aws-sdk-paymentcryptographydata 1.8.0 → 1.10.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -376,15 +376,14 @@ module Aws::PaymentCryptographyData
376
376
  # @!attribute [rw] key_check_value
377
377
  # The key check value (KCV) of the encryption key. The KCV is used to
378
378
  # check if all parties holding a given key have the same key or to
379
- # detect that a key has changed. Amazon Web Services Payment
380
- # Cryptography calculates the KCV by using standard algorithms,
381
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
382
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
383
- # resulting cryptogram.
379
+ # detect that a key has changed.
380
+ #
381
+ # Amazon Web Services Payment Cryptography computes the KCV according
382
+ # to the CMAC specification.
384
383
  # @return [String]
385
384
  #
386
385
  # @!attribute [rw] plain_text
387
- # The decrypted plaintext data.
386
+ # The decrypted plaintext data in hexBinary format.
388
387
  # @return [String]
389
388
  #
390
389
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/DecryptDataOutput AWS API Documentation
@@ -494,11 +493,8 @@ module Aws::PaymentCryptographyData
494
493
  # @return [String]
495
494
  #
496
495
  # @!attribute [rw] initialization_vector
497
- # An input to cryptographic primitive used to provide the intial
498
- # state. Typically the `InitializationVector` must have a random or
499
- # psuedo-random value, but sometimes it only needs to be unpredictable
500
- # or unique. If you don't provide a value, Amazon Web Services
501
- # Payment Cryptography generates a random value.
496
+ # An input used to provide the intial state. If no value is provided,
497
+ # Amazon Web Services Payment Cryptography defaults it to zero.
502
498
  # @return [String]
503
499
  #
504
500
  # @!attribute [rw] key_serial_number
@@ -509,12 +505,7 @@ module Aws::PaymentCryptographyData
509
505
  # @return [String]
510
506
  #
511
507
  # @!attribute [rw] mode
512
- # The block cipher mode of operation. Block ciphers are designed to
513
- # encrypt a block of data of fixed size, for example, 128 bits. The
514
- # size of the input block is usually same as the size of the encrypted
515
- # output block, while the key length can be different. A mode of
516
- # operation describes how to repeatedly apply a cipher's single-block
517
- # operation to securely transform amounts of data larger than a block.
508
+ # The block cipher method to use for encryption.
518
509
  #
519
510
  # The default is CBC.
520
511
  # @return [String]
@@ -597,6 +588,53 @@ module Aws::PaymentCryptographyData
597
588
  include Aws::Structure
598
589
  end
599
590
 
591
+ # Parameters for plaintext encryption using EMV keys.
592
+ #
593
+ # @!attribute [rw] initialization_vector
594
+ # An input used to provide the intial state. If no value is provided,
595
+ # Amazon Web Services Payment Cryptography defaults it to zero.
596
+ # @return [String]
597
+ #
598
+ # @!attribute [rw] major_key_derivation_mode
599
+ # The EMV derivation mode to use for ICC master key derivation as per
600
+ # EMV version 4.3 book 2.
601
+ # @return [String]
602
+ #
603
+ # @!attribute [rw] mode
604
+ # The block cipher method to use for encryption.
605
+ # @return [String]
606
+ #
607
+ # @!attribute [rw] pan_sequence_number
608
+ # A number that identifies and differentiates payment cards with the
609
+ # same Primary Account Number (PAN).
610
+ # @return [String]
611
+ #
612
+ # @!attribute [rw] primary_account_number
613
+ # The Primary Account Number (PAN), a unique identifier for a payment
614
+ # credit or debit card and associates the card to a specific account
615
+ # holder.
616
+ # @return [String]
617
+ #
618
+ # @!attribute [rw] session_derivation_data
619
+ # The derivation value used to derive the ICC session key. It is
620
+ # typically the application transaction counter value padded with
621
+ # zeros or previous ARQC value padded with zeros as per EMV version
622
+ # 4.3 book 2.
623
+ # @return [String]
624
+ #
625
+ # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EmvEncryptionAttributes AWS API Documentation
626
+ #
627
+ class EmvEncryptionAttributes < Struct.new(
628
+ :initialization_vector,
629
+ :major_key_derivation_mode,
630
+ :mode,
631
+ :pan_sequence_number,
632
+ :primary_account_number,
633
+ :session_derivation_data)
634
+ SENSITIVE = [:initialization_vector, :primary_account_number]
635
+ include Aws::Structure
636
+ end
637
+
600
638
  # @!attribute [rw] encryption_attributes
601
639
  # The encryption key type and attributes for plaintext encryption.
602
640
  # @return [Types::EncryptionDecryptionAttributes]
@@ -608,6 +646,19 @@ module Aws::PaymentCryptographyData
608
646
  #
609
647
  # @!attribute [rw] plain_text
610
648
  # The plaintext to be encrypted.
649
+ #
650
+ # <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
651
+ # constrained by encryption key strength that you define in
652
+ # `KeyAlgorithm` and padding type that you define in
653
+ # `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
654
+ # data][1] in the *Amazon Web Services Payment Cryptography User
655
+ # Guide*.
656
+ #
657
+ # </note>
658
+ #
659
+ #
660
+ #
661
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
611
662
  # @return [String]
612
663
  #
613
664
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EncryptDataInput AWS API Documentation
@@ -632,11 +683,10 @@ module Aws::PaymentCryptographyData
632
683
  # @!attribute [rw] key_check_value
633
684
  # The key check value (KCV) of the encryption key. The KCV is used to
634
685
  # check if all parties holding a given key have the same key or to
635
- # detect that a key has changed. Amazon Web Services Payment
636
- # Cryptography calculates the KCV by using standard algorithms,
637
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
638
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
639
- # resulting cryptogram.
686
+ # detect that a key has changed.
687
+ #
688
+ # Amazon Web Services Payment Cryptography computes the KCV according
689
+ # to the CMAC specification.
640
690
  # @return [String]
641
691
  #
642
692
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EncryptDataOutput AWS API Documentation
@@ -662,6 +712,10 @@ module Aws::PaymentCryptographyData
662
712
  # Parameters that are required to encrypt plaintext data using DUKPT.
663
713
  # @return [Types::DukptEncryptionAttributes]
664
714
  #
715
+ # @!attribute [rw] emv
716
+ # Parameters for plaintext encryption using EMV keys.
717
+ # @return [Types::EmvEncryptionAttributes]
718
+ #
665
719
  # @!attribute [rw] symmetric
666
720
  # Parameters that are required to perform encryption and decryption
667
721
  # using symmetric keys.
@@ -672,6 +726,7 @@ module Aws::PaymentCryptographyData
672
726
  class EncryptionDecryptionAttributes < Struct.new(
673
727
  :asymmetric,
674
728
  :dukpt,
729
+ :emv,
675
730
  :symmetric,
676
731
  :unknown)
677
732
  SENSITIVE = []
@@ -680,6 +735,7 @@ module Aws::PaymentCryptographyData
680
735
 
681
736
  class Asymmetric < EncryptionDecryptionAttributes; end
682
737
  class Dukpt < EncryptionDecryptionAttributes; end
738
+ class Emv < EncryptionDecryptionAttributes; end
683
739
  class Symmetric < EncryptionDecryptionAttributes; end
684
740
  class Unknown < EncryptionDecryptionAttributes; end
685
741
  end
@@ -724,11 +780,10 @@ module Aws::PaymentCryptographyData
724
780
  # @!attribute [rw] key_check_value
725
781
  # The key check value (KCV) of the encryption key. The KCV is used to
726
782
  # check if all parties holding a given key have the same key or to
727
- # detect that a key has changed. Amazon Web Services Payment
728
- # Cryptography calculates the KCV by using standard algorithms,
729
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
730
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
731
- # resulting cryptogram.
783
+ # detect that a key has changed.
784
+ #
785
+ # Amazon Web Services Payment Cryptography computes the KCV according
786
+ # to the CMAC specification.
732
787
  # @return [String]
733
788
  #
734
789
  # @!attribute [rw] validation_data
@@ -760,7 +815,8 @@ module Aws::PaymentCryptographyData
760
815
  # @return [Integer]
761
816
  #
762
817
  # @!attribute [rw] message_data
763
- # The data for which a MAC is under generation.
818
+ # The data for which a MAC is under generation. This value must be
819
+ # hexBinary.
764
820
  # @return [String]
765
821
  #
766
822
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/GenerateMacInput AWS API Documentation
@@ -782,11 +838,10 @@ module Aws::PaymentCryptographyData
782
838
  # @!attribute [rw] key_check_value
783
839
  # The key check value (KCV) of the encryption key. The KCV is used to
784
840
  # check if all parties holding a given key have the same key or to
785
- # detect that a key has changed. Amazon Web Services Payment
786
- # Cryptography calculates the KCV by using standard algorithms,
787
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
788
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
789
- # resulting cryptogram.
841
+ # detect that a key has changed.
842
+ #
843
+ # Amazon Web Services Payment Cryptography computes the KCV according
844
+ # to the CMAC specification.
790
845
  # @return [String]
791
846
  #
792
847
  # @!attribute [rw] mac
@@ -870,11 +925,10 @@ module Aws::PaymentCryptographyData
870
925
  # @!attribute [rw] encryption_key_check_value
871
926
  # The key check value (KCV) of the encryption key. The KCV is used to
872
927
  # check if all parties holding a given key have the same key or to
873
- # detect that a key has changed. Amazon Web Services Payment
874
- # Cryptography calculates the KCV by using standard algorithms,
875
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
876
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
877
- # resulting cryptogram.
928
+ # detect that a key has changed.
929
+ #
930
+ # Amazon Web Services Payment Cryptography computes the KCV according
931
+ # to the CMAC specification.
878
932
  # @return [String]
879
933
  #
880
934
  # @!attribute [rw] generation_key_arn
@@ -885,11 +939,10 @@ module Aws::PaymentCryptographyData
885
939
  # @!attribute [rw] generation_key_check_value
886
940
  # The key check value (KCV) of the encryption key. The KCV is used to
887
941
  # check if all parties holding a given key have the same key or to
888
- # detect that a key has changed. Amazon Web Services Payment
889
- # Cryptography calculates the KCV by using standard algorithms,
890
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
891
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
892
- # resulting cryptogram.
942
+ # detect that a key has changed.
943
+ #
944
+ # Amazon Web Services Payment Cryptography computes the KCV according
945
+ # to the CMAC specification.
893
946
  # @return [String]
894
947
  #
895
948
  # @!attribute [rw] pin_data
@@ -1168,7 +1221,7 @@ module Aws::PaymentCryptographyData
1168
1221
  #
1169
1222
  # @!attribute [rw] dukpt_iso_9797_algorithm_3
1170
1223
  # Parameters that are required for MAC generation or verification
1171
- # using DUKPT ISO 9797 algorithm2.
1224
+ # using DUKPT ISO 9797 algorithm3.
1172
1225
  # @return [Types::MacAlgorithmDukpt]
1173
1226
  #
1174
1227
  # @!attribute [rw] emv_mac
@@ -1357,11 +1410,10 @@ module Aws::PaymentCryptographyData
1357
1410
  # @!attribute [rw] key_check_value
1358
1411
  # The key check value (KCV) of the encryption key. The KCV is used to
1359
1412
  # check if all parties holding a given key have the same key or to
1360
- # detect that a key has changed. Amazon Web Services Payment
1361
- # Cryptography calculates the KCV by using standard algorithms,
1362
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
1363
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
1364
- # resulting cryptogram.
1413
+ # detect that a key has changed.
1414
+ #
1415
+ # Amazon Web Services Payment Cryptography computes the KCV according
1416
+ # to the CMAC specification.
1365
1417
  # @return [String]
1366
1418
  #
1367
1419
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/ReEncryptDataOutput AWS API Documentation
@@ -1635,20 +1687,12 @@ module Aws::PaymentCryptographyData
1635
1687
  # Parameters requried to encrypt plaintext data using symmetric keys.
1636
1688
  #
1637
1689
  # @!attribute [rw] initialization_vector
1638
- # An input to cryptographic primitive used to provide the intial
1639
- # state. The `InitializationVector` is typically required have a
1640
- # random or psuedo-random value, but sometimes it only needs to be
1641
- # unpredictable or unique. If a value is not provided, Amazon Web
1642
- # Services Payment Cryptography generates a random value.
1690
+ # An input used to provide the intial state. If no value is provided,
1691
+ # Amazon Web Services Payment Cryptography defaults it to zero.
1643
1692
  # @return [String]
1644
1693
  #
1645
1694
  # @!attribute [rw] mode
1646
- # The block cipher mode of operation. Block ciphers are designed to
1647
- # encrypt a block of data of fixed size (for example, 128 bits). The
1648
- # size of the input block is usually same as the size of the encrypted
1649
- # output block, while the key length can be different. A mode of
1650
- # operation describes how to repeatedly apply a cipher's single-block
1651
- # operation to securely transform amounts of data larger than a block.
1695
+ # The block cipher method to use for encryption.
1652
1696
  # @return [String]
1653
1697
  #
1654
1698
  # @!attribute [rw] padding_type
@@ -1685,7 +1729,7 @@ module Aws::PaymentCryptographyData
1685
1729
  #
1686
1730
  # @!attribute [rw] incoming_dukpt_attributes
1687
1731
  # The attributes and values to use for incoming DUKPT encryption key
1688
- # for PIN block tranlation.
1732
+ # for PIN block translation.
1689
1733
  # @return [Types::DukptDerivationAttributes]
1690
1734
  #
1691
1735
  # @!attribute [rw] incoming_key_identifier
@@ -1694,7 +1738,7 @@ module Aws::PaymentCryptographyData
1694
1738
  # @return [String]
1695
1739
  #
1696
1740
  # @!attribute [rw] incoming_translation_attributes
1697
- # The format of the incoming PIN block data for tranlation within
1741
+ # The format of the incoming PIN block data for translation within
1698
1742
  # Amazon Web Services Payment Cryptography.
1699
1743
  # @return [Types::TranslationIsoFormats]
1700
1744
  #
@@ -1709,8 +1753,8 @@ module Aws::PaymentCryptographyData
1709
1753
  # @return [String]
1710
1754
  #
1711
1755
  # @!attribute [rw] outgoing_translation_attributes
1712
- # The format of the outgoing PIN block data after tranlation by Amazon
1713
- # Web Services Payment Cryptography.
1756
+ # The format of the outgoing PIN block data after translation by
1757
+ # Amazon Web Services Payment Cryptography.
1714
1758
  # @return [Types::TranslationIsoFormats]
1715
1759
  #
1716
1760
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/TranslatePinDataInput AWS API Documentation
@@ -1736,15 +1780,14 @@ module Aws::PaymentCryptographyData
1736
1780
  # @!attribute [rw] key_check_value
1737
1781
  # The key check value (KCV) of the encryption key. The KCV is used to
1738
1782
  # check if all parties holding a given key have the same key or to
1739
- # detect that a key has changed. Amazon Web Services Payment
1740
- # Cryptography calculates the KCV by using standard algorithms,
1741
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
1742
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
1743
- # resulting cryptogram.
1783
+ # detect that a key has changed.
1784
+ #
1785
+ # Amazon Web Services Payment Cryptography computes the KCV according
1786
+ # to the CMAC specification.
1744
1787
  # @return [String]
1745
1788
  #
1746
1789
  # @!attribute [rw] pin_block
1747
- # The ougoing encrypted PIN block data after tranlation.
1790
+ # The outgoing encrypted PIN block data after translation.
1748
1791
  # @return [String]
1749
1792
  #
1750
1793
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/TranslatePinDataOutput AWS API Documentation
@@ -1940,11 +1983,10 @@ module Aws::PaymentCryptographyData
1940
1983
  # @!attribute [rw] key_check_value
1941
1984
  # The key check value (KCV) of the encryption key. The KCV is used to
1942
1985
  # check if all parties holding a given key have the same key or to
1943
- # detect that a key has changed. Amazon Web Services Payment
1944
- # Cryptography calculates the KCV by using standard algorithms,
1945
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
1946
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
1947
- # resulting cryptogram.
1986
+ # detect that a key has changed.
1987
+ #
1988
+ # Amazon Web Services Payment Cryptography computes the KCV according
1989
+ # to the CMAC specification.
1948
1990
  # @return [String]
1949
1991
  #
1950
1992
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyAuthRequestCryptogramOutput AWS API Documentation
@@ -1997,11 +2039,10 @@ module Aws::PaymentCryptographyData
1997
2039
  # @!attribute [rw] key_check_value
1998
2040
  # The key check value (KCV) of the encryption key. The KCV is used to
1999
2041
  # check if all parties holding a given key have the same key or to
2000
- # detect that a key has changed. Amazon Web Services Payment
2001
- # Cryptography calculates the KCV by using standard algorithms,
2002
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2003
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2004
- # resulting cryptogram.
2042
+ # detect that a key has changed.
2043
+ #
2044
+ # Amazon Web Services Payment Cryptography computes the KCV according
2045
+ # to the CMAC specification.
2005
2046
  # @return [String]
2006
2047
  #
2007
2048
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyCardValidationDataOutput AWS API Documentation
@@ -2027,7 +2068,8 @@ module Aws::PaymentCryptographyData
2027
2068
  # @return [Integer]
2028
2069
  #
2029
2070
  # @!attribute [rw] message_data
2030
- # The data on for which MAC is under verification.
2071
+ # The data on for which MAC is under verification. This value must be
2072
+ # hexBinary.
2031
2073
  # @return [String]
2032
2074
  #
2033
2075
  # @!attribute [rw] verification_attributes
@@ -2055,11 +2097,10 @@ module Aws::PaymentCryptographyData
2055
2097
  # @!attribute [rw] key_check_value
2056
2098
  # The key check value (KCV) of the encryption key. The KCV is used to
2057
2099
  # check if all parties holding a given key have the same key or to
2058
- # detect that a key has changed. Amazon Web Services Payment
2059
- # Cryptography calculates the KCV by using standard algorithms,
2060
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2061
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2062
- # resulting cryptogram.
2100
+ # detect that a key has changed.
2101
+ #
2102
+ # Amazon Web Services Payment Cryptography computes the KCV according
2103
+ # to the CMAC specification.
2063
2104
  # @return [String]
2064
2105
  #
2065
2106
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyMacOutput AWS API Documentation
@@ -2139,11 +2180,10 @@ module Aws::PaymentCryptographyData
2139
2180
  # @!attribute [rw] encryption_key_check_value
2140
2181
  # The key check value (KCV) of the encryption key. The KCV is used to
2141
2182
  # check if all parties holding a given key have the same key or to
2142
- # detect that a key has changed. Amazon Web Services Payment
2143
- # Cryptography calculates the KCV by using standard algorithms,
2144
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2145
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2146
- # resulting cryptogram.
2183
+ # detect that a key has changed.
2184
+ #
2185
+ # Amazon Web Services Payment Cryptography computes the KCV according
2186
+ # to the CMAC specification.
2147
2187
  # @return [String]
2148
2188
  #
2149
2189
  # @!attribute [rw] verification_key_arn
@@ -2154,11 +2194,10 @@ module Aws::PaymentCryptographyData
2154
2194
  # @!attribute [rw] verification_key_check_value
2155
2195
  # The key check value (KCV) of the encryption key. The KCV is used to
2156
2196
  # check if all parties holding a given key have the same key or to
2157
- # detect that a key has changed. Amazon Web Services Payment
2158
- # Cryptography calculates the KCV by using standard algorithms,
2159
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2160
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2161
- # resulting cryptogram.
2197
+ # detect that a key has changed.
2198
+ #
2199
+ # Amazon Web Services Payment Cryptography computes the KCV according
2200
+ # to the CMAC specification.
2162
2201
  # @return [String]
2163
2202
  #
2164
2203
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyPinDataOutput AWS API Documentation
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-paymentcryptographydata/customizations'
52
52
  # @!group service
53
53
  module Aws::PaymentCryptographyData
54
54
 
55
- GEM_VERSION = '1.8.0'
55
+ GEM_VERSION = '1.10.0'
56
56
 
57
57
  end