'2.0', 'service' => '

You use the Amazon Web Services Payment Cryptography Control Plane to manage the encryption keys you use for payment-related cryptographic operations. You can create, import, export, share, manage, and delete keys. You can also manage Identity and Access Management (IAM) policies for keys. For more information, see Identity and access management in the Amazon Web Services Payment Cryptography User Guide.

To use encryption keys for payment-related transaction processing and associated cryptographic operations, you use the Amazon Web Services Payment Cryptography Data Plane. You can encrypt, decrypt, generate, verify, and translate payment-related cryptographic operations.

All Amazon Web Services Payment Cryptography API calls must be signed and transmitted using Transport Layer Security (TLS). We recommend you always use the latest supported TLS version for logging API requests.

Amazon Web Services Payment Cryptography supports CloudTrail, a service that logs Amazon Web Services API calls and related events for your Amazon Web Services account and delivers them to an Amazon S3 bucket that you specify. By using the information collected by CloudTrail, you can determine what requests were made to Amazon Web Services Payment Cryptography, who made the request, when it was made, and so on. If you don\'t configure a trail, you can still view the most recent events in the CloudTrail console. For more information, see the CloudTrail User Guide.

', 'operations' => [ 'CreateAlias' => '

Creates an alias, or a friendly name, for an Amazon Web Services Payment Cryptography key. You can use an alias to identify a key in the console and when you call cryptographic operations such as EncryptData or DecryptData.

You can associate the alias with any key in the same Amazon Web Services Region. Each alias is associated with only one key at a time, but a key can have multiple aliases. You can\'t create an alias without a key. The alias must be unique in the account and Amazon Web Services Region, but you can create another alias with the same name in a different Amazon Web Services Region.

To change the key that\'s associated with the alias, call UpdateAlias. To delete the alias, call DeleteAlias. These operations don\'t affect the underlying key. To get the alias that you created, call ListAliases.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'CreateKey' => '

Creates an Amazon Web Services Payment Cryptography key, a logical representation of a cryptographic key, that is unique in your account and Amazon Web Services Region. You use keys for cryptographic functions such as encryption and decryption.

In addition to the key material used in cryptographic operations, an Amazon Web Services Payment Cryptography key includes metadata such as the key ARN, key usage, key origin, creation date, description, and key state.

When you create a key, you specify both immutable and mutable data about the key. The immutable data contains key attributes that defines the scope and cryptographic operations that you can perform using the key, for example key class (example: SYMMETRIC_KEY), key algorithm (example: TDES_2KEY), key usage (example: TR31_P0_PIN_ENCRYPTION_KEY) and key modes of use (example: Encrypt). For information about valid combinations of key attributes, see Understanding key attributes in the Amazon Web Services Payment Cryptography User Guide. The mutable data contained within a key includes usage timestamp and key deletion timestamp and can be modified after creation.

Amazon Web Services Payment Cryptography binds key attributes to keys using key blocks when you store or export them. Amazon Web Services Payment Cryptography stores the key contents wrapped and never stores or transmits them in the clear.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'DeleteAlias' => '

Deletes the alias, but doesn\'t affect the underlying key.

Each key can have multiple aliases. To get the aliases of all keys, use the ListAliases operation. To change the alias of a key, first use DeleteAlias to delete the current alias and then use CreateAlias to create a new alias. To associate an existing alias with a different key, call UpdateAlias.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'DeleteKey' => '

Deletes the key material and all metadata associated with Amazon Web Services Payment Cryptography key.

Key deletion is irreversible. After a key is deleted, you can\'t perform cryptographic operations using the key. For example, you can\'t decrypt data that was encrypted by a deleted Amazon Web Services Payment Cryptography key, and the data may become unrecoverable. Because key deletion is destructive, Amazon Web Services Payment Cryptography has a safety mechanism to prevent accidental deletion of a key. When you call this operation, Amazon Web Services Payment Cryptography disables the specified key but doesn\'t delete it until after a waiting period. The default waiting period is 7 days. To set a different waiting period, set DeleteKeyInDays. During the waiting period, the KeyState is DELETE_PENDING. After the key is deleted, the KeyState is DELETE_COMPLETE.

If you delete key material, you can use ImportKey to reimport the same key material into the Amazon Web Services Payment Cryptography key.

You should delete a key only when you are sure that you don\'t need to use it anymore and no other parties are utilizing this key. If you aren\'t sure, consider deactivating it instead by calling StopKeyUsage.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'ExportKey' => '

Exports a key from Amazon Web Services Payment Cryptography using either ANSI X9 TR-34 or TR-31 key export standard.

Amazon Web Services Payment Cryptography simplifies main or root key exchange process by eliminating the need of a paper-based key exchange process. It takes a modern and secure approach based of the ANSI X9 TR-34 key exchange standard.

You can use ExportKey to export main or root keys such as KEK (Key Encryption Key), using asymmetric key exchange technique following ANSI X9 TR-34 standard. The ANSI X9 TR-34 standard uses asymmetric keys to establishes bi-directional trust between the two parties exchanging keys. After which you can export working keys using the ANSI X9 TR-31 symmetric key exchange standard as mandated by PCI PIN. Using this operation, you can share your Amazon Web Services Payment Cryptography generated keys with other service partners to perform cryptographic operations outside of Amazon Web Services Payment Cryptography

TR-34 key export

Amazon Web Services Payment Cryptography uses TR-34 asymmetric key exchange standard to export main keys such as KEK. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Host (KRH). In key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export. KRH is the user receiving the key. Before you initiate TR-34 key export, you must obtain an export token by calling GetParametersForExport. This operation also returns the signing key certificate that KDH uses to sign the wrapped key to generate a TR-34 wrapped key block. The export token expires after 7 days.

Set the following parameters:

CertificateAuthorityPublicKeyIdentifier

The KeyARN of the certificate chain that will sign the wrapping key certificate. This must exist within Amazon Web Services Payment Cryptography before you initiate TR-34 key export. If it does not exist, you can import it by calling ImportKey for RootCertificatePublicKey.

ExportToken

Obtained from KDH by calling GetParametersForExport.

WrappingKeyCertificate

Amazon Web Services Payment Cryptography uses this to wrap the key under export.

When this operation is successful, Amazon Web Services Payment Cryptography returns the TR-34 wrapped key block.

TR-31 key export

Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange standard to export working keys. In TR-31, you must use a main key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use CreateKey or ImportKey. When this operation is successful, Amazon Web Services Payment Cryptography returns a TR-31 wrapped key block.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'GetAlias' => '

Gets the Amazon Web Services Payment Cryptography key associated with the alias.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'GetKey' => '

Gets the key material for an Amazon Web Services Payment Cryptography key, including the immutable and mutable data specified when the key was created.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'GetParametersForExport' => '

Gets the export token and the signing key certificate to initiate a TR-34 key export from Amazon Web Services Payment Cryptography.

The signing key certificate signs the wrapped key under export within the TR-34 key payload. The export token and signing key certificate must be in place and operational before calling ExportKey. The export token expires in 7 days. You can use the same export token to export multiple keys from your service account.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'GetParametersForImport' => '

Gets the import token and the wrapping key certificate to initiate a TR-34 key import into Amazon Web Services Payment Cryptography.

The wrapping key certificate wraps the key under import within the TR-34 key payload. The import token and wrapping key certificate must be in place and operational before calling ImportKey. The import token expires in 7 days. The same import token can be used to import multiple keys into your service account.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'GetPublicKeyCertificate' => '

Gets the public key certificate of the asymmetric key pair that exists within Amazon Web Services Payment Cryptography.

Unlike the private key of an asymmetric key, which never leaves Amazon Web Services Payment Cryptography unencrypted, callers with GetPublicKeyCertificate permission can download the public key certificate of the asymmetric key. You can share the public key certificate to allow others to encrypt messages and verify signatures outside of Amazon Web Services Payment Cryptography

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

', 'ImportKey' => '

Imports keys and public key certificates into Amazon Web Services Payment Cryptography.

Amazon Web Services Payment Cryptography simplifies main or root key exchange process by eliminating the need of a paper-based key exchange process. It takes a modern and secure approach based of the ANSI X9 TR-34 key exchange standard.

You can use ImportKey to import main or root keys such as KEK (Key Encryption Key) using asymmetric key exchange technique following the ANSI X9 TR-34 standard. The ANSI X9 TR-34 standard uses asymmetric keys to establishes bi-directional trust between the two parties exchanging keys.

After you have imported a main or root key, you can import working keys to perform various cryptographic operations within Amazon Web Services Payment Cryptography using the ANSI X9 TR-31 symmetric key exchange standard as mandated by PCI PIN.

You can also import a root public key certificate, a self-signed certificate used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.

To import a public root key certificate

Using this operation, you can import the public component (in PEM cerificate format) of your private root key. You can use the imported public root key certificate for digital signatures, for example signing wrapping key or signing key in TR-34, within your Amazon Web Services Payment Cryptography account.

Set the following parameters:

To import a trusted public key certificate

The root public key certificate must be in place and operational before you import a trusted public key certificate. Set the following parameters:

Import main keys

Amazon Web Services Payment Cryptography uses TR-34 asymmetric key exchange standard to import main keys such as KEK. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Host (KRH). During the key import process, KDH is the user who initiates the key import and KRH is Amazon Web Services Payment Cryptography who receives the key. Before initiating TR-34 key import, you must obtain an import token by calling GetParametersForImport. This operation also returns the wrapping key certificate that KDH uses wrap key under import to generate a TR-34 wrapped key block. The import token expires after 7 days.

Set the following parameters:

TR-34 is intended primarily to exchange 3DES keys. Your ability to export AES-128 and larger AES keys may be dependent on your source system.

Import working keys

Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange standard to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import. To initiate a TR-31 key import, set the following parameters:

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'ListAliases' => '

Lists the aliases for all keys in the caller\'s Amazon Web Services account and Amazon Web Services Region. You can filter the list of aliases. For more information, see Using aliases in the Amazon Web Services Payment Cryptography User Guide.

This is a paginated operation, which means that each response might contain only a subset of all the aliases. When the response contains only a subset of aliases, it includes a NextToken value. Use this value in a subsequent ListAliases request to get more aliases. When you receive a response with no NextToken (or an empty or null value), that means there are no more aliases to get.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'ListKeys' => '

Lists the keys in the caller\'s Amazon Web Services account and Amazon Web Services Region. You can filter the list of keys.

This is a paginated operation, which means that each response might contain only a subset of all the keys. When the response contains only a subset of keys, it includes a NextToken value. Use this value in a subsequent ListKeys request to get more keys. When you receive a response with no NextToken (or an empty or null value), that means there are no more keys to get.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'ListTagsForResource' => '

Lists the tags for an Amazon Web Services resource.

This is a paginated operation, which means that each response might contain only a subset of all the tags. When the response contains only a subset of tags, it includes a NextToken value. Use this value in a subsequent ListTagsForResource request to get more tags. When you receive a response with no NextToken (or an empty or null value), that means there are no more tags to get.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'RestoreKey' => '

Cancels a scheduled key deletion during the waiting period. Use this operation to restore a Key that is scheduled for deletion.

During the waiting period, the KeyState is DELETE_PENDING and deletePendingTimestamp contains the date and time after which the Key will be deleted. After Key is restored, the KeyState is CREATE_COMPLETE, and the value for deletePendingTimestamp is removed.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'StartKeyUsage' => '

Enables an Amazon Web Services Payment Cryptography key, which makes it active for cryptographic operations within Amazon Web Services Payment Cryptography

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'StopKeyUsage' => '

Disables an Amazon Web Services Payment Cryptography key, which makes it inactive within Amazon Web Services Payment Cryptography.

You can use this operation instead of DeleteKey to deactivate a key. You can enable the key in the future by calling StartKeyUsage.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'TagResource' => '

Adds or edits tags on an Amazon Web Services Payment Cryptography key.

Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.

Each tag consists of a tag key and a tag value, both of which are case-sensitive strings. The tag value can be an empty (null) string. To add a tag, specify a new tag key and a tag value. To edit a tag, specify an existing tag key and a new tag value. You can also add tags to an Amazon Web Services Payment Cryptography key when you create it with CreateKey.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'UntagResource' => '

Deletes a tag from an Amazon Web Services Payment Cryptography key.

Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', 'UpdateAlias' => '

Associates an existing Amazon Web Services Payment Cryptography alias with a different key. Each alias is associated with only one Amazon Web Services Payment Cryptography key at a time, although a key can have multiple aliases. The alias and the Amazon Web Services Payment Cryptography key must be in the same Amazon Web Services account and Amazon Web Services Region

Cross-account use: This operation can\'t be used across different Amazon Web Services accounts.

Related operations:

', ], 'shapes' => [ 'AccessDeniedException' => [ 'base' => '

You do not have sufficient access to perform this action.

', 'refs' => [], ], 'Alias' => [ 'base' => '

Contains information about an alias.

', 'refs' => [ 'Aliases$member' => NULL, 'CreateAliasOutput$Alias' => '

The alias for the key.

', 'GetAliasOutput$Alias' => '

The alias of the Amazon Web Services Payment Cryptography key.

', 'UpdateAliasOutput$Alias' => '

The alias name.

', ], ], 'AliasName' => [ 'base' => NULL, 'refs' => [ 'Alias$AliasName' => '

A friendly name that you can use to refer to a key. The value must begin with alias/.

Do not include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.

', 'CreateAliasInput$AliasName' => '

A friendly name that you can use to refer a key. An alias must begin with alias/ followed by a name, for example alias/ExampleAlias. It can contain only alphanumeric characters, forward slashes (/), underscores (_), and dashes (-).

Don\'t include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.

', 'DeleteAliasInput$AliasName' => '

A friendly name that you can use to refer Amazon Web Services Payment Cryptography key. This value must begin with alias/ followed by a name, such as alias/ExampleAlias.

', 'GetAliasInput$AliasName' => '

The alias of the Amazon Web Services Payment Cryptography key.

', 'UpdateAliasInput$AliasName' => '

The alias whose associated key is changing.

', ], ], 'Aliases' => [ 'base' => NULL, 'refs' => [ 'ListAliasesOutput$Aliases' => '

The list of aliases. Each alias describes the KeyArn contained within.

', ], ], 'Boolean' => [ 'base' => NULL, 'refs' => [ 'CreateKeyInput$Enabled' => '

Specifies whether to enable the key. If the key is enabled, it is activated for use within the service. If the key not enabled, then it is created but not activated. The default value is enabled.

', 'CreateKeyInput$Exportable' => '

Specifies whether the key is exportable from the service.

', 'ImportKeyInput$Enabled' => '

Specifies whether import key is enabled.

', 'Key$Enabled' => '

Specifies whether the key is enabled.

', 'Key$Exportable' => '

Specifies whether the key is exportable. This data is immutable after the key is created.

', 'KeySummary$Enabled' => '

Specifies whether the key is enabled.

', 'KeySummary$Exportable' => '

Specifies whether the key is exportable. This data is immutable after the key is created.

', ], ], 'CertificateType' => [ 'base' => NULL, 'refs' => [ 'ExportTr34KeyBlock$WrappingKeyCertificate' => '

The KeyARN of the wrapping key certificate. Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.

', 'GetParametersForExportOutput$SigningKeyCertificate' => '

The signing key certificate of the public key for signature within the TR-34 key block cryptogram. The certificate expires after 7 days.

', 'GetParametersForExportOutput$SigningKeyCertificateChain' => '

The certificate chain that signed the signing key certificate. This is the root certificate authority (CA) within your service account.

', 'GetParametersForImportOutput$WrappingKeyCertificate' => '

The wrapping key certificate of the wrapping key for use within the TR-34 key block. The certificate expires in 7 days.

', 'GetParametersForImportOutput$WrappingKeyCertificateChain' => '

The Amazon Web Services Payment Cryptography certificate chain that signed the wrapping key certificate. This is the root certificate authority (CA) within your service account.

', 'GetPublicKeyCertificateOutput$KeyCertificate' => '

The public key component of the asymmetric key pair in a certificate (PEM) format. It is signed by the root certificate authority (CA) within your service account. The certificate expires in 90 days.

', 'GetPublicKeyCertificateOutput$KeyCertificateChain' => '

The certificate chain that signed the public key certificate of the asymmetric key pair. This is the root certificate authority (CA) within your service account.

', 'ImportTr34KeyBlock$SigningKeyCertificate' => '

The public key component in PEM certificate format of the private key that signs the KDH TR-34 wrapped key block.

', 'RootCertificatePublicKey$PublicKeyCertificate' => '

Parameter information for root public key certificate import.

', 'TrustedCertificatePublicKey$PublicKeyCertificate' => '

Parameter information for trusted public key certificate import.

', ], ], 'ConflictException' => [ 'base' => '

This request can cause an inconsistent state for the resource.

', 'refs' => [], ], 'CreateAliasInput' => [ 'base' => NULL, 'refs' => [], ], 'CreateAliasOutput' => [ 'base' => NULL, 'refs' => [], ], 'CreateKeyInput' => [ 'base' => NULL, 'refs' => [], ], 'CreateKeyOutput' => [ 'base' => NULL, 'refs' => [], ], 'DeleteAliasInput' => [ 'base' => NULL, 'refs' => [], ], 'DeleteAliasOutput' => [ 'base' => NULL, 'refs' => [], ], 'DeleteKeyInput' => [ 'base' => NULL, 'refs' => [], ], 'DeleteKeyInputDeleteKeyInDaysInteger' => [ 'base' => NULL, 'refs' => [ 'DeleteKeyInput$DeleteKeyInDays' => '

The waiting period for key deletion. The default value is seven days.

', ], ], 'DeleteKeyOutput' => [ 'base' => NULL, 'refs' => [], ], 'ExportKeyInput' => [ 'base' => NULL, 'refs' => [], ], 'ExportKeyMaterial' => [ 'base' => '

Parameter information for key material export from Amazon Web Services Payment Cryptography.

', 'refs' => [ 'ExportKeyInput$KeyMaterial' => '

The key block format type, for example, TR-34 or TR-31, to use during key material export.

', ], ], 'ExportKeyOutput' => [ 'base' => NULL, 'refs' => [], ], 'ExportTokenId' => [ 'base' => NULL, 'refs' => [ 'ExportTr34KeyBlock$ExportToken' => '

The export token to initiate key export from Amazon Web Services Payment Cryptography. It also contains the signing key certificate that will sign the wrapped key during TR-34 key block generation. Call GetParametersForExport to receive an export token. It expires after 7 days. You can use the same export token to export multiple keys from the same service account.

', 'GetParametersForExportOutput$ExportToken' => '

The export token to initiate key export from Amazon Web Services Payment Cryptography. The export token expires after 7 days. You can use the same export token to export multiple keys from the same service account.

', ], ], 'ExportTr31KeyBlock' => [ 'base' => '

Parameter information for key material export using TR-31 standard.

', 'refs' => [ 'ExportKeyMaterial$Tr31KeyBlock' => '

Parameter information for key material export using TR-31 standard.

', ], ], 'ExportTr34KeyBlock' => [ 'base' => '

Parameter information for key material export using TR-34 standard.

', 'refs' => [ 'ExportKeyMaterial$Tr34KeyBlock' => '

Parameter information for key material export using TR-34 standard.

', ], ], 'GetAliasInput' => [ 'base' => NULL, 'refs' => [], ], 'GetAliasOutput' => [ 'base' => NULL, 'refs' => [], ], 'GetKeyInput' => [ 'base' => NULL, 'refs' => [], ], 'GetKeyOutput' => [ 'base' => NULL, 'refs' => [], ], 'GetParametersForExportInput' => [ 'base' => NULL, 'refs' => [], ], 'GetParametersForExportOutput' => [ 'base' => NULL, 'refs' => [], ], 'GetParametersForImportInput' => [ 'base' => NULL, 'refs' => [], ], 'GetParametersForImportOutput' => [ 'base' => NULL, 'refs' => [], ], 'GetPublicKeyCertificateInput' => [ 'base' => NULL, 'refs' => [], ], 'GetPublicKeyCertificateOutput' => [ 'base' => NULL, 'refs' => [], ], 'HexLength16' => [ 'base' => NULL, 'refs' => [ 'ExportTr34KeyBlock$RandomNonce' => '

A random number value that is unique to the TR-34 key block generated using 2 pass. The operation will fail, if a random nonce value is not provided for a TR-34 key block generated using 2 pass.

', 'ImportTr34KeyBlock$RandomNonce' => '

A random number value that is unique to the TR-34 key block generated using 2 pass. The operation will fail, if a random nonce value is not provided for a TR-34 key block generated using 2 pass.

', ], ], 'ImportKeyInput' => [ 'base' => NULL, 'refs' => [], ], 'ImportKeyMaterial' => [ 'base' => '

Parameter information for key material import.

', 'refs' => [ 'ImportKeyInput$KeyMaterial' => '

The key or public key certificate type to use during key material import, for example TR-34 or RootCertificatePublicKey.

', ], ], 'ImportKeyOutput' => [ 'base' => NULL, 'refs' => [], ], 'ImportTokenId' => [ 'base' => NULL, 'refs' => [ 'GetParametersForImportOutput$ImportToken' => '

The import token to initiate key import into Amazon Web Services Payment Cryptography. The import token expires after 7 days. You can use the same import token to import multiple keys to the same service account.

', 'ImportTr34KeyBlock$ImportToken' => '

The import token that initiates key import into Amazon Web Services Payment Cryptography. It expires after 7 days. You can use the same import token to import multiple keys to the same service account.

', ], ], 'ImportTr31KeyBlock' => [ 'base' => '

Parameter information for key material import using TR-31 standard.

', 'refs' => [ 'ImportKeyMaterial$Tr31KeyBlock' => '

Parameter information for key material import using TR-31 standard.

', ], ], 'ImportTr34KeyBlock' => [ 'base' => '

Parameter information for key material import using TR-34 standard.

', 'refs' => [ 'ImportKeyMaterial$Tr34KeyBlock' => '

Parameter information for key material import using TR-34 standard.

', ], ], 'InternalServerException' => [ 'base' => '

The request processing has failed because of an unknown error, exception, or failure.

', 'refs' => [], ], 'Key' => [ 'base' => '

Metadata about an Amazon Web Services Payment Cryptography key.

', 'refs' => [ 'CreateKeyOutput$Key' => '

The key material that contains all the key attributes.

', 'DeleteKeyOutput$Key' => '

The KeyARN of the key that is scheduled for deletion.

', 'GetKeyOutput$Key' => '

The key material, including the immutable and mutable data for the key.

', 'ImportKeyOutput$Key' => '

The KeyARN of the key material imported within Amazon Web Services Payment Cryptography.

', 'RestoreKeyOutput$Key' => '

The key material of the restored key. The KeyState will change to CREATE_COMPLETE and value for DeletePendingTimestamp gets removed.

', 'StartKeyUsageOutput$Key' => '

The KeyARN of the Amazon Web Services Payment Cryptography key activated for use.

', 'StopKeyUsageOutput$Key' => '

The KeyARN of the key.

', ], ], 'KeyAlgorithm' => [ 'base' => NULL, 'refs' => [ 'GetParametersForExportInput$SigningKeyAlgorithm' => '

The signing key algorithm to generate a signing key certificate. This certificate signs the wrapped key under export within the TR-34 key block cryptogram. RSA_2048 is the only signing key algorithm allowed.

', 'GetParametersForExportOutput$SigningKeyAlgorithm' => '

The algorithm of the signing key certificate for use in TR-34 key block generation. RSA_2048 is the only signing key algorithm allowed.

', 'GetParametersForImportInput$WrappingKeyAlgorithm' => '

The wrapping key algorithm to generate a wrapping key certificate. This certificate wraps the key under import within the TR-34 key block cryptogram. RSA_2048 is the only wrapping key algorithm allowed.

', 'GetParametersForImportOutput$WrappingKeyAlgorithm' => '

The algorithm of the wrapping key for use within TR-34 key block. RSA_2048 is the only wrapping key algorithm allowed.

', 'KeyAttributes$KeyAlgorithm' => '

The key algorithm to be use during creation of an Amazon Web Services Payment Cryptography key.

For symmetric keys, Amazon Web Services Payment Cryptography supports AES and TDES algorithms. For asymmetric keys, Amazon Web Services Payment Cryptography supports RSA and ECC_NIST algorithms.

', ], ], 'KeyArn' => [ 'base' => NULL, 'refs' => [ 'Alias$KeyArn' => '

The KeyARN of the key associated with the alias.

', 'CreateAliasInput$KeyArn' => '

The KeyARN of the key to associate with the alias.

', 'Key$KeyArn' => '

The Amazon Resource Name (ARN) of the key.

', 'KeySummary$KeyArn' => '

The Amazon Resource Name (ARN) of the key.

', 'UpdateAliasInput$KeyArn' => '

The KeyARN for the key that you are updating or removing from the alias.

', 'WrappedKey$WrappingKeyArn' => '

The KeyARN of the wrapped key.

', ], ], 'KeyArnOrKeyAliasType' => [ 'base' => NULL, 'refs' => [ 'DeleteKeyInput$KeyIdentifier' => '

The KeyARN of the key that is scheduled for deletion.

', 'ExportKeyInput$ExportKeyIdentifier' => '

The KeyARN of the key under export from Amazon Web Services Payment Cryptography.

', 'ExportTr31KeyBlock$WrappingKeyIdentifier' => '

The KeyARN of the the wrapping key. This key encrypts or wraps the key under export for TR-31 key block generation.

', 'ExportTr34KeyBlock$CertificateAuthorityPublicKeyIdentifier' => '

The KeyARN of the certificate chain that signs the wrapping key certificate during TR-34 key export.

', 'GetKeyInput$KeyIdentifier' => '

The KeyARN of the Amazon Web Services Payment Cryptography key.

', 'GetPublicKeyCertificateInput$KeyIdentifier' => '

The KeyARN of the asymmetric key pair.

', 'ImportTr31KeyBlock$WrappingKeyIdentifier' => '

The KeyARN of the key that will decrypt or unwrap a TR-31 key block during import.

', 'ImportTr34KeyBlock$CertificateAuthorityPublicKeyIdentifier' => '

The KeyARN of the certificate chain that signs the signing key certificate during TR-34 key import.

', 'RestoreKeyInput$KeyIdentifier' => '

The KeyARN of the key to be restored within Amazon Web Services Payment Cryptography.

', 'StartKeyUsageInput$KeyIdentifier' => '

The KeyArn of the key.

', 'StopKeyUsageInput$KeyIdentifier' => '

The KeyArn of the key.

', 'TrustedCertificatePublicKey$CertificateAuthorityPublicKeyIdentifier' => '

The KeyARN of the root public key certificate or certificate chain that signs the trusted public key certificate import.

', ], ], 'KeyAttributes' => [ 'base' => '

The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.

', 'refs' => [ 'CreateKeyInput$KeyAttributes' => '

The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.

', 'Key$KeyAttributes' => '

The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.

', 'KeySummary$KeyAttributes' => '

The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.

', 'RootCertificatePublicKey$KeyAttributes' => '

The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the root public key is imported.

', 'TrustedCertificatePublicKey$KeyAttributes' => '

The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after a trusted public key is imported.

', ], ], 'KeyCheckValue' => [ 'base' => NULL, 'refs' => [ 'Key$KeyCheckValue' => '

The key check value (KCV) is used to check if all parties holding a given key have the same key or to detect that a key has changed. Amazon Web Services Payment Cryptography calculates the KCV by using standard algorithms, typically by encrypting 8 or 16 bytes or "00" or "01" and then truncating the result to the first 3 bytes, or 6 hex digits, of the resulting cryptogram.

', 'KeySummary$KeyCheckValue' => '

The key check value (KCV) is used to check if all parties holding a given key have the same key or to detect that a key has changed. Amazon Web Services Payment Cryptography calculates the KCV by using standard algorithms, typically by encrypting 8 or 16 bytes or "00" or "01" and then truncating the result to the first 3 bytes, or 6 hex digits, of the resulting cryptogram.

', ], ], 'KeyCheckValueAlgorithm' => [ 'base' => NULL, 'refs' => [ 'CreateKeyInput$KeyCheckValueAlgorithm' => '

The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV) for DES and AES keys.

For DES key, the KCV is computed by encrypting 8 bytes, each with value \'00\', with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES key, the KCV is computed by encrypting 8 bytes, each with value \'01\', with the key to be checked and retaining the 3 highest order bytes of the encrypted result.

', 'ImportKeyInput$KeyCheckValueAlgorithm' => '

The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV) for DES and AES keys.

For DES key, the KCV is computed by encrypting 8 bytes, each with value \'00\', with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES key, the KCV is computed by encrypting 8 bytes, each with value \'01\', with the key to be checked and retaining the 3 highest order bytes of the encrypted result.

', 'Key$KeyCheckValueAlgorithm' => '

The algorithm used for calculating key check value (KCV) for DES and AES keys. For a DES key, Amazon Web Services Payment Cryptography computes the KCV by encrypting 8 bytes, each with value \'00\', with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For an AES key, Amazon Web Services Payment Cryptography computes the KCV by encrypting 8 bytes, each with value \'01\', with the key to be checked and retaining the 3 highest order bytes of the encrypted result.

', ], ], 'KeyClass' => [ 'base' => NULL, 'refs' => [ 'KeyAttributes$KeyClass' => '

The type of Amazon Web Services Payment Cryptography key to create, which determines the classification of the cryptographic method and whether Amazon Web Services Payment Cryptography key contains a symmetric key or an asymmetric key pair.

', ], ], 'KeyMaterial' => [ 'base' => NULL, 'refs' => [ 'WrappedKey$KeyMaterial' => '

Parameter information for generating a wrapped key using TR-31 or TR-34 standard.

', ], ], 'KeyMaterialType' => [ 'base' => NULL, 'refs' => [ 'GetParametersForExportInput$KeyMaterialType' => '

The key block format type (for example, TR-34 or TR-31) to use during key material export. Export token is only required for a TR-34 key export, TR34_KEY_BLOCK. Export token is not required for TR-31 key export.

', 'GetParametersForImportInput$KeyMaterialType' => '

The key block format type such as TR-34 or TR-31 to use during key material import. Import token is only required for TR-34 key import TR34_KEY_BLOCK. Import token is not required for TR-31 key import.

', ], ], 'KeyModesOfUse' => [ 'base' => '

The list of cryptographic operations that you can perform using the key. The modes of use are defined in section A.5.3 of the TR-31 spec.

', 'refs' => [ 'KeyAttributes$KeyModesOfUse' => '

The list of cryptographic operations that you can perform using the key.

', ], ], 'KeyOrigin' => [ 'base' => '

Defines the source of a key

', 'refs' => [ 'Key$KeyOrigin' => '

The source of the key material. For keys created within Amazon Web Services Payment Cryptography, the value is AWS_PAYMENT_CRYPTOGRAPHY. For keys imported into Amazon Web Services Payment Cryptography, the value is EXTERNAL.

', ], ], 'KeyState' => [ 'base' => '

Defines the state of a key

', 'refs' => [ 'Key$KeyState' => '

The state of key that is being created or deleted.

', 'KeySummary$KeyState' => '

The state of an Amazon Web Services Payment Cryptography that is being created or deleted.

', 'ListKeysInput$KeyState' => '

The key state of the keys you want to list.

', ], ], 'KeySummary' => [ 'base' => '

Metadata about an Amazon Web Services Payment Cryptography key.

', 'refs' => [ 'KeySummaryList$member' => NULL, ], ], 'KeySummaryList' => [ 'base' => NULL, 'refs' => [ 'ListKeysOutput$Keys' => '

The list of keys created within the caller\'s Amazon Web Services account and Amazon Web Services Region.

', ], ], 'KeyUsage' => [ 'base' => NULL, 'refs' => [ 'KeyAttributes$KeyUsage' => '

The cryptographic usage of an Amazon Web Services Payment Cryptography key as defined in section A.5.2 of the TR-31 spec.

', ], ], 'ListAliasesInput' => [ 'base' => NULL, 'refs' => [], ], 'ListAliasesOutput' => [ 'base' => NULL, 'refs' => [], ], 'ListKeysInput' => [ 'base' => NULL, 'refs' => [], ], 'ListKeysOutput' => [ 'base' => NULL, 'refs' => [], ], 'ListTagsForResourceInput' => [ 'base' => NULL, 'refs' => [], ], 'ListTagsForResourceOutput' => [ 'base' => NULL, 'refs' => [], ], 'MaxResults' => [ 'base' => NULL, 'refs' => [ 'ListAliasesInput$MaxResults' => '

Use this parameter to specify the maximum number of items to return. When this value is present, Amazon Web Services Payment Cryptography does not return more than the specified number of items, but it might return fewer.

This value is optional. If you include a value, it must be between 1 and 100, inclusive. If you do not include a value, it defaults to 50.

', 'ListKeysInput$MaxResults' => '

Use this parameter to specify the maximum number of items to return. When this value is present, Amazon Web Services Payment Cryptography does not return more than the specified number of items, but it might return fewer.

', 'ListTagsForResourceInput$MaxResults' => '

Use this parameter to specify the maximum number of items to return. When this value is present, Amazon Web Services Payment Cryptography does not return more than the specified number of items, but it might return fewer.

', ], ], 'NextToken' => [ 'base' => NULL, 'refs' => [ 'ListAliasesInput$NextToken' => '

Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of NextToken from the truncated response you just received.

', 'ListAliasesOutput$NextToken' => '

The token for the next set of results, or an empty or null value if there are no more results.

', 'ListKeysInput$NextToken' => '

Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of NextToken from the truncated response you just received.

', 'ListKeysOutput$NextToken' => '

The token for the next set of results, or an empty or null value if there are no more results.

', 'ListTagsForResourceInput$NextToken' => '

Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of NextToken from the truncated response you just received.

', 'ListTagsForResourceOutput$NextToken' => '

The token for the next set of results, or an empty or null value if there are no more results.

', ], ], 'PrimitiveBoolean' => [ 'base' => NULL, 'refs' => [ 'KeyModesOfUse$Decrypt' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to decrypt data.

', 'KeyModesOfUse$DeriveKey' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to derive new keys.

', 'KeyModesOfUse$Encrypt' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to encrypt data.

', 'KeyModesOfUse$Generate' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to generate and verify other card and PIN verification keys.

', 'KeyModesOfUse$NoRestrictions' => '

Specifies whether an Amazon Web Services Payment Cryptography key has no special restrictions other than the restrictions implied by KeyUsage.

', 'KeyModesOfUse$Sign' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used for signing.

', 'KeyModesOfUse$Unwrap' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to unwrap other keys.

', 'KeyModesOfUse$Verify' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to verify signatures.

', 'KeyModesOfUse$Wrap' => '

Specifies whether an Amazon Web Services Payment Cryptography key can be used to wrap other keys.

', ], ], 'ResourceArn' => [ 'base' => NULL, 'refs' => [ 'ListTagsForResourceInput$ResourceArn' => '

The KeyARN of the key whose tags you are getting.

', 'TagResourceInput$ResourceArn' => '

The KeyARN of the key whose tags are being updated.

', 'UntagResourceInput$ResourceArn' => '

The KeyARN of the key whose tags are being removed.

', ], ], 'ResourceNotFoundException' => [ 'base' => '

The request was denied due to an invalid resource error.

', 'refs' => [], ], 'RestoreKeyInput' => [ 'base' => NULL, 'refs' => [], ], 'RestoreKeyOutput' => [ 'base' => NULL, 'refs' => [], ], 'RootCertificatePublicKey' => [ 'base' => '

Parameter information for root public key certificate import.

', 'refs' => [ 'ImportKeyMaterial$RootCertificatePublicKey' => '

Parameter information for root public key certificate import.

', ], ], 'ServiceQuotaExceededException' => [ 'base' => '

This request would cause a service quota to be exceeded.

', 'refs' => [], ], 'ServiceUnavailableException' => [ 'base' => '

The service cannot complete the request.

', 'refs' => [], ], 'StartKeyUsageInput' => [ 'base' => NULL, 'refs' => [], ], 'StartKeyUsageOutput' => [ 'base' => NULL, 'refs' => [], ], 'StopKeyUsageInput' => [ 'base' => NULL, 'refs' => [], ], 'StopKeyUsageOutput' => [ 'base' => NULL, 'refs' => [], ], 'String' => [ 'base' => NULL, 'refs' => [ 'AccessDeniedException$Message' => NULL, 'ConflictException$Message' => NULL, 'InternalServerException$Message' => NULL, 'ResourceNotFoundException$ResourceId' => '

The string for the exception.

', 'ServiceQuotaExceededException$Message' => NULL, 'ServiceUnavailableException$Message' => NULL, 'ThrottlingException$Message' => NULL, 'ValidationException$Message' => NULL, ], ], 'Tag' => [ 'base' => '

A structure that contains information about a tag.

', 'refs' => [ 'Tags$member' => NULL, ], ], 'TagKey' => [ 'base' => NULL, 'refs' => [ 'Tag$Key' => '

The key of the tag.

', 'TagKeys$member' => NULL, ], ], 'TagKeys' => [ 'base' => NULL, 'refs' => [ 'UntagResourceInput$TagKeys' => '

One or more tag keys. Don\'t include the tag values.

If the Amazon Web Services Payment Cryptography key doesn\'t have the specified tag key, Amazon Web Services Payment Cryptography doesn\'t throw an exception or return a response. To confirm that the operation succeeded, use the ListTagsForResource operation.

', ], ], 'TagResourceInput' => [ 'base' => NULL, 'refs' => [], ], 'TagResourceOutput' => [ 'base' => NULL, 'refs' => [], ], 'TagValue' => [ 'base' => NULL, 'refs' => [ 'Tag$Value' => '

The value of the tag.

', ], ], 'Tags' => [ 'base' => NULL, 'refs' => [ 'CreateKeyInput$Tags' => '

The tags to attach to the key. Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You can\'t have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key.

To use this parameter, you must have TagResource permission.

Don\'t include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.

Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.

', 'ImportKeyInput$Tags' => '

The tags to attach to the key. Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You can\'t have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key.

You can\'t have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key. If you specify an existing tag key with a different tag value, Amazon Web Services Payment Cryptography replaces the current tag value with the specified one.

To use this parameter, you must have TagResource permission.

Don\'t include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.

Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.

', 'ListTagsForResourceOutput$Tags' => '

The list of tags associated with a ResourceArn. Each tag will list the key-value pair contained within that tag.

', 'TagResourceInput$Tags' => '

One or more tags. Each tag consists of a tag key and a tag value. The tag value can be an empty (null) string. You can\'t have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key. If you specify an existing tag key with a different tag value, Amazon Web Services Payment Cryptography replaces the current tag value with the new one.

Don\'t include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.

To use this parameter, you must have TagResource permission in an IAM policy.

Don\'t include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.

', ], ], 'ThrottlingException' => [ 'base' => '

The request was denied due to request throttling.

', 'refs' => [], ], 'Timestamp' => [ 'base' => NULL, 'refs' => [ 'GetParametersForExportOutput$ParametersValidUntilTimestamp' => '

The validity period of the export token.

', 'GetParametersForImportOutput$ParametersValidUntilTimestamp' => '

The validity period of the import token.

', 'Key$CreateTimestamp' => '

The date and time when the key was created.

', 'Key$DeletePendingTimestamp' => '

The date and time after which Amazon Web Services Payment Cryptography will delete the key. This value is present only when KeyState is DELETE_PENDING and the key is scheduled for deletion.

', 'Key$DeleteTimestamp' => '

The date and time after which Amazon Web Services Payment Cryptography will delete the key. This value is present only when when the KeyState is DELETE_COMPLETE and the Amazon Web Services Payment Cryptography key is deleted.

', 'Key$UsageStartTimestamp' => '

The date and time after which Amazon Web Services Payment Cryptography will start using the key material for cryptographic operations.

', 'Key$UsageStopTimestamp' => '

The date and time after which Amazon Web Services Payment Cryptography will stop using the key material for cryptographic operations.

', ], ], 'Tr31WrappedKeyBlock' => [ 'base' => NULL, 'refs' => [ 'ImportTr31KeyBlock$WrappedKeyBlock' => '

The TR-34 wrapped key block to import.

', ], ], 'Tr34KeyBlockFormat' => [ 'base' => NULL, 'refs' => [ 'ExportTr34KeyBlock$KeyBlockFormat' => '

The format of key block that Amazon Web Services Payment Cryptography will use during key export.

', 'ImportTr34KeyBlock$KeyBlockFormat' => '

The key block format to use during key import. The only value allowed is X9_TR34_2012.

', ], ], 'Tr34WrappedKeyBlock' => [ 'base' => NULL, 'refs' => [ 'ImportTr34KeyBlock$WrappedKeyBlock' => '

The TR-34 wrapped key block to import.

', ], ], 'TrustedCertificatePublicKey' => [ 'base' => '

Parameter information for trusted public key certificate import.

', 'refs' => [ 'ImportKeyMaterial$TrustedCertificatePublicKey' => '

Parameter information for trusted public key certificate import.

', ], ], 'UntagResourceInput' => [ 'base' => NULL, 'refs' => [], ], 'UntagResourceOutput' => [ 'base' => NULL, 'refs' => [], ], 'UpdateAliasInput' => [ 'base' => NULL, 'refs' => [], ], 'UpdateAliasOutput' => [ 'base' => NULL, 'refs' => [], ], 'ValidationException' => [ 'base' => '

The request was denied due to an invalid request error.

', 'refs' => [], ], 'WrappedKey' => [ 'base' => '

Parameter information for generating a wrapped key using TR-31 or TR-34 standard.

', 'refs' => [ 'ExportKeyOutput$WrappedKey' => '

The key material under export as a TR-34 or TR-31 wrapped key block.

', ], ], 'WrappedKeyMaterialFormat' => [ 'base' => NULL, 'refs' => [ 'WrappedKey$WrappedKeyMaterialFormat' => '

The key block format of a wrapped key.

', ], ], ],];