aws-sdk-paymentcryptographydata 1.9.0 → 1.10.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-paymentcryptographydata/client.rb +94 -47
- data/lib/aws-sdk-paymentcryptographydata/client_api.rb +15 -2
- data/lib/aws-sdk-paymentcryptographydata/endpoint_provider.rb +1 -1
- data/lib/aws-sdk-paymentcryptographydata/types.rb +135 -96
- data/lib/aws-sdk-paymentcryptographydata.rb +1 -1
- data/sig/client.rbs +16 -0
- data/sig/types.rbs +13 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6126989706af46778cf434cc347a8c7d3612827a1001706d0e213e05d5cd9612
|
4
|
+
data.tar.gz: a8a99a810c24b25b8ba1b9f30b7fc03d295cb426c41ff77e207dfe888a3654b9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1c69e8560dd194bdfaf4d56ae5ffaaeb3b00fd4a79531eae91657eb4d8095c469d9bb8ec5b19820ce97c8c179abc57351f132fa829bb9ff336c6a5664eadade1
|
7
|
+
data.tar.gz: d274c07082e1aa888f464d77ab4aa465a6a479a276b07537752850fa537d2601994e2a383974a57d80ca1f3605f9e6beaacf910df91f8252dab7c11380ad41dd
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.10.0
|
@@ -388,9 +388,10 @@ module Aws::PaymentCryptographyData
|
|
388
388
|
|
389
389
|
# @!group API Operations
|
390
390
|
|
391
|
-
# Decrypts ciphertext data to plaintext using symmetric,
|
392
|
-
# DUKPT
|
393
|
-
# in the *Amazon Web Services
|
391
|
+
# Decrypts ciphertext data to plaintext using a symmetric (TDES, AES),
|
392
|
+
# asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
|
393
|
+
# more information, see [Decrypt data][1] in the *Amazon Web Services
|
394
|
+
# Payment Cryptography User Guide*.
|
394
395
|
#
|
395
396
|
# You can use an encryption key generated within Amazon Web Services
|
396
397
|
# Payment Cryptography, or you can import your own encryption key by
|
@@ -403,11 +404,15 @@ module Aws::PaymentCryptographyData
|
|
403
404
|
# [GetPublicCertificate][3].
|
404
405
|
#
|
405
406
|
# For symmetric and DUKPT decryption, Amazon Web Services Payment
|
406
|
-
# Cryptography supports `TDES` and `AES` algorithms. For
|
407
|
-
#
|
408
|
-
#
|
409
|
-
#
|
410
|
-
#
|
407
|
+
# Cryptography supports `TDES` and `AES` algorithms. For EMV decryption,
|
408
|
+
# Amazon Web Services Payment Cryptography supports `TDES` algorithms.
|
409
|
+
# For asymmetric decryption, Amazon Web Services Payment Cryptography
|
410
|
+
# supports `RSA`.
|
411
|
+
#
|
412
|
+
# When you use TDES or TDES DUKPT, the ciphertext data length must be a
|
413
|
+
# multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length
|
414
|
+
# must be a multiple of 16 bytes. For RSA, it sould be equal to the key
|
415
|
+
# size unless padding is enabled.
|
411
416
|
#
|
412
417
|
# For information about valid keys for this operation, see
|
413
418
|
# [Understanding key attributes][4] and [Key types for specific data
|
@@ -464,6 +469,14 @@ module Aws::PaymentCryptographyData
|
|
464
469
|
# key_serial_number: "HexLengthBetween10And24", # required
|
465
470
|
# mode: "ECB", # accepts ECB, CBC
|
466
471
|
# },
|
472
|
+
# emv: {
|
473
|
+
# initialization_vector: "HexLength16Or32",
|
474
|
+
# major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
|
475
|
+
# mode: "ECB", # accepts ECB, CBC
|
476
|
+
# pan_sequence_number: "HexLengthEquals2", # required
|
477
|
+
# primary_account_number: "NumberLengthBetween12And19", # required
|
478
|
+
# session_derivation_data: "HexLengthEquals16", # required
|
479
|
+
# },
|
467
480
|
# symmetric: {
|
468
481
|
# initialization_vector: "HexLength16Or32",
|
469
482
|
# mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
|
@@ -488,9 +501,10 @@ module Aws::PaymentCryptographyData
|
|
488
501
|
req.send_request(options)
|
489
502
|
end
|
490
503
|
|
491
|
-
# Encrypts plaintext data to ciphertext using symmetric,
|
492
|
-
# DUKPT
|
493
|
-
# in the *Amazon Web Services
|
504
|
+
# Encrypts plaintext data to ciphertext using a symmetric (TDES, AES),
|
505
|
+
# asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
|
506
|
+
# more information, see [Encrypt data][1] in the *Amazon Web Services
|
507
|
+
# Payment Cryptography User Guide*.
|
494
508
|
#
|
495
509
|
# You can generate an encryption key within Amazon Web Services Payment
|
496
510
|
# Cryptography by calling [CreateKey][2]. You can import your own
|
@@ -498,14 +512,24 @@ module Aws::PaymentCryptographyData
|
|
498
512
|
# must have `KeyModesOfUse` set to `Encrypt`. In asymmetric encryption,
|
499
513
|
# plaintext is encrypted using public component. You can import the
|
500
514
|
# public component of an asymmetric key pair created outside Amazon Web
|
501
|
-
# Services Payment Cryptography by calling [ImportKey][3]
|
515
|
+
# Services Payment Cryptography by calling [ImportKey][3].
|
502
516
|
#
|
503
|
-
#
|
504
|
-
# Cryptography supports `TDES` and `AES` algorithms. For
|
505
|
-
#
|
506
|
-
#
|
507
|
-
#
|
508
|
-
#
|
517
|
+
# For symmetric and DUKPT encryption, Amazon Web Services Payment
|
518
|
+
# Cryptography supports `TDES` and `AES` algorithms. For EMV encryption,
|
519
|
+
# Amazon Web Services Payment Cryptography supports `TDES`
|
520
|
+
# algorithms.For asymmetric encryption, Amazon Web Services Payment
|
521
|
+
# Cryptography supports `RSA`.
|
522
|
+
#
|
523
|
+
# When you use TDES or TDES DUKPT, the plaintext data length must be a
|
524
|
+
# multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length
|
525
|
+
# must be a multiple of 16 bytes. For RSA, it sould be equal to the key
|
526
|
+
# size unless padding is enabled.
|
527
|
+
#
|
528
|
+
# To encrypt using DUKPT, you must already have a BDK (Base Derivation
|
529
|
+
# Key) key in your account with `KeyModesOfUse` set to `DeriveKey`, or
|
530
|
+
# you can generate a new DUKPT key by calling [CreateKey][2]. To encrypt
|
531
|
+
# using EMV, you must already have an IMK (Issuer Master Key) key in
|
532
|
+
# your account with `KeyModesOfUse` set to `DeriveKey`.
|
509
533
|
#
|
510
534
|
# For information about valid keys for this operation, see
|
511
535
|
# [Understanding key attributes][4] and [Key types for specific data
|
@@ -544,6 +568,18 @@ module Aws::PaymentCryptographyData
|
|
544
568
|
# @option params [required, String] :plain_text
|
545
569
|
# The plaintext to be encrypted.
|
546
570
|
#
|
571
|
+
# <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
|
572
|
+
# constrained by encryption key strength that you define in
|
573
|
+
# `KeyAlgorithm` and padding type that you define in
|
574
|
+
# `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
|
575
|
+
# data][1] in the *Amazon Web Services Payment Cryptography User Guide*.
|
576
|
+
#
|
577
|
+
# </note>
|
578
|
+
#
|
579
|
+
#
|
580
|
+
#
|
581
|
+
# [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
|
582
|
+
#
|
547
583
|
# @return [Types::EncryptDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
548
584
|
#
|
549
585
|
# * {Types::EncryptDataOutput#cipher_text #cipher_text} => String
|
@@ -564,6 +600,14 @@ module Aws::PaymentCryptographyData
|
|
564
600
|
# key_serial_number: "HexLengthBetween10And24", # required
|
565
601
|
# mode: "ECB", # accepts ECB, CBC
|
566
602
|
# },
|
603
|
+
# emv: {
|
604
|
+
# initialization_vector: "HexLength16Or32",
|
605
|
+
# major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
|
606
|
+
# mode: "ECB", # accepts ECB, CBC
|
607
|
+
# pan_sequence_number: "HexLengthEquals2", # required
|
608
|
+
# primary_account_number: "NumberLengthBetween12And19", # required
|
609
|
+
# session_derivation_data: "HexLengthEquals16", # required
|
610
|
+
# },
|
567
611
|
# symmetric: {
|
568
612
|
# initialization_vector: "HexLength16Or32",
|
569
613
|
# mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
|
@@ -708,15 +752,19 @@ module Aws::PaymentCryptographyData
|
|
708
752
|
# Generates a Message Authentication Code (MAC) cryptogram within Amazon
|
709
753
|
# Web Services Payment Cryptography.
|
710
754
|
#
|
711
|
-
# You can use this operation
|
712
|
-
#
|
713
|
-
#
|
714
|
-
#
|
715
|
-
#
|
716
|
-
#
|
717
|
-
#
|
718
|
-
#
|
719
|
-
#
|
755
|
+
# You can use this operation to authenticate card-related data by using
|
756
|
+
# known data values to generate MAC for data validation between the
|
757
|
+
# sending and receiving parties. This operation uses message data, a
|
758
|
+
# secret encryption key and MAC algorithm to generate a unique MAC value
|
759
|
+
# for transmission. The receiving party of the MAC must use the same
|
760
|
+
# message data, secret encryption key and MAC algorithm to reproduce
|
761
|
+
# another MAC value for comparision.
|
762
|
+
#
|
763
|
+
# You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC
|
764
|
+
# by setting generation attributes and algorithm to the associated
|
765
|
+
# values. The MAC generation encryption key must have valid values for
|
766
|
+
# `KeyUsage` such as `TR31_M7_HMAC_KEY` for HMAC generation, and they
|
767
|
+
# key must have `KeyModesOfUse` set to `Generate` and `Verify`.
|
720
768
|
#
|
721
769
|
# For information about valid keys for this operation, see
|
722
770
|
# [Understanding key attributes][1] and [Key types for specific data
|
@@ -748,7 +796,8 @@ module Aws::PaymentCryptographyData
|
|
748
796
|
# The length of a MAC under generation.
|
749
797
|
#
|
750
798
|
# @option params [required, String] :message_data
|
751
|
-
# The data for which a MAC is under generation.
|
799
|
+
# The data for which a MAC is under generation. This value must be
|
800
|
+
# hexBinary.
|
752
801
|
#
|
753
802
|
# @return [Types::GenerateMacOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
754
803
|
#
|
@@ -1073,10 +1122,7 @@ module Aws::PaymentCryptographyData
|
|
1073
1122
|
# can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for
|
1074
1123
|
# DUKPT or from BDK for DUKPT to PEK. Amazon Web Services Payment
|
1075
1124
|
# Cryptography supports `TDES` and `AES` key derivation type for DUKPT
|
1076
|
-
#
|
1077
|
-
# Encryption) use cases where the encryption keys should change but the
|
1078
|
-
# processing system either does not need to, or is not permitted to,
|
1079
|
-
# decrypt the data.
|
1125
|
+
# translations.
|
1080
1126
|
#
|
1081
1127
|
# The allowed combinations of PIN block format translations are guided
|
1082
1128
|
# by PCI. It is important to note that not all encrypted PIN block
|
@@ -1090,8 +1136,9 @@ module Aws::PaymentCryptographyData
|
|
1090
1136
|
# operations][3] in the *Amazon Web Services Payment Cryptography User
|
1091
1137
|
# Guide*.
|
1092
1138
|
#
|
1093
|
-
# <note markdown="1">
|
1094
|
-
#
|
1139
|
+
# <note markdown="1"> Amazon Web Services Payment Cryptography currently supports ISO PIN
|
1140
|
+
# block 4 translation for PIN block built using legacy PAN length. That
|
1141
|
+
# is, PAN is the right most 12 digits excluding the check digits.
|
1095
1142
|
#
|
1096
1143
|
# </note>
|
1097
1144
|
#
|
@@ -1116,15 +1163,15 @@ module Aws::PaymentCryptographyData
|
|
1116
1163
|
#
|
1117
1164
|
# @option params [Types::DukptDerivationAttributes] :incoming_dukpt_attributes
|
1118
1165
|
# The attributes and values to use for incoming DUKPT encryption key for
|
1119
|
-
# PIN block
|
1166
|
+
# PIN block translation.
|
1120
1167
|
#
|
1121
1168
|
# @option params [required, String] :incoming_key_identifier
|
1122
1169
|
# The `keyARN` of the encryption key under which incoming PIN block data
|
1123
1170
|
# is encrypted. This key type can be PEK or BDK.
|
1124
1171
|
#
|
1125
1172
|
# @option params [required, Types::TranslationIsoFormats] :incoming_translation_attributes
|
1126
|
-
# The format of the incoming PIN block data for
|
1127
|
-
# Web Services Payment Cryptography.
|
1173
|
+
# The format of the incoming PIN block data for translation within
|
1174
|
+
# Amazon Web Services Payment Cryptography.
|
1128
1175
|
#
|
1129
1176
|
# @option params [Types::DukptDerivationAttributes] :outgoing_dukpt_attributes
|
1130
1177
|
# The attributes and values to use for outgoing DUKPT encryption key
|
@@ -1135,7 +1182,7 @@ module Aws::PaymentCryptographyData
|
|
1135
1182
|
# data. This key type can be PEK or BDK.
|
1136
1183
|
#
|
1137
1184
|
# @option params [required, Types::TranslationIsoFormats] :outgoing_translation_attributes
|
1138
|
-
# The format of the outgoing PIN block data after
|
1185
|
+
# The format of the outgoing PIN block data after translation by Amazon
|
1139
1186
|
# Web Services Payment Cryptography.
|
1140
1187
|
#
|
1141
1188
|
# @return [Types::TranslatePinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1460,13 +1507,12 @@ module Aws::PaymentCryptographyData
|
|
1460
1507
|
|
1461
1508
|
# Verifies a Message Authentication Code (MAC).
|
1462
1509
|
#
|
1463
|
-
# You can use this operation
|
1464
|
-
#
|
1465
|
-
#
|
1466
|
-
#
|
1467
|
-
#
|
1468
|
-
#
|
1469
|
-
# same encryption key for MAC verification as you use for GenerateMac.
|
1510
|
+
# You can use this operation to verify MAC for message data
|
1511
|
+
# authentication such as . In this operation, you must use the same
|
1512
|
+
# message data, secret encryption key and MAC algorithm that was used to
|
1513
|
+
# generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC
|
1514
|
+
# or EMV MAC by setting generation attributes and algorithm to the
|
1515
|
+
# associated values.
|
1470
1516
|
#
|
1471
1517
|
# For information about valid keys for this operation, see
|
1472
1518
|
# [Understanding key attributes][1] and [Key types for specific data
|
@@ -1498,7 +1544,8 @@ module Aws::PaymentCryptographyData
|
|
1498
1544
|
# The length of the MAC.
|
1499
1545
|
#
|
1500
1546
|
# @option params [required, String] :message_data
|
1501
|
-
# The data on for which MAC is under verification.
|
1547
|
+
# The data on for which MAC is under verification. This value must be
|
1548
|
+
# hexBinary.
|
1502
1549
|
#
|
1503
1550
|
# @option params [required, Types::MacAttributes] :verification_attributes
|
1504
1551
|
# The attributes and data values to use for MAC verification within
|
@@ -1691,7 +1738,7 @@ module Aws::PaymentCryptographyData
|
|
1691
1738
|
params: params,
|
1692
1739
|
config: config)
|
1693
1740
|
context[:gem_name] = 'aws-sdk-paymentcryptographydata'
|
1694
|
-
context[:gem_version] = '1.
|
1741
|
+
context[:gem_version] = '1.10.0'
|
1695
1742
|
Seahorse::Client::Request.new(handlers, context)
|
1696
1743
|
end
|
1697
1744
|
|
@@ -36,6 +36,9 @@ module Aws::PaymentCryptographyData
|
|
36
36
|
DukptKeyVariant = Shapes::StringShape.new(name: 'DukptKeyVariant')
|
37
37
|
DynamicCardVerificationCode = Shapes::StructureShape.new(name: 'DynamicCardVerificationCode')
|
38
38
|
DynamicCardVerificationValue = Shapes::StructureShape.new(name: 'DynamicCardVerificationValue')
|
39
|
+
EmvEncryptionAttributes = Shapes::StructureShape.new(name: 'EmvEncryptionAttributes')
|
40
|
+
EmvEncryptionMode = Shapes::StringShape.new(name: 'EmvEncryptionMode')
|
41
|
+
EmvMajorKeyDerivationMode = Shapes::StringShape.new(name: 'EmvMajorKeyDerivationMode')
|
39
42
|
EncryptDataInput = Shapes::StructureShape.new(name: 'EncryptDataInput')
|
40
43
|
EncryptDataOutput = Shapes::StructureShape.new(name: 'EncryptDataOutput')
|
41
44
|
EncryptionDecryptionAttributes = Shapes::UnionShape.new(name: 'EncryptionDecryptionAttributes')
|
@@ -253,6 +256,14 @@ module Aws::PaymentCryptographyData
|
|
253
256
|
DynamicCardVerificationValue.add_member(:service_code, Shapes::ShapeRef.new(shape: NumberLengthEquals3, required: true, location_name: "ServiceCode"))
|
254
257
|
DynamicCardVerificationValue.struct_class = Types::DynamicCardVerificationValue
|
255
258
|
|
259
|
+
EmvEncryptionAttributes.add_member(:initialization_vector, Shapes::ShapeRef.new(shape: HexLength16Or32, location_name: "InitializationVector"))
|
260
|
+
EmvEncryptionAttributes.add_member(:major_key_derivation_mode, Shapes::ShapeRef.new(shape: EmvMajorKeyDerivationMode, required: true, location_name: "MajorKeyDerivationMode"))
|
261
|
+
EmvEncryptionAttributes.add_member(:mode, Shapes::ShapeRef.new(shape: EmvEncryptionMode, location_name: "Mode"))
|
262
|
+
EmvEncryptionAttributes.add_member(:pan_sequence_number, Shapes::ShapeRef.new(shape: HexLengthEquals2, required: true, location_name: "PanSequenceNumber"))
|
263
|
+
EmvEncryptionAttributes.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
264
|
+
EmvEncryptionAttributes.add_member(:session_derivation_data, Shapes::ShapeRef.new(shape: HexLengthEquals16, required: true, location_name: "SessionDerivationData"))
|
265
|
+
EmvEncryptionAttributes.struct_class = Types::EmvEncryptionAttributes
|
266
|
+
|
256
267
|
EncryptDataInput.add_member(:encryption_attributes, Shapes::ShapeRef.new(shape: EncryptionDecryptionAttributes, required: true, location_name: "EncryptionAttributes"))
|
257
268
|
EncryptDataInput.add_member(:key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location: "uri", location_name: "KeyIdentifier"))
|
258
269
|
EncryptDataInput.add_member(:plain_text, Shapes::ShapeRef.new(shape: HexEvenLengthBetween16And4064, required: true, location_name: "PlainText"))
|
@@ -265,10 +276,12 @@ module Aws::PaymentCryptographyData
|
|
265
276
|
|
266
277
|
EncryptionDecryptionAttributes.add_member(:asymmetric, Shapes::ShapeRef.new(shape: AsymmetricEncryptionAttributes, location_name: "Asymmetric"))
|
267
278
|
EncryptionDecryptionAttributes.add_member(:dukpt, Shapes::ShapeRef.new(shape: DukptEncryptionAttributes, location_name: "Dukpt"))
|
279
|
+
EncryptionDecryptionAttributes.add_member(:emv, Shapes::ShapeRef.new(shape: EmvEncryptionAttributes, location_name: "Emv"))
|
268
280
|
EncryptionDecryptionAttributes.add_member(:symmetric, Shapes::ShapeRef.new(shape: SymmetricEncryptionAttributes, location_name: "Symmetric"))
|
269
281
|
EncryptionDecryptionAttributes.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
|
270
282
|
EncryptionDecryptionAttributes.add_member_subclass(:asymmetric, Types::EncryptionDecryptionAttributes::Asymmetric)
|
271
283
|
EncryptionDecryptionAttributes.add_member_subclass(:dukpt, Types::EncryptionDecryptionAttributes::Dukpt)
|
284
|
+
EncryptionDecryptionAttributes.add_member_subclass(:emv, Types::EncryptionDecryptionAttributes::Emv)
|
272
285
|
EncryptionDecryptionAttributes.add_member_subclass(:symmetric, Types::EncryptionDecryptionAttributes::Symmetric)
|
273
286
|
EncryptionDecryptionAttributes.add_member_subclass(:unknown, Types::EncryptionDecryptionAttributes::Unknown)
|
274
287
|
EncryptionDecryptionAttributes.struct_class = Types::EncryptionDecryptionAttributes
|
@@ -299,7 +312,7 @@ module Aws::PaymentCryptographyData
|
|
299
312
|
GeneratePinDataInput.add_member(:generation_attributes, Shapes::ShapeRef.new(shape: PinGenerationAttributes, required: true, location_name: "GenerationAttributes"))
|
300
313
|
GeneratePinDataInput.add_member(:generation_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "GenerationKeyIdentifier"))
|
301
314
|
GeneratePinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
302
|
-
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"
|
315
|
+
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
303
316
|
GeneratePinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
304
317
|
GeneratePinDataInput.struct_class = Types::GeneratePinDataInput
|
305
318
|
|
@@ -560,7 +573,7 @@ module Aws::PaymentCryptographyData
|
|
560
573
|
VerifyPinDataInput.add_member(:encrypted_pin_block, Shapes::ShapeRef.new(shape: HexLengthBetween16And32, required: true, location_name: "EncryptedPinBlock"))
|
561
574
|
VerifyPinDataInput.add_member(:encryption_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "EncryptionKeyIdentifier"))
|
562
575
|
VerifyPinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
563
|
-
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"
|
576
|
+
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
564
577
|
VerifyPinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
565
578
|
VerifyPinDataInput.add_member(:verification_attributes, Shapes::ShapeRef.new(shape: PinVerificationAttributes, required: true, location_name: "VerificationAttributes"))
|
566
579
|
VerifyPinDataInput.add_member(:verification_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "VerificationKeyIdentifier"))
|
@@ -32,7 +32,7 @@ module Aws::PaymentCryptographyData
|
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
33
|
end
|
34
34
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
35
|
-
if Aws::Endpoints::Matchers.boolean_equals?(
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
|
36
36
|
return Aws::Endpoints::Endpoint.new(url: "https://dataplane.payment-cryptography-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
37
37
|
end
|
38
38
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
@@ -376,15 +376,14 @@ module Aws::PaymentCryptographyData
|
|
376
376
|
# @!attribute [rw] key_check_value
|
377
377
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
378
378
|
# check if all parties holding a given key have the same key or to
|
379
|
-
# detect that a key has changed.
|
380
|
-
#
|
381
|
-
#
|
382
|
-
#
|
383
|
-
# resulting cryptogram.
|
379
|
+
# detect that a key has changed.
|
380
|
+
#
|
381
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
382
|
+
# to the CMAC specification.
|
384
383
|
# @return [String]
|
385
384
|
#
|
386
385
|
# @!attribute [rw] plain_text
|
387
|
-
# The decrypted plaintext data.
|
386
|
+
# The decrypted plaintext data in hexBinary format.
|
388
387
|
# @return [String]
|
389
388
|
#
|
390
389
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/DecryptDataOutput AWS API Documentation
|
@@ -494,11 +493,8 @@ module Aws::PaymentCryptographyData
|
|
494
493
|
# @return [String]
|
495
494
|
#
|
496
495
|
# @!attribute [rw] initialization_vector
|
497
|
-
# An input
|
498
|
-
#
|
499
|
-
# psuedo-random value, but sometimes it only needs to be unpredictable
|
500
|
-
# or unique. If you don't provide a value, Amazon Web Services
|
501
|
-
# Payment Cryptography generates a random value.
|
496
|
+
# An input used to provide the intial state. If no value is provided,
|
497
|
+
# Amazon Web Services Payment Cryptography defaults it to zero.
|
502
498
|
# @return [String]
|
503
499
|
#
|
504
500
|
# @!attribute [rw] key_serial_number
|
@@ -509,12 +505,7 @@ module Aws::PaymentCryptographyData
|
|
509
505
|
# @return [String]
|
510
506
|
#
|
511
507
|
# @!attribute [rw] mode
|
512
|
-
# The block cipher
|
513
|
-
# encrypt a block of data of fixed size, for example, 128 bits. The
|
514
|
-
# size of the input block is usually same as the size of the encrypted
|
515
|
-
# output block, while the key length can be different. A mode of
|
516
|
-
# operation describes how to repeatedly apply a cipher's single-block
|
517
|
-
# operation to securely transform amounts of data larger than a block.
|
508
|
+
# The block cipher method to use for encryption.
|
518
509
|
#
|
519
510
|
# The default is CBC.
|
520
511
|
# @return [String]
|
@@ -597,6 +588,53 @@ module Aws::PaymentCryptographyData
|
|
597
588
|
include Aws::Structure
|
598
589
|
end
|
599
590
|
|
591
|
+
# Parameters for plaintext encryption using EMV keys.
|
592
|
+
#
|
593
|
+
# @!attribute [rw] initialization_vector
|
594
|
+
# An input used to provide the intial state. If no value is provided,
|
595
|
+
# Amazon Web Services Payment Cryptography defaults it to zero.
|
596
|
+
# @return [String]
|
597
|
+
#
|
598
|
+
# @!attribute [rw] major_key_derivation_mode
|
599
|
+
# The EMV derivation mode to use for ICC master key derivation as per
|
600
|
+
# EMV version 4.3 book 2.
|
601
|
+
# @return [String]
|
602
|
+
#
|
603
|
+
# @!attribute [rw] mode
|
604
|
+
# The block cipher method to use for encryption.
|
605
|
+
# @return [String]
|
606
|
+
#
|
607
|
+
# @!attribute [rw] pan_sequence_number
|
608
|
+
# A number that identifies and differentiates payment cards with the
|
609
|
+
# same Primary Account Number (PAN).
|
610
|
+
# @return [String]
|
611
|
+
#
|
612
|
+
# @!attribute [rw] primary_account_number
|
613
|
+
# The Primary Account Number (PAN), a unique identifier for a payment
|
614
|
+
# credit or debit card and associates the card to a specific account
|
615
|
+
# holder.
|
616
|
+
# @return [String]
|
617
|
+
#
|
618
|
+
# @!attribute [rw] session_derivation_data
|
619
|
+
# The derivation value used to derive the ICC session key. It is
|
620
|
+
# typically the application transaction counter value padded with
|
621
|
+
# zeros or previous ARQC value padded with zeros as per EMV version
|
622
|
+
# 4.3 book 2.
|
623
|
+
# @return [String]
|
624
|
+
#
|
625
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EmvEncryptionAttributes AWS API Documentation
|
626
|
+
#
|
627
|
+
class EmvEncryptionAttributes < Struct.new(
|
628
|
+
:initialization_vector,
|
629
|
+
:major_key_derivation_mode,
|
630
|
+
:mode,
|
631
|
+
:pan_sequence_number,
|
632
|
+
:primary_account_number,
|
633
|
+
:session_derivation_data)
|
634
|
+
SENSITIVE = [:initialization_vector, :primary_account_number]
|
635
|
+
include Aws::Structure
|
636
|
+
end
|
637
|
+
|
600
638
|
# @!attribute [rw] encryption_attributes
|
601
639
|
# The encryption key type and attributes for plaintext encryption.
|
602
640
|
# @return [Types::EncryptionDecryptionAttributes]
|
@@ -608,6 +646,19 @@ module Aws::PaymentCryptographyData
|
|
608
646
|
#
|
609
647
|
# @!attribute [rw] plain_text
|
610
648
|
# The plaintext to be encrypted.
|
649
|
+
#
|
650
|
+
# <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
|
651
|
+
# constrained by encryption key strength that you define in
|
652
|
+
# `KeyAlgorithm` and padding type that you define in
|
653
|
+
# `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
|
654
|
+
# data][1] in the *Amazon Web Services Payment Cryptography User
|
655
|
+
# Guide*.
|
656
|
+
#
|
657
|
+
# </note>
|
658
|
+
#
|
659
|
+
#
|
660
|
+
#
|
661
|
+
# [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
|
611
662
|
# @return [String]
|
612
663
|
#
|
613
664
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EncryptDataInput AWS API Documentation
|
@@ -632,11 +683,10 @@ module Aws::PaymentCryptographyData
|
|
632
683
|
# @!attribute [rw] key_check_value
|
633
684
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
634
685
|
# check if all parties holding a given key have the same key or to
|
635
|
-
# detect that a key has changed.
|
636
|
-
#
|
637
|
-
#
|
638
|
-
#
|
639
|
-
# resulting cryptogram.
|
686
|
+
# detect that a key has changed.
|
687
|
+
#
|
688
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
689
|
+
# to the CMAC specification.
|
640
690
|
# @return [String]
|
641
691
|
#
|
642
692
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/EncryptDataOutput AWS API Documentation
|
@@ -662,6 +712,10 @@ module Aws::PaymentCryptographyData
|
|
662
712
|
# Parameters that are required to encrypt plaintext data using DUKPT.
|
663
713
|
# @return [Types::DukptEncryptionAttributes]
|
664
714
|
#
|
715
|
+
# @!attribute [rw] emv
|
716
|
+
# Parameters for plaintext encryption using EMV keys.
|
717
|
+
# @return [Types::EmvEncryptionAttributes]
|
718
|
+
#
|
665
719
|
# @!attribute [rw] symmetric
|
666
720
|
# Parameters that are required to perform encryption and decryption
|
667
721
|
# using symmetric keys.
|
@@ -672,6 +726,7 @@ module Aws::PaymentCryptographyData
|
|
672
726
|
class EncryptionDecryptionAttributes < Struct.new(
|
673
727
|
:asymmetric,
|
674
728
|
:dukpt,
|
729
|
+
:emv,
|
675
730
|
:symmetric,
|
676
731
|
:unknown)
|
677
732
|
SENSITIVE = []
|
@@ -680,6 +735,7 @@ module Aws::PaymentCryptographyData
|
|
680
735
|
|
681
736
|
class Asymmetric < EncryptionDecryptionAttributes; end
|
682
737
|
class Dukpt < EncryptionDecryptionAttributes; end
|
738
|
+
class Emv < EncryptionDecryptionAttributes; end
|
683
739
|
class Symmetric < EncryptionDecryptionAttributes; end
|
684
740
|
class Unknown < EncryptionDecryptionAttributes; end
|
685
741
|
end
|
@@ -724,11 +780,10 @@ module Aws::PaymentCryptographyData
|
|
724
780
|
# @!attribute [rw] key_check_value
|
725
781
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
726
782
|
# check if all parties holding a given key have the same key or to
|
727
|
-
# detect that a key has changed.
|
728
|
-
#
|
729
|
-
#
|
730
|
-
#
|
731
|
-
# resulting cryptogram.
|
783
|
+
# detect that a key has changed.
|
784
|
+
#
|
785
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
786
|
+
# to the CMAC specification.
|
732
787
|
# @return [String]
|
733
788
|
#
|
734
789
|
# @!attribute [rw] validation_data
|
@@ -760,7 +815,8 @@ module Aws::PaymentCryptographyData
|
|
760
815
|
# @return [Integer]
|
761
816
|
#
|
762
817
|
# @!attribute [rw] message_data
|
763
|
-
# The data for which a MAC is under generation.
|
818
|
+
# The data for which a MAC is under generation. This value must be
|
819
|
+
# hexBinary.
|
764
820
|
# @return [String]
|
765
821
|
#
|
766
822
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/GenerateMacInput AWS API Documentation
|
@@ -782,11 +838,10 @@ module Aws::PaymentCryptographyData
|
|
782
838
|
# @!attribute [rw] key_check_value
|
783
839
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
784
840
|
# check if all parties holding a given key have the same key or to
|
785
|
-
# detect that a key has changed.
|
786
|
-
#
|
787
|
-
#
|
788
|
-
#
|
789
|
-
# resulting cryptogram.
|
841
|
+
# detect that a key has changed.
|
842
|
+
#
|
843
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
844
|
+
# to the CMAC specification.
|
790
845
|
# @return [String]
|
791
846
|
#
|
792
847
|
# @!attribute [rw] mac
|
@@ -870,11 +925,10 @@ module Aws::PaymentCryptographyData
|
|
870
925
|
# @!attribute [rw] encryption_key_check_value
|
871
926
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
872
927
|
# check if all parties holding a given key have the same key or to
|
873
|
-
# detect that a key has changed.
|
874
|
-
#
|
875
|
-
#
|
876
|
-
#
|
877
|
-
# resulting cryptogram.
|
928
|
+
# detect that a key has changed.
|
929
|
+
#
|
930
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
931
|
+
# to the CMAC specification.
|
878
932
|
# @return [String]
|
879
933
|
#
|
880
934
|
# @!attribute [rw] generation_key_arn
|
@@ -885,11 +939,10 @@ module Aws::PaymentCryptographyData
|
|
885
939
|
# @!attribute [rw] generation_key_check_value
|
886
940
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
887
941
|
# check if all parties holding a given key have the same key or to
|
888
|
-
# detect that a key has changed.
|
889
|
-
#
|
890
|
-
#
|
891
|
-
#
|
892
|
-
# resulting cryptogram.
|
942
|
+
# detect that a key has changed.
|
943
|
+
#
|
944
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
945
|
+
# to the CMAC specification.
|
893
946
|
# @return [String]
|
894
947
|
#
|
895
948
|
# @!attribute [rw] pin_data
|
@@ -1168,7 +1221,7 @@ module Aws::PaymentCryptographyData
|
|
1168
1221
|
#
|
1169
1222
|
# @!attribute [rw] dukpt_iso_9797_algorithm_3
|
1170
1223
|
# Parameters that are required for MAC generation or verification
|
1171
|
-
# using DUKPT ISO 9797
|
1224
|
+
# using DUKPT ISO 9797 algorithm3.
|
1172
1225
|
# @return [Types::MacAlgorithmDukpt]
|
1173
1226
|
#
|
1174
1227
|
# @!attribute [rw] emv_mac
|
@@ -1357,11 +1410,10 @@ module Aws::PaymentCryptographyData
|
|
1357
1410
|
# @!attribute [rw] key_check_value
|
1358
1411
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
1359
1412
|
# check if all parties holding a given key have the same key or to
|
1360
|
-
# detect that a key has changed.
|
1361
|
-
#
|
1362
|
-
#
|
1363
|
-
#
|
1364
|
-
# resulting cryptogram.
|
1413
|
+
# detect that a key has changed.
|
1414
|
+
#
|
1415
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
1416
|
+
# to the CMAC specification.
|
1365
1417
|
# @return [String]
|
1366
1418
|
#
|
1367
1419
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/ReEncryptDataOutput AWS API Documentation
|
@@ -1635,20 +1687,12 @@ module Aws::PaymentCryptographyData
|
|
1635
1687
|
# Parameters requried to encrypt plaintext data using symmetric keys.
|
1636
1688
|
#
|
1637
1689
|
# @!attribute [rw] initialization_vector
|
1638
|
-
# An input
|
1639
|
-
#
|
1640
|
-
# random or psuedo-random value, but sometimes it only needs to be
|
1641
|
-
# unpredictable or unique. If a value is not provided, Amazon Web
|
1642
|
-
# Services Payment Cryptography generates a random value.
|
1690
|
+
# An input used to provide the intial state. If no value is provided,
|
1691
|
+
# Amazon Web Services Payment Cryptography defaults it to zero.
|
1643
1692
|
# @return [String]
|
1644
1693
|
#
|
1645
1694
|
# @!attribute [rw] mode
|
1646
|
-
# The block cipher
|
1647
|
-
# encrypt a block of data of fixed size (for example, 128 bits). The
|
1648
|
-
# size of the input block is usually same as the size of the encrypted
|
1649
|
-
# output block, while the key length can be different. A mode of
|
1650
|
-
# operation describes how to repeatedly apply a cipher's single-block
|
1651
|
-
# operation to securely transform amounts of data larger than a block.
|
1695
|
+
# The block cipher method to use for encryption.
|
1652
1696
|
# @return [String]
|
1653
1697
|
#
|
1654
1698
|
# @!attribute [rw] padding_type
|
@@ -1685,7 +1729,7 @@ module Aws::PaymentCryptographyData
|
|
1685
1729
|
#
|
1686
1730
|
# @!attribute [rw] incoming_dukpt_attributes
|
1687
1731
|
# The attributes and values to use for incoming DUKPT encryption key
|
1688
|
-
# for PIN block
|
1732
|
+
# for PIN block translation.
|
1689
1733
|
# @return [Types::DukptDerivationAttributes]
|
1690
1734
|
#
|
1691
1735
|
# @!attribute [rw] incoming_key_identifier
|
@@ -1694,7 +1738,7 @@ module Aws::PaymentCryptographyData
|
|
1694
1738
|
# @return [String]
|
1695
1739
|
#
|
1696
1740
|
# @!attribute [rw] incoming_translation_attributes
|
1697
|
-
# The format of the incoming PIN block data for
|
1741
|
+
# The format of the incoming PIN block data for translation within
|
1698
1742
|
# Amazon Web Services Payment Cryptography.
|
1699
1743
|
# @return [Types::TranslationIsoFormats]
|
1700
1744
|
#
|
@@ -1709,8 +1753,8 @@ module Aws::PaymentCryptographyData
|
|
1709
1753
|
# @return [String]
|
1710
1754
|
#
|
1711
1755
|
# @!attribute [rw] outgoing_translation_attributes
|
1712
|
-
# The format of the outgoing PIN block data after
|
1713
|
-
# Web Services Payment Cryptography.
|
1756
|
+
# The format of the outgoing PIN block data after translation by
|
1757
|
+
# Amazon Web Services Payment Cryptography.
|
1714
1758
|
# @return [Types::TranslationIsoFormats]
|
1715
1759
|
#
|
1716
1760
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/TranslatePinDataInput AWS API Documentation
|
@@ -1736,15 +1780,14 @@ module Aws::PaymentCryptographyData
|
|
1736
1780
|
# @!attribute [rw] key_check_value
|
1737
1781
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
1738
1782
|
# check if all parties holding a given key have the same key or to
|
1739
|
-
# detect that a key has changed.
|
1740
|
-
#
|
1741
|
-
#
|
1742
|
-
#
|
1743
|
-
# resulting cryptogram.
|
1783
|
+
# detect that a key has changed.
|
1784
|
+
#
|
1785
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
1786
|
+
# to the CMAC specification.
|
1744
1787
|
# @return [String]
|
1745
1788
|
#
|
1746
1789
|
# @!attribute [rw] pin_block
|
1747
|
-
# The
|
1790
|
+
# The outgoing encrypted PIN block data after translation.
|
1748
1791
|
# @return [String]
|
1749
1792
|
#
|
1750
1793
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/TranslatePinDataOutput AWS API Documentation
|
@@ -1940,11 +1983,10 @@ module Aws::PaymentCryptographyData
|
|
1940
1983
|
# @!attribute [rw] key_check_value
|
1941
1984
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
1942
1985
|
# check if all parties holding a given key have the same key or to
|
1943
|
-
# detect that a key has changed.
|
1944
|
-
#
|
1945
|
-
#
|
1946
|
-
#
|
1947
|
-
# resulting cryptogram.
|
1986
|
+
# detect that a key has changed.
|
1987
|
+
#
|
1988
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
1989
|
+
# to the CMAC specification.
|
1948
1990
|
# @return [String]
|
1949
1991
|
#
|
1950
1992
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyAuthRequestCryptogramOutput AWS API Documentation
|
@@ -1997,11 +2039,10 @@ module Aws::PaymentCryptographyData
|
|
1997
2039
|
# @!attribute [rw] key_check_value
|
1998
2040
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
1999
2041
|
# check if all parties holding a given key have the same key or to
|
2000
|
-
# detect that a key has changed.
|
2001
|
-
#
|
2002
|
-
#
|
2003
|
-
#
|
2004
|
-
# resulting cryptogram.
|
2042
|
+
# detect that a key has changed.
|
2043
|
+
#
|
2044
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
2045
|
+
# to the CMAC specification.
|
2005
2046
|
# @return [String]
|
2006
2047
|
#
|
2007
2048
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyCardValidationDataOutput AWS API Documentation
|
@@ -2027,7 +2068,8 @@ module Aws::PaymentCryptographyData
|
|
2027
2068
|
# @return [Integer]
|
2028
2069
|
#
|
2029
2070
|
# @!attribute [rw] message_data
|
2030
|
-
# The data on for which MAC is under verification.
|
2071
|
+
# The data on for which MAC is under verification. This value must be
|
2072
|
+
# hexBinary.
|
2031
2073
|
# @return [String]
|
2032
2074
|
#
|
2033
2075
|
# @!attribute [rw] verification_attributes
|
@@ -2055,11 +2097,10 @@ module Aws::PaymentCryptographyData
|
|
2055
2097
|
# @!attribute [rw] key_check_value
|
2056
2098
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
2057
2099
|
# check if all parties holding a given key have the same key or to
|
2058
|
-
# detect that a key has changed.
|
2059
|
-
#
|
2060
|
-
#
|
2061
|
-
#
|
2062
|
-
# resulting cryptogram.
|
2100
|
+
# detect that a key has changed.
|
2101
|
+
#
|
2102
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
2103
|
+
# to the CMAC specification.
|
2063
2104
|
# @return [String]
|
2064
2105
|
#
|
2065
2106
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyMacOutput AWS API Documentation
|
@@ -2139,11 +2180,10 @@ module Aws::PaymentCryptographyData
|
|
2139
2180
|
# @!attribute [rw] encryption_key_check_value
|
2140
2181
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
2141
2182
|
# check if all parties holding a given key have the same key or to
|
2142
|
-
# detect that a key has changed.
|
2143
|
-
#
|
2144
|
-
#
|
2145
|
-
#
|
2146
|
-
# resulting cryptogram.
|
2183
|
+
# detect that a key has changed.
|
2184
|
+
#
|
2185
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
2186
|
+
# to the CMAC specification.
|
2147
2187
|
# @return [String]
|
2148
2188
|
#
|
2149
2189
|
# @!attribute [rw] verification_key_arn
|
@@ -2154,11 +2194,10 @@ module Aws::PaymentCryptographyData
|
|
2154
2194
|
# @!attribute [rw] verification_key_check_value
|
2155
2195
|
# The key check value (KCV) of the encryption key. The KCV is used to
|
2156
2196
|
# check if all parties holding a given key have the same key or to
|
2157
|
-
# detect that a key has changed.
|
2158
|
-
#
|
2159
|
-
#
|
2160
|
-
#
|
2161
|
-
# resulting cryptogram.
|
2197
|
+
# detect that a key has changed.
|
2198
|
+
#
|
2199
|
+
# Amazon Web Services Payment Cryptography computes the KCV according
|
2200
|
+
# to the CMAC specification.
|
2162
2201
|
# @return [String]
|
2163
2202
|
#
|
2164
2203
|
# @see http://docs.aws.amazon.com/goto/WebAPI/payment-cryptography-data-2022-02-03/VerifyPinDataOutput AWS API Documentation
|
data/sig/client.rbs
CHANGED
@@ -92,6 +92,14 @@ module Aws
|
|
92
92
|
key_serial_number: ::String,
|
93
93
|
mode: ("ECB" | "CBC")?
|
94
94
|
}?,
|
95
|
+
emv: {
|
96
|
+
initialization_vector: ::String?,
|
97
|
+
major_key_derivation_mode: ("EMV_OPTION_A" | "EMV_OPTION_B"),
|
98
|
+
mode: ("ECB" | "CBC")?,
|
99
|
+
pan_sequence_number: ::String,
|
100
|
+
primary_account_number: ::String,
|
101
|
+
session_derivation_data: ::String
|
102
|
+
}?,
|
95
103
|
symmetric: {
|
96
104
|
initialization_vector: ::String?,
|
97
105
|
mode: ("ECB" | "CBC" | "CFB" | "CFB1" | "CFB8" | "CFB64" | "CFB128" | "OFB"),
|
@@ -121,6 +129,14 @@ module Aws
|
|
121
129
|
key_serial_number: ::String,
|
122
130
|
mode: ("ECB" | "CBC")?
|
123
131
|
}?,
|
132
|
+
emv: {
|
133
|
+
initialization_vector: ::String?,
|
134
|
+
major_key_derivation_mode: ("EMV_OPTION_A" | "EMV_OPTION_B"),
|
135
|
+
mode: ("ECB" | "CBC")?,
|
136
|
+
pan_sequence_number: ::String,
|
137
|
+
primary_account_number: ::String,
|
138
|
+
session_derivation_data: ::String
|
139
|
+
}?,
|
124
140
|
symmetric: {
|
125
141
|
initialization_vector: ::String?,
|
126
142
|
mode: ("ECB" | "CBC" | "CFB" | "CFB1" | "CFB8" | "CFB64" | "CFB128" | "OFB"),
|
data/sig/types.rbs
CHANGED
@@ -192,6 +192,16 @@ module Aws::PaymentCryptographyData
|
|
192
192
|
SENSITIVE: []
|
193
193
|
end
|
194
194
|
|
195
|
+
class EmvEncryptionAttributes
|
196
|
+
attr_accessor initialization_vector: ::String
|
197
|
+
attr_accessor major_key_derivation_mode: ("EMV_OPTION_A" | "EMV_OPTION_B")
|
198
|
+
attr_accessor mode: ("ECB" | "CBC")
|
199
|
+
attr_accessor pan_sequence_number: ::String
|
200
|
+
attr_accessor primary_account_number: ::String
|
201
|
+
attr_accessor session_derivation_data: ::String
|
202
|
+
SENSITIVE: [:initialization_vector, :primary_account_number]
|
203
|
+
end
|
204
|
+
|
195
205
|
class EncryptDataInput
|
196
206
|
attr_accessor encryption_attributes: Types::EncryptionDecryptionAttributes
|
197
207
|
attr_accessor key_identifier: ::String
|
@@ -209,6 +219,7 @@ module Aws::PaymentCryptographyData
|
|
209
219
|
class EncryptionDecryptionAttributes
|
210
220
|
attr_accessor asymmetric: Types::AsymmetricEncryptionAttributes
|
211
221
|
attr_accessor dukpt: Types::DukptEncryptionAttributes
|
222
|
+
attr_accessor emv: Types::EmvEncryptionAttributes
|
212
223
|
attr_accessor symmetric: Types::SymmetricEncryptionAttributes
|
213
224
|
attr_accessor unknown: untyped
|
214
225
|
SENSITIVE: []
|
@@ -217,6 +228,8 @@ module Aws::PaymentCryptographyData
|
|
217
228
|
end
|
218
229
|
class Dukpt < EncryptionDecryptionAttributes
|
219
230
|
end
|
231
|
+
class Emv < EncryptionDecryptionAttributes
|
232
|
+
end
|
220
233
|
class Symmetric < EncryptionDecryptionAttributes
|
221
234
|
end
|
222
235
|
class Unknown < EncryptionDecryptionAttributes
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-paymentcryptographydata
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.10.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-03-07 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|