@aws-sdk/client-payment-cryptography 3.554.0 → 3.560.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +22 -2
- package/dist-es/models/models_0.js +15 -1
- package/dist-types/commands/CreateAliasCommand.d.ts +5 -5
- package/dist-types/commands/CreateKeyCommand.d.ts +3 -3
- package/dist-types/commands/DeleteAliasCommand.d.ts +5 -5
- package/dist-types/commands/DeleteKeyCommand.d.ts +4 -4
- package/dist-types/commands/ExportKeyCommand.d.ts +48 -7
- package/dist-types/commands/GetAliasCommand.d.ts +4 -4
- package/dist-types/commands/GetKeyCommand.d.ts +3 -3
- package/dist-types/commands/GetParametersForExportCommand.d.ts +3 -3
- package/dist-types/commands/GetParametersForImportCommand.d.ts +3 -3
- package/dist-types/commands/ImportKeyCommand.d.ts +6 -6
- package/dist-types/commands/ListAliasesCommand.d.ts +4 -4
- package/dist-types/commands/ListKeysCommand.d.ts +3 -3
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -2
- package/dist-types/commands/RestoreKeyCommand.d.ts +3 -3
- package/dist-types/commands/StartKeyUsageCommand.d.ts +1 -1
- package/dist-types/commands/StopKeyUsageCommand.d.ts +3 -3
- package/dist-types/commands/TagResourceCommand.d.ts +3 -3
- package/dist-types/commands/UntagResourceCommand.d.ts +2 -2
- package/dist-types/commands/UpdateAliasCommand.d.ts +4 -4
- package/dist-types/models/models_0.d.ts +64 -5
- package/dist-types/ts3.4/models/models_0.d.ts +21 -0
- package/package.json +4 -4
package/dist-cjs/index.js
CHANGED
|
@@ -33,6 +33,7 @@ __export(src_exports, {
|
|
|
33
33
|
ExportKeyMaterial: () => ExportKeyMaterial,
|
|
34
34
|
ExportKeyMaterialFilterSensitiveLog: () => ExportKeyMaterialFilterSensitiveLog,
|
|
35
35
|
ExportKeyOutputFilterSensitiveLog: () => ExportKeyOutputFilterSensitiveLog,
|
|
36
|
+
ExportTr31KeyBlockFilterSensitiveLog: () => ExportTr31KeyBlockFilterSensitiveLog,
|
|
36
37
|
ExportTr34KeyBlockFilterSensitiveLog: () => ExportTr34KeyBlockFilterSensitiveLog,
|
|
37
38
|
GetAliasCommand: () => GetAliasCommand,
|
|
38
39
|
GetKeyCommand: () => GetKeyCommand,
|
|
@@ -49,8 +50,10 @@ __export(src_exports, {
|
|
|
49
50
|
ImportTr34KeyBlockFilterSensitiveLog: () => ImportTr34KeyBlockFilterSensitiveLog,
|
|
50
51
|
InternalServerException: () => InternalServerException,
|
|
51
52
|
KeyAlgorithm: () => KeyAlgorithm,
|
|
53
|
+
KeyBlockHeadersFilterSensitiveLog: () => KeyBlockHeadersFilterSensitiveLog,
|
|
52
54
|
KeyCheckValueAlgorithm: () => KeyCheckValueAlgorithm,
|
|
53
55
|
KeyClass: () => KeyClass,
|
|
56
|
+
KeyExportability: () => KeyExportability,
|
|
54
57
|
KeyMaterialType: () => KeyMaterialType,
|
|
55
58
|
KeyOrigin: () => KeyOrigin,
|
|
56
59
|
KeyState: () => KeyState,
|
|
@@ -463,6 +466,11 @@ var WrappingKeySpec = {
|
|
|
463
466
|
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
464
467
|
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512"
|
|
465
468
|
};
|
|
469
|
+
var KeyExportability = {
|
|
470
|
+
EXPORTABLE: "EXPORTABLE",
|
|
471
|
+
NON_EXPORTABLE: "NON_EXPORTABLE",
|
|
472
|
+
SENSITIVE: "SENSITIVE"
|
|
473
|
+
};
|
|
466
474
|
var Tr34KeyBlockFormat = {
|
|
467
475
|
X9_TR34_2012: "X9_TR34_2012"
|
|
468
476
|
};
|
|
@@ -510,13 +518,22 @@ var ExportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
|
510
518
|
...obj,
|
|
511
519
|
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
512
520
|
}), "ExportKeyCryptogramFilterSensitiveLog");
|
|
521
|
+
var KeyBlockHeadersFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
522
|
+
...obj,
|
|
523
|
+
...obj.OptionalBlocks && { OptionalBlocks: import_smithy_client.SENSITIVE_STRING }
|
|
524
|
+
}), "KeyBlockHeadersFilterSensitiveLog");
|
|
525
|
+
var ExportTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
526
|
+
...obj,
|
|
527
|
+
...obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }
|
|
528
|
+
}), "ExportTr31KeyBlockFilterSensitiveLog");
|
|
513
529
|
var ExportTr34KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
514
530
|
...obj,
|
|
515
|
-
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
531
|
+
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
532
|
+
...obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }
|
|
516
533
|
}), "ExportTr34KeyBlockFilterSensitiveLog");
|
|
517
534
|
var ExportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
|
|
518
535
|
if (obj.Tr31KeyBlock !== void 0)
|
|
519
|
-
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
536
|
+
return { Tr31KeyBlock: ExportTr31KeyBlockFilterSensitiveLog(obj.Tr31KeyBlock) };
|
|
520
537
|
if (obj.Tr34KeyBlock !== void 0)
|
|
521
538
|
return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
522
539
|
if (obj.KeyCryptogram !== void 0)
|
|
@@ -1602,12 +1619,15 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(PaymentCrypto
|
|
|
1602
1619
|
KeyOrigin,
|
|
1603
1620
|
KeyState,
|
|
1604
1621
|
WrappingKeySpec,
|
|
1622
|
+
KeyExportability,
|
|
1605
1623
|
Tr34KeyBlockFormat,
|
|
1606
1624
|
ExportKeyMaterial,
|
|
1607
1625
|
WrappedKeyMaterialFormat,
|
|
1608
1626
|
KeyMaterialType,
|
|
1609
1627
|
ImportKeyMaterial,
|
|
1610
1628
|
ExportKeyCryptogramFilterSensitiveLog,
|
|
1629
|
+
KeyBlockHeadersFilterSensitiveLog,
|
|
1630
|
+
ExportTr31KeyBlockFilterSensitiveLog,
|
|
1611
1631
|
ExportTr34KeyBlockFilterSensitiveLog,
|
|
1612
1632
|
ExportKeyMaterialFilterSensitiveLog,
|
|
1613
1633
|
ExportKeyInputFilterSensitiveLog,
|
|
@@ -163,6 +163,11 @@ export const WrappingKeySpec = {
|
|
|
163
163
|
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
164
164
|
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512",
|
|
165
165
|
};
|
|
166
|
+
export const KeyExportability = {
|
|
167
|
+
EXPORTABLE: "EXPORTABLE",
|
|
168
|
+
NON_EXPORTABLE: "NON_EXPORTABLE",
|
|
169
|
+
SENSITIVE: "SENSITIVE",
|
|
170
|
+
};
|
|
166
171
|
export const Tr34KeyBlockFormat = {
|
|
167
172
|
X9_TR34_2012: "X9_TR34_2012",
|
|
168
173
|
};
|
|
@@ -210,13 +215,22 @@ export const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
|
|
|
210
215
|
...obj,
|
|
211
216
|
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
|
|
212
217
|
});
|
|
218
|
+
export const KeyBlockHeadersFilterSensitiveLog = (obj) => ({
|
|
219
|
+
...obj,
|
|
220
|
+
...(obj.OptionalBlocks && { OptionalBlocks: SENSITIVE_STRING }),
|
|
221
|
+
});
|
|
222
|
+
export const ExportTr31KeyBlockFilterSensitiveLog = (obj) => ({
|
|
223
|
+
...obj,
|
|
224
|
+
...(obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }),
|
|
225
|
+
});
|
|
213
226
|
export const ExportTr34KeyBlockFilterSensitiveLog = (obj) => ({
|
|
214
227
|
...obj,
|
|
215
228
|
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
|
|
229
|
+
...(obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }),
|
|
216
230
|
});
|
|
217
231
|
export const ExportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
218
232
|
if (obj.Tr31KeyBlock !== undefined)
|
|
219
|
-
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
233
|
+
return { Tr31KeyBlock: ExportTr31KeyBlockFilterSensitiveLog(obj.Tr31KeyBlock) };
|
|
220
234
|
if (obj.Tr34KeyBlock !== undefined)
|
|
221
235
|
return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
222
236
|
if (obj.KeyCryptogram !== undefined)
|
|
@@ -28,7 +28,7 @@ declare const CreateAliasCommand_base: {
|
|
|
28
28
|
/**
|
|
29
29
|
* <p>Creates an <i>alias</i>, or a friendly name, for an Amazon Web Services Payment Cryptography key. You can use an alias to identify a key in the console and when you call cryptographic operations such as <a href="https://docs.aws.amazon.com/payment-cryptography/latest/DataAPIReference/API_EncryptData.html">EncryptData</a> or <a href="https://docs.aws.amazon.com/payment-cryptography/latest/DataAPIReference/API_DecryptData.html">DecryptData</a>.</p>
|
|
30
30
|
* <p>You can associate the alias with any key in the same Amazon Web Services Region. Each alias is associated with only one key at a time, but a key can have multiple aliases. You can't create an alias without a key. The alias must be unique in the account and Amazon Web Services Region, but you can create another alias with the same name in a different Amazon Web Services Region.</p>
|
|
31
|
-
* <p>To change the key that's associated with the alias, call <a>UpdateAlias</a>. To delete the alias, call <a>DeleteAlias</a>. These operations don't affect the underlying key. To get the alias that you created, call <a>ListAliases</a>.</p>
|
|
31
|
+
* <p>To change the key that's associated with the alias, call <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a>. To delete the alias, call <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html">DeleteAlias</a>. These operations don't affect the underlying key. To get the alias that you created, call <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html">ListAliases</a>.</p>
|
|
32
32
|
* <p>
|
|
33
33
|
* <b>Cross-account use</b>: This operation can't be used across different Amazon Web Services accounts.</p>
|
|
34
34
|
* <p>
|
|
@@ -37,22 +37,22 @@ declare const CreateAliasCommand_base: {
|
|
|
37
37
|
* <ul>
|
|
38
38
|
* <li>
|
|
39
39
|
* <p>
|
|
40
|
-
* <a>DeleteAlias</a>
|
|
40
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html">DeleteAlias</a>
|
|
41
41
|
* </p>
|
|
42
42
|
* </li>
|
|
43
43
|
* <li>
|
|
44
44
|
* <p>
|
|
45
|
-
* <a>GetAlias</a>
|
|
45
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html">GetAlias</a>
|
|
46
46
|
* </p>
|
|
47
47
|
* </li>
|
|
48
48
|
* <li>
|
|
49
49
|
* <p>
|
|
50
|
-
* <a>ListAliases</a>
|
|
50
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html">ListAliases</a>
|
|
51
51
|
* </p>
|
|
52
52
|
* </li>
|
|
53
53
|
* <li>
|
|
54
54
|
* <p>
|
|
55
|
-
* <a>UpdateAlias</a>
|
|
55
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a>
|
|
56
56
|
* </p>
|
|
57
57
|
* </li>
|
|
58
58
|
* </ul>
|
|
@@ -38,17 +38,17 @@ declare const CreateKeyCommand_base: {
|
|
|
38
38
|
* <ul>
|
|
39
39
|
* <li>
|
|
40
40
|
* <p>
|
|
41
|
-
* <a>DeleteKey</a>
|
|
41
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html">DeleteKey</a>
|
|
42
42
|
* </p>
|
|
43
43
|
* </li>
|
|
44
44
|
* <li>
|
|
45
45
|
* <p>
|
|
46
|
-
* <a>GetKey</a>
|
|
46
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetKey.html">GetKey</a>
|
|
47
47
|
* </p>
|
|
48
48
|
* </li>
|
|
49
49
|
* <li>
|
|
50
50
|
* <p>
|
|
51
|
-
* <a>ListKeys</a>
|
|
51
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListKeys.html">ListKeys</a>
|
|
52
52
|
* </p>
|
|
53
53
|
* </li>
|
|
54
54
|
* </ul>
|
|
@@ -27,7 +27,7 @@ declare const DeleteAliasCommand_base: {
|
|
|
27
27
|
};
|
|
28
28
|
/**
|
|
29
29
|
* <p>Deletes the alias, but doesn't affect the underlying key.</p>
|
|
30
|
-
* <p>Each key can have multiple aliases. To get the aliases of all keys, use the <a>
|
|
30
|
+
* <p>Each key can have multiple aliases. To get the aliases of all keys, use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a> operation. To change the alias of a key, first use <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html">DeleteAlias</a> to delete the current alias and then use <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html">CreateAlias</a> to create a new alias. To associate an existing alias with a different key, call <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a>.</p>
|
|
31
31
|
* <p>
|
|
32
32
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
33
33
|
* <p>
|
|
@@ -36,22 +36,22 @@ declare const DeleteAliasCommand_base: {
|
|
|
36
36
|
* <ul>
|
|
37
37
|
* <li>
|
|
38
38
|
* <p>
|
|
39
|
-
* <a>CreateAlias</a>
|
|
39
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html">CreateAlias</a>
|
|
40
40
|
* </p>
|
|
41
41
|
* </li>
|
|
42
42
|
* <li>
|
|
43
43
|
* <p>
|
|
44
|
-
* <a>GetAlias</a>
|
|
44
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html">GetAlias</a>
|
|
45
45
|
* </p>
|
|
46
46
|
* </li>
|
|
47
47
|
* <li>
|
|
48
48
|
* <p>
|
|
49
|
-
* <a>ListAliases</a>
|
|
49
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html">ListAliases</a>
|
|
50
50
|
* </p>
|
|
51
51
|
* </li>
|
|
52
52
|
* <li>
|
|
53
53
|
* <p>
|
|
54
|
-
* <a>UpdateAlias</a>
|
|
54
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a>
|
|
55
55
|
* </p>
|
|
56
56
|
* </li>
|
|
57
57
|
* </ul>
|
|
@@ -28,7 +28,7 @@ declare const DeleteKeyCommand_base: {
|
|
|
28
28
|
/**
|
|
29
29
|
* <p>Deletes the key material and metadata associated with Amazon Web Services Payment Cryptography key.</p>
|
|
30
30
|
* <p>Key deletion is irreversible. After a key is deleted, you can't perform cryptographic operations using the key. For example, you can't decrypt data that was encrypted by a deleted Amazon Web Services Payment Cryptography key, and the data may become unrecoverable. Because key deletion is destructive, Amazon Web Services Payment Cryptography has a safety mechanism to prevent accidental deletion of a key. When you call this operation, Amazon Web Services Payment Cryptography disables the specified key but doesn't delete it until after a waiting period set using <code>DeleteKeyInDays</code>. The default waiting period is 7 days. During the waiting period, the <code>KeyState</code> is <code>DELETE_PENDING</code>. After the key is deleted, the <code>KeyState</code> is <code>DELETE_COMPLETE</code>.</p>
|
|
31
|
-
* <p>You should delete a key only when you are sure that you don't need to use it anymore and no other parties are utilizing this key. If you aren't sure, consider deactivating it instead by calling <a>StopKeyUsage</a>.</p>
|
|
31
|
+
* <p>You should delete a key only when you are sure that you don't need to use it anymore and no other parties are utilizing this key. If you aren't sure, consider deactivating it instead by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StopKeyUsage.html">StopKeyUsage</a>.</p>
|
|
32
32
|
* <p>
|
|
33
33
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
34
34
|
* <p>
|
|
@@ -37,17 +37,17 @@ declare const DeleteKeyCommand_base: {
|
|
|
37
37
|
* <ul>
|
|
38
38
|
* <li>
|
|
39
39
|
* <p>
|
|
40
|
-
* <a>RestoreKey</a>
|
|
40
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_RestoreKey.html">RestoreKey</a>
|
|
41
41
|
* </p>
|
|
42
42
|
* </li>
|
|
43
43
|
* <li>
|
|
44
44
|
* <p>
|
|
45
|
-
* <a>StartKeyUsage</a>
|
|
45
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html">StartKeyUsage</a>
|
|
46
46
|
* </p>
|
|
47
47
|
* </li>
|
|
48
48
|
* <li>
|
|
49
49
|
* <p>
|
|
50
|
-
* <a>StopKeyUsage</a>
|
|
50
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StopKeyUsage.html">StopKeyUsage</a>
|
|
51
51
|
* </p>
|
|
52
52
|
* </li>
|
|
53
53
|
* </ul>
|
|
@@ -31,12 +31,17 @@ declare const ExportKeyCommand_base: {
|
|
|
31
31
|
* <p>For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanism. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.</p>
|
|
32
32
|
* <p>The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import. </p>
|
|
33
33
|
* <p>You can also use <code>ExportKey</code> functionality to generate and export an IPEK (Initial Pin Encryption Key) from Amazon Web Services Payment Cryptography using either TR-31 or TR-34 export key exchange. IPEK is generated from BDK (Base Derivation Key) and <code>ExportDukptInitialKey</code> attribute KSN (<code>KeySerialNumber</code>). The generated IPEK does not persist within Amazon Web Services Payment Cryptography and has to be re-generated each time during export.</p>
|
|
34
|
+
* <p>For key exchange using TR-31 or TR-34 key blocks, you can also export optional blocks within the key block header which contain additional attribute information about the key. The <code>KeyVersion</code> within <code>KeyBlockHeaders</code> indicates the version of the key within the key block. Furthermore, <code>KeyExportability</code> within <code>KeyBlockHeaders</code> can be used to further restrict exportability of the key after export from Amazon Web Services Payment Cryptography.</p>
|
|
35
|
+
* <p>The <code>OptionalBlocks</code> contain the additional data related to the key. For information on data type that can be included within optional blocks, refer to <a href="https://webstore.ansi.org/standards/ascx9/ansix91432022">ASC X9.143-2022</a>.</p>
|
|
36
|
+
* <note>
|
|
37
|
+
* <p>Data included in key block headers is signed but transmitted in clear text. Sensitive or confidential information should not be included in optional blocks. Refer to ASC X9.143-2022 standard for information on allowed data type.</p>
|
|
38
|
+
* </note>
|
|
34
39
|
* <p>
|
|
35
40
|
* <b>To export initial keys (KEK) or IPEK using TR-34</b>
|
|
36
41
|
* </p>
|
|
37
42
|
* <p>Using this operation, you can export initial key using TR-34 asymmetric key exchange. You can only export KEK generated within Amazon Web Services Payment Cryptography. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export and KRD is the user receiving the key.</p>
|
|
38
|
-
* <p>To initiate TR-34 key export, the KRD must obtain an export token by calling <a>GetParametersForExport</a>. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days. </p>
|
|
39
|
-
* <p>Next the KRD generates a key pair for the the purpose of encrypting the KDH key and provides the public key cerificate (also known as KRD wrapping certificate) back to KDH. The KRD will also import the root cerificate chain into Amazon Web Services Payment Cryptography by calling <a>ImportKey</a> for <code>RootCertificatePublicKey</code>. The KDH, Amazon Web Services Payment Cryptography, will use the KRD wrapping cerificate to encrypt (wrap) the key under export and signs it with signing private key to generate a TR-34 WrappedKeyBlock. For more information on TR-34 key export, see section <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-export.html">Exporting symmetric keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
43
|
+
* <p>To initiate TR-34 key export, the KRD must obtain an export token by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html">GetParametersForExport</a>. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days. </p>
|
|
44
|
+
* <p>Next the KRD generates a key pair for the the purpose of encrypting the KDH key and provides the public key cerificate (also known as KRD wrapping certificate) back to KDH. The KRD will also import the root cerificate chain into Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> for <code>RootCertificatePublicKey</code>. The KDH, Amazon Web Services Payment Cryptography, will use the KRD wrapping cerificate to encrypt (wrap) the key under export and signs it with signing private key to generate a TR-34 WrappedKeyBlock. For more information on TR-34 key export, see section <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-export.html">Exporting symmetric keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>. </p>
|
|
40
45
|
* <p>Set the following parameters:</p>
|
|
41
46
|
* <ul>
|
|
42
47
|
* <li>
|
|
@@ -57,7 +62,7 @@ declare const ExportKeyCommand_base: {
|
|
|
57
62
|
* </li>
|
|
58
63
|
* <li>
|
|
59
64
|
* <p>
|
|
60
|
-
* <code>ExportToken</code>: Obtained from KDH by calling <a>GetParametersForImport</a>.</p>
|
|
65
|
+
* <code>ExportToken</code>: Obtained from KDH by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a>.</p>
|
|
61
66
|
* </li>
|
|
62
67
|
* <li>
|
|
63
68
|
* <p>
|
|
@@ -68,7 +73,7 @@ declare const ExportKeyCommand_base: {
|
|
|
68
73
|
* <p>
|
|
69
74
|
* <b>To export initial keys (KEK) or IPEK using RSA Wrap and Unwrap</b>
|
|
70
75
|
* </p>
|
|
71
|
-
* <p>Using this operation, you can export initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate export, generate an asymmetric key pair on the receiving HSM and obtain the public key certificate in PEM format (base64 encoded) for the purpose of wrapping and the root certifiate chain. Import the root certificate into Amazon Web Services Payment Cryptography by calling <a>ImportKey</a> for <code>RootCertificatePublicKey</code>.</p>
|
|
76
|
+
* <p>Using this operation, you can export initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate export, generate an asymmetric key pair on the receiving HSM and obtain the public key certificate in PEM format (base64 encoded) for the purpose of wrapping and the root certifiate chain. Import the root certificate into Amazon Web Services Payment Cryptography by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> for <code>RootCertificatePublicKey</code>.</p>
|
|
72
77
|
* <p>Next call <code>ExportKey</code> and set the following parameters:</p>
|
|
73
78
|
* <ul>
|
|
74
79
|
* <li>
|
|
@@ -88,7 +93,7 @@ declare const ExportKeyCommand_base: {
|
|
|
88
93
|
* <p>
|
|
89
94
|
* <b>To export working keys or IPEK using TR-31</b>
|
|
90
95
|
* </p>
|
|
91
|
-
* <p>Using this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use <a>CreateKey</a> or <a>ImportKey</a>. </p>
|
|
96
|
+
* <p>Using this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a> or <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. </p>
|
|
92
97
|
* <p>Set the following parameters:</p>
|
|
93
98
|
* <ul>
|
|
94
99
|
* <li>
|
|
@@ -113,12 +118,12 @@ declare const ExportKeyCommand_base: {
|
|
|
113
118
|
* <ul>
|
|
114
119
|
* <li>
|
|
115
120
|
* <p>
|
|
116
|
-
* <a>GetParametersForExport</a>
|
|
121
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html">GetParametersForExport</a>
|
|
117
122
|
* </p>
|
|
118
123
|
* </li>
|
|
119
124
|
* <li>
|
|
120
125
|
* <p>
|
|
121
|
-
* <a>ImportKey</a>
|
|
126
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>
|
|
122
127
|
* </p>
|
|
123
128
|
* </li>
|
|
124
129
|
* </ul>
|
|
@@ -132,6 +137,24 @@ declare const ExportKeyCommand_base: {
|
|
|
132
137
|
* KeyMaterial: { // ExportKeyMaterial Union: only one key present
|
|
133
138
|
* Tr31KeyBlock: { // ExportTr31KeyBlock
|
|
134
139
|
* WrappingKeyIdentifier: "STRING_VALUE", // required
|
|
140
|
+
* KeyBlockHeaders: { // KeyBlockHeaders
|
|
141
|
+
* KeyModesOfUse: { // KeyModesOfUse
|
|
142
|
+
* Encrypt: true || false,
|
|
143
|
+
* Decrypt: true || false,
|
|
144
|
+
* Wrap: true || false,
|
|
145
|
+
* Unwrap: true || false,
|
|
146
|
+
* Generate: true || false,
|
|
147
|
+
* Sign: true || false,
|
|
148
|
+
* Verify: true || false,
|
|
149
|
+
* DeriveKey: true || false,
|
|
150
|
+
* NoRestrictions: true || false,
|
|
151
|
+
* },
|
|
152
|
+
* KeyExportability: "STRING_VALUE",
|
|
153
|
+
* KeyVersion: "STRING_VALUE",
|
|
154
|
+
* OptionalBlocks: { // OptionalBlocks
|
|
155
|
+
* "<keys>": "STRING_VALUE",
|
|
156
|
+
* },
|
|
157
|
+
* },
|
|
135
158
|
* },
|
|
136
159
|
* Tr34KeyBlock: { // ExportTr34KeyBlock
|
|
137
160
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
@@ -139,6 +162,24 @@ declare const ExportKeyCommand_base: {
|
|
|
139
162
|
* ExportToken: "STRING_VALUE", // required
|
|
140
163
|
* KeyBlockFormat: "STRING_VALUE", // required
|
|
141
164
|
* RandomNonce: "STRING_VALUE",
|
|
165
|
+
* KeyBlockHeaders: {
|
|
166
|
+
* KeyModesOfUse: {
|
|
167
|
+
* Encrypt: true || false,
|
|
168
|
+
* Decrypt: true || false,
|
|
169
|
+
* Wrap: true || false,
|
|
170
|
+
* Unwrap: true || false,
|
|
171
|
+
* Generate: true || false,
|
|
172
|
+
* Sign: true || false,
|
|
173
|
+
* Verify: true || false,
|
|
174
|
+
* DeriveKey: true || false,
|
|
175
|
+
* NoRestrictions: true || false,
|
|
176
|
+
* },
|
|
177
|
+
* KeyExportability: "STRING_VALUE",
|
|
178
|
+
* KeyVersion: "STRING_VALUE",
|
|
179
|
+
* OptionalBlocks: {
|
|
180
|
+
* "<keys>": "STRING_VALUE",
|
|
181
|
+
* },
|
|
182
|
+
* },
|
|
142
183
|
* },
|
|
143
184
|
* KeyCryptogram: { // ExportKeyCryptogram
|
|
144
185
|
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
@@ -35,22 +35,22 @@ declare const GetAliasCommand_base: {
|
|
|
35
35
|
* <ul>
|
|
36
36
|
* <li>
|
|
37
37
|
* <p>
|
|
38
|
-
* <a>CreateAlias</a>
|
|
38
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html">CreateAlias</a>
|
|
39
39
|
* </p>
|
|
40
40
|
* </li>
|
|
41
41
|
* <li>
|
|
42
42
|
* <p>
|
|
43
|
-
* <a>DeleteAlias</a>
|
|
43
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html">DeleteAlias</a>
|
|
44
44
|
* </p>
|
|
45
45
|
* </li>
|
|
46
46
|
* <li>
|
|
47
47
|
* <p>
|
|
48
|
-
* <a>ListAliases</a>
|
|
48
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html">ListAliases</a>
|
|
49
49
|
* </p>
|
|
50
50
|
* </li>
|
|
51
51
|
* <li>
|
|
52
52
|
* <p>
|
|
53
|
-
* <a>UpdateAlias</a>
|
|
53
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a>
|
|
54
54
|
* </p>
|
|
55
55
|
* </li>
|
|
56
56
|
* </ul>
|
|
@@ -35,17 +35,17 @@ declare const GetKeyCommand_base: {
|
|
|
35
35
|
* <ul>
|
|
36
36
|
* <li>
|
|
37
37
|
* <p>
|
|
38
|
-
* <a>CreateKey</a>
|
|
38
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>
|
|
39
39
|
* </p>
|
|
40
40
|
* </li>
|
|
41
41
|
* <li>
|
|
42
42
|
* <p>
|
|
43
|
-
* <a>DeleteKey</a>
|
|
43
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html">DeleteKey</a>
|
|
44
44
|
* </p>
|
|
45
45
|
* </li>
|
|
46
46
|
* <li>
|
|
47
47
|
* <p>
|
|
48
|
-
* <a>ListKeys</a>
|
|
48
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListKeys.html">ListKeys</a>
|
|
49
49
|
* </p>
|
|
50
50
|
* </li>
|
|
51
51
|
* </ul>
|
|
@@ -27,7 +27,7 @@ declare const GetParametersForExportCommand_base: {
|
|
|
27
27
|
};
|
|
28
28
|
/**
|
|
29
29
|
* <p>Gets the export token and the signing key certificate to initiate a TR-34 key export from Amazon Web Services Payment Cryptography.</p>
|
|
30
|
-
* <p>The signing key certificate signs the wrapped key under export within the TR-34 key payload. The export token and signing key certificate must be in place and operational before calling <a>ExportKey</a>. The export token expires in 7 days. You can use the same export token to export multiple keys from your service account.</p>
|
|
30
|
+
* <p>The signing key certificate signs the wrapped key under export within the TR-34 key payload. The export token and signing key certificate must be in place and operational before calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a>. The export token expires in 7 days. You can use the same export token to export multiple keys from your service account.</p>
|
|
31
31
|
* <p>
|
|
32
32
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
33
33
|
* <p>
|
|
@@ -36,12 +36,12 @@ declare const GetParametersForExportCommand_base: {
|
|
|
36
36
|
* <ul>
|
|
37
37
|
* <li>
|
|
38
38
|
* <p>
|
|
39
|
-
* <a>ExportKey</a>
|
|
39
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a>
|
|
40
40
|
* </p>
|
|
41
41
|
* </li>
|
|
42
42
|
* <li>
|
|
43
43
|
* <p>
|
|
44
|
-
* <a>GetParametersForImport</a>
|
|
44
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a>
|
|
45
45
|
* </p>
|
|
46
46
|
* </li>
|
|
47
47
|
* </ul>
|
|
@@ -27,7 +27,7 @@ declare const GetParametersForImportCommand_base: {
|
|
|
27
27
|
};
|
|
28
28
|
/**
|
|
29
29
|
* <p>Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.</p>
|
|
30
|
-
* <p>The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling <a>ImportKey</a>. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.</p>
|
|
30
|
+
* <p>The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.</p>
|
|
31
31
|
* <p>
|
|
32
32
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
33
33
|
* <p>
|
|
@@ -36,12 +36,12 @@ declare const GetParametersForImportCommand_base: {
|
|
|
36
36
|
* <ul>
|
|
37
37
|
* <li>
|
|
38
38
|
* <p>
|
|
39
|
-
* <a>GetParametersForExport</a>
|
|
39
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html">GetParametersForExport</a>
|
|
40
40
|
* </p>
|
|
41
41
|
* </li>
|
|
42
42
|
* <li>
|
|
43
43
|
* <p>
|
|
44
|
-
* <a>ImportKey</a>
|
|
44
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>
|
|
45
45
|
* </p>
|
|
46
46
|
* </li>
|
|
47
47
|
* </ul>
|
|
@@ -93,7 +93,7 @@ declare const ImportKeyCommand_base: {
|
|
|
93
93
|
* <b>To import initial keys (KEK or ZMK or similar) using TR-34</b>
|
|
94
94
|
* </p>
|
|
95
95
|
* <p>Using this operation, you can import initial key using TR-34 asymmetric key exchange. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During the key import process, KDH is the user who initiates the key import and KRD is Amazon Web Services Payment Cryptography who receives the key.</p>
|
|
96
|
-
* <p>To initiate TR-34 key import, the KDH must obtain an import token by calling <a>GetParametersForImport</a>. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.</p>
|
|
96
|
+
* <p>To initiate TR-34 key import, the KDH must obtain an import token by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a>. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.</p>
|
|
97
97
|
* <p>Next the KDH generates a key pair for the purpose of signing the encrypted KDH key and provides the public certificate of the signing key to Amazon Web Services Payment Cryptography. The KDH will also need to import the root certificate chain of the KDH signing certificate by calling <code>ImportKey</code> for <code>RootCertificatePublicKey</code>. For more information on TR-34 key import, see section <a href="https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-import.html">Importing symmetric keys</a> in the <i>Amazon Web Services Payment Cryptography User Guide</i>.</p>
|
|
98
98
|
* <p>Set the following parameters:</p>
|
|
99
99
|
* <ul>
|
|
@@ -107,7 +107,7 @@ declare const ImportKeyCommand_base: {
|
|
|
107
107
|
* </li>
|
|
108
108
|
* <li>
|
|
109
109
|
* <p>
|
|
110
|
-
* <code>ImportToken</code>: Obtained from KRD by calling <a>GetParametersForImport</a>.</p>
|
|
110
|
+
* <code>ImportToken</code>: Obtained from KRD by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a>.</p>
|
|
111
111
|
* </li>
|
|
112
112
|
* <li>
|
|
113
113
|
* <p>
|
|
@@ -121,12 +121,12 @@ declare const ImportKeyCommand_base: {
|
|
|
121
121
|
* <p>
|
|
122
122
|
* <b>To import initial keys (KEK or ZMK or similar) using RSA Wrap and Unwrap</b>
|
|
123
123
|
* </p>
|
|
124
|
-
* <p>Using this operation, you can import initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate import, call <a>GetParametersForImport</a> with <code>KeyMaterial</code> set to <code>KEY_CRYPTOGRAM</code> to generate an import token. This operation also generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate in PEM format (base64 encoded) and its root certificate chain. The import token and associated KRD wrapping certificate expires after 7 days. </p>
|
|
124
|
+
* <p>Using this operation, you can import initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate import, call <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a> with <code>KeyMaterial</code> set to <code>KEY_CRYPTOGRAM</code> to generate an import token. This operation also generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate in PEM format (base64 encoded) and its root certificate chain. The import token and associated KRD wrapping certificate expires after 7 days. </p>
|
|
125
125
|
* <p>You must trust and install the wrapping certificate and its certificate chain on the sending HSM and use it to wrap the key under export for WrappedKeyCryptogram generation. Next call <code>ImportKey</code> with <code>KeyMaterial</code> set to <code>KEY_CRYPTOGRAM</code> and provide the <code>ImportToken</code> and <code>KeyAttributes</code> for the key under import.</p>
|
|
126
126
|
* <p>
|
|
127
127
|
* <b>To import working keys using TR-31</b>
|
|
128
128
|
* </p>
|
|
129
|
-
* <p>Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using <a>CreateKey</a>. To initiate a TR-31 key import, set the following parameters:</p>
|
|
129
|
+
* <p>Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>. To initiate a TR-31 key import, set the following parameters:</p>
|
|
130
130
|
* <ul>
|
|
131
131
|
* <li>
|
|
132
132
|
* <p>
|
|
@@ -149,12 +149,12 @@ declare const ImportKeyCommand_base: {
|
|
|
149
149
|
* <ul>
|
|
150
150
|
* <li>
|
|
151
151
|
* <p>
|
|
152
|
-
* <a>ExportKey</a>
|
|
152
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a>
|
|
153
153
|
* </p>
|
|
154
154
|
* </li>
|
|
155
155
|
* <li>
|
|
156
156
|
* <p>
|
|
157
|
-
* <a>GetParametersForImport</a>
|
|
157
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a>
|
|
158
158
|
* </p>
|
|
159
159
|
* </li>
|
|
160
160
|
* </ul>
|
|
@@ -37,22 +37,22 @@ declare const ListAliasesCommand_base: {
|
|
|
37
37
|
* <ul>
|
|
38
38
|
* <li>
|
|
39
39
|
* <p>
|
|
40
|
-
* <a>CreateAlias</a>
|
|
40
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html">CreateAlias</a>
|
|
41
41
|
* </p>
|
|
42
42
|
* </li>
|
|
43
43
|
* <li>
|
|
44
44
|
* <p>
|
|
45
|
-
* <a>DeleteAlias</a>
|
|
45
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html">DeleteAlias</a>
|
|
46
46
|
* </p>
|
|
47
47
|
* </li>
|
|
48
48
|
* <li>
|
|
49
49
|
* <p>
|
|
50
|
-
* <a>GetAlias</a>
|
|
50
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html">GetAlias</a>
|
|
51
51
|
* </p>
|
|
52
52
|
* </li>
|
|
53
53
|
* <li>
|
|
54
54
|
* <p>
|
|
55
|
-
* <a>UpdateAlias</a>
|
|
55
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UpdateAlias.html">UpdateAlias</a>
|
|
56
56
|
* </p>
|
|
57
57
|
* </li>
|
|
58
58
|
* </ul>
|
|
@@ -38,17 +38,17 @@ declare const ListKeysCommand_base: {
|
|
|
38
38
|
* <ul>
|
|
39
39
|
* <li>
|
|
40
40
|
* <p>
|
|
41
|
-
* <a>CreateKey</a>
|
|
41
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>
|
|
42
42
|
* </p>
|
|
43
43
|
* </li>
|
|
44
44
|
* <li>
|
|
45
45
|
* <p>
|
|
46
|
-
* <a>DeleteKey</a>
|
|
46
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html">DeleteKey</a>
|
|
47
47
|
* </p>
|
|
48
48
|
* </li>
|
|
49
49
|
* <li>
|
|
50
50
|
* <p>
|
|
51
|
-
* <a>GetKey</a>
|
|
51
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetKey.html">GetKey</a>
|
|
52
52
|
* </p>
|
|
53
53
|
* </li>
|
|
54
54
|
* </ul>
|
|
@@ -38,12 +38,12 @@ declare const ListTagsForResourceCommand_base: {
|
|
|
38
38
|
* <ul>
|
|
39
39
|
* <li>
|
|
40
40
|
* <p>
|
|
41
|
-
* <a>TagResource</a>
|
|
41
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html">TagResource</a>
|
|
42
42
|
* </p>
|
|
43
43
|
* </li>
|
|
44
44
|
* <li>
|
|
45
45
|
* <p>
|
|
46
|
-
* <a>UntagResource</a>
|
|
46
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UntagResource.html">UntagResource</a>
|
|
47
47
|
* </p>
|
|
48
48
|
* </li>
|
|
49
49
|
* </ul>
|
|
@@ -37,17 +37,17 @@ declare const RestoreKeyCommand_base: {
|
|
|
37
37
|
* <ul>
|
|
38
38
|
* <li>
|
|
39
39
|
* <p>
|
|
40
|
-
* <a>DeleteKey</a>
|
|
40
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html">DeleteKey</a>
|
|
41
41
|
* </p>
|
|
42
42
|
* </li>
|
|
43
43
|
* <li>
|
|
44
44
|
* <p>
|
|
45
|
-
* <a>StartKeyUsage</a>
|
|
45
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html">StartKeyUsage</a>
|
|
46
46
|
* </p>
|
|
47
47
|
* </li>
|
|
48
48
|
* <li>
|
|
49
49
|
* <p>
|
|
50
|
-
* <a>StopKeyUsage</a>
|
|
50
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StopKeyUsage.html">StopKeyUsage</a>
|
|
51
51
|
* </p>
|
|
52
52
|
* </li>
|
|
53
53
|
* </ul>
|
|
@@ -27,7 +27,7 @@ declare const StopKeyUsageCommand_base: {
|
|
|
27
27
|
};
|
|
28
28
|
/**
|
|
29
29
|
* <p>Disables an Amazon Web Services Payment Cryptography key, which makes it inactive within Amazon Web Services Payment Cryptography.</p>
|
|
30
|
-
* <p>You can use this operation instead of <a>DeleteKey</a> to deactivate a key. You can enable the key in the future by calling <a>StartKeyUsage</a>.</p>
|
|
30
|
+
* <p>You can use this operation instead of <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html">DeleteKey</a> to deactivate a key. You can enable the key in the future by calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html">StartKeyUsage</a>.</p>
|
|
31
31
|
* <p>
|
|
32
32
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
33
33
|
* <p>
|
|
@@ -36,12 +36,12 @@ declare const StopKeyUsageCommand_base: {
|
|
|
36
36
|
* <ul>
|
|
37
37
|
* <li>
|
|
38
38
|
* <p>
|
|
39
|
-
* <a>DeleteKey</a>
|
|
39
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteKey.html">DeleteKey</a>
|
|
40
40
|
* </p>
|
|
41
41
|
* </li>
|
|
42
42
|
* <li>
|
|
43
43
|
* <p>
|
|
44
|
-
* <a>StartKeyUsage</a>
|
|
44
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_StartKeyUsage.html">StartKeyUsage</a>
|
|
45
45
|
* </p>
|
|
46
46
|
* </li>
|
|
47
47
|
* </ul>
|
|
@@ -30,7 +30,7 @@ declare const TagResourceCommand_base: {
|
|
|
30
30
|
* <note>
|
|
31
31
|
* <p>Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.</p>
|
|
32
32
|
* </note>
|
|
33
|
-
* <p>Each tag consists of a tag key and a tag value, both of which are case-sensitive strings. The tag value can be an empty (null) string. To add a tag, specify a new tag key and a tag value. To edit a tag, specify an existing tag key and a new tag value. You can also add tags to an Amazon Web Services Payment Cryptography key when you create it with <a>CreateKey</a>.</p>
|
|
33
|
+
* <p>Each tag consists of a tag key and a tag value, both of which are case-sensitive strings. The tag value can be an empty (null) string. To add a tag, specify a new tag key and a tag value. To edit a tag, specify an existing tag key and a new tag value. You can also add tags to an Amazon Web Services Payment Cryptography key when you create it with <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateKey.html">CreateKey</a>.</p>
|
|
34
34
|
* <p>
|
|
35
35
|
* <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p>
|
|
36
36
|
* <p>
|
|
@@ -39,12 +39,12 @@ declare const TagResourceCommand_base: {
|
|
|
39
39
|
* <ul>
|
|
40
40
|
* <li>
|
|
41
41
|
* <p>
|
|
42
|
-
* <a>ListTagsForResource</a>
|
|
42
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListTagsForResource.html">ListTagsForResource</a>
|
|
43
43
|
* </p>
|
|
44
44
|
* </li>
|
|
45
45
|
* <li>
|
|
46
46
|
* <p>
|
|
47
|
-
* <a>UntagResource</a>
|
|
47
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_UntagResource.html">UntagResource</a>
|
|
48
48
|
* </p>
|
|
49
49
|
* </li>
|
|
50
50
|
* </ul>
|
|
@@ -38,12 +38,12 @@ declare const UntagResourceCommand_base: {
|
|
|
38
38
|
* <ul>
|
|
39
39
|
* <li>
|
|
40
40
|
* <p>
|
|
41
|
-
* <a>ListTagsForResource</a>
|
|
41
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListTagsForResource.html">ListTagsForResource</a>
|
|
42
42
|
* </p>
|
|
43
43
|
* </li>
|
|
44
44
|
* <li>
|
|
45
45
|
* <p>
|
|
46
|
-
* <a>TagResource</a>
|
|
46
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html">TagResource</a>
|
|
47
47
|
* </p>
|
|
48
48
|
* </li>
|
|
49
49
|
* </ul>
|
|
@@ -35,22 +35,22 @@ declare const UpdateAliasCommand_base: {
|
|
|
35
35
|
* <ul>
|
|
36
36
|
* <li>
|
|
37
37
|
* <p>
|
|
38
|
-
* <a>CreateAlias</a>
|
|
38
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_CreateAlias.html">CreateAlias</a>
|
|
39
39
|
* </p>
|
|
40
40
|
* </li>
|
|
41
41
|
* <li>
|
|
42
42
|
* <p>
|
|
43
|
-
* <a>DeleteAlias</a>
|
|
43
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_DeleteAlias.html">DeleteAlias</a>
|
|
44
44
|
* </p>
|
|
45
45
|
* </li>
|
|
46
46
|
* <li>
|
|
47
47
|
* <p>
|
|
48
|
-
* <a>GetAlias</a>
|
|
48
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetAlias.html">GetAlias</a>
|
|
49
49
|
* </p>
|
|
50
50
|
* </li>
|
|
51
51
|
* <li>
|
|
52
52
|
* <p>
|
|
53
|
-
* <a>ListAliases</a>
|
|
53
|
+
* <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListAliases.html">ListAliases</a>
|
|
54
54
|
* </p>
|
|
55
55
|
* </li>
|
|
56
56
|
* </ul>
|
|
@@ -443,7 +443,7 @@ export interface CreateKeyInput {
|
|
|
443
443
|
*/
|
|
444
444
|
Enabled?: boolean;
|
|
445
445
|
/**
|
|
446
|
-
* <p>Assigns one or more tags to the Amazon Web Services Payment Cryptography key. Use this parameter to tag a key when it is created. To tag an existing Amazon Web Services Payment Cryptography key, use the <a>TagResource</a> operation.</p>
|
|
446
|
+
* <p>Assigns one or more tags to the Amazon Web Services Payment Cryptography key. Use this parameter to tag a key when it is created. To tag an existing Amazon Web Services Payment Cryptography key, use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html">TagResource</a> operation.</p>
|
|
447
447
|
* <p>Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You can't have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key. </p>
|
|
448
448
|
* <important>
|
|
449
449
|
* <p>Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.</p>
|
|
@@ -650,6 +650,47 @@ export interface ExportKeyCryptogram {
|
|
|
650
650
|
*/
|
|
651
651
|
WrappingSpec?: WrappingKeySpec;
|
|
652
652
|
}
|
|
653
|
+
/**
|
|
654
|
+
* @public
|
|
655
|
+
* @enum
|
|
656
|
+
*/
|
|
657
|
+
export declare const KeyExportability: {
|
|
658
|
+
readonly EXPORTABLE: "EXPORTABLE";
|
|
659
|
+
readonly NON_EXPORTABLE: "NON_EXPORTABLE";
|
|
660
|
+
readonly SENSITIVE: "SENSITIVE";
|
|
661
|
+
};
|
|
662
|
+
/**
|
|
663
|
+
* @public
|
|
664
|
+
*/
|
|
665
|
+
export type KeyExportability = (typeof KeyExportability)[keyof typeof KeyExportability];
|
|
666
|
+
/**
|
|
667
|
+
* <p>Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.</p>
|
|
668
|
+
* @public
|
|
669
|
+
*/
|
|
670
|
+
export interface KeyBlockHeaders {
|
|
671
|
+
/**
|
|
672
|
+
* <p>The list of cryptographic operations that you can perform using the key. The modes of use are defined in section A.5.3 of the TR-31 spec.</p>
|
|
673
|
+
* @public
|
|
674
|
+
*/
|
|
675
|
+
KeyModesOfUse?: KeyModesOfUse;
|
|
676
|
+
/**
|
|
677
|
+
* <p>Specifies subsequent exportability of the key within the key block after it is received by the receiving party. It can be used to further restrict exportability of the key after export from Amazon Web Services Payment Cryptography.</p>
|
|
678
|
+
* <p>When set to <code>EXPORTABLE</code>, the key can be subsequently exported by the receiver under a KEK using TR-31 or TR-34 key block export only. When set to <code>NON_EXPORTABLE</code>, the key cannot be subsequently exported by the receiver. When set to <code>SENSITIVE</code>, the key can be exported by the receiver under a KEK using TR-31, TR-34, RSA wrap and unwrap cryptogram or using a symmetric cryptogram key export method. For further information refer to <a href="https://webstore.ansi.org/standards/ascx9/ansix91432022">ANSI X9.143-2022</a>.</p>
|
|
679
|
+
* @public
|
|
680
|
+
*/
|
|
681
|
+
KeyExportability?: KeyExportability;
|
|
682
|
+
/**
|
|
683
|
+
* <p>Parameter used to indicate the version of the key carried in the key block or indicate the value carried in the key block is a component of a key.</p>
|
|
684
|
+
* @public
|
|
685
|
+
*/
|
|
686
|
+
KeyVersion?: string;
|
|
687
|
+
/**
|
|
688
|
+
* <p>Parameter used to indicate the type of optional data in key block headers. Refer to <a href="https://webstore.ansi.org/standards/ascx9/ansix91432022">ANSI X9.143-2022</a> for information on allowed data type for optional blocks.</p>
|
|
689
|
+
* <p>Optional block character limit is 112 characters. For each optional block, 2 characters are reserved for optional block ID and 2 characters reserved for optional block length. More than one optional blocks can be included as long as the combined length does not increase 112 characters.</p>
|
|
690
|
+
* @public
|
|
691
|
+
*/
|
|
692
|
+
OptionalBlocks?: Record<string, string>;
|
|
693
|
+
}
|
|
653
694
|
/**
|
|
654
695
|
* <p>Parameter information for key material export using symmetric TR-31 key exchange method.</p>
|
|
655
696
|
* @public
|
|
@@ -660,6 +701,11 @@ export interface ExportTr31KeyBlock {
|
|
|
660
701
|
* @public
|
|
661
702
|
*/
|
|
662
703
|
WrappingKeyIdentifier: string | undefined;
|
|
704
|
+
/**
|
|
705
|
+
* <p>Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.</p>
|
|
706
|
+
* @public
|
|
707
|
+
*/
|
|
708
|
+
KeyBlockHeaders?: KeyBlockHeaders;
|
|
663
709
|
}
|
|
664
710
|
/**
|
|
665
711
|
* @public
|
|
@@ -688,7 +734,7 @@ export interface ExportTr34KeyBlock {
|
|
|
688
734
|
*/
|
|
689
735
|
WrappingKeyCertificate: string | undefined;
|
|
690
736
|
/**
|
|
691
|
-
* <p>The export token to initiate key export from Amazon Web Services Payment Cryptography. It also contains the signing key certificate that will sign the wrapped key during TR-34 key block generation. Call <a>GetParametersForExport</a> to receive an export token. It expires after 7 days. You can use the same export token to export multiple keys from the same service account.</p>
|
|
737
|
+
* <p>The export token to initiate key export from Amazon Web Services Payment Cryptography. It also contains the signing key certificate that will sign the wrapped key during TR-34 key block generation. Call <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html">GetParametersForExport</a> to receive an export token. It expires after 7 days. You can use the same export token to export multiple keys from the same service account.</p>
|
|
692
738
|
* @public
|
|
693
739
|
*/
|
|
694
740
|
ExportToken: string | undefined;
|
|
@@ -702,6 +748,11 @@ export interface ExportTr34KeyBlock {
|
|
|
702
748
|
* @public
|
|
703
749
|
*/
|
|
704
750
|
RandomNonce?: string;
|
|
751
|
+
/**
|
|
752
|
+
* <p>Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.</p>
|
|
753
|
+
* @public
|
|
754
|
+
*/
|
|
755
|
+
KeyBlockHeaders?: KeyBlockHeaders;
|
|
705
756
|
}
|
|
706
757
|
/**
|
|
707
758
|
* <p>Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.</p>
|
|
@@ -1217,7 +1268,7 @@ export interface ImportKeyInput {
|
|
|
1217
1268
|
*/
|
|
1218
1269
|
Enabled?: boolean;
|
|
1219
1270
|
/**
|
|
1220
|
-
* <p>Assigns one or more tags to the Amazon Web Services Payment Cryptography key. Use this parameter to tag a key when it is imported. To tag an existing Amazon Web Services Payment Cryptography key, use the <a>TagResource</a> operation.</p>
|
|
1271
|
+
* <p>Assigns one or more tags to the Amazon Web Services Payment Cryptography key. Use this parameter to tag a key when it is imported. To tag an existing Amazon Web Services Payment Cryptography key, use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html">TagResource</a> operation.</p>
|
|
1221
1272
|
* <p>Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You can't have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key. If you specify an existing tag key with a different tag value, Amazon Web Services Payment Cryptography replaces the current tag value with the specified one.</p>
|
|
1222
1273
|
* <important>
|
|
1223
1274
|
* <p>Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.</p>
|
|
@@ -1421,7 +1472,7 @@ export interface TagResourceInput {
|
|
|
1421
1472
|
* <important>
|
|
1422
1473
|
* <p>Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.</p>
|
|
1423
1474
|
* </important>
|
|
1424
|
-
* <p>To use this parameter, you must have <a>TagResource</a> permission in an IAM policy.</p>
|
|
1475
|
+
* <p>To use this parameter, you must have <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_TagResource.html">TagResource</a> permission in an IAM policy.</p>
|
|
1425
1476
|
* <important>
|
|
1426
1477
|
* <p>Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.</p>
|
|
1427
1478
|
* </important>
|
|
@@ -1445,7 +1496,7 @@ export interface UntagResourceInput {
|
|
|
1445
1496
|
ResourceArn: string | undefined;
|
|
1446
1497
|
/**
|
|
1447
1498
|
* <p>One or more tag keys. Don't include the tag values.</p>
|
|
1448
|
-
* <p>If the Amazon Web Services Payment Cryptography key doesn't have the specified tag key, Amazon Web Services Payment Cryptography doesn't throw an exception or return a response. To confirm that the operation succeeded, use the <a>ListTagsForResource</a> operation.</p>
|
|
1499
|
+
* <p>If the Amazon Web Services Payment Cryptography key doesn't have the specified tag key, Amazon Web Services Payment Cryptography doesn't throw an exception or return a response. To confirm that the operation succeeded, use the <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ListTagsForResource.html">ListTagsForResource</a> operation.</p>
|
|
1449
1500
|
* @public
|
|
1450
1501
|
*/
|
|
1451
1502
|
TagKeys: string[] | undefined;
|
|
@@ -1459,6 +1510,14 @@ export interface UntagResourceOutput {
|
|
|
1459
1510
|
* @internal
|
|
1460
1511
|
*/
|
|
1461
1512
|
export declare const ExportKeyCryptogramFilterSensitiveLog: (obj: ExportKeyCryptogram) => any;
|
|
1513
|
+
/**
|
|
1514
|
+
* @internal
|
|
1515
|
+
*/
|
|
1516
|
+
export declare const KeyBlockHeadersFilterSensitiveLog: (obj: KeyBlockHeaders) => any;
|
|
1517
|
+
/**
|
|
1518
|
+
* @internal
|
|
1519
|
+
*/
|
|
1520
|
+
export declare const ExportTr31KeyBlockFilterSensitiveLog: (obj: ExportTr31KeyBlock) => any;
|
|
1462
1521
|
/**
|
|
1463
1522
|
* @internal
|
|
1464
1523
|
*/
|
|
@@ -231,8 +231,22 @@ export interface ExportKeyCryptogram {
|
|
|
231
231
|
WrappingKeyCertificate: string | undefined;
|
|
232
232
|
WrappingSpec?: WrappingKeySpec;
|
|
233
233
|
}
|
|
234
|
+
export declare const KeyExportability: {
|
|
235
|
+
readonly EXPORTABLE: "EXPORTABLE";
|
|
236
|
+
readonly NON_EXPORTABLE: "NON_EXPORTABLE";
|
|
237
|
+
readonly SENSITIVE: "SENSITIVE";
|
|
238
|
+
};
|
|
239
|
+
export type KeyExportability =
|
|
240
|
+
(typeof KeyExportability)[keyof typeof KeyExportability];
|
|
241
|
+
export interface KeyBlockHeaders {
|
|
242
|
+
KeyModesOfUse?: KeyModesOfUse;
|
|
243
|
+
KeyExportability?: KeyExportability;
|
|
244
|
+
KeyVersion?: string;
|
|
245
|
+
OptionalBlocks?: Record<string, string>;
|
|
246
|
+
}
|
|
234
247
|
export interface ExportTr31KeyBlock {
|
|
235
248
|
WrappingKeyIdentifier: string | undefined;
|
|
249
|
+
KeyBlockHeaders?: KeyBlockHeaders;
|
|
236
250
|
}
|
|
237
251
|
export declare const Tr34KeyBlockFormat: {
|
|
238
252
|
readonly X9_TR34_2012: "X9_TR34_2012";
|
|
@@ -245,6 +259,7 @@ export interface ExportTr34KeyBlock {
|
|
|
245
259
|
ExportToken: string | undefined;
|
|
246
260
|
KeyBlockFormat: Tr34KeyBlockFormat | undefined;
|
|
247
261
|
RandomNonce?: string;
|
|
262
|
+
KeyBlockHeaders?: KeyBlockHeaders;
|
|
248
263
|
}
|
|
249
264
|
export type ExportKeyMaterial =
|
|
250
265
|
| ExportKeyMaterial.KeyCryptogramMember
|
|
@@ -510,6 +525,12 @@ export interface UntagResourceOutput {}
|
|
|
510
525
|
export declare const ExportKeyCryptogramFilterSensitiveLog: (
|
|
511
526
|
obj: ExportKeyCryptogram
|
|
512
527
|
) => any;
|
|
528
|
+
export declare const KeyBlockHeadersFilterSensitiveLog: (
|
|
529
|
+
obj: KeyBlockHeaders
|
|
530
|
+
) => any;
|
|
531
|
+
export declare const ExportTr31KeyBlockFilterSensitiveLog: (
|
|
532
|
+
obj: ExportTr31KeyBlock
|
|
533
|
+
) => any;
|
|
513
534
|
export declare const ExportTr34KeyBlockFilterSensitiveLog: (
|
|
514
535
|
obj: ExportTr34KeyBlock
|
|
515
536
|
) => any;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-payment-cryptography",
|
|
3
3
|
"description": "AWS SDK for JavaScript Payment Cryptography Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.560.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-payment-cryptography",
|
|
@@ -20,9 +20,9 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/client-sts": "3.
|
|
24
|
-
"@aws-sdk/core": "3.
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
23
|
+
"@aws-sdk/client-sts": "3.556.0",
|
|
24
|
+
"@aws-sdk/core": "3.556.0",
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.556.0",
|
|
26
26
|
"@aws-sdk/middleware-host-header": "3.535.0",
|
|
27
27
|
"@aws-sdk/middleware-logger": "3.535.0",
|
|
28
28
|
"@aws-sdk/middleware-recursion-detection": "3.535.0",
|