aws-sdk-paymentcryptographydata 1.26.0 → 1.27.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-paymentcryptographydata/client.rb +141 -32
- data/lib/aws-sdk-paymentcryptographydata/client_api.rb +18 -0
- data/lib/aws-sdk-paymentcryptographydata/types.rb +75 -7
- data/lib/aws-sdk-paymentcryptographydata.rb +1 -1
- data/sig/client.rbs +84 -8
- data/sig/types.rbs +17 -2
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ce80c6d4fc0677ab2a7e9c1ee8d7bb0281d03cad13fcd4469fee4a73ba944a9b
|
4
|
+
data.tar.gz: 39aaf7b36d45bc50017b4fa6867f062ca50a0826b9bb16edf75a4c197fd51e6a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: df14fd755f08e940389b3c9158cb3ac26d7a83af70045b3835f8fa9a519dc9490d1be75a55bdc4c5b06a69269cc3d7325902bd1ce12ded285dc3f99341996720
|
7
|
+
data.tar.gz: 1dd94acb5900f7ee47894e49fab0ad50c2e21a1ce2ab336cfd7ac0960d279db4f719d55450006f3b610a83c94ee1a34605b06bc349afdbca04ed98b3833e33f2
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.27.0
|
@@ -566,6 +566,14 @@ module Aws::PaymentCryptographyData
|
|
566
566
|
# wrapped_key: {
|
567
567
|
# wrapped_key_material: { # required
|
568
568
|
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
569
|
+
# diffie_hellman_symmetric_key: {
|
570
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
571
|
+
# public_key_certificate: "CertificateType", # required
|
572
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
573
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
574
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
575
|
+
# shared_information: "SharedInformation", # required
|
576
|
+
# },
|
569
577
|
# },
|
570
578
|
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
571
579
|
# },
|
@@ -726,6 +734,14 @@ module Aws::PaymentCryptographyData
|
|
726
734
|
# wrapped_key: {
|
727
735
|
# wrapped_key_material: { # required
|
728
736
|
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
737
|
+
# diffie_hellman_symmetric_key: {
|
738
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
739
|
+
# public_key_certificate: "CertificateType", # required
|
740
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
741
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
742
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
743
|
+
# shared_information: "SharedInformation", # required
|
744
|
+
# },
|
729
745
|
# },
|
730
746
|
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
731
747
|
# },
|
@@ -1148,9 +1164,18 @@ module Aws::PaymentCryptographyData
|
|
1148
1164
|
# Cryptography. This operation uses a separate Pin Verification Key
|
1149
1165
|
# (PVK) for VISA PVV generation.
|
1150
1166
|
#
|
1167
|
+
# Using ECDH key exchange, you can receive cardholder selectable PINs
|
1168
|
+
# into Amazon Web Services Payment Cryptography. The ECDH derived key
|
1169
|
+
# protects the incoming PIN block. You can also use it for reveal PIN,
|
1170
|
+
# wherein the generated PIN block is protected by the ECDH derived key
|
1171
|
+
# before transmission from Amazon Web Services Payment Cryptography. For
|
1172
|
+
# more information on establishing ECDH derived keys, see the
|
1173
|
+
# [Generating keys][2] in the *Amazon Web Services Payment Cryptography
|
1174
|
+
# User Guide*.
|
1175
|
+
#
|
1151
1176
|
# For information about valid keys for this operation, see
|
1152
|
-
# [Understanding key attributes][
|
1153
|
-
# operations][
|
1177
|
+
# [Understanding key attributes][3] and [Key types for specific data
|
1178
|
+
# operations][4] in the *Amazon Web Services Payment Cryptography User
|
1154
1179
|
# Guide*.
|
1155
1180
|
#
|
1156
1181
|
# **Cross-account use**: This operation can't be used across different
|
@@ -1167,8 +1192,9 @@ module Aws::PaymentCryptographyData
|
|
1167
1192
|
#
|
1168
1193
|
#
|
1169
1194
|
# [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/generate-pin-data.html
|
1170
|
-
# [2]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys
|
1171
|
-
# [3]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/
|
1195
|
+
# [2]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/create-keys.html
|
1196
|
+
# [3]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html
|
1197
|
+
# [4]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html
|
1172
1198
|
#
|
1173
1199
|
# @option params [required, String] :generation_key_identifier
|
1174
1200
|
# The `keyARN` of the PEK that Amazon Web Services Payment Cryptography
|
@@ -1176,7 +1202,8 @@ module Aws::PaymentCryptographyData
|
|
1176
1202
|
#
|
1177
1203
|
# @option params [required, String] :encryption_key_identifier
|
1178
1204
|
# The `keyARN` of the PEK that Amazon Web Services Payment Cryptography
|
1179
|
-
# uses to encrypt the PIN Block.
|
1205
|
+
# uses to encrypt the PIN Block. For ECDH, it is the `keyARN` of the
|
1206
|
+
# asymmetric ECC key.
|
1180
1207
|
#
|
1181
1208
|
# @option params [required, Types::PinGenerationAttributes] :generation_attributes
|
1182
1209
|
# The attributes and values to use for PIN, PVV, or PIN Offset
|
@@ -1202,6 +1229,10 @@ module Aws::PaymentCryptographyData
|
|
1202
1229
|
# The `ISO_Format_3` PIN block format is the same as `ISO_Format_0`
|
1203
1230
|
# except that the fill digits are random values from 10 to 15.
|
1204
1231
|
#
|
1232
|
+
# @option params [Types::WrappedKey] :encryption_wrapped_key
|
1233
|
+
# Parameter information of a WrappedKeyBlock for encryption key
|
1234
|
+
# exchange.
|
1235
|
+
#
|
1205
1236
|
# @return [Types::GeneratePinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1206
1237
|
#
|
1207
1238
|
# * {Types::GeneratePinDataOutput#generation_key_arn #generation_key_arn} => String
|
@@ -1249,7 +1280,21 @@ module Aws::PaymentCryptographyData
|
|
1249
1280
|
# },
|
1250
1281
|
# pin_data_length: 1,
|
1251
1282
|
# primary_account_number: "PrimaryAccountNumberType", # required
|
1252
|
-
# pin_block_format: "ISO_FORMAT_0", # required, accepts ISO_FORMAT_0, ISO_FORMAT_3
|
1283
|
+
# pin_block_format: "ISO_FORMAT_0", # required, accepts ISO_FORMAT_0, ISO_FORMAT_3, ISO_FORMAT_4
|
1284
|
+
# encryption_wrapped_key: {
|
1285
|
+
# wrapped_key_material: { # required
|
1286
|
+
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
1287
|
+
# diffie_hellman_symmetric_key: {
|
1288
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
1289
|
+
# public_key_certificate: "CertificateType", # required
|
1290
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
1291
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
1292
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
1293
|
+
# shared_information: "SharedInformation", # required
|
1294
|
+
# },
|
1295
|
+
# },
|
1296
|
+
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
1297
|
+
# },
|
1253
1298
|
# })
|
1254
1299
|
#
|
1255
1300
|
# @example Response structure
|
@@ -1397,12 +1442,28 @@ module Aws::PaymentCryptographyData
|
|
1397
1442
|
# incoming_wrapped_key: {
|
1398
1443
|
# wrapped_key_material: { # required
|
1399
1444
|
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
1445
|
+
# diffie_hellman_symmetric_key: {
|
1446
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
1447
|
+
# public_key_certificate: "CertificateType", # required
|
1448
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
1449
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
1450
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
1451
|
+
# shared_information: "SharedInformation", # required
|
1452
|
+
# },
|
1400
1453
|
# },
|
1401
1454
|
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
1402
1455
|
# },
|
1403
1456
|
# outgoing_wrapped_key: {
|
1404
1457
|
# wrapped_key_material: { # required
|
1405
1458
|
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
1459
|
+
# diffie_hellman_symmetric_key: {
|
1460
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
1461
|
+
# public_key_certificate: "CertificateType", # required
|
1462
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
1463
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
1464
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
1465
|
+
# shared_information: "SharedInformation", # required
|
1466
|
+
# },
|
1406
1467
|
# },
|
1407
1468
|
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
1408
1469
|
# },
|
@@ -1427,24 +1488,36 @@ module Aws::PaymentCryptographyData
|
|
1427
1488
|
# For more information, see [Translate PIN data][1] in the *Amazon Web
|
1428
1489
|
# Services Payment Cryptography User Guide*.
|
1429
1490
|
#
|
1430
|
-
# PIN block translation involves changing
|
1431
|
-
#
|
1432
|
-
#
|
1433
|
-
# Web Services Payment Cryptography
|
1434
|
-
# can be from PEK (Pin
|
1435
|
-
#
|
1436
|
-
#
|
1437
|
-
#
|
1491
|
+
# PIN block translation involves changing a PIN block from one
|
1492
|
+
# encryption key to another and optionally change its format. PIN block
|
1493
|
+
# translation occurs entirely within the HSM boundary and PIN data never
|
1494
|
+
# enters or leaves Amazon Web Services Payment Cryptography in clear
|
1495
|
+
# text. The encryption key transformation can be from PEK (Pin
|
1496
|
+
# Encryption Key) to BDK (Base Derivation Key) for DUKPT or from BDK for
|
1497
|
+
# DUKPT to PEK.
|
1498
|
+
#
|
1499
|
+
# Amazon Web Services Payment Cryptography also supports use of dynamic
|
1500
|
+
# keys and ECDH (Elliptic Curve Diffie-Hellman) based key exchange for
|
1501
|
+
# this operation.
|
1502
|
+
#
|
1503
|
+
# Dynamic keys allow you to pass a PEK as a TR-31 WrappedKeyBlock. They
|
1504
|
+
# can be used when key material is frequently rotated, such as during
|
1505
|
+
# every card transaction, and there is need to avoid importing
|
1506
|
+
# short-lived keys into Amazon Web Services Payment Cryptography. To
|
1507
|
+
# translate PIN block using dynamic keys, the `keyARN` is the Key
|
1508
|
+
# Encryption Key (KEK) of the TR-31 wrapped PEK. The incoming wrapped
|
1509
|
+
# key shall have a key purpose of P0 with a mode of use of B or D. For
|
1510
|
+
# more information, see [Using Dynamic Keys][2] in the *Amazon Web
|
1511
|
+
# Services Payment Cryptography User Guide*.
|
1438
1512
|
#
|
1439
|
-
#
|
1440
|
-
#
|
1441
|
-
#
|
1442
|
-
#
|
1443
|
-
#
|
1444
|
-
#
|
1445
|
-
#
|
1446
|
-
#
|
1447
|
-
# Keys][2] in the *Amazon Web Services Payment Cryptography User Guide*.
|
1513
|
+
# Using ECDH key exchange, you can receive cardholder selectable PINs
|
1514
|
+
# into Amazon Web Services Payment Cryptography. The ECDH derived key
|
1515
|
+
# protects the incoming PIN block, which is translated to a PEK
|
1516
|
+
# encrypted PIN block for use within the service. You can also use ECDH
|
1517
|
+
# for reveal PIN, wherein the service translates the PIN block from PEK
|
1518
|
+
# to a ECDH derived encryption key. For more information on establishing
|
1519
|
+
# ECDH derived keys, see the [Generating keys][3] in the *Amazon Web
|
1520
|
+
# Services Payment Cryptography User Guide*.
|
1448
1521
|
#
|
1449
1522
|
# The allowed combinations of PIN block format translations are guided
|
1450
1523
|
# by PCI. It is important to note that not all encrypted PIN block
|
@@ -1454,8 +1527,8 @@ module Aws::PaymentCryptographyData
|
|
1454
1527
|
# not require a PAN for generation.
|
1455
1528
|
#
|
1456
1529
|
# For information about valid keys for this operation, see
|
1457
|
-
# [Understanding key attributes][
|
1458
|
-
# operations][
|
1530
|
+
# [Understanding key attributes][4] and [Key types for specific data
|
1531
|
+
# operations][5] in the *Amazon Web Services Payment Cryptography User
|
1459
1532
|
# Guide*.
|
1460
1533
|
#
|
1461
1534
|
# <note markdown="1"> Amazon Web Services Payment Cryptography currently supports ISO PIN
|
@@ -1477,21 +1550,23 @@ module Aws::PaymentCryptographyData
|
|
1477
1550
|
#
|
1478
1551
|
# [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/translate-pin-data.html
|
1479
1552
|
# [2]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html
|
1480
|
-
# [3]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys
|
1481
|
-
# [4]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/
|
1553
|
+
# [3]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/create-keys.html
|
1554
|
+
# [4]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html
|
1555
|
+
# [5]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html
|
1482
1556
|
#
|
1483
1557
|
# @option params [required, String] :incoming_key_identifier
|
1484
1558
|
# The `keyARN` of the encryption key under which incoming PIN block data
|
1485
1559
|
# is encrypted. This key type can be PEK or BDK.
|
1486
1560
|
#
|
1487
|
-
#
|
1488
|
-
#
|
1489
|
-
# identifier used to perform the operation.
|
1561
|
+
# For dynamic keys, it is the `keyARN` of KEK of the TR-31 wrapped PEK.
|
1562
|
+
# For ECDH, it is the `keyARN` of the asymmetric ECC key.
|
1490
1563
|
#
|
1491
1564
|
# @option params [required, String] :outgoing_key_identifier
|
1492
1565
|
# The `keyARN` of the encryption key for encrypting outgoing PIN block
|
1493
1566
|
# data. This key type can be PEK or BDK.
|
1494
1567
|
#
|
1568
|
+
# For ECDH, it is the `keyARN` of the asymmetric ECC key.
|
1569
|
+
#
|
1495
1570
|
# @option params [required, Types::TranslationIsoFormats] :incoming_translation_attributes
|
1496
1571
|
# The format of the incoming PIN block data for translation within
|
1497
1572
|
# Amazon Web Services Payment Cryptography.
|
@@ -1571,12 +1646,28 @@ module Aws::PaymentCryptographyData
|
|
1571
1646
|
# incoming_wrapped_key: {
|
1572
1647
|
# wrapped_key_material: { # required
|
1573
1648
|
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
1649
|
+
# diffie_hellman_symmetric_key: {
|
1650
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
1651
|
+
# public_key_certificate: "CertificateType", # required
|
1652
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
1653
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
1654
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
1655
|
+
# shared_information: "SharedInformation", # required
|
1656
|
+
# },
|
1574
1657
|
# },
|
1575
1658
|
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
1576
1659
|
# },
|
1577
1660
|
# outgoing_wrapped_key: {
|
1578
1661
|
# wrapped_key_material: { # required
|
1579
1662
|
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
1663
|
+
# diffie_hellman_symmetric_key: {
|
1664
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
1665
|
+
# public_key_certificate: "CertificateType", # required
|
1666
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
1667
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
1668
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
1669
|
+
# shared_information: "SharedInformation", # required
|
1670
|
+
# },
|
1580
1671
|
# },
|
1581
1672
|
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
1582
1673
|
# },
|
@@ -2022,6 +2113,10 @@ module Aws::PaymentCryptographyData
|
|
2022
2113
|
# @option params [Types::DukptAttributes] :dukpt_attributes
|
2023
2114
|
# The attributes and values for the DUKPT encrypted PIN block data.
|
2024
2115
|
#
|
2116
|
+
# @option params [Types::WrappedKey] :encryption_wrapped_key
|
2117
|
+
# Parameter information of a WrappedKeyBlock for encryption key
|
2118
|
+
# exchange.
|
2119
|
+
#
|
2025
2120
|
# @return [Types::VerifyPinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2026
2121
|
#
|
2027
2122
|
# * {Types::VerifyPinDataOutput#verification_key_arn #verification_key_arn} => String
|
@@ -2048,12 +2143,26 @@ module Aws::PaymentCryptographyData
|
|
2048
2143
|
# },
|
2049
2144
|
# encrypted_pin_block: "EncryptedPinBlockType", # required
|
2050
2145
|
# primary_account_number: "PrimaryAccountNumberType", # required
|
2051
|
-
# pin_block_format: "ISO_FORMAT_0", # required, accepts ISO_FORMAT_0, ISO_FORMAT_3
|
2146
|
+
# pin_block_format: "ISO_FORMAT_0", # required, accepts ISO_FORMAT_0, ISO_FORMAT_3, ISO_FORMAT_4
|
2052
2147
|
# pin_data_length: 1,
|
2053
2148
|
# dukpt_attributes: {
|
2054
2149
|
# key_serial_number: "HexLengthBetween10And24", # required
|
2055
2150
|
# dukpt_derivation_type: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
2056
2151
|
# },
|
2152
|
+
# encryption_wrapped_key: {
|
2153
|
+
# wrapped_key_material: { # required
|
2154
|
+
# tr_31_key_block: "Tr31WrappedKeyBlock",
|
2155
|
+
# diffie_hellman_symmetric_key: {
|
2156
|
+
# certificate_authority_public_key_identifier: "KeyArnOrKeyAliasType", # required
|
2157
|
+
# public_key_certificate: "CertificateType", # required
|
2158
|
+
# key_algorithm: "TDES_2KEY", # required, accepts TDES_2KEY, TDES_3KEY, AES_128, AES_192, AES_256
|
2159
|
+
# key_derivation_function: "NIST_SP800", # required, accepts NIST_SP800, ANSI_X963
|
2160
|
+
# key_derivation_hash_algorithm: "SHA_256", # required, accepts SHA_256, SHA_384, SHA_512
|
2161
|
+
# shared_information: "SharedInformation", # required
|
2162
|
+
# },
|
2163
|
+
# },
|
2164
|
+
# key_check_value_algorithm: "CMAC", # accepts CMAC, ANSI_X9_24
|
2165
|
+
# },
|
2057
2166
|
# })
|
2058
2167
|
#
|
2059
2168
|
# @example Response structure
|
@@ -2090,7 +2199,7 @@ module Aws::PaymentCryptographyData
|
|
2090
2199
|
tracer: tracer
|
2091
2200
|
)
|
2092
2201
|
context[:gem_name] = 'aws-sdk-paymentcryptographydata'
|
2093
|
-
context[:gem_version] = '1.
|
2202
|
+
context[:gem_version] = '1.27.0'
|
2094
2203
|
Seahorse::Client::Request.new(handlers, context)
|
2095
2204
|
end
|
2096
2205
|
|
@@ -28,6 +28,7 @@ module Aws::PaymentCryptographyData
|
|
28
28
|
CardVerificationAttributes = Shapes::UnionShape.new(name: 'CardVerificationAttributes')
|
29
29
|
CardVerificationValue1 = Shapes::StructureShape.new(name: 'CardVerificationValue1')
|
30
30
|
CardVerificationValue2 = Shapes::StructureShape.new(name: 'CardVerificationValue2')
|
31
|
+
CertificateType = Shapes::StringShape.new(name: 'CertificateType')
|
31
32
|
CipherTextType = Shapes::StringShape.new(name: 'CipherTextType')
|
32
33
|
CommandMessageDataType = Shapes::StringShape.new(name: 'CommandMessageDataType')
|
33
34
|
CryptogramAuthResponse = Shapes::UnionShape.new(name: 'CryptogramAuthResponse')
|
@@ -47,6 +48,7 @@ module Aws::PaymentCryptographyData
|
|
47
48
|
DukptKeyVariant = Shapes::StringShape.new(name: 'DukptKeyVariant')
|
48
49
|
DynamicCardVerificationCode = Shapes::StructureShape.new(name: 'DynamicCardVerificationCode')
|
49
50
|
DynamicCardVerificationValue = Shapes::StructureShape.new(name: 'DynamicCardVerificationValue')
|
51
|
+
EcdhDerivationAttributes = Shapes::StructureShape.new(name: 'EcdhDerivationAttributes')
|
50
52
|
Emv2000Attributes = Shapes::StructureShape.new(name: 'Emv2000Attributes')
|
51
53
|
EmvCommonAttributes = Shapes::StructureShape.new(name: 'EmvCommonAttributes')
|
52
54
|
EmvEncryptionAttributes = Shapes::StructureShape.new(name: 'EmvEncryptionAttributes')
|
@@ -87,6 +89,8 @@ module Aws::PaymentCryptographyData
|
|
87
89
|
KeyArnOrKeyAliasType = Shapes::StringShape.new(name: 'KeyArnOrKeyAliasType')
|
88
90
|
KeyCheckValue = Shapes::StringShape.new(name: 'KeyCheckValue')
|
89
91
|
KeyCheckValueAlgorithm = Shapes::StringShape.new(name: 'KeyCheckValueAlgorithm')
|
92
|
+
KeyDerivationFunction = Shapes::StringShape.new(name: 'KeyDerivationFunction')
|
93
|
+
KeyDerivationHashAlgorithm = Shapes::StringShape.new(name: 'KeyDerivationHashAlgorithm')
|
90
94
|
MacAlgorithm = Shapes::StringShape.new(name: 'MacAlgorithm')
|
91
95
|
MacAlgorithmDukpt = Shapes::StructureShape.new(name: 'MacAlgorithmDukpt')
|
92
96
|
MacAlgorithmEmv = Shapes::StructureShape.new(name: 'MacAlgorithmEmv')
|
@@ -127,8 +131,10 @@ module Aws::PaymentCryptographyData
|
|
127
131
|
SessionKeyEmvCommon = Shapes::StructureShape.new(name: 'SessionKeyEmvCommon')
|
128
132
|
SessionKeyMastercard = Shapes::StructureShape.new(name: 'SessionKeyMastercard')
|
129
133
|
SessionKeyVisa = Shapes::StructureShape.new(name: 'SessionKeyVisa')
|
134
|
+
SharedInformation = Shapes::StringShape.new(name: 'SharedInformation')
|
130
135
|
String = Shapes::StringShape.new(name: 'String')
|
131
136
|
SymmetricEncryptionAttributes = Shapes::StructureShape.new(name: 'SymmetricEncryptionAttributes')
|
137
|
+
SymmetricKeyAlgorithm = Shapes::StringShape.new(name: 'SymmetricKeyAlgorithm')
|
132
138
|
ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
|
133
139
|
Tr31WrappedKeyBlock = Shapes::StringShape.new(name: 'Tr31WrappedKeyBlock')
|
134
140
|
TrackDataType = Shapes::StringShape.new(name: 'TrackDataType')
|
@@ -309,6 +315,14 @@ module Aws::PaymentCryptographyData
|
|
309
315
|
DynamicCardVerificationValue.add_member(:application_transaction_counter, Shapes::ShapeRef.new(shape: HexLengthBetween2And4, required: true, location_name: "ApplicationTransactionCounter"))
|
310
316
|
DynamicCardVerificationValue.struct_class = Types::DynamicCardVerificationValue
|
311
317
|
|
318
|
+
EcdhDerivationAttributes.add_member(:certificate_authority_public_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "CertificateAuthorityPublicKeyIdentifier"))
|
319
|
+
EcdhDerivationAttributes.add_member(:public_key_certificate, Shapes::ShapeRef.new(shape: CertificateType, required: true, location_name: "PublicKeyCertificate"))
|
320
|
+
EcdhDerivationAttributes.add_member(:key_algorithm, Shapes::ShapeRef.new(shape: SymmetricKeyAlgorithm, required: true, location_name: "KeyAlgorithm"))
|
321
|
+
EcdhDerivationAttributes.add_member(:key_derivation_function, Shapes::ShapeRef.new(shape: KeyDerivationFunction, required: true, location_name: "KeyDerivationFunction"))
|
322
|
+
EcdhDerivationAttributes.add_member(:key_derivation_hash_algorithm, Shapes::ShapeRef.new(shape: KeyDerivationHashAlgorithm, required: true, location_name: "KeyDerivationHashAlgorithm"))
|
323
|
+
EcdhDerivationAttributes.add_member(:shared_information, Shapes::ShapeRef.new(shape: SharedInformation, required: true, location_name: "SharedInformation"))
|
324
|
+
EcdhDerivationAttributes.struct_class = Types::EcdhDerivationAttributes
|
325
|
+
|
312
326
|
Emv2000Attributes.add_member(:major_key_derivation_mode, Shapes::ShapeRef.new(shape: MajorKeyDerivationMode, required: true, location_name: "MajorKeyDerivationMode"))
|
313
327
|
Emv2000Attributes.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: PrimaryAccountNumberType, required: true, location_name: "PrimaryAccountNumber"))
|
314
328
|
Emv2000Attributes.add_member(:pan_sequence_number, Shapes::ShapeRef.new(shape: NumberLengthEquals2, required: true, location_name: "PanSequenceNumber"))
|
@@ -403,6 +417,7 @@ module Aws::PaymentCryptographyData
|
|
403
417
|
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
404
418
|
GeneratePinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: PrimaryAccountNumberType, required: true, location_name: "PrimaryAccountNumber"))
|
405
419
|
GeneratePinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
420
|
+
GeneratePinDataInput.add_member(:encryption_wrapped_key, Shapes::ShapeRef.new(shape: WrappedKey, location_name: "EncryptionWrappedKey"))
|
406
421
|
GeneratePinDataInput.struct_class = Types::GeneratePinDataInput
|
407
422
|
|
408
423
|
GeneratePinDataOutput.add_member(:generation_key_arn, Shapes::ShapeRef.new(shape: KeyArn, required: true, location_name: "GenerationKeyArn"))
|
@@ -676,6 +691,7 @@ module Aws::PaymentCryptographyData
|
|
676
691
|
VerifyPinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
677
692
|
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
678
693
|
VerifyPinDataInput.add_member(:dukpt_attributes, Shapes::ShapeRef.new(shape: DukptAttributes, location_name: "DukptAttributes"))
|
694
|
+
VerifyPinDataInput.add_member(:encryption_wrapped_key, Shapes::ShapeRef.new(shape: WrappedKey, location_name: "EncryptionWrappedKey"))
|
679
695
|
VerifyPinDataInput.struct_class = Types::VerifyPinDataInput
|
680
696
|
|
681
697
|
VerifyPinDataOutput.add_member(:verification_key_arn, Shapes::ShapeRef.new(shape: KeyArn, required: true, location_name: "VerificationKeyArn"))
|
@@ -714,8 +730,10 @@ module Aws::PaymentCryptographyData
|
|
714
730
|
WrappedKey.struct_class = Types::WrappedKey
|
715
731
|
|
716
732
|
WrappedKeyMaterial.add_member(:tr_31_key_block, Shapes::ShapeRef.new(shape: Tr31WrappedKeyBlock, location_name: "Tr31KeyBlock"))
|
733
|
+
WrappedKeyMaterial.add_member(:diffie_hellman_symmetric_key, Shapes::ShapeRef.new(shape: EcdhDerivationAttributes, location_name: "DiffieHellmanSymmetricKey"))
|
717
734
|
WrappedKeyMaterial.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
|
718
735
|
WrappedKeyMaterial.add_member_subclass(:tr_31_key_block, Types::WrappedKeyMaterial::Tr31KeyBlock)
|
736
|
+
WrappedKeyMaterial.add_member_subclass(:diffie_hellman_symmetric_key, Types::WrappedKeyMaterial::DiffieHellmanSymmetricKey)
|
719
737
|
WrappedKeyMaterial.add_member_subclass(:unknown, Types::WrappedKeyMaterial::Unknown)
|
720
738
|
WrappedKeyMaterial.struct_class = Types::WrappedKeyMaterial
|
721
739
|
|
@@ -714,6 +714,53 @@ module Aws::PaymentCryptographyData
|
|
714
714
|
include Aws::Structure
|
715
715
|
end
|
716
716
|
|
717
|
+
# Parameters required to establish ECDH based key exchange.
|
718
|
+
#
|
719
|
+
# @!attribute [rw] certificate_authority_public_key_identifier
|
720
|
+
# The `keyArn` of the certificate that signed the client's
|
721
|
+
# `PublicKeyCertificate`.
|
722
|
+
# @return [String]
|
723
|
+
#
|
724
|
+
# @!attribute [rw] public_key_certificate
|
725
|
+
# The client's public key certificate in PEM format (base64 encoded)
|
726
|
+
# to use for ECDH key derivation.
|
727
|
+
# @return [String]
|
728
|
+
#
|
729
|
+
# @!attribute [rw] key_algorithm
|
730
|
+
# The key algorithm of the derived ECDH key.
|
731
|
+
# @return [String]
|
732
|
+
#
|
733
|
+
# @!attribute [rw] key_derivation_function
|
734
|
+
# The key derivation function to use for deriving a key using ECDH.
|
735
|
+
# @return [String]
|
736
|
+
#
|
737
|
+
# @!attribute [rw] key_derivation_hash_algorithm
|
738
|
+
# The hash type to use for deriving a key using ECDH.
|
739
|
+
# @return [String]
|
740
|
+
#
|
741
|
+
# @!attribute [rw] shared_information
|
742
|
+
# A byte string containing information that binds the ECDH derived key
|
743
|
+
# to the two parties involved or to the context of the key.
|
744
|
+
#
|
745
|
+
# It may include details like identities of the two parties deriving
|
746
|
+
# the key, context of the operation, session IDs, and optionally a
|
747
|
+
# nonce. It must not contain zero bytes, and re-using shared
|
748
|
+
# information for multiple ECDH key derivations is not recommended.
|
749
|
+
# @return [String]
|
750
|
+
#
|
751
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EcdhDerivationAttributes AWS API Documentation
|
752
|
+
#
|
753
|
+
class EcdhDerivationAttributes < Struct.new(
|
754
|
+
:certificate_authority_public_key_identifier,
|
755
|
+
:public_key_certificate,
|
756
|
+
:key_algorithm,
|
757
|
+
:key_derivation_function,
|
758
|
+
:key_derivation_hash_algorithm,
|
759
|
+
:shared_information)
|
760
|
+
SENSITIVE = [:public_key_certificate]
|
761
|
+
include Aws::Structure
|
762
|
+
end
|
763
|
+
|
717
764
|
# Parameters to derive the confidentiality and integrity keys for a
|
718
765
|
# payment card using EMV2000 deruv.
|
719
766
|
#
|
@@ -1200,7 +1247,8 @@ module Aws::PaymentCryptographyData
|
|
1200
1247
|
#
|
1201
1248
|
# @!attribute [rw] encryption_key_identifier
|
1202
1249
|
# The `keyARN` of the PEK that Amazon Web Services Payment
|
1203
|
-
# Cryptography uses to encrypt the PIN Block.
|
1250
|
+
# Cryptography uses to encrypt the PIN Block. For ECDH, it is the
|
1251
|
+
# `keyARN` of the asymmetric ECC key.
|
1204
1252
|
# @return [String]
|
1205
1253
|
#
|
1206
1254
|
# @!attribute [rw] generation_attributes
|
@@ -1231,6 +1279,11 @@ module Aws::PaymentCryptographyData
|
|
1231
1279
|
# except that the fill digits are random values from 10 to 15.
|
1232
1280
|
# @return [String]
|
1233
1281
|
#
|
1282
|
+
# @!attribute [rw] encryption_wrapped_key
|
1283
|
+
# Parameter information of a WrappedKeyBlock for encryption key
|
1284
|
+
# exchange.
|
1285
|
+
# @return [Types::WrappedKey]
|
1286
|
+
#
|
1234
1287
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/GeneratePinDataInput AWS API Documentation
|
1235
1288
|
#
|
1236
1289
|
class GeneratePinDataInput < Struct.new(
|
@@ -1239,7 +1292,8 @@ module Aws::PaymentCryptographyData
|
|
1239
1292
|
:generation_attributes,
|
1240
1293
|
:pin_data_length,
|
1241
1294
|
:primary_account_number,
|
1242
|
-
:pin_block_format
|
1295
|
+
:pin_block_format,
|
1296
|
+
:encryption_wrapped_key)
|
1243
1297
|
SENSITIVE = [:primary_account_number]
|
1244
1298
|
include Aws::Structure
|
1245
1299
|
end
|
@@ -1260,7 +1314,8 @@ module Aws::PaymentCryptographyData
|
|
1260
1314
|
#
|
1261
1315
|
# @!attribute [rw] encryption_key_arn
|
1262
1316
|
# The `keyARN` of the PEK that Amazon Web Services Payment
|
1263
|
-
# Cryptography uses for encrypted pin block generation.
|
1317
|
+
# Cryptography uses for encrypted pin block generation. For ECDH, it
|
1318
|
+
# is the `keyARN` of the asymmetric ECC key.
|
1264
1319
|
# @return [String]
|
1265
1320
|
#
|
1266
1321
|
# @!attribute [rw] encryption_key_check_value
|
@@ -2110,14 +2165,15 @@ module Aws::PaymentCryptographyData
|
|
2110
2165
|
# The `keyARN` of the encryption key under which incoming PIN block
|
2111
2166
|
# data is encrypted. This key type can be PEK or BDK.
|
2112
2167
|
#
|
2113
|
-
#
|
2114
|
-
#
|
2115
|
-
# the key identifier used to perform the operation.
|
2168
|
+
# For dynamic keys, it is the `keyARN` of KEK of the TR-31 wrapped
|
2169
|
+
# PEK. For ECDH, it is the `keyARN` of the asymmetric ECC key.
|
2116
2170
|
# @return [String]
|
2117
2171
|
#
|
2118
2172
|
# @!attribute [rw] outgoing_key_identifier
|
2119
2173
|
# The `keyARN` of the encryption key for encrypting outgoing PIN block
|
2120
2174
|
# data. This key type can be PEK or BDK.
|
2175
|
+
#
|
2176
|
+
# For ECDH, it is the `keyARN` of the asymmetric ECC key.
|
2121
2177
|
# @return [String]
|
2122
2178
|
#
|
2123
2179
|
# @!attribute [rw] incoming_translation_attributes
|
@@ -2557,6 +2613,11 @@ module Aws::PaymentCryptographyData
|
|
2557
2613
|
# The attributes and values for the DUKPT encrypted PIN block data.
|
2558
2614
|
# @return [Types::DukptAttributes]
|
2559
2615
|
#
|
2616
|
+
# @!attribute [rw] encryption_wrapped_key
|
2617
|
+
# Parameter information of a WrappedKeyBlock for encryption key
|
2618
|
+
# exchange.
|
2619
|
+
# @return [Types::WrappedKey]
|
2620
|
+
#
|
2560
2621
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyPinDataInput AWS API Documentation
|
2561
2622
|
#
|
2562
2623
|
class VerifyPinDataInput < Struct.new(
|
@@ -2567,7 +2628,8 @@ module Aws::PaymentCryptographyData
|
|
2567
2628
|
:primary_account_number,
|
2568
2629
|
:pin_block_format,
|
2569
2630
|
:pin_data_length,
|
2570
|
-
:dukpt_attributes
|
2631
|
+
:dukpt_attributes,
|
2632
|
+
:encryption_wrapped_key)
|
2571
2633
|
SENSITIVE = [:encrypted_pin_block, :primary_account_number]
|
2572
2634
|
include Aws::Structure
|
2573
2635
|
end
|
@@ -2782,16 +2844,22 @@ module Aws::PaymentCryptographyData
|
|
2782
2844
|
# The TR-31 wrapped key block.
|
2783
2845
|
# @return [String]
|
2784
2846
|
#
|
2847
|
+
# @!attribute [rw] diffie_hellman_symmetric_key
|
2848
|
+
# The parameter information for deriving a ECDH shared key.
|
2849
|
+
# @return [Types::EcdhDerivationAttributes]
|
2850
|
+
#
|
2785
2851
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/WrappedKeyMaterial AWS API Documentation
|
2786
2852
|
#
|
2787
2853
|
class WrappedKeyMaterial < Struct.new(
|
2788
2854
|
:tr_31_key_block,
|
2855
|
+
:diffie_hellman_symmetric_key,
|
2789
2856
|
:unknown)
|
2790
2857
|
SENSITIVE = [:tr_31_key_block]
|
2791
2858
|
include Aws::Structure
|
2792
2859
|
include Aws::Structure::Union
|
2793
2860
|
|
2794
2861
|
class Tr31KeyBlock < WrappedKeyMaterial; end
|
2862
|
+
class DiffieHellmanSymmetricKey < WrappedKeyMaterial; end
|
2795
2863
|
class Unknown < WrappedKeyMaterial; end
|
2796
2864
|
end
|
2797
2865
|
|
data/sig/client.rbs
CHANGED
@@ -112,7 +112,15 @@ module Aws
|
|
112
112
|
},
|
113
113
|
?wrapped_key: {
|
114
114
|
wrapped_key_material: {
|
115
|
-
tr_31_key_block: ::String
|
115
|
+
tr_31_key_block: ::String?,
|
116
|
+
diffie_hellman_symmetric_key: {
|
117
|
+
certificate_authority_public_key_identifier: ::String,
|
118
|
+
public_key_certificate: ::String,
|
119
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
120
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
121
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
122
|
+
shared_information: ::String
|
123
|
+
}?
|
116
124
|
},
|
117
125
|
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
118
126
|
}
|
@@ -156,7 +164,15 @@ module Aws
|
|
156
164
|
},
|
157
165
|
?wrapped_key: {
|
158
166
|
wrapped_key_material: {
|
159
|
-
tr_31_key_block: ::String
|
167
|
+
tr_31_key_block: ::String?,
|
168
|
+
diffie_hellman_symmetric_key: {
|
169
|
+
certificate_authority_public_key_identifier: ::String,
|
170
|
+
public_key_certificate: ::String,
|
171
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
172
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
173
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
174
|
+
shared_information: ::String
|
175
|
+
}?
|
160
176
|
},
|
161
177
|
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
162
178
|
}
|
@@ -366,7 +382,21 @@ module Aws
|
|
366
382
|
},
|
367
383
|
?pin_data_length: ::Integer,
|
368
384
|
primary_account_number: ::String,
|
369
|
-
pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3")
|
385
|
+
pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3" | "ISO_FORMAT_4"),
|
386
|
+
?encryption_wrapped_key: {
|
387
|
+
wrapped_key_material: {
|
388
|
+
tr_31_key_block: ::String?,
|
389
|
+
diffie_hellman_symmetric_key: {
|
390
|
+
certificate_authority_public_key_identifier: ::String,
|
391
|
+
public_key_certificate: ::String,
|
392
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
393
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
394
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
395
|
+
shared_information: ::String
|
396
|
+
}?
|
397
|
+
},
|
398
|
+
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
399
|
+
}
|
370
400
|
) -> _GeneratePinDataResponseSuccess
|
371
401
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _GeneratePinDataResponseSuccess
|
372
402
|
|
@@ -411,13 +441,29 @@ module Aws
|
|
411
441
|
},
|
412
442
|
?incoming_wrapped_key: {
|
413
443
|
wrapped_key_material: {
|
414
|
-
tr_31_key_block: ::String
|
444
|
+
tr_31_key_block: ::String?,
|
445
|
+
diffie_hellman_symmetric_key: {
|
446
|
+
certificate_authority_public_key_identifier: ::String,
|
447
|
+
public_key_certificate: ::String,
|
448
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
449
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
450
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
451
|
+
shared_information: ::String
|
452
|
+
}?
|
415
453
|
},
|
416
454
|
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
417
455
|
},
|
418
456
|
?outgoing_wrapped_key: {
|
419
457
|
wrapped_key_material: {
|
420
|
-
tr_31_key_block: ::String
|
458
|
+
tr_31_key_block: ::String?,
|
459
|
+
diffie_hellman_symmetric_key: {
|
460
|
+
certificate_authority_public_key_identifier: ::String,
|
461
|
+
public_key_certificate: ::String,
|
462
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
463
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
464
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
465
|
+
shared_information: ::String
|
466
|
+
}?
|
421
467
|
},
|
422
468
|
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
423
469
|
}
|
@@ -473,13 +519,29 @@ module Aws
|
|
473
519
|
},
|
474
520
|
?incoming_wrapped_key: {
|
475
521
|
wrapped_key_material: {
|
476
|
-
tr_31_key_block: ::String
|
522
|
+
tr_31_key_block: ::String?,
|
523
|
+
diffie_hellman_symmetric_key: {
|
524
|
+
certificate_authority_public_key_identifier: ::String,
|
525
|
+
public_key_certificate: ::String,
|
526
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
527
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
528
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
529
|
+
shared_information: ::String
|
530
|
+
}?
|
477
531
|
},
|
478
532
|
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
479
533
|
},
|
480
534
|
?outgoing_wrapped_key: {
|
481
535
|
wrapped_key_material: {
|
482
|
-
tr_31_key_block: ::String
|
536
|
+
tr_31_key_block: ::String?,
|
537
|
+
diffie_hellman_symmetric_key: {
|
538
|
+
certificate_authority_public_key_identifier: ::String,
|
539
|
+
public_key_certificate: ::String,
|
540
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
541
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
542
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
543
|
+
shared_information: ::String
|
544
|
+
}?
|
483
545
|
},
|
484
546
|
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
485
547
|
}
|
@@ -654,11 +716,25 @@ module Aws
|
|
654
716
|
},
|
655
717
|
encrypted_pin_block: ::String,
|
656
718
|
primary_account_number: ::String,
|
657
|
-
pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3"),
|
719
|
+
pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3" | "ISO_FORMAT_4"),
|
658
720
|
?pin_data_length: ::Integer,
|
659
721
|
?dukpt_attributes: {
|
660
722
|
key_serial_number: ::String,
|
661
723
|
dukpt_derivation_type: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256")
|
724
|
+
},
|
725
|
+
?encryption_wrapped_key: {
|
726
|
+
wrapped_key_material: {
|
727
|
+
tr_31_key_block: ::String?,
|
728
|
+
diffie_hellman_symmetric_key: {
|
729
|
+
certificate_authority_public_key_identifier: ::String,
|
730
|
+
public_key_certificate: ::String,
|
731
|
+
key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256"),
|
732
|
+
key_derivation_function: ("NIST_SP800" | "ANSI_X963"),
|
733
|
+
key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512"),
|
734
|
+
shared_information: ::String
|
735
|
+
}?
|
736
|
+
},
|
737
|
+
key_check_value_algorithm: ("CMAC" | "ANSI_X9_24")?
|
662
738
|
}
|
663
739
|
) -> _VerifyPinDataResponseSuccess
|
664
740
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _VerifyPinDataResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -232,6 +232,16 @@ module Aws::PaymentCryptographyData
|
|
232
232
|
SENSITIVE: [:card_expiry_date, :service_code]
|
233
233
|
end
|
234
234
|
|
235
|
+
class EcdhDerivationAttributes
|
236
|
+
attr_accessor certificate_authority_public_key_identifier: ::String
|
237
|
+
attr_accessor public_key_certificate: ::String
|
238
|
+
attr_accessor key_algorithm: ("TDES_2KEY" | "TDES_3KEY" | "AES_128" | "AES_192" | "AES_256")
|
239
|
+
attr_accessor key_derivation_function: ("NIST_SP800" | "ANSI_X963")
|
240
|
+
attr_accessor key_derivation_hash_algorithm: ("SHA_256" | "SHA_384" | "SHA_512")
|
241
|
+
attr_accessor shared_information: ::String
|
242
|
+
SENSITIVE: [:public_key_certificate]
|
243
|
+
end
|
244
|
+
|
235
245
|
class Emv2000Attributes
|
236
246
|
attr_accessor major_key_derivation_mode: ("EMV_OPTION_A" | "EMV_OPTION_B")
|
237
247
|
attr_accessor primary_account_number: ::String
|
@@ -356,7 +366,8 @@ module Aws::PaymentCryptographyData
|
|
356
366
|
attr_accessor generation_attributes: Types::PinGenerationAttributes
|
357
367
|
attr_accessor pin_data_length: ::Integer
|
358
368
|
attr_accessor primary_account_number: ::String
|
359
|
-
attr_accessor pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3")
|
369
|
+
attr_accessor pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3" | "ISO_FORMAT_4")
|
370
|
+
attr_accessor encryption_wrapped_key: Types::WrappedKey
|
360
371
|
SENSITIVE: [:primary_account_number]
|
361
372
|
end
|
362
373
|
|
@@ -752,9 +763,10 @@ module Aws::PaymentCryptographyData
|
|
752
763
|
attr_accessor verification_attributes: Types::PinVerificationAttributes
|
753
764
|
attr_accessor encrypted_pin_block: ::String
|
754
765
|
attr_accessor primary_account_number: ::String
|
755
|
-
attr_accessor pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3")
|
766
|
+
attr_accessor pin_block_format: ("ISO_FORMAT_0" | "ISO_FORMAT_3" | "ISO_FORMAT_4")
|
756
767
|
attr_accessor pin_data_length: ::Integer
|
757
768
|
attr_accessor dukpt_attributes: Types::DukptAttributes
|
769
|
+
attr_accessor encryption_wrapped_key: Types::WrappedKey
|
758
770
|
SENSITIVE: [:encrypted_pin_block, :primary_account_number]
|
759
771
|
end
|
760
772
|
|
@@ -809,11 +821,14 @@ module Aws::PaymentCryptographyData
|
|
809
821
|
|
810
822
|
class WrappedKeyMaterial
|
811
823
|
attr_accessor tr_31_key_block: ::String
|
824
|
+
attr_accessor diffie_hellman_symmetric_key: Types::EcdhDerivationAttributes
|
812
825
|
attr_accessor unknown: untyped
|
813
826
|
SENSITIVE: [:tr_31_key_block]
|
814
827
|
|
815
828
|
class Tr31KeyBlock < WrappedKeyMaterial
|
816
829
|
end
|
830
|
+
class DiffieHellmanSymmetricKey < WrappedKeyMaterial
|
831
|
+
end
|
817
832
|
class Unknown < WrappedKeyMaterial
|
818
833
|
end
|
819
834
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-paymentcryptographydata
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.27.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-10-
|
11
|
+
date: 2024-10-23 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|