@aws-sdk/client-payment-cryptography 3.775.0 → 3.778.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -27,6 +27,9 @@ __export(index_exports, {
27
27
  CreateKeyCommand: () => CreateKeyCommand,
28
28
  DeleteAliasCommand: () => DeleteAliasCommand,
29
29
  DeleteKeyCommand: () => DeleteKeyCommand,
30
+ DeriveKeyUsage: () => DeriveKeyUsage,
31
+ DiffieHellmanDerivationData: () => DiffieHellmanDerivationData,
32
+ ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog: () => ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
30
33
  ExportKeyCommand: () => ExportKeyCommand,
31
34
  ExportKeyCryptogramFilterSensitiveLog: () => ExportKeyCryptogramFilterSensitiveLog,
32
35
  ExportKeyInputFilterSensitiveLog: () => ExportKeyInputFilterSensitiveLog,
@@ -43,6 +46,7 @@ __export(index_exports, {
43
46
  GetParametersForImportOutputFilterSensitiveLog: () => GetParametersForImportOutputFilterSensitiveLog,
44
47
  GetPublicKeyCertificateCommand: () => GetPublicKeyCertificateCommand,
45
48
  GetPublicKeyCertificateOutputFilterSensitiveLog: () => GetPublicKeyCertificateOutputFilterSensitiveLog,
49
+ ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog: () => ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
46
50
  ImportKeyCommand: () => ImportKeyCommand,
47
51
  ImportKeyCryptogramFilterSensitiveLog: () => ImportKeyCryptogramFilterSensitiveLog,
48
52
  ImportKeyInputFilterSensitiveLog: () => ImportKeyInputFilterSensitiveLog,
@@ -55,6 +59,8 @@ __export(index_exports, {
55
59
  KeyBlockHeadersFilterSensitiveLog: () => KeyBlockHeadersFilterSensitiveLog,
56
60
  KeyCheckValueAlgorithm: () => KeyCheckValueAlgorithm,
57
61
  KeyClass: () => KeyClass,
62
+ KeyDerivationFunction: () => KeyDerivationFunction,
63
+ KeyDerivationHashAlgorithm: () => KeyDerivationHashAlgorithm,
58
64
  KeyExportability: () => KeyExportability,
59
65
  KeyMaterialType: () => KeyMaterialType,
60
66
  KeyOrigin: () => KeyOrigin,
@@ -73,6 +79,7 @@ __export(index_exports, {
73
79
  ServiceUnavailableException: () => ServiceUnavailableException,
74
80
  StartKeyUsageCommand: () => StartKeyUsageCommand,
75
81
  StopKeyUsageCommand: () => StopKeyUsageCommand,
82
+ SymmetricKeyAlgorithm: () => SymmetricKeyAlgorithm,
76
83
  TagResourceCommand: () => TagResourceCommand,
77
84
  ThrottlingException: () => ThrottlingException,
78
85
  Tr34KeyBlockFormat: () => Tr34KeyBlockFormat,
@@ -427,12 +434,34 @@ var ValidationException = class _ValidationException extends PaymentCryptography
427
434
  this.Message = opts.Message;
428
435
  }
429
436
  };
437
+ var DeriveKeyUsage = {
438
+ TR31_B0_BASE_DERIVATION_KEY: "TR31_B0_BASE_DERIVATION_KEY",
439
+ TR31_C0_CARD_VERIFICATION_KEY: "TR31_C0_CARD_VERIFICATION_KEY",
440
+ TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY: "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY",
441
+ TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS: "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS",
442
+ TR31_E1_EMV_MKEY_CONFIDENTIALITY: "TR31_E1_EMV_MKEY_CONFIDENTIALITY",
443
+ TR31_E2_EMV_MKEY_INTEGRITY: "TR31_E2_EMV_MKEY_INTEGRITY",
444
+ TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS: "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS",
445
+ TR31_E5_EMV_MKEY_CARD_PERSONALIZATION: "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION",
446
+ TR31_E6_EMV_MKEY_OTHER: "TR31_E6_EMV_MKEY_OTHER",
447
+ TR31_K0_KEY_ENCRYPTION_KEY: "TR31_K0_KEY_ENCRYPTION_KEY",
448
+ TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
449
+ TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
450
+ TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
451
+ TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
452
+ TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
453
+ TR31_P0_PIN_ENCRYPTION_KEY: "TR31_P0_PIN_ENCRYPTION_KEY",
454
+ TR31_P1_PIN_GENERATION_KEY: "TR31_P1_PIN_GENERATION_KEY",
455
+ TR31_V1_IBM3624_PIN_VERIFICATION_KEY: "TR31_V1_IBM3624_PIN_VERIFICATION_KEY",
456
+ TR31_V2_VISA_PIN_VERIFICATION_KEY: "TR31_V2_VISA_PIN_VERIFICATION_KEY"
457
+ };
430
458
  var KeyAlgorithm = {
431
459
  AES_128: "AES_128",
432
460
  AES_192: "AES_192",
433
461
  AES_256: "AES_256",
434
462
  ECC_NIST_P256: "ECC_NIST_P256",
435
463
  ECC_NIST_P384: "ECC_NIST_P384",
464
+ ECC_NIST_P521: "ECC_NIST_P521",
436
465
  RSA_2048: "RSA_2048",
437
466
  RSA_3072: "RSA_3072",
438
467
  RSA_4096: "RSA_4096",
@@ -484,15 +513,38 @@ var KeyState = {
484
513
  DELETE_COMPLETE: "DELETE_COMPLETE",
485
514
  DELETE_PENDING: "DELETE_PENDING"
486
515
  };
487
- var WrappingKeySpec = {
488
- RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
489
- RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512"
516
+ var DiffieHellmanDerivationData;
517
+ ((DiffieHellmanDerivationData3) => {
518
+ DiffieHellmanDerivationData3.visit = /* @__PURE__ */ __name((value, visitor) => {
519
+ if (value.SharedInformation !== void 0) return visitor.SharedInformation(value.SharedInformation);
520
+ return visitor._(value.$unknown[0], value.$unknown[1]);
521
+ }, "visit");
522
+ })(DiffieHellmanDerivationData || (DiffieHellmanDerivationData = {}));
523
+ var SymmetricKeyAlgorithm = {
524
+ AES_128: "AES_128",
525
+ AES_192: "AES_192",
526
+ AES_256: "AES_256",
527
+ TDES_2KEY: "TDES_2KEY",
528
+ TDES_3KEY: "TDES_3KEY"
490
529
  };
491
530
  var KeyExportability = {
492
531
  EXPORTABLE: "EXPORTABLE",
493
532
  NON_EXPORTABLE: "NON_EXPORTABLE",
494
533
  SENSITIVE: "SENSITIVE"
495
534
  };
535
+ var KeyDerivationFunction = {
536
+ ANSI_X963: "ANSI_X963",
537
+ NIST_SP800: "NIST_SP800"
538
+ };
539
+ var KeyDerivationHashAlgorithm = {
540
+ SHA_256: "SHA_256",
541
+ SHA_384: "SHA_384",
542
+ SHA_512: "SHA_512"
543
+ };
544
+ var WrappingKeySpec = {
545
+ RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
546
+ RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512"
547
+ };
496
548
  var Tr34KeyBlockFormat = {
497
549
  X9_TR34_2012: "X9_TR34_2012"
498
550
  };
@@ -502,6 +554,8 @@ var ExportKeyMaterial;
502
554
  if (value.Tr31KeyBlock !== void 0) return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
503
555
  if (value.Tr34KeyBlock !== void 0) return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
504
556
  if (value.KeyCryptogram !== void 0) return visitor.KeyCryptogram(value.KeyCryptogram);
557
+ if (value.DiffieHellmanTr31KeyBlock !== void 0)
558
+ return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
505
559
  return visitor._(value.$unknown[0], value.$unknown[1]);
506
560
  }, "visit");
507
561
  })(ExportKeyMaterial || (ExportKeyMaterial = {}));
@@ -527,17 +581,25 @@ var ImportKeyMaterial;
527
581
  if (value.Tr31KeyBlock !== void 0) return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
528
582
  if (value.Tr34KeyBlock !== void 0) return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
529
583
  if (value.KeyCryptogram !== void 0) return visitor.KeyCryptogram(value.KeyCryptogram);
584
+ if (value.DiffieHellmanTr31KeyBlock !== void 0)
585
+ return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
530
586
  return visitor._(value.$unknown[0], value.$unknown[1]);
531
587
  }, "visit");
532
588
  })(ImportKeyMaterial || (ImportKeyMaterial = {}));
533
- var ExportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
534
- ...obj,
535
- ...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
536
- }), "ExportKeyCryptogramFilterSensitiveLog");
537
589
  var KeyBlockHeadersFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
538
590
  ...obj,
539
591
  ...obj.OptionalBlocks && { OptionalBlocks: import_smithy_client.SENSITIVE_STRING }
540
592
  }), "KeyBlockHeadersFilterSensitiveLog");
593
+ var ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
594
+ ...obj,
595
+ ...obj.PublicKeyCertificate && { PublicKeyCertificate: import_smithy_client.SENSITIVE_STRING },
596
+ ...obj.DerivationData && { DerivationData: obj.DerivationData },
597
+ ...obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }
598
+ }), "ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog");
599
+ var ExportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
600
+ ...obj,
601
+ ...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
602
+ }), "ExportKeyCryptogramFilterSensitiveLog");
541
603
  var ExportTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
542
604
  ...obj,
543
605
  ...obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }
@@ -552,6 +614,10 @@ var ExportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
552
614
  if (obj.Tr34KeyBlock !== void 0) return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
553
615
  if (obj.KeyCryptogram !== void 0)
554
616
  return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
617
+ if (obj.DiffieHellmanTr31KeyBlock !== void 0)
618
+ return {
619
+ DiffieHellmanTr31KeyBlock: ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock)
620
+ };
555
621
  if (obj.$unknown !== void 0) return { [obj.$unknown[0]]: "UNKNOWN" };
556
622
  }, "ExportKeyMaterialFilterSensitiveLog");
557
623
  var ExportKeyInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
@@ -581,6 +647,12 @@ var GetPublicKeyCertificateOutputFilterSensitiveLog = /* @__PURE__ */ __name((ob
581
647
  ...obj.KeyCertificate && { KeyCertificate: import_smithy_client.SENSITIVE_STRING },
582
648
  ...obj.KeyCertificateChain && { KeyCertificateChain: import_smithy_client.SENSITIVE_STRING }
583
649
  }), "GetPublicKeyCertificateOutputFilterSensitiveLog");
650
+ var ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
651
+ ...obj,
652
+ ...obj.PublicKeyCertificate && { PublicKeyCertificate: import_smithy_client.SENSITIVE_STRING },
653
+ ...obj.DerivationData && { DerivationData: obj.DerivationData },
654
+ ...obj.WrappedKeyBlock && { WrappedKeyBlock: import_smithy_client.SENSITIVE_STRING }
655
+ }), "ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog");
584
656
  var ImportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
585
657
  ...obj,
586
658
  ...obj.WrappedKeyCryptogram && { WrappedKeyCryptogram: import_smithy_client.SENSITIVE_STRING }
@@ -613,6 +685,10 @@ var ImportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
613
685
  if (obj.Tr34KeyBlock !== void 0) return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
614
686
  if (obj.KeyCryptogram !== void 0)
615
687
  return { KeyCryptogram: ImportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
688
+ if (obj.DiffieHellmanTr31KeyBlock !== void 0)
689
+ return {
690
+ DiffieHellmanTr31KeyBlock: ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock)
691
+ };
616
692
  if (obj.$unknown !== void 0) return { [obj.$unknown[0]]: "UNKNOWN" };
617
693
  }, "ImportKeyMaterialFilterSensitiveLog");
618
694
  var ImportKeyInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
@@ -1156,6 +1232,7 @@ var de_Key = /* @__PURE__ */ __name((output, context) => {
1156
1232
  CreateTimestamp: /* @__PURE__ */ __name((_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))), "CreateTimestamp"),
1157
1233
  DeletePendingTimestamp: /* @__PURE__ */ __name((_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))), "DeletePendingTimestamp"),
1158
1234
  DeleteTimestamp: /* @__PURE__ */ __name((_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))), "DeleteTimestamp"),
1235
+ DeriveKeyUsage: import_smithy_client.expectString,
1159
1236
  Enabled: import_smithy_client.expectBoolean,
1160
1237
  Exportable: import_smithy_client.expectBoolean,
1161
1238
  KeyArn: import_smithy_client.expectString,
@@ -1593,21 +1670,27 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(PaymentCrypto
1593
1670
  ServiceUnavailableException,
1594
1671
  ThrottlingException,
1595
1672
  ValidationException,
1673
+ DeriveKeyUsage,
1596
1674
  KeyAlgorithm,
1597
1675
  KeyClass,
1598
1676
  KeyUsage,
1599
1677
  KeyCheckValueAlgorithm,
1600
1678
  KeyOrigin,
1601
1679
  KeyState,
1602
- WrappingKeySpec,
1680
+ DiffieHellmanDerivationData,
1681
+ SymmetricKeyAlgorithm,
1603
1682
  KeyExportability,
1683
+ KeyDerivationFunction,
1684
+ KeyDerivationHashAlgorithm,
1685
+ WrappingKeySpec,
1604
1686
  Tr34KeyBlockFormat,
1605
1687
  ExportKeyMaterial,
1606
1688
  WrappedKeyMaterialFormat,
1607
1689
  KeyMaterialType,
1608
1690
  ImportKeyMaterial,
1609
- ExportKeyCryptogramFilterSensitiveLog,
1610
1691
  KeyBlockHeadersFilterSensitiveLog,
1692
+ ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
1693
+ ExportKeyCryptogramFilterSensitiveLog,
1611
1694
  ExportTr31KeyBlockFilterSensitiveLog,
1612
1695
  ExportTr34KeyBlockFilterSensitiveLog,
1613
1696
  ExportKeyMaterialFilterSensitiveLog,
@@ -1617,6 +1700,7 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(PaymentCrypto
1617
1700
  GetParametersForExportOutputFilterSensitiveLog,
1618
1701
  GetParametersForImportOutputFilterSensitiveLog,
1619
1702
  GetPublicKeyCertificateOutputFilterSensitiveLog,
1703
+ ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
1620
1704
  ImportKeyCryptogramFilterSensitiveLog,
1621
1705
  RootCertificatePublicKeyFilterSensitiveLog,
1622
1706
  ImportTr31KeyBlockFilterSensitiveLog,
@@ -112,12 +112,34 @@ export class ValidationException extends __BaseException {
112
112
  this.Message = opts.Message;
113
113
  }
114
114
  }
115
+ export const DeriveKeyUsage = {
116
+ TR31_B0_BASE_DERIVATION_KEY: "TR31_B0_BASE_DERIVATION_KEY",
117
+ TR31_C0_CARD_VERIFICATION_KEY: "TR31_C0_CARD_VERIFICATION_KEY",
118
+ TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY: "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY",
119
+ TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS: "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS",
120
+ TR31_E1_EMV_MKEY_CONFIDENTIALITY: "TR31_E1_EMV_MKEY_CONFIDENTIALITY",
121
+ TR31_E2_EMV_MKEY_INTEGRITY: "TR31_E2_EMV_MKEY_INTEGRITY",
122
+ TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS: "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS",
123
+ TR31_E5_EMV_MKEY_CARD_PERSONALIZATION: "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION",
124
+ TR31_E6_EMV_MKEY_OTHER: "TR31_E6_EMV_MKEY_OTHER",
125
+ TR31_K0_KEY_ENCRYPTION_KEY: "TR31_K0_KEY_ENCRYPTION_KEY",
126
+ TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
127
+ TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
128
+ TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
129
+ TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
130
+ TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
131
+ TR31_P0_PIN_ENCRYPTION_KEY: "TR31_P0_PIN_ENCRYPTION_KEY",
132
+ TR31_P1_PIN_GENERATION_KEY: "TR31_P1_PIN_GENERATION_KEY",
133
+ TR31_V1_IBM3624_PIN_VERIFICATION_KEY: "TR31_V1_IBM3624_PIN_VERIFICATION_KEY",
134
+ TR31_V2_VISA_PIN_VERIFICATION_KEY: "TR31_V2_VISA_PIN_VERIFICATION_KEY",
135
+ };
115
136
  export const KeyAlgorithm = {
116
137
  AES_128: "AES_128",
117
138
  AES_192: "AES_192",
118
139
  AES_256: "AES_256",
119
140
  ECC_NIST_P256: "ECC_NIST_P256",
120
141
  ECC_NIST_P384: "ECC_NIST_P384",
142
+ ECC_NIST_P521: "ECC_NIST_P521",
121
143
  RSA_2048: "RSA_2048",
122
144
  RSA_3072: "RSA_3072",
123
145
  RSA_4096: "RSA_4096",
@@ -169,15 +191,39 @@ export const KeyState = {
169
191
  DELETE_COMPLETE: "DELETE_COMPLETE",
170
192
  DELETE_PENDING: "DELETE_PENDING",
171
193
  };
172
- export const WrappingKeySpec = {
173
- RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
174
- RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512",
194
+ export var DiffieHellmanDerivationData;
195
+ (function (DiffieHellmanDerivationData) {
196
+ DiffieHellmanDerivationData.visit = (value, visitor) => {
197
+ if (value.SharedInformation !== undefined)
198
+ return visitor.SharedInformation(value.SharedInformation);
199
+ return visitor._(value.$unknown[0], value.$unknown[1]);
200
+ };
201
+ })(DiffieHellmanDerivationData || (DiffieHellmanDerivationData = {}));
202
+ export const SymmetricKeyAlgorithm = {
203
+ AES_128: "AES_128",
204
+ AES_192: "AES_192",
205
+ AES_256: "AES_256",
206
+ TDES_2KEY: "TDES_2KEY",
207
+ TDES_3KEY: "TDES_3KEY",
175
208
  };
176
209
  export const KeyExportability = {
177
210
  EXPORTABLE: "EXPORTABLE",
178
211
  NON_EXPORTABLE: "NON_EXPORTABLE",
179
212
  SENSITIVE: "SENSITIVE",
180
213
  };
214
+ export const KeyDerivationFunction = {
215
+ ANSI_X963: "ANSI_X963",
216
+ NIST_SP800: "NIST_SP800",
217
+ };
218
+ export const KeyDerivationHashAlgorithm = {
219
+ SHA_256: "SHA_256",
220
+ SHA_384: "SHA_384",
221
+ SHA_512: "SHA_512",
222
+ };
223
+ export const WrappingKeySpec = {
224
+ RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
225
+ RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512",
226
+ };
181
227
  export const Tr34KeyBlockFormat = {
182
228
  X9_TR34_2012: "X9_TR34_2012",
183
229
  };
@@ -190,6 +236,8 @@ export var ExportKeyMaterial;
190
236
  return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
191
237
  if (value.KeyCryptogram !== undefined)
192
238
  return visitor.KeyCryptogram(value.KeyCryptogram);
239
+ if (value.DiffieHellmanTr31KeyBlock !== undefined)
240
+ return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
193
241
  return visitor._(value.$unknown[0], value.$unknown[1]);
194
242
  };
195
243
  })(ExportKeyMaterial || (ExportKeyMaterial = {}));
@@ -218,17 +266,25 @@ export var ImportKeyMaterial;
218
266
  return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
219
267
  if (value.KeyCryptogram !== undefined)
220
268
  return visitor.KeyCryptogram(value.KeyCryptogram);
269
+ if (value.DiffieHellmanTr31KeyBlock !== undefined)
270
+ return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
221
271
  return visitor._(value.$unknown[0], value.$unknown[1]);
222
272
  };
223
273
  })(ImportKeyMaterial || (ImportKeyMaterial = {}));
224
- export const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
225
- ...obj,
226
- ...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
227
- });
228
274
  export const KeyBlockHeadersFilterSensitiveLog = (obj) => ({
229
275
  ...obj,
230
276
  ...(obj.OptionalBlocks && { OptionalBlocks: SENSITIVE_STRING }),
231
277
  });
278
+ export const ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog = (obj) => ({
279
+ ...obj,
280
+ ...(obj.PublicKeyCertificate && { PublicKeyCertificate: SENSITIVE_STRING }),
281
+ ...(obj.DerivationData && { DerivationData: obj.DerivationData }),
282
+ ...(obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }),
283
+ });
284
+ export const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
285
+ ...obj,
286
+ ...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
287
+ });
232
288
  export const ExportTr31KeyBlockFilterSensitiveLog = (obj) => ({
233
289
  ...obj,
234
290
  ...(obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }),
@@ -245,6 +301,10 @@ export const ExportKeyMaterialFilterSensitiveLog = (obj) => {
245
301
  return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
246
302
  if (obj.KeyCryptogram !== undefined)
247
303
  return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
304
+ if (obj.DiffieHellmanTr31KeyBlock !== undefined)
305
+ return {
306
+ DiffieHellmanTr31KeyBlock: ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock),
307
+ };
248
308
  if (obj.$unknown !== undefined)
249
309
  return { [obj.$unknown[0]]: "UNKNOWN" };
250
310
  };
@@ -275,6 +335,12 @@ export const GetPublicKeyCertificateOutputFilterSensitiveLog = (obj) => ({
275
335
  ...(obj.KeyCertificate && { KeyCertificate: SENSITIVE_STRING }),
276
336
  ...(obj.KeyCertificateChain && { KeyCertificateChain: SENSITIVE_STRING }),
277
337
  });
338
+ export const ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog = (obj) => ({
339
+ ...obj,
340
+ ...(obj.PublicKeyCertificate && { PublicKeyCertificate: SENSITIVE_STRING }),
341
+ ...(obj.DerivationData && { DerivationData: obj.DerivationData }),
342
+ ...(obj.WrappedKeyBlock && { WrappedKeyBlock: SENSITIVE_STRING }),
343
+ });
278
344
  export const ImportKeyCryptogramFilterSensitiveLog = (obj) => ({
279
345
  ...obj,
280
346
  ...(obj.WrappedKeyCryptogram && { WrappedKeyCryptogram: SENSITIVE_STRING }),
@@ -309,6 +375,10 @@ export const ImportKeyMaterialFilterSensitiveLog = (obj) => {
309
375
  return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
310
376
  if (obj.KeyCryptogram !== undefined)
311
377
  return { KeyCryptogram: ImportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
378
+ if (obj.DiffieHellmanTr31KeyBlock !== undefined)
379
+ return {
380
+ DiffieHellmanTr31KeyBlock: ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock),
381
+ };
312
382
  if (obj.$unknown !== undefined)
313
383
  return { [obj.$unknown[0]]: "UNKNOWN" };
314
384
  };
@@ -538,6 +538,7 @@ const de_Key = (output, context) => {
538
538
  CreateTimestamp: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
539
539
  DeletePendingTimestamp: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
540
540
  DeleteTimestamp: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
541
+ DeriveKeyUsage: __expectString,
541
542
  Enabled: __expectBoolean,
542
543
  Exportable: __expectBoolean,
543
544
  KeyArn: __expectString,
@@ -111,6 +111,7 @@ declare const CreateAliasCommand_base: {
111
111
  * @throws {@link PaymentCryptographyServiceException}
112
112
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
113
113
  *
114
+ *
114
115
  * @public
115
116
  */
116
117
  export declare class CreateAliasCommand extends CreateAliasCommand_base {
@@ -85,6 +85,7 @@ declare const CreateKeyCommand_base: {
85
85
  * Value: "STRING_VALUE", // required
86
86
  * },
87
87
  * ],
88
+ * DeriveKeyUsage: "STRING_VALUE",
88
89
  * };
89
90
  * const command = new CreateKeyCommand(input);
90
91
  * const response = await client.send(command);
@@ -118,6 +119,7 @@ declare const CreateKeyCommand_base: {
118
119
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
119
120
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
120
121
  * // DeleteTimestamp: new Date("TIMESTAMP"),
122
+ * // DeriveKeyUsage: "STRING_VALUE",
121
123
  * // },
122
124
  * // };
123
125
  *
@@ -156,6 +158,7 @@ declare const CreateKeyCommand_base: {
156
158
  * @throws {@link PaymentCryptographyServiceException}
157
159
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
158
160
  *
161
+ *
159
162
  * @public
160
163
  */
161
164
  export declare class CreateKeyCommand extends CreateKeyCommand_base {
@@ -101,6 +101,7 @@ declare const DeleteAliasCommand_base: {
101
101
  * @throws {@link PaymentCryptographyServiceException}
102
102
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
103
103
  *
104
+ *
104
105
  * @public
105
106
  */
106
107
  export declare class DeleteAliasCommand extends DeleteAliasCommand_base {
@@ -94,6 +94,7 @@ declare const DeleteKeyCommand_base: {
94
94
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
95
95
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
96
96
  * // DeleteTimestamp: new Date("TIMESTAMP"),
97
+ * // DeriveKeyUsage: "STRING_VALUE",
97
98
  * // },
98
99
  * // };
99
100
  *
@@ -129,6 +130,7 @@ declare const DeleteKeyCommand_base: {
129
130
  * @throws {@link PaymentCryptographyServiceException}
130
131
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
131
132
  *
133
+ *
132
134
  * @public
133
135
  */
134
136
  export declare class DeleteKeyCommand extends DeleteKeyCommand_base {
@@ -187,6 +187,35 @@ declare const ExportKeyCommand_base: {
187
187
  * WrappingKeyCertificate: "STRING_VALUE", // required
188
188
  * WrappingSpec: "STRING_VALUE",
189
189
  * },
190
+ * DiffieHellmanTr31KeyBlock: { // ExportDiffieHellmanTr31KeyBlock
191
+ * PrivateKeyIdentifier: "STRING_VALUE", // required
192
+ * CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
193
+ * PublicKeyCertificate: "STRING_VALUE", // required
194
+ * DeriveKeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
195
+ * KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
196
+ * KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
197
+ * DerivationData: { // DiffieHellmanDerivationData Union: only one key present
198
+ * SharedInformation: "STRING_VALUE",
199
+ * },
200
+ * KeyBlockHeaders: {
201
+ * KeyModesOfUse: {
202
+ * Encrypt: true || false,
203
+ * Decrypt: true || false,
204
+ * Wrap: true || false,
205
+ * Unwrap: true || false,
206
+ * Generate: true || false,
207
+ * Sign: true || false,
208
+ * Verify: true || false,
209
+ * DeriveKey: true || false,
210
+ * NoRestrictions: true || false,
211
+ * },
212
+ * KeyExportability: "STRING_VALUE",
213
+ * KeyVersion: "STRING_VALUE",
214
+ * OptionalBlocks: {
215
+ * "<keys>": "STRING_VALUE",
216
+ * },
217
+ * },
218
+ * },
190
219
  * },
191
220
  * ExportKeyIdentifier: "STRING_VALUE", // required
192
221
  * ExportAttributes: { // ExportAttributes
@@ -240,6 +269,7 @@ declare const ExportKeyCommand_base: {
240
269
  * @throws {@link PaymentCryptographyServiceException}
241
270
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
242
271
  *
272
+ *
243
273
  * @public
244
274
  */
245
275
  export declare class ExportKeyCommand extends ExportKeyCommand_base {
@@ -102,6 +102,7 @@ declare const GetAliasCommand_base: {
102
102
  * @throws {@link PaymentCryptographyServiceException}
103
103
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
104
104
  *
105
+ *
105
106
  * @public
106
107
  */
107
108
  export declare class GetAliasCommand extends GetAliasCommand_base {
@@ -91,6 +91,7 @@ declare const GetKeyCommand_base: {
91
91
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
92
92
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
93
93
  * // DeleteTimestamp: new Date("TIMESTAMP"),
94
+ * // DeriveKeyUsage: "STRING_VALUE",
94
95
  * // },
95
96
  * // };
96
97
  *
@@ -123,6 +124,7 @@ declare const GetKeyCommand_base: {
123
124
  * @throws {@link PaymentCryptographyServiceException}
124
125
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
125
126
  *
127
+ *
126
128
  * @public
127
129
  */
128
130
  export declare class GetKeyCommand extends GetKeyCommand_base {
@@ -101,6 +101,7 @@ declare const GetParametersForExportCommand_base: {
101
101
  * @throws {@link PaymentCryptographyServiceException}
102
102
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
103
103
  *
104
+ *
104
105
  * @public
105
106
  */
106
107
  export declare class GetParametersForExportCommand extends GetParametersForExportCommand_base {
@@ -101,6 +101,7 @@ declare const GetParametersForImportCommand_base: {
101
101
  * @throws {@link PaymentCryptographyServiceException}
102
102
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
103
103
  *
104
+ *
104
105
  * @public
105
106
  */
106
107
  export declare class GetParametersForImportCommand extends GetParametersForImportCommand_base {
@@ -76,6 +76,7 @@ declare const GetPublicKeyCertificateCommand_base: {
76
76
  * @throws {@link PaymentCryptographyServiceException}
77
77
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
78
78
  *
79
+ *
79
80
  * @public
80
81
  */
81
82
  export declare class GetPublicKeyCertificateCommand extends GetPublicKeyCertificateCommand_base {
@@ -35,10 +35,6 @@ declare const ImportKeyCommand_base: {
35
35
  * <p>
36
36
  * <b>To import a public root key certificate</b>
37
37
  * </p>
38
- * <p>You can also import a <i>root public key certificate</i>, used to sign other public key certificates, or a <i>trusted public key certificate</i> under an already established root public key certificate.</p>
39
- * <p>
40
- * <b>To import a public root key certificate</b>
41
- * </p>
42
38
  * <p>Using this operation, you can import the public component (in PEM cerificate format) of your private root key. You can use the imported public root key certificate for digital signatures, for example signing wrapping key or signing key in TR-34, within your Amazon Web Services Payment Cryptography account.</p>
43
39
  * <p>Set the following parameters:</p>
44
40
  * <ul>
@@ -240,6 +236,18 @@ declare const ImportKeyCommand_base: {
240
236
  * ImportToken: "STRING_VALUE", // required
241
237
  * WrappingSpec: "STRING_VALUE",
242
238
  * },
239
+ * DiffieHellmanTr31KeyBlock: { // ImportDiffieHellmanTr31KeyBlock
240
+ * PrivateKeyIdentifier: "STRING_VALUE", // required
241
+ * CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
242
+ * PublicKeyCertificate: "STRING_VALUE", // required
243
+ * DeriveKeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
244
+ * KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
245
+ * KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
246
+ * DerivationData: { // DiffieHellmanDerivationData Union: only one key present
247
+ * SharedInformation: "STRING_VALUE",
248
+ * },
249
+ * WrappedKeyBlock: "STRING_VALUE", // required
250
+ * },
243
251
  * },
244
252
  * KeyCheckValueAlgorithm: "STRING_VALUE",
245
253
  * Enabled: true || false,
@@ -282,6 +290,7 @@ declare const ImportKeyCommand_base: {
282
290
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
283
291
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
284
292
  * // DeleteTimestamp: new Date("TIMESTAMP"),
293
+ * // DeriveKeyUsage: "STRING_VALUE",
285
294
  * // },
286
295
  * // };
287
296
  *
@@ -320,6 +329,7 @@ declare const ImportKeyCommand_base: {
320
329
  * @throws {@link PaymentCryptographyServiceException}
321
330
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
322
331
  *
332
+ *
323
333
  * @public
324
334
  */
325
335
  export declare class ImportKeyCommand extends ImportKeyCommand_base {
@@ -109,6 +109,7 @@ declare const ListAliasesCommand_base: {
109
109
  * @throws {@link PaymentCryptographyServiceException}
110
110
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
111
111
  *
112
+ *
112
113
  * @public
113
114
  */
114
115
  export declare class ListAliasesCommand extends ListAliasesCommand_base {
@@ -124,6 +124,7 @@ declare const ListKeysCommand_base: {
124
124
  * @throws {@link PaymentCryptographyServiceException}
125
125
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
126
126
  *
127
+ *
127
128
  * @public
128
129
  */
129
130
  export declare class ListKeysCommand extends ListKeysCommand_base {
@@ -100,6 +100,7 @@ declare const ListTagsForResourceCommand_base: {
100
100
  * @throws {@link PaymentCryptographyServiceException}
101
101
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
102
102
  *
103
+ *
103
104
  * @public
104
105
  */
105
106
  export declare class ListTagsForResourceCommand extends ListTagsForResourceCommand_base {
@@ -93,6 +93,7 @@ declare const RestoreKeyCommand_base: {
93
93
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
94
94
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
95
95
  * // DeleteTimestamp: new Date("TIMESTAMP"),
96
+ * // DeriveKeyUsage: "STRING_VALUE",
96
97
  * // },
97
98
  * // };
98
99
  *
@@ -131,6 +132,7 @@ declare const RestoreKeyCommand_base: {
131
132
  * @throws {@link PaymentCryptographyServiceException}
132
133
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
133
134
  *
135
+ *
134
136
  * @public
135
137
  */
136
138
  export declare class RestoreKeyCommand extends RestoreKeyCommand_base {
@@ -81,6 +81,7 @@ declare const StartKeyUsageCommand_base: {
81
81
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
82
82
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
83
83
  * // DeleteTimestamp: new Date("TIMESTAMP"),
84
+ * // DeriveKeyUsage: "STRING_VALUE",
84
85
  * // },
85
86
  * // };
86
87
  *
@@ -119,6 +120,7 @@ declare const StartKeyUsageCommand_base: {
119
120
  * @throws {@link PaymentCryptographyServiceException}
120
121
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
121
122
  *
123
+ *
122
124
  * @public
123
125
  */
124
126
  export declare class StartKeyUsageCommand extends StartKeyUsageCommand_base {