@aws-sdk/client-payment-cryptography 3.775.0 → 3.778.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -87,6 +87,7 @@ declare const StopKeyUsageCommand_base: {
87
87
  * // UsageStopTimestamp: new Date("TIMESTAMP"),
88
88
  * // DeletePendingTimestamp: new Date("TIMESTAMP"),
89
89
  * // DeleteTimestamp: new Date("TIMESTAMP"),
90
+ * // DeriveKeyUsage: "STRING_VALUE",
90
91
  * // },
91
92
  * // };
92
93
  *
@@ -125,6 +126,7 @@ declare const StopKeyUsageCommand_base: {
125
126
  * @throws {@link PaymentCryptographyServiceException}
126
127
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
127
128
  *
129
+ *
128
130
  * @public
129
131
  */
130
132
  export declare class StopKeyUsageCommand extends StopKeyUsageCommand_base {
@@ -103,6 +103,7 @@ declare const TagResourceCommand_base: {
103
103
  * @throws {@link PaymentCryptographyServiceException}
104
104
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
105
105
  *
106
+ *
106
107
  * @public
107
108
  */
108
109
  export declare class TagResourceCommand extends TagResourceCommand_base {
@@ -96,6 +96,7 @@ declare const UntagResourceCommand_base: {
96
96
  * @throws {@link PaymentCryptographyServiceException}
97
97
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
98
98
  *
99
+ *
99
100
  * @public
100
101
  */
101
102
  export declare class UntagResourceCommand extends UntagResourceCommand_base {
@@ -106,6 +106,7 @@ declare const UpdateAliasCommand_base: {
106
106
  * @throws {@link PaymentCryptographyServiceException}
107
107
  * <p>Base exception class for all service exceptions from PaymentCryptography service.</p>
108
108
  *
109
+ *
109
110
  * @public
110
111
  */
111
112
  export declare class UpdateAliasCommand extends UpdateAliasCommand_base {
@@ -251,6 +251,35 @@ export interface UpdateAliasOutput {
251
251
  */
252
252
  Alias: Alias | undefined;
253
253
  }
254
+ /**
255
+ * @public
256
+ * @enum
257
+ */
258
+ export declare const DeriveKeyUsage: {
259
+ readonly TR31_B0_BASE_DERIVATION_KEY: "TR31_B0_BASE_DERIVATION_KEY";
260
+ readonly TR31_C0_CARD_VERIFICATION_KEY: "TR31_C0_CARD_VERIFICATION_KEY";
261
+ readonly TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY: "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY";
262
+ readonly TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS: "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS";
263
+ readonly TR31_E1_EMV_MKEY_CONFIDENTIALITY: "TR31_E1_EMV_MKEY_CONFIDENTIALITY";
264
+ readonly TR31_E2_EMV_MKEY_INTEGRITY: "TR31_E2_EMV_MKEY_INTEGRITY";
265
+ readonly TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS: "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS";
266
+ readonly TR31_E5_EMV_MKEY_CARD_PERSONALIZATION: "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION";
267
+ readonly TR31_E6_EMV_MKEY_OTHER: "TR31_E6_EMV_MKEY_OTHER";
268
+ readonly TR31_K0_KEY_ENCRYPTION_KEY: "TR31_K0_KEY_ENCRYPTION_KEY";
269
+ readonly TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY";
270
+ readonly TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY";
271
+ readonly TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY";
272
+ readonly TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY";
273
+ readonly TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY";
274
+ readonly TR31_P0_PIN_ENCRYPTION_KEY: "TR31_P0_PIN_ENCRYPTION_KEY";
275
+ readonly TR31_P1_PIN_GENERATION_KEY: "TR31_P1_PIN_GENERATION_KEY";
276
+ readonly TR31_V1_IBM3624_PIN_VERIFICATION_KEY: "TR31_V1_IBM3624_PIN_VERIFICATION_KEY";
277
+ readonly TR31_V2_VISA_PIN_VERIFICATION_KEY: "TR31_V2_VISA_PIN_VERIFICATION_KEY";
278
+ };
279
+ /**
280
+ * @public
281
+ */
282
+ export type DeriveKeyUsage = (typeof DeriveKeyUsage)[keyof typeof DeriveKeyUsage];
254
283
  /**
255
284
  * @public
256
285
  * @enum
@@ -261,6 +290,7 @@ export declare const KeyAlgorithm: {
261
290
  readonly AES_256: "AES_256";
262
291
  readonly ECC_NIST_P256: "ECC_NIST_P256";
263
292
  readonly ECC_NIST_P384: "ECC_NIST_P384";
293
+ readonly ECC_NIST_P521: "ECC_NIST_P521";
264
294
  readonly RSA_2048: "RSA_2048";
265
295
  readonly RSA_3072: "RSA_3072";
266
296
  readonly RSA_4096: "RSA_4096";
@@ -461,6 +491,11 @@ export interface CreateKeyInput {
461
491
  * @public
462
492
  */
463
493
  Tags?: Tag[] | undefined;
494
+ /**
495
+ * <p>The cryptographic usage of an ECDH derived key as defined in section A.5.2 of the TR-31 spec.</p>
496
+ * @public
497
+ */
498
+ DeriveKeyUsage?: DeriveKeyUsage | undefined;
464
499
  }
465
500
  /**
466
501
  * @public
@@ -559,6 +594,11 @@ export interface Key {
559
594
  * @public
560
595
  */
561
596
  DeleteTimestamp?: Date | undefined;
597
+ /**
598
+ * <p>The cryptographic usage of an ECDH derived key as defined in section A.5.2 of the TR-31 spec.</p>
599
+ * @public
600
+ */
601
+ DeriveKeyUsage?: DeriveKeyUsage | undefined;
562
602
  }
563
603
  /**
564
604
  * @public
@@ -595,6 +635,37 @@ export interface DeleteKeyOutput {
595
635
  */
596
636
  Key: Key | undefined;
597
637
  }
638
+ /**
639
+ * <p>Derivation data used to derive an ECDH key.</p>
640
+ * @public
641
+ */
642
+ export type DiffieHellmanDerivationData = DiffieHellmanDerivationData.SharedInformationMember | DiffieHellmanDerivationData.$UnknownMember;
643
+ /**
644
+ * @public
645
+ */
646
+ export declare namespace DiffieHellmanDerivationData {
647
+ /**
648
+ * <p>A byte string containing information that binds the ECDH derived key to the two parties involved or to the context of the key.</p>
649
+ * <p>It may include details like identities of the two parties deriving the key, context of the operation, session IDs, and optionally a nonce. It must not contain zero bytes, and re-using shared information for multiple ECDH key derivations is not recommended.</p>
650
+ * @public
651
+ */
652
+ interface SharedInformationMember {
653
+ SharedInformation: string;
654
+ $unknown?: never;
655
+ }
656
+ /**
657
+ * @public
658
+ */
659
+ interface $UnknownMember {
660
+ SharedInformation?: never;
661
+ $unknown: [string, any];
662
+ }
663
+ interface Visitor<T> {
664
+ SharedInformation: (value: string) => T;
665
+ _: (name: string, value: any) => T;
666
+ }
667
+ const visit: <T>(value: DiffieHellmanDerivationData, visitor: Visitor<T>) => T;
668
+ }
598
669
  /**
599
670
  * <p>Parameter information for IPEK generation during export.</p>
600
671
  * @public
@@ -628,35 +699,17 @@ export interface ExportAttributes {
628
699
  * @public
629
700
  * @enum
630
701
  */
631
- export declare const WrappingKeySpec: {
632
- readonly RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256";
633
- readonly RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512";
702
+ export declare const SymmetricKeyAlgorithm: {
703
+ readonly AES_128: "AES_128";
704
+ readonly AES_192: "AES_192";
705
+ readonly AES_256: "AES_256";
706
+ readonly TDES_2KEY: "TDES_2KEY";
707
+ readonly TDES_3KEY: "TDES_3KEY";
634
708
  };
635
709
  /**
636
710
  * @public
637
711
  */
638
- export type WrappingKeySpec = (typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
639
- /**
640
- * <p>Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method.</p>
641
- * @public
642
- */
643
- export interface ExportKeyCryptogram {
644
- /**
645
- * <p>The <code>KeyARN</code> of the certificate chain that signs the wrapping key certificate during RSA wrap and unwrap key export.</p>
646
- * @public
647
- */
648
- CertificateAuthorityPublicKeyIdentifier: string | undefined;
649
- /**
650
- * <p>The wrapping key certificate in PEM format (base64 encoded). Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.</p>
651
- * @public
652
- */
653
- WrappingKeyCertificate: string | undefined;
654
- /**
655
- * <p>The wrapping spec for the key under export.</p>
656
- * @public
657
- */
658
- WrappingSpec?: WrappingKeySpec | undefined;
659
- }
712
+ export type SymmetricKeyAlgorithm = (typeof SymmetricKeyAlgorithm)[keyof typeof SymmetricKeyAlgorithm];
660
713
  /**
661
714
  * @public
662
715
  * @enum
@@ -698,6 +751,110 @@ export interface KeyBlockHeaders {
698
751
  */
699
752
  OptionalBlocks?: Record<string, string> | undefined;
700
753
  }
754
+ /**
755
+ * @public
756
+ * @enum
757
+ */
758
+ export declare const KeyDerivationFunction: {
759
+ readonly ANSI_X963: "ANSI_X963";
760
+ readonly NIST_SP800: "NIST_SP800";
761
+ };
762
+ /**
763
+ * @public
764
+ */
765
+ export type KeyDerivationFunction = (typeof KeyDerivationFunction)[keyof typeof KeyDerivationFunction];
766
+ /**
767
+ * @public
768
+ * @enum
769
+ */
770
+ export declare const KeyDerivationHashAlgorithm: {
771
+ readonly SHA_256: "SHA_256";
772
+ readonly SHA_384: "SHA_384";
773
+ readonly SHA_512: "SHA_512";
774
+ };
775
+ /**
776
+ * @public
777
+ */
778
+ export type KeyDerivationHashAlgorithm = (typeof KeyDerivationHashAlgorithm)[keyof typeof KeyDerivationHashAlgorithm];
779
+ /**
780
+ * <p>Parameter information for key material export using the asymmetric ECDH key exchange method.</p>
781
+ * @public
782
+ */
783
+ export interface ExportDiffieHellmanTr31KeyBlock {
784
+ /**
785
+ * <p>The <code>keyARN</code> of the asymmetric ECC key.</p>
786
+ * @public
787
+ */
788
+ PrivateKeyIdentifier: string | undefined;
789
+ /**
790
+ * <p>The <code>keyARN</code> of the certificate that signed the client's <code>PublicKeyCertificate</code>.</p>
791
+ * @public
792
+ */
793
+ CertificateAuthorityPublicKeyIdentifier: string | undefined;
794
+ /**
795
+ * <p>The client's public key certificate in PEM format (base64 encoded) to use for ECDH key derivation.</p>
796
+ * @public
797
+ */
798
+ PublicKeyCertificate: string | undefined;
799
+ /**
800
+ * <p>The key algorithm of the derived ECDH key.</p>
801
+ * @public
802
+ */
803
+ DeriveKeyAlgorithm: SymmetricKeyAlgorithm | undefined;
804
+ /**
805
+ * <p>The key derivation function to use for deriving a key using ECDH.</p>
806
+ * @public
807
+ */
808
+ KeyDerivationFunction: KeyDerivationFunction | undefined;
809
+ /**
810
+ * <p>The hash type to use for deriving a key using ECDH.</p>
811
+ * @public
812
+ */
813
+ KeyDerivationHashAlgorithm: KeyDerivationHashAlgorithm | undefined;
814
+ /**
815
+ * <p>Derivation data used to derive an ECDH key.</p>
816
+ * @public
817
+ */
818
+ DerivationData: DiffieHellmanDerivationData | undefined;
819
+ /**
820
+ * <p>Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.</p>
821
+ * @public
822
+ */
823
+ KeyBlockHeaders?: KeyBlockHeaders | undefined;
824
+ }
825
+ /**
826
+ * @public
827
+ * @enum
828
+ */
829
+ export declare const WrappingKeySpec: {
830
+ readonly RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256";
831
+ readonly RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512";
832
+ };
833
+ /**
834
+ * @public
835
+ */
836
+ export type WrappingKeySpec = (typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
837
+ /**
838
+ * <p>Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method.</p>
839
+ * @public
840
+ */
841
+ export interface ExportKeyCryptogram {
842
+ /**
843
+ * <p>The <code>KeyARN</code> of the certificate chain that signs the wrapping key certificate during RSA wrap and unwrap key export.</p>
844
+ * @public
845
+ */
846
+ CertificateAuthorityPublicKeyIdentifier: string | undefined;
847
+ /**
848
+ * <p>The wrapping key certificate in PEM format (base64 encoded). Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.</p>
849
+ * @public
850
+ */
851
+ WrappingKeyCertificate: string | undefined;
852
+ /**
853
+ * <p>The wrapping spec for the key under export.</p>
854
+ * @public
855
+ */
856
+ WrappingSpec?: WrappingKeySpec | undefined;
857
+ }
701
858
  /**
702
859
  * <p>Parameter information for key material export using symmetric TR-31 key exchange method.</p>
703
860
  * @public
@@ -765,7 +922,7 @@ export interface ExportTr34KeyBlock {
765
922
  * <p>Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.</p>
766
923
  * @public
767
924
  */
768
- export type ExportKeyMaterial = ExportKeyMaterial.KeyCryptogramMember | ExportKeyMaterial.Tr31KeyBlockMember | ExportKeyMaterial.Tr34KeyBlockMember | ExportKeyMaterial.$UnknownMember;
925
+ export type ExportKeyMaterial = ExportKeyMaterial.DiffieHellmanTr31KeyBlockMember | ExportKeyMaterial.KeyCryptogramMember | ExportKeyMaterial.Tr31KeyBlockMember | ExportKeyMaterial.Tr34KeyBlockMember | ExportKeyMaterial.$UnknownMember;
769
926
  /**
770
927
  * @public
771
928
  */
@@ -778,6 +935,7 @@ export declare namespace ExportKeyMaterial {
778
935
  Tr31KeyBlock: ExportTr31KeyBlock;
779
936
  Tr34KeyBlock?: never;
780
937
  KeyCryptogram?: never;
938
+ DiffieHellmanTr31KeyBlock?: never;
781
939
  $unknown?: never;
782
940
  }
783
941
  /**
@@ -788,6 +946,7 @@ export declare namespace ExportKeyMaterial {
788
946
  Tr31KeyBlock?: never;
789
947
  Tr34KeyBlock: ExportTr34KeyBlock;
790
948
  KeyCryptogram?: never;
949
+ DiffieHellmanTr31KeyBlock?: never;
791
950
  $unknown?: never;
792
951
  }
793
952
  /**
@@ -798,6 +957,18 @@ export declare namespace ExportKeyMaterial {
798
957
  Tr31KeyBlock?: never;
799
958
  Tr34KeyBlock?: never;
800
959
  KeyCryptogram: ExportKeyCryptogram;
960
+ DiffieHellmanTr31KeyBlock?: never;
961
+ $unknown?: never;
962
+ }
963
+ /**
964
+ * <p>Parameter information for key material export using the asymmetric ECDH key exchange method.</p>
965
+ * @public
966
+ */
967
+ interface DiffieHellmanTr31KeyBlockMember {
968
+ Tr31KeyBlock?: never;
969
+ Tr34KeyBlock?: never;
970
+ KeyCryptogram?: never;
971
+ DiffieHellmanTr31KeyBlock: ExportDiffieHellmanTr31KeyBlock;
801
972
  $unknown?: never;
802
973
  }
803
974
  /**
@@ -807,12 +978,14 @@ export declare namespace ExportKeyMaterial {
807
978
  Tr31KeyBlock?: never;
808
979
  Tr34KeyBlock?: never;
809
980
  KeyCryptogram?: never;
981
+ DiffieHellmanTr31KeyBlock?: never;
810
982
  $unknown: [string, any];
811
983
  }
812
984
  interface Visitor<T> {
813
985
  Tr31KeyBlock: (value: ExportTr31KeyBlock) => T;
814
986
  Tr34KeyBlock: (value: ExportTr34KeyBlock) => T;
815
987
  KeyCryptogram: (value: ExportKeyCryptogram) => T;
988
+ DiffieHellmanTr31KeyBlock: (value: ExportDiffieHellmanTr31KeyBlock) => T;
816
989
  _: (name: string, value: any) => T;
817
990
  }
818
991
  const visit: <T>(value: ExportKeyMaterial, visitor: Visitor<T>) => T;
@@ -1044,6 +1217,52 @@ export interface GetPublicKeyCertificateOutput {
1044
1217
  */
1045
1218
  KeyCertificateChain: string | undefined;
1046
1219
  }
1220
+ /**
1221
+ * <p>Parameter information for key material import using the asymmetric ECDH key exchange method.</p>
1222
+ * @public
1223
+ */
1224
+ export interface ImportDiffieHellmanTr31KeyBlock {
1225
+ /**
1226
+ * <p>The <code>keyARN</code> of the asymmetric ECC key.</p>
1227
+ * @public
1228
+ */
1229
+ PrivateKeyIdentifier: string | undefined;
1230
+ /**
1231
+ * <p>The <code>keyARN</code> of the certificate that signed the client's <code>PublicKeyCertificate</code>.</p>
1232
+ * @public
1233
+ */
1234
+ CertificateAuthorityPublicKeyIdentifier: string | undefined;
1235
+ /**
1236
+ * <p>The client's public key certificate in PEM format (base64 encoded) to use for ECDH key derivation.</p>
1237
+ * @public
1238
+ */
1239
+ PublicKeyCertificate: string | undefined;
1240
+ /**
1241
+ * <p>The key algorithm of the derived ECDH key.</p>
1242
+ * @public
1243
+ */
1244
+ DeriveKeyAlgorithm: SymmetricKeyAlgorithm | undefined;
1245
+ /**
1246
+ * <p>The key derivation function to use for deriving a key using ECDH.</p>
1247
+ * @public
1248
+ */
1249
+ KeyDerivationFunction: KeyDerivationFunction | undefined;
1250
+ /**
1251
+ * <p>The hash type to use for deriving a key using ECDH.</p>
1252
+ * @public
1253
+ */
1254
+ KeyDerivationHashAlgorithm: KeyDerivationHashAlgorithm | undefined;
1255
+ /**
1256
+ * <p>Derivation data used to derive an ECDH key.</p>
1257
+ * @public
1258
+ */
1259
+ DerivationData: DiffieHellmanDerivationData | undefined;
1260
+ /**
1261
+ * <p>The ECDH wrapped key block to import.</p>
1262
+ * @public
1263
+ */
1264
+ WrappedKeyBlock: string | undefined;
1265
+ }
1047
1266
  /**
1048
1267
  * <p>Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.</p>
1049
1268
  * @public
@@ -1168,7 +1387,7 @@ export interface TrustedCertificatePublicKey {
1168
1387
  * <p>Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.</p>
1169
1388
  * @public
1170
1389
  */
1171
- export type ImportKeyMaterial = ImportKeyMaterial.KeyCryptogramMember | ImportKeyMaterial.RootCertificatePublicKeyMember | ImportKeyMaterial.Tr31KeyBlockMember | ImportKeyMaterial.Tr34KeyBlockMember | ImportKeyMaterial.TrustedCertificatePublicKeyMember | ImportKeyMaterial.$UnknownMember;
1390
+ export type ImportKeyMaterial = ImportKeyMaterial.DiffieHellmanTr31KeyBlockMember | ImportKeyMaterial.KeyCryptogramMember | ImportKeyMaterial.RootCertificatePublicKeyMember | ImportKeyMaterial.Tr31KeyBlockMember | ImportKeyMaterial.Tr34KeyBlockMember | ImportKeyMaterial.TrustedCertificatePublicKeyMember | ImportKeyMaterial.$UnknownMember;
1172
1391
  /**
1173
1392
  * @public
1174
1393
  */
@@ -1183,6 +1402,7 @@ export declare namespace ImportKeyMaterial {
1183
1402
  Tr31KeyBlock?: never;
1184
1403
  Tr34KeyBlock?: never;
1185
1404
  KeyCryptogram?: never;
1405
+ DiffieHellmanTr31KeyBlock?: never;
1186
1406
  $unknown?: never;
1187
1407
  }
1188
1408
  /**
@@ -1195,6 +1415,7 @@ export declare namespace ImportKeyMaterial {
1195
1415
  Tr31KeyBlock?: never;
1196
1416
  Tr34KeyBlock?: never;
1197
1417
  KeyCryptogram?: never;
1418
+ DiffieHellmanTr31KeyBlock?: never;
1198
1419
  $unknown?: never;
1199
1420
  }
1200
1421
  /**
@@ -1207,6 +1428,7 @@ export declare namespace ImportKeyMaterial {
1207
1428
  Tr31KeyBlock: ImportTr31KeyBlock;
1208
1429
  Tr34KeyBlock?: never;
1209
1430
  KeyCryptogram?: never;
1431
+ DiffieHellmanTr31KeyBlock?: never;
1210
1432
  $unknown?: never;
1211
1433
  }
1212
1434
  /**
@@ -1219,6 +1441,7 @@ export declare namespace ImportKeyMaterial {
1219
1441
  Tr31KeyBlock?: never;
1220
1442
  Tr34KeyBlock: ImportTr34KeyBlock;
1221
1443
  KeyCryptogram?: never;
1444
+ DiffieHellmanTr31KeyBlock?: never;
1222
1445
  $unknown?: never;
1223
1446
  }
1224
1447
  /**
@@ -1231,6 +1454,20 @@ export declare namespace ImportKeyMaterial {
1231
1454
  Tr31KeyBlock?: never;
1232
1455
  Tr34KeyBlock?: never;
1233
1456
  KeyCryptogram: ImportKeyCryptogram;
1457
+ DiffieHellmanTr31KeyBlock?: never;
1458
+ $unknown?: never;
1459
+ }
1460
+ /**
1461
+ * <p>Parameter information for key material import using the asymmetric ECDH key exchange method.</p>
1462
+ * @public
1463
+ */
1464
+ interface DiffieHellmanTr31KeyBlockMember {
1465
+ RootCertificatePublicKey?: never;
1466
+ TrustedCertificatePublicKey?: never;
1467
+ Tr31KeyBlock?: never;
1468
+ Tr34KeyBlock?: never;
1469
+ KeyCryptogram?: never;
1470
+ DiffieHellmanTr31KeyBlock: ImportDiffieHellmanTr31KeyBlock;
1234
1471
  $unknown?: never;
1235
1472
  }
1236
1473
  /**
@@ -1242,6 +1479,7 @@ export declare namespace ImportKeyMaterial {
1242
1479
  Tr31KeyBlock?: never;
1243
1480
  Tr34KeyBlock?: never;
1244
1481
  KeyCryptogram?: never;
1482
+ DiffieHellmanTr31KeyBlock?: never;
1245
1483
  $unknown: [string, any];
1246
1484
  }
1247
1485
  interface Visitor<T> {
@@ -1250,6 +1488,7 @@ export declare namespace ImportKeyMaterial {
1250
1488
  Tr31KeyBlock: (value: ImportTr31KeyBlock) => T;
1251
1489
  Tr34KeyBlock: (value: ImportTr34KeyBlock) => T;
1252
1490
  KeyCryptogram: (value: ImportKeyCryptogram) => T;
1491
+ DiffieHellmanTr31KeyBlock: (value: ImportDiffieHellmanTr31KeyBlock) => T;
1253
1492
  _: (name: string, value: any) => T;
1254
1493
  }
1255
1494
  const visit: <T>(value: ImportKeyMaterial, visitor: Visitor<T>) => T;
@@ -1516,11 +1755,15 @@ export interface UntagResourceOutput {
1516
1755
  /**
1517
1756
  * @internal
1518
1757
  */
1519
- export declare const ExportKeyCryptogramFilterSensitiveLog: (obj: ExportKeyCryptogram) => any;
1758
+ export declare const KeyBlockHeadersFilterSensitiveLog: (obj: KeyBlockHeaders) => any;
1520
1759
  /**
1521
1760
  * @internal
1522
1761
  */
1523
- export declare const KeyBlockHeadersFilterSensitiveLog: (obj: KeyBlockHeaders) => any;
1762
+ export declare const ExportDiffieHellmanTr31KeyBlockFilterSensitiveLog: (obj: ExportDiffieHellmanTr31KeyBlock) => any;
1763
+ /**
1764
+ * @internal
1765
+ */
1766
+ export declare const ExportKeyCryptogramFilterSensitiveLog: (obj: ExportKeyCryptogram) => any;
1524
1767
  /**
1525
1768
  * @internal
1526
1769
  */
@@ -1557,6 +1800,10 @@ export declare const GetParametersForImportOutputFilterSensitiveLog: (obj: GetPa
1557
1800
  * @internal
1558
1801
  */
1559
1802
  export declare const GetPublicKeyCertificateOutputFilterSensitiveLog: (obj: GetPublicKeyCertificateOutput) => any;
1803
+ /**
1804
+ * @internal
1805
+ */
1806
+ export declare const ImportDiffieHellmanTr31KeyBlockFilterSensitiveLog: (obj: ImportDiffieHellmanTr31KeyBlock) => any;
1560
1807
  /**
1561
1808
  * @internal
1562
1809
  */