throw an exception or return a response. To confirm that the operation
2103
- # succeeded, use the ListTagsForResource operation.
2291
+ # succeeded, use the [ListTagsForResource][1] operation.
2292
+ #
2293
+ #
2294
+ #
2295
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListTagsForResource.html
2104
2296
  #
2105
2297
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2106
2298
  #
@@ -2132,13 +2324,20 @@ module Aws::PaymentCryptography
2132
2324
  #
2133
2325
  # **Related operations:**
2134
2326
  #
2135
- # * CreateAlias
2327
+ # * [CreateAlias][1]
2328
+ #
2329
+ # * [DeleteAlias][2]
2330
+ #
2331
+ # * [GetAlias][3]
2332
+ #
2333
+ # * [ListAliases][4]
2136
2334
  #
2137
- # * DeleteAlias
2138
2335
  #
2139
- # * GetAlias
2140
2336
  #
2141
- # * ListAliases
2337
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html
2338
+ # [2]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html
2339
+ # [3]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html
2340
+ # [4]: https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html
2142
2341
  #
2143
2342
  # @option params [required, String] :alias_name
2144
2343
  # The alias whose associated key is changing.
@@ -2185,7 +2384,7 @@ module Aws::PaymentCryptography
2185
2384
  params: params,
2186
2385
  config: config)
2187
2386
  context[:gem_name] = 'aws-sdk-paymentcryptography'
2188
- context[:gem_version] = '1.11.0'
2387
+ context[:gem_version] = '1.13.0'
2189
2388
  Seahorse::Client::Request.new(handlers, context)
2190
2389
  end
2191
2390