// Code generated by smithy-go-codegen DO NOT EDIT. package paymentcryptographydata import ( "context" awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware" "github.com/aws/aws-sdk-go-v2/aws/signer/v4" "github.com/aws/aws-sdk-go-v2/service/paymentcryptographydata/types" "github.com/aws/smithy-go/middleware" smithyhttp "github.com/aws/smithy-go/transport/http" ) // Verifies pin-related data such as PIN and PIN Offset using algorithms including // VISA PVV and IBM3624. For more information, see Verify PIN data (https://docs.aws.amazon.com/payment-cryptography/latest/userguide/verify-pin-data.html) // in the Amazon Web Services Payment Cryptography User Guide. This operation // verifies PIN data for user payment card. A card holder PIN data is never // transmitted in clear to or from Amazon Web Services Payment Cryptography. This // operation uses PIN Verification Key (PVK) for PIN or PIN Offset generation and // then encrypts it using PIN Encryption Key (PEK) to create an EncryptedPinBlock // for transmission from Amazon Web Services Payment Cryptography. For information // about valid keys for this operation, see Understanding key attributes (https://docs.aws.amazon.com/payment-cryptography/latest/userguide/keys-validattributes.html) // and Key types for specific data operations (https://docs.aws.amazon.com/payment-cryptography/latest/userguide/crypto-ops-validkeys-ops.html) // in the Amazon Web Services Payment Cryptography User Guide. Cross-account use: // This operation can't be used across different Amazon Web Services accounts. // Related operations: // - GeneratePinData // - TranslatePinData func (c *Client) VerifyPinData(ctx context.Context, params *VerifyPinDataInput, optFns ...func(*Options)) (*VerifyPinDataOutput, error) { if params == nil { params = &VerifyPinDataInput{} } result, metadata, err := c.invokeOperation(ctx, "VerifyPinData", params, optFns, c.addOperationVerifyPinDataMiddlewares) if err != nil { return nil, err } out := result.(*VerifyPinDataOutput) out.ResultMetadata = metadata return out, nil } type VerifyPinDataInput struct { // The encrypted PIN block data that Amazon Web Services Payment Cryptography // verifies. // // This member is required. EncryptedPinBlock *string // The keyARN of the encryption key under which the PIN block data is encrypted. // This key type can be PEK or BDK. // // This member is required. EncryptionKeyIdentifier *string // The PIN encoding format for pin data generation as specified in ISO 9564. // Amazon Web Services Payment Cryptography supports ISO_Format_0 and ISO_Format_3 // . The ISO_Format_0 PIN block format is equivalent to the ANSI X9.8, VISA-1, and // ECI-1 PIN block formats. It is similar to a VISA-4 PIN block format. It supports // a PIN from 4 to 12 digits in length. The ISO_Format_3 PIN block format is the // same as ISO_Format_0 except that the fill digits are random values from 10 to // 15. // // This member is required. PinBlockFormat types.PinBlockFormatForPinData // The Primary Account Number (PAN), a unique identifier for a payment credit or // debit card that associates the card with a specific account holder. // // This member is required. PrimaryAccountNumber *string // The attributes and values for PIN data verification. // // This member is required. VerificationAttributes types.PinVerificationAttributes // The keyARN of the PIN verification key. // // This member is required. VerificationKeyIdentifier *string // The attributes and values for the DUKPT encrypted PIN block data. DukptAttributes *types.DukptAttributes // The length of PIN being verified. PinDataLength *int32 noSmithyDocumentSerde } type VerifyPinDataOutput struct { // The keyARN of the PEK that Amazon Web Services Payment Cryptography uses for // encrypted pin block generation. // // This member is required. EncryptionKeyArn *string // The key check value (KCV) of the encryption key. The KCV is used to check if // all parties holding a given key have the same key or to detect that a key has // changed. Amazon Web Services Payment Cryptography calculates the KCV by using // standard algorithms, typically by encrypting 8 or 16 bytes or "00" or "01" and // then truncating the result to the first 3 bytes, or 6 hex digits, of the // resulting cryptogram. // // This member is required. EncryptionKeyCheckValue *string // The keyARN of the PIN encryption key that Amazon Web Services Payment // Cryptography uses for PIN or PIN Offset verification. // // This member is required. VerificationKeyArn *string // The key check value (KCV) of the encryption key. The KCV is used to check if // all parties holding a given key have the same key or to detect that a key has // changed. Amazon Web Services Payment Cryptography calculates the KCV by using // standard algorithms, typically by encrypting 8 or 16 bytes or "00" or "01" and // then truncating the result to the first 3 bytes, or 6 hex digits, of the // resulting cryptogram. // // This member is required. VerificationKeyCheckValue *string // Metadata pertaining to the operation's result. ResultMetadata middleware.Metadata noSmithyDocumentSerde } func (c *Client) addOperationVerifyPinDataMiddlewares(stack *middleware.Stack, options Options) (err error) { err = stack.Serialize.Add(&awsRestjson1_serializeOpVerifyPinData{}, middleware.After) if err != nil { return err } err = stack.Deserialize.Add(&awsRestjson1_deserializeOpVerifyPinData{}, middleware.After) if err != nil { return err } if err = addSetLoggerMiddleware(stack, options); err != nil { return err } if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil { return err } if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil { return err } if err = addResolveEndpointMiddleware(stack, options); err != nil { return err } if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil { return err } if err = addRetryMiddlewares(stack, options); err != nil { return err } if err = addHTTPSignerV4Middleware(stack, options); err != nil { return err } if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil { return err } if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil { return err } if err = addClientUserAgent(stack, options); err != nil { return err } if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil { return err } if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil { return err } if err = addOpVerifyPinDataValidationMiddleware(stack); err != nil { return err } if err = stack.Initialize.Add(newServiceMetadataMiddleware_opVerifyPinData(options.Region), middleware.Before); err != nil { return err } if err = awsmiddleware.AddRecursionDetection(stack); err != nil { return err } if err = addRequestIDRetrieverMiddleware(stack); err != nil { return err } if err = addResponseErrorMiddleware(stack); err != nil { return err } if err = addRequestResponseLogging(stack, options); err != nil { return err } return nil } func newServiceMetadataMiddleware_opVerifyPinData(region string) *awsmiddleware.RegisterServiceMetadata { return &awsmiddleware.RegisterServiceMetadata{ Region: region, ServiceID: ServiceID, SigningName: "payment-cryptography", OperationName: "VerifyPinData", } }