From f7acac4f71ed43b3a0bb88240e7950ecc654efc1 Mon Sep 17 00:00:00 2001
From: awstools Exports a key from Amazon Web Services Payment Cryptography. Amazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm . Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography. The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanism. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography. The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import. You can also use
- * To export KEK or IPEK using TR-34
+ * To export initial keys (KEK) or IPEK using TR-34
* Using this operation, you can export initial key using TR-34 asymmetric key exchange. You can only export KEK generated within Amazon Web Services Payment Cryptography. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export and KRD is the user receiving the key. To initiate TR-34 key export, the KRD must obtain an export token by calling GetParametersForExport. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days. When this operation is successful, Amazon Web Services Payment Cryptography returns the KEK or IPEK as a TR-34 WrappedKeyBlock.
- * To export WK (Working Key) or IPEK using TR-31
+ * To export initial keys (KEK) or IPEK using RSA Wrap and Unwrap
+ * Using this operation, you can export initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate export, generate an asymmetric key pair on the receiving HSM and obtain the public key certificate in PEM format (base64 encoded) for the purpose of wrapping and the root certifiate chain. Import the root certificate into Amazon Web Services Payment Cryptography by calling ImportKey for Next call
+ *
+ *
+ * When this operation is successful, Amazon Web Services Payment Cryptography returns the WrappedKeyCryptogram.
+ * To export working keys or IPEK using TR-31
* Using this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use CreateKey or ImportKey. Set the following parameters:ExportKey
you can export symmetric keys using either symmetric and asymmetric key exchange mechanisms. Using this operation, you can share your Amazon Web Services Payment Cryptography generated keys with other service partners to perform cryptographic operations outside of Amazon Web Services Payment Cryptography ExportKey
functionality to generate and export an IPEK (Initial Pin Encryption Key) from Amazon Web Services Payment Cryptography using either TR-31 or TR-34 export key exchange. IPEK is generated from BDK (Base Derivation Key) and ExportDukptInitialKey
attribute KSN (KeySerialNumber
). The generated IPEK does not persist within Amazon Web Services Payment Cryptography and has to be re-generated each time during export.RootCertificatePublicKey
.ExportKey
and set the following parameters:
+ *
+ * CertificateAuthorityPublicKeyIdentifier
: The KeyARN
of the certificate chain that signed wrapping key certificate.KeyMaterial
: Set to KeyCryptogram
.WrappingKeyCertificate
: The public key certificate in PEM format (base64 encoded) obtained by the receiving HSM and signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography. The receiving HSM uses its private key component to unwrap the WrappedKeyCryptogram.KeyMaterial
: Use Tr31KeyBlock
parameters.
When this operation is successful, Amazon Web Services Payment Cryptography returns the WK or IPEK as a TR-31 WrappedKeyBlock.
+ *When this operation is successful, Amazon Web Services Payment Cryptography returns the working key or IPEK as a TR-31 WrappedKeyBlock.
** Cross-account use: This operation can't be used across different Amazon Web Services accounts.
*@@ -131,6 +151,11 @@ export interface ExportKeyCommandOutput extends ExportKeyOutput, __MetadataBeare * KeyBlockFormat: "STRING_VALUE", // required * RandomNonce: "STRING_VALUE", * }, + * KeyCryptogram: { // ExportKeyCryptogram + * CertificateAuthorityPublicKeyIdentifier: "STRING_VALUE", // required + * WrappingKeyCertificate: "STRING_VALUE", // required + * WrappingSpec: "STRING_VALUE", + * }, * }, * ExportKeyIdentifier: "STRING_VALUE", // required * ExportAttributes: { // ExportAttributes diff --git a/clients/client-payment-cryptography/src/commands/GetParametersForImportCommand.ts b/clients/client-payment-cryptography/src/commands/GetParametersForImportCommand.ts index cc04fba4d878..ad8876b1cb3b 100644 --- a/clients/client-payment-cryptography/src/commands/GetParametersForImportCommand.ts +++ b/clients/client-payment-cryptography/src/commands/GetParametersForImportCommand.ts @@ -36,7 +36,7 @@ export interface GetParametersForImportCommandOutput extends GetParametersForImp /** * @public - *
Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock.
+ *Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.
*The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling ImportKey. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.
** Cross-account use: This operation can't be used across different Amazon Web Services accounts.
diff --git a/clients/client-payment-cryptography/src/commands/ImportKeyCommand.ts b/clients/client-payment-cryptography/src/commands/ImportKeyCommand.ts index ad860c7c9cd7..d7965c534432 100644 --- a/clients/client-payment-cryptography/src/commands/ImportKeyCommand.ts +++ b/clients/client-payment-cryptography/src/commands/ImportKeyCommand.ts @@ -34,8 +34,8 @@ export interface ImportKeyCommandOutput extends ImportKeyOutput, __MetadataBeare * @public *Imports symmetric keys and public key certificates in PEM format (base64 encoded) into Amazon Web Services Payment Cryptography.
*Amazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ImportKey
you can import symmetric keys using either symmetric and asymmetric key exchange mechanisms.
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm . Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
- *The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block.
+ *For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanisms. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
+ *The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import.
*You can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
** To import a public root key certificate @@ -96,7 +96,7 @@ export interface ImportKeyCommandOutput extends ImportKeyOutput, __MetadataBeare * * *
- * To import KEK or ZMK using TR-34 + * To import initial keys (KEK or ZMK or similar) using TR-34 *
*Using this operation, you can import initial key using TR-34 asymmetric key exchange. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During the key import process, KDH is the user who initiates the key import and KRD is Amazon Web Services Payment Cryptography who receives the key.
*To initiate TR-34 key import, the KDH must obtain an import token by calling GetParametersForImport. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.
@@ -125,7 +125,12 @@ export interface ImportKeyCommandOutput extends ImportKeyOutput, __MetadataBeare * * *- * To import WK (Working Key) using TR-31 + * To import initial keys (KEK or ZMK or similar) using RSA Wrap and Unwrap + *
+ *Using this operation, you can import initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate import, call GetParametersForImport with KeyMaterial
set to KEY_CRYPTOGRAM
to generate an import token. This operation also generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate in PEM format (base64 encoded) and its root certificate chain. The import token and associated KRD wrapping certificate expires after 7 days.
You must trust and install the wrapping certificate and its certificate chain on the sending HSM and use it to wrap the key under export for WrappedKeyCryptogram generation. Next call ImportKey
with KeyMaterial
set to KEY_CRYPTOGRAM
and provide the ImportToken
and KeyAttributes
for the key under import.
+ * To import working keys using TR-31 *
*Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using CreateKey. To initiate a TR-31 key import, set the following parameters:
*Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method.
+ */ +export interface ExportKeyCryptogram { + /** + * @public + *The KeyARN
of the certificate chain that signs the wrapping key certificate during RSA wrap and unwrap key export.
The wrapping key certificate in PEM format (base64 encoded). Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.
+ */ + WrappingKeyCertificate: string | undefined; + + /** + * @public + *The wrapping spec for the key under export.
+ */ + WrappingSpec?: WrappingKeySpec; +} + /** * @public *Parameter information for key material export using symmetric TR-31 key exchange method.
@@ -821,9 +860,10 @@ export interface ExportTr34KeyBlock { /** * @public - *Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 key exchange method.
+ *Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.
*/ export type ExportKeyMaterial = + | ExportKeyMaterial.KeyCryptogramMember | ExportKeyMaterial.Tr31KeyBlockMember | ExportKeyMaterial.Tr34KeyBlockMember | ExportKeyMaterial.$UnknownMember; @@ -839,6 +879,7 @@ export namespace ExportKeyMaterial { export interface Tr31KeyBlockMember { Tr31KeyBlock: ExportTr31KeyBlock; Tr34KeyBlock?: never; + KeyCryptogram?: never; $unknown?: never; } @@ -849,6 +890,18 @@ export namespace ExportKeyMaterial { export interface Tr34KeyBlockMember { Tr31KeyBlock?: never; Tr34KeyBlock: ExportTr34KeyBlock; + KeyCryptogram?: never; + $unknown?: never; + } + + /** + * @public + *Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method
+ */ + export interface KeyCryptogramMember { + Tr31KeyBlock?: never; + Tr34KeyBlock?: never; + KeyCryptogram: ExportKeyCryptogram; $unknown?: never; } @@ -858,18 +911,21 @@ export namespace ExportKeyMaterial { export interface $UnknownMember { Tr31KeyBlock?: never; Tr34KeyBlock?: never; + KeyCryptogram?: never; $unknown: [string, any]; } export interface VisitorThe key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock.
+ *The key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock. or a RSA WrappedKeyCryptogram.
*/ WrappedKey?: WrappedKey; } @@ -987,6 +1043,7 @@ export interface GetKeyOutput { * @enum */ export const KeyMaterialType = { + KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM", ROOT_PUBLIC_KEY_CERTIFICATE: "ROOT_PUBLIC_KEY_CERTIFICATE", TR31_KEY_BLOCK: "TR31_KEY_BLOCK", TR34_KEY_BLOCK: "TR34_KEY_BLOCK", @@ -1056,7 +1113,7 @@ export interface GetParametersForExportOutput { export interface GetParametersForImportInput { /** * @public - *The method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (TR34_KEY_BLOCK
).
The method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (TR34_KEY_BLOCK
) and RSA WrappedKeyCryptogram (KEY_CRYPTOGRAM
).
Import token is not required for TR-31, root public key cerificate or trusted public key certificate.
*/ KeyMaterialType: KeyMaterialType | undefined; @@ -1064,7 +1121,7 @@ export interface GetParametersForImportInput { /** * @public *The wrapping key algorithm to generate a wrapping key certificate. This certificate wraps the key under import.
- *At this time, RSA_2048
, RSA_3072
, RSA_4096
are the only allowed algorithms for TR-34 WrappedKeyBlock import.
At this time, RSA_2048
is the allowed algorithm for TR-34 WrappedKeyBlock import. Additionally, RSA_2048
, RSA_3072
, RSA_4096
are the allowed algorithms for RSA WrappedKeyCryptogram import.
The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock.
+ *The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock or RSA WrappedKeyCryptogram.
*/ WrappingKeyAlgorithm: KeyAlgorithm | undefined; @@ -1132,6 +1189,42 @@ export interface GetPublicKeyCertificateOutput { KeyCertificateChain: string | undefined; } +/** + * @public + *Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.
+ */ +export interface ImportKeyCryptogram { + /** + * @public + *The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.
+ */ + KeyAttributes: KeyAttributes | undefined; + + /** + * @public + *Specifies whether the key is exportable from the service.
+ */ + Exportable: boolean | undefined; + + /** + * @public + *The RSA wrapped key cryptogram under import.
+ */ + WrappedKeyCryptogram: string | undefined; + + /** + * @public + *The import token that initiates key import using the asymmetric RSA wrap and unwrap key exchange method into AWS Payment Cryptography. It expires after 7 days. You can use the same import token to import multiple keys to the same service account.
+ */ + ImportToken: string | undefined; + + /** + * @public + *The wrapping spec for the wrapped key cryptogram.
+ */ + WrappingSpec?: WrappingKeySpec; +} + /** * @public *Parameter information for root public key certificate import.
@@ -1236,9 +1329,10 @@ export interface TrustedCertificatePublicKey { /** * @public - *Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 key exchange method.
+ *Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.
*/ export type ImportKeyMaterial = + | ImportKeyMaterial.KeyCryptogramMember | ImportKeyMaterial.RootCertificatePublicKeyMember | ImportKeyMaterial.Tr31KeyBlockMember | ImportKeyMaterial.Tr34KeyBlockMember @@ -1258,6 +1352,7 @@ export namespace ImportKeyMaterial { TrustedCertificatePublicKey?: never; Tr31KeyBlock?: never; Tr34KeyBlock?: never; + KeyCryptogram?: never; $unknown?: never; } @@ -1270,6 +1365,7 @@ export namespace ImportKeyMaterial { TrustedCertificatePublicKey: TrustedCertificatePublicKey; Tr31KeyBlock?: never; Tr34KeyBlock?: never; + KeyCryptogram?: never; $unknown?: never; } @@ -1282,6 +1378,7 @@ export namespace ImportKeyMaterial { TrustedCertificatePublicKey?: never; Tr31KeyBlock: ImportTr31KeyBlock; Tr34KeyBlock?: never; + KeyCryptogram?: never; $unknown?: never; } @@ -1294,6 +1391,20 @@ export namespace ImportKeyMaterial { TrustedCertificatePublicKey?: never; Tr31KeyBlock?: never; Tr34KeyBlock: ImportTr34KeyBlock; + KeyCryptogram?: never; + $unknown?: never; + } + + /** + * @public + *Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.
+ */ + export interface KeyCryptogramMember { + RootCertificatePublicKey?: never; + TrustedCertificatePublicKey?: never; + Tr31KeyBlock?: never; + Tr34KeyBlock?: never; + KeyCryptogram: ImportKeyCryptogram; $unknown?: never; } @@ -1305,6 +1416,7 @@ export namespace ImportKeyMaterial { TrustedCertificatePublicKey?: never; Tr31KeyBlock?: never; Tr34KeyBlock?: never; + KeyCryptogram?: never; $unknown: [string, any]; } @@ -1313,6 +1425,7 @@ export namespace ImportKeyMaterial { TrustedCertificatePublicKey: (value: TrustedCertificatePublicKey) => T; Tr31KeyBlock: (value: ImportTr31KeyBlock) => T; Tr34KeyBlock: (value: ImportTr34KeyBlock) => T; + KeyCryptogram: (value: ImportKeyCryptogram) => T; _: (name: string, value: any) => T; } @@ -1323,6 +1436,7 @@ export namespace ImportKeyMaterial { return visitor.TrustedCertificatePublicKey(value.TrustedCertificatePublicKey); if (value.Tr31KeyBlock !== undefined) return visitor.Tr31KeyBlock(value.Tr31KeyBlock); if (value.Tr34KeyBlock !== undefined) return visitor.Tr34KeyBlock(value.Tr34KeyBlock); + if (value.KeyCryptogram !== undefined) return visitor.KeyCryptogram(value.KeyCryptogram); return visitor._(value.$unknown[0], value.$unknown[1]); }; } @@ -1617,6 +1731,14 @@ export interface UntagResourceInput { */ export interface UntagResourceOutput {} +/** + * @internal + */ +export const ExportKeyCryptogramFilterSensitiveLog = (obj: ExportKeyCryptogram): any => ({ + ...obj, + ...(obj.WrappingKeyCertificate && { WrappingKeyCertificate: SENSITIVE_STRING }), +}); + /** * @internal */ @@ -1631,6 +1753,8 @@ export const ExportTr34KeyBlockFilterSensitiveLog = (obj: ExportTr34KeyBlock): a export const ExportKeyMaterialFilterSensitiveLog = (obj: ExportKeyMaterial): any => { if (obj.Tr31KeyBlock !== undefined) return { Tr31KeyBlock: obj.Tr31KeyBlock }; if (obj.Tr34KeyBlock !== undefined) return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) }; + if (obj.KeyCryptogram !== undefined) + return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) }; if (obj.$unknown !== undefined) return { [obj.$unknown[0]]: "UNKNOWN" }; }; @@ -1721,6 +1845,7 @@ export const ImportKeyMaterialFilterSensitiveLog = (obj: ImportKeyMaterial): any }; if (obj.Tr31KeyBlock !== undefined) return { Tr31KeyBlock: obj.Tr31KeyBlock }; if (obj.Tr34KeyBlock !== undefined) return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) }; + if (obj.KeyCryptogram !== undefined) return { KeyCryptogram: obj.KeyCryptogram }; if (obj.$unknown !== undefined) return { [obj.$unknown[0]]: "UNKNOWN" }; }; diff --git a/clients/client-payment-cryptography/src/protocols/Aws_json1_0.ts b/clients/client-payment-cryptography/src/protocols/Aws_json1_0.ts index 6cf71489ba21..1d414c70f816 100644 --- a/clients/client-payment-cryptography/src/protocols/Aws_json1_0.ts +++ b/clients/client-payment-cryptography/src/protocols/Aws_json1_0.ts @@ -62,6 +62,7 @@ import { DeleteKeyOutput, ExportAttributes, ExportDukptInitialKey, + ExportKeyCryptogram, ExportKeyInput, ExportKeyMaterial, ExportTr31KeyBlock, @@ -74,6 +75,7 @@ import { GetParametersForImportInput, GetParametersForImportOutput, GetPublicKeyCertificateInput, + ImportKeyCryptogram, ImportKeyInput, ImportKeyMaterial, ImportKeyOutput, @@ -1780,6 +1782,8 @@ const de_ValidationExceptionRes = async (parsedOutput: any, context: __SerdeCont // se_ExportDukptInitialKey omitted. +// se_ExportKeyCryptogram omitted. + // se_ExportKeyInput omitted. // se_ExportKeyMaterial omitted. @@ -1798,6 +1802,8 @@ const de_ValidationExceptionRes = async (parsedOutput: any, context: __SerdeCont // se_GetPublicKeyCertificateInput omitted. +// se_ImportKeyCryptogram omitted. + // se_ImportKeyInput omitted. // se_ImportKeyMaterial omitted. diff --git a/codegen/sdk-codegen/aws-models/payment-cryptography.json b/codegen/sdk-codegen/aws-models/payment-cryptography.json index 6154ca05564a..3fc6cc23e6e4 100644 --- a/codegen/sdk-codegen/aws-models/payment-cryptography.json +++ b/codegen/sdk-codegen/aws-models/payment-cryptography.json @@ -500,7 +500,35 @@ ], "traits": { "aws.api#controlPlane": {}, - "smithy.api#documentation": "Exports a key from Amazon Web Services Payment Cryptography.
\nAmazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ExportKey
you can export symmetric keys using either symmetric and asymmetric key exchange mechanisms. Using this operation, you can share your Amazon Web Services Payment Cryptography generated keys with other service partners to perform cryptographic operations outside of Amazon Web Services Payment Cryptography
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm . Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
\nThe TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block.
\nYou can also use ExportKey
functionality to generate and export an IPEK (Initial Pin Encryption Key) from Amazon Web Services Payment Cryptography using either TR-31 or TR-34 export key exchange. IPEK is generated from BDK (Base Derivation Key) and ExportDukptInitialKey
attribute KSN (KeySerialNumber
). The generated IPEK does not persist within Amazon Web Services Payment Cryptography and has to be re-generated each time during export.
\n To export KEK or IPEK using TR-34\n
\nUsing this operation, you can export initial key using TR-34 asymmetric key exchange. You can only export KEK generated within Amazon Web Services Payment Cryptography. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export and KRD is the user receiving the key.
\nTo initiate TR-34 key export, the KRD must obtain an export token by calling GetParametersForExport. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days.
\nNext the KRD generates a key pair for the the purpose of encrypting the KDH key and provides the public key cerificate (also known as KRD wrapping certificate) back to KDH. The KRD will also import the root cerificate chain into Amazon Web Services Payment Cryptography by calling ImportKey for RootCertificatePublicKey
. The KDH, Amazon Web Services Payment Cryptography, will use the KRD wrapping cerificate to encrypt (wrap) the key under export and signs it with signing private key to generate a TR-34 WrappedKeyBlock. For more information on TR-34 key export, see section Exporting symmetric keys in the Amazon Web Services Payment Cryptography User Guide.
Set the following parameters:
\n\n ExportAttributes
: Specify export attributes in case of IPEK export. This parameter is optional for KEK export.
\n ExportKeyIdentifier
: The KeyARN
of the KEK or BDK (in case of IPEK) under export.
\n KeyMaterial
: Use Tr34KeyBlock
parameters.
\n CertificateAuthorityPublicKeyIdentifier
: The KeyARN
of the certificate chain that signed the KRD wrapping key certificate.
\n ExportToken
: Obtained from KDH by calling GetParametersForImport.
\n WrappingKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the KRD wrapping key Amazon Web Services Payment Cryptography uses for encryption of the TR-34 export payload. This certificate must be signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography.
When this operation is successful, Amazon Web Services Payment Cryptography returns the KEK or IPEK as a TR-34 WrappedKeyBlock.
\n\n To export WK (Working Key) or IPEK using TR-31\n
\nUsing this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use CreateKey or ImportKey.
\nSet the following parameters:
\n\n ExportAttributes
: Specify export attributes in case of IPEK export. This parameter is optional for KEK export.
\n ExportKeyIdentifier
: The KeyARN
of the KEK or BDK (in case of IPEK) under export.
\n KeyMaterial
: Use Tr31KeyBlock
parameters.
When this operation is successful, Amazon Web Services Payment Cryptography returns the WK or IPEK as a TR-31 WrappedKeyBlock.
\n\n Cross-account use: This operation can't be used across different Amazon Web Services accounts.
\n\n Related operations:\n
\n\n ImportKey\n
\nExports a key from Amazon Web Services Payment Cryptography.
\nAmazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ExportKey
you can export symmetric keys using either symmetric and asymmetric key exchange mechanisms. Using this operation, you can share your Amazon Web Services Payment Cryptography generated keys with other service partners to perform cryptographic operations outside of Amazon Web Services Payment Cryptography
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanism. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
\nThe TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import.
\nYou can also use ExportKey
functionality to generate and export an IPEK (Initial Pin Encryption Key) from Amazon Web Services Payment Cryptography using either TR-31 or TR-34 export key exchange. IPEK is generated from BDK (Base Derivation Key) and ExportDukptInitialKey
attribute KSN (KeySerialNumber
). The generated IPEK does not persist within Amazon Web Services Payment Cryptography and has to be re-generated each time during export.
\n To export initial keys (KEK) or IPEK using TR-34\n
\nUsing this operation, you can export initial key using TR-34 asymmetric key exchange. You can only export KEK generated within Amazon Web Services Payment Cryptography. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export and KRD is the user receiving the key.
\nTo initiate TR-34 key export, the KRD must obtain an export token by calling GetParametersForExport. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days.
\nNext the KRD generates a key pair for the the purpose of encrypting the KDH key and provides the public key cerificate (also known as KRD wrapping certificate) back to KDH. The KRD will also import the root cerificate chain into Amazon Web Services Payment Cryptography by calling ImportKey for RootCertificatePublicKey
. The KDH, Amazon Web Services Payment Cryptography, will use the KRD wrapping cerificate to encrypt (wrap) the key under export and signs it with signing private key to generate a TR-34 WrappedKeyBlock. For more information on TR-34 key export, see section Exporting symmetric keys in the Amazon Web Services Payment Cryptography User Guide.
Set the following parameters:
\n\n ExportAttributes
: Specify export attributes in case of IPEK export. This parameter is optional for KEK export.
\n ExportKeyIdentifier
: The KeyARN
of the KEK or BDK (in case of IPEK) under export.
\n KeyMaterial
: Use Tr34KeyBlock
parameters.
\n CertificateAuthorityPublicKeyIdentifier
: The KeyARN
of the certificate chain that signed the KRD wrapping key certificate.
\n ExportToken
: Obtained from KDH by calling GetParametersForImport.
\n WrappingKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the KRD wrapping key Amazon Web Services Payment Cryptography uses for encryption of the TR-34 export payload. This certificate must be signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography.
When this operation is successful, Amazon Web Services Payment Cryptography returns the KEK or IPEK as a TR-34 WrappedKeyBlock.
\n\n To export initial keys (KEK) or IPEK using RSA Wrap and Unwrap\n
\nUsing this operation, you can export initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate export, generate an asymmetric key pair on the receiving HSM and obtain the public key certificate in PEM format (base64 encoded) for the purpose of wrapping and the root certifiate chain. Import the root certificate into Amazon Web Services Payment Cryptography by calling ImportKey for RootCertificatePublicKey
.
Next call ExportKey
and set the following parameters:
\n CertificateAuthorityPublicKeyIdentifier
: The KeyARN
of the certificate chain that signed wrapping key certificate.
\n KeyMaterial
: Set to KeyCryptogram
.
\n WrappingKeyCertificate
: The public key certificate in PEM format (base64 encoded) obtained by the receiving HSM and signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography. The receiving HSM uses its private key component to unwrap the WrappedKeyCryptogram.
When this operation is successful, Amazon Web Services Payment Cryptography returns the WrappedKeyCryptogram.
\n\n To export working keys or IPEK using TR-31\n
\nUsing this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use CreateKey or ImportKey.
\nSet the following parameters:
\n\n ExportAttributes
: Specify export attributes in case of IPEK export. This parameter is optional for KEK export.
\n ExportKeyIdentifier
: The KeyARN
of the KEK or BDK (in case of IPEK) under export.
\n KeyMaterial
: Use Tr31KeyBlock
parameters.
When this operation is successful, Amazon Web Services Payment Cryptography returns the working key or IPEK as a TR-31 WrappedKeyBlock.
\n\n Cross-account use: This operation can't be used across different Amazon Web Services accounts.
\n\n Related operations:\n
\n\n ImportKey\n
\nThe KeyARN
of the certificate chain that signs the wrapping key certificate during RSA wrap and unwrap key export.
The wrapping key certificate in PEM format (base64 encoded). Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.
", + "smithy.api#required": {} + } + }, + "WrappingSpec": { + "target": "com.amazonaws.paymentcryptography#WrappingKeySpec", + "traits": { + "smithy.api#documentation": "The wrapping spec for the key under export.
" + } + } + }, + "traits": { + "smithy.api#documentation": "Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method.
" } }, "com.amazonaws.paymentcryptography#ExportKeyInput": { @@ -545,10 +573,16 @@ "traits": { "smithy.api#documentation": "Parameter information for key material export using the asymmetric TR-34 key exchange method.
" } + }, + "KeyCryptogram": { + "target": "com.amazonaws.paymentcryptography#ExportKeyCryptogram", + "traits": { + "smithy.api#documentation": "Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method
" + } } }, "traits": { - "smithy.api#documentation": "Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 key exchange method.
" + "smithy.api#documentation": "Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.
" } }, "com.amazonaws.paymentcryptography#ExportKeyOutput": { @@ -557,7 +591,7 @@ "WrappedKey": { "target": "com.amazonaws.paymentcryptography#WrappedKey", "traits": { - "smithy.api#documentation": "The key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock.
" + "smithy.api#documentation": "The key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock. or a RSA WrappedKeyCryptogram.
" } } }, @@ -900,7 +934,7 @@ ], "traits": { "aws.api#controlPlane": {}, - "smithy.api#documentation": "Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock.
\nThe wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling ImportKey. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.
\n\n Cross-account use: This operation can't be used across different Amazon Web Services accounts.
\n\n Related operations:\n
\n\n ImportKey\n
\nGets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.
\nThe wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling ImportKey. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.
\n\n Cross-account use: This operation can't be used across different Amazon Web Services accounts.
\n\n Related operations:\n
\n\n ImportKey\n
\nThe method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (TR34_KEY_BLOCK
).
Import token is not required for TR-31, root public key cerificate or trusted public key certificate.
", + "smithy.api#documentation": "The method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (TR34_KEY_BLOCK
) and RSA WrappedKeyCryptogram (KEY_CRYPTOGRAM
).
Import token is not required for TR-31, root public key cerificate or trusted public key certificate.
", "smithy.api#required": {} } }, "WrappingKeyAlgorithm": { "target": "com.amazonaws.paymentcryptography#KeyAlgorithm", "traits": { - "smithy.api#documentation": "The wrapping key algorithm to generate a wrapping key certificate. This certificate wraps the key under import.
\nAt this time, RSA_2048
, RSA_3072
, RSA_4096
are the only allowed algorithms for TR-34 WrappedKeyBlock import.
The wrapping key algorithm to generate a wrapping key certificate. This certificate wraps the key under import.
\nAt this time, RSA_2048
is the allowed algorithm for TR-34 WrappedKeyBlock import. Additionally, RSA_2048
, RSA_3072
, RSA_4096
are the allowed algorithms for RSA WrappedKeyCryptogram import.
The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock.
", + "smithy.api#documentation": "The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock or RSA WrappedKeyCryptogram.
", "smithy.api#required": {} } }, @@ -1095,7 +1129,48 @@ ], "traits": { "aws.api#controlPlane": {}, - "smithy.api#documentation": "Imports symmetric keys and public key certificates in PEM format (base64 encoded) into Amazon Web Services Payment Cryptography.
\nAmazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ImportKey
you can import symmetric keys using either symmetric and asymmetric key exchange mechanisms.
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm . Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
\nThe TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block.
\nYou can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
\n\n To import a public root key certificate\n
\nYou can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
\n\n To import a public root key certificate\n
\nUsing this operation, you can import the public component (in PEM cerificate format) of your private root key. You can use the imported public root key certificate for digital signatures, for example signing wrapping key or signing key in TR-34, within your Amazon Web Services Payment Cryptography account.
\nSet the following parameters:
\n\n KeyMaterial
: RootCertificatePublicKey
\n
\n KeyClass
: PUBLIC_KEY
\n
\n KeyModesOfUse
: Verify
\n
\n KeyUsage
: TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE
\n
\n PublicKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the private root key under import.
\n To import a trusted public key certificate\n
\nThe root public key certificate must be in place and operational before you import a trusted public key certificate. Set the following parameters:
\n\n KeyMaterial
: TrustedCertificatePublicKey
\n
\n CertificateAuthorityPublicKeyIdentifier
: KeyArn
of the RootCertificatePublicKey
.
\n KeyModesOfUse
and KeyUsage
: Corresponding to the cryptographic operations such as wrap, sign, or encrypt that you will allow the trusted public key certificate to perform.
\n PublicKeyCertificate
: The trusted public key certificate in PEM format (base64 encoded) under import.
\n To import KEK or ZMK using TR-34\n
\nUsing this operation, you can import initial key using TR-34 asymmetric key exchange. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During the key import process, KDH is the user who initiates the key import and KRD is Amazon Web Services Payment Cryptography who receives the key.
\nTo initiate TR-34 key import, the KDH must obtain an import token by calling GetParametersForImport. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.
\nNext the KDH generates a key pair for the purpose of signing the encrypted KDH key and provides the public certificate of the signing key to Amazon Web Services Payment Cryptography. The KDH will also need to import the root certificate chain of the KDH signing certificate by calling ImportKey
for RootCertificatePublicKey
. For more information on TR-34 key import, see section Importing symmetric keys in the Amazon Web Services Payment Cryptography User Guide.
Set the following parameters:
\n\n KeyMaterial
: Use Tr34KeyBlock
parameters.
\n CertificateAuthorityPublicKeyIdentifier
: The KeyARN
of the certificate chain that signed the KDH signing key certificate.
\n ImportToken
: Obtained from KRD by calling GetParametersForImport.
\n WrappedKeyBlock
: The TR-34 wrapped key material from KDH. It contains the KDH key under import, wrapped with KRD wrapping certificate and signed by KDH signing private key. This TR-34 key block is typically generated by the KDH Hardware Security Module (HSM) outside of Amazon Web Services Payment Cryptography.
\n SigningKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the KDH signing key generated under the root certificate (CertificateAuthorityPublicKeyIdentifier) imported in Amazon Web Services Payment Cryptography.
\n To import WK (Working Key) using TR-31\n
\nAmazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using CreateKey. To initiate a TR-31 key import, set the following parameters:
\n\n KeyMaterial
: Use Tr31KeyBlock
parameters.
\n WrappedKeyBlock
: The TR-31 wrapped key material. It contains the key under import, encrypted using KEK. The TR-31 key block is typically generated by a HSM outside of Amazon Web Services Payment Cryptography.
\n WrappingKeyIdentifier
: The KeyArn
of the KEK that Amazon Web Services Payment Cryptography uses to decrypt or unwrap the key under import.
\n Cross-account use: This operation can't be used across different Amazon Web Services accounts.
\n\n Related operations:\n
\n\n ExportKey\n
\nImports symmetric keys and public key certificates in PEM format (base64 encoded) into Amazon Web Services Payment Cryptography.
\nAmazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ImportKey
you can import symmetric keys using either symmetric and asymmetric key exchange mechanisms.
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanisms. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
\nThe TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import.
\nYou can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
\n\n To import a public root key certificate\n
\nYou can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
\n\n To import a public root key certificate\n
\nUsing this operation, you can import the public component (in PEM cerificate format) of your private root key. You can use the imported public root key certificate for digital signatures, for example signing wrapping key or signing key in TR-34, within your Amazon Web Services Payment Cryptography account.
\nSet the following parameters:
\n\n KeyMaterial
: RootCertificatePublicKey
\n
\n KeyClass
: PUBLIC_KEY
\n
\n KeyModesOfUse
: Verify
\n
\n KeyUsage
: TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE
\n
\n PublicKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the private root key under import.
\n To import a trusted public key certificate\n
\nThe root public key certificate must be in place and operational before you import a trusted public key certificate. Set the following parameters:
\n\n KeyMaterial
: TrustedCertificatePublicKey
\n
\n CertificateAuthorityPublicKeyIdentifier
: KeyArn
of the RootCertificatePublicKey
.
\n KeyModesOfUse
and KeyUsage
: Corresponding to the cryptographic operations such as wrap, sign, or encrypt that you will allow the trusted public key certificate to perform.
\n PublicKeyCertificate
: The trusted public key certificate in PEM format (base64 encoded) under import.
\n To import initial keys (KEK or ZMK or similar) using TR-34\n
\nUsing this operation, you can import initial key using TR-34 asymmetric key exchange. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During the key import process, KDH is the user who initiates the key import and KRD is Amazon Web Services Payment Cryptography who receives the key.
\nTo initiate TR-34 key import, the KDH must obtain an import token by calling GetParametersForImport. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.
\nNext the KDH generates a key pair for the purpose of signing the encrypted KDH key and provides the public certificate of the signing key to Amazon Web Services Payment Cryptography. The KDH will also need to import the root certificate chain of the KDH signing certificate by calling ImportKey
for RootCertificatePublicKey
. For more information on TR-34 key import, see section Importing symmetric keys in the Amazon Web Services Payment Cryptography User Guide.
Set the following parameters:
\n\n KeyMaterial
: Use Tr34KeyBlock
parameters.
\n CertificateAuthorityPublicKeyIdentifier
: The KeyARN
of the certificate chain that signed the KDH signing key certificate.
\n ImportToken
: Obtained from KRD by calling GetParametersForImport.
\n WrappedKeyBlock
: The TR-34 wrapped key material from KDH. It contains the KDH key under import, wrapped with KRD wrapping certificate and signed by KDH signing private key. This TR-34 key block is typically generated by the KDH Hardware Security Module (HSM) outside of Amazon Web Services Payment Cryptography.
\n SigningKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the KDH signing key generated under the root certificate (CertificateAuthorityPublicKeyIdentifier) imported in Amazon Web Services Payment Cryptography.
\n To import initial keys (KEK or ZMK or similar) using RSA Wrap and Unwrap\n
\nUsing this operation, you can import initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate import, call GetParametersForImport with KeyMaterial
set to KEY_CRYPTOGRAM
to generate an import token. This operation also generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate in PEM format (base64 encoded) and its root certificate chain. The import token and associated KRD wrapping certificate expires after 7 days.
You must trust and install the wrapping certificate and its certificate chain on the sending HSM and use it to wrap the key under export for WrappedKeyCryptogram generation. Next call ImportKey
with KeyMaterial
set to KEY_CRYPTOGRAM
and provide the ImportToken
and KeyAttributes
for the key under import.
\n To import working keys using TR-31\n
\nAmazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using CreateKey. To initiate a TR-31 key import, set the following parameters:
\n\n KeyMaterial
: Use Tr31KeyBlock
parameters.
\n WrappedKeyBlock
: The TR-31 wrapped key material. It contains the key under import, encrypted using KEK. The TR-31 key block is typically generated by a HSM outside of Amazon Web Services Payment Cryptography.
\n WrappingKeyIdentifier
: The KeyArn
of the KEK that Amazon Web Services Payment Cryptography uses to decrypt or unwrap the key under import.
\n Cross-account use: This operation can't be used across different Amazon Web Services accounts.
\n\n Related operations:\n
\n\n ExportKey\n
\nSpecifies whether the key is exportable from the service.
", + "smithy.api#required": {} + } + }, + "WrappedKeyCryptogram": { + "target": "com.amazonaws.paymentcryptography#WrappedKeyCryptogram", + "traits": { + "smithy.api#documentation": "The RSA wrapped key cryptogram under import.
", + "smithy.api#required": {} + } + }, + "ImportToken": { + "target": "com.amazonaws.paymentcryptography#ImportTokenId", + "traits": { + "smithy.api#documentation": "The import token that initiates key import using the asymmetric RSA wrap and unwrap key exchange method into AWS Payment Cryptography. It expires after 7 days. You can use the same import token to import multiple keys to the same service account.
", + "smithy.api#required": {} + } + }, + "WrappingSpec": { + "target": "com.amazonaws.paymentcryptography#WrappingKeySpec", + "traits": { + "smithy.api#documentation": "The wrapping spec for the wrapped key cryptogram.
" + } + } + }, + "traits": { + "smithy.api#documentation": "Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.
" } }, "com.amazonaws.paymentcryptography#ImportKeyInput": { @@ -1157,10 +1232,16 @@ "traits": { "smithy.api#documentation": "Parameter information for key material import using the asymmetric TR-34 key exchange method.
" } + }, + "KeyCryptogram": { + "target": "com.amazonaws.paymentcryptography#ImportKeyCryptogram", + "traits": { + "smithy.api#documentation": "Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.
" + } } }, "traits": { - "smithy.api#documentation": "Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 key exchange method.
" + "smithy.api#documentation": "Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.
" } }, "com.amazonaws.paymentcryptography#ImportKeyOutput": { @@ -1562,6 +1643,10 @@ { "value": "TRUSTED_PUBLIC_KEY_CERTIFICATE", "name": "TRUSTED_PUBLIC_KEY_CERTIFICATE" + }, + { + "value": "KEY_CRYPTOGRAM", + "name": "KEY_CRYPTOGRAM" } ] } @@ -1831,6 +1916,10 @@ "value": "TR31_M3_ISO_9797_3_MAC_KEY", "name": "TR31_M3_ISO_9797_3_MAC_KEY" }, + { + "value": "TR31_M1_ISO_9797_1_MAC_KEY", + "name": "TR31_M1_ISO_9797_1_MAC_KEY" + }, { "value": "TR31_M6_ISO_9797_5_CMAC_KEY", "name": "TR31_M6_ISO_9797_5_CMAC_KEY" @@ -3548,6 +3637,16 @@ "smithy.api#documentation": "Parameter information for generating a WrappedKeyBlock for key exchange.
" } }, + "com.amazonaws.paymentcryptography#WrappedKeyCryptogram": { + "type": "string", + "traits": { + "smithy.api#length": { + "min": 16, + "max": 4096 + }, + "smithy.api#pattern": "^[0-9A-F]+$" + } + }, "com.amazonaws.paymentcryptography#WrappedKeyMaterialFormat": { "type": "string", "traits": { @@ -3566,6 +3665,21 @@ } ] } + }, + "com.amazonaws.paymentcryptography#WrappingKeySpec": { + "type": "string", + "traits": { + "smithy.api#enum": [ + { + "value": "RSA_OAEP_SHA_256", + "name": "RSA_OAEP_SHA_256" + }, + { + "value": "RSA_OAEP_SHA_512", + "name": "RSA_OAEP_SHA_512" + } + ] + } } } }