aws-sdk-paymentcryptographydata 1.8.0 → 1.10.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -376,15 +376,14 @@ module Aws::PaymentCryptographyData
376
376
  # @!attribute [rw] key_check_value
377
377
  # The key check value (KCV) of the encryption key. The KCV is used to
378
378
  # check if all parties holding a given key have the same key or to
379
- # detect that a key has changed. Amazon Web Services Payment
380
- # Cryptography calculates the KCV by using standard algorithms,
381
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
382
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
383
- # resulting cryptogram.
379
+ # detect that a key has changed.
380
+ #
381
+ # Amazon Web Services Payment Cryptography computes the KCV according
382
+ # to the CMAC specification.
384
383
  # @return [String]
385
384
  #
386
385
  # @!attribute [rw] plain_text
387
- # The decrypted plaintext data.
386
+ # The decrypted plaintext data in hexBinary format.
388
387
  # @return [String]
389
388
  #
390
389
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/DecryptDataOutput AWS API Documentation
@@ -494,11 +493,8 @@ module Aws::PaymentCryptographyData
494
493
  # @return [String]
495
494
  #
496
495
  # @!attribute [rw] initialization_vector
497
- # An input to cryptographic primitive used to provide the intial
498
- # state. Typically the `InitializationVector` must have a random or
499
- # psuedo-random value, but sometimes it only needs to be unpredictable
500
- # or unique. If you don't provide a value, Amazon Web Services
501
- # Payment Cryptography generates a random value.
496
+ # An input used to provide the intial state. If no value is provided,
497
+ # Amazon Web Services Payment Cryptography defaults it to zero.
502
498
  # @return [String]
503
499
  #
504
500
  # @!attribute [rw] key_serial_number
@@ -509,12 +505,7 @@ module Aws::PaymentCryptographyData
509
505
  # @return [String]
510
506
  #
511
507
  # @!attribute [rw] mode
512
- # The block cipher mode of operation. Block ciphers are designed to
513
- # encrypt a block of data of fixed size, for example, 128 bits. The
514
- # size of the input block is usually same as the size of the encrypted
515
- # output block, while the key length can be different. A mode of
516
- # operation describes how to repeatedly apply a cipher's single-block
517
- # operation to securely transform amounts of data larger than a block.
508
+ # The block cipher method to use for encryption.
518
509
  #
519
510
  # The default is CBC.
520
511
  # @return [String]
@@ -597,6 +588,53 @@ module Aws::PaymentCryptographyData
597
588
  include Aws::Structure
598
589
  end
599
590
 
591
+ # Parameters for plaintext encryption using EMV keys.
592
+ #
593
+ # @!attribute [rw] initialization_vector
594
+ # An input used to provide the intial state. If no value is provided,
595
+ # Amazon Web Services Payment Cryptography defaults it to zero.
596
+ # @return [String]
597
+ #
598
+ # @!attribute [rw] major_key_derivation_mode
599
+ # The EMV derivation mode to use for ICC master key derivation as per
600
+ # EMV version 4.3 book 2.
601
+ # @return [String]
602
+ #
603
+ # @!attribute [rw] mode
604
+ # The block cipher method to use for encryption.
605
+ # @return [String]
606
+ #
607
+ # @!attribute [rw] pan_sequence_number
608
+ # A number that identifies and differentiates payment cards with the
609
+ # same Primary Account Number (PAN).
610
+ # @return [String]
611
+ #
612
+ # @!attribute [rw] primary_account_number
613
+ # The Primary Account Number (PAN), a unique identifier for a payment
614
+ # credit or debit card and associates the card to a specific account
615
+ # holder.
616
+ # @return [String]
617
+ #
618
+ # @!attribute [rw] session_derivation_data
619
+ # The derivation value used to derive the ICC session key. It is
620
+ # typically the application transaction counter value padded with
621
+ # zeros or previous ARQC value padded with zeros as per EMV version
622
+ # 4.3 book 2.
623
+ # @return [String]
624
+ #
625
+ # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EmvEncryptionAttributes AWS API Documentation
626
+ #
627
+ class EmvEncryptionAttributes < Struct.new(
628
+ :initialization_vector,
629
+ :major_key_derivation_mode,
630
+ :mode,
631
+ :pan_sequence_number,
632
+ :primary_account_number,
633
+ :session_derivation_data)
634
+ SENSITIVE = [:initialization_vector, :primary_account_number]
635
+ include Aws::Structure
636
+ end
637
+
600
638
  # @!attribute [rw] encryption_attributes
601
639
  # The encryption key type and attributes for plaintext encryption.
602
640
  # @return [Types::EncryptionDecryptionAttributes]
@@ -608,6 +646,19 @@ module Aws::PaymentCryptographyData
608
646
  #
609
647
  # @!attribute [rw] plain_text
610
648
  # The plaintext to be encrypted.
649
+ #
650
+ # <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
651
+ # constrained by encryption key strength that you define in
652
+ # `KeyAlgorithm` and padding type that you define in
653
+ # `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
654
+ # data][1] in the *Amazon Web Services Payment Cryptography User
655
+ # Guide*.
656
+ #
657
+ # </note>
658
+ #
659
+ #
660
+ #
661
+ # [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
611
662
  # @return [String]
612
663
  #
613
664
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EncryptDataInput AWS API Documentation
@@ -632,11 +683,10 @@ module Aws::PaymentCryptographyData
632
683
  # @!attribute [rw] key_check_value
633
684
  # The key check value (KCV) of the encryption key. The KCV is used to
634
685
  # check if all parties holding a given key have the same key or to
635
- # detect that a key has changed. Amazon Web Services Payment
636
- # Cryptography calculates the KCV by using standard algorithms,
637
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
638
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
639
- # resulting cryptogram.
686
+ # detect that a key has changed.
687
+ #
688
+ # Amazon Web Services Payment Cryptography computes the KCV according
689
+ # to the CMAC specification.
640
690
  # @return [String]
641
691
  #
642
692
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EncryptDataOutput AWS API Documentation
@@ -662,6 +712,10 @@ module Aws::PaymentCryptographyData
662
712
  # Parameters that are required to encrypt plaintext data using DUKPT.
663
713
  # @return [Types::DukptEncryptionAttributes]
664
714
  #
715
+ # @!attribute [rw] emv
716
+ # Parameters for plaintext encryption using EMV keys.
717
+ # @return [Types::EmvEncryptionAttributes]
718
+ #
665
719
  # @!attribute [rw] symmetric
666
720
  # Parameters that are required to perform encryption and decryption
667
721
  # using symmetric keys.
@@ -672,6 +726,7 @@ module Aws::PaymentCryptographyData
672
726
  class EncryptionDecryptionAttributes < Struct.new(
673
727
  :asymmetric,
674
728
  :dukpt,
729
+ :emv,
675
730
  :symmetric,
676
731
  :unknown)
677
732
  SENSITIVE = []
@@ -680,6 +735,7 @@ module Aws::PaymentCryptographyData
680
735
 
681
736
  class Asymmetric < EncryptionDecryptionAttributes; end
682
737
  class Dukpt < EncryptionDecryptionAttributes; end
738
+ class Emv < EncryptionDecryptionAttributes; end
683
739
  class Symmetric < EncryptionDecryptionAttributes; end
684
740
  class Unknown < EncryptionDecryptionAttributes; end
685
741
  end
@@ -724,11 +780,10 @@ module Aws::PaymentCryptographyData
724
780
  # @!attribute [rw] key_check_value
725
781
  # The key check value (KCV) of the encryption key. The KCV is used to
726
782
  # check if all parties holding a given key have the same key or to
727
- # detect that a key has changed. Amazon Web Services Payment
728
- # Cryptography calculates the KCV by using standard algorithms,
729
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
730
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
731
- # resulting cryptogram.
783
+ # detect that a key has changed.
784
+ #
785
+ # Amazon Web Services Payment Cryptography computes the KCV according
786
+ # to the CMAC specification.
732
787
  # @return [String]
733
788
  #
734
789
  # @!attribute [rw] validation_data
@@ -760,7 +815,8 @@ module Aws::PaymentCryptographyData
760
815
  # @return [Integer]
761
816
  #
762
817
  # @!attribute [rw] message_data
763
- # The data for which a MAC is under generation.
818
+ # The data for which a MAC is under generation. This value must be
819
+ # hexBinary.
764
820
  # @return [String]
765
821
  #
766
822
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/GenerateMacInput AWS API Documentation
@@ -782,11 +838,10 @@ module Aws::PaymentCryptographyData
782
838
  # @!attribute [rw] key_check_value
783
839
  # The key check value (KCV) of the encryption key. The KCV is used to
784
840
  # check if all parties holding a given key have the same key or to
785
- # detect that a key has changed. Amazon Web Services Payment
786
- # Cryptography calculates the KCV by using standard algorithms,
787
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
788
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
789
- # resulting cryptogram.
841
+ # detect that a key has changed.
842
+ #
843
+ # Amazon Web Services Payment Cryptography computes the KCV according
844
+ # to the CMAC specification.
790
845
  # @return [String]
791
846
  #
792
847
  # @!attribute [rw] mac
@@ -870,11 +925,10 @@ module Aws::PaymentCryptographyData
870
925
  # @!attribute [rw] encryption_key_check_value
871
926
  # The key check value (KCV) of the encryption key. The KCV is used to
872
927
  # check if all parties holding a given key have the same key or to
873
- # detect that a key has changed. Amazon Web Services Payment
874
- # Cryptography calculates the KCV by using standard algorithms,
875
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
876
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
877
- # resulting cryptogram.
928
+ # detect that a key has changed.
929
+ #
930
+ # Amazon Web Services Payment Cryptography computes the KCV according
931
+ # to the CMAC specification.
878
932
  # @return [String]
879
933
  #
880
934
  # @!attribute [rw] generation_key_arn
@@ -885,11 +939,10 @@ module Aws::PaymentCryptographyData
885
939
  # @!attribute [rw] generation_key_check_value
886
940
  # The key check value (KCV) of the encryption key. The KCV is used to
887
941
  # check if all parties holding a given key have the same key or to
888
- # detect that a key has changed. Amazon Web Services Payment
889
- # Cryptography calculates the KCV by using standard algorithms,
890
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
891
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
892
- # resulting cryptogram.
942
+ # detect that a key has changed.
943
+ #
944
+ # Amazon Web Services Payment Cryptography computes the KCV according
945
+ # to the CMAC specification.
893
946
  # @return [String]
894
947
  #
895
948
  # @!attribute [rw] pin_data
@@ -1168,7 +1221,7 @@ module Aws::PaymentCryptographyData
1168
1221
  #
1169
1222
  # @!attribute [rw] dukpt_iso_9797_algorithm_3
1170
1223
  # Parameters that are required for MAC generation or verification
1171
- # using DUKPT ISO 9797 algorithm2.
1224
+ # using DUKPT ISO 9797 algorithm3.
1172
1225
  # @return [Types::MacAlgorithmDukpt]
1173
1226
  #
1174
1227
  # @!attribute [rw] emv_mac
@@ -1357,11 +1410,10 @@ module Aws::PaymentCryptographyData
1357
1410
  # @!attribute [rw] key_check_value
1358
1411
  # The key check value (KCV) of the encryption key. The KCV is used to
1359
1412
  # check if all parties holding a given key have the same key or to
1360
- # detect that a key has changed. Amazon Web Services Payment
1361
- # Cryptography calculates the KCV by using standard algorithms,
1362
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
1363
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
1364
- # resulting cryptogram.
1413
+ # detect that a key has changed.
1414
+ #
1415
+ # Amazon Web Services Payment Cryptography computes the KCV according
1416
+ # to the CMAC specification.
1365
1417
  # @return [String]
1366
1418
  #
1367
1419
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/ReEncryptDataOutput AWS API Documentation
@@ -1635,20 +1687,12 @@ module Aws::PaymentCryptographyData
1635
1687
  # Parameters requried to encrypt plaintext data using symmetric keys.
1636
1688
  #
1637
1689
  # @!attribute [rw] initialization_vector
1638
- # An input to cryptographic primitive used to provide the intial
1639
- # state. The `InitializationVector` is typically required have a
1640
- # random or psuedo-random value, but sometimes it only needs to be
1641
- # unpredictable or unique. If a value is not provided, Amazon Web
1642
- # Services Payment Cryptography generates a random value.
1690
+ # An input used to provide the intial state. If no value is provided,
1691
+ # Amazon Web Services Payment Cryptography defaults it to zero.
1643
1692
  # @return [String]
1644
1693
  #
1645
1694
  # @!attribute [rw] mode
1646
- # The block cipher mode of operation. Block ciphers are designed to
1647
- # encrypt a block of data of fixed size (for example, 128 bits). The
1648
- # size of the input block is usually same as the size of the encrypted
1649
- # output block, while the key length can be different. A mode of
1650
- # operation describes how to repeatedly apply a cipher's single-block
1651
- # operation to securely transform amounts of data larger than a block.
1695
+ # The block cipher method to use for encryption.
1652
1696
  # @return [String]
1653
1697
  #
1654
1698
  # @!attribute [rw] padding_type
@@ -1685,7 +1729,7 @@ module Aws::PaymentCryptographyData
1685
1729
  #
1686
1730
  # @!attribute [rw] incoming_dukpt_attributes
1687
1731
  # The attributes and values to use for incoming DUKPT encryption key
1688
- # for PIN block tranlation.
1732
+ # for PIN block translation.
1689
1733
  # @return [Types::DukptDerivationAttributes]
1690
1734
  #
1691
1735
  # @!attribute [rw] incoming_key_identifier
@@ -1694,7 +1738,7 @@ module Aws::PaymentCryptographyData
1694
1738
  # @return [String]
1695
1739
  #
1696
1740
  # @!attribute [rw] incoming_translation_attributes
1697
- # The format of the incoming PIN block data for tranlation within
1741
+ # The format of the incoming PIN block data for translation within
1698
1742
  # Amazon Web Services Payment Cryptography.
1699
1743
  # @return [Types::TranslationIsoFormats]
1700
1744
  #
@@ -1709,8 +1753,8 @@ module Aws::PaymentCryptographyData
1709
1753
  # @return [String]
1710
1754
  #
1711
1755
  # @!attribute [rw] outgoing_translation_attributes
1712
- # The format of the outgoing PIN block data after tranlation by Amazon
1713
- # Web Services Payment Cryptography.
1756
+ # The format of the outgoing PIN block data after translation by
1757
+ # Amazon Web Services Payment Cryptography.
1714
1758
  # @return [Types::TranslationIsoFormats]
1715
1759
  #
1716
1760
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/TranslatePinDataInput AWS API Documentation
@@ -1736,15 +1780,14 @@ module Aws::PaymentCryptographyData
1736
1780
  # @!attribute [rw] key_check_value
1737
1781
  # The key check value (KCV) of the encryption key. The KCV is used to
1738
1782
  # check if all parties holding a given key have the same key or to
1739
- # detect that a key has changed. Amazon Web Services Payment
1740
- # Cryptography calculates the KCV by using standard algorithms,
1741
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
1742
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
1743
- # resulting cryptogram.
1783
+ # detect that a key has changed.
1784
+ #
1785
+ # Amazon Web Services Payment Cryptography computes the KCV according
1786
+ # to the CMAC specification.
1744
1787
  # @return [String]
1745
1788
  #
1746
1789
  # @!attribute [rw] pin_block
1747
- # The ougoing encrypted PIN block data after tranlation.
1790
+ # The outgoing encrypted PIN block data after translation.
1748
1791
  # @return [String]
1749
1792
  #
1750
1793
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/TranslatePinDataOutput AWS API Documentation
@@ -1940,11 +1983,10 @@ module Aws::PaymentCryptographyData
1940
1983
  # @!attribute [rw] key_check_value
1941
1984
  # The key check value (KCV) of the encryption key. The KCV is used to
1942
1985
  # check if all parties holding a given key have the same key or to
1943
- # detect that a key has changed. Amazon Web Services Payment
1944
- # Cryptography calculates the KCV by using standard algorithms,
1945
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
1946
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
1947
- # resulting cryptogram.
1986
+ # detect that a key has changed.
1987
+ #
1988
+ # Amazon Web Services Payment Cryptography computes the KCV according
1989
+ # to the CMAC specification.
1948
1990
  # @return [String]
1949
1991
  #
1950
1992
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyAuthRequestCryptogramOutput AWS API Documentation
@@ -1997,11 +2039,10 @@ module Aws::PaymentCryptographyData
1997
2039
  # @!attribute [rw] key_check_value
1998
2040
  # The key check value (KCV) of the encryption key. The KCV is used to
1999
2041
  # check if all parties holding a given key have the same key or to
2000
- # detect that a key has changed. Amazon Web Services Payment
2001
- # Cryptography calculates the KCV by using standard algorithms,
2002
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2003
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2004
- # resulting cryptogram.
2042
+ # detect that a key has changed.
2043
+ #
2044
+ # Amazon Web Services Payment Cryptography computes the KCV according
2045
+ # to the CMAC specification.
2005
2046
  # @return [String]
2006
2047
  #
2007
2048
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyCardValidationDataOutput AWS API Documentation
@@ -2027,7 +2068,8 @@ module Aws::PaymentCryptographyData
2027
2068
  # @return [Integer]
2028
2069
  #
2029
2070
  # @!attribute [rw] message_data
2030
- # The data on for which MAC is under verification.
2071
+ # The data on for which MAC is under verification. This value must be
2072
+ # hexBinary.
2031
2073
  # @return [String]
2032
2074
  #
2033
2075
  # @!attribute [rw] verification_attributes
@@ -2055,11 +2097,10 @@ module Aws::PaymentCryptographyData
2055
2097
  # @!attribute [rw] key_check_value
2056
2098
  # The key check value (KCV) of the encryption key. The KCV is used to
2057
2099
  # check if all parties holding a given key have the same key or to
2058
- # detect that a key has changed. Amazon Web Services Payment
2059
- # Cryptography calculates the KCV by using standard algorithms,
2060
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2061
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2062
- # resulting cryptogram.
2100
+ # detect that a key has changed.
2101
+ #
2102
+ # Amazon Web Services Payment Cryptography computes the KCV according
2103
+ # to the CMAC specification.
2063
2104
  # @return [String]
2064
2105
  #
2065
2106
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyMacOutput AWS API Documentation
@@ -2139,11 +2180,10 @@ module Aws::PaymentCryptographyData
2139
2180
  # @!attribute [rw] encryption_key_check_value
2140
2181
  # The key check value (KCV) of the encryption key. The KCV is used to
2141
2182
  # check if all parties holding a given key have the same key or to
2142
- # detect that a key has changed. Amazon Web Services Payment
2143
- # Cryptography calculates the KCV by using standard algorithms,
2144
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2145
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2146
- # resulting cryptogram.
2183
+ # detect that a key has changed.
2184
+ #
2185
+ # Amazon Web Services Payment Cryptography computes the KCV according
2186
+ # to the CMAC specification.
2147
2187
  # @return [String]
2148
2188
  #
2149
2189
  # @!attribute [rw] verification_key_arn
@@ -2154,11 +2194,10 @@ module Aws::PaymentCryptographyData
2154
2194
  # @!attribute [rw] verification_key_check_value
2155
2195
  # The key check value (KCV) of the encryption key. The KCV is used to
2156
2196
  # check if all parties holding a given key have the same key or to
2157
- # detect that a key has changed. Amazon Web Services Payment
2158
- # Cryptography calculates the KCV by using standard algorithms,
2159
- # typically by encrypting 8 or 16 bytes or "00" or "01" and then
2160
- # truncating the result to the first 3 bytes, or 6 hex digits, of the
2161
- # resulting cryptogram.
2197
+ # detect that a key has changed.
2198
+ #
2199
+ # Amazon Web Services Payment Cryptography computes the KCV according
2200
+ # to the CMAC specification.
2162
2201
  # @return [String]
2163
2202
  #
2164
2203
  # @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyPinDataOutput AWS API Documentation
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-paymentcryptographydata/customizations'
52
52
  # @!group service
53
53
  module Aws::PaymentCryptographyData
54
54
 
55
- GEM_VERSION = '1.8.0'
55
+ GEM_VERSION = '1.10.0'
56
56
 
57
57
  end