@aws-sdk/client-payment-cryptography-data 3.830.0 → 3.835.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -2
- package/dist-cjs/index.js +6 -1
- package/dist-es/models/models_0.js +5 -0
- package/dist-types/PaymentCryptographyData.d.ts +1 -2
- package/dist-types/PaymentCryptographyDataClient.d.ts +1 -2
- package/dist-types/commands/DecryptDataCommand.d.ts +2 -29
- package/dist-types/commands/EncryptDataCommand.d.ts +2 -36
- package/dist-types/commands/GenerateCardValidationDataCommand.d.ts +1 -20
- package/dist-types/commands/GenerateMacCommand.d.ts +1 -16
- package/dist-types/commands/GenerateMacEmvPinChangeCommand.d.ts +1 -25
- package/dist-types/commands/GeneratePinDataCommand.d.ts +2 -27
- package/dist-types/commands/ReEncryptDataCommand.d.ts +3 -34
- package/dist-types/commands/TranslatePinDataCommand.d.ts +3 -29
- package/dist-types/commands/VerifyAuthRequestCryptogramCommand.d.ts +1 -20
- package/dist-types/commands/VerifyCardValidationDataCommand.d.ts +1 -25
- package/dist-types/commands/VerifyMacCommand.d.ts +1 -15
- package/dist-types/commands/VerifyPinDataCommand.d.ts +2 -21
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/index.d.ts +1 -2
- package/dist-types/models/models_0.d.ts +33 -60
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +4 -1
- package/dist-types/ts3.4/models/models_0.d.ts +5 -0
- package/package.json +11 -11
package/README.md
CHANGED
|
@@ -6,8 +6,7 @@
|
|
|
6
6
|
|
|
7
7
|
AWS SDK for JavaScript PaymentCryptographyData Client for Node.js, Browser and React Native.
|
|
8
8
|
|
|
9
|
-
<p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
10
|
-
<p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
9
|
+
<p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
11
10
|
|
|
12
11
|
## Installing
|
|
13
12
|
|
package/dist-cjs/index.js
CHANGED
|
@@ -437,12 +437,17 @@ var EncryptionDecryptionAttributes;
|
|
|
437
437
|
})(EncryptionDecryptionAttributes || (EncryptionDecryptionAttributes = {}));
|
|
438
438
|
var KeyCheckValueAlgorithm = {
|
|
439
439
|
ANSI_X9_24: "ANSI_X9_24",
|
|
440
|
-
CMAC: "CMAC"
|
|
440
|
+
CMAC: "CMAC",
|
|
441
|
+
HMAC: "HMAC"
|
|
441
442
|
};
|
|
442
443
|
var SymmetricKeyAlgorithm = {
|
|
443
444
|
AES_128: "AES_128",
|
|
444
445
|
AES_192: "AES_192",
|
|
445
446
|
AES_256: "AES_256",
|
|
447
|
+
HMAC_SHA224: "HMAC_SHA224",
|
|
448
|
+
HMAC_SHA256: "HMAC_SHA256",
|
|
449
|
+
HMAC_SHA384: "HMAC_SHA384",
|
|
450
|
+
HMAC_SHA512: "HMAC_SHA512",
|
|
446
451
|
TDES_2KEY: "TDES_2KEY",
|
|
447
452
|
TDES_3KEY: "TDES_3KEY"
|
|
448
453
|
};
|
|
@@ -127,11 +127,16 @@ export var EncryptionDecryptionAttributes;
|
|
|
127
127
|
export const KeyCheckValueAlgorithm = {
|
|
128
128
|
ANSI_X9_24: "ANSI_X9_24",
|
|
129
129
|
CMAC: "CMAC",
|
|
130
|
+
HMAC: "HMAC",
|
|
130
131
|
};
|
|
131
132
|
export const SymmetricKeyAlgorithm = {
|
|
132
133
|
AES_128: "AES_128",
|
|
133
134
|
AES_192: "AES_192",
|
|
134
135
|
AES_256: "AES_256",
|
|
136
|
+
HMAC_SHA224: "HMAC_SHA224",
|
|
137
|
+
HMAC_SHA256: "HMAC_SHA256",
|
|
138
|
+
HMAC_SHA384: "HMAC_SHA384",
|
|
139
|
+
HMAC_SHA512: "HMAC_SHA512",
|
|
135
140
|
TDES_2KEY: "TDES_2KEY",
|
|
136
141
|
TDES_3KEY: "TDES_3KEY",
|
|
137
142
|
};
|
|
@@ -87,8 +87,7 @@ export interface PaymentCryptographyData {
|
|
|
87
87
|
verifyPinData(args: VerifyPinDataCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: VerifyPinDataCommandOutput) => void): void;
|
|
88
88
|
}
|
|
89
89
|
/**
|
|
90
|
-
* <p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
91
|
-
* <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
90
|
+
* <p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
92
91
|
* @public
|
|
93
92
|
*/
|
|
94
93
|
export declare class PaymentCryptographyData extends PaymentCryptographyDataClient implements PaymentCryptographyData {
|
|
@@ -181,8 +181,7 @@ export type PaymentCryptographyDataClientResolvedConfigType = __SmithyResolvedCo
|
|
|
181
181
|
export interface PaymentCryptographyDataClientResolvedConfig extends PaymentCryptographyDataClientResolvedConfigType {
|
|
182
182
|
}
|
|
183
183
|
/**
|
|
184
|
-
* <p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
185
|
-
* <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
184
|
+
* <p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
186
185
|
* @public
|
|
187
186
|
*/
|
|
188
187
|
export declare class PaymentCryptographyDataClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, PaymentCryptographyDataClientResolvedConfig> {
|
|
@@ -27,34 +27,7 @@ declare const DecryptDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Decrypts ciphertext data to plaintext using a symmetric (TDES, AES), asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/decrypt-data.html">Decrypt data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>You can use an decryption key generated within Amazon Web Services Payment Cryptography, or you can import your own decryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. For this operation, the key must have <code>KeyModesOfUse</code> set to <code>Decrypt</code>. In asymmetric decryption, Amazon Web Services Payment Cryptography decrypts the ciphertext using the private component of the asymmetric encryption key pair. For data encryption outside of Amazon Web Services Payment Cryptography, you can export the public component of the asymmetric key pair by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a>.</p>
|
|
32
|
-
* <p>This operation also supports dynamic keys, allowing you to pass a dynamic decryption key as a TR-31 WrappedKeyBlock. This can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To decrypt using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped decryption key material. The incoming wrapped key shall have a key purpose of D0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
33
|
-
* <p>For symmetric and DUKPT decryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. For EMV decryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> algorithms. For asymmetric decryption, Amazon Web Services Payment Cryptography supports <code>RSA</code>. </p>
|
|
34
|
-
* <p>When you use TDES or TDES DUKPT, the ciphertext data length must be a multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length must be a multiple of 16 bytes. For RSA, it sould be equal to the key size unless padding is enabled.</p>
|
|
35
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
36
|
-
* <p>
|
|
37
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
38
|
-
* <p>
|
|
39
|
-
* <b>Related operations:</b>
|
|
40
|
-
* </p>
|
|
41
|
-
* <ul>
|
|
42
|
-
* <li>
|
|
43
|
-
* <p>
|
|
44
|
-
* <a>EncryptData</a>
|
|
45
|
-
* </p>
|
|
46
|
-
* </li>
|
|
47
|
-
* <li>
|
|
48
|
-
* <p>
|
|
49
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a>
|
|
50
|
-
* </p>
|
|
51
|
-
* </li>
|
|
52
|
-
* <li>
|
|
53
|
-
* <p>
|
|
54
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>
|
|
55
|
-
* </p>
|
|
56
|
-
* </li>
|
|
57
|
-
* </ul>
|
|
30
|
+
* <p>Decrypts ciphertext data to plaintext using a symmetric (TDES, AES), asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/decrypt-data.html">Decrypt data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>You can use an decryption key generated within Amazon Web Services Payment Cryptography, or you can import your own decryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. For this operation, the key must have <code>KeyModesOfUse</code> set to <code>Decrypt</code>. In asymmetric decryption, Amazon Web Services Payment Cryptography decrypts the ciphertext using the private component of the asymmetric encryption key pair. For data encryption outside of Amazon Web Services Payment Cryptography, you can export the public component of the asymmetric key pair by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a>.</p> <p>This operation also supports dynamic keys, allowing you to pass a dynamic decryption key as a TR-31 WrappedKeyBlock. This can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To decrypt using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped decryption key material. The incoming wrapped key shall have a key purpose of D0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>For symmetric and DUKPT decryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. For EMV decryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> algorithms. For asymmetric decryption, Amazon Web Services Payment Cryptography supports <code>RSA</code>. </p> <p>When you use TDES or TDES DUKPT, the ciphertext data length must be a multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length must be a multiple of 16 bytes. For RSA, it sould be equal to the key size unless padding is enabled.</p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>EncryptData</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> </p> </li> </ul>
|
|
58
31
|
* @example
|
|
59
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
60
33
|
* ```javascript
|
|
@@ -95,7 +68,7 @@ declare const DecryptDataCommand_base: {
|
|
|
95
68
|
* DiffieHellmanSymmetricKey: { // EcdhDerivationAttributes
|
|
96
69
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
97
70
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
98
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
71
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
99
72
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
100
73
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
101
74
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -27,41 +27,7 @@ declare const EncryptDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Encrypts plaintext data to ciphertext using a symmetric (TDES, AES), asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html">Encrypt data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>You can generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>. You can import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>.</p>
|
|
32
|
-
* <p>For this operation, the key must have <code>KeyModesOfUse</code> set to <code>Encrypt</code>. In asymmetric encryption, plaintext is encrypted using public component. You can import the public component of an asymmetric key pair created outside Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. </p>
|
|
33
|
-
* <p>This operation also supports dynamic keys, allowing you to pass a dynamic encryption key as a TR-31 WrappedKeyBlock. This can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To encrypt using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped encryption key material. The incoming wrapped key shall have a key purpose of D0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
34
|
-
* <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. For EMV encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> algorithms.For asymmetric encryption, Amazon Web Services Payment Cryptography supports <code>RSA</code>. </p>
|
|
35
|
-
* <p>When you use TDES or TDES DUKPT, the plaintext data length must be a multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length must be a multiple of 16 bytes. For RSA, it sould be equal to the key size unless padding is enabled.</p>
|
|
36
|
-
* <p>To encrypt using DUKPT, you must already have a BDK (Base Derivation Key) key in your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code>, or you can generate a new DUKPT key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>. To encrypt using EMV, you must already have an IMK (Issuer Master Key) key in your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code>.</p>
|
|
37
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
38
|
-
* <p>
|
|
39
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
40
|
-
* <p>
|
|
41
|
-
* <b>Related operations:</b>
|
|
42
|
-
* </p>
|
|
43
|
-
* <ul>
|
|
44
|
-
* <li>
|
|
45
|
-
* <p>
|
|
46
|
-
* <a>DecryptData</a>
|
|
47
|
-
* </p>
|
|
48
|
-
* </li>
|
|
49
|
-
* <li>
|
|
50
|
-
* <p>
|
|
51
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a>
|
|
52
|
-
* </p>
|
|
53
|
-
* </li>
|
|
54
|
-
* <li>
|
|
55
|
-
* <p>
|
|
56
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>
|
|
57
|
-
* </p>
|
|
58
|
-
* </li>
|
|
59
|
-
* <li>
|
|
60
|
-
* <p>
|
|
61
|
-
* <a>ReEncryptData</a>
|
|
62
|
-
* </p>
|
|
63
|
-
* </li>
|
|
64
|
-
* </ul>
|
|
30
|
+
* <p>Encrypts plaintext data to ciphertext using a symmetric (TDES, AES), asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html">Encrypt data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>You can generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>. You can import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>.</p> <p>For this operation, the key must have <code>KeyModesOfUse</code> set to <code>Encrypt</code>. In asymmetric encryption, plaintext is encrypted using public component. You can import the public component of an asymmetric key pair created outside Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. </p> <p>This operation also supports dynamic keys, allowing you to pass a dynamic encryption key as a TR-31 WrappedKeyBlock. This can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To encrypt using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped encryption key material. The incoming wrapped key shall have a key purpose of D0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. For EMV encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> algorithms.For asymmetric encryption, Amazon Web Services Payment Cryptography supports <code>RSA</code>. </p> <p>When you use TDES or TDES DUKPT, the plaintext data length must be a multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length must be a multiple of 16 bytes. For RSA, it sould be equal to the key size unless padding is enabled.</p> <p>To encrypt using DUKPT, you must already have a BDK (Base Derivation Key) key in your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code>, or you can generate a new DUKPT key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>. To encrypt using EMV, you must already have an IMK (Issuer Master Key) key in your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code>.</p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>DecryptData</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> </p> </li> <li> <p> <a>ReEncryptData</a> </p> </li> </ul>
|
|
65
31
|
* @example
|
|
66
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
67
33
|
* ```javascript
|
|
@@ -102,7 +68,7 @@ declare const EncryptDataCommand_base: {
|
|
|
102
68
|
* DiffieHellmanSymmetricKey: { // EcdhDerivationAttributes
|
|
103
69
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
104
70
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
105
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
71
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
106
72
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
107
73
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
108
74
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -27,26 +27,7 @@ declare const GenerateCardValidationDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Generates card-related validation data using algorithms such as Card Verification Values (CVV/CVV2), Dynamic Card Verification Values (dCVV/dCVV2), or Card Security Codes (CSC). For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/generate-card-data.html">Generate card data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>This operation generates a CVV or CSC value that is printed on a payment credit or debit card during card production. The CVV or CSC, PAN (Primary Account Number) and expiration date of the card are required to check its validity during transaction processing. To begin this operation, a CVK (Card Verification Key) encryption key is required. You can use <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> to establish a CVK within Amazon Web Services Payment Cryptography. The <code>KeyModesOfUse</code> should be set to <code>Generate</code> and <code>Verify</code> for a CVK encryption key. </p>
|
|
32
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
33
|
-
* <p>
|
|
34
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
35
|
-
* <p>
|
|
36
|
-
* <b>Related operations:</b>
|
|
37
|
-
* </p>
|
|
38
|
-
* <ul>
|
|
39
|
-
* <li>
|
|
40
|
-
* <p>
|
|
41
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>
|
|
42
|
-
* </p>
|
|
43
|
-
* </li>
|
|
44
|
-
* <li>
|
|
45
|
-
* <p>
|
|
46
|
-
* <a>VerifyCardValidationData</a>
|
|
47
|
-
* </p>
|
|
48
|
-
* </li>
|
|
49
|
-
* </ul>
|
|
30
|
+
* <p>Generates card-related validation data using algorithms such as Card Verification Values (CVV/CVV2), Dynamic Card Verification Values (dCVV/dCVV2), or Card Security Codes (CSC). For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/generate-card-data.html">Generate card data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>This operation generates a CVV or CSC value that is printed on a payment credit or debit card during card production. The CVV or CSC, PAN (Primary Account Number) and expiration date of the card are required to check its validity during transaction processing. To begin this operation, a CVK (Card Verification Key) encryption key is required. You can use <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> to establish a CVK within Amazon Web Services Payment Cryptography. The <code>KeyModesOfUse</code> should be set to <code>Generate</code> and <code>Verify</code> for a CVK encryption key. </p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> </p> </li> <li> <p> <a>VerifyCardValidationData</a> </p> </li> </ul>
|
|
50
31
|
* @example
|
|
51
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
52
33
|
* ```javascript
|
|
@@ -27,22 +27,7 @@ declare const GenerateMacCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Generates a Message Authentication Code (MAC) cryptogram within Amazon Web Services Payment Cryptography. </p>
|
|
31
|
-
* <p>You can use this operation to authenticate card-related data by using known data values to generate MAC for data validation between the sending and receiving parties. This operation uses message data, a secret encryption key and MAC algorithm to generate a unique MAC value for transmission. The receiving party of the MAC must use the same message data, secret encryption key and MAC algorithm to reproduce another MAC value for comparision.</p>
|
|
32
|
-
* <p>You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC by setting generation attributes and algorithm to the associated values. The MAC generation encryption key must have valid values for <code>KeyUsage</code> such as <code>TR31_M7_HMAC_KEY</code> for HMAC generation, and they key must have <code>KeyModesOfUse</code> set to <code>Generate</code> and <code>Verify</code>.</p>
|
|
33
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
34
|
-
* <p>
|
|
35
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
36
|
-
* <p>
|
|
37
|
-
* <b>Related operations:</b>
|
|
38
|
-
* </p>
|
|
39
|
-
* <ul>
|
|
40
|
-
* <li>
|
|
41
|
-
* <p>
|
|
42
|
-
* <a>VerifyMac</a>
|
|
43
|
-
* </p>
|
|
44
|
-
* </li>
|
|
45
|
-
* </ul>
|
|
30
|
+
* <p>Generates a Message Authentication Code (MAC) cryptogram within Amazon Web Services Payment Cryptography. </p> <p>You can use this operation to authenticate card-related data by using known data values to generate MAC for data validation between the sending and receiving parties. This operation uses message data, a secret encryption key and MAC algorithm to generate a unique MAC value for transmission. The receiving party of the MAC must use the same message data, secret encryption key and MAC algorithm to reproduce another MAC value for comparision.</p> <p>You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC by setting generation attributes and algorithm to the associated values. The MAC generation encryption key must have valid values for <code>KeyUsage</code> such as <code>TR31_M7_HMAC_KEY</code> for HMAC generation, and they key must have <code>KeyModesOfUse</code> set to <code>Generate</code> and <code>Verify</code>.</p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>VerifyMac</a> </p> </li> </ul>
|
|
46
31
|
* @example
|
|
47
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
48
33
|
* ```javascript
|
|
@@ -27,31 +27,7 @@ declare const GenerateMacEmvPinChangeCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Generates an issuer script mac for EMV payment cards that use offline PINs as the cardholder verification method (CVM).</p>
|
|
31
|
-
* <p>This operation generates an authenticated issuer script response by appending the incoming message data (APDU command) with the target encrypted PIN block in ISO2 format. The command structure and method to send the issuer script update to the card is not defined by this operation and is typically determined by the applicable payment card scheme.</p>
|
|
32
|
-
* <p>The primary inputs to this operation include the incoming new encrypted pinblock, PIN encryption key (PEK), issuer master key (IMK), primary account number (PAN), and the payment card derivation method.</p>
|
|
33
|
-
* <p>The operation uses two issuer master keys - secure messaging for confidentiality (IMK-SMC) and secure messaging for integrity (IMK-SMI). The SMC key is used to internally derive a key to secure the pin, while SMI key is used to internally derive a key to authenticate the script reponse as per the <a href="https://www.emvco.com/specifications/">EMV 4.4 - Book 2 - Security and Key Management</a> specification. </p>
|
|
34
|
-
* <p>This operation supports Amex, EMV2000, EMVCommon, Mastercard and Visa derivation methods, each requiring specific input parameters. Users must follow the specific derivation method and input parameters defined by the respective payment card scheme.</p>
|
|
35
|
-
* <note>
|
|
36
|
-
* <p>Use <a>GenerateMac</a> operation when sending a script update to an EMV card that does not involve PIN change. When assigning IAM permissions, it is important to understand that <a>EncryptData</a> using EMV keys and <a>GenerateMac</a> perform similar functions to this command.</p>
|
|
37
|
-
* </note>
|
|
38
|
-
* <p>
|
|
39
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
40
|
-
* <p>
|
|
41
|
-
* <b>Related operations:</b>
|
|
42
|
-
* </p>
|
|
43
|
-
* <ul>
|
|
44
|
-
* <li>
|
|
45
|
-
* <p>
|
|
46
|
-
* <a>EncryptData</a>
|
|
47
|
-
* </p>
|
|
48
|
-
* </li>
|
|
49
|
-
* <li>
|
|
50
|
-
* <p>
|
|
51
|
-
* <a>GenerateMac</a>
|
|
52
|
-
* </p>
|
|
53
|
-
* </li>
|
|
54
|
-
* </ul>
|
|
30
|
+
* <p>Generates an issuer script mac for EMV payment cards that use offline PINs as the cardholder verification method (CVM).</p> <p>This operation generates an authenticated issuer script response by appending the incoming message data (APDU command) with the target encrypted PIN block in ISO2 format. The command structure and method to send the issuer script update to the card is not defined by this operation and is typically determined by the applicable payment card scheme.</p> <p>The primary inputs to this operation include the incoming new encrypted pinblock, PIN encryption key (PEK), issuer master key (IMK), primary account number (PAN), and the payment card derivation method.</p> <p>The operation uses two issuer master keys - secure messaging for confidentiality (IMK-SMC) and secure messaging for integrity (IMK-SMI). The SMC key is used to internally derive a key to secure the pin, while SMI key is used to internally derive a key to authenticate the script reponse as per the <a href="https://www.emvco.com/specifications/">EMV 4.4 - Book 2 - Security and Key Management</a> specification. </p> <p>This operation supports Amex, EMV2000, EMVCommon, Mastercard and Visa derivation methods, each requiring specific input parameters. Users must follow the specific derivation method and input parameters defined by the respective payment card scheme.</p> <note> <p>Use <a>GenerateMac</a> operation when sending a script update to an EMV card that does not involve PIN change. When assigning IAM permissions, it is important to understand that <a>EncryptData</a> using EMV keys and <a>GenerateMac</a> perform similar functions to this command.</p> </note> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>EncryptData</a> </p> </li> <li> <p> <a>GenerateMac</a> </p> </li> </ul>
|
|
55
31
|
* @example
|
|
56
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
57
33
|
* ```javascript
|
|
@@ -27,32 +27,7 @@ declare const GeneratePinDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Generates pin-related data such as PIN, PIN Verification Value (PVV), PIN Block, and PIN Offset during new card issuance or reissuance. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/generate-pin-data.html">Generate PIN data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>PIN data is never transmitted in clear to or from Amazon Web Services Payment Cryptography. This operation generates PIN, PVV, or PIN Offset and then encrypts it using Pin Encryption Key (PEK) to create an <code>EncryptedPinBlock</code> for transmission from Amazon Web Services Payment Cryptography. This operation uses a separate Pin Verification Key (PVK) for VISA PVV generation. </p>
|
|
32
|
-
* <p>Using ECDH key exchange, you can receive cardholder selectable PINs into Amazon Web Services Payment Cryptography. The ECDH derived key protects the incoming PIN block. You can also use it for reveal PIN, wherein the generated PIN block is protected by the ECDH derived key before transmission from Amazon Web Services Payment Cryptography. For more information on establishing ECDH derived keys, see the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/create-keys.html">Generating keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
33
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
34
|
-
* <p>
|
|
35
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
36
|
-
* <p>
|
|
37
|
-
* <b>Related operations:</b>
|
|
38
|
-
* </p>
|
|
39
|
-
* <ul>
|
|
40
|
-
* <li>
|
|
41
|
-
* <p>
|
|
42
|
-
* <a>GenerateCardValidationData</a>
|
|
43
|
-
* </p>
|
|
44
|
-
* </li>
|
|
45
|
-
* <li>
|
|
46
|
-
* <p>
|
|
47
|
-
* <a>TranslatePinData</a>
|
|
48
|
-
* </p>
|
|
49
|
-
* </li>
|
|
50
|
-
* <li>
|
|
51
|
-
* <p>
|
|
52
|
-
* <a>VerifyPinData</a>
|
|
53
|
-
* </p>
|
|
54
|
-
* </li>
|
|
55
|
-
* </ul>
|
|
30
|
+
* <p>Generates pin-related data such as PIN, PIN Verification Value (PVV), PIN Block, and PIN Offset during new card issuance or reissuance. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/generate-pin-data.html">Generate PIN data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>PIN data is never transmitted in clear to or from Amazon Web Services Payment Cryptography. This operation generates PIN, PVV, or PIN Offset and then encrypts it using Pin Encryption Key (PEK) to create an <code>EncryptedPinBlock</code> for transmission from Amazon Web Services Payment Cryptography. This operation uses a separate Pin Verification Key (PVK) for VISA PVV generation. </p> <p>Using ECDH key exchange, you can receive cardholder selectable PINs into Amazon Web Services Payment Cryptography. The ECDH derived key protects the incoming PIN block. You can also use it for reveal PIN, wherein the generated PIN block is protected by the ECDH derived key before transmission from Amazon Web Services Payment Cryptography. For more information on establishing ECDH derived keys, see the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/create-keys.html">Generating keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>GenerateCardValidationData</a> </p> </li> <li> <p> <a>TranslatePinData</a> </p> </li> <li> <p> <a>VerifyPinData</a> </p> </li> </ul>
|
|
56
31
|
* @example
|
|
57
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
58
33
|
* ```javascript
|
|
@@ -102,7 +77,7 @@ declare const GeneratePinDataCommand_base: {
|
|
|
102
77
|
* DiffieHellmanSymmetricKey: { // EcdhDerivationAttributes
|
|
103
78
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
104
79
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
105
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
80
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
106
81
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
107
82
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
108
83
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -27,38 +27,7 @@ declare const ReEncryptDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Re-encrypt ciphertext using DUKPT or Symmetric data encryption keys. </p>
|
|
31
|
-
* <p>You can either generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The <code>KeyArn</code> for use with this operation must be in a compatible key state with <code>KeyModesOfUse</code> set to <code>Encrypt</code>. </p>
|
|
32
|
-
* <p>This operation also supports dynamic keys, allowing you to pass a dynamic encryption key as a TR-31 WrappedKeyBlock. This can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To re-encrypt using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped encryption key material. The incoming wrapped key shall have a key purpose of D0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
33
|
-
* <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. To encrypt using DUKPT, a DUKPT key must already exist within your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code> or a new DUKPT can be generated by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>.</p>
|
|
34
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
35
|
-
* <p>
|
|
36
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
37
|
-
* <p>
|
|
38
|
-
* <b>Related operations:</b>
|
|
39
|
-
* </p>
|
|
40
|
-
* <ul>
|
|
41
|
-
* <li>
|
|
42
|
-
* <p>
|
|
43
|
-
* <a>DecryptData</a>
|
|
44
|
-
* </p>
|
|
45
|
-
* </li>
|
|
46
|
-
* <li>
|
|
47
|
-
* <p>
|
|
48
|
-
* <a>EncryptData</a>
|
|
49
|
-
* </p>
|
|
50
|
-
* </li>
|
|
51
|
-
* <li>
|
|
52
|
-
* <p>
|
|
53
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a>
|
|
54
|
-
* </p>
|
|
55
|
-
* </li>
|
|
56
|
-
* <li>
|
|
57
|
-
* <p>
|
|
58
|
-
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>
|
|
59
|
-
* </p>
|
|
60
|
-
* </li>
|
|
61
|
-
* </ul>
|
|
30
|
+
* <p>Re-encrypt ciphertext using DUKPT or Symmetric data encryption keys. </p> <p>You can either generate an encryption key within Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or import your own encryption key by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The <code>KeyArn</code> for use with this operation must be in a compatible key state with <code>KeyModesOfUse</code> set to <code>Encrypt</code>. </p> <p>This operation also supports dynamic keys, allowing you to pass a dynamic encryption key as a TR-31 WrappedKeyBlock. This can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To re-encrypt using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped encryption key material. The incoming wrapped key shall have a key purpose of D0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>For symmetric and DUKPT encryption, Amazon Web Services Payment Cryptography supports <code>TDES</code> and <code>AES</code> algorithms. To encrypt using DUKPT, a DUKPT key must already exist within your account with <code>KeyModesOfUse</code> set to <code>DeriveKey</code> or a new DUKPT can be generated by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>.</p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>DecryptData</a> </p> </li> <li> <p> <a>EncryptData</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetPublicKeyCertificate.html">GetPublicCertificate</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> </p> </li> </ul>
|
|
62
31
|
* @example
|
|
63
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
64
33
|
* ```javascript
|
|
@@ -103,7 +72,7 @@ declare const ReEncryptDataCommand_base: {
|
|
|
103
72
|
* DiffieHellmanSymmetricKey: { // EcdhDerivationAttributes
|
|
104
73
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
105
74
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
106
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
75
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
107
76
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
108
77
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
109
78
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -117,7 +86,7 @@ declare const ReEncryptDataCommand_base: {
|
|
|
117
86
|
* DiffieHellmanSymmetricKey: {
|
|
118
87
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
119
88
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
120
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
89
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
121
90
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
122
91
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
123
92
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -27,33 +27,7 @@ declare const TranslatePinDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Translates encrypted PIN block from and to ISO 9564 formats 0,1,3,4. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/translate-pin-data.html">Translate PIN data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>PIN block translation involves changing a PIN block from one encryption key to another and optionally change its format. PIN block translation occurs entirely within the HSM boundary and PIN data never enters or leaves Amazon Web Services Payment Cryptography in clear text. The encryption key transformation can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for DUKPT or from BDK for DUKPT to PEK.</p>
|
|
32
|
-
* <p>Amazon Web Services Payment Cryptography also supports use of dynamic keys and ECDH (Elliptic Curve Diffie-Hellman) based key exchange for this operation.</p>
|
|
33
|
-
* <p>Dynamic keys allow you to pass a PEK as a TR-31 WrappedKeyBlock. They can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To translate PIN block using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped PEK. The incoming wrapped key shall have a key purpose of P0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
34
|
-
* <p>Using ECDH key exchange, you can receive cardholder selectable PINs into Amazon Web Services Payment Cryptography. The ECDH derived key protects the incoming PIN block, which is translated to a PEK encrypted PIN block for use within the service. You can also use ECDH for reveal PIN, wherein the service translates the PIN block from PEK to a ECDH derived encryption key. For more information on establishing ECDH derived keys, see the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/create-keys.html">Generating keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
35
|
-
* <p>The allowed combinations of PIN block format translations are guided by PCI. It is important to note that not all encrypted PIN block formats (example, format 1) require PAN (Primary Account Number) as input. And as such, PIN block format that requires PAN (example, formats 0,3,4) cannot be translated to a format (format 1) that does not require a PAN for generation. </p>
|
|
36
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
37
|
-
* <note>
|
|
38
|
-
* <p>Amazon Web Services Payment Cryptography currently supports ISO PIN block 4 translation for PIN block built using legacy PAN length. That is, PAN is the right most 12 digits excluding the check digits.</p>
|
|
39
|
-
* </note>
|
|
40
|
-
* <p>
|
|
41
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
42
|
-
* <p>
|
|
43
|
-
* <b>Related operations:</b>
|
|
44
|
-
* </p>
|
|
45
|
-
* <ul>
|
|
46
|
-
* <li>
|
|
47
|
-
* <p>
|
|
48
|
-
* <a>GeneratePinData</a>
|
|
49
|
-
* </p>
|
|
50
|
-
* </li>
|
|
51
|
-
* <li>
|
|
52
|
-
* <p>
|
|
53
|
-
* <a>VerifyPinData</a>
|
|
54
|
-
* </p>
|
|
55
|
-
* </li>
|
|
56
|
-
* </ul>
|
|
30
|
+
* <p>Translates encrypted PIN block from and to ISO 9564 formats 0,1,3,4. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/translate-pin-data.html">Translate PIN data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>PIN block translation involves changing a PIN block from one encryption key to another and optionally change its format. PIN block translation occurs entirely within the HSM boundary and PIN data never enters or leaves Amazon Web Services Payment Cryptography in clear text. The encryption key transformation can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for DUKPT or from BDK for DUKPT to PEK.</p> <p>Amazon Web Services Payment Cryptography also supports use of dynamic keys and ECDH (Elliptic Curve Diffie-Hellman) based key exchange for this operation.</p> <p>Dynamic keys allow you to pass a PEK as a TR-31 WrappedKeyBlock. They can be used when key material is frequently rotated, such as during every card transaction, and there is need to avoid importing short-lived keys into Amazon Web Services Payment Cryptography. To translate PIN block using dynamic keys, the <code>keyARN</code> is the Key Encryption Key (KEK) of the TR-31 wrapped PEK. The incoming wrapped key shall have a key purpose of P0 with a mode of use of B or D. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/use-cases-acquirers-dynamickeys.html">Using Dynamic Keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>Using ECDH key exchange, you can receive cardholder selectable PINs into Amazon Web Services Payment Cryptography. The ECDH derived key protects the incoming PIN block, which is translated to a PEK encrypted PIN block for use within the service. You can also use ECDH for reveal PIN, wherein the service translates the PIN block from PEK to a ECDH derived encryption key. For more information on establishing ECDH derived keys, see the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/create-keys.html">Generating keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>The allowed combinations of PIN block format translations are guided by PCI. It is important to note that not all encrypted PIN block formats (example, format 1) require PAN (Primary Account Number) as input. And as such, PIN block format that requires PAN (example, formats 0,3,4) cannot be translated to a format (format 1) that does not require a PAN for generation. </p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <note> <p>Amazon Web Services Payment Cryptography currently supports ISO PIN block 4 translation for PIN block built using legacy PAN length. That is, PAN is the right most 12 digits excluding the check digits.</p> </note> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>GeneratePinData</a> </p> </li> <li> <p> <a>VerifyPinData</a> </p> </li> </ul>
|
|
57
31
|
* @example
|
|
58
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
59
33
|
* ```javascript
|
|
@@ -102,7 +76,7 @@ declare const TranslatePinDataCommand_base: {
|
|
|
102
76
|
* DiffieHellmanSymmetricKey: { // EcdhDerivationAttributes
|
|
103
77
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
104
78
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
105
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
79
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
106
80
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
107
81
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
108
82
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -116,7 +90,7 @@ declare const TranslatePinDataCommand_base: {
|
|
|
116
90
|
* DiffieHellmanSymmetricKey: {
|
|
117
91
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
118
92
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
119
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
93
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
120
94
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
121
95
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
122
96
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -27,26 +27,7 @@ declare const VerifyAuthRequestCryptogramCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Verifies Authorization Request Cryptogram (ARQC) for a EMV chip payment card authorization. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.verifyauthrequestcryptogram.html">Verify auth request cryptogram</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>ARQC generation is done outside of Amazon Web Services Payment Cryptography and is typically generated on a point of sale terminal for an EMV chip card to obtain payment authorization during transaction time. For ARQC verification, you must first import the ARQC generated outside of Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. This operation uses the imported ARQC and an major encryption key (DUKPT) created by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> to either provide a boolean ARQC verification result or provide an APRC (Authorization Response Cryptogram) response using Method 1 or Method 2. The <code>ARPC_METHOD_1</code> uses <code>AuthResponseCode</code> to generate ARPC and <code>ARPC_METHOD_2</code> uses <code>CardStatusUpdate</code> to generate ARPC. </p>
|
|
32
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
33
|
-
* <p>
|
|
34
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
35
|
-
* <p>
|
|
36
|
-
* <b>Related operations:</b>
|
|
37
|
-
* </p>
|
|
38
|
-
* <ul>
|
|
39
|
-
* <li>
|
|
40
|
-
* <p>
|
|
41
|
-
* <a>VerifyCardValidationData</a>
|
|
42
|
-
* </p>
|
|
43
|
-
* </li>
|
|
44
|
-
* <li>
|
|
45
|
-
* <p>
|
|
46
|
-
* <a>VerifyPinData</a>
|
|
47
|
-
* </p>
|
|
48
|
-
* </li>
|
|
49
|
-
* </ul>
|
|
30
|
+
* <p>Verifies Authorization Request Cryptogram (ARQC) for a EMV chip payment card authorization. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.verifyauthrequestcryptogram.html">Verify auth request cryptogram</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>ARQC generation is done outside of Amazon Web Services Payment Cryptography and is typically generated on a point of sale terminal for an EMV chip card to obtain payment authorization during transaction time. For ARQC verification, you must first import the ARQC generated outside of Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. This operation uses the imported ARQC and an major encryption key (DUKPT) created by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> to either provide a boolean ARQC verification result or provide an APRC (Authorization Response Cryptogram) response using Method 1 or Method 2. The <code>ARPC_METHOD_1</code> uses <code>AuthResponseCode</code> to generate ARPC and <code>ARPC_METHOD_2</code> uses <code>CardStatusUpdate</code> to generate ARPC. </p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>VerifyCardValidationData</a> </p> </li> <li> <p> <a>VerifyPinData</a> </p> </li> </ul>
|
|
50
31
|
* @example
|
|
51
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
52
33
|
* ```javascript
|
|
@@ -27,31 +27,7 @@ declare const VerifyCardValidationDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Verifies card-related validation data using algorithms such as Card Verification Values (CVV/CVV2), Dynamic Card Verification Values (dCVV/dCVV2) and Card Security Codes (CSC). For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/verify-card-data.html">Verify card data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>This operation validates the CVV or CSC codes that is printed on a payment credit or debit card during card payment transaction. The input values are typically provided as part of an inbound transaction to an issuer or supporting platform partner. Amazon Web Services Payment Cryptography uses CVV or CSC, PAN (Primary Account Number) and expiration date of the card to check its validity during transaction processing. In this operation, the CVK (Card Verification Key) encryption key for use with card data verification is same as the one in used for <a>GenerateCardValidationData</a>. </p>
|
|
32
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
33
|
-
* <p>
|
|
34
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
35
|
-
* <p>
|
|
36
|
-
* <b>Related operations:</b>
|
|
37
|
-
* </p>
|
|
38
|
-
* <ul>
|
|
39
|
-
* <li>
|
|
40
|
-
* <p>
|
|
41
|
-
* <a>GenerateCardValidationData</a>
|
|
42
|
-
* </p>
|
|
43
|
-
* </li>
|
|
44
|
-
* <li>
|
|
45
|
-
* <p>
|
|
46
|
-
* <a>VerifyAuthRequestCryptogram</a>
|
|
47
|
-
* </p>
|
|
48
|
-
* </li>
|
|
49
|
-
* <li>
|
|
50
|
-
* <p>
|
|
51
|
-
* <a>VerifyPinData</a>
|
|
52
|
-
* </p>
|
|
53
|
-
* </li>
|
|
54
|
-
* </ul>
|
|
30
|
+
* <p>Verifies card-related validation data using algorithms such as Card Verification Values (CVV/CVV2), Dynamic Card Verification Values (dCVV/dCVV2) and Card Security Codes (CSC). For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/verify-card-data.html">Verify card data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>This operation validates the CVV or CSC codes that is printed on a payment credit or debit card during card payment transaction. The input values are typically provided as part of an inbound transaction to an issuer or supporting platform partner. Amazon Web Services Payment Cryptography uses CVV or CSC, PAN (Primary Account Number) and expiration date of the card to check its validity during transaction processing. In this operation, the CVK (Card Verification Key) encryption key for use with card data verification is same as the one in used for <a>GenerateCardValidationData</a>. </p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>GenerateCardValidationData</a> </p> </li> <li> <p> <a>VerifyAuthRequestCryptogram</a> </p> </li> <li> <p> <a>VerifyPinData</a> </p> </li> </ul>
|
|
55
31
|
* @example
|
|
56
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
57
33
|
* ```javascript
|
|
@@ -27,21 +27,7 @@ declare const VerifyMacCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Verifies a Message Authentication Code (MAC). </p>
|
|
31
|
-
* <p>You can use this operation to verify MAC for message data authentication such as . In this operation, you must use the same message data, secret encryption key and MAC algorithm that was used to generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC or EMV MAC by setting generation attributes and algorithm to the associated values. </p>
|
|
32
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
33
|
-
* <p>
|
|
34
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
35
|
-
* <p>
|
|
36
|
-
* <b>Related operations:</b>
|
|
37
|
-
* </p>
|
|
38
|
-
* <ul>
|
|
39
|
-
* <li>
|
|
40
|
-
* <p>
|
|
41
|
-
* <a>GenerateMac</a>
|
|
42
|
-
* </p>
|
|
43
|
-
* </li>
|
|
44
|
-
* </ul>
|
|
30
|
+
* <p>Verifies a Message Authentication Code (MAC). </p> <p>You can use this operation to verify MAC for message data authentication such as . In this operation, you must use the same message data, secret encryption key and MAC algorithm that was used to generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC or EMV MAC by setting generation attributes and algorithm to the associated values. </p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>GenerateMac</a> </p> </li> </ul>
|
|
45
31
|
* @example
|
|
46
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
47
33
|
* ```javascript
|
|
@@ -27,26 +27,7 @@ declare const VerifyPinDataCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Verifies pin-related data such as PIN and PIN Offset using algorithms including VISA PVV and IBM3624. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/verify-pin-data.html">Verify PIN data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
31
|
-
* <p>This operation verifies PIN data for user payment card. A card holder PIN data is never transmitted in clear to or from Amazon Web Services Payment Cryptography. This operation uses PIN Verification Key (PVK) for PIN or PIN Offset generation and then encrypts it using PIN Encryption Key (PEK) to create an <code>EncryptedPinBlock</code> for transmission from Amazon Web Services Payment Cryptography. </p>
|
|
32
|
-
* <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
33
|
-
* <p>
|
|
34
|
-
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
35
|
-
* <p>
|
|
36
|
-
* <b>Related operations:</b>
|
|
37
|
-
* </p>
|
|
38
|
-
* <ul>
|
|
39
|
-
* <li>
|
|
40
|
-
* <p>
|
|
41
|
-
* <a>GeneratePinData</a>
|
|
42
|
-
* </p>
|
|
43
|
-
* </li>
|
|
44
|
-
* <li>
|
|
45
|
-
* <p>
|
|
46
|
-
* <a>TranslatePinData</a>
|
|
47
|
-
* </p>
|
|
48
|
-
* </li>
|
|
49
|
-
* </ul>
|
|
30
|
+
* <p>Verifies pin-related data such as PIN and PIN Offset using algorithms including VISA PVV and IBM3624. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/verify-pin-data.html">Verify PIN data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>This operation verifies PIN data for user payment card. A card holder PIN data is never transmitted in clear to or from Amazon Web Services Payment Cryptography. This operation uses PIN Verification Key (PVK) for PIN or PIN Offset generation and then encrypts it using PIN Encryption Key (PEK) to create an <code>EncryptedPinBlock</code> for transmission from Amazon Web Services Payment Cryptography. </p> <p>For information about valid keys for this operation, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html">Understanding key attributes</a> and <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html">Key types for specific data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p> <p> <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a>GeneratePinData</a> </p> </li> <li> <p> <a>TranslatePinData</a> </p> </li> </ul>
|
|
50
31
|
* @example
|
|
51
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
52
33
|
* ```javascript
|
|
@@ -82,7 +63,7 @@ declare const VerifyPinDataCommand_base: {
|
|
|
82
63
|
* DiffieHellmanSymmetricKey: { // EcdhDerivationAttributes
|
|
83
64
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
84
65
|
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
85
|
-
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
66
|
+
* KeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256" || "HMAC_SHA256" || "HMAC_SHA384" || "HMAC_SHA512" || "HMAC_SHA224", // required
|
|
86
67
|
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
87
68
|
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
88
69
|
* SharedInformation: "STRING_VALUE", // required
|
|
@@ -8,7 +8,7 @@ export interface ClientInputEndpointParameters {
|
|
|
8
8
|
useFipsEndpoint?: boolean | undefined | Provider<boolean | undefined>;
|
|
9
9
|
endpoint?: string | Provider<string> | Endpoint | Provider<Endpoint> | EndpointV2 | Provider<EndpointV2>;
|
|
10
10
|
}
|
|
11
|
-
export type ClientResolvedEndpointParameters = ClientInputEndpointParameters & {
|
|
11
|
+
export type ClientResolvedEndpointParameters = Omit<ClientInputEndpointParameters, "endpoint"> & {
|
|
12
12
|
defaultSigningName: string;
|
|
13
13
|
};
|
|
14
14
|
export declare const resolveClientEndpointParameters: <T>(options: T & ClientInputEndpointParameters) => T & ClientResolvedEndpointParameters;
|
package/dist-types/index.d.ts
CHANGED
|
@@ -1,6 +1,5 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* <p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
3
|
-
* <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
2
|
+
* <p>You use the Amazon Web Services Payment Cryptography Data Plane to manage how encryption keys are used for payment-related transaction processing and associated cryptographic operations. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations in Amazon Web Services Payment Cryptography. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/data-operations.html">Data operations</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> <p>To manage your encryption keys, you use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/Welcome.html">Amazon Web Services Payment Cryptography Control Plane</a>. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. </p>
|
|
4
3
|
*
|
|
5
4
|
* @packageDocumentation
|
|
6
5
|
*/
|
|
@@ -658,14 +658,12 @@ export interface DukptEncryptionAttributes {
|
|
|
658
658
|
*/
|
|
659
659
|
KeySerialNumber: string | undefined;
|
|
660
660
|
/**
|
|
661
|
-
* <p>The block cipher method to use for encryption.</p>
|
|
662
|
-
* <p>The default is CBC.</p>
|
|
661
|
+
* <p>The block cipher method to use for encryption.</p> <p>The default is CBC.</p>
|
|
663
662
|
* @public
|
|
664
663
|
*/
|
|
665
664
|
Mode?: DukptEncryptionMode | undefined;
|
|
666
665
|
/**
|
|
667
|
-
* <p>The key type encrypted using DUKPT from a Base Derivation Key (BDK) and Key Serial Number (KSN). This must be less than or equal to the strength of the BDK. For example, you can't use <code>AES_128</code> as a derivation type for a BDK of <code>AES_128</code> or <code>TDES_2KEY</code>
|
|
668
|
-
* </p>
|
|
666
|
+
* <p>The key type encrypted using DUKPT from a Base Derivation Key (BDK) and Key Serial Number (KSN). This must be less than or equal to the strength of the BDK. For example, you can't use <code>AES_128</code> as a derivation type for a BDK of <code>AES_128</code> or <code>TDES_2KEY</code> </p>
|
|
669
667
|
* @public
|
|
670
668
|
*/
|
|
671
669
|
DukptKeyDerivationType?: DukptDerivationType | undefined;
|
|
@@ -858,6 +856,7 @@ export declare namespace EncryptionDecryptionAttributes {
|
|
|
858
856
|
export declare const KeyCheckValueAlgorithm: {
|
|
859
857
|
readonly ANSI_X9_24: "ANSI_X9_24";
|
|
860
858
|
readonly CMAC: "CMAC";
|
|
859
|
+
readonly HMAC: "HMAC";
|
|
861
860
|
};
|
|
862
861
|
/**
|
|
863
862
|
* @public
|
|
@@ -871,6 +870,10 @@ export declare const SymmetricKeyAlgorithm: {
|
|
|
871
870
|
readonly AES_128: "AES_128";
|
|
872
871
|
readonly AES_192: "AES_192";
|
|
873
872
|
readonly AES_256: "AES_256";
|
|
873
|
+
readonly HMAC_SHA224: "HMAC_SHA224";
|
|
874
|
+
readonly HMAC_SHA256: "HMAC_SHA256";
|
|
875
|
+
readonly HMAC_SHA384: "HMAC_SHA384";
|
|
876
|
+
readonly HMAC_SHA512: "HMAC_SHA512";
|
|
874
877
|
readonly TDES_2KEY: "TDES_2KEY";
|
|
875
878
|
readonly TDES_3KEY: "TDES_3KEY";
|
|
876
879
|
};
|
|
@@ -934,8 +937,7 @@ export interface EcdhDerivationAttributes {
|
|
|
934
937
|
*/
|
|
935
938
|
KeyDerivationHashAlgorithm: KeyDerivationHashAlgorithm | undefined;
|
|
936
939
|
/**
|
|
937
|
-
* <p>A byte string containing information that binds the ECDH derived key to the two parties involved or to the context of the key.</p>
|
|
938
|
-
* <p>It may include details like identities of the two parties deriving the key, context of the operation, session IDs, and optionally a nonce. It must not contain zero bytes, and re-using shared information for multiple ECDH key derivations is not recommended.</p>
|
|
940
|
+
* <p>A byte string containing information that binds the ECDH derived key to the two parties involved or to the context of the key.</p> <p>It may include details like identities of the two parties deriving the key, context of the operation, session IDs, and optionally a nonce. It must not contain zero bytes, and re-using shared information for multiple ECDH key derivations is not recommended.</p>
|
|
939
941
|
* @public
|
|
940
942
|
*/
|
|
941
943
|
SharedInformation: string | undefined;
|
|
@@ -993,8 +995,7 @@ export interface WrappedKey {
|
|
|
993
995
|
*/
|
|
994
996
|
WrappedKeyMaterial: WrappedKeyMaterial | undefined;
|
|
995
997
|
/**
|
|
996
|
-
* <p>The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.</p>
|
|
997
|
-
* <p>For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.</p>
|
|
998
|
+
* <p>The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.</p> <p>For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.</p>
|
|
998
999
|
* @public
|
|
999
1000
|
*/
|
|
1000
1001
|
KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm | undefined;
|
|
@@ -1004,8 +1005,7 @@ export interface WrappedKey {
|
|
|
1004
1005
|
*/
|
|
1005
1006
|
export interface DecryptDataInput {
|
|
1006
1007
|
/**
|
|
1007
|
-
* <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for ciphertext decryption.</p>
|
|
1008
|
-
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
1008
|
+
* <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for ciphertext decryption.</p> <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
1009
1009
|
* @public
|
|
1010
1010
|
*/
|
|
1011
1011
|
KeyIdentifier: string | undefined;
|
|
@@ -1035,8 +1035,7 @@ export interface DecryptDataOutput {
|
|
|
1035
1035
|
*/
|
|
1036
1036
|
KeyArn: string | undefined;
|
|
1037
1037
|
/**
|
|
1038
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
1039
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1038
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1040
1039
|
* @public
|
|
1041
1040
|
*/
|
|
1042
1041
|
KeyCheckValue: string | undefined;
|
|
@@ -1203,14 +1202,12 @@ export interface EmvCommonAttributes {
|
|
|
1203
1202
|
*/
|
|
1204
1203
|
Mode: EmvEncryptionMode | undefined;
|
|
1205
1204
|
/**
|
|
1206
|
-
* <p>The padding to be added to the PIN block prior to encryption.</p>
|
|
1207
|
-
* <p>Padding type should be <code>ISO_IEC_7816_4</code>, if <code>PinBlockLengthPosition</code> is set to <code>FRONT_OF_PIN_BLOCK</code>. No padding is required, if <code>PinBlockLengthPosition</code> is set to <code>NONE</code>.</p>
|
|
1205
|
+
* <p>The padding to be added to the PIN block prior to encryption.</p> <p>Padding type should be <code>ISO_IEC_7816_4</code>, if <code>PinBlockLengthPosition</code> is set to <code>FRONT_OF_PIN_BLOCK</code>. No padding is required, if <code>PinBlockLengthPosition</code> is set to <code>NONE</code>.</p>
|
|
1208
1206
|
* @public
|
|
1209
1207
|
*/
|
|
1210
1208
|
PinBlockPaddingType: PinBlockPaddingType | undefined;
|
|
1211
1209
|
/**
|
|
1212
|
-
* <p>Specifies if PIN block length should be added to front of the pin block. </p>
|
|
1213
|
-
* <p>If value is set to <code>FRONT_OF_PIN_BLOCK</code>, then PIN block padding type should be <code>ISO_IEC_7816_4</code>.</p>
|
|
1210
|
+
* <p>Specifies if PIN block length should be added to front of the pin block. </p> <p>If value is set to <code>FRONT_OF_PIN_BLOCK</code>, then PIN block padding type should be <code>ISO_IEC_7816_4</code>.</p>
|
|
1214
1211
|
* @public
|
|
1215
1212
|
*/
|
|
1216
1213
|
PinBlockLengthPosition: PinBlockLengthPosition | undefined;
|
|
@@ -1394,8 +1391,7 @@ export interface DukptDerivationAttributes {
|
|
|
1394
1391
|
*/
|
|
1395
1392
|
KeySerialNumber: string | undefined;
|
|
1396
1393
|
/**
|
|
1397
|
-
* <p>The key type derived using DUKPT from a Base Derivation Key (BDK) and Key Serial Number (KSN). This must be less than or equal to the strength of the BDK. For example, you can't use <code>AES_128</code> as a derivation type for a BDK of <code>AES_128</code> or <code>TDES_2KEY</code>
|
|
1398
|
-
* </p>
|
|
1394
|
+
* <p>The key type derived using DUKPT from a Base Derivation Key (BDK) and Key Serial Number (KSN). This must be less than or equal to the strength of the BDK. For example, you can't use <code>AES_128</code> as a derivation type for a BDK of <code>AES_128</code> or <code>TDES_2KEY</code> </p>
|
|
1399
1395
|
* @public
|
|
1400
1396
|
*/
|
|
1401
1397
|
DukptKeyDerivationType?: DukptDerivationType | undefined;
|
|
@@ -1410,16 +1406,12 @@ export interface DukptDerivationAttributes {
|
|
|
1410
1406
|
*/
|
|
1411
1407
|
export interface EncryptDataInput {
|
|
1412
1408
|
/**
|
|
1413
|
-
* <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for plaintext encryption.</p>
|
|
1414
|
-
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
1409
|
+
* <p>The <code>keyARN</code> of the encryption key that Amazon Web Services Payment Cryptography uses for plaintext encryption.</p> <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
1415
1410
|
* @public
|
|
1416
1411
|
*/
|
|
1417
1412
|
KeyIdentifier: string | undefined;
|
|
1418
1413
|
/**
|
|
1419
|
-
* <p>The plaintext to be encrypted.</p>
|
|
1420
|
-
* <note>
|
|
1421
|
-
* <p>For encryption using asymmetric keys, plaintext data length is constrained by encryption key strength that you define in <code>KeyAlgorithm</code> and padding type that you define in <code>AsymmetricEncryptionAttributes</code>. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html">Encrypt data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
1422
|
-
* </note>
|
|
1414
|
+
* <p>The plaintext to be encrypted.</p> <note> <p>For encryption using asymmetric keys, plaintext data length is constrained by encryption key strength that you define in <code>KeyAlgorithm</code> and padding type that you define in <code>AsymmetricEncryptionAttributes</code>. For more information, see <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html">Encrypt data</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p> </note>
|
|
1423
1415
|
* @public
|
|
1424
1416
|
*/
|
|
1425
1417
|
PlainText: string | undefined;
|
|
@@ -1444,8 +1436,7 @@ export interface EncryptDataOutput {
|
|
|
1444
1436
|
*/
|
|
1445
1437
|
KeyArn: string | undefined;
|
|
1446
1438
|
/**
|
|
1447
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
1448
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1439
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1449
1440
|
* @public
|
|
1450
1441
|
*/
|
|
1451
1442
|
KeyCheckValue?: string | undefined;
|
|
@@ -1490,8 +1481,7 @@ export interface GenerateCardValidationDataOutput {
|
|
|
1490
1481
|
*/
|
|
1491
1482
|
KeyArn: string | undefined;
|
|
1492
1483
|
/**
|
|
1493
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
1494
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1484
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1495
1485
|
* @public
|
|
1496
1486
|
*/
|
|
1497
1487
|
KeyCheckValue: string | undefined;
|
|
@@ -1752,8 +1742,7 @@ export interface GenerateMacOutput {
|
|
|
1752
1742
|
*/
|
|
1753
1743
|
KeyArn: string | undefined;
|
|
1754
1744
|
/**
|
|
1755
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
1756
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1745
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
1757
1746
|
* @public
|
|
1758
1747
|
*/
|
|
1759
1748
|
KeyCheckValue: string | undefined;
|
|
@@ -2166,9 +2155,7 @@ export interface GeneratePinDataInput {
|
|
|
2166
2155
|
*/
|
|
2167
2156
|
PrimaryAccountNumber: string | undefined;
|
|
2168
2157
|
/**
|
|
2169
|
-
* <p>The PIN encoding format for pin data generation as specified in ISO 9564. Amazon Web Services Payment Cryptography supports <code>ISO_Format_0</code> and <code>ISO_Format_3</code>.</p>
|
|
2170
|
-
* <p>The <code>ISO_Format_0</code> PIN block format is equivalent to the ANSI X9.8, VISA-1, and ECI-1 PIN block formats. It is similar to a VISA-4 PIN block format. It supports a PIN from 4 to 12 digits in length.</p>
|
|
2171
|
-
* <p>The <code>ISO_Format_3</code> PIN block format is the same as <code>ISO_Format_0</code> except that the fill digits are random values from 10 to 15.</p>
|
|
2158
|
+
* <p>The PIN encoding format for pin data generation as specified in ISO 9564. Amazon Web Services Payment Cryptography supports <code>ISO_Format_0</code> and <code>ISO_Format_3</code>.</p> <p>The <code>ISO_Format_0</code> PIN block format is equivalent to the ANSI X9.8, VISA-1, and ECI-1 PIN block formats. It is similar to a VISA-4 PIN block format. It supports a PIN from 4 to 12 digits in length.</p> <p>The <code>ISO_Format_3</code> PIN block format is the same as <code>ISO_Format_0</code> except that the fill digits are random values from 10 to 15.</p>
|
|
2172
2159
|
* @public
|
|
2173
2160
|
*/
|
|
2174
2161
|
PinBlockFormat: PinBlockFormatForPinData | undefined;
|
|
@@ -2230,8 +2217,7 @@ export interface GeneratePinDataOutput {
|
|
|
2230
2217
|
*/
|
|
2231
2218
|
GenerationKeyArn: string | undefined;
|
|
2232
2219
|
/**
|
|
2233
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2234
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2220
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2235
2221
|
* @public
|
|
2236
2222
|
*/
|
|
2237
2223
|
GenerationKeyCheckValue: string | undefined;
|
|
@@ -2241,8 +2227,7 @@ export interface GeneratePinDataOutput {
|
|
|
2241
2227
|
*/
|
|
2242
2228
|
EncryptionKeyArn: string | undefined;
|
|
2243
2229
|
/**
|
|
2244
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2245
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2230
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2246
2231
|
* @public
|
|
2247
2232
|
*/
|
|
2248
2233
|
EncryptionKeyCheckValue: string | undefined;
|
|
@@ -2330,8 +2315,7 @@ export declare namespace ReEncryptionAttributes {
|
|
|
2330
2315
|
*/
|
|
2331
2316
|
export interface ReEncryptDataInput {
|
|
2332
2317
|
/**
|
|
2333
|
-
* <p>The <code>keyARN</code> of the encryption key of incoming ciphertext data.</p>
|
|
2334
|
-
* <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
2318
|
+
* <p>The <code>keyARN</code> of the encryption key of incoming ciphertext data.</p> <p>When a WrappedKeyBlock is provided, this value will be the identifier to the key wrapping key. Otherwise, it is the key identifier used to perform the operation.</p>
|
|
2335
2319
|
* @public
|
|
2336
2320
|
*/
|
|
2337
2321
|
IncomingKeyIdentifier: string | undefined;
|
|
@@ -2376,8 +2360,7 @@ export interface ReEncryptDataOutput {
|
|
|
2376
2360
|
*/
|
|
2377
2361
|
KeyArn: string | undefined;
|
|
2378
2362
|
/**
|
|
2379
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2380
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2363
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2381
2364
|
* @public
|
|
2382
2365
|
*/
|
|
2383
2366
|
KeyCheckValue: string | undefined;
|
|
@@ -2481,14 +2464,12 @@ export declare namespace TranslationIsoFormats {
|
|
|
2481
2464
|
*/
|
|
2482
2465
|
export interface TranslatePinDataInput {
|
|
2483
2466
|
/**
|
|
2484
|
-
* <p>The <code>keyARN</code> of the encryption key under which incoming PIN block data is encrypted. This key type can be PEK or BDK.</p>
|
|
2485
|
-
* <p>For dynamic keys, it is the <code>keyARN</code> of KEK of the TR-31 wrapped PEK. For ECDH, it is the <code>keyARN</code> of the asymmetric ECC key.</p>
|
|
2467
|
+
* <p>The <code>keyARN</code> of the encryption key under which incoming PIN block data is encrypted. This key type can be PEK or BDK.</p> <p>For dynamic keys, it is the <code>keyARN</code> of KEK of the TR-31 wrapped PEK. For ECDH, it is the <code>keyARN</code> of the asymmetric ECC key.</p>
|
|
2486
2468
|
* @public
|
|
2487
2469
|
*/
|
|
2488
2470
|
IncomingKeyIdentifier: string | undefined;
|
|
2489
2471
|
/**
|
|
2490
|
-
* <p>The <code>keyARN</code> of the encryption key for encrypting outgoing PIN block data. This key type can be PEK or BDK.</p>
|
|
2491
|
-
* <p>For ECDH, it is the <code>keyARN</code> of the asymmetric ECC key.</p>
|
|
2472
|
+
* <p>The <code>keyARN</code> of the encryption key for encrypting outgoing PIN block data. This key type can be PEK or BDK.</p> <p>For ECDH, it is the <code>keyARN</code> of the asymmetric ECC key.</p>
|
|
2492
2473
|
* @public
|
|
2493
2474
|
*/
|
|
2494
2475
|
OutgoingKeyIdentifier: string | undefined;
|
|
@@ -2543,8 +2524,7 @@ export interface TranslatePinDataOutput {
|
|
|
2543
2524
|
*/
|
|
2544
2525
|
KeyArn: string | undefined;
|
|
2545
2526
|
/**
|
|
2546
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2547
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2527
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2548
2528
|
* @public
|
|
2549
2529
|
*/
|
|
2550
2530
|
KeyCheckValue: string | undefined;
|
|
@@ -2816,8 +2796,7 @@ export interface VerifyAuthRequestCryptogramOutput {
|
|
|
2816
2796
|
*/
|
|
2817
2797
|
KeyArn: string | undefined;
|
|
2818
2798
|
/**
|
|
2819
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2820
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2799
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2821
2800
|
* @public
|
|
2822
2801
|
*/
|
|
2823
2802
|
KeyCheckValue: string | undefined;
|
|
@@ -2862,8 +2841,7 @@ export interface VerifyCardValidationDataOutput {
|
|
|
2862
2841
|
*/
|
|
2863
2842
|
KeyArn: string | undefined;
|
|
2864
2843
|
/**
|
|
2865
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2866
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2844
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2867
2845
|
* @public
|
|
2868
2846
|
*/
|
|
2869
2847
|
KeyCheckValue: string | undefined;
|
|
@@ -2908,8 +2886,7 @@ export interface VerifyMacOutput {
|
|
|
2908
2886
|
*/
|
|
2909
2887
|
KeyArn: string | undefined;
|
|
2910
2888
|
/**
|
|
2911
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
2912
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2889
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
2913
2890
|
* @public
|
|
2914
2891
|
*/
|
|
2915
2892
|
KeyCheckValue: string | undefined;
|
|
@@ -3002,9 +2979,7 @@ export interface VerifyPinDataInput {
|
|
|
3002
2979
|
*/
|
|
3003
2980
|
PrimaryAccountNumber: string | undefined;
|
|
3004
2981
|
/**
|
|
3005
|
-
* <p>The PIN encoding format for pin data generation as specified in ISO 9564. Amazon Web Services Payment Cryptography supports <code>ISO_Format_0</code> and <code>ISO_Format_3</code>.</p>
|
|
3006
|
-
* <p>The <code>ISO_Format_0</code> PIN block format is equivalent to the ANSI X9.8, VISA-1, and ECI-1 PIN block formats. It is similar to a VISA-4 PIN block format. It supports a PIN from 4 to 12 digits in length.</p>
|
|
3007
|
-
* <p>The <code>ISO_Format_3</code> PIN block format is the same as <code>ISO_Format_0</code> except that the fill digits are random values from 10 to 15.</p>
|
|
2982
|
+
* <p>The PIN encoding format for pin data generation as specified in ISO 9564. Amazon Web Services Payment Cryptography supports <code>ISO_Format_0</code> and <code>ISO_Format_3</code>.</p> <p>The <code>ISO_Format_0</code> PIN block format is equivalent to the ANSI X9.8, VISA-1, and ECI-1 PIN block formats. It is similar to a VISA-4 PIN block format. It supports a PIN from 4 to 12 digits in length.</p> <p>The <code>ISO_Format_3</code> PIN block format is the same as <code>ISO_Format_0</code> except that the fill digits are random values from 10 to 15.</p>
|
|
3008
2983
|
* @public
|
|
3009
2984
|
*/
|
|
3010
2985
|
PinBlockFormat: PinBlockFormatForPinData | undefined;
|
|
@@ -3034,8 +3009,7 @@ export interface VerifyPinDataOutput {
|
|
|
3034
3009
|
*/
|
|
3035
3010
|
VerificationKeyArn: string | undefined;
|
|
3036
3011
|
/**
|
|
3037
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
3038
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
3012
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
3039
3013
|
* @public
|
|
3040
3014
|
*/
|
|
3041
3015
|
VerificationKeyCheckValue: string | undefined;
|
|
@@ -3045,8 +3019,7 @@ export interface VerifyPinDataOutput {
|
|
|
3045
3019
|
*/
|
|
3046
3020
|
EncryptionKeyArn: string | undefined;
|
|
3047
3021
|
/**
|
|
3048
|
-
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p>
|
|
3049
|
-
* <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
3022
|
+
* <p>The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed.</p> <p>Amazon Web Services Payment Cryptography computes the KCV according to the CMAC specification.</p>
|
|
3050
3023
|
* @public
|
|
3051
3024
|
*/
|
|
3052
3025
|
EncryptionKeyCheckValue: string | undefined;
|
|
@@ -16,7 +16,10 @@ export interface ClientInputEndpointParameters {
|
|
|
16
16
|
| EndpointV2
|
|
17
17
|
| Provider<EndpointV2>;
|
|
18
18
|
}
|
|
19
|
-
export type ClientResolvedEndpointParameters =
|
|
19
|
+
export type ClientResolvedEndpointParameters = Pick<
|
|
20
|
+
ClientInputEndpointParameters,
|
|
21
|
+
Exclude<keyof ClientInputEndpointParameters, "endpoint">
|
|
22
|
+
> & {
|
|
20
23
|
defaultSigningName: string;
|
|
21
24
|
};
|
|
22
25
|
export declare const resolveClientEndpointParameters: <T>(
|
|
@@ -456,6 +456,7 @@ export declare namespace EncryptionDecryptionAttributes {
|
|
|
456
456
|
export declare const KeyCheckValueAlgorithm: {
|
|
457
457
|
readonly ANSI_X9_24: "ANSI_X9_24";
|
|
458
458
|
readonly CMAC: "CMAC";
|
|
459
|
+
readonly HMAC: "HMAC";
|
|
459
460
|
};
|
|
460
461
|
export type KeyCheckValueAlgorithm =
|
|
461
462
|
(typeof KeyCheckValueAlgorithm)[keyof typeof KeyCheckValueAlgorithm];
|
|
@@ -463,6 +464,10 @@ export declare const SymmetricKeyAlgorithm: {
|
|
|
463
464
|
readonly AES_128: "AES_128";
|
|
464
465
|
readonly AES_192: "AES_192";
|
|
465
466
|
readonly AES_256: "AES_256";
|
|
467
|
+
readonly HMAC_SHA224: "HMAC_SHA224";
|
|
468
|
+
readonly HMAC_SHA256: "HMAC_SHA256";
|
|
469
|
+
readonly HMAC_SHA384: "HMAC_SHA384";
|
|
470
|
+
readonly HMAC_SHA512: "HMAC_SHA512";
|
|
466
471
|
readonly TDES_2KEY: "TDES_2KEY";
|
|
467
472
|
readonly TDES_3KEY: "TDES_3KEY";
|
|
468
473
|
};
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-payment-cryptography-data",
|
|
3
3
|
"description": "AWS SDK for JavaScript Payment Cryptography Data Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.835.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-payment-cryptography-data",
|
|
@@ -20,41 +20,41 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
23
|
-
"@aws-sdk/core": "3.
|
|
24
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
23
|
+
"@aws-sdk/core": "3.835.0",
|
|
24
|
+
"@aws-sdk/credential-provider-node": "3.835.0",
|
|
25
25
|
"@aws-sdk/middleware-host-header": "3.821.0",
|
|
26
26
|
"@aws-sdk/middleware-logger": "3.821.0",
|
|
27
27
|
"@aws-sdk/middleware-recursion-detection": "3.821.0",
|
|
28
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
28
|
+
"@aws-sdk/middleware-user-agent": "3.835.0",
|
|
29
29
|
"@aws-sdk/region-config-resolver": "3.821.0",
|
|
30
30
|
"@aws-sdk/types": "3.821.0",
|
|
31
31
|
"@aws-sdk/util-endpoints": "3.828.0",
|
|
32
32
|
"@aws-sdk/util-user-agent-browser": "3.821.0",
|
|
33
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
33
|
+
"@aws-sdk/util-user-agent-node": "3.835.0",
|
|
34
34
|
"@smithy/config-resolver": "^4.1.4",
|
|
35
35
|
"@smithy/core": "^3.5.3",
|
|
36
36
|
"@smithy/fetch-http-handler": "^5.0.4",
|
|
37
37
|
"@smithy/hash-node": "^4.0.4",
|
|
38
38
|
"@smithy/invalid-dependency": "^4.0.4",
|
|
39
39
|
"@smithy/middleware-content-length": "^4.0.4",
|
|
40
|
-
"@smithy/middleware-endpoint": "^4.1.
|
|
41
|
-
"@smithy/middleware-retry": "^4.1.
|
|
40
|
+
"@smithy/middleware-endpoint": "^4.1.12",
|
|
41
|
+
"@smithy/middleware-retry": "^4.1.13",
|
|
42
42
|
"@smithy/middleware-serde": "^4.0.8",
|
|
43
43
|
"@smithy/middleware-stack": "^4.0.4",
|
|
44
44
|
"@smithy/node-config-provider": "^4.1.3",
|
|
45
45
|
"@smithy/node-http-handler": "^4.0.6",
|
|
46
46
|
"@smithy/protocol-http": "^5.1.2",
|
|
47
|
-
"@smithy/smithy-client": "^4.4.
|
|
47
|
+
"@smithy/smithy-client": "^4.4.4",
|
|
48
48
|
"@smithy/types": "^4.3.1",
|
|
49
49
|
"@smithy/url-parser": "^4.0.4",
|
|
50
50
|
"@smithy/util-base64": "^4.0.0",
|
|
51
51
|
"@smithy/util-body-length-browser": "^4.0.0",
|
|
52
52
|
"@smithy/util-body-length-node": "^4.0.0",
|
|
53
|
-
"@smithy/util-defaults-mode-browser": "^4.0.
|
|
54
|
-
"@smithy/util-defaults-mode-node": "^4.0.
|
|
53
|
+
"@smithy/util-defaults-mode-browser": "^4.0.20",
|
|
54
|
+
"@smithy/util-defaults-mode-node": "^4.0.20",
|
|
55
55
|
"@smithy/util-endpoints": "^3.0.6",
|
|
56
56
|
"@smithy/util-middleware": "^4.0.4",
|
|
57
|
-
"@smithy/util-retry": "^4.0.
|
|
57
|
+
"@smithy/util-retry": "^4.0.6",
|
|
58
58
|
"@smithy/util-utf8": "^4.0.0",
|
|
59
59
|
"tslib": "^2.6.2"
|
|
60
60
|
},
|