@aws-sdk/client-payment-cryptography 3.775.0 → 3.778.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +93 -9
- package/dist-es/models/models_0.js +77 -7
- package/dist-es/protocols/Aws_json1_0.js +1 -0
- package/dist-types/commands/CreateAliasCommand.d.ts +1 -0
- package/dist-types/commands/CreateKeyCommand.d.ts +3 -0
- package/dist-types/commands/DeleteAliasCommand.d.ts +1 -0
- package/dist-types/commands/DeleteKeyCommand.d.ts +2 -0
- package/dist-types/commands/ExportKeyCommand.d.ts +30 -0
- package/dist-types/commands/GetAliasCommand.d.ts +1 -0
- package/dist-types/commands/GetKeyCommand.d.ts +2 -0
- package/dist-types/commands/GetParametersForExportCommand.d.ts +1 -0
- package/dist-types/commands/GetParametersForImportCommand.d.ts +1 -0
- package/dist-types/commands/GetPublicKeyCertificateCommand.d.ts +1 -0
- package/dist-types/commands/ImportKeyCommand.d.ts +14 -4
- package/dist-types/commands/ListAliasesCommand.d.ts +1 -0
- package/dist-types/commands/ListKeysCommand.d.ts +1 -0
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +1 -0
- package/dist-types/commands/RestoreKeyCommand.d.ts +2 -0
- package/dist-types/commands/StartKeyUsageCommand.d.ts +2 -0
- package/dist-types/commands/StopKeyUsageCommand.d.ts +2 -0
- package/dist-types/commands/TagResourceCommand.d.ts +1 -0
- package/dist-types/commands/UntagResourceCommand.d.ts +1 -0
- package/dist-types/commands/UpdateAliasCommand.d.ts +1 -0
- package/dist-types/models/models_0.d.ts +276 -29
- package/dist-types/ts3.4/models/models_0.d.ts +138 -13
- package/package.json +2 -2
package/dist-cjs/index.js
CHANGED
|
@@ -27,6 +27,9 @@ __export(index_exports, {
|
|
|
27
27
|
CreateKeyCommand: () => CreateKeyCommand,
|
|
28
28
|
DeleteAliasCommand: () => DeleteAliasCommand,
|
|
29
29
|
DeleteKeyCommand: () => DeleteKeyCommand,
|
|
30
|
+
DeriveKeyUsage: () => DeriveKeyUsage,
|
|
31
|
+
DiffieHellmanDerivationData: () => DiffieHellmanDerivationData,
|
|
32
|
+
ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog: () => ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
|
|
30
33
|
ExportKeyCommand: () => ExportKeyCommand,
|
|
31
34
|
ExportKeyCryptogramFilterSensitiveLog: () => ExportKeyCryptogramFilterSensitiveLog,
|
|
32
35
|
ExportKeyInputFilterSensitiveLog: () => ExportKeyInputFilterSensitiveLog,
|
|
@@ -43,6 +46,7 @@ __export(index_exports, {
|
|
|
43
46
|
GetParametersForImportOutputFilterSensitiveLog: () => GetParametersForImportOutputFilterSensitiveLog,
|
|
44
47
|
GetPublicKeyCertificateCommand: () => GetPublicKeyCertificateCommand,
|
|
45
48
|
GetPublicKeyCertificateOutputFilterSensitiveLog: () => GetPublicKeyCertificateOutputFilterSensitiveLog,
|
|
49
|
+
ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog: () => ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
|
|
46
50
|
ImportKeyCommand: () => ImportKeyCommand,
|
|
47
51
|
ImportKeyCryptogramFilterSensitiveLog: () => ImportKeyCryptogramFilterSensitiveLog,
|
|
48
52
|
ImportKeyInputFilterSensitiveLog: () => ImportKeyInputFilterSensitiveLog,
|
|
@@ -55,6 +59,8 @@ __export(index_exports, {
|
|
|
55
59
|
KeyBlockHeadersFilterSensitiveLog: () => KeyBlockHeadersFilterSensitiveLog,
|
|
56
60
|
KeyCheckValueAlgorithm: () => KeyCheckValueAlgorithm,
|
|
57
61
|
KeyClass: () => KeyClass,
|
|
62
|
+
KeyDerivationFunction: () => KeyDerivationFunction,
|
|
63
|
+
KeyDerivationHashAlgorithm: () => KeyDerivationHashAlgorithm,
|
|
58
64
|
KeyExportability: () => KeyExportability,
|
|
59
65
|
KeyMaterialType: () => KeyMaterialType,
|
|
60
66
|
KeyOrigin: () => KeyOrigin,
|
|
@@ -73,6 +79,7 @@ __export(index_exports, {
|
|
|
73
79
|
ServiceUnavailableException: () => ServiceUnavailableException,
|
|
74
80
|
StartKeyUsageCommand: () => StartKeyUsageCommand,
|
|
75
81
|
StopKeyUsageCommand: () => StopKeyUsageCommand,
|
|
82
|
+
SymmetricKeyAlgorithm: () => SymmetricKeyAlgorithm,
|
|
76
83
|
TagResourceCommand: () => TagResourceCommand,
|
|
77
84
|
ThrottlingException: () => ThrottlingException,
|
|
78
85
|
Tr34KeyBlockFormat: () => Tr34KeyBlockFormat,
|
|
@@ -427,12 +434,34 @@ var ValidationException = class _ValidationException extends PaymentCryptography
|
|
|
427
434
|
this.Message = opts.Message;
|
|
428
435
|
}
|
|
429
436
|
};
|
|
437
|
+
var DeriveKeyUsage = {
|
|
438
|
+
TR31_B0_BASE_DERIVATION_KEY: "TR31_B0_BASE_DERIVATION_KEY",
|
|
439
|
+
TR31_C0_CARD_VERIFICATION_KEY: "TR31_C0_CARD_VERIFICATION_KEY",
|
|
440
|
+
TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY: "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY",
|
|
441
|
+
TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS: "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS",
|
|
442
|
+
TR31_E1_EMV_MKEY_CONFIDENTIALITY: "TR31_E1_EMV_MKEY_CONFIDENTIALITY",
|
|
443
|
+
TR31_E2_EMV_MKEY_INTEGRITY: "TR31_E2_EMV_MKEY_INTEGRITY",
|
|
444
|
+
TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS: "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS",
|
|
445
|
+
TR31_E5_EMV_MKEY_CARD_PERSONALIZATION: "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION",
|
|
446
|
+
TR31_E6_EMV_MKEY_OTHER: "TR31_E6_EMV_MKEY_OTHER",
|
|
447
|
+
TR31_K0_KEY_ENCRYPTION_KEY: "TR31_K0_KEY_ENCRYPTION_KEY",
|
|
448
|
+
TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
|
|
449
|
+
TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
|
|
450
|
+
TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
|
|
451
|
+
TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
|
|
452
|
+
TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
|
|
453
|
+
TR31_P0_PIN_ENCRYPTION_KEY: "TR31_P0_PIN_ENCRYPTION_KEY",
|
|
454
|
+
TR31_P1_PIN_GENERATION_KEY: "TR31_P1_PIN_GENERATION_KEY",
|
|
455
|
+
TR31_V1_IBM3624_PIN_VERIFICATION_KEY: "TR31_V1_IBM3624_PIN_VERIFICATION_KEY",
|
|
456
|
+
TR31_V2_VISA_PIN_VERIFICATION_KEY: "TR31_V2_VISA_PIN_VERIFICATION_KEY"
|
|
457
|
+
};
|
|
430
458
|
var KeyAlgorithm = {
|
|
431
459
|
AES_128: "AES_128",
|
|
432
460
|
AES_192: "AES_192",
|
|
433
461
|
AES_256: "AES_256",
|
|
434
462
|
ECC_NIST_P256: "ECC_NIST_P256",
|
|
435
463
|
ECC_NIST_P384: "ECC_NIST_P384",
|
|
464
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
436
465
|
RSA_2048: "RSA_2048",
|
|
437
466
|
RSA_3072: "RSA_3072",
|
|
438
467
|
RSA_4096: "RSA_4096",
|
|
@@ -484,15 +513,38 @@ var KeyState = {
|
|
|
484
513
|
DELETE_COMPLETE: "DELETE_COMPLETE",
|
|
485
514
|
DELETE_PENDING: "DELETE_PENDING"
|
|
486
515
|
};
|
|
487
|
-
var
|
|
488
|
-
|
|
489
|
-
|
|
516
|
+
var DiffieHellmanDerivationData;
|
|
517
|
+
((DiffieHellmanDerivationData3) => {
|
|
518
|
+
DiffieHellmanDerivationData3.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
519
|
+
if (value.SharedInformation !== void 0) return visitor.SharedInformation(value.SharedInformation);
|
|
520
|
+
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
521
|
+
}, "visit");
|
|
522
|
+
})(DiffieHellmanDerivationData || (DiffieHellmanDerivationData = {}));
|
|
523
|
+
var SymmetricKeyAlgorithm = {
|
|
524
|
+
AES_128: "AES_128",
|
|
525
|
+
AES_192: "AES_192",
|
|
526
|
+
AES_256: "AES_256",
|
|
527
|
+
TDES_2KEY: "TDES_2KEY",
|
|
528
|
+
TDES_3KEY: "TDES_3KEY"
|
|
490
529
|
};
|
|
491
530
|
var KeyExportability = {
|
|
492
531
|
EXPORTABLE: "EXPORTABLE",
|
|
493
532
|
NON_EXPORTABLE: "NON_EXPORTABLE",
|
|
494
533
|
SENSITIVE: "SENSITIVE"
|
|
495
534
|
};
|
|
535
|
+
var KeyDerivationFunction = {
|
|
536
|
+
ANSI_X963: "ANSI_X963",
|
|
537
|
+
NIST_SP800: "NIST_SP800"
|
|
538
|
+
};
|
|
539
|
+
var KeyDerivationHashAlgorithm = {
|
|
540
|
+
SHA_256: "SHA_256",
|
|
541
|
+
SHA_384: "SHA_384",
|
|
542
|
+
SHA_512: "SHA_512"
|
|
543
|
+
};
|
|
544
|
+
var WrappingKeySpec = {
|
|
545
|
+
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
546
|
+
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512"
|
|
547
|
+
};
|
|
496
548
|
var Tr34KeyBlockFormat = {
|
|
497
549
|
X9_TR34_2012: "X9_TR34_2012"
|
|
498
550
|
};
|
|
@@ -502,6 +554,8 @@ var ExportKeyMaterial;
|
|
|
502
554
|
if (value.Tr31KeyBlock !== void 0) return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
503
555
|
if (value.Tr34KeyBlock !== void 0) return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
504
556
|
if (value.KeyCryptogram !== void 0) return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
557
|
+
if (value.DiffieHellmanTr31KeyBlock !== void 0)
|
|
558
|
+
return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
|
|
505
559
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
506
560
|
}, "visit");
|
|
507
561
|
})(ExportKeyMaterial || (ExportKeyMaterial = {}));
|
|
@@ -527,17 +581,25 @@ var ImportKeyMaterial;
|
|
|
527
581
|
if (value.Tr31KeyBlock !== void 0) return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
528
582
|
if (value.Tr34KeyBlock !== void 0) return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
529
583
|
if (value.KeyCryptogram !== void 0) return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
584
|
+
if (value.DiffieHellmanTr31KeyBlock !== void 0)
|
|
585
|
+
return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
|
|
530
586
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
531
587
|
}, "visit");
|
|
532
588
|
})(ImportKeyMaterial || (ImportKeyMaterial = {}));
|
|
533
|
-
var ExportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
534
|
-
...obj,
|
|
535
|
-
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
536
|
-
}), "ExportKeyCryptogramFilterSensitiveLog");
|
|
537
589
|
var KeyBlockHeadersFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
538
590
|
...obj,
|
|
539
591
|
...obj.OptionalBlocks && { OptionalBlocks: import_smithy_client.SENSITIVE_STRING }
|
|
540
592
|
}), "KeyBlockHeadersFilterSensitiveLog");
|
|
593
|
+
var ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
594
|
+
...obj,
|
|
595
|
+
...obj.PublicKeyCertificate && { PublicKeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
596
|
+
...obj.DerivationData && { DerivationData: obj.DerivationData },
|
|
597
|
+
...obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }
|
|
598
|
+
}), "ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog");
|
|
599
|
+
var ExportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
600
|
+
...obj,
|
|
601
|
+
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
602
|
+
}), "ExportKeyCryptogramFilterSensitiveLog");
|
|
541
603
|
var ExportTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
542
604
|
...obj,
|
|
543
605
|
...obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }
|
|
@@ -552,6 +614,10 @@ var ExportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
|
|
|
552
614
|
if (obj.Tr34KeyBlock !== void 0) return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
553
615
|
if (obj.KeyCryptogram !== void 0)
|
|
554
616
|
return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
|
|
617
|
+
if (obj.DiffieHellmanTr31KeyBlock !== void 0)
|
|
618
|
+
return {
|
|
619
|
+
DiffieHellmanTr31KeyBlock: ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock)
|
|
620
|
+
};
|
|
555
621
|
if (obj.$unknown !== void 0) return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
556
622
|
}, "ExportKeyMaterialFilterSensitiveLog");
|
|
557
623
|
var ExportKeyInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
@@ -581,6 +647,12 @@ var GetPublicKeyCertificateOutputFilterSensitiveLog = /* @__PURE__ */ __name((ob
|
|
|
581
647
|
...obj.KeyCertificate && { KeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
582
648
|
...obj.KeyCertificateChain && { KeyCertificateChain: import_smithy_client.SENSITIVE_STRING }
|
|
583
649
|
}), "GetPublicKeyCertificateOutputFilterSensitiveLog");
|
|
650
|
+
var ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
651
|
+
...obj,
|
|
652
|
+
...obj.PublicKeyCertificate && { PublicKeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
653
|
+
...obj.DerivationData && { DerivationData: obj.DerivationData },
|
|
654
|
+
...obj.WrappedKeyBlock && { WrappedKeyBlock: import_smithy_client.SENSITIVE_STRING }
|
|
655
|
+
}), "ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog");
|
|
584
656
|
var ImportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
585
657
|
...obj,
|
|
586
658
|
...obj.WrappedKeyCryptogram && { WrappedKeyCryptogram: import_smithy_client.SENSITIVE_STRING }
|
|
@@ -613,6 +685,10 @@ var ImportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
|
|
|
613
685
|
if (obj.Tr34KeyBlock !== void 0) return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
614
686
|
if (obj.KeyCryptogram !== void 0)
|
|
615
687
|
return { KeyCryptogram: ImportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
|
|
688
|
+
if (obj.DiffieHellmanTr31KeyBlock !== void 0)
|
|
689
|
+
return {
|
|
690
|
+
DiffieHellmanTr31KeyBlock: ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock)
|
|
691
|
+
};
|
|
616
692
|
if (obj.$unknown !== void 0) return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
617
693
|
}, "ImportKeyMaterialFilterSensitiveLog");
|
|
618
694
|
var ImportKeyInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
@@ -1156,6 +1232,7 @@ var de_Key = /* @__PURE__ */ __name((output, context) => {
|
|
|
1156
1232
|
CreateTimestamp: /* @__PURE__ */ __name((_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))), "CreateTimestamp"),
|
|
1157
1233
|
DeletePendingTimestamp: /* @__PURE__ */ __name((_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))), "DeletePendingTimestamp"),
|
|
1158
1234
|
DeleteTimestamp: /* @__PURE__ */ __name((_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))), "DeleteTimestamp"),
|
|
1235
|
+
DeriveKeyUsage: import_smithy_client.expectString,
|
|
1159
1236
|
Enabled: import_smithy_client.expectBoolean,
|
|
1160
1237
|
Exportable: import_smithy_client.expectBoolean,
|
|
1161
1238
|
KeyArn: import_smithy_client.expectString,
|
|
@@ -1593,21 +1670,27 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(PaymentCrypto
|
|
|
1593
1670
|
ServiceUnavailableException,
|
|
1594
1671
|
ThrottlingException,
|
|
1595
1672
|
ValidationException,
|
|
1673
|
+
DeriveKeyUsage,
|
|
1596
1674
|
KeyAlgorithm,
|
|
1597
1675
|
KeyClass,
|
|
1598
1676
|
KeyUsage,
|
|
1599
1677
|
KeyCheckValueAlgorithm,
|
|
1600
1678
|
KeyOrigin,
|
|
1601
1679
|
KeyState,
|
|
1602
|
-
|
|
1680
|
+
DiffieHellmanDerivationData,
|
|
1681
|
+
SymmetricKeyAlgorithm,
|
|
1603
1682
|
KeyExportability,
|
|
1683
|
+
KeyDerivationFunction,
|
|
1684
|
+
KeyDerivationHashAlgorithm,
|
|
1685
|
+
WrappingKeySpec,
|
|
1604
1686
|
Tr34KeyBlockFormat,
|
|
1605
1687
|
ExportKeyMaterial,
|
|
1606
1688
|
WrappedKeyMaterialFormat,
|
|
1607
1689
|
KeyMaterialType,
|
|
1608
1690
|
ImportKeyMaterial,
|
|
1609
|
-
ExportKeyCryptogramFilterSensitiveLog,
|
|
1610
1691
|
KeyBlockHeadersFilterSensitiveLog,
|
|
1692
|
+
ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
|
|
1693
|
+
ExportKeyCryptogramFilterSensitiveLog,
|
|
1611
1694
|
ExportTr31KeyBlockFilterSensitiveLog,
|
|
1612
1695
|
ExportTr34KeyBlockFilterSensitiveLog,
|
|
1613
1696
|
ExportKeyMaterialFilterSensitiveLog,
|
|
@@ -1617,6 +1700,7 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(PaymentCrypto
|
|
|
1617
1700
|
GetParametersForExportOutputFilterSensitiveLog,
|
|
1618
1701
|
GetParametersForImportOutputFilterSensitiveLog,
|
|
1619
1702
|
GetPublicKeyCertificateOutputFilterSensitiveLog,
|
|
1703
|
+
ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog,
|
|
1620
1704
|
ImportKeyCryptogramFilterSensitiveLog,
|
|
1621
1705
|
RootCertificatePublicKeyFilterSensitiveLog,
|
|
1622
1706
|
ImportTr31KeyBlockFilterSensitiveLog,
|
|
@@ -112,12 +112,34 @@ export class ValidationException extends __BaseException {
|
|
|
112
112
|
this.Message = opts.Message;
|
|
113
113
|
}
|
|
114
114
|
}
|
|
115
|
+
export const DeriveKeyUsage = {
|
|
116
|
+
TR31_B0_BASE_DERIVATION_KEY: "TR31_B0_BASE_DERIVATION_KEY",
|
|
117
|
+
TR31_C0_CARD_VERIFICATION_KEY: "TR31_C0_CARD_VERIFICATION_KEY",
|
|
118
|
+
TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY: "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY",
|
|
119
|
+
TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS: "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS",
|
|
120
|
+
TR31_E1_EMV_MKEY_CONFIDENTIALITY: "TR31_E1_EMV_MKEY_CONFIDENTIALITY",
|
|
121
|
+
TR31_E2_EMV_MKEY_INTEGRITY: "TR31_E2_EMV_MKEY_INTEGRITY",
|
|
122
|
+
TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS: "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS",
|
|
123
|
+
TR31_E5_EMV_MKEY_CARD_PERSONALIZATION: "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION",
|
|
124
|
+
TR31_E6_EMV_MKEY_OTHER: "TR31_E6_EMV_MKEY_OTHER",
|
|
125
|
+
TR31_K0_KEY_ENCRYPTION_KEY: "TR31_K0_KEY_ENCRYPTION_KEY",
|
|
126
|
+
TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
|
|
127
|
+
TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
|
|
128
|
+
TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
|
|
129
|
+
TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
|
|
130
|
+
TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
|
|
131
|
+
TR31_P0_PIN_ENCRYPTION_KEY: "TR31_P0_PIN_ENCRYPTION_KEY",
|
|
132
|
+
TR31_P1_PIN_GENERATION_KEY: "TR31_P1_PIN_GENERATION_KEY",
|
|
133
|
+
TR31_V1_IBM3624_PIN_VERIFICATION_KEY: "TR31_V1_IBM3624_PIN_VERIFICATION_KEY",
|
|
134
|
+
TR31_V2_VISA_PIN_VERIFICATION_KEY: "TR31_V2_VISA_PIN_VERIFICATION_KEY",
|
|
135
|
+
};
|
|
115
136
|
export const KeyAlgorithm = {
|
|
116
137
|
AES_128: "AES_128",
|
|
117
138
|
AES_192: "AES_192",
|
|
118
139
|
AES_256: "AES_256",
|
|
119
140
|
ECC_NIST_P256: "ECC_NIST_P256",
|
|
120
141
|
ECC_NIST_P384: "ECC_NIST_P384",
|
|
142
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
121
143
|
RSA_2048: "RSA_2048",
|
|
122
144
|
RSA_3072: "RSA_3072",
|
|
123
145
|
RSA_4096: "RSA_4096",
|
|
@@ -169,15 +191,39 @@ export const KeyState = {
|
|
|
169
191
|
DELETE_COMPLETE: "DELETE_COMPLETE",
|
|
170
192
|
DELETE_PENDING: "DELETE_PENDING",
|
|
171
193
|
};
|
|
172
|
-
export
|
|
173
|
-
|
|
174
|
-
|
|
194
|
+
export var DiffieHellmanDerivationData;
|
|
195
|
+
(function (DiffieHellmanDerivationData) {
|
|
196
|
+
DiffieHellmanDerivationData.visit = (value, visitor) => {
|
|
197
|
+
if (value.SharedInformation !== undefined)
|
|
198
|
+
return visitor.SharedInformation(value.SharedInformation);
|
|
199
|
+
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
200
|
+
};
|
|
201
|
+
})(DiffieHellmanDerivationData || (DiffieHellmanDerivationData = {}));
|
|
202
|
+
export const SymmetricKeyAlgorithm = {
|
|
203
|
+
AES_128: "AES_128",
|
|
204
|
+
AES_192: "AES_192",
|
|
205
|
+
AES_256: "AES_256",
|
|
206
|
+
TDES_2KEY: "TDES_2KEY",
|
|
207
|
+
TDES_3KEY: "TDES_3KEY",
|
|
175
208
|
};
|
|
176
209
|
export const KeyExportability = {
|
|
177
210
|
EXPORTABLE: "EXPORTABLE",
|
|
178
211
|
NON_EXPORTABLE: "NON_EXPORTABLE",
|
|
179
212
|
SENSITIVE: "SENSITIVE",
|
|
180
213
|
};
|
|
214
|
+
export const KeyDerivationFunction = {
|
|
215
|
+
ANSI_X963: "ANSI_X963",
|
|
216
|
+
NIST_SP800: "NIST_SP800",
|
|
217
|
+
};
|
|
218
|
+
export const KeyDerivationHashAlgorithm = {
|
|
219
|
+
SHA_256: "SHA_256",
|
|
220
|
+
SHA_384: "SHA_384",
|
|
221
|
+
SHA_512: "SHA_512",
|
|
222
|
+
};
|
|
223
|
+
export const WrappingKeySpec = {
|
|
224
|
+
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
225
|
+
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512",
|
|
226
|
+
};
|
|
181
227
|
export const Tr34KeyBlockFormat = {
|
|
182
228
|
X9_TR34_2012: "X9_TR34_2012",
|
|
183
229
|
};
|
|
@@ -190,6 +236,8 @@ export var ExportKeyMaterial;
|
|
|
190
236
|
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
191
237
|
if (value.KeyCryptogram !== undefined)
|
|
192
238
|
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
239
|
+
if (value.DiffieHellmanTr31KeyBlock !== undefined)
|
|
240
|
+
return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
|
|
193
241
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
194
242
|
};
|
|
195
243
|
})(ExportKeyMaterial || (ExportKeyMaterial = {}));
|
|
@@ -218,17 +266,25 @@ export var ImportKeyMaterial;
|
|
|
218
266
|
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
219
267
|
if (value.KeyCryptogram !== undefined)
|
|
220
268
|
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
269
|
+
if (value.DiffieHellmanTr31KeyBlock !== undefined)
|
|
270
|
+
return visitor.DiffieHellmanTr31KeyBlock(value.DiffieHellmanTr31KeyBlock);
|
|
221
271
|
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
222
272
|
};
|
|
223
273
|
})(ImportKeyMaterial || (ImportKeyMaterial = {}));
|
|
224
|
-
export const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
|
|
225
|
-
...obj,
|
|
226
|
-
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
|
|
227
|
-
});
|
|
228
274
|
export const KeyBlockHeadersFilterSensitiveLog = (obj) => ({
|
|
229
275
|
...obj,
|
|
230
276
|
...(obj.OptionalBlocks && { OptionalBlocks: SENSITIVE_STRING }),
|
|
231
277
|
});
|
|
278
|
+
export const ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog = (obj) => ({
|
|
279
|
+
...obj,
|
|
280
|
+
...(obj.PublicKeyCertificate && { PublicKeyCertificate: SENSITIVE_STRING }),
|
|
281
|
+
...(obj.DerivationData && { DerivationData: obj.DerivationData }),
|
|
282
|
+
...(obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }),
|
|
283
|
+
});
|
|
284
|
+
export const ExportKeyCryptogramFilterSensitiveLog = (obj) => ({
|
|
285
|
+
...obj,
|
|
286
|
+
...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }),
|
|
287
|
+
});
|
|
232
288
|
export const ExportTr31KeyBlockFilterSensitiveLog = (obj) => ({
|
|
233
289
|
...obj,
|
|
234
290
|
...(obj.KeyBlockHeaders && { KeyBlockHeaders: KeyBlockHeadersFilterSensitiveLog(obj.KeyBlockHeaders) }),
|
|
@@ -245,6 +301,10 @@ export const ExportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
|
245
301
|
return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
246
302
|
if (obj.KeyCryptogram !== undefined)
|
|
247
303
|
return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
|
|
304
|
+
if (obj.DiffieHellmanTr31KeyBlock !== undefined)
|
|
305
|
+
return {
|
|
306
|
+
DiffieHellmanTr31KeyBlock: ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock),
|
|
307
|
+
};
|
|
248
308
|
if (obj.$unknown !== undefined)
|
|
249
309
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
250
310
|
};
|
|
@@ -275,6 +335,12 @@ export const GetPublicKeyCertificateOutputFilterSensitiveLog = (obj) => ({
|
|
|
275
335
|
...(obj.KeyCertificate && { KeyCertificate: SENSITIVE_STRING }),
|
|
276
336
|
...(obj.KeyCertificateChain && { KeyCertificateChain: SENSITIVE_STRING }),
|
|
277
337
|
});
|
|
338
|
+
export const ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog = (obj) => ({
|
|
339
|
+
...obj,
|
|
340
|
+
...(obj.PublicKeyCertificate && { PublicKeyCertificate: SENSITIVE_STRING }),
|
|
341
|
+
...(obj.DerivationData && { DerivationData: obj.DerivationData }),
|
|
342
|
+
...(obj.WrappedKeyBlock && { WrappedKeyBlock: SENSITIVE_STRING }),
|
|
343
|
+
});
|
|
278
344
|
export const ImportKeyCryptogramFilterSensitiveLog = (obj) => ({
|
|
279
345
|
...obj,
|
|
280
346
|
...(obj.WrappedKeyCryptogram && { WrappedKeyCryptogram: SENSITIVE_STRING }),
|
|
@@ -309,6 +375,10 @@ export const ImportKeyMaterialFilterSensitiveLog = (obj) => {
|
|
|
309
375
|
return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
310
376
|
if (obj.KeyCryptogram !== undefined)
|
|
311
377
|
return { KeyCryptogram: ImportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
|
|
378
|
+
if (obj.DiffieHellmanTr31KeyBlock !== undefined)
|
|
379
|
+
return {
|
|
380
|
+
DiffieHellmanTr31KeyBlock: ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog(obj.DiffieHellmanTr31KeyBlock),
|
|
381
|
+
};
|
|
312
382
|
if (obj.$unknown !== undefined)
|
|
313
383
|
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
314
384
|
};
|
|
@@ -538,6 +538,7 @@ const de_Key = (output, context) => {
|
|
|
538
538
|
CreateTimestamp: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
|
|
539
539
|
DeletePendingTimestamp: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
|
|
540
540
|
DeleteTimestamp: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
|
|
541
|
+
DeriveKeyUsage: __expectString,
|
|
541
542
|
Enabled: __expectBoolean,
|
|
542
543
|
Exportable: __expectBoolean,
|
|
543
544
|
KeyArn: __expectString,
|
|
@@ -111,6 +111,7 @@ declare const CreateAliasCommand_base: {
|
|
|
111
111
|
* @throws {@link PaymentCryptographyServiceException}
|
|
112
112
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
113
113
|
*
|
|
114
|
+
*
|
|
114
115
|
* @public
|
|
115
116
|
*/
|
|
116
117
|
export declare class CreateAliasCommand extends CreateAliasCommand_base {
|
|
@@ -85,6 +85,7 @@ declare const CreateKeyCommand_base: {
|
|
|
85
85
|
* Value: "STRING_VALUE", // required
|
|
86
86
|
* },
|
|
87
87
|
* ],
|
|
88
|
+
* DeriveKeyUsage: "STRING_VALUE",
|
|
88
89
|
* };
|
|
89
90
|
* const command = new CreateKeyCommand(input);
|
|
90
91
|
* const response = await client.send(command);
|
|
@@ -118,6 +119,7 @@ declare const CreateKeyCommand_base: {
|
|
|
118
119
|
* // UsageStopTimestamp: new Date("TIMESTAMP"),
|
|
119
120
|
* // DeletePendingTimestamp: new Date("TIMESTAMP"),
|
|
120
121
|
* // DeleteTimestamp: new Date("TIMESTAMP"),
|
|
122
|
+
* // DeriveKeyUsage: "STRING_VALUE",
|
|
121
123
|
* // },
|
|
122
124
|
* // };
|
|
123
125
|
*
|
|
@@ -156,6 +158,7 @@ declare const CreateKeyCommand_base: {
|
|
|
156
158
|
* @throws {@link PaymentCryptographyServiceException}
|
|
157
159
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
158
160
|
*
|
|
161
|
+
*
|
|
159
162
|
* @public
|
|
160
163
|
*/
|
|
161
164
|
export declare class CreateKeyCommand extends CreateKeyCommand_base {
|
|
@@ -101,6 +101,7 @@ declare const DeleteAliasCommand_base: {
|
|
|
101
101
|
* @throws {@link PaymentCryptographyServiceException}
|
|
102
102
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
103
103
|
*
|
|
104
|
+
*
|
|
104
105
|
* @public
|
|
105
106
|
*/
|
|
106
107
|
export declare class DeleteAliasCommand extends DeleteAliasCommand_base {
|
|
@@ -94,6 +94,7 @@ declare const DeleteKeyCommand_base: {
|
|
|
94
94
|
* // UsageStopTimestamp: new Date("TIMESTAMP"),
|
|
95
95
|
* // DeletePendingTimestamp: new Date("TIMESTAMP"),
|
|
96
96
|
* // DeleteTimestamp: new Date("TIMESTAMP"),
|
|
97
|
+
* // DeriveKeyUsage: "STRING_VALUE",
|
|
97
98
|
* // },
|
|
98
99
|
* // };
|
|
99
100
|
*
|
|
@@ -129,6 +130,7 @@ declare const DeleteKeyCommand_base: {
|
|
|
129
130
|
* @throws {@link PaymentCryptographyServiceException}
|
|
130
131
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
131
132
|
*
|
|
133
|
+
*
|
|
132
134
|
* @public
|
|
133
135
|
*/
|
|
134
136
|
export declare class DeleteKeyCommand extends DeleteKeyCommand_base {
|
|
@@ -187,6 +187,35 @@ declare const ExportKeyCommand_base: {
|
|
|
187
187
|
* WrappingKeyCertificate: "STRING_VALUE", // required
|
|
188
188
|
* WrappingSpec: "STRING_VALUE",
|
|
189
189
|
* },
|
|
190
|
+
* DiffieHellmanTr31KeyBlock: { // ExportDiffieHellmanTr31KeyBlock
|
|
191
|
+
* PrivateKeyIdentifier: "STRING_VALUE", // required
|
|
192
|
+
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
193
|
+
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
194
|
+
* DeriveKeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
195
|
+
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
196
|
+
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
197
|
+
* DerivationData: { // DiffieHellmanDerivationData Union: only one key present
|
|
198
|
+
* SharedInformation: "STRING_VALUE",
|
|
199
|
+
* },
|
|
200
|
+
* KeyBlockHeaders: {
|
|
201
|
+
* KeyModesOfUse: {
|
|
202
|
+
* Encrypt: true || false,
|
|
203
|
+
* Decrypt: true || false,
|
|
204
|
+
* Wrap: true || false,
|
|
205
|
+
* Unwrap: true || false,
|
|
206
|
+
* Generate: true || false,
|
|
207
|
+
* Sign: true || false,
|
|
208
|
+
* Verify: true || false,
|
|
209
|
+
* DeriveKey: true || false,
|
|
210
|
+
* NoRestrictions: true || false,
|
|
211
|
+
* },
|
|
212
|
+
* KeyExportability: "STRING_VALUE",
|
|
213
|
+
* KeyVersion: "STRING_VALUE",
|
|
214
|
+
* OptionalBlocks: {
|
|
215
|
+
* "<keys>": "STRING_VALUE",
|
|
216
|
+
* },
|
|
217
|
+
* },
|
|
218
|
+
* },
|
|
190
219
|
* },
|
|
191
220
|
* ExportKeyIdentifier: "STRING_VALUE", // required
|
|
192
221
|
* ExportAttributes: { // ExportAttributes
|
|
@@ -240,6 +269,7 @@ declare const ExportKeyCommand_base: {
|
|
|
240
269
|
* @throws {@link PaymentCryptographyServiceException}
|
|
241
270
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
242
271
|
*
|
|
272
|
+
*
|
|
243
273
|
* @public
|
|
244
274
|
*/
|
|
245
275
|
export declare class ExportKeyCommand extends ExportKeyCommand_base {
|
|
@@ -102,6 +102,7 @@ declare const GetAliasCommand_base: {
|
|
|
102
102
|
* @throws {@link PaymentCryptographyServiceException}
|
|
103
103
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
104
104
|
*
|
|
105
|
+
*
|
|
105
106
|
* @public
|
|
106
107
|
*/
|
|
107
108
|
export declare class GetAliasCommand extends GetAliasCommand_base {
|
|
@@ -91,6 +91,7 @@ declare const GetKeyCommand_base: {
|
|
|
91
91
|
* // UsageStopTimestamp: new Date("TIMESTAMP"),
|
|
92
92
|
* // DeletePendingTimestamp: new Date("TIMESTAMP"),
|
|
93
93
|
* // DeleteTimestamp: new Date("TIMESTAMP"),
|
|
94
|
+
* // DeriveKeyUsage: "STRING_VALUE",
|
|
94
95
|
* // },
|
|
95
96
|
* // };
|
|
96
97
|
*
|
|
@@ -123,6 +124,7 @@ declare const GetKeyCommand_base: {
|
|
|
123
124
|
* @throws {@link PaymentCryptographyServiceException}
|
|
124
125
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
125
126
|
*
|
|
127
|
+
*
|
|
126
128
|
* @public
|
|
127
129
|
*/
|
|
128
130
|
export declare class GetKeyCommand extends GetKeyCommand_base {
|
|
@@ -101,6 +101,7 @@ declare const GetParametersForExportCommand_base: {
|
|
|
101
101
|
* @throws {@link PaymentCryptographyServiceException}
|
|
102
102
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
103
103
|
*
|
|
104
|
+
*
|
|
104
105
|
* @public
|
|
105
106
|
*/
|
|
106
107
|
export declare class GetParametersForExportCommand extends GetParametersForExportCommand_base {
|
|
@@ -101,6 +101,7 @@ declare const GetParametersForImportCommand_base: {
|
|
|
101
101
|
* @throws {@link PaymentCryptographyServiceException}
|
|
102
102
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
103
103
|
*
|
|
104
|
+
*
|
|
104
105
|
* @public
|
|
105
106
|
*/
|
|
106
107
|
export declare class GetParametersForImportCommand extends GetParametersForImportCommand_base {
|
|
@@ -76,6 +76,7 @@ declare const GetPublicKeyCertificateCommand_base: {
|
|
|
76
76
|
* @throws {@link PaymentCryptographyServiceException}
|
|
77
77
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
78
78
|
*
|
|
79
|
+
*
|
|
79
80
|
* @public
|
|
80
81
|
*/
|
|
81
82
|
export declare class GetPublicKeyCertificateCommand extends GetPublicKeyCertificateCommand_base {
|
|
@@ -35,10 +35,6 @@ declare const ImportKeyCommand_base: {
|
|
|
35
35
|
* <p>
|
|
36
36
|
* <b>To import a public root key certificate</b>
|
|
37
37
|
* </p>
|
|
38
|
-
* <p>You can also import a <i>root public key certificate</i>, used to sign other public key certificates, or a <i>trusted public key certificate</i> under an already established root public key certificate.</p>
|
|
39
|
-
* <p>
|
|
40
|
-
* <b>To import a public root key certificate</b>
|
|
41
|
-
* </p>
|
|
42
38
|
* <p>Using this operation, you can import the public component (in PEM cerificate format) of your private root key. You can use the imported public root key certificate for digital signatures, for example signing wrapping key or signing key in TR-34, within your Amazon Web Services Payment Cryptography account.</p>
|
|
43
39
|
* <p>Set the following parameters:</p>
|
|
44
40
|
* <ul>
|
|
@@ -240,6 +236,18 @@ declare const ImportKeyCommand_base: {
|
|
|
240
236
|
* ImportToken: "STRING_VALUE", // required
|
|
241
237
|
* WrappingSpec: "STRING_VALUE",
|
|
242
238
|
* },
|
|
239
|
+
* DiffieHellmanTr31KeyBlock: { // ImportDiffieHellmanTr31KeyBlock
|
|
240
|
+
* PrivateKeyIdentifier: "STRING_VALUE", // required
|
|
241
|
+
* CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required
|
|
242
|
+
* PublicKeyCertificate: "STRING_VALUE", // required
|
|
243
|
+
* DeriveKeyAlgorithm: "TDES_2KEY" || "TDES_3KEY" || "AES_128" || "AES_192" || "AES_256", // required
|
|
244
|
+
* KeyDerivationFunction: "NIST_SP800" || "ANSI_X963", // required
|
|
245
|
+
* KeyDerivationHashAlgorithm: "SHA_256" || "SHA_384" || "SHA_512", // required
|
|
246
|
+
* DerivationData: { // DiffieHellmanDerivationData Union: only one key present
|
|
247
|
+
* SharedInformation: "STRING_VALUE",
|
|
248
|
+
* },
|
|
249
|
+
* WrappedKeyBlock: "STRING_VALUE", // required
|
|
250
|
+
* },
|
|
243
251
|
* },
|
|
244
252
|
* KeyCheckValueAlgorithm: "STRING_VALUE",
|
|
245
253
|
* Enabled: true || false,
|
|
@@ -282,6 +290,7 @@ declare const ImportKeyCommand_base: {
|
|
|
282
290
|
* // UsageStopTimestamp: new Date("TIMESTAMP"),
|
|
283
291
|
* // DeletePendingTimestamp: new Date("TIMESTAMP"),
|
|
284
292
|
* // DeleteTimestamp: new Date("TIMESTAMP"),
|
|
293
|
+
* // DeriveKeyUsage: "STRING_VALUE",
|
|
285
294
|
* // },
|
|
286
295
|
* // };
|
|
287
296
|
*
|
|
@@ -320,6 +329,7 @@ declare const ImportKeyCommand_base: {
|
|
|
320
329
|
* @throws {@link PaymentCryptographyServiceException}
|
|
321
330
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
322
331
|
*
|
|
332
|
+
*
|
|
323
333
|
* @public
|
|
324
334
|
*/
|
|
325
335
|
export declare class ImportKeyCommand extends ImportKeyCommand_base {
|
|
@@ -109,6 +109,7 @@ declare const ListAliasesCommand_base: {
|
|
|
109
109
|
* @throws {@link PaymentCryptographyServiceException}
|
|
110
110
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
111
111
|
*
|
|
112
|
+
*
|
|
112
113
|
* @public
|
|
113
114
|
*/
|
|
114
115
|
export declare class ListAliasesCommand extends ListAliasesCommand_base {
|
|
@@ -124,6 +124,7 @@ declare const ListKeysCommand_base: {
|
|
|
124
124
|
* @throws {@link PaymentCryptographyServiceException}
|
|
125
125
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
126
126
|
*
|
|
127
|
+
*
|
|
127
128
|
* @public
|
|
128
129
|
*/
|
|
129
130
|
export declare class ListKeysCommand extends ListKeysCommand_base {
|
|
@@ -100,6 +100,7 @@ declare const ListTagsForResourceCommand_base: {
|
|
|
100
100
|
* @throws {@link PaymentCryptographyServiceException}
|
|
101
101
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
102
102
|
*
|
|
103
|
+
*
|
|
103
104
|
* @public
|
|
104
105
|
*/
|
|
105
106
|
export declare class ListTagsForResourceCommand extends ListTagsForResourceCommand_base {
|
|
@@ -93,6 +93,7 @@ declare const RestoreKeyCommand_base: {
|
|
|
93
93
|
* // UsageStopTimestamp: new Date("TIMESTAMP"),
|
|
94
94
|
* // DeletePendingTimestamp: new Date("TIMESTAMP"),
|
|
95
95
|
* // DeleteTimestamp: new Date("TIMESTAMP"),
|
|
96
|
+
* // DeriveKeyUsage: "STRING_VALUE",
|
|
96
97
|
* // },
|
|
97
98
|
* // };
|
|
98
99
|
*
|
|
@@ -131,6 +132,7 @@ declare const RestoreKeyCommand_base: {
|
|
|
131
132
|
* @throws {@link PaymentCryptographyServiceException}
|
|
132
133
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
133
134
|
*
|
|
135
|
+
*
|
|
134
136
|
* @public
|
|
135
137
|
*/
|
|
136
138
|
export declare class RestoreKeyCommand extends RestoreKeyCommand_base {
|
|
@@ -81,6 +81,7 @@ declare const StartKeyUsageCommand_base: {
|
|
|
81
81
|
* // UsageStopTimestamp: new Date("TIMESTAMP"),
|
|
82
82
|
* // DeletePendingTimestamp: new Date("TIMESTAMP"),
|
|
83
83
|
* // DeleteTimestamp: new Date("TIMESTAMP"),
|
|
84
|
+
* // DeriveKeyUsage: "STRING_VALUE",
|
|
84
85
|
* // },
|
|
85
86
|
* // };
|
|
86
87
|
*
|
|
@@ -119,6 +120,7 @@ declare const StartKeyUsageCommand_base: {
|
|
|
119
120
|
* @throws {@link PaymentCryptographyServiceException}
|
|
120
121
|
* <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
|
|
121
122
|
*
|
|
123
|
+
*
|
|
122
124
|
* @public
|
|
123
125
|
*/
|
|
124
126
|
export declare class StartKeyUsageCommand extends StartKeyUsageCommand_base {
|