@aws-sdk/client-payment-cryptography-data 3.600.0 → 3.608.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +50 -8
- package/dist-es/models/models_0.js +28 -0
- package/dist-es/protocols/Aws_restJson1.js +6 -0
- package/dist-types/commands/DecryptDataCommand.d.ts +6 -0
- package/dist-types/commands/EncryptDataCommand.d.ts +6 -0
- package/dist-types/commands/ReEncryptDataCommand.d.ts +15 -3
- package/dist-types/commands/TranslatePinDataCommand.d.ts +12 -0
- package/dist-types/models/models_0.d.ts +101 -0
- package/dist-types/ts3.4/models/models_0.d.ts +38 -0
- package/package.json +3 -3
package/dist-cjs/index.js
CHANGED
|
@@ -48,6 +48,7 @@ __export(src_exports, {
|
|
|
48
48
|
GeneratePinDataCommand: () => GeneratePinDataCommand,
|
|
49
49
|
GeneratePinDataInputFilterSensitiveLog: () => GeneratePinDataInputFilterSensitiveLog,
|
|
50
50
|
InternalServerException: () => InternalServerException,
|
|
51
|
+
KeyCheckValueAlgorithm: () => KeyCheckValueAlgorithm,
|
|
51
52
|
MacAlgorithm: () => MacAlgorithm,
|
|
52
53
|
MacAlgorithmEmvFilterSensitiveLog: () => MacAlgorithmEmvFilterSensitiveLog,
|
|
53
54
|
MacAttributes: () => MacAttributes,
|
|
@@ -94,6 +95,9 @@ __export(src_exports, {
|
|
|
94
95
|
VerifyMacInputFilterSensitiveLog: () => VerifyMacInputFilterSensitiveLog,
|
|
95
96
|
VerifyPinDataCommand: () => VerifyPinDataCommand,
|
|
96
97
|
VerifyPinDataInputFilterSensitiveLog: () => VerifyPinDataInputFilterSensitiveLog,
|
|
98
|
+
WrappedKeyFilterSensitiveLog: () => WrappedKeyFilterSensitiveLog,
|
|
99
|
+
WrappedKeyMaterial: () => WrappedKeyMaterial,
|
|
100
|
+
WrappedKeyMaterialFilterSensitiveLog: () => WrappedKeyMaterialFilterSensitiveLog,
|
|
97
101
|
__Client: () => import_smithy_client.Client
|
|
98
102
|
});
|
|
99
103
|
module.exports = __toCommonJS(src_exports);
|
|
@@ -391,6 +395,18 @@ var EncryptionDecryptionAttributes;
|
|
|
391
395
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
392
396
|
}, "visit");
|
|
393
397
|
})(EncryptionDecryptionAttributes || (EncryptionDecryptionAttributes = {}));
|
|
398
|
+
var KeyCheckValueAlgorithm = {
|
|
399
|
+
ANSI_X9_24: "ANSI_X9_24",
|
|
400
|
+
CMAC: "CMAC"
|
|
401
|
+
};
|
|
402
|
+
var WrappedKeyMaterial;
|
|
403
|
+
((WrappedKeyMaterial3) => {
|
|
404
|
+
WrappedKeyMaterial3.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
405
|
+
if (value.Tr31KeyBlock !== void 0)
|
|
406
|
+
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
407
|
+
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
408
|
+
}, "visit");
|
|
409
|
+
})(WrappedKeyMaterial || (WrappedKeyMaterial = {}));
|
|
394
410
|
var _InternalServerException = class _InternalServerException extends PaymentCryptographyDataServiceException {
|
|
395
411
|
/**
|
|
396
412
|
* @internal
|
|
@@ -641,12 +657,23 @@ var EncryptionDecryptionAttributesFilterSensitiveLog = /* @__PURE__ */ __name((o
|
|
|
641
657
|
if (obj.$unknown !== void 0)
|
|
642
658
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
643
659
|
}, "EncryptionDecryptionAttributesFilterSensitiveLog");
|
|
660
|
+
var WrappedKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
|
|
661
|
+
if (obj.Tr31KeyBlock !== void 0)
|
|
662
|
+
return { Tr31KeyBlock: import_smithy_client.SENSITIVE_STRING };
|
|
663
|
+
if (obj.$unknown !== void 0)
|
|
664
|
+
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
665
|
+
}, "WrappedKeyMaterialFilterSensitiveLog");
|
|
666
|
+
var WrappedKeyFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
667
|
+
...obj,
|
|
668
|
+
...obj.WrappedKeyMaterial && { WrappedKeyMaterial: WrappedKeyMaterialFilterSensitiveLog(obj.WrappedKeyMaterial) }
|
|
669
|
+
}), "WrappedKeyFilterSensitiveLog");
|
|
644
670
|
var DecryptDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
645
671
|
...obj,
|
|
646
672
|
...obj.CipherText && { CipherText: import_smithy_client.SENSITIVE_STRING },
|
|
647
673
|
...obj.DecryptionAttributes && {
|
|
648
674
|
DecryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.DecryptionAttributes)
|
|
649
|
-
}
|
|
675
|
+
},
|
|
676
|
+
...obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }
|
|
650
677
|
}), "DecryptDataInputFilterSensitiveLog");
|
|
651
678
|
var DecryptDataOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
652
679
|
...obj,
|
|
@@ -657,7 +684,8 @@ var EncryptDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
|
657
684
|
...obj.PlainText && { PlainText: import_smithy_client.SENSITIVE_STRING },
|
|
658
685
|
...obj.EncryptionAttributes && {
|
|
659
686
|
EncryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.EncryptionAttributes)
|
|
660
|
-
}
|
|
687
|
+
},
|
|
688
|
+
...obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }
|
|
661
689
|
}), "EncryptDataInputFilterSensitiveLog");
|
|
662
690
|
var EncryptDataOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
663
691
|
...obj,
|
|
@@ -713,7 +741,9 @@ var ReEncryptDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
|
713
741
|
},
|
|
714
742
|
...obj.OutgoingEncryptionAttributes && {
|
|
715
743
|
OutgoingEncryptionAttributes: ReEncryptionAttributesFilterSensitiveLog(obj.OutgoingEncryptionAttributes)
|
|
716
|
-
}
|
|
744
|
+
},
|
|
745
|
+
...obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) },
|
|
746
|
+
...obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }
|
|
717
747
|
}), "ReEncryptDataInputFilterSensitiveLog");
|
|
718
748
|
var ReEncryptDataOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
719
749
|
...obj,
|
|
@@ -743,7 +773,9 @@ var TranslatePinDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
|
743
773
|
...obj.OutgoingTranslationAttributes && {
|
|
744
774
|
OutgoingTranslationAttributes: TranslationIsoFormatsFilterSensitiveLog(obj.OutgoingTranslationAttributes)
|
|
745
775
|
},
|
|
746
|
-
...obj.EncryptedPinBlock && { EncryptedPinBlock: import_smithy_client.SENSITIVE_STRING }
|
|
776
|
+
...obj.EncryptedPinBlock && { EncryptedPinBlock: import_smithy_client.SENSITIVE_STRING },
|
|
777
|
+
...obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) },
|
|
778
|
+
...obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }
|
|
747
779
|
}), "TranslatePinDataInputFilterSensitiveLog");
|
|
748
780
|
var SessionKeyAmexFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
749
781
|
...obj,
|
|
@@ -820,7 +852,8 @@ var se_DecryptDataCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
|
820
852
|
body = JSON.stringify(
|
|
821
853
|
(0, import_smithy_client.take)(input, {
|
|
822
854
|
CipherText: [],
|
|
823
|
-
DecryptionAttributes: (_) => (0, import_smithy_client._json)(_)
|
|
855
|
+
DecryptionAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
856
|
+
WrappedKey: (_) => (0, import_smithy_client._json)(_)
|
|
824
857
|
})
|
|
825
858
|
);
|
|
826
859
|
b.m("POST").h(headers).b(body);
|
|
@@ -837,7 +870,8 @@ var se_EncryptDataCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
|
837
870
|
body = JSON.stringify(
|
|
838
871
|
(0, import_smithy_client.take)(input, {
|
|
839
872
|
EncryptionAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
840
|
-
PlainText: []
|
|
873
|
+
PlainText: [],
|
|
874
|
+
WrappedKey: (_) => (0, import_smithy_client._json)(_)
|
|
841
875
|
})
|
|
842
876
|
);
|
|
843
877
|
b.m("POST").h(headers).b(body);
|
|
@@ -911,8 +945,10 @@ var se_ReEncryptDataCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
|
911
945
|
(0, import_smithy_client.take)(input, {
|
|
912
946
|
CipherText: [],
|
|
913
947
|
IncomingEncryptionAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
948
|
+
IncomingWrappedKey: (_) => (0, import_smithy_client._json)(_),
|
|
914
949
|
OutgoingEncryptionAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
915
|
-
OutgoingKeyIdentifier: []
|
|
950
|
+
OutgoingKeyIdentifier: [],
|
|
951
|
+
OutgoingWrappedKey: (_) => (0, import_smithy_client._json)(_)
|
|
916
952
|
})
|
|
917
953
|
);
|
|
918
954
|
b.m("POST").h(headers).b(body);
|
|
@@ -931,9 +967,11 @@ var se_TranslatePinDataCommand = /* @__PURE__ */ __name(async (input, context) =
|
|
|
931
967
|
IncomingDukptAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
932
968
|
IncomingKeyIdentifier: [],
|
|
933
969
|
IncomingTranslationAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
970
|
+
IncomingWrappedKey: (_) => (0, import_smithy_client._json)(_),
|
|
934
971
|
OutgoingDukptAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
935
972
|
OutgoingKeyIdentifier: [],
|
|
936
|
-
OutgoingTranslationAttributes: (_) => (0, import_smithy_client._json)(_)
|
|
973
|
+
OutgoingTranslationAttributes: (_) => (0, import_smithy_client._json)(_),
|
|
974
|
+
OutgoingWrappedKey: (_) => (0, import_smithy_client._json)(_)
|
|
937
975
|
})
|
|
938
976
|
);
|
|
939
977
|
b.m("POST").h(headers).b(body);
|
|
@@ -1541,6 +1579,8 @@ var PaymentCryptographyData = _PaymentCryptographyData;
|
|
|
1541
1579
|
EmvEncryptionMode,
|
|
1542
1580
|
EncryptionMode,
|
|
1543
1581
|
EncryptionDecryptionAttributes,
|
|
1582
|
+
KeyCheckValueAlgorithm,
|
|
1583
|
+
WrappedKeyMaterial,
|
|
1544
1584
|
InternalServerException,
|
|
1545
1585
|
ResourceNotFoundException,
|
|
1546
1586
|
ThrottlingException,
|
|
@@ -1563,6 +1603,8 @@ var PaymentCryptographyData = _PaymentCryptographyData;
|
|
|
1563
1603
|
EmvEncryptionAttributesFilterSensitiveLog,
|
|
1564
1604
|
SymmetricEncryptionAttributesFilterSensitiveLog,
|
|
1565
1605
|
EncryptionDecryptionAttributesFilterSensitiveLog,
|
|
1606
|
+
WrappedKeyMaterialFilterSensitiveLog,
|
|
1607
|
+
WrappedKeyFilterSensitiveLog,
|
|
1566
1608
|
DecryptDataInputFilterSensitiveLog,
|
|
1567
1609
|
DecryptDataOutputFilterSensitiveLog,
|
|
1568
1610
|
EncryptDataInputFilterSensitiveLog,
|
|
@@ -119,6 +119,18 @@ export var EncryptionDecryptionAttributes;
|
|
|
119
119
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
120
120
|
};
|
|
121
121
|
})(EncryptionDecryptionAttributes || (EncryptionDecryptionAttributes = {}));
|
|
122
|
+
export const KeyCheckValueAlgorithm = {
|
|
123
|
+
ANSI_X9_24: "ANSI_X9_24",
|
|
124
|
+
CMAC: "CMAC",
|
|
125
|
+
};
|
|
126
|
+
export var WrappedKeyMaterial;
|
|
127
|
+
(function (WrappedKeyMaterial) {
|
|
128
|
+
WrappedKeyMaterial.visit = (value, visitor) => {
|
|
129
|
+
if (value.Tr31KeyBlock !== undefined)
|
|
130
|
+
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
131
|
+
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
132
|
+
};
|
|
133
|
+
})(WrappedKeyMaterial || (WrappedKeyMaterial = {}));
|
|
122
134
|
export class InternalServerException extends __BaseException {
|
|
123
135
|
constructor(opts) {
|
|
124
136
|
super({
|
|
@@ -344,12 +356,23 @@ export const EncryptionDecryptionAttributesFilterSensitiveLog = (obj) => {
|
|
|
344
356
|
if (obj.$unknown !== undefined)
|
|
345
357
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
346
358
|
};
|
|
359
|
+
export const WrappedKeyMaterialFilterSensitiveLog = (obj) => {
|
|
360
|
+
if (obj.Tr31KeyBlock !== undefined)
|
|
361
|
+
return { Tr31KeyBlock: SENSITIVE_STRING };
|
|
362
|
+
if (obj.$unknown !== undefined)
|
|
363
|
+
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
364
|
+
};
|
|
365
|
+
export const WrappedKeyFilterSensitiveLog = (obj) => ({
|
|
366
|
+
...obj,
|
|
367
|
+
...(obj.WrappedKeyMaterial && { WrappedKeyMaterial: WrappedKeyMaterialFilterSensitiveLog(obj.WrappedKeyMaterial) }),
|
|
368
|
+
});
|
|
347
369
|
export const DecryptDataInputFilterSensitiveLog = (obj) => ({
|
|
348
370
|
...obj,
|
|
349
371
|
...(obj.CipherText && { CipherText: SENSITIVE_STRING }),
|
|
350
372
|
...(obj.DecryptionAttributes && {
|
|
351
373
|
DecryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.DecryptionAttributes),
|
|
352
374
|
}),
|
|
375
|
+
...(obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }),
|
|
353
376
|
});
|
|
354
377
|
export const DecryptDataOutputFilterSensitiveLog = (obj) => ({
|
|
355
378
|
...obj,
|
|
@@ -361,6 +384,7 @@ export const EncryptDataInputFilterSensitiveLog = (obj) => ({
|
|
|
361
384
|
...(obj.EncryptionAttributes && {
|
|
362
385
|
EncryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.EncryptionAttributes),
|
|
363
386
|
}),
|
|
387
|
+
...(obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }),
|
|
364
388
|
});
|
|
365
389
|
export const EncryptDataOutputFilterSensitiveLog = (obj) => ({
|
|
366
390
|
...obj,
|
|
@@ -417,6 +441,8 @@ export const ReEncryptDataInputFilterSensitiveLog = (obj) => ({
|
|
|
417
441
|
...(obj.OutgoingEncryptionAttributes && {
|
|
418
442
|
OutgoingEncryptionAttributes: ReEncryptionAttributesFilterSensitiveLog(obj.OutgoingEncryptionAttributes),
|
|
419
443
|
}),
|
|
444
|
+
...(obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) }),
|
|
445
|
+
...(obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }),
|
|
420
446
|
});
|
|
421
447
|
export const ReEncryptDataOutputFilterSensitiveLog = (obj) => ({
|
|
422
448
|
...obj,
|
|
@@ -447,6 +473,8 @@ export const TranslatePinDataInputFilterSensitiveLog = (obj) => ({
|
|
|
447
473
|
OutgoingTranslationAttributes: TranslationIsoFormatsFilterSensitiveLog(obj.OutgoingTranslationAttributes),
|
|
448
474
|
}),
|
|
449
475
|
...(obj.EncryptedPinBlock && { EncryptedPinBlock: SENSITIVE_STRING }),
|
|
476
|
+
...(obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) }),
|
|
477
|
+
...(obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }),
|
|
450
478
|
});
|
|
451
479
|
export const SessionKeyAmexFilterSensitiveLog = (obj) => ({
|
|
452
480
|
...obj,
|
|
@@ -14,6 +14,7 @@ export const se_DecryptDataCommand = async (input, context) => {
|
|
|
14
14
|
body = JSON.stringify(take(input, {
|
|
15
15
|
CipherText: [],
|
|
16
16
|
DecryptionAttributes: (_) => _json(_),
|
|
17
|
+
WrappedKey: (_) => _json(_),
|
|
17
18
|
}));
|
|
18
19
|
b.m("POST").h(headers).b(body);
|
|
19
20
|
return b.build();
|
|
@@ -29,6 +30,7 @@ export const se_EncryptDataCommand = async (input, context) => {
|
|
|
29
30
|
body = JSON.stringify(take(input, {
|
|
30
31
|
EncryptionAttributes: (_) => _json(_),
|
|
31
32
|
PlainText: [],
|
|
33
|
+
WrappedKey: (_) => _json(_),
|
|
32
34
|
}));
|
|
33
35
|
b.m("POST").h(headers).b(body);
|
|
34
36
|
return b.build();
|
|
@@ -94,8 +96,10 @@ export const se_ReEncryptDataCommand = async (input, context) => {
|
|
|
94
96
|
body = JSON.stringify(take(input, {
|
|
95
97
|
CipherText: [],
|
|
96
98
|
IncomingEncryptionAttributes: (_) => _json(_),
|
|
99
|
+
IncomingWrappedKey: (_) => _json(_),
|
|
97
100
|
OutgoingEncryptionAttributes: (_) => _json(_),
|
|
98
101
|
OutgoingKeyIdentifier: [],
|
|
102
|
+
OutgoingWrappedKey: (_) => _json(_),
|
|
99
103
|
}));
|
|
100
104
|
b.m("POST").h(headers).b(body);
|
|
101
105
|
return b.build();
|
|
@@ -112,9 +116,11 @@ export const se_TranslatePinDataCommand = async (input, context) => {
|
|
|
112
116
|
IncomingDukptAttributes: (_) => _json(_),
|
|
113
117
|
IncomingKeyIdentifier: [],
|
|
114
118
|
IncomingTranslationAttributes: (_) => _json(_),
|
|
119
|
+
IncomingWrappedKey: (_) => _json(_),
|
|
115
120
|
OutgoingDukptAttributes: (_) => _json(_),
|
|
116
121
|
OutgoingKeyIdentifier: [],
|
|
117
122
|
OutgoingTranslationAttributes: (_) => _json(_),
|
|
123
|
+
OutgoingWrappedKey: (_) => _json(_),
|
|
118
124
|
}));
|
|
119
125
|
b.m("POST").h(headers).b(body);
|
|
120
126
|
return b.build();
|
|
@@ -88,6 +88,12 @@ declare const DecryptDataCommand_base: {
|
|
|
88
88
|
* InitializationVector: "STRING_VALUE",
|
|
89
89
|
* },
|
|
90
90
|
* },
|
|
91
|
+
* WrappedKey: { // WrappedKey
|
|
92
|
+
* WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
|
|
93
|
+
* Tr31KeyBlock: "STRING_VALUE",
|
|
94
|
+
* },
|
|
95
|
+
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
96
|
+
* },
|
|
91
97
|
* };
|
|
92
98
|
* const command = new DecryptDataCommand(input);
|
|
93
99
|
* const response = await client.send(command);
|
|
@@ -94,6 +94,12 @@ declare const EncryptDataCommand_base: {
|
|
|
94
94
|
* InitializationVector: "STRING_VALUE",
|
|
95
95
|
* },
|
|
96
96
|
* },
|
|
97
|
+
* WrappedKey: { // WrappedKey
|
|
98
|
+
* WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
|
|
99
|
+
* Tr31KeyBlock: "STRING_VALUE",
|
|
100
|
+
* },
|
|
101
|
+
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
102
|
+
* },
|
|
97
103
|
* };
|
|
98
104
|
* const command = new EncryptDataCommand(input);
|
|
99
105
|
* const response = await client.send(command);
|
|
@@ -27,9 +27,9 @@ declare const ReEncryptDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Re-encrypt ciphertext using DUKPT
|
|
31
|
-
* <p>You can either generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The <code>KeyArn</code> for use with this operation must be in a compatible key state with <code>KeyModesOfUse</code> set to <code>Encrypt</code>.
|
|
32
|
-
* <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms.
|
|
30
|
+
* <p>Re-encrypt ciphertext using DUKPT or Symmetric data encryption keys. </p>
|
|
31
|
+
* <p>You can either generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The <code>KeyArn</code> for use with this operation must be in a compatible key state with <code>KeyModesOfUse</code> set to <code>Encrypt</code>. </p>
|
|
32
|
+
* <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. To encrypt using DUKPT, a DUKPT key must already exist within your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code> or a new DUKPT can be generated by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>.</p>
|
|
33
33
|
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
34
34
|
* <p>
|
|
35
35
|
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
@@ -96,6 +96,18 @@ declare const ReEncryptDataCommand_base: {
|
|
|
96
96
|
* InitializationVector: "STRING_VALUE",
|
|
97
97
|
* },
|
|
98
98
|
* },
|
|
99
|
+
* IncomingWrappedKey: { // WrappedKey
|
|
100
|
+
* WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
|
|
101
|
+
* Tr31KeyBlock: "STRING_VALUE",
|
|
102
|
+
* },
|
|
103
|
+
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
104
|
+
* },
|
|
105
|
+
* OutgoingWrappedKey: {
|
|
106
|
+
* WrappedKeyMaterial: {// Union: only one key present
|
|
107
|
+
* Tr31KeyBlock: "STRING_VALUE",
|
|
108
|
+
* },
|
|
109
|
+
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
110
|
+
* },
|
|
99
111
|
* };
|
|
100
112
|
* const command = new ReEncryptDataCommand(input);
|
|
101
113
|
* const response = await client.send(command);
|
|
@@ -93,6 +93,18 @@ declare const TranslatePinDataCommand_base: {
|
|
|
93
93
|
* DukptKeyDerivationType: "STRING_VALUE",
|
|
94
94
|
* DukptKeyVariant: "STRING_VALUE",
|
|
95
95
|
* },
|
|
96
|
+
* IncomingWrappedKey: { // WrappedKey
|
|
97
|
+
* WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
|
|
98
|
+
* Tr31KeyBlock: "STRING_VALUE",
|
|
99
|
+
* },
|
|
100
|
+
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
101
|
+
* },
|
|
102
|
+
* OutgoingWrappedKey: {
|
|
103
|
+
* WrappedKeyMaterial: {// Union: only one key present
|
|
104
|
+
* Tr31KeyBlock: "STRING_VALUE",
|
|
105
|
+
* },
|
|
106
|
+
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
107
|
+
* },
|
|
96
108
|
* };
|
|
97
109
|
* const command = new TranslatePinDataCommand(input);
|
|
98
110
|
* const response = await client.send(command);
|
|
@@ -787,12 +787,72 @@ export declare namespace EncryptionDecryptionAttributes {
|
|
|
787
787
|
}
|
|
788
788
|
const visit: <T>(value: EncryptionDecryptionAttributes, visitor: Visitor<T>) => T;
|
|
789
789
|
}
|
|
790
|
+
/**
|
|
791
|
+
* @public
|
|
792
|
+
* @enum
|
|
793
|
+
*/
|
|
794
|
+
export declare const KeyCheckValueAlgorithm: {
|
|
795
|
+
readonly ANSI_X9_24: "ANSI_X9_24";
|
|
796
|
+
readonly CMAC: "CMAC";
|
|
797
|
+
};
|
|
798
|
+
/**
|
|
799
|
+
* @public
|
|
800
|
+
*/
|
|
801
|
+
export type KeyCheckValueAlgorithm = (typeof KeyCheckValueAlgorithm)[keyof typeof KeyCheckValueAlgorithm];
|
|
802
|
+
/**
|
|
803
|
+
* <p>Parameter information of a WrappedKeyBlock for encryption key exchange.</p>
|
|
804
|
+
* @public
|
|
805
|
+
*/
|
|
806
|
+
export type WrappedKeyMaterial = WrappedKeyMaterial.Tr31KeyBlockMember | WrappedKeyMaterial.$UnknownMember;
|
|
807
|
+
/**
|
|
808
|
+
* @public
|
|
809
|
+
*/
|
|
810
|
+
export declare namespace WrappedKeyMaterial {
|
|
811
|
+
/**
|
|
812
|
+
* <p>The TR-31 wrapped key block.</p>
|
|
813
|
+
* @public
|
|
814
|
+
*/
|
|
815
|
+
interface Tr31KeyBlockMember {
|
|
816
|
+
Tr31KeyBlock: string;
|
|
817
|
+
$unknown?: never;
|
|
818
|
+
}
|
|
819
|
+
/**
|
|
820
|
+
* @public
|
|
821
|
+
*/
|
|
822
|
+
interface $UnknownMember {
|
|
823
|
+
Tr31KeyBlock?: never;
|
|
824
|
+
$unknown: [string, any];
|
|
825
|
+
}
|
|
826
|
+
interface Visitor<T> {
|
|
827
|
+
Tr31KeyBlock: (value: string) => T;
|
|
828
|
+
_: (name: string, value: any) => T;
|
|
829
|
+
}
|
|
830
|
+
const visit: <T>(value: WrappedKeyMaterial, visitor: Visitor<T>) => T;
|
|
831
|
+
}
|
|
832
|
+
/**
|
|
833
|
+
* <p>Parameter information of a WrappedKeyBlock for encryption key exchange.</p>
|
|
834
|
+
* @public
|
|
835
|
+
*/
|
|
836
|
+
export interface WrappedKey {
|
|
837
|
+
/**
|
|
838
|
+
* <p>Parameter information of a WrappedKeyBlock for encryption key exchange.</p>
|
|
839
|
+
* @public
|
|
840
|
+
*/
|
|
841
|
+
WrappedKeyMaterial: WrappedKeyMaterial | undefined;
|
|
842
|
+
/**
|
|
843
|
+
* <p>The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.</p>
|
|
844
|
+
* <p>For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.</p>
|
|
845
|
+
* @public
|
|
846
|
+
*/
|
|
847
|
+
KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm;
|
|
848
|
+
}
|
|
790
849
|
/**
|
|
791
850
|
* @public
|
|
792
851
|
*/
|
|
793
852
|
export interface DecryptDataInput {
|
|
794
853
|
/**
|
|
795
854
|
* <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for ciphertext decryption.</p>
|
|
855
|
+
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
796
856
|
* @public
|
|
797
857
|
*/
|
|
798
858
|
KeyIdentifier: string | undefined;
|
|
@@ -806,6 +866,11 @@ export interface DecryptDataInput {
|
|
|
806
866
|
* @public
|
|
807
867
|
*/
|
|
808
868
|
DecryptionAttributes: EncryptionDecryptionAttributes | undefined;
|
|
869
|
+
/**
|
|
870
|
+
* <p>The WrappedKeyBlock containing the encryption key for ciphertext decryption.</p>
|
|
871
|
+
* @public
|
|
872
|
+
*/
|
|
873
|
+
WrappedKey?: WrappedKey;
|
|
809
874
|
}
|
|
810
875
|
/**
|
|
811
876
|
* @public
|
|
@@ -948,6 +1013,7 @@ export interface DukptDerivationAttributes {
|
|
|
948
1013
|
export interface EncryptDataInput {
|
|
949
1014
|
/**
|
|
950
1015
|
* <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for plaintext encryption.</p>
|
|
1016
|
+
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
951
1017
|
* @public
|
|
952
1018
|
*/
|
|
953
1019
|
KeyIdentifier: string | undefined;
|
|
@@ -964,6 +1030,11 @@ export interface EncryptDataInput {
|
|
|
964
1030
|
* @public
|
|
965
1031
|
*/
|
|
966
1032
|
EncryptionAttributes: EncryptionDecryptionAttributes | undefined;
|
|
1033
|
+
/**
|
|
1034
|
+
* <p>The WrappedKeyBlock containing the encryption key for plaintext encryption.</p>
|
|
1035
|
+
* @public
|
|
1036
|
+
*/
|
|
1037
|
+
WrappedKey?: WrappedKey;
|
|
967
1038
|
}
|
|
968
1039
|
/**
|
|
969
1040
|
* @public
|
|
@@ -1739,6 +1810,7 @@ export declare namespace ReEncryptionAttributes {
|
|
|
1739
1810
|
export interface ReEncryptDataInput {
|
|
1740
1811
|
/**
|
|
1741
1812
|
* <p>The <code>keyARN</code> of the encryption key of incoming ciphertext data.</p>
|
|
1813
|
+
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
1742
1814
|
* @public
|
|
1743
1815
|
*/
|
|
1744
1816
|
IncomingKeyIdentifier: string | undefined;
|
|
@@ -1762,6 +1834,16 @@ export interface ReEncryptDataInput {
|
|
|
1762
1834
|
* @public
|
|
1763
1835
|
*/
|
|
1764
1836
|
OutgoingEncryptionAttributes: ReEncryptionAttributes | undefined;
|
|
1837
|
+
/**
|
|
1838
|
+
* <p>The WrappedKeyBlock containing the encryption key of incoming ciphertext data.</p>
|
|
1839
|
+
* @public
|
|
1840
|
+
*/
|
|
1841
|
+
IncomingWrappedKey?: WrappedKey;
|
|
1842
|
+
/**
|
|
1843
|
+
* <p>The WrappedKeyBlock containing the encryption key of outgoing ciphertext data after encryption by Amazon Web Services Payment Cryptography.</p>
|
|
1844
|
+
* @public
|
|
1845
|
+
*/
|
|
1846
|
+
OutgoingWrappedKey?: WrappedKey;
|
|
1765
1847
|
}
|
|
1766
1848
|
/**
|
|
1767
1849
|
* @public
|
|
@@ -1879,6 +1961,7 @@ export declare namespace TranslationIsoFormats {
|
|
|
1879
1961
|
export interface TranslatePinDataInput {
|
|
1880
1962
|
/**
|
|
1881
1963
|
* <p>The <code>keyARN</code> of the encryption key under which incoming PIN block data is encrypted. This key type can be PEK or BDK.</p>
|
|
1964
|
+
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key for PIN block. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
1882
1965
|
* @public
|
|
1883
1966
|
*/
|
|
1884
1967
|
IncomingKeyIdentifier: string | undefined;
|
|
@@ -1912,6 +1995,16 @@ export interface TranslatePinDataInput {
|
|
|
1912
1995
|
* @public
|
|
1913
1996
|
*/
|
|
1914
1997
|
OutgoingDukptAttributes?: DukptDerivationAttributes;
|
|
1998
|
+
/**
|
|
1999
|
+
* <p>The WrappedKeyBlock containing the encryption key under which incoming PIN block data is encrypted.</p>
|
|
2000
|
+
* @public
|
|
2001
|
+
*/
|
|
2002
|
+
IncomingWrappedKey?: WrappedKey;
|
|
2003
|
+
/**
|
|
2004
|
+
* <p>The WrappedKeyBlock containing the encryption key for encrypting outgoing PIN block data.</p>
|
|
2005
|
+
* @public
|
|
2006
|
+
*/
|
|
2007
|
+
OutgoingWrappedKey?: WrappedKey;
|
|
1915
2008
|
}
|
|
1916
2009
|
/**
|
|
1917
2010
|
* @public
|
|
@@ -2447,6 +2540,14 @@ export declare const SymmetricEncryptionAttributesFilterSensitiveLog: (obj: Symm
|
|
|
2447
2540
|
* @internal
|
|
2448
2541
|
*/
|
|
2449
2542
|
export declare const EncryptionDecryptionAttributesFilterSensitiveLog: (obj: EncryptionDecryptionAttributes) => any;
|
|
2543
|
+
/**
|
|
2544
|
+
* @internal
|
|
2545
|
+
*/
|
|
2546
|
+
export declare const WrappedKeyMaterialFilterSensitiveLog: (obj: WrappedKeyMaterial) => any;
|
|
2547
|
+
/**
|
|
2548
|
+
* @internal
|
|
2549
|
+
*/
|
|
2550
|
+
export declare const WrappedKeyFilterSensitiveLog: (obj: WrappedKey) => any;
|
|
2450
2551
|
/**
|
|
2451
2552
|
* @internal
|
|
2452
2553
|
*/
|
|
@@ -435,10 +435,39 @@ export declare namespace EncryptionDecryptionAttributes {
|
|
|
435
435
|
visitor: Visitor<T>
|
|
436
436
|
) => T;
|
|
437
437
|
}
|
|
438
|
+
export declare const KeyCheckValueAlgorithm: {
|
|
439
|
+
readonly ANSI_X9_24: "ANSI_X9_24";
|
|
440
|
+
readonly CMAC: "CMAC";
|
|
441
|
+
};
|
|
442
|
+
export type KeyCheckValueAlgorithm =
|
|
443
|
+
(typeof KeyCheckValueAlgorithm)[keyof typeof KeyCheckValueAlgorithm];
|
|
444
|
+
export type WrappedKeyMaterial =
|
|
445
|
+
| WrappedKeyMaterial.Tr31KeyBlockMember
|
|
446
|
+
| WrappedKeyMaterial.$UnknownMember;
|
|
447
|
+
export declare namespace WrappedKeyMaterial {
|
|
448
|
+
interface Tr31KeyBlockMember {
|
|
449
|
+
Tr31KeyBlock: string;
|
|
450
|
+
$unknown?: never;
|
|
451
|
+
}
|
|
452
|
+
interface $UnknownMember {
|
|
453
|
+
Tr31KeyBlock?: never;
|
|
454
|
+
$unknown: [string, any];
|
|
455
|
+
}
|
|
456
|
+
interface Visitor<T> {
|
|
457
|
+
Tr31KeyBlock: (value: string) => T;
|
|
458
|
+
_: (name: string, value: any) => T;
|
|
459
|
+
}
|
|
460
|
+
const visit: <T>(value: WrappedKeyMaterial, visitor: Visitor<T>) => T;
|
|
461
|
+
}
|
|
462
|
+
export interface WrappedKey {
|
|
463
|
+
WrappedKeyMaterial: WrappedKeyMaterial | undefined;
|
|
464
|
+
KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm;
|
|
465
|
+
}
|
|
438
466
|
export interface DecryptDataInput {
|
|
439
467
|
KeyIdentifier: string | undefined;
|
|
440
468
|
CipherText: string | undefined;
|
|
441
469
|
DecryptionAttributes: EncryptionDecryptionAttributes | undefined;
|
|
470
|
+
WrappedKey?: WrappedKey;
|
|
442
471
|
}
|
|
443
472
|
export interface DecryptDataOutput {
|
|
444
473
|
KeyArn: string | undefined;
|
|
@@ -494,6 +523,7 @@ export interface EncryptDataInput {
|
|
|
494
523
|
KeyIdentifier: string | undefined;
|
|
495
524
|
PlainText: string | undefined;
|
|
496
525
|
EncryptionAttributes: EncryptionDecryptionAttributes | undefined;
|
|
526
|
+
WrappedKey?: WrappedKey;
|
|
497
527
|
}
|
|
498
528
|
export interface EncryptDataOutput {
|
|
499
529
|
KeyArn: string | undefined;
|
|
@@ -852,6 +882,8 @@ export interface ReEncryptDataInput {
|
|
|
852
882
|
CipherText: string | undefined;
|
|
853
883
|
IncomingEncryptionAttributes: ReEncryptionAttributes | undefined;
|
|
854
884
|
OutgoingEncryptionAttributes: ReEncryptionAttributes | undefined;
|
|
885
|
+
IncomingWrappedKey?: WrappedKey;
|
|
886
|
+
OutgoingWrappedKey?: WrappedKey;
|
|
855
887
|
}
|
|
856
888
|
export interface ReEncryptDataOutput {
|
|
857
889
|
KeyArn: string | undefined;
|
|
@@ -921,6 +953,8 @@ export interface TranslatePinDataInput {
|
|
|
921
953
|
EncryptedPinBlock: string | undefined;
|
|
922
954
|
IncomingDukptAttributes?: DukptDerivationAttributes;
|
|
923
955
|
OutgoingDukptAttributes?: DukptDerivationAttributes;
|
|
956
|
+
IncomingWrappedKey?: WrappedKey;
|
|
957
|
+
OutgoingWrappedKey?: WrappedKey;
|
|
924
958
|
}
|
|
925
959
|
export interface TranslatePinDataOutput {
|
|
926
960
|
PinBlock: string | undefined;
|
|
@@ -1127,6 +1161,10 @@ export declare const SymmetricEncryptionAttributesFilterSensitiveLog: (
|
|
|
1127
1161
|
export declare const EncryptionDecryptionAttributesFilterSensitiveLog: (
|
|
1128
1162
|
obj: EncryptionDecryptionAttributes
|
|
1129
1163
|
) => any;
|
|
1164
|
+
export declare const WrappedKeyMaterialFilterSensitiveLog: (
|
|
1165
|
+
obj: WrappedKeyMaterial
|
|
1166
|
+
) => any;
|
|
1167
|
+
export declare const WrappedKeyFilterSensitiveLog: (obj: WrappedKey) => any;
|
|
1130
1168
|
export declare const DecryptDataInputFilterSensitiveLog: (
|
|
1131
1169
|
obj: DecryptDataInput
|
|
1132
1170
|
) => any;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-payment-cryptography-data",
|
|
3
3
|
"description": "AWS SDK for JavaScript Payment Cryptography Data Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.608.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-payment-cryptography-data",
|
|
@@ -20,8 +20,8 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
23
|
-
"@aws-sdk/client-sso-oidc": "3.
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
+
"@aws-sdk/client-sso-oidc": "3.606.0",
|
|
24
|
+
"@aws-sdk/client-sts": "3.606.0",
|
|
25
25
|
"@aws-sdk/core": "3.598.0",
|
|
26
26
|
"@aws-sdk/credential-provider-node": "3.600.0",
|
|
27
27
|
"@aws-sdk/middleware-host-header": "3.598.0",
|