aws-sdk-paymentcryptographydata 1.8.0 → 1.10.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0d246f10d283f4f8857b8bfbe662357345223b14850138a60fc1c6cebd957522
4
- data.tar.gz: a9a377a805c22c02fb302b3680c86d585117c2514f511a29a723c9a9c33206d7
3
+ metadata.gz: 6126989706af46778cf434cc347a8c7d3612827a1001706d0e213e05d5cd9612
4
+ data.tar.gz: a8a99a810c24b25b8ba1b9f30b7fc03d295cb426c41ff77e207dfe888a3654b9
5
5
  SHA512:
6
- metadata.gz: 739f357152f8f65838bb76ad63be89705143827b640d203e7ff3f03c199e9e404e763713aa912fa5d201d00ecb54b0574202964140ecbfbdeb528134c828f812
7
- data.tar.gz: 8b12c6514700ff200a93c37683d5d989f6aa041adc50015963ef4388a65da42d6c2ced1411464b2338e456f99c63427259e059c4bca47ea8d1a20c03e705bf7b
6
+ metadata.gz: 1c69e8560dd194bdfaf4d56ae5ffaaeb3b00fd4a79531eae91657eb4d8095c469d9bb8ec5b19820ce97c8c179abc57351f132fa829bb9ff336c6a5664eadade1
7
+ data.tar.gz: d274c07082e1aa888f464d77ab4aa465a6a479a276b07537752850fa537d2601994e2a383974a57d80ca1f3605f9e6beaacf910df91f8252dab7c11380ad41dd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.10.0 (2024-03-07)
5
+ ------------------
6
+
7
+ * Feature - AWS Payment Cryptography EMV Decrypt Feature Release
8
+
9
+ 1.9.0 (2024-01-26)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.8.0 (2023-11-28)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.8.0
1
+ 1.10.0
@@ -388,9 +388,10 @@ module Aws::PaymentCryptographyData
388
388
 
389
389
  # @!group API Operations
390
390
 
391
- # Decrypts ciphertext data to plaintext using symmetric, asymmetric, or
392
- # DUKPT data encryption key. For more information, see [Decrypt data][1]
393
- # in the *Amazon Web Services Payment Cryptography User Guide*.
391
+ # Decrypts ciphertext data to plaintext using a symmetric (TDES, AES),
392
+ # asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
393
+ # more information, see [Decrypt data][1] in the *Amazon Web Services
394
+ # Payment Cryptography User Guide*.
394
395
  #
395
396
  # You can use an encryption key generated within Amazon Web Services
396
397
  # Payment Cryptography, or you can import your own encryption key by
@@ -403,11 +404,15 @@ module Aws::PaymentCryptographyData
403
404
  # [GetPublicCertificate][3].
404
405
  #
405
406
  # For symmetric and DUKPT decryption, Amazon Web Services Payment
406
- # Cryptography supports `TDES` and `AES` algorithms. For asymmetric
407
- # decryption, Amazon Web Services Payment Cryptography supports `RSA`.
408
- # When you use DUKPT, for `TDES` algorithm, the ciphertext data length
409
- # must be a multiple of 16 bytes. For `AES` algorithm, the ciphertext
410
- # data length must be a multiple of 32 bytes.
407
+ # Cryptography supports `TDES` and `AES` algorithms. For EMV decryption,
408
+ # Amazon Web Services Payment Cryptography supports `TDES` algorithms.
409
+ # For asymmetric decryption, Amazon Web Services Payment Cryptography
410
+ # supports `RSA`.
411
+ #
412
+ # When you use TDES or TDES DUKPT, the ciphertext data length must be a
413
+ # multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length
414
+ # must be a multiple of 16 bytes. For RSA, it sould be equal to the key
415
+ # size unless padding is enabled.
411
416
  #
412
417
  # For information about valid keys for this operation, see
413
418
  # [Understanding key attributes][4] and [Key types for specific data
@@ -464,6 +469,14 @@ module Aws::PaymentCryptographyData
464
469
  # key_serial_number: "HexLengthBetween10And24", # required
465
470
  # mode: "ECB", # accepts ECB, CBC
466
471
  # },
472
+ # emv: {
473
+ # initialization_vector: "HexLength16Or32",
474
+ # major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
475
+ # mode: "ECB", # accepts ECB, CBC
476
+ # pan_sequence_number: "HexLengthEquals2", # required
477
+ # primary_account_number: "NumberLengthBetween12And19", # required
478
+ # session_derivation_data: "HexLengthEquals16", # required
479
+ # },
467
480
  # symmetric: {
468
481
  # initialization_vector: "HexLength16Or32",
469
482
  # mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
@@ -488,9 +501,10 @@ module Aws::PaymentCryptographyData
488
501
  req.send_request(options)
489
502
  end
490
503
 
491
- # Encrypts plaintext data to ciphertext using symmetric, asymmetric, or
492
- # DUKPT data encryption key. For more information, see [Encrypt data][1]
493
- # in the *Amazon Web Services Payment Cryptography User Guide*.
504
+ # Encrypts plaintext data to ciphertext using a symmetric (TDES, AES),
505
+ # asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
506
+ # more information, see [Encrypt data][1] in the *Amazon Web Services
507
+ # Payment Cryptography User Guide*.
494
508
  #
495
509
  # You can generate an encryption key within Amazon Web Services Payment
496
510
  # Cryptography by calling [CreateKey][2]. You can import your own
@@ -498,14 +512,24 @@ module Aws::PaymentCryptographyData
498
512
  # must have `KeyModesOfUse` set to `Encrypt`. In asymmetric encryption,
499
513
  # plaintext is encrypted using public component. You can import the
500
514
  # public component of an asymmetric key pair created outside Amazon Web
501
- # Services Payment Cryptography by calling [ImportKey][3]).
515
+ # Services Payment Cryptography by calling [ImportKey][3].
502
516
  #
503
- # for symmetric and DUKPT encryption, Amazon Web Services Payment
504
- # Cryptography supports `TDES` and `AES` algorithms. For asymmetric
505
- # encryption, Amazon Web Services Payment Cryptography supports `RSA`.
506
- # To encrypt using DUKPT, you must already have a DUKPT key in your
507
- # account with `KeyModesOfUse` set to `DeriveKey`, or you can generate a
508
- # new DUKPT key by calling [CreateKey][2].
517
+ # For symmetric and DUKPT encryption, Amazon Web Services Payment
518
+ # Cryptography supports `TDES` and `AES` algorithms. For EMV encryption,
519
+ # Amazon Web Services Payment Cryptography supports `TDES`
520
+ # algorithms.For asymmetric encryption, Amazon Web Services Payment
521
+ # Cryptography supports `RSA`.
522
+ #
523
+ # When you use TDES or TDES DUKPT, the plaintext data length must be a
524
+ # multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length
525
+ # must be a multiple of 16 bytes. For RSA, it sould be equal to the key
526
+ # size unless padding is enabled.
527
+ #
528
+ # To encrypt using DUKPT, you must already have a BDK (Base Derivation
529
+ # Key) key in your account with `KeyModesOfUse` set to `DeriveKey`, or
530
+ # you can generate a new DUKPT key by calling [CreateKey][2]. To encrypt
531
+ # using EMV, you must already have an IMK (Issuer Master Key) key in
532
+ # your account with `KeyModesOfUse` set to `DeriveKey`.
509
533
  #
510
534
  # For information about valid keys for this operation, see
511
535
  # [Understanding key attributes][4] and [Key types for specific data
@@ -544,6 +568,18 @@ module Aws::PaymentCryptographyData
544
568
  # @option params [required, String] :plain_text
545
569
  # The plaintext to be encrypted.
546
570
  #
571
+ # <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
572
+ # constrained by encryption key strength that you define in
573
+ # `KeyAlgorithm` and padding type that you define in
574
+ # `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
575
+ # data][1] in the *Amazon Web Services Payment Cryptography User Guide*.
576
+ #
577
+ # </note>
578
+ #
579
+ #
580
+ #
581
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
582
+ #
547
583
  # @return [Types::EncryptDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
548
584
  #
549
585
  # * {Types::EncryptDataOutput#cipher_text #cipher_text} => String
@@ -564,6 +600,14 @@ module Aws::PaymentCryptographyData
564
600
  # key_serial_number: "HexLengthBetween10And24", # required
565
601
  # mode: "ECB", # accepts ECB, CBC
566
602
  # },
603
+ # emv: {
604
+ # initialization_vector: "HexLength16Or32",
605
+ # major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
606
+ # mode: "ECB", # accepts ECB, CBC
607
+ # pan_sequence_number: "HexLengthEquals2", # required
608
+ # primary_account_number: "NumberLengthBetween12And19", # required
609
+ # session_derivation_data: "HexLengthEquals16", # required
610
+ # },
567
611
  # symmetric: {
568
612
  # initialization_vector: "HexLength16Or32",
569
613
  # mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
@@ -708,15 +752,19 @@ module Aws::PaymentCryptographyData
708
752
  # Generates a Message Authentication Code (MAC) cryptogram within Amazon
709
753
  # Web Services Payment Cryptography.
710
754
  #
711
- # You can use this operation when keys won't be shared but mutual data
712
- # is present on both ends for validation. In this case, known data
713
- # values are used to generate a MAC on both ends for comparision without
714
- # sending or receiving data in ciphertext or plaintext. You can use this
715
- # operation to generate a DUPKT, HMAC or EMV MAC by setting generation
716
- # attributes and algorithm to the associated values. The MAC generation
717
- # encryption key must have valid values for `KeyUsage` such as
718
- # `TR31_M7_HMAC_KEY` for HMAC generation, and they key must have
719
- # `KeyModesOfUse` set to `Generate` and `Verify`.
755
+ # You can use this operation to authenticate card-related data by using
756
+ # known data values to generate MAC for data validation between the
757
+ # sending and receiving parties. This operation uses message data, a
758
+ # secret encryption key and MAC algorithm to generate a unique MAC value
759
+ # for transmission. The receiving party of the MAC must use the same
760
+ # message data, secret encryption key and MAC algorithm to reproduce
761
+ # another MAC value for comparision.
762
+ #
763
+ # You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC
764
+ # by setting generation attributes and algorithm to the associated
765
+ # values. The MAC generation encryption key must have valid values for
766
+ # `KeyUsage` such as `TR31_M7_HMAC_KEY` for HMAC generation, and they
767
+ # key must have `KeyModesOfUse` set to `Generate` and `Verify`.
720
768
  #
721
769
  # For information about valid keys for this operation, see
722
770
  # [Understanding key attributes][1] and [Key types for specific data
@@ -748,7 +796,8 @@ module Aws::PaymentCryptographyData
748
796
  # The length of a MAC under generation.
749
797
  #
750
798
  # @option params [required, String] :message_data
751
- # The data for which a MAC is under generation.
799
+ # The data for which a MAC is under generation. This value must be
800
+ # hexBinary.
752
801
  #
753
802
  # @return [Types::GenerateMacOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
754
803
  #
@@ -1073,10 +1122,7 @@ module Aws::PaymentCryptographyData
1073
1122
  # can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for
1074
1123
  # DUKPT or from BDK for DUKPT to PEK. Amazon Web Services Payment
1075
1124
  # Cryptography supports `TDES` and `AES` key derivation type for DUKPT
1076
- # tranlations. You can use this operation for P2PE (Point to Point
1077
- # Encryption) use cases where the encryption keys should change but the
1078
- # processing system either does not need to, or is not permitted to,
1079
- # decrypt the data.
1125
+ # translations.
1080
1126
  #
1081
1127
  # The allowed combinations of PIN block format translations are guided
1082
1128
  # by PCI. It is important to note that not all encrypted PIN block
@@ -1090,8 +1136,9 @@ module Aws::PaymentCryptographyData
1090
1136
  # operations][3] in the *Amazon Web Services Payment Cryptography User
1091
1137
  # Guide*.
1092
1138
  #
1093
- # <note markdown="1"> At this time, Amazon Web Services Payment Cryptography does not
1094
- # support translations to PIN format 4.
1139
+ # <note markdown="1"> Amazon Web Services Payment Cryptography currently supports ISO PIN
1140
+ # block 4 translation for PIN block built using legacy PAN length. That
1141
+ # is, PAN is the right most 12 digits excluding the check digits.
1095
1142
  #
1096
1143
  # </note>
1097
1144
  #
@@ -1116,15 +1163,15 @@ module Aws::PaymentCryptographyData
1116
1163
  #
1117
1164
  # @option params [Types::DukptDerivationAttributes] :incoming_dukpt_attributes
1118
1165
  # The attributes and values to use for incoming DUKPT encryption key for
1119
- # PIN block tranlation.
1166
+ # PIN block translation.
1120
1167
  #
1121
1168
  # @option params [required, String] :incoming_key_identifier
1122
1169
  # The `keyARN` of the encryption key under which incoming PIN block data
1123
1170
  # is encrypted. This key type can be PEK or BDK.
1124
1171
  #
1125
1172
  # @option params [required, Types::TranslationIsoFormats] :incoming_translation_attributes
1126
- # The format of the incoming PIN block data for tranlation within Amazon
1127
- # Web Services Payment Cryptography.
1173
+ # The format of the incoming PIN block data for translation within
1174
+ # Amazon Web Services Payment Cryptography.
1128
1175
  #
1129
1176
  # @option params [Types::DukptDerivationAttributes] :outgoing_dukpt_attributes
1130
1177
  # The attributes and values to use for outgoing DUKPT encryption key
@@ -1135,7 +1182,7 @@ module Aws::PaymentCryptographyData
1135
1182
  # data. This key type can be PEK or BDK.
1136
1183
  #
1137
1184
  # @option params [required, Types::TranslationIsoFormats] :outgoing_translation_attributes
1138
- # The format of the outgoing PIN block data after tranlation by Amazon
1185
+ # The format of the outgoing PIN block data after translation by Amazon
1139
1186
  # Web Services Payment Cryptography.
1140
1187
  #
1141
1188
  # @return [Types::TranslatePinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -1460,13 +1507,12 @@ module Aws::PaymentCryptographyData
1460
1507
 
1461
1508
  # Verifies a Message Authentication Code (MAC).
1462
1509
  #
1463
- # You can use this operation when keys won't be shared but mutual data
1464
- # is present on both ends for validation. In this case, known data
1465
- # values are used to generate a MAC on both ends for verification
1466
- # without sending or receiving data in ciphertext or plaintext. You can
1467
- # use this operation to verify a DUPKT, HMAC or EMV MAC by setting
1468
- # generation attributes and algorithm to the associated values. Use the
1469
- # same encryption key for MAC verification as you use for GenerateMac.
1510
+ # You can use this operation to verify MAC for message data
1511
+ # authentication such as . In this operation, you must use the same
1512
+ # message data, secret encryption key and MAC algorithm that was used to
1513
+ # generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC
1514
+ # or EMV MAC by setting generation attributes and algorithm to the
1515
+ # associated values.
1470
1516
  #
1471
1517
  # For information about valid keys for this operation, see
1472
1518
  # [Understanding key attributes][1] and [Key types for specific data
@@ -1498,7 +1544,8 @@ module Aws::PaymentCryptographyData
1498
1544
  # The length of the MAC.
1499
1545
  #
1500
1546
  # @option params [required, String] :message_data
1501
- # The data on for which MAC is under verification.
1547
+ # The data on for which MAC is under verification. This value must be
1548
+ # hexBinary.
1502
1549
  #
1503
1550
  # @option params [required, Types::MacAttributes] :verification_attributes
1504
1551
  # The attributes and data values to use for MAC verification within
@@ -1691,7 +1738,7 @@ module Aws::PaymentCryptographyData
1691
1738
  params: params,
1692
1739
  config: config)
1693
1740
  context[:gem_name] = 'aws-sdk-paymentcryptographydata'
1694
- context[:gem_version] = '1.8.0'
1741
+ context[:gem_version] = '1.10.0'
1695
1742
  Seahorse::Client::Request.new(handlers, context)
1696
1743
  end
1697
1744
 
@@ -36,6 +36,9 @@ module Aws::PaymentCryptographyData
36
36
  DukptKeyVariant = Shapes::StringShape.new(name: 'DukptKeyVariant')
37
37
  DynamicCardVerificationCode = Shapes::StructureShape.new(name: 'DynamicCardVerificationCode')
38
38
  DynamicCardVerificationValue = Shapes::StructureShape.new(name: 'DynamicCardVerificationValue')
39
+ EmvEncryptionAttributes = Shapes::StructureShape.new(name: 'EmvEncryptionAttributes')
40
+ EmvEncryptionMode = Shapes::StringShape.new(name: 'EmvEncryptionMode')
41
+ EmvMajorKeyDerivationMode = Shapes::StringShape.new(name: 'EmvMajorKeyDerivationMode')
39
42
  EncryptDataInput = Shapes::StructureShape.new(name: 'EncryptDataInput')
40
43
  EncryptDataOutput = Shapes::StructureShape.new(name: 'EncryptDataOutput')
41
44
  EncryptionDecryptionAttributes = Shapes::UnionShape.new(name: 'EncryptionDecryptionAttributes')
@@ -253,6 +256,14 @@ module Aws::PaymentCryptographyData
253
256
  DynamicCardVerificationValue.add_member(:service_code, Shapes::ShapeRef.new(shape: NumberLengthEquals3, required: true, location_name: "ServiceCode"))
254
257
  DynamicCardVerificationValue.struct_class = Types::DynamicCardVerificationValue
255
258
 
259
+ EmvEncryptionAttributes.add_member(:initialization_vector, Shapes::ShapeRef.new(shape: HexLength16Or32, location_name: "InitializationVector"))
260
+ EmvEncryptionAttributes.add_member(:major_key_derivation_mode, Shapes::ShapeRef.new(shape: EmvMajorKeyDerivationMode, required: true, location_name: "MajorKeyDerivationMode"))
261
+ EmvEncryptionAttributes.add_member(:mode, Shapes::ShapeRef.new(shape: EmvEncryptionMode, location_name: "Mode"))
262
+ EmvEncryptionAttributes.add_member(:pan_sequence_number, Shapes::ShapeRef.new(shape: HexLengthEquals2, required: true, location_name: "PanSequenceNumber"))
263
+ EmvEncryptionAttributes.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
264
+ EmvEncryptionAttributes.add_member(:session_derivation_data, Shapes::ShapeRef.new(shape: HexLengthEquals16, required: true, location_name: "SessionDerivationData"))
265
+ EmvEncryptionAttributes.struct_class = Types::EmvEncryptionAttributes
266
+
256
267
  EncryptDataInput.add_member(:encryption_attributes, Shapes::ShapeRef.new(shape: EncryptionDecryptionAttributes, required: true, location_name: "EncryptionAttributes"))
257
268
  EncryptDataInput.add_member(:key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location: "uri", location_name: "KeyIdentifier"))
258
269
  EncryptDataInput.add_member(:plain_text, Shapes::ShapeRef.new(shape: HexEvenLengthBetween16And4064, required: true, location_name: "PlainText"))
@@ -265,10 +276,12 @@ module Aws::PaymentCryptographyData
265
276
 
266
277
  EncryptionDecryptionAttributes.add_member(:asymmetric, Shapes::ShapeRef.new(shape: AsymmetricEncryptionAttributes, location_name: "Asymmetric"))
267
278
  EncryptionDecryptionAttributes.add_member(:dukpt, Shapes::ShapeRef.new(shape: DukptEncryptionAttributes, location_name: "Dukpt"))
279
+ EncryptionDecryptionAttributes.add_member(:emv, Shapes::ShapeRef.new(shape: EmvEncryptionAttributes, location_name: "Emv"))
268
280
  EncryptionDecryptionAttributes.add_member(:symmetric, Shapes::ShapeRef.new(shape: SymmetricEncryptionAttributes, location_name: "Symmetric"))
269
281
  EncryptionDecryptionAttributes.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
270
282
  EncryptionDecryptionAttributes.add_member_subclass(:asymmetric, Types::EncryptionDecryptionAttributes::Asymmetric)
271
283
  EncryptionDecryptionAttributes.add_member_subclass(:dukpt, Types::EncryptionDecryptionAttributes::Dukpt)
284
+ EncryptionDecryptionAttributes.add_member_subclass(:emv, Types::EncryptionDecryptionAttributes::Emv)
272
285
  EncryptionDecryptionAttributes.add_member_subclass(:symmetric, Types::EncryptionDecryptionAttributes::Symmetric)
273
286
  EncryptionDecryptionAttributes.add_member_subclass(:unknown, Types::EncryptionDecryptionAttributes::Unknown)
274
287
  EncryptionDecryptionAttributes.struct_class = Types::EncryptionDecryptionAttributes
@@ -299,7 +312,7 @@ module Aws::PaymentCryptographyData
299
312
  GeneratePinDataInput.add_member(:generation_attributes, Shapes::ShapeRef.new(shape: PinGenerationAttributes, required: true, location_name: "GenerationAttributes"))
300
313
  GeneratePinDataInput.add_member(:generation_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "GenerationKeyIdentifier"))
301
314
  GeneratePinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
302
- GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength", metadata: {"box"=>true}))
315
+ GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
303
316
  GeneratePinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
304
317
  GeneratePinDataInput.struct_class = Types::GeneratePinDataInput
305
318
 
@@ -560,7 +573,7 @@ module Aws::PaymentCryptographyData
560
573
  VerifyPinDataInput.add_member(:encrypted_pin_block, Shapes::ShapeRef.new(shape: HexLengthBetween16And32, required: true, location_name: "EncryptedPinBlock"))
561
574
  VerifyPinDataInput.add_member(:encryption_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "EncryptionKeyIdentifier"))
562
575
  VerifyPinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
563
- VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength", metadata: {"box"=>true}))
576
+ VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
564
577
  VerifyPinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
565
578
  VerifyPinDataInput.add_member(:verification_attributes, Shapes::ShapeRef.new(shape: PinVerificationAttributes, required: true, location_name: "VerificationAttributes"))
566
579
  VerifyPinDataInput.add_member(:verification_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "VerificationKeyIdentifier"))
@@ -32,7 +32,7 @@ module Aws::PaymentCryptographyData
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
34
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
36
36
  return Aws::Endpoints::Endpoint.new(url: "https://dataplane.payment-cryptography-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
37
  end
38
38
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
@@ -14,6 +14,7 @@ module Aws::PaymentCryptographyData
14
14
  option(
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::PaymentCryptographyData::EndpointProvider',
17
+ rbs_type: 'untyped',
17
18
  docstring: 'The endpoint provider used to resolve endpoints. Any '\
18
19
  'object that responds to `#resolve_endpoint(parameters)` '\
19
20
  'where `parameters` is a Struct similar to '\