You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Link to GitHub issue for previous review sessions, if applicable: N/A
About the client library
Name of the client library: Azure.Security.KeyVault.Keys
Languages for this review: C#, Java
Artifacts required (per language)
Please read through “API Review” section here to understand how these artifacts are generated. It is critical that these artifacts are present and are in the right format. If not, the language architects cannot review them with the SDK Team’s API review tool.
Link to Champion Scenarios/Quickstart samples: I opened an issue to track updating our samples with these new methods. In the meantime, a use case would look like:
Link to Champion Scenarios/Quickstart samples: There's an open issue to track updating our samples with these new methods. In the meantime, the current samples can be found here. Additionally, a use case would look like:
EncryptOptionsencryptOptions = EncryptOptions.createAes128CbcOptions(myPlainText, iv);
EncryptResultencryptedResult = cryptographyClient.encrypt(encryptOptions, context);
System.out.printf("Received encrypted content of length %d with algorithm %s \n",
encryptedResult.getCipherText().length, encryptedResult.getAlgorithm().toString());
Additional notes
Effectively, we use factory methods to help enforce certain options for certain algorithms. For example, AES-GCM support takes optional "AdditionalAuthenticatedData", while AES-CBC and AES-CBCPAD take an optional IV (we generate one if not provided; IV is required by the service but treated as an nonce in some cases). This design had been previously discussed with @KrzysztofCwalina and reviewed by the Microsoft Crypto Board.
The text was updated successfully, but these errors were encountered:
Contacts and Timeline
About the Service
About the client library
Artifacts required (per language)
Please read through “API Review” section here to understand how these artifacts are generated. It is critical that these artifacts are present and are in the right format. If not, the language architects cannot review them with the SDK Team’s API review tool.
.NET
(was https://apiview.dev/Assemblies/Review/d74052731cb94759804beaa492b7a17a/8e114ef64afd4a6584ca4ec16e2ebc30?diffRevisionId=c941dc7b59ba45f483f8cad9a34e98bf&doc=False#Azure.Security.KeyVault.Keys.Cryptography.CryptographyClient) but more comments were recently left on the auto-review)
Java
Additional notes
Effectively, we use factory methods to help enforce certain options for certain algorithms. For example, AES-GCM support takes optional "AdditionalAuthenticatedData", while AES-CBC and AES-CBCPAD take an optional IV (we generate one if not provided; IV is required by the service but treated as an nonce in some cases). This design had been previously discussed with @KrzysztofCwalina and reviewed by the Microsoft Crypto Board.
The text was updated successfully, but these errors were encountered: