@aws-sdk/client-payment-cryptography-data 3.606.0 → 3.609.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -48,6 +48,7 @@ __export(src_exports, {
48
48
  GeneratePinDataCommand: () => GeneratePinDataCommand,
49
49
  GeneratePinDataInputFilterSensitiveLog: () => GeneratePinDataInputFilterSensitiveLog,
50
50
  InternalServerException: () => InternalServerException,
51
+ KeyCheckValueAlgorithm: () => KeyCheckValueAlgorithm,
51
52
  MacAlgorithm: () => MacAlgorithm,
52
53
  MacAlgorithmEmvFilterSensitiveLog: () => MacAlgorithmEmvFilterSensitiveLog,
53
54
  MacAttributes: () => MacAttributes,
@@ -94,6 +95,9 @@ __export(src_exports, {
94
95
  VerifyMacInputFilterSensitiveLog: () => VerifyMacInputFilterSensitiveLog,
95
96
  VerifyPinDataCommand: () => VerifyPinDataCommand,
96
97
  VerifyPinDataInputFilterSensitiveLog: () => VerifyPinDataInputFilterSensitiveLog,
98
+ WrappedKeyFilterSensitiveLog: () => WrappedKeyFilterSensitiveLog,
99
+ WrappedKeyMaterial: () => WrappedKeyMaterial,
100
+ WrappedKeyMaterialFilterSensitiveLog: () => WrappedKeyMaterialFilterSensitiveLog,
97
101
  __Client: () => import_smithy_client.Client
98
102
  });
99
103
  module.exports = __toCommonJS(src_exports);
@@ -391,6 +395,18 @@ var EncryptionDecryptionAttributes;
391
395
  return visitor._(value.$unknown[0], value.$unknown[1]);
392
396
  }, "visit");
393
397
  })(EncryptionDecryptionAttributes || (EncryptionDecryptionAttributes = {}));
398
+ var KeyCheckValueAlgorithm = {
399
+ ANSI_X9_24: "ANSI_X9_24",
400
+ CMAC: "CMAC"
401
+ };
402
+ var WrappedKeyMaterial;
403
+ ((WrappedKeyMaterial3) => {
404
+ WrappedKeyMaterial3.visit = /* @__PURE__ */ __name((value, visitor) => {
405
+ if (value.Tr31KeyBlock !== void 0)
406
+ return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
407
+ return visitor._(value.$unknown[0], value.$unknown[1]);
408
+ }, "visit");
409
+ })(WrappedKeyMaterial || (WrappedKeyMaterial = {}));
394
410
  var _InternalServerException = class _InternalServerException extends PaymentCryptographyDataServiceException {
395
411
  /**
396
412
  * @internal
@@ -641,12 +657,23 @@ var EncryptionDecryptionAttributesFilterSensitiveLog = /* @__PURE__ */ __name((o
641
657
  if (obj.$unknown !== void 0)
642
658
  return { [obj.$unknown[0]]: "UNKNOWN" };
643
659
  }, "EncryptionDecryptionAttributesFilterSensitiveLog");
660
+ var WrappedKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
661
+ if (obj.Tr31KeyBlock !== void 0)
662
+ return { Tr31KeyBlock: import_smithy_client.SENSITIVE_STRING };
663
+ if (obj.$unknown !== void 0)
664
+ return { [obj.$unknown[0]]: "UNKNOWN" };
665
+ }, "WrappedKeyMaterialFilterSensitiveLog");
666
+ var WrappedKeyFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
667
+ ...obj,
668
+ ...obj.WrappedKeyMaterial && { WrappedKeyMaterial: WrappedKeyMaterialFilterSensitiveLog(obj.WrappedKeyMaterial) }
669
+ }), "WrappedKeyFilterSensitiveLog");
644
670
  var DecryptDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
645
671
  ...obj,
646
672
  ...obj.CipherText && { CipherText: import_smithy_client.SENSITIVE_STRING },
647
673
  ...obj.DecryptionAttributes && {
648
674
  DecryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.DecryptionAttributes)
649
- }
675
+ },
676
+ ...obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }
650
677
  }), "DecryptDataInputFilterSensitiveLog");
651
678
  var DecryptDataOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
652
679
  ...obj,
@@ -657,7 +684,8 @@ var EncryptDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
657
684
  ...obj.PlainText && { PlainText: import_smithy_client.SENSITIVE_STRING },
658
685
  ...obj.EncryptionAttributes && {
659
686
  EncryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.EncryptionAttributes)
660
- }
687
+ },
688
+ ...obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }
661
689
  }), "EncryptDataInputFilterSensitiveLog");
662
690
  var EncryptDataOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
663
691
  ...obj,
@@ -713,7 +741,9 @@ var ReEncryptDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
713
741
  },
714
742
  ...obj.OutgoingEncryptionAttributes && {
715
743
  OutgoingEncryptionAttributes: ReEncryptionAttributesFilterSensitiveLog(obj.OutgoingEncryptionAttributes)
716
- }
744
+ },
745
+ ...obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) },
746
+ ...obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }
717
747
  }), "ReEncryptDataInputFilterSensitiveLog");
718
748
  var ReEncryptDataOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
719
749
  ...obj,
@@ -743,7 +773,9 @@ var TranslatePinDataInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
743
773
  ...obj.OutgoingTranslationAttributes && {
744
774
  OutgoingTranslationAttributes: TranslationIsoFormatsFilterSensitiveLog(obj.OutgoingTranslationAttributes)
745
775
  },
746
- ...obj.EncryptedPinBlock && { EncryptedPinBlock: import_smithy_client.SENSITIVE_STRING }
776
+ ...obj.EncryptedPinBlock && { EncryptedPinBlock: import_smithy_client.SENSITIVE_STRING },
777
+ ...obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) },
778
+ ...obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }
747
779
  }), "TranslatePinDataInputFilterSensitiveLog");
748
780
  var SessionKeyAmexFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
749
781
  ...obj,
@@ -820,7 +852,8 @@ var se_DecryptDataCommand = /* @__PURE__ */ __name(async (input, context) => {
820
852
  body = JSON.stringify(
821
853
  (0, import_smithy_client.take)(input, {
822
854
  CipherText: [],
823
- DecryptionAttributes: (_) => (0, import_smithy_client._json)(_)
855
+ DecryptionAttributes: (_) => (0, import_smithy_client._json)(_),
856
+ WrappedKey: (_) => (0, import_smithy_client._json)(_)
824
857
  })
825
858
  );
826
859
  b.m("POST").h(headers).b(body);
@@ -837,7 +870,8 @@ var se_EncryptDataCommand = /* @__PURE__ */ __name(async (input, context) => {
837
870
  body = JSON.stringify(
838
871
  (0, import_smithy_client.take)(input, {
839
872
  EncryptionAttributes: (_) => (0, import_smithy_client._json)(_),
840
- PlainText: []
873
+ PlainText: [],
874
+ WrappedKey: (_) => (0, import_smithy_client._json)(_)
841
875
  })
842
876
  );
843
877
  b.m("POST").h(headers).b(body);
@@ -911,8 +945,10 @@ var se_ReEncryptDataCommand = /* @__PURE__ */ __name(async (input, context) => {
911
945
  (0, import_smithy_client.take)(input, {
912
946
  CipherText: [],
913
947
  IncomingEncryptionAttributes: (_) => (0, import_smithy_client._json)(_),
948
+ IncomingWrappedKey: (_) => (0, import_smithy_client._json)(_),
914
949
  OutgoingEncryptionAttributes: (_) => (0, import_smithy_client._json)(_),
915
- OutgoingKeyIdentifier: []
950
+ OutgoingKeyIdentifier: [],
951
+ OutgoingWrappedKey: (_) => (0, import_smithy_client._json)(_)
916
952
  })
917
953
  );
918
954
  b.m("POST").h(headers).b(body);
@@ -931,9 +967,11 @@ var se_TranslatePinDataCommand = /* @__PURE__ */ __name(async (input, context) =
931
967
  IncomingDukptAttributes: (_) => (0, import_smithy_client._json)(_),
932
968
  IncomingKeyIdentifier: [],
933
969
  IncomingTranslationAttributes: (_) => (0, import_smithy_client._json)(_),
970
+ IncomingWrappedKey: (_) => (0, import_smithy_client._json)(_),
934
971
  OutgoingDukptAttributes: (_) => (0, import_smithy_client._json)(_),
935
972
  OutgoingKeyIdentifier: [],
936
- OutgoingTranslationAttributes: (_) => (0, import_smithy_client._json)(_)
973
+ OutgoingTranslationAttributes: (_) => (0, import_smithy_client._json)(_),
974
+ OutgoingWrappedKey: (_) => (0, import_smithy_client._json)(_)
937
975
  })
938
976
  );
939
977
  b.m("POST").h(headers).b(body);
@@ -1541,6 +1579,8 @@ var PaymentCryptographyData = _PaymentCryptographyData;
1541
1579
  EmvEncryptionMode,
1542
1580
  EncryptionMode,
1543
1581
  EncryptionDecryptionAttributes,
1582
+ KeyCheckValueAlgorithm,
1583
+ WrappedKeyMaterial,
1544
1584
  InternalServerException,
1545
1585
  ResourceNotFoundException,
1546
1586
  ThrottlingException,
@@ -1563,6 +1603,8 @@ var PaymentCryptographyData = _PaymentCryptographyData;
1563
1603
  EmvEncryptionAttributesFilterSensitiveLog,
1564
1604
  SymmetricEncryptionAttributesFilterSensitiveLog,
1565
1605
  EncryptionDecryptionAttributesFilterSensitiveLog,
1606
+ WrappedKeyMaterialFilterSensitiveLog,
1607
+ WrappedKeyFilterSensitiveLog,
1566
1608
  DecryptDataInputFilterSensitiveLog,
1567
1609
  DecryptDataOutputFilterSensitiveLog,
1568
1610
  EncryptDataInputFilterSensitiveLog,
@@ -119,6 +119,18 @@ export var EncryptionDecryptionAttributes;
119
119
  return visitor._(value.$unknown[0], value.$unknown[1]);
120
120
  };
121
121
  })(EncryptionDecryptionAttributes || (EncryptionDecryptionAttributes = {}));
122
+ export const KeyCheckValueAlgorithm = {
123
+ ANSI_X9_24: "ANSI_X9_24",
124
+ CMAC: "CMAC",
125
+ };
126
+ export var WrappedKeyMaterial;
127
+ (function (WrappedKeyMaterial) {
128
+ WrappedKeyMaterial.visit = (value, visitor) => {
129
+ if (value.Tr31KeyBlock !== undefined)
130
+ return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
131
+ return visitor._(value.$unknown[0], value.$unknown[1]);
132
+ };
133
+ })(WrappedKeyMaterial || (WrappedKeyMaterial = {}));
122
134
  export class InternalServerException extends __BaseException {
123
135
  constructor(opts) {
124
136
  super({
@@ -344,12 +356,23 @@ export const EncryptionDecryptionAttributesFilterSensitiveLog = (obj) => {
344
356
  if (obj.$unknown !== undefined)
345
357
  return { [obj.$unknown[0]]: "UNKNOWN" };
346
358
  };
359
+ export const WrappedKeyMaterialFilterSensitiveLog = (obj) => {
360
+ if (obj.Tr31KeyBlock !== undefined)
361
+ return { Tr31KeyBlock: SENSITIVE_STRING };
362
+ if (obj.$unknown !== undefined)
363
+ return { [obj.$unknown[0]]: "UNKNOWN" };
364
+ };
365
+ export const WrappedKeyFilterSensitiveLog = (obj) => ({
366
+ ...obj,
367
+ ...(obj.WrappedKeyMaterial && { WrappedKeyMaterial: WrappedKeyMaterialFilterSensitiveLog(obj.WrappedKeyMaterial) }),
368
+ });
347
369
  export const DecryptDataInputFilterSensitiveLog = (obj) => ({
348
370
  ...obj,
349
371
  ...(obj.CipherText && { CipherText: SENSITIVE_STRING }),
350
372
  ...(obj.DecryptionAttributes && {
351
373
  DecryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.DecryptionAttributes),
352
374
  }),
375
+ ...(obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }),
353
376
  });
354
377
  export const DecryptDataOutputFilterSensitiveLog = (obj) => ({
355
378
  ...obj,
@@ -361,6 +384,7 @@ export const EncryptDataInputFilterSensitiveLog = (obj) => ({
361
384
  ...(obj.EncryptionAttributes && {
362
385
  EncryptionAttributes: EncryptionDecryptionAttributesFilterSensitiveLog(obj.EncryptionAttributes),
363
386
  }),
387
+ ...(obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }),
364
388
  });
365
389
  export const EncryptDataOutputFilterSensitiveLog = (obj) => ({
366
390
  ...obj,
@@ -417,6 +441,8 @@ export const ReEncryptDataInputFilterSensitiveLog = (obj) => ({
417
441
  ...(obj.OutgoingEncryptionAttributes && {
418
442
  OutgoingEncryptionAttributes: ReEncryptionAttributesFilterSensitiveLog(obj.OutgoingEncryptionAttributes),
419
443
  }),
444
+ ...(obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) }),
445
+ ...(obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }),
420
446
  });
421
447
  export const ReEncryptDataOutputFilterSensitiveLog = (obj) => ({
422
448
  ...obj,
@@ -447,6 +473,8 @@ export const TranslatePinDataInputFilterSensitiveLog = (obj) => ({
447
473
  OutgoingTranslationAttributes: TranslationIsoFormatsFilterSensitiveLog(obj.OutgoingTranslationAttributes),
448
474
  }),
449
475
  ...(obj.EncryptedPinBlock && { EncryptedPinBlock: SENSITIVE_STRING }),
476
+ ...(obj.IncomingWrappedKey && { IncomingWrappedKey: WrappedKeyFilterSensitiveLog(obj.IncomingWrappedKey) }),
477
+ ...(obj.OutgoingWrappedKey && { OutgoingWrappedKey: WrappedKeyFilterSensitiveLog(obj.OutgoingWrappedKey) }),
450
478
  });
451
479
  export const SessionKeyAmexFilterSensitiveLog = (obj) => ({
452
480
  ...obj,
@@ -14,6 +14,7 @@ export const se_DecryptDataCommand = async (input, context) => {
14
14
  body = JSON.stringify(take(input, {
15
15
  CipherText: [],
16
16
  DecryptionAttributes: (_) => _json(_),
17
+ WrappedKey: (_) => _json(_),
17
18
  }));
18
19
  b.m("POST").h(headers).b(body);
19
20
  return b.build();
@@ -29,6 +30,7 @@ export const se_EncryptDataCommand = async (input, context) => {
29
30
  body = JSON.stringify(take(input, {
30
31
  EncryptionAttributes: (_) => _json(_),
31
32
  PlainText: [],
33
+ WrappedKey: (_) => _json(_),
32
34
  }));
33
35
  b.m("POST").h(headers).b(body);
34
36
  return b.build();
@@ -94,8 +96,10 @@ export const se_ReEncryptDataCommand = async (input, context) => {
94
96
  body = JSON.stringify(take(input, {
95
97
  CipherText: [],
96
98
  IncomingEncryptionAttributes: (_) => _json(_),
99
+ IncomingWrappedKey: (_) => _json(_),
97
100
  OutgoingEncryptionAttributes: (_) => _json(_),
98
101
  OutgoingKeyIdentifier: [],
102
+ OutgoingWrappedKey: (_) => _json(_),
99
103
  }));
100
104
  b.m("POST").h(headers).b(body);
101
105
  return b.build();
@@ -112,9 +116,11 @@ export const se_TranslatePinDataCommand = async (input, context) => {
112
116
  IncomingDukptAttributes: (_) => _json(_),
113
117
  IncomingKeyIdentifier: [],
114
118
  IncomingTranslationAttributes: (_) => _json(_),
119
+ IncomingWrappedKey: (_) => _json(_),
115
120
  OutgoingDukptAttributes: (_) => _json(_),
116
121
  OutgoingKeyIdentifier: [],
117
122
  OutgoingTranslationAttributes: (_) => _json(_),
123
+ OutgoingWrappedKey: (_) => _json(_),
118
124
  }));
119
125
  b.m("POST").h(headers).b(body);
120
126
  return b.build();
@@ -88,6 +88,12 @@ declare const DecryptDataCommand_base: {
88
88
  * InitializationVector: "STRING_VALUE",
89
89
  * },
90
90
  * },
91
+ * WrappedKey: { // WrappedKey
92
+ * WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
93
+ * Tr31KeyBlock: "STRING_VALUE",
94
+ * },
95
+ * KeyCheckValueAlgorithm: "STRING_VALUE",
96
+ * },
91
97
  * };
92
98
  * const command = new DecryptDataCommand(input);
93
99
  * const response = await client.send(command);
@@ -94,6 +94,12 @@ declare const EncryptDataCommand_base: {
94
94
  * InitializationVector: "STRING_VALUE",
95
95
  * },
96
96
  * },
97
+ * WrappedKey: { // WrappedKey
98
+ * WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
99
+ * Tr31KeyBlock: "STRING_VALUE",
100
+ * },
101
+ * KeyCheckValueAlgorithm: "STRING_VALUE",
102
+ * },
97
103
  * };
98
104
  * const command = new EncryptDataCommand(input);
99
105
  * const response = await client.send(command);
@@ -27,9 +27,9 @@ declare const ReEncryptDataCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Re-encrypt ciphertext using DUKPT, Symmetric and Asymmetric Data Encryption Keys. </p>
31
- * <p>You can either generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The <code>KeyArn</code> for use with this operation must be in a compatible key state with <code>KeyModesOfUse</code> set to <code>Encrypt</code>. In asymmetric encryption, ciphertext is encrypted using public component (imported by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>) of the asymmetric key pair created outside of Amazon Web Services Payment Cryptography. </p>
32
- * <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. For asymmetric encryption, Amazon Web Services Payment Cryptography supports <code>RSA</code>. To encrypt using DUKPT, a DUKPT key must already exist within your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code> or a new DUKPT can be generated by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>.</p>
30
+ * <p>Re-encrypt ciphertext using DUKPT or Symmetric data encryption keys. </p>
31
+ * <p>You can either generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The <code>KeyArn</code> for use with this operation must be in a compatible key state with <code>KeyModesOfUse</code> set to <code>Encrypt</code>. </p>
32
+ * <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. To encrypt using DUKPT, a DUKPT key must already exist within your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code> or a new DUKPT can be generated by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>.</p>
33
33
  * <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
34
34
  * <p>
35
35
  * <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
@@ -96,6 +96,18 @@ declare const ReEncryptDataCommand_base: {
96
96
  * InitializationVector: "STRING_VALUE",
97
97
  * },
98
98
  * },
99
+ * IncomingWrappedKey: { // WrappedKey
100
+ * WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
101
+ * Tr31KeyBlock: "STRING_VALUE",
102
+ * },
103
+ * KeyCheckValueAlgorithm: "STRING_VALUE",
104
+ * },
105
+ * OutgoingWrappedKey: {
106
+ * WrappedKeyMaterial: {// Union: only one key present
107
+ * Tr31KeyBlock: "STRING_VALUE",
108
+ * },
109
+ * KeyCheckValueAlgorithm: "STRING_VALUE",
110
+ * },
99
111
  * };
100
112
  * const command = new ReEncryptDataCommand(input);
101
113
  * const response = await client.send(command);
@@ -93,6 +93,18 @@ declare const TranslatePinDataCommand_base: {
93
93
  * DukptKeyDerivationType: "STRING_VALUE",
94
94
  * DukptKeyVariant: "STRING_VALUE",
95
95
  * },
96
+ * IncomingWrappedKey: { // WrappedKey
97
+ * WrappedKeyMaterial: { // WrappedKeyMaterial Union: only one key present
98
+ * Tr31KeyBlock: "STRING_VALUE",
99
+ * },
100
+ * KeyCheckValueAlgorithm: "STRING_VALUE",
101
+ * },
102
+ * OutgoingWrappedKey: {
103
+ * WrappedKeyMaterial: {// Union: only one key present
104
+ * Tr31KeyBlock: "STRING_VALUE",
105
+ * },
106
+ * KeyCheckValueAlgorithm: "STRING_VALUE",
107
+ * },
96
108
  * };
97
109
  * const command = new TranslatePinDataCommand(input);
98
110
  * const response = await client.send(command);
@@ -787,12 +787,72 @@ export declare namespace EncryptionDecryptionAttributes {
787
787
  }
788
788
  const visit: <T>(value: EncryptionDecryptionAttributes, visitor: Visitor<T>) => T;
789
789
  }
790
+ /**
791
+ * @public
792
+ * @enum
793
+ */
794
+ export declare const KeyCheckValueAlgorithm: {
795
+ readonly ANSI_X9_24: "ANSI_X9_24";
796
+ readonly CMAC: "CMAC";
797
+ };
798
+ /**
799
+ * @public
800
+ */
801
+ export type KeyCheckValueAlgorithm = (typeof KeyCheckValueAlgorithm)[keyof typeof KeyCheckValueAlgorithm];
802
+ /**
803
+ * <p>Parameter information of a WrappedKeyBlock for encryption key exchange.</p>
804
+ * @public
805
+ */
806
+ export type WrappedKeyMaterial = WrappedKeyMaterial.Tr31KeyBlockMember | WrappedKeyMaterial.$UnknownMember;
807
+ /**
808
+ * @public
809
+ */
810
+ export declare namespace WrappedKeyMaterial {
811
+ /**
812
+ * <p>The TR-31 wrapped key block.</p>
813
+ * @public
814
+ */
815
+ interface Tr31KeyBlockMember {
816
+ Tr31KeyBlock: string;
817
+ $unknown?: never;
818
+ }
819
+ /**
820
+ * @public
821
+ */
822
+ interface $UnknownMember {
823
+ Tr31KeyBlock?: never;
824
+ $unknown: [string, any];
825
+ }
826
+ interface Visitor<T> {
827
+ Tr31KeyBlock: (value: string) => T;
828
+ _: (name: string, value: any) => T;
829
+ }
830
+ const visit: <T>(value: WrappedKeyMaterial, visitor: Visitor<T>) => T;
831
+ }
832
+ /**
833
+ * <p>Parameter information of a WrappedKeyBlock for encryption key exchange.</p>
834
+ * @public
835
+ */
836
+ export interface WrappedKey {
837
+ /**
838
+ * <p>Parameter information of a WrappedKeyBlock for encryption key exchange.</p>
839
+ * @public
840
+ */
841
+ WrappedKeyMaterial: WrappedKeyMaterial | undefined;
842
+ /**
843
+ * <p>The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.</p>
844
+ * <p>For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.</p>
845
+ * @public
846
+ */
847
+ KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm;
848
+ }
790
849
  /**
791
850
  * @public
792
851
  */
793
852
  export interface DecryptDataInput {
794
853
  /**
795
854
  * <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for ciphertext decryption.</p>
855
+ * <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
796
856
  * @public
797
857
  */
798
858
  KeyIdentifier: string | undefined;
@@ -806,6 +866,11 @@ export interface DecryptDataInput {
806
866
  * @public
807
867
  */
808
868
  DecryptionAttributes: EncryptionDecryptionAttributes | undefined;
869
+ /**
870
+ * <p>The WrappedKeyBlock containing the encryption key for ciphertext decryption.</p>
871
+ * @public
872
+ */
873
+ WrappedKey?: WrappedKey;
809
874
  }
810
875
  /**
811
876
  * @public
@@ -948,6 +1013,7 @@ export interface DukptDerivationAttributes {
948
1013
  export interface EncryptDataInput {
949
1014
  /**
950
1015
  * <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for plaintext encryption.</p>
1016
+ * <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
951
1017
  * @public
952
1018
  */
953
1019
  KeyIdentifier: string | undefined;
@@ -964,6 +1030,11 @@ export interface EncryptDataInput {
964
1030
  * @public
965
1031
  */
966
1032
  EncryptionAttributes: EncryptionDecryptionAttributes | undefined;
1033
+ /**
1034
+ * <p>The WrappedKeyBlock containing the encryption key for plaintext encryption.</p>
1035
+ * @public
1036
+ */
1037
+ WrappedKey?: WrappedKey;
967
1038
  }
968
1039
  /**
969
1040
  * @public
@@ -1739,6 +1810,7 @@ export declare namespace ReEncryptionAttributes {
1739
1810
  export interface ReEncryptDataInput {
1740
1811
  /**
1741
1812
  * <p>The <code>keyARN</code> of the encryption key of incoming ciphertext data.</p>
1813
+ * <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
1742
1814
  * @public
1743
1815
  */
1744
1816
  IncomingKeyIdentifier: string | undefined;
@@ -1762,6 +1834,16 @@ export interface ReEncryptDataInput {
1762
1834
  * @public
1763
1835
  */
1764
1836
  OutgoingEncryptionAttributes: ReEncryptionAttributes | undefined;
1837
+ /**
1838
+ * <p>The WrappedKeyBlock containing the encryption key of incoming ciphertext data.</p>
1839
+ * @public
1840
+ */
1841
+ IncomingWrappedKey?: WrappedKey;
1842
+ /**
1843
+ * <p>The WrappedKeyBlock containing the encryption key of outgoing ciphertext data after encryption by Amazon Web Services Payment Cryptography.</p>
1844
+ * @public
1845
+ */
1846
+ OutgoingWrappedKey?: WrappedKey;
1765
1847
  }
1766
1848
  /**
1767
1849
  * @public
@@ -1879,6 +1961,7 @@ export declare namespace TranslationIsoFormats {
1879
1961
  export interface TranslatePinDataInput {
1880
1962
  /**
1881
1963
  * <p>The <code>keyARN</code> of the encryption key under which incoming PIN block data is encrypted. This key type can be PEK or BDK.</p>
1964
+ * <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key for PIN block. Otherwise, it is the key identifier used to perform the operation.</p>
1882
1965
  * @public
1883
1966
  */
1884
1967
  IncomingKeyIdentifier: string | undefined;
@@ -1912,6 +1995,16 @@ export interface TranslatePinDataInput {
1912
1995
  * @public
1913
1996
  */
1914
1997
  OutgoingDukptAttributes?: DukptDerivationAttributes;
1998
+ /**
1999
+ * <p>The WrappedKeyBlock containing the encryption key under which incoming PIN block data is encrypted.</p>
2000
+ * @public
2001
+ */
2002
+ IncomingWrappedKey?: WrappedKey;
2003
+ /**
2004
+ * <p>The WrappedKeyBlock containing the encryption key for encrypting outgoing PIN block data.</p>
2005
+ * @public
2006
+ */
2007
+ OutgoingWrappedKey?: WrappedKey;
1915
2008
  }
1916
2009
  /**
1917
2010
  * @public
@@ -2447,6 +2540,14 @@ export declare const SymmetricEncryptionAttributesFilterSensitiveLog: (obj: Symm
2447
2540
  * @internal
2448
2541
  */
2449
2542
  export declare const EncryptionDecryptionAttributesFilterSensitiveLog: (obj: EncryptionDecryptionAttributes) => any;
2543
+ /**
2544
+ * @internal
2545
+ */
2546
+ export declare const WrappedKeyMaterialFilterSensitiveLog: (obj: WrappedKeyMaterial) => any;
2547
+ /**
2548
+ * @internal
2549
+ */
2550
+ export declare const WrappedKeyFilterSensitiveLog: (obj: WrappedKey) => any;
2450
2551
  /**
2451
2552
  * @internal
2452
2553
  */
@@ -435,10 +435,39 @@ export declare namespace EncryptionDecryptionAttributes {
435
435
  visitor: Visitor<T>
436
436
  ) => T;
437
437
  }
438
+ export declare const KeyCheckValueAlgorithm: {
439
+ readonly ANSI_X9_24: "ANSI_X9_24";
440
+ readonly CMAC: "CMAC";
441
+ };
442
+ export type KeyCheckValueAlgorithm =
443
+ (typeof KeyCheckValueAlgorithm)[keyof typeof KeyCheckValueAlgorithm];
444
+ export type WrappedKeyMaterial =
445
+ | WrappedKeyMaterial.Tr31KeyBlockMember
446
+ | WrappedKeyMaterial.$UnknownMember;
447
+ export declare namespace WrappedKeyMaterial {
448
+ interface Tr31KeyBlockMember {
449
+ Tr31KeyBlock: string;
450
+ $unknown?: never;
451
+ }
452
+ interface $UnknownMember {
453
+ Tr31KeyBlock?: never;
454
+ $unknown: [string, any];
455
+ }
456
+ interface Visitor<T> {
457
+ Tr31KeyBlock: (value: string) => T;
458
+ _: (name: string, value: any) => T;
459
+ }
460
+ const visit: <T>(value: WrappedKeyMaterial, visitor: Visitor<T>) => T;
461
+ }
462
+ export interface WrappedKey {
463
+ WrappedKeyMaterial: WrappedKeyMaterial | undefined;
464
+ KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm;
465
+ }
438
466
  export interface DecryptDataInput {
439
467
  KeyIdentifier: string | undefined;
440
468
  CipherText: string | undefined;
441
469
  DecryptionAttributes: EncryptionDecryptionAttributes | undefined;
470
+ WrappedKey?: WrappedKey;
442
471
  }
443
472
  export interface DecryptDataOutput {
444
473
  KeyArn: string | undefined;
@@ -494,6 +523,7 @@ export interface EncryptDataInput {
494
523
  KeyIdentifier: string | undefined;
495
524
  PlainText: string | undefined;
496
525
  EncryptionAttributes: EncryptionDecryptionAttributes | undefined;
526
+ WrappedKey?: WrappedKey;
497
527
  }
498
528
  export interface EncryptDataOutput {
499
529
  KeyArn: string | undefined;
@@ -852,6 +882,8 @@ export interface ReEncryptDataInput {
852
882
  CipherText: string | undefined;
853
883
  IncomingEncryptionAttributes: ReEncryptionAttributes | undefined;
854
884
  OutgoingEncryptionAttributes: ReEncryptionAttributes | undefined;
885
+ IncomingWrappedKey?: WrappedKey;
886
+ OutgoingWrappedKey?: WrappedKey;
855
887
  }
856
888
  export interface ReEncryptDataOutput {
857
889
  KeyArn: string | undefined;
@@ -921,6 +953,8 @@ export interface TranslatePinDataInput {
921
953
  EncryptedPinBlock: string | undefined;
922
954
  IncomingDukptAttributes?: DukptDerivationAttributes;
923
955
  OutgoingDukptAttributes?: DukptDerivationAttributes;
956
+ IncomingWrappedKey?: WrappedKey;
957
+ OutgoingWrappedKey?: WrappedKey;
924
958
  }
925
959
  export interface TranslatePinDataOutput {
926
960
  PinBlock: string | undefined;
@@ -1127,6 +1161,10 @@ export declare const SymmetricEncryptionAttributesFilterSensitiveLog: (
1127
1161
  export declare const EncryptionDecryptionAttributesFilterSensitiveLog: (
1128
1162
  obj: EncryptionDecryptionAttributes
1129
1163
  ) => any;
1164
+ export declare const WrappedKeyMaterialFilterSensitiveLog: (
1165
+ obj: WrappedKeyMaterial
1166
+ ) => any;
1167
+ export declare const WrappedKeyFilterSensitiveLog: (obj: WrappedKey) => any;
1130
1168
  export declare const DecryptDataInputFilterSensitiveLog: (
1131
1169
  obj: DecryptDataInput
1132
1170
  ) => any;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-payment-cryptography-data",
3
3
  "description": "AWS SDK for JavaScript Payment Cryptography Data Client for Node.js, Browser and React Native",
4
- "version": "3.606.0",
4
+ "version": "3.609.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-payment-cryptography-data",
@@ -20,43 +20,43 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
- "@aws-sdk/client-sso-oidc": "3.606.0",
24
- "@aws-sdk/client-sts": "3.606.0",
25
- "@aws-sdk/core": "3.598.0",
26
- "@aws-sdk/credential-provider-node": "3.600.0",
27
- "@aws-sdk/middleware-host-header": "3.598.0",
28
- "@aws-sdk/middleware-logger": "3.598.0",
29
- "@aws-sdk/middleware-recursion-detection": "3.598.0",
30
- "@aws-sdk/middleware-user-agent": "3.598.0",
31
- "@aws-sdk/region-config-resolver": "3.598.0",
32
- "@aws-sdk/types": "3.598.0",
33
- "@aws-sdk/util-endpoints": "3.598.0",
34
- "@aws-sdk/util-user-agent-browser": "3.598.0",
35
- "@aws-sdk/util-user-agent-node": "3.598.0",
36
- "@smithy/config-resolver": "^3.0.2",
37
- "@smithy/core": "^2.2.1",
38
- "@smithy/fetch-http-handler": "^3.0.2",
39
- "@smithy/hash-node": "^3.0.1",
40
- "@smithy/invalid-dependency": "^3.0.1",
41
- "@smithy/middleware-content-length": "^3.0.1",
42
- "@smithy/middleware-endpoint": "^3.0.2",
43
- "@smithy/middleware-retry": "^3.0.4",
44
- "@smithy/middleware-serde": "^3.0.1",
45
- "@smithy/middleware-stack": "^3.0.1",
46
- "@smithy/node-config-provider": "^3.1.1",
47
- "@smithy/node-http-handler": "^3.0.1",
48
- "@smithy/protocol-http": "^4.0.1",
49
- "@smithy/smithy-client": "^3.1.2",
50
- "@smithy/types": "^3.1.0",
51
- "@smithy/url-parser": "^3.0.1",
23
+ "@aws-sdk/client-sso-oidc": "3.609.0",
24
+ "@aws-sdk/client-sts": "3.609.0",
25
+ "@aws-sdk/core": "3.609.0",
26
+ "@aws-sdk/credential-provider-node": "3.609.0",
27
+ "@aws-sdk/middleware-host-header": "3.609.0",
28
+ "@aws-sdk/middleware-logger": "3.609.0",
29
+ "@aws-sdk/middleware-recursion-detection": "3.609.0",
30
+ "@aws-sdk/middleware-user-agent": "3.609.0",
31
+ "@aws-sdk/region-config-resolver": "3.609.0",
32
+ "@aws-sdk/types": "3.609.0",
33
+ "@aws-sdk/util-endpoints": "3.609.0",
34
+ "@aws-sdk/util-user-agent-browser": "3.609.0",
35
+ "@aws-sdk/util-user-agent-node": "3.609.0",
36
+ "@smithy/config-resolver": "^3.0.4",
37
+ "@smithy/core": "^2.2.4",
38
+ "@smithy/fetch-http-handler": "^3.2.0",
39
+ "@smithy/hash-node": "^3.0.3",
40
+ "@smithy/invalid-dependency": "^3.0.3",
41
+ "@smithy/middleware-content-length": "^3.0.3",
42
+ "@smithy/middleware-endpoint": "^3.0.4",
43
+ "@smithy/middleware-retry": "^3.0.7",
44
+ "@smithy/middleware-serde": "^3.0.3",
45
+ "@smithy/middleware-stack": "^3.0.3",
46
+ "@smithy/node-config-provider": "^3.1.3",
47
+ "@smithy/node-http-handler": "^3.1.1",
48
+ "@smithy/protocol-http": "^4.0.3",
49
+ "@smithy/smithy-client": "^3.1.5",
50
+ "@smithy/types": "^3.3.0",
51
+ "@smithy/url-parser": "^3.0.3",
52
52
  "@smithy/util-base64": "^3.0.0",
53
53
  "@smithy/util-body-length-browser": "^3.0.0",
54
54
  "@smithy/util-body-length-node": "^3.0.0",
55
- "@smithy/util-defaults-mode-browser": "^3.0.4",
56
- "@smithy/util-defaults-mode-node": "^3.0.4",
57
- "@smithy/util-endpoints": "^2.0.2",
58
- "@smithy/util-middleware": "^3.0.1",
59
- "@smithy/util-retry": "^3.0.1",
55
+ "@smithy/util-defaults-mode-browser": "^3.0.7",
56
+ "@smithy/util-defaults-mode-node": "^3.0.7",
57
+ "@smithy/util-endpoints": "^2.0.4",
58
+ "@smithy/util-middleware": "^3.0.3",
59
+ "@smithy/util-retry": "^3.0.3",
60
60
  "@smithy/util-utf8": "^3.0.0",
61
61
  "tslib": "^2.6.2"
62
62
  },