aws-sdk-paymentcryptographydata 1.8.0 → 1.10.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0d246f10d283f4f8857b8bfbe662357345223b14850138a60fc1c6cebd957522
4
- data.tar.gz: a9a377a805c22c02fb302b3680c86d585117c2514f511a29a723c9a9c33206d7
3
+ metadata.gz: 6126989706af46778cf434cc347a8c7d3612827a1001706d0e213e05d5cd9612
4
+ data.tar.gz: a8a99a810c24b25b8ba1b9f30b7fc03d295cb426c41ff77e207dfe888a3654b9
5
5
  SHA512:
6
- metadata.gz: 739f357152f8f65838bb76ad63be89705143827b640d203e7ff3f03c199e9e404e763713aa912fa5d201d00ecb54b0574202964140ecbfbdeb528134c828f812
7
- data.tar.gz: 8b12c6514700ff200a93c37683d5d989f6aa041adc50015963ef4388a65da42d6c2ced1411464b2338e456f99c63427259e059c4bca47ea8d1a20c03e705bf7b
6
+ metadata.gz: 1c69e8560dd194bdfaf4d56ae5ffaaeb3b00fd4a79531eae91657eb4d8095c469d9bb8ec5b19820ce97c8c179abc57351f132fa829bb9ff336c6a5664eadade1
7
+ data.tar.gz: d274c07082e1aa888f464d77ab4aa465a6a479a276b07537752850fa537d2601994e2a383974a57d80ca1f3605f9e6beaacf910df91f8252dab7c11380ad41dd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.10.0 (2024-03-07)
5
+ ------------------
6
+
7
+ * Feature - AWS Payment Cryptography EMV Decrypt Feature Release
8
+
9
+ 1.9.0 (2024-01-26)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.8.0 (2023-11-28)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.8.0
1
+ 1.10.0
@@ -388,9 +388,10 @@ module Aws::PaymentCryptographyData
388
388
 
389
389
  # @!group API Operations
390
390
 
391
- # Decrypts ciphertext data to plaintext using symmetric, asymmetric, or
392
- # DUKPT data encryption key. For more information, see [Decrypt data][1]
393
- # in the *Amazon Web Services Payment Cryptography User Guide*.
391
+ # Decrypts ciphertext data to plaintext using a symmetric (TDES, AES),
392
+ # asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
393
+ # more information, see [Decrypt data][1] in the *Amazon Web Services
394
+ # Payment Cryptography User Guide*.
394
395
  #
395
396
  # You can use an encryption key generated within Amazon Web Services
396
397
  # Payment Cryptography, or you can import your own encryption key by
@@ -403,11 +404,15 @@ module Aws::PaymentCryptographyData
403
404
  # [GetPublicCertificate][3].
404
405
  #
405
406
  # For symmetric and DUKPT decryption, Amazon Web Services Payment
406
- # Cryptography supports `TDES` and `AES` algorithms. For asymmetric
407
- # decryption, Amazon Web Services Payment Cryptography supports `RSA`.
408
- # When you use DUKPT, for `TDES` algorithm, the ciphertext data length
409
- # must be a multiple of 16 bytes. For `AES` algorithm, the ciphertext
410
- # data length must be a multiple of 32 bytes.
407
+ # Cryptography supports `TDES` and `AES` algorithms. For EMV decryption,
408
+ # Amazon Web Services Payment Cryptography supports `TDES` algorithms.
409
+ # For asymmetric decryption, Amazon Web Services Payment Cryptography
410
+ # supports `RSA`.
411
+ #
412
+ # When you use TDES or TDES DUKPT, the ciphertext data length must be a
413
+ # multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length
414
+ # must be a multiple of 16 bytes. For RSA, it sould be equal to the key
415
+ # size unless padding is enabled.
411
416
  #
412
417
  # For information about valid keys for this operation, see
413
418
  # [Understanding key attributes][4] and [Key types for specific data
@@ -464,6 +469,14 @@ module Aws::PaymentCryptographyData
464
469
  # key_serial_number: "HexLengthBetween10And24", # required
465
470
  # mode: "ECB", # accepts ECB, CBC
466
471
  # },
472
+ # emv: {
473
+ # initialization_vector: "HexLength16Or32",
474
+ # major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
475
+ # mode: "ECB", # accepts ECB, CBC
476
+ # pan_sequence_number: "HexLengthEquals2", # required
477
+ # primary_account_number: "NumberLengthBetween12And19", # required
478
+ # session_derivation_data: "HexLengthEquals16", # required
479
+ # },
467
480
  # symmetric: {
468
481
  # initialization_vector: "HexLength16Or32",
469
482
  # mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
@@ -488,9 +501,10 @@ module Aws::PaymentCryptographyData
488
501
  req.send_request(options)
489
502
  end
490
503
 
491
- # Encrypts plaintext data to ciphertext using symmetric, asymmetric, or
492
- # DUKPT data encryption key. For more information, see [Encrypt data][1]
493
- # in the *Amazon Web Services Payment Cryptography User Guide*.
504
+ # Encrypts plaintext data to ciphertext using a symmetric (TDES, AES),
505
+ # asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
506
+ # more information, see [Encrypt data][1] in the *Amazon Web Services
507
+ # Payment Cryptography User Guide*.
494
508
  #
495
509
  # You can generate an encryption key within Amazon Web Services Payment
496
510
  # Cryptography by calling [CreateKey][2]. You can import your own
@@ -498,14 +512,24 @@ module Aws::PaymentCryptographyData
498
512
  # must have `KeyModesOfUse` set to `Encrypt`. In asymmetric encryption,
499
513
  # plaintext is encrypted using public component. You can import the
500
514
  # public component of an asymmetric key pair created outside Amazon Web
501
- # Services Payment Cryptography by calling [ImportKey][3]).
515
+ # Services Payment Cryptography by calling [ImportKey][3].
502
516
  #
503
- # for symmetric and DUKPT encryption, Amazon Web Services Payment
504
- # Cryptography supports `TDES` and `AES` algorithms. For asymmetric
505
- # encryption, Amazon Web Services Payment Cryptography supports `RSA`.
506
- # To encrypt using DUKPT, you must already have a DUKPT key in your
507
- # account with `KeyModesOfUse` set to `DeriveKey`, or you can generate a
508
- # new DUKPT key by calling [CreateKey][2].
517
+ # For symmetric and DUKPT encryption, Amazon Web Services Payment
518
+ # Cryptography supports `TDES` and `AES` algorithms. For EMV encryption,
519
+ # Amazon Web Services Payment Cryptography supports `TDES`
520
+ # algorithms.For asymmetric encryption, Amazon Web Services Payment
521
+ # Cryptography supports `RSA`.
522
+ #
523
+ # When you use TDES or TDES DUKPT, the plaintext data length must be a
524
+ # multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length
525
+ # must be a multiple of 16 bytes. For RSA, it sould be equal to the key
526
+ # size unless padding is enabled.
527
+ #
528
+ # To encrypt using DUKPT, you must already have a BDK (Base Derivation
529
+ # Key) key in your account with `KeyModesOfUse` set to `DeriveKey`, or
530
+ # you can generate a new DUKPT key by calling [CreateKey][2]. To encrypt
531
+ # using EMV, you must already have an IMK (Issuer Master Key) key in
532
+ # your account with `KeyModesOfUse` set to `DeriveKey`.
509
533
  #
510
534
  # For information about valid keys for this operation, see
511
535
  # [Understanding key attributes][4] and [Key types for specific data
@@ -544,6 +568,18 @@ module Aws::PaymentCryptographyData
544
568
  # @option params [required, String] :plain_text
545
569
  # The plaintext to be encrypted.
546
570
  #
571
+ # <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
572
+ # constrained by encryption key strength that you define in
573
+ # `KeyAlgorithm` and padding type that you define in
574
+ # `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
575
+ # data][1] in the *Amazon Web Services Payment Cryptography User Guide*.
576
+ #
577
+ # </note>
578
+ #
579
+ #
580
+ #
581
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
582
+ #
547
583
  # @return [Types::EncryptDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
548
584
  #
549
585
  # * {Types::EncryptDataOutput#cipher_text #cipher_text} => String
@@ -564,6 +600,14 @@ module Aws::PaymentCryptographyData
564
600
  # key_serial_number: "HexLengthBetween10And24", # required
565
601
  # mode: "ECB", # accepts ECB, CBC
566
602
  # },
603
+ # emv: {
604
+ # initialization_vector: "HexLength16Or32",
605
+ # major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
606
+ # mode: "ECB", # accepts ECB, CBC
607
+ # pan_sequence_number: "HexLengthEquals2", # required
608
+ # primary_account_number: "NumberLengthBetween12And19", # required
609
+ # session_derivation_data: "HexLengthEquals16", # required
610
+ # },
567
611
  # symmetric: {
568
612
  # initialization_vector: "HexLength16Or32",
569
613
  # mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
@@ -708,15 +752,19 @@ module Aws::PaymentCryptographyData
708
752
  # Generates a Message Authentication Code (MAC) cryptogram within Amazon
709
753
  # Web Services Payment Cryptography.
710
754
  #
711
- # You can use this operation when keys won't be shared but mutual data
712
- # is present on both ends for validation. In this case, known data
713
- # values are used to generate a MAC on both ends for comparision without
714
- # sending or receiving data in ciphertext or plaintext. You can use this
715
- # operation to generate a DUPKT, HMAC or EMV MAC by setting generation
716
- # attributes and algorithm to the associated values. The MAC generation
717
- # encryption key must have valid values for `KeyUsage` such as
718
- # `TR31_M7_HMAC_KEY` for HMAC generation, and they key must have
719
- # `KeyModesOfUse` set to `Generate` and `Verify`.
755
+ # You can use this operation to authenticate card-related data by using
756
+ # known data values to generate MAC for data validation between the
757
+ # sending and receiving parties. This operation uses message data, a
758
+ # secret encryption key and MAC algorithm to generate a unique MAC value
759
+ # for transmission. The receiving party of the MAC must use the same
760
+ # message data, secret encryption key and MAC algorithm to reproduce
761
+ # another MAC value for comparision.
762
+ #
763
+ # You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC
764
+ # by setting generation attributes and algorithm to the associated
765
+ # values. The MAC generation encryption key must have valid values for
766
+ # `KeyUsage` such as `TR31_M7_HMAC_KEY` for HMAC generation, and they
767
+ # key must have `KeyModesOfUse` set to `Generate` and `Verify`.
720
768
  #
721
769
  # For information about valid keys for this operation, see
722
770
  # [Understanding key attributes][1] and [Key types for specific data
@@ -748,7 +796,8 @@ module Aws::PaymentCryptographyData
748
796
  # The length of a MAC under generation.
749
797
  #
750
798
  # @option params [required, String] :message_data
751
- # The data for which a MAC is under generation.
799
+ # The data for which a MAC is under generation. This value must be
800
+ # hexBinary.
752
801
  #
753
802
  # @return [Types::GenerateMacOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
754
803
  #
@@ -1073,10 +1122,7 @@ module Aws::PaymentCryptographyData
1073
1122
  # can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for
1074
1123
  # DUKPT or from BDK for DUKPT to PEK. Amazon Web Services Payment
1075
1124
  # Cryptography supports `TDES` and `AES` key derivation type for DUKPT
1076
- # tranlations. You can use this operation for P2PE (Point to Point
1077
- # Encryption) use cases where the encryption keys should change but the
1078
- # processing system either does not need to, or is not permitted to,
1079
- # decrypt the data.
1125
+ # translations.
1080
1126
  #
1081
1127
  # The allowed combinations of PIN block format translations are guided
1082
1128
  # by PCI. It is important to note that not all encrypted PIN block
@@ -1090,8 +1136,9 @@ module Aws::PaymentCryptographyData
1090
1136
  # operations][3] in the *Amazon Web Services Payment Cryptography User
1091
1137
  # Guide*.
1092
1138
  #
1093
- # <note markdown="1"> At this time, Amazon Web Services Payment Cryptography does not
1094
- # support translations to PIN format 4.
1139
+ # <note markdown="1"> Amazon Web Services Payment Cryptography currently supports ISO PIN
1140
+ # block 4 translation for PIN block built using legacy PAN length. That
1141
+ # is, PAN is the right most 12 digits excluding the check digits.
1095
1142
  #
1096
1143
  # </note>
1097
1144
  #
@@ -1116,15 +1163,15 @@ module Aws::PaymentCryptographyData
1116
1163
  #
1117
1164
  # @option params [Types::DukptDerivationAttributes] :incoming_dukpt_attributes
1118
1165
  # The attributes and values to use for incoming DUKPT encryption key for
1119
- # PIN block tranlation.
1166
+ # PIN block translation.
1120
1167
  #
1121
1168
  # @option params [required, String] :incoming_key_identifier
1122
1169
  # The `keyARN` of the encryption key under which incoming PIN block data
1123
1170
  # is encrypted. This key type can be PEK or BDK.
1124
1171
  #
1125
1172
  # @option params [required, Types::TranslationIsoFormats] :incoming_translation_attributes
1126
- # The format of the incoming PIN block data for tranlation within Amazon
1127
- # Web Services Payment Cryptography.
1173
+ # The format of the incoming PIN block data for translation within
1174
+ # Amazon Web Services Payment Cryptography.
1128
1175
  #
1129
1176
  # @option params [Types::DukptDerivationAttributes] :outgoing_dukpt_attributes
1130
1177
  # The attributes and values to use for outgoing DUKPT encryption key
@@ -1135,7 +1182,7 @@ module Aws::PaymentCryptographyData
1135
1182
  # data. This key type can be PEK or BDK.
1136
1183
  #
1137
1184
  # @option params [required, Types::TranslationIsoFormats] :outgoing_translation_attributes
1138
- # The format of the outgoing PIN block data after tranlation by Amazon
1185
+ # The format of the outgoing PIN block data after translation by Amazon
1139
1186
  # Web Services Payment Cryptography.
1140
1187
  #
1141
1188
  # @return [Types::TranslatePinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -1460,13 +1507,12 @@ module Aws::PaymentCryptographyData
1460
1507
 
1461
1508
  # Verifies a Message Authentication Code (MAC).
1462
1509
  #
1463
- # You can use this operation when keys won't be shared but mutual data
1464
- # is present on both ends for validation. In this case, known data
1465
- # values are used to generate a MAC on both ends for verification
1466
- # without sending or receiving data in ciphertext or plaintext. You can
1467
- # use this operation to verify a DUPKT, HMAC or EMV MAC by setting
1468
- # generation attributes and algorithm to the associated values. Use the
1469
- # same encryption key for MAC verification as you use for GenerateMac.
1510
+ # You can use this operation to verify MAC for message data
1511
+ # authentication such as . In this operation, you must use the same
1512
+ # message data, secret encryption key and MAC algorithm that was used to
1513
+ # generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC
1514
+ # or EMV MAC by setting generation attributes and algorithm to the
1515
+ # associated values.
1470
1516
  #
1471
1517
  # For information about valid keys for this operation, see
1472
1518
  # [Understanding key attributes][1] and [Key types for specific data
@@ -1498,7 +1544,8 @@ module Aws::PaymentCryptographyData
1498
1544
  # The length of the MAC.
1499
1545
  #
1500
1546
  # @option params [required, String] :message_data
1501
- # The data on for which MAC is under verification.
1547
+ # The data on for which MAC is under verification. This value must be
1548
+ # hexBinary.
1502
1549
  #
1503
1550
  # @option params [required, Types::MacAttributes] :verification_attributes
1504
1551
  # The attributes and data values to use for MAC verification within
@@ -1691,7 +1738,7 @@ module Aws::PaymentCryptographyData
1691
1738
  params: params,
1692
1739
  config: config)
1693
1740
  context[:gem_name] = 'aws-sdk-paymentcryptographydata'
1694
- context[:gem_version] = '1.8.0'
1741
+ context[:gem_version] = '1.10.0'
1695
1742
  Seahorse::Client::Request.new(handlers, context)
1696
1743
  end
1697
1744
 
@@ -36,6 +36,9 @@ module Aws::PaymentCryptographyData
36
36
  DukptKeyVariant = Shapes::StringShape.new(name: 'DukptKeyVariant')
37
37
  DynamicCardVerificationCode = Shapes::StructureShape.new(name: 'DynamicCardVerificationCode')
38
38
  DynamicCardVerificationValue = Shapes::StructureShape.new(name: 'DynamicCardVerificationValue')
39
+ EmvEncryptionAttributes = Shapes::StructureShape.new(name: 'EmvEncryptionAttributes')
40
+ EmvEncryptionMode = Shapes::StringShape.new(name: 'EmvEncryptionMode')
41
+ EmvMajorKeyDerivationMode = Shapes::StringShape.new(name: 'EmvMajorKeyDerivationMode')
39
42
  EncryptDataInput = Shapes::StructureShape.new(name: 'EncryptDataInput')
40
43
  EncryptDataOutput = Shapes::StructureShape.new(name: 'EncryptDataOutput')
41
44
  EncryptionDecryptionAttributes = Shapes::UnionShape.new(name: 'EncryptionDecryptionAttributes')
@@ -253,6 +256,14 @@ module Aws::PaymentCryptographyData
253
256
  DynamicCardVerificationValue.add_member(:service_code, Shapes::ShapeRef.new(shape: NumberLengthEquals3, required: true, location_name: "ServiceCode"))
254
257
  DynamicCardVerificationValue.struct_class = Types::DynamicCardVerificationValue
255
258
 
259
+ EmvEncryptionAttributes.add_member(:initialization_vector, Shapes::ShapeRef.new(shape: HexLength16Or32, location_name: "InitializationVector"))
260
+ EmvEncryptionAttributes.add_member(:major_key_derivation_mode, Shapes::ShapeRef.new(shape: EmvMajorKeyDerivationMode, required: true, location_name: "MajorKeyDerivationMode"))
261
+ EmvEncryptionAttributes.add_member(:mode, Shapes::ShapeRef.new(shape: EmvEncryptionMode, location_name: "Mode"))
262
+ EmvEncryptionAttributes.add_member(:pan_sequence_number, Shapes::ShapeRef.new(shape: HexLengthEquals2, required: true, location_name: "PanSequenceNumber"))
263
+ EmvEncryptionAttributes.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
264
+ EmvEncryptionAttributes.add_member(:session_derivation_data, Shapes::ShapeRef.new(shape: HexLengthEquals16, required: true, location_name: "SessionDerivationData"))
265
+ EmvEncryptionAttributes.struct_class = Types::EmvEncryptionAttributes
266
+
256
267
  EncryptDataInput.add_member(:encryption_attributes, Shapes::ShapeRef.new(shape: EncryptionDecryptionAttributes, required: true, location_name: "EncryptionAttributes"))
257
268
  EncryptDataInput.add_member(:key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location: "uri", location_name: "KeyIdentifier"))
258
269
  EncryptDataInput.add_member(:plain_text, Shapes::ShapeRef.new(shape: HexEvenLengthBetween16And4064, required: true, location_name: "PlainText"))
@@ -265,10 +276,12 @@ module Aws::PaymentCryptographyData
265
276
 
266
277
  EncryptionDecryptionAttributes.add_member(:asymmetric, Shapes::ShapeRef.new(shape: AsymmetricEncryptionAttributes, location_name: "Asymmetric"))
267
278
  EncryptionDecryptionAttributes.add_member(:dukpt, Shapes::ShapeRef.new(shape: DukptEncryptionAttributes, location_name: "Dukpt"))
279
+ EncryptionDecryptionAttributes.add_member(:emv, Shapes::ShapeRef.new(shape: EmvEncryptionAttributes, location_name: "Emv"))
268
280
  EncryptionDecryptionAttributes.add_member(:symmetric, Shapes::ShapeRef.new(shape: SymmetricEncryptionAttributes, location_name: "Symmetric"))
269
281
  EncryptionDecryptionAttributes.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
270
282
  EncryptionDecryptionAttributes.add_member_subclass(:asymmetric, Types::EncryptionDecryptionAttributes::Asymmetric)
271
283
  EncryptionDecryptionAttributes.add_member_subclass(:dukpt, Types::EncryptionDecryptionAttributes::Dukpt)
284
+ EncryptionDecryptionAttributes.add_member_subclass(:emv, Types::EncryptionDecryptionAttributes::Emv)
272
285
  EncryptionDecryptionAttributes.add_member_subclass(:symmetric, Types::EncryptionDecryptionAttributes::Symmetric)
273
286
  EncryptionDecryptionAttributes.add_member_subclass(:unknown, Types::EncryptionDecryptionAttributes::Unknown)
274
287
  EncryptionDecryptionAttributes.struct_class = Types::EncryptionDecryptionAttributes
@@ -299,7 +312,7 @@ module Aws::PaymentCryptographyData
299
312
  GeneratePinDataInput.add_member(:generation_attributes, Shapes::ShapeRef.new(shape: PinGenerationAttributes, required: true, location_name: "GenerationAttributes"))
300
313
  GeneratePinDataInput.add_member(:generation_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "GenerationKeyIdentifier"))
301
314
  GeneratePinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
302
- GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength", metadata: {"box"=>true}))
315
+ GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
303
316
  GeneratePinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
304
317
  GeneratePinDataInput.struct_class = Types::GeneratePinDataInput
305
318
 
@@ -560,7 +573,7 @@ module Aws::PaymentCryptographyData
560
573
  VerifyPinDataInput.add_member(:encrypted_pin_block, Shapes::ShapeRef.new(shape: HexLengthBetween16And32, required: true, location_name: "EncryptedPinBlock"))
561
574
  VerifyPinDataInput.add_member(:encryption_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "EncryptionKeyIdentifier"))
562
575
  VerifyPinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
563
- VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength", metadata: {"box"=>true}))
576
+ VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
564
577
  VerifyPinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
565
578
  VerifyPinDataInput.add_member(:verification_attributes, Shapes::ShapeRef.new(shape: PinVerificationAttributes, required: true, location_name: "VerificationAttributes"))
566
579
  VerifyPinDataInput.add_member(:verification_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "VerificationKeyIdentifier"))
@@ -32,7 +32,7 @@ module Aws::PaymentCryptographyData
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
34
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
36
36
  return Aws::Endpoints::Endpoint.new(url: "https://dataplane.payment-cryptography-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
37
  end
38
38
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
@@ -14,6 +14,7 @@ module Aws::PaymentCryptographyData
14
14
  option(
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::PaymentCryptographyData::EndpointProvider',
17
+ rbs_type: 'untyped',
17
18
  docstring: 'The endpoint provider used to resolve endpoints. Any '\
18
19
  'object that responds to `#resolve_endpoint(parameters)` '\
19
20
  'where `parameters` is a Struct similar to '\