@aws-sdk/client-payment-cryptography 3.490.0 → 3.493.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +20 -1
- package/dist-es/models/models_0.js +18 -0
- package/dist-types/commands/ExportKeyCommand.d.ts +30 -5
- package/dist-types/commands/GetParametersForImportCommand.d.ts +1 -1
- package/dist-types/commands/ImportKeyCommand.d.ts +31 -4
- package/dist-types/models/models_0.d.ts +110 -8
- package/dist-types/ts3.4/models/models_0.d.ts +49 -0
- package/package.json +1 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.ImportKeyInputFilterSensitiveLog = exports.ImportKeyMaterialFilterSensitiveLog = exports.TrustedCertificatePublicKeyFilterSensitiveLog = exports.ImportTr34KeyBlockFilterSensitiveLog = exports.RootCertificatePublicKeyFilterSensitiveLog = exports.GetPublicKeyCertificateOutputFilterSensitiveLog = exports.GetParametersForImportOutputFilterSensitiveLog = exports.GetParametersForExportOutputFilterSensitiveLog = exports.ExportKeyOutputFilterSensitiveLog = exports.WrappedKeyFilterSensitiveLog = exports.ExportKeyInputFilterSensitiveLog = exports.ExportKeyMaterialFilterSensitiveLog = exports.ExportTr34KeyBlockFilterSensitiveLog = exports.ImportKeyMaterial = exports.KeyMaterialType = exports.WrappedKeyMaterialFormat = exports.ExportKeyMaterial = exports.Tr34KeyBlockFormat = exports.KeyState = exports.KeyOrigin = exports.KeyCheckValueAlgorithm = exports.KeyUsage = exports.KeyClass = exports.KeyAlgorithm = exports.ValidationException = exports.ThrottlingException = exports.ServiceUnavailableException = exports.ServiceQuotaExceededException = exports.ResourceNotFoundException = exports.InternalServerException = exports.ConflictException = exports.AccessDeniedException = void 0;
|
|
3
|
+
exports.ImportKeyInputFilterSensitiveLog = exports.ImportKeyMaterialFilterSensitiveLog = exports.TrustedCertificatePublicKeyFilterSensitiveLog = exports.ImportTr34KeyBlockFilterSensitiveLog = exports.RootCertificatePublicKeyFilterSensitiveLog = exports.GetPublicKeyCertificateOutputFilterSensitiveLog = exports.GetParametersForImportOutputFilterSensitiveLog = exports.GetParametersForExportOutputFilterSensitiveLog = exports.ExportKeyOutputFilterSensitiveLog = exports.WrappedKeyFilterSensitiveLog = exports.ExportKeyInputFilterSensitiveLog = exports.ExportKeyMaterialFilterSensitiveLog = exports.ExportTr34KeyBlockFilterSensitiveLog = exports.ExportKeyCryptogramFilterSensitiveLog = exports.ImportKeyMaterial = exports.KeyMaterialType = exports.WrappedKeyMaterialFormat = exports.ExportKeyMaterial = exports.Tr34KeyBlockFormat = exports.WrappingKeySpec = exports.KeyState = exports.KeyOrigin = exports.KeyCheckValueAlgorithm = exports.KeyUsage = exports.KeyClass = exports.KeyAlgorithm = exports.ValidationException = exports.ThrottlingException = exports.ServiceUnavailableException = exports.ServiceQuotaExceededException = exports.ResourceNotFoundException = exports.InternalServerException = exports.ConflictException = exports.AccessDeniedException = void 0;
|
|
4
4
|
const smithy_client_1 = require("@smithy/smithy-client");
|
|
5
5
|
const PaymentCryptographyServiceException_1 = require("./PaymentCryptographyServiceException");
|
|
6
6
|
class AccessDeniedException extends PaymentCryptographyServiceException_1.PaymentCryptographyServiceException {
|
|
@@ -146,6 +146,7 @@ exports.KeyUsage = {
|
|
|
146
146
|
TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
|
|
147
147
|
TR31_K2_TR34_ASYMMETRIC_KEY: "TR31_K2_TR34_ASYMMETRIC_KEY",
|
|
148
148
|
TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT: "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT",
|
|
149
|
+
TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
|
|
149
150
|
TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
|
|
150
151
|
TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
|
|
151
152
|
TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
|
|
@@ -169,6 +170,10 @@ exports.KeyState = {
|
|
|
169
170
|
DELETE_COMPLETE: "DELETE_COMPLETE",
|
|
170
171
|
DELETE_PENDING: "DELETE_PENDING",
|
|
171
172
|
};
|
|
173
|
+
exports.WrappingKeySpec = {
|
|
174
|
+
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
175
|
+
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512",
|
|
176
|
+
};
|
|
172
177
|
exports.Tr34KeyBlockFormat = {
|
|
173
178
|
X9_TR34_2012: "X9_TR34_2012",
|
|
174
179
|
};
|
|
@@ -179,6 +184,8 @@ var ExportKeyMaterial;
|
|
|
179
184
|
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
180
185
|
if (value.Tr34KeyBlock !== undefined)
|
|
181
186
|
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
187
|
+
if (value.KeyCryptogram !== undefined)
|
|
188
|
+
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
182
189
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
183
190
|
};
|
|
184
191
|
})(ExportKeyMaterial = exports.ExportKeyMaterial || (exports.ExportKeyMaterial = {}));
|
|
@@ -188,6 +195,7 @@ exports.WrappedKeyMaterialFormat = {
|
|
|
188
195
|
TR34_KEY_BLOCK: "TR34_KEY_BLOCK",
|
|
189
196
|
};
|
|
190
197
|
exports.KeyMaterialType = {
|
|
198
|
+
KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM",
|
|
191
199
|
ROOT_PUBLIC_KEY_CERTIFICATE: "ROOT_PUBLIC_KEY_CERTIFICATE",
|
|
192
200
|
TR31_KEY_BLOCK: "TR31_KEY_BLOCK",
|
|
193
201
|
TR34_KEY_BLOCK: "TR34_KEY_BLOCK",
|
|
@@ -204,9 +212,16 @@ var ImportKeyMaterial;
|
|
|
204
212
|
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
205
213
|
if (value.Tr34KeyBlock !== undefined)
|
|
206
214
|
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
215
|
+
if (value.KeyCryptogram !== undefined)
|
|
216
|
+
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
207
217
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
208
218
|
};
|
|
209
219
|
})(ImportKeyMaterial = exports.ImportKeyMaterial || (exports.ImportKeyMaterial = {}));
|
|
220
|
+
const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
|
|
221
|
+
...obj,
|
|
222
|
+
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: smithy_client_1.SENSITIVE_STRING }),
|
|
223
|
+
});
|
|
224
|
+
exports.ExportKeyCryptogramFilterSensitiveLog = ExportKeyCryptogramFilterSensitiveLog;
|
|
210
225
|
const ExportTr34KeyBlockFilterSensitiveLog = (obj) => ({
|
|
211
226
|
...obj,
|
|
212
227
|
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: smithy_client_1.SENSITIVE_STRING }),
|
|
@@ -217,6 +232,8 @@ const ExportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
|
217
232
|
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
218
233
|
if (obj.Tr34KeyBlock !== undefined)
|
|
219
234
|
return { Tr34KeyBlock: (0, exports.ExportTr34KeyBlockFilterSensitiveLog)(obj.Tr34KeyBlock) };
|
|
235
|
+
if (obj.KeyCryptogram !== undefined)
|
|
236
|
+
return { KeyCryptogram: (0, exports.ExportKeyCryptogramFilterSensitiveLog)(obj.KeyCryptogram) };
|
|
220
237
|
if (obj.$unknown !== undefined)
|
|
221
238
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
222
239
|
};
|
|
@@ -280,6 +297,8 @@ const ImportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
|
280
297
|
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
281
298
|
if (obj.Tr34KeyBlock !== undefined)
|
|
282
299
|
return { Tr34KeyBlock: (0, exports.ImportTr34KeyBlockFilterSensitiveLog)(obj.Tr34KeyBlock) };
|
|
300
|
+
if (obj.KeyCryptogram !== undefined)
|
|
301
|
+
return { KeyCryptogram: obj.KeyCryptogram };
|
|
283
302
|
if (obj.$unknown !== undefined)
|
|
284
303
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
285
304
|
};
|
|
@@ -135,6 +135,7 @@ export const KeyUsage = {
|
|
|
135
135
|
TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
|
|
136
136
|
TR31_K2_TR34_ASYMMETRIC_KEY: "TR31_K2_TR34_ASYMMETRIC_KEY",
|
|
137
137
|
TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT: "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT",
|
|
138
|
+
TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
|
|
138
139
|
TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
|
|
139
140
|
TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
|
|
140
141
|
TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
|
|
@@ -158,6 +159,10 @@ export const KeyState = {
|
|
|
158
159
|
DELETE_COMPLETE: "DELETE_COMPLETE",
|
|
159
160
|
DELETE_PENDING: "DELETE_PENDING",
|
|
160
161
|
};
|
|
162
|
+
export const WrappingKeySpec = {
|
|
163
|
+
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
164
|
+
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512",
|
|
165
|
+
};
|
|
161
166
|
export const Tr34KeyBlockFormat = {
|
|
162
167
|
X9_TR34_2012: "X9_TR34_2012",
|
|
163
168
|
};
|
|
@@ -168,6 +173,8 @@ export var ExportKeyMaterial;
|
|
|
168
173
|
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
169
174
|
if (value.Tr34KeyBlock !== undefined)
|
|
170
175
|
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
176
|
+
if (value.KeyCryptogram !== undefined)
|
|
177
|
+
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
171
178
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
172
179
|
};
|
|
173
180
|
})(ExportKeyMaterial || (ExportKeyMaterial = {}));
|
|
@@ -177,6 +184,7 @@ export const WrappedKeyMaterialFormat = {
|
|
|
177
184
|
TR34_KEY_BLOCK: "TR34_KEY_BLOCK",
|
|
178
185
|
};
|
|
179
186
|
export const KeyMaterialType = {
|
|
187
|
+
KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM",
|
|
180
188
|
ROOT_PUBLIC_KEY_CERTIFICATE: "ROOT_PUBLIC_KEY_CERTIFICATE",
|
|
181
189
|
TR31_KEY_BLOCK: "TR31_KEY_BLOCK",
|
|
182
190
|
TR34_KEY_BLOCK: "TR34_KEY_BLOCK",
|
|
@@ -193,9 +201,15 @@ export var ImportKeyMaterial;
|
|
|
193
201
|
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
194
202
|
if (value.Tr34KeyBlock !== undefined)
|
|
195
203
|
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
204
|
+
if (value.KeyCryptogram !== undefined)
|
|
205
|
+
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
196
206
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
197
207
|
};
|
|
198
208
|
})(ImportKeyMaterial || (ImportKeyMaterial = {}));
|
|
209
|
+
export const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
|
|
210
|
+
...obj,
|
|
211
|
+
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
|
|
212
|
+
});
|
|
199
213
|
export const ExportTr34KeyBlockFilterSensitiveLog = (obj) => ({
|
|
200
214
|
...obj,
|
|
201
215
|
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
|
|
@@ -205,6 +219,8 @@ export const ExportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
|
205
219
|
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
206
220
|
if (obj.Tr34KeyBlock !== undefined)
|
|
207
221
|
return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
222
|
+
if (obj.KeyCryptogram !== undefined)
|
|
223
|
+
return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
|
|
208
224
|
if (obj.$unknown !== undefined)
|
|
209
225
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
210
226
|
};
|
|
@@ -258,6 +274,8 @@ export const ImportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
|
258
274
|
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
259
275
|
if (obj.Tr34KeyBlock !== undefined)
|
|
260
276
|
return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
277
|
+
if (obj.KeyCryptogram !== undefined)
|
|
278
|
+
return { KeyCryptogram: obj.KeyCryptogram };
|
|
261
279
|
if (obj.$unknown !== undefined)
|
|
262
280
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
263
281
|
};
|
|
@@ -28,11 +28,11 @@ declare const ExportKeyCommand_base: {
|
|
|
28
28
|
* @public
|
|
29
29
|
* <p>Exports a key from Amazon Web Services Payment Cryptography.</p>
|
|
30
30
|
* <p>Amazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With <code>ExportKey</code> you can export symmetric keys using either symmetric and asymmetric key exchange mechanisms. Using this operation, you can share your Amazon Web Services Payment Cryptography generated keys with other service partners to perform cryptographic operations outside of Amazon Web Services Payment Cryptography </p>
|
|
31
|
-
* <p>For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm . Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.</p>
|
|
32
|
-
* <p>The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block
|
|
31
|
+
* <p>For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanism. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.</p>
|
|
32
|
+
* <p>The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import. </p>
|
|
33
33
|
* <p>You can also use <code>ExportKey</code> functionality to generate and export an IPEK (Initial Pin Encryption Key) from Amazon Web Services Payment Cryptography using either TR-31 or TR-34 export key exchange. IPEK is generated from BDK (Base Derivation Key) and <code>ExportDukptInitialKey</code> attribute KSN (<code>KeySerialNumber</code>). The generated IPEK does not persist within Amazon Web Services Payment Cryptography and has to be re-generated each time during export.</p>
|
|
34
34
|
* <p>
|
|
35
|
-
* <b>To export KEK or IPEK using TR-34</b>
|
|
35
|
+
* <b>To export initial keys (KEK) or IPEK using TR-34</b>
|
|
36
36
|
* </p>
|
|
37
37
|
* <p>Using this operation, you can export initial key using TR-34 asymmetric key exchange. You can only export KEK generated within Amazon Web Services Payment Cryptography. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export and KRD is the user receiving the key.</p>
|
|
38
38
|
* <p>To initiate TR-34 key export, the KRD must obtain an export token by calling <a>GetParametersForExport</a>. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days. </p>
|
|
@@ -66,7 +66,27 @@ declare const ExportKeyCommand_base: {
|
|
|
66
66
|
* </ul>
|
|
67
67
|
* <p>When this operation is successful, Amazon Web Services Payment Cryptography returns the KEK or IPEK as a TR-34 WrappedKeyBlock. </p>
|
|
68
68
|
* <p>
|
|
69
|
-
* <b>To export
|
|
69
|
+
* <b>To export initial keys (KEK) or IPEK using RSA Wrap and Unwrap</b>
|
|
70
|
+
* </p>
|
|
71
|
+
* <p>Using this operation, you can export initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate export, generate an asymmetric key pair on the receiving HSM and obtain the public key certificate in PEM format (base64 encoded) for the purpose of wrapping and the root certifiate chain. Import the root certificate into Amazon Web Services Payment Cryptography by calling <a>ImportKey</a> for <code>RootCertificatePublicKey</code>.</p>
|
|
72
|
+
* <p>Next call <code>ExportKey</code> and set the following parameters:</p>
|
|
73
|
+
* <ul>
|
|
74
|
+
* <li>
|
|
75
|
+
* <p>
|
|
76
|
+
* <code>CertificateAuthorityPublicKeyIdentifier</code>: The <code>KeyARN</code> of the certificate chain that signed wrapping key certificate.</p>
|
|
77
|
+
* </li>
|
|
78
|
+
* <li>
|
|
79
|
+
* <p>
|
|
80
|
+
* <code>KeyMaterial</code>: Set to <code>KeyCryptogram</code>.</p>
|
|
81
|
+
* </li>
|
|
82
|
+
* <li>
|
|
83
|
+
* <p>
|
|
84
|
+
* <code>WrappingKeyCertificate</code>: The public key certificate in PEM format (base64 encoded) obtained by the receiving HSM and signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography. The receiving HSM uses its private key component to unwrap the WrappedKeyCryptogram.</p>
|
|
85
|
+
* </li>
|
|
86
|
+
* </ul>
|
|
87
|
+
* <p>When this operation is successful, Amazon Web Services Payment Cryptography returns the WrappedKeyCryptogram. </p>
|
|
88
|
+
* <p>
|
|
89
|
+
* <b>To export working keys or IPEK using TR-31</b>
|
|
70
90
|
* </p>
|
|
71
91
|
* <p>Using this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use <a>CreateKey</a> or <a>ImportKey</a>. </p>
|
|
72
92
|
* <p>Set the following parameters:</p>
|
|
@@ -84,7 +104,7 @@ declare const ExportKeyCommand_base: {
|
|
|
84
104
|
* <code>KeyMaterial</code>: Use <code>Tr31KeyBlock</code> parameters.</p>
|
|
85
105
|
* </li>
|
|
86
106
|
* </ul>
|
|
87
|
-
* <p>When this operation is successful, Amazon Web Services Payment Cryptography returns the
|
|
107
|
+
* <p>When this operation is successful, Amazon Web Services Payment Cryptography returns the working key or IPEK as a TR-31 WrappedKeyBlock.</p>
|
|
88
108
|
* <p>
|
|
89
109
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
90
110
|
* <p>
|
|
@@ -120,6 +140,11 @@ declare const ExportKeyCommand_base: {
|
|
|
120
140
|
* KeyBlockFormat: "STRING_VALUE", // required
|
|
121
141
|
* RandomNonce: "STRING_VALUE",
|
|
122
142
|
* },
|
|
143
|
+
* KeyCryptogram: { // ExportKeyCryptogram
|
|
144
|
+
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
145
|
+
* WrappingKeyCertificate: "STRING_VALUE", // required
|
|
146
|
+
* WrappingSpec: "STRING_VALUE",
|
|
147
|
+
* },
|
|
123
148
|
* },
|
|
124
149
|
* ExportKeyIdentifier: "STRING_VALUE", // required
|
|
125
150
|
* ExportAttributes: { // ExportAttributes
|
|
@@ -26,7 +26,7 @@ declare const GetParametersForImportCommand_base: {
|
|
|
26
26
|
};
|
|
27
27
|
/**
|
|
28
28
|
* @public
|
|
29
|
-
* <p>Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock.</p>
|
|
29
|
+
* <p>Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.</p>
|
|
30
30
|
* <p>The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling <a>ImportKey</a>. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.</p>
|
|
31
31
|
* <p>
|
|
32
32
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
@@ -28,8 +28,8 @@ declare const ImportKeyCommand_base: {
|
|
|
28
28
|
* @public
|
|
29
29
|
* <p>Imports symmetric keys and public key certificates in PEM format (base64 encoded) into Amazon Web Services Payment Cryptography.</p>
|
|
30
30
|
* <p>Amazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With <code>ImportKey</code> you can import symmetric keys using either symmetric and asymmetric key exchange mechanisms.</p>
|
|
31
|
-
* <p>For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm . Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.</p>
|
|
32
|
-
* <p>The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block.
|
|
31
|
+
* <p>For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanisms. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.</p>
|
|
32
|
+
* <p>The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import. </p>
|
|
33
33
|
* <p>You can also import a <i>root public key certificate</i>, used to sign other public key certificates, or a <i>trusted public key certificate</i> under an already established root public key certificate.</p>
|
|
34
34
|
* <p>
|
|
35
35
|
* <b>To import a public root key certificate</b>
|
|
@@ -90,7 +90,7 @@ declare const ImportKeyCommand_base: {
|
|
|
90
90
|
* </li>
|
|
91
91
|
* </ul>
|
|
92
92
|
* <p>
|
|
93
|
-
* <b>To import KEK or ZMK using TR-34</b>
|
|
93
|
+
* <b>To import initial keys (KEK or ZMK or similar) using TR-34</b>
|
|
94
94
|
* </p>
|
|
95
95
|
* <p>Using this operation, you can import initial key using TR-34 asymmetric key exchange. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During the key import process, KDH is the user who initiates the key import and KRD is Amazon Web Services Payment Cryptography who receives the key.</p>
|
|
96
96
|
* <p>To initiate TR-34 key import, the KDH must obtain an import token by calling <a>GetParametersForImport</a>. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.</p>
|
|
@@ -119,7 +119,12 @@ declare const ImportKeyCommand_base: {
|
|
|
119
119
|
* </li>
|
|
120
120
|
* </ul>
|
|
121
121
|
* <p>
|
|
122
|
-
* <b>To import
|
|
122
|
+
* <b>To import initial keys (KEK or ZMK or similar) using RSA Wrap and Unwrap</b>
|
|
123
|
+
* </p>
|
|
124
|
+
* <p>Using this operation, you can import initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate import, call <a>GetParametersForImport</a> with <code>KeyMaterial</code> set to <code>KEY_CRYPTOGRAM</code> to generate an import token. This operation also generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate in PEM format (base64 encoded) and its root certificate chain. The import token and associated KRD wrapping certificate expires after 7 days. </p>
|
|
125
|
+
* <p>You must trust and install the wrapping certificate and its certificate chain on the sending HSM and use it to wrap the key under export for WrappedKeyCryptogram generation. Next call <code>ImportKey</code> with <code>KeyMaterial</code> set to <code>KEY_CRYPTOGRAM</code> and provide the <code>ImportToken</code> and <code>KeyAttributes</code> for the key under import.</p>
|
|
126
|
+
* <p>
|
|
127
|
+
* <b>To import working keys using TR-31</b>
|
|
123
128
|
* </p>
|
|
124
129
|
* <p>Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using <a>CreateKey</a>. To initiate a TR-31 key import, set the following parameters:</p>
|
|
125
130
|
* <ul>
|
|
@@ -212,6 +217,28 @@ declare const ImportKeyCommand_base: {
|
|
|
212
217
|
* KeyBlockFormat: "STRING_VALUE", // required
|
|
213
218
|
* RandomNonce: "STRING_VALUE",
|
|
214
219
|
* },
|
|
220
|
+
* KeyCryptogram: { // ImportKeyCryptogram
|
|
221
|
+
* KeyAttributes: {
|
|
222
|
+
* KeyUsage: "STRING_VALUE", // required
|
|
223
|
+
* KeyClass: "STRING_VALUE", // required
|
|
224
|
+
* KeyAlgorithm: "STRING_VALUE", // required
|
|
225
|
+
* KeyModesOfUse: {
|
|
226
|
+
* Encrypt: true || false,
|
|
227
|
+
* Decrypt: true || false,
|
|
228
|
+
* Wrap: true || false,
|
|
229
|
+
* Unwrap: true || false,
|
|
230
|
+
* Generate: true || false,
|
|
231
|
+
* Sign: true || false,
|
|
232
|
+
* Verify: true || false,
|
|
233
|
+
* DeriveKey: true || false,
|
|
234
|
+
* NoRestrictions: true || false,
|
|
235
|
+
* },
|
|
236
|
+
* },
|
|
237
|
+
* Exportable: true || false, // required
|
|
238
|
+
* WrappedKeyCryptogram: "STRING_VALUE", // required
|
|
239
|
+
* ImportToken: "STRING_VALUE", // required
|
|
240
|
+
* WrappingSpec: "STRING_VALUE",
|
|
241
|
+
* },
|
|
215
242
|
* },
|
|
216
243
|
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
217
244
|
* Enabled: true || false,
|
|
@@ -348,6 +348,7 @@ export declare const KeyUsage: {
|
|
|
348
348
|
readonly TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY";
|
|
349
349
|
readonly TR31_K2_TR34_ASYMMETRIC_KEY: "TR31_K2_TR34_ASYMMETRIC_KEY";
|
|
350
350
|
readonly TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT: "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT";
|
|
351
|
+
readonly TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY";
|
|
351
352
|
readonly TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY";
|
|
352
353
|
readonly TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY";
|
|
353
354
|
readonly TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY";
|
|
@@ -616,6 +617,39 @@ export interface ExportAttributes {
|
|
|
616
617
|
*/
|
|
617
618
|
KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm;
|
|
618
619
|
}
|
|
620
|
+
/**
|
|
621
|
+
* @public
|
|
622
|
+
* @enum
|
|
623
|
+
*/
|
|
624
|
+
export declare const WrappingKeySpec: {
|
|
625
|
+
readonly RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256";
|
|
626
|
+
readonly RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512";
|
|
627
|
+
};
|
|
628
|
+
/**
|
|
629
|
+
* @public
|
|
630
|
+
*/
|
|
631
|
+
export type WrappingKeySpec = (typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
|
|
632
|
+
/**
|
|
633
|
+
* @public
|
|
634
|
+
* <p>Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method.</p>
|
|
635
|
+
*/
|
|
636
|
+
export interface ExportKeyCryptogram {
|
|
637
|
+
/**
|
|
638
|
+
* @public
|
|
639
|
+
* <p>The <code>KeyARN</code> of the certificate chain that signs the wrapping key certificate during RSA wrap and unwrap key export.</p>
|
|
640
|
+
*/
|
|
641
|
+
CertificateAuthorityPublicKeyIdentifier: string | undefined;
|
|
642
|
+
/**
|
|
643
|
+
* @public
|
|
644
|
+
* <p>The wrapping key certificate in PEM format (base64 encoded). Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.</p>
|
|
645
|
+
*/
|
|
646
|
+
WrappingKeyCertificate: string | undefined;
|
|
647
|
+
/**
|
|
648
|
+
* @public
|
|
649
|
+
* <p>The wrapping spec for the key under export.</p>
|
|
650
|
+
*/
|
|
651
|
+
WrappingSpec?: WrappingKeySpec;
|
|
652
|
+
}
|
|
619
653
|
/**
|
|
620
654
|
* @public
|
|
621
655
|
* <p>Parameter information for key material export using symmetric TR-31 key exchange method.</p>
|
|
@@ -671,9 +705,9 @@ export interface ExportTr34KeyBlock {
|
|
|
671
705
|
}
|
|
672
706
|
/**
|
|
673
707
|
* @public
|
|
674
|
-
* <p>Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 key exchange method.</p>
|
|
708
|
+
* <p>Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.</p>
|
|
675
709
|
*/
|
|
676
|
-
export type ExportKeyMaterial = ExportKeyMaterial.Tr31KeyBlockMember | ExportKeyMaterial.Tr34KeyBlockMember | ExportKeyMaterial.$UnknownMember;
|
|
710
|
+
export type ExportKeyMaterial = ExportKeyMaterial.KeyCryptogramMember | ExportKeyMaterial.Tr31KeyBlockMember | ExportKeyMaterial.Tr34KeyBlockMember | ExportKeyMaterial.$UnknownMember;
|
|
677
711
|
/**
|
|
678
712
|
* @public
|
|
679
713
|
*/
|
|
@@ -685,6 +719,7 @@ export declare namespace ExportKeyMaterial {
|
|
|
685
719
|
interface Tr31KeyBlockMember {
|
|
686
720
|
Tr31KeyBlock: ExportTr31KeyBlock;
|
|
687
721
|
Tr34KeyBlock?: never;
|
|
722
|
+
KeyCryptogram?: never;
|
|
688
723
|
$unknown?: never;
|
|
689
724
|
}
|
|
690
725
|
/**
|
|
@@ -694,6 +729,17 @@ export declare namespace ExportKeyMaterial {
|
|
|
694
729
|
interface Tr34KeyBlockMember {
|
|
695
730
|
Tr31KeyBlock?: never;
|
|
696
731
|
Tr34KeyBlock: ExportTr34KeyBlock;
|
|
732
|
+
KeyCryptogram?: never;
|
|
733
|
+
$unknown?: never;
|
|
734
|
+
}
|
|
735
|
+
/**
|
|
736
|
+
* @public
|
|
737
|
+
* <p>Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method</p>
|
|
738
|
+
*/
|
|
739
|
+
interface KeyCryptogramMember {
|
|
740
|
+
Tr31KeyBlock?: never;
|
|
741
|
+
Tr34KeyBlock?: never;
|
|
742
|
+
KeyCryptogram: ExportKeyCryptogram;
|
|
697
743
|
$unknown?: never;
|
|
698
744
|
}
|
|
699
745
|
/**
|
|
@@ -702,11 +748,13 @@ export declare namespace ExportKeyMaterial {
|
|
|
702
748
|
interface $UnknownMember {
|
|
703
749
|
Tr31KeyBlock?: never;
|
|
704
750
|
Tr34KeyBlock?: never;
|
|
751
|
+
KeyCryptogram?: never;
|
|
705
752
|
$unknown: [string, any];
|
|
706
753
|
}
|
|
707
754
|
interface Visitor<T> {
|
|
708
755
|
Tr31KeyBlock: (value: ExportTr31KeyBlock) => T;
|
|
709
756
|
Tr34KeyBlock: (value: ExportTr34KeyBlock) => T;
|
|
757
|
+
KeyCryptogram: (value: ExportKeyCryptogram) => T;
|
|
710
758
|
_: (name: string, value: any) => T;
|
|
711
759
|
}
|
|
712
760
|
const visit: <T>(value: ExportKeyMaterial, visitor: Visitor<T>) => T;
|
|
@@ -782,7 +830,7 @@ export interface WrappedKey {
|
|
|
782
830
|
export interface ExportKeyOutput {
|
|
783
831
|
/**
|
|
784
832
|
* @public
|
|
785
|
-
* <p>The key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock.
|
|
833
|
+
* <p>The key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock. or a RSA WrappedKeyCryptogram.</p>
|
|
786
834
|
*/
|
|
787
835
|
WrappedKey?: WrappedKey;
|
|
788
836
|
}
|
|
@@ -811,6 +859,7 @@ export interface GetKeyOutput {
|
|
|
811
859
|
* @enum
|
|
812
860
|
*/
|
|
813
861
|
export declare const KeyMaterialType: {
|
|
862
|
+
readonly KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM";
|
|
814
863
|
readonly ROOT_PUBLIC_KEY_CERTIFICATE: "ROOT_PUBLIC_KEY_CERTIFICATE";
|
|
815
864
|
readonly TR31_KEY_BLOCK: "TR31_KEY_BLOCK";
|
|
816
865
|
readonly TR34_KEY_BLOCK: "TR34_KEY_BLOCK";
|
|
@@ -871,14 +920,14 @@ export interface GetParametersForExportOutput {
|
|
|
871
920
|
export interface GetParametersForImportInput {
|
|
872
921
|
/**
|
|
873
922
|
* @public
|
|
874
|
-
* <p>The method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (<code>TR34_KEY_BLOCK</code>).</p>
|
|
923
|
+
* <p>The method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (<code>TR34_KEY_BLOCK</code>) and RSA WrappedKeyCryptogram (<code>KEY_CRYPTOGRAM</code>).</p>
|
|
875
924
|
* <p>Import token is not required for TR-31, root public key cerificate or trusted public key certificate.</p>
|
|
876
925
|
*/
|
|
877
926
|
KeyMaterialType: KeyMaterialType | undefined;
|
|
878
927
|
/**
|
|
879
928
|
* @public
|
|
880
929
|
* <p>The wrapping key algorithm to generate a wrapping key certificate. This certificate wraps the key under import.</p>
|
|
881
|
-
* <p>At this time, <code>RSA_2048</code>, <code>RSA_3072</code>, <code>RSA_4096</code> are the
|
|
930
|
+
* <p>At this time, <code>RSA_2048</code> is the allowed algorithm for TR-34 WrappedKeyBlock import. Additionally, <code>RSA_2048</code>, <code>RSA_3072</code>, <code>RSA_4096</code> are the allowed algorithms for RSA WrappedKeyCryptogram import.</p>
|
|
882
931
|
*/
|
|
883
932
|
WrappingKeyAlgorithm: KeyAlgorithm | undefined;
|
|
884
933
|
}
|
|
@@ -898,7 +947,7 @@ export interface GetParametersForImportOutput {
|
|
|
898
947
|
WrappingKeyCertificateChain: string | undefined;
|
|
899
948
|
/**
|
|
900
949
|
* @public
|
|
901
|
-
* <p>The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock.</p>
|
|
950
|
+
* <p>The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock or RSA WrappedKeyCryptogram.</p>
|
|
902
951
|
*/
|
|
903
952
|
WrappingKeyAlgorithm: KeyAlgorithm | undefined;
|
|
904
953
|
/**
|
|
@@ -937,6 +986,37 @@ export interface GetPublicKeyCertificateOutput {
|
|
|
937
986
|
*/
|
|
938
987
|
KeyCertificateChain: string | undefined;
|
|
939
988
|
}
|
|
989
|
+
/**
|
|
990
|
+
* @public
|
|
991
|
+
* <p>Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.</p>
|
|
992
|
+
*/
|
|
993
|
+
export interface ImportKeyCryptogram {
|
|
994
|
+
/**
|
|
995
|
+
* @public
|
|
996
|
+
* <p>The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.</p>
|
|
997
|
+
*/
|
|
998
|
+
KeyAttributes: KeyAttributes | undefined;
|
|
999
|
+
/**
|
|
1000
|
+
* @public
|
|
1001
|
+
* <p>Specifies whether the key is exportable from the service.</p>
|
|
1002
|
+
*/
|
|
1003
|
+
Exportable: boolean | undefined;
|
|
1004
|
+
/**
|
|
1005
|
+
* @public
|
|
1006
|
+
* <p>The RSA wrapped key cryptogram under import.</p>
|
|
1007
|
+
*/
|
|
1008
|
+
WrappedKeyCryptogram: string | undefined;
|
|
1009
|
+
/**
|
|
1010
|
+
* @public
|
|
1011
|
+
* <p>The import token that initiates key import using the asymmetric RSA wrap and unwrap key exchange method into AWS Payment Cryptography. It expires after 7 days. You can use the same import token to import multiple keys to the same service account.</p>
|
|
1012
|
+
*/
|
|
1013
|
+
ImportToken: string | undefined;
|
|
1014
|
+
/**
|
|
1015
|
+
* @public
|
|
1016
|
+
* <p>The wrapping spec for the wrapped key cryptogram.</p>
|
|
1017
|
+
*/
|
|
1018
|
+
WrappingSpec?: WrappingKeySpec;
|
|
1019
|
+
}
|
|
940
1020
|
/**
|
|
941
1021
|
* @public
|
|
942
1022
|
* <p>Parameter information for root public key certificate import.</p>
|
|
@@ -1028,9 +1108,9 @@ export interface TrustedCertificatePublicKey {
|
|
|
1028
1108
|
}
|
|
1029
1109
|
/**
|
|
1030
1110
|
* @public
|
|
1031
|
-
* <p>Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 key exchange method.</p>
|
|
1111
|
+
* <p>Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.</p>
|
|
1032
1112
|
*/
|
|
1033
|
-
export type ImportKeyMaterial = ImportKeyMaterial.RootCertificatePublicKeyMember | ImportKeyMaterial.Tr31KeyBlockMember | ImportKeyMaterial.Tr34KeyBlockMember | ImportKeyMaterial.TrustedCertificatePublicKeyMember | ImportKeyMaterial.$UnknownMember;
|
|
1113
|
+
export type ImportKeyMaterial = ImportKeyMaterial.KeyCryptogramMember | ImportKeyMaterial.RootCertificatePublicKeyMember | ImportKeyMaterial.Tr31KeyBlockMember | ImportKeyMaterial.Tr34KeyBlockMember | ImportKeyMaterial.TrustedCertificatePublicKeyMember | ImportKeyMaterial.$UnknownMember;
|
|
1034
1114
|
/**
|
|
1035
1115
|
* @public
|
|
1036
1116
|
*/
|
|
@@ -1044,6 +1124,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
1044
1124
|
TrustedCertificatePublicKey?: never;
|
|
1045
1125
|
Tr31KeyBlock?: never;
|
|
1046
1126
|
Tr34KeyBlock?: never;
|
|
1127
|
+
KeyCryptogram?: never;
|
|
1047
1128
|
$unknown?: never;
|
|
1048
1129
|
}
|
|
1049
1130
|
/**
|
|
@@ -1055,6 +1136,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
1055
1136
|
TrustedCertificatePublicKey: TrustedCertificatePublicKey;
|
|
1056
1137
|
Tr31KeyBlock?: never;
|
|
1057
1138
|
Tr34KeyBlock?: never;
|
|
1139
|
+
KeyCryptogram?: never;
|
|
1058
1140
|
$unknown?: never;
|
|
1059
1141
|
}
|
|
1060
1142
|
/**
|
|
@@ -1066,6 +1148,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
1066
1148
|
TrustedCertificatePublicKey?: never;
|
|
1067
1149
|
Tr31KeyBlock: ImportTr31KeyBlock;
|
|
1068
1150
|
Tr34KeyBlock?: never;
|
|
1151
|
+
KeyCryptogram?: never;
|
|
1069
1152
|
$unknown?: never;
|
|
1070
1153
|
}
|
|
1071
1154
|
/**
|
|
@@ -1077,6 +1160,19 @@ export declare namespace ImportKeyMaterial {
|
|
|
1077
1160
|
TrustedCertificatePublicKey?: never;
|
|
1078
1161
|
Tr31KeyBlock?: never;
|
|
1079
1162
|
Tr34KeyBlock: ImportTr34KeyBlock;
|
|
1163
|
+
KeyCryptogram?: never;
|
|
1164
|
+
$unknown?: never;
|
|
1165
|
+
}
|
|
1166
|
+
/**
|
|
1167
|
+
* @public
|
|
1168
|
+
* <p>Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.</p>
|
|
1169
|
+
*/
|
|
1170
|
+
interface KeyCryptogramMember {
|
|
1171
|
+
RootCertificatePublicKey?: never;
|
|
1172
|
+
TrustedCertificatePublicKey?: never;
|
|
1173
|
+
Tr31KeyBlock?: never;
|
|
1174
|
+
Tr34KeyBlock?: never;
|
|
1175
|
+
KeyCryptogram: ImportKeyCryptogram;
|
|
1080
1176
|
$unknown?: never;
|
|
1081
1177
|
}
|
|
1082
1178
|
/**
|
|
@@ -1087,6 +1183,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
1087
1183
|
TrustedCertificatePublicKey?: never;
|
|
1088
1184
|
Tr31KeyBlock?: never;
|
|
1089
1185
|
Tr34KeyBlock?: never;
|
|
1186
|
+
KeyCryptogram?: never;
|
|
1090
1187
|
$unknown: [string, any];
|
|
1091
1188
|
}
|
|
1092
1189
|
interface Visitor<T> {
|
|
@@ -1094,6 +1191,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
1094
1191
|
TrustedCertificatePublicKey: (value: TrustedCertificatePublicKey) => T;
|
|
1095
1192
|
Tr31KeyBlock: (value: ImportTr31KeyBlock) => T;
|
|
1096
1193
|
Tr34KeyBlock: (value: ImportTr34KeyBlock) => T;
|
|
1194
|
+
KeyCryptogram: (value: ImportKeyCryptogram) => T;
|
|
1097
1195
|
_: (name: string, value: any) => T;
|
|
1098
1196
|
}
|
|
1099
1197
|
const visit: <T>(value: ImportKeyMaterial, visitor: Visitor<T>) => T;
|
|
@@ -1357,6 +1455,10 @@ export interface UntagResourceInput {
|
|
|
1357
1455
|
*/
|
|
1358
1456
|
export interface UntagResourceOutput {
|
|
1359
1457
|
}
|
|
1458
|
+
/**
|
|
1459
|
+
* @internal
|
|
1460
|
+
*/
|
|
1461
|
+
export declare const ExportKeyCryptogramFilterSensitiveLog: (obj: ExportKeyCryptogram) => any;
|
|
1360
1462
|
/**
|
|
1361
1463
|
* @internal
|
|
1362
1464
|
*/
|
|
@@ -142,6 +142,7 @@ export declare const KeyUsage: {
|
|
|
142
142
|
readonly TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY";
|
|
143
143
|
readonly TR31_K2_TR34_ASYMMETRIC_KEY: "TR31_K2_TR34_ASYMMETRIC_KEY";
|
|
144
144
|
readonly TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT: "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT";
|
|
145
|
+
readonly TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY";
|
|
145
146
|
readonly TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY";
|
|
146
147
|
readonly TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY";
|
|
147
148
|
readonly TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY";
|
|
@@ -219,6 +220,17 @@ export interface ExportAttributes {
|
|
|
219
220
|
ExportDukptInitialKey?: ExportDukptInitialKey;
|
|
220
221
|
KeyCheckValueAlgorithm?: KeyCheckValueAlgorithm;
|
|
221
222
|
}
|
|
223
|
+
export declare const WrappingKeySpec: {
|
|
224
|
+
readonly RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256";
|
|
225
|
+
readonly RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512";
|
|
226
|
+
};
|
|
227
|
+
export type WrappingKeySpec =
|
|
228
|
+
(typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
|
|
229
|
+
export interface ExportKeyCryptogram {
|
|
230
|
+
CertificateAuthorityPublicKeyIdentifier: string | undefined;
|
|
231
|
+
WrappingKeyCertificate: string | undefined;
|
|
232
|
+
WrappingSpec?: WrappingKeySpec;
|
|
233
|
+
}
|
|
222
234
|
export interface ExportTr31KeyBlock {
|
|
223
235
|
WrappingKeyIdentifier: string | undefined;
|
|
224
236
|
}
|
|
@@ -235,6 +247,7 @@ export interface ExportTr34KeyBlock {
|
|
|
235
247
|
RandomNonce?: string;
|
|
236
248
|
}
|
|
237
249
|
export type ExportKeyMaterial =
|
|
250
|
+
| ExportKeyMaterial.KeyCryptogramMember
|
|
238
251
|
| ExportKeyMaterial.Tr31KeyBlockMember
|
|
239
252
|
| ExportKeyMaterial.Tr34KeyBlockMember
|
|
240
253
|
| ExportKeyMaterial.$UnknownMember;
|
|
@@ -242,21 +255,31 @@ export declare namespace ExportKeyMaterial {
|
|
|
242
255
|
interface Tr31KeyBlockMember {
|
|
243
256
|
Tr31KeyBlock: ExportTr31KeyBlock;
|
|
244
257
|
Tr34KeyBlock?: never;
|
|
258
|
+
KeyCryptogram?: never;
|
|
245
259
|
$unknown?: never;
|
|
246
260
|
}
|
|
247
261
|
interface Tr34KeyBlockMember {
|
|
248
262
|
Tr31KeyBlock?: never;
|
|
249
263
|
Tr34KeyBlock: ExportTr34KeyBlock;
|
|
264
|
+
KeyCryptogram?: never;
|
|
265
|
+
$unknown?: never;
|
|
266
|
+
}
|
|
267
|
+
interface KeyCryptogramMember {
|
|
268
|
+
Tr31KeyBlock?: never;
|
|
269
|
+
Tr34KeyBlock?: never;
|
|
270
|
+
KeyCryptogram: ExportKeyCryptogram;
|
|
250
271
|
$unknown?: never;
|
|
251
272
|
}
|
|
252
273
|
interface $UnknownMember {
|
|
253
274
|
Tr31KeyBlock?: never;
|
|
254
275
|
Tr34KeyBlock?: never;
|
|
276
|
+
KeyCryptogram?: never;
|
|
255
277
|
$unknown: [string, any];
|
|
256
278
|
}
|
|
257
279
|
interface Visitor<T> {
|
|
258
280
|
Tr31KeyBlock: (value: ExportTr31KeyBlock) => T;
|
|
259
281
|
Tr34KeyBlock: (value: ExportTr34KeyBlock) => T;
|
|
282
|
+
KeyCryptogram: (value: ExportKeyCryptogram) => T;
|
|
260
283
|
_: (name: string, value: any) => T;
|
|
261
284
|
}
|
|
262
285
|
const visit: <T>(value: ExportKeyMaterial, visitor: Visitor<T>) => T;
|
|
@@ -290,6 +313,7 @@ export interface GetKeyOutput {
|
|
|
290
313
|
Key: Key | undefined;
|
|
291
314
|
}
|
|
292
315
|
export declare const KeyMaterialType: {
|
|
316
|
+
readonly KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM";
|
|
293
317
|
readonly ROOT_PUBLIC_KEY_CERTIFICATE: "ROOT_PUBLIC_KEY_CERTIFICATE";
|
|
294
318
|
readonly TR31_KEY_BLOCK: "TR31_KEY_BLOCK";
|
|
295
319
|
readonly TR34_KEY_BLOCK: "TR34_KEY_BLOCK";
|
|
@@ -326,6 +350,13 @@ export interface GetPublicKeyCertificateOutput {
|
|
|
326
350
|
KeyCertificate: string | undefined;
|
|
327
351
|
KeyCertificateChain: string | undefined;
|
|
328
352
|
}
|
|
353
|
+
export interface ImportKeyCryptogram {
|
|
354
|
+
KeyAttributes: KeyAttributes | undefined;
|
|
355
|
+
Exportable: boolean | undefined;
|
|
356
|
+
WrappedKeyCryptogram: string | undefined;
|
|
357
|
+
ImportToken: string | undefined;
|
|
358
|
+
WrappingSpec?: WrappingKeySpec;
|
|
359
|
+
}
|
|
329
360
|
export interface RootCertificatePublicKey {
|
|
330
361
|
KeyAttributes: KeyAttributes | undefined;
|
|
331
362
|
PublicKeyCertificate: string | undefined;
|
|
@@ -348,6 +379,7 @@ export interface TrustedCertificatePublicKey {
|
|
|
348
379
|
CertificateAuthorityPublicKeyIdentifier: string | undefined;
|
|
349
380
|
}
|
|
350
381
|
export type ImportKeyMaterial =
|
|
382
|
+
| ImportKeyMaterial.KeyCryptogramMember
|
|
351
383
|
| ImportKeyMaterial.RootCertificatePublicKeyMember
|
|
352
384
|
| ImportKeyMaterial.Tr31KeyBlockMember
|
|
353
385
|
| ImportKeyMaterial.Tr34KeyBlockMember
|
|
@@ -359,6 +391,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
359
391
|
TrustedCertificatePublicKey?: never;
|
|
360
392
|
Tr31KeyBlock?: never;
|
|
361
393
|
Tr34KeyBlock?: never;
|
|
394
|
+
KeyCryptogram?: never;
|
|
362
395
|
$unknown?: never;
|
|
363
396
|
}
|
|
364
397
|
interface TrustedCertificatePublicKeyMember {
|
|
@@ -366,6 +399,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
366
399
|
TrustedCertificatePublicKey: TrustedCertificatePublicKey;
|
|
367
400
|
Tr31KeyBlock?: never;
|
|
368
401
|
Tr34KeyBlock?: never;
|
|
402
|
+
KeyCryptogram?: never;
|
|
369
403
|
$unknown?: never;
|
|
370
404
|
}
|
|
371
405
|
interface Tr31KeyBlockMember {
|
|
@@ -373,6 +407,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
373
407
|
TrustedCertificatePublicKey?: never;
|
|
374
408
|
Tr31KeyBlock: ImportTr31KeyBlock;
|
|
375
409
|
Tr34KeyBlock?: never;
|
|
410
|
+
KeyCryptogram?: never;
|
|
376
411
|
$unknown?: never;
|
|
377
412
|
}
|
|
378
413
|
interface Tr34KeyBlockMember {
|
|
@@ -380,6 +415,15 @@ export declare namespace ImportKeyMaterial {
|
|
|
380
415
|
TrustedCertificatePublicKey?: never;
|
|
381
416
|
Tr31KeyBlock?: never;
|
|
382
417
|
Tr34KeyBlock: ImportTr34KeyBlock;
|
|
418
|
+
KeyCryptogram?: never;
|
|
419
|
+
$unknown?: never;
|
|
420
|
+
}
|
|
421
|
+
interface KeyCryptogramMember {
|
|
422
|
+
RootCertificatePublicKey?: never;
|
|
423
|
+
TrustedCertificatePublicKey?: never;
|
|
424
|
+
Tr31KeyBlock?: never;
|
|
425
|
+
Tr34KeyBlock?: never;
|
|
426
|
+
KeyCryptogram: ImportKeyCryptogram;
|
|
383
427
|
$unknown?: never;
|
|
384
428
|
}
|
|
385
429
|
interface $UnknownMember {
|
|
@@ -387,6 +431,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
387
431
|
TrustedCertificatePublicKey?: never;
|
|
388
432
|
Tr31KeyBlock?: never;
|
|
389
433
|
Tr34KeyBlock?: never;
|
|
434
|
+
KeyCryptogram?: never;
|
|
390
435
|
$unknown: [string, any];
|
|
391
436
|
}
|
|
392
437
|
interface Visitor<T> {
|
|
@@ -394,6 +439,7 @@ export declare namespace ImportKeyMaterial {
|
|
|
394
439
|
TrustedCertificatePublicKey: (value: TrustedCertificatePublicKey) => T;
|
|
395
440
|
Tr31KeyBlock: (value: ImportTr31KeyBlock) => T;
|
|
396
441
|
Tr34KeyBlock: (value: ImportTr34KeyBlock) => T;
|
|
442
|
+
KeyCryptogram: (value: ImportKeyCryptogram) => T;
|
|
397
443
|
_: (name: string, value: any) => T;
|
|
398
444
|
}
|
|
399
445
|
const visit: <T>(value: ImportKeyMaterial, visitor: Visitor<T>) => T;
|
|
@@ -461,6 +507,9 @@ export interface UntagResourceInput {
|
|
|
461
507
|
TagKeys: string[] | undefined;
|
|
462
508
|
}
|
|
463
509
|
export interface UntagResourceOutput {}
|
|
510
|
+
export declare const ExportKeyCryptogramFilterSensitiveLog: (
|
|
511
|
+
obj: ExportKeyCryptogram
|
|
512
|
+
) => any;
|
|
464
513
|
export declare const ExportTr34KeyBlockFilterSensitiveLog: (
|
|
465
514
|
obj: ExportTr34KeyBlock
|
|
466
515
|
) => any;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-payment-cryptography",
|
|
3
3
|
"description": "AWS SDK for JavaScript Payment Cryptography Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.493.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|