From a947132108205b2712bb43064b6b4b13800736b6 Mon Sep 17 00:00:00 2001 From: Heath Stewart Date: Mon, 24 May 2021 15:23:38 -0700 Subject: [PATCH 1/2] Resolve APIView unification comments for Key Vault --- .../Azure.Security.KeyVault.Keys/CHANGELOG.md | 5 ++ .../src/Cryptography/CryptographyClient.cs | 48 +++++++++---------- .../src/Cryptography/DecryptParameters.cs | 18 +++---- .../src/Cryptography/EncryptParameters.cs | 18 +++---- 4 files changed, 47 insertions(+), 42 deletions(-) diff --git a/sdk/keyvault/Azure.Security.KeyVault.Keys/CHANGELOG.md b/sdk/keyvault/Azure.Security.KeyVault.Keys/CHANGELOG.md index a065115207c6..d62663720e43 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Keys/CHANGELOG.md +++ b/sdk/keyvault/Azure.Security.KeyVault.Keys/CHANGELOG.md @@ -2,6 +2,11 @@ ## 4.2.0-beta.7 (Unreleased) +### Breaking Changes + +- Renamed `additionalAuthenticationData` factory method parameters to `additionalAuthenticatedData` to match properties and constructor parameters. +- Renamed `parameters` parameter to `decryptParameters` for `CryptographyClient.Decrypt` and `DecryptAsync`. +- Renamed `parameters` parameter to `encryptParameters` for `CryptographyClient.Encrypt` and `EncryptAsync`. ## 4.2.0-beta.6 (2021-05-11) diff --git a/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/CryptographyClient.cs b/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/CryptographyClient.cs index e63b556178af..16e1e6f93ab0 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/CryptographyClient.cs +++ b/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/CryptographyClient.cs @@ -212,20 +212,20 @@ public virtual EncryptResult Encrypt(EncryptionAlgorithm algorithm, byte[] plain /// /// Encrypts plaintext. /// - /// An containing the data to encrypt and other parameters for algorithm-dependent encryption. + /// An containing the data to encrypt and other parameters for algorithm-dependent encryption. /// A to cancel the operation. /// /// An containing the encrypted data /// along with all other information needed to decrypt it. This information should be stored with the encrypted data. /// /// The specified algorithm does not match the key corresponding to the key identifier. - /// is null. + /// is null. /// The local cryptographic provider threw an exception. /// The key is invalid for the current operation. /// The operation is not supported with the specified key. - public virtual async Task EncryptAsync(EncryptParameters parameters, CancellationToken cancellationToken = default) + public virtual async Task EncryptAsync(EncryptParameters encryptParameters, CancellationToken cancellationToken = default) { - Argument.AssertNotNull(parameters, nameof(parameters)); + Argument.AssertNotNull(encryptParameters, nameof(encryptParameters)); using DiagnosticScope scope = _pipeline.CreateScope($"{nameof(CryptographyClient)}.{nameof(Encrypt)}"); scope.AddAttribute("key", _keyId); @@ -243,7 +243,7 @@ public virtual async Task EncryptAsync(EncryptParameters paramete { try { - result = await _provider.EncryptAsync(parameters, cancellationToken).ConfigureAwait(false); + result = await _provider.EncryptAsync(encryptParameters, cancellationToken).ConfigureAwait(false); } catch (CryptographicException ex) when (_provider.CanRemote) { @@ -256,7 +256,7 @@ public virtual async Task EncryptAsync(EncryptParameters paramete { ThrowIfLocalOnly(nameof(Encrypt)); - result = await _remoteProvider.EncryptAsync(parameters, cancellationToken).ConfigureAwait(false); + result = await _remoteProvider.EncryptAsync(encryptParameters, cancellationToken).ConfigureAwait(false); } return result; @@ -271,20 +271,20 @@ public virtual async Task EncryptAsync(EncryptParameters paramete /// /// Encrypts plaintext. /// - /// An containing the data to encrypt and other parameters for algorithm-dependent encryption. + /// An containing the data to encrypt and other parameters for algorithm-dependent encryption. /// A to cancel the operation. /// /// An containing the encrypted data /// along with all other information needed to decrypt it. This information should be stored with the encrypted data. /// /// The specified algorithm does not match the key corresponding to the key identifier. - /// is null. + /// is null. /// The local cryptographic provider threw an exception. /// The key is invalid for the current operation. /// The operation is not supported with the specified key. - public virtual EncryptResult Encrypt(EncryptParameters parameters, CancellationToken cancellationToken = default) + public virtual EncryptResult Encrypt(EncryptParameters encryptParameters, CancellationToken cancellationToken = default) { - Argument.AssertNotNull(parameters, nameof(parameters)); + Argument.AssertNotNull(encryptParameters, nameof(encryptParameters)); using DiagnosticScope scope = _pipeline.CreateScope($"{nameof(CryptographyClient)}.{nameof(Encrypt)}"); scope.AddAttribute("key", _keyId); @@ -302,7 +302,7 @@ public virtual EncryptResult Encrypt(EncryptParameters parameters, CancellationT { try { - result = _provider.Encrypt(parameters, cancellationToken); + result = _provider.Encrypt(encryptParameters, cancellationToken); } catch (CryptographicException ex) when (_provider.CanRemote) { @@ -314,7 +314,7 @@ public virtual EncryptResult Encrypt(EncryptParameters parameters, CancellationT { ThrowIfLocalOnly(nameof(Encrypt)); - result = _remoteProvider.Encrypt(parameters, cancellationToken); + result = _remoteProvider.Encrypt(encryptParameters, cancellationToken); } return result; @@ -363,20 +363,20 @@ public virtual DecryptResult Decrypt(EncryptionAlgorithm algorithm, byte[] ciphe /// /// Decrypts ciphertext. /// - /// A containing the data to decrypt and other parameters for algorithm-dependent decryption. + /// A containing the data to decrypt and other parameters for algorithm-dependent decryption. /// A to cancel the operation. /// /// The result of the decrypt operation. The returned contains the encrypted data /// along with information regarding the algorithm and key used to decrypt it. /// /// The specified algorithm does not match the key corresponding to the key identifier. - /// is null. + /// is null. /// The local cryptographic provider threw an exception. /// The key is invalid for the current operation. /// The operation is not supported with the specified key. - public virtual async Task DecryptAsync(DecryptParameters parameters, CancellationToken cancellationToken = default) + public virtual async Task DecryptAsync(DecryptParameters decryptParameters, CancellationToken cancellationToken = default) { - Argument.AssertNotNull(parameters, nameof(parameters)); + Argument.AssertNotNull(decryptParameters, nameof(decryptParameters)); using DiagnosticScope scope = _pipeline.CreateScope($"{nameof(CryptographyClient)}.{nameof(Decrypt)}"); scope.AddAttribute("key", _keyId); @@ -394,7 +394,7 @@ public virtual async Task DecryptAsync(DecryptParameters paramete { try { - result = await _provider.DecryptAsync(parameters, cancellationToken).ConfigureAwait(false); + result = await _provider.DecryptAsync(decryptParameters, cancellationToken).ConfigureAwait(false); } catch (CryptographicException ex) when (_provider.CanRemote) { @@ -407,7 +407,7 @@ public virtual async Task DecryptAsync(DecryptParameters paramete { ThrowIfLocalOnly(nameof(Decrypt)); - result = await _remoteProvider.DecryptAsync(parameters, cancellationToken).ConfigureAwait(false); + result = await _remoteProvider.DecryptAsync(decryptParameters, cancellationToken).ConfigureAwait(false); } return result; @@ -422,20 +422,20 @@ public virtual async Task DecryptAsync(DecryptParameters paramete /// /// Decrypts the specified ciphertext. /// - /// A containing the data to decrypt and other parameters for algorithm-dependent decryption. + /// A containing the data to decrypt and other parameters for algorithm-dependent decryption. /// A to cancel the operation. /// /// The result of the decrypt operation. The returned contains the encrypted data /// along with information regarding the algorithm and key used to decrypt it. /// /// The specified algorithm does not match the key corresponding to the key identifier. - /// is null. + /// is null. /// The local cryptographic provider threw an exception. /// The key is invalid for the current operation. /// The operation is not supported with the specified key. - public virtual DecryptResult Decrypt(DecryptParameters parameters, CancellationToken cancellationToken = default) + public virtual DecryptResult Decrypt(DecryptParameters decryptParameters, CancellationToken cancellationToken = default) { - Argument.AssertNotNull(parameters, nameof(parameters)); + Argument.AssertNotNull(decryptParameters, nameof(decryptParameters)); using DiagnosticScope scope = _pipeline.CreateScope($"{nameof(CryptographyClient)}.{nameof(Decrypt)}"); scope.AddAttribute("key", _keyId); @@ -453,7 +453,7 @@ public virtual DecryptResult Decrypt(DecryptParameters parameters, CancellationT { try { - result = _provider.Decrypt(parameters, cancellationToken); + result = _provider.Decrypt(decryptParameters, cancellationToken); } catch (CryptographicException ex) when (_provider.CanRemote) { @@ -465,7 +465,7 @@ public virtual DecryptResult Decrypt(DecryptParameters parameters, CancellationT { ThrowIfLocalOnly(nameof(Decrypt)); - result = _remoteProvider.Decrypt(parameters, cancellationToken); + result = _remoteProvider.Decrypt(decryptParameters, cancellationToken); } return result; diff --git a/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/DecryptParameters.cs b/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/DecryptParameters.cs index d6d77fc2c839..a103b76598ea 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/DecryptParameters.cs +++ b/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/DecryptParameters.cs @@ -45,11 +45,11 @@ public static DecryptParameters RsaOaep256Parameters(byte[] ciphertext) => /// The ciphertext to decrypt. /// The initialization vector (or nonce) generated during encryption. /// The authentication tag generated during encryption. - /// Optional data that is authenticated but not encrypted. + /// Optional data that is authenticated but not encrypted. /// An instance of the class for the encryption algorithm. /// , , or is null. - public static DecryptParameters A128GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticationData = null) => - new DecryptParameters(EncryptionAlgorithm.A128Gcm, ciphertext, iv, authenticationTag, additionalAuthenticationData); + public static DecryptParameters A128GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticatedData = null) => + new DecryptParameters(EncryptionAlgorithm.A128Gcm, ciphertext, iv, authenticationTag, additionalAuthenticatedData); /// /// Creates an instance of the class for the encryption algorithm. @@ -57,11 +57,11 @@ public static DecryptParameters A128GcmParameters(byte[] ciphertext, byte[] iv, /// The ciphertext to decrypt. /// The initialization vector (or nonce) generated during encryption. /// The authentication tag generated during encryption. - /// Optional data that is authenticated but not encrypted. + /// Optional data that is authenticated but not encrypted. /// An instance of the class for the encryption algorithm. /// , , or is null. - public static DecryptParameters A192GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticationData = null) => - new DecryptParameters(EncryptionAlgorithm.A192Gcm, ciphertext, iv, authenticationTag, additionalAuthenticationData); + public static DecryptParameters A192GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticatedData = null) => + new DecryptParameters(EncryptionAlgorithm.A192Gcm, ciphertext, iv, authenticationTag, additionalAuthenticatedData); /// /// Creates an instance of the class for the encryption algorithm. @@ -69,11 +69,11 @@ public static DecryptParameters A192GcmParameters(byte[] ciphertext, byte[] iv, /// The ciphertext to decrypt. /// The initialization vector (or nonce) generated during encryption. /// The authentication tag generated during encryption. - /// Optional data that is authenticated but not encrypted. + /// Optional data that is authenticated but not encrypted. /// An instance of the class for the encryption algorithm. /// , , or is null. - public static DecryptParameters A256GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticationData = null) => - new DecryptParameters(EncryptionAlgorithm.A256Gcm, ciphertext, iv, authenticationTag, additionalAuthenticationData); + public static DecryptParameters A256GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticatedData = null) => + new DecryptParameters(EncryptionAlgorithm.A256Gcm, ciphertext, iv, authenticationTag, additionalAuthenticatedData); /// /// Creates an instance of the class for the encryption algorithm. diff --git a/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/EncryptParameters.cs b/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/EncryptParameters.cs index 74884ed1ac00..ba26b9c8867b 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/EncryptParameters.cs +++ b/sdk/keyvault/Azure.Security.KeyVault.Keys/src/Cryptography/EncryptParameters.cs @@ -45,33 +45,33 @@ public static EncryptParameters RsaOaep256Parameters(byte[] plaintext) => /// The nonce will be generated automatically and returned in the after encryption. /// /// The plaintext to encrypt. - /// Optional data that is authenticated but not encrypted. + /// Optional data that is authenticated but not encrypted. /// An instance of the class for the encryption algorithm. /// is null. - public static EncryptParameters A128GcmParameters(byte[] plaintext, byte[] additionalAuthenticationData = null) => - new EncryptParameters(EncryptionAlgorithm.A128Gcm, plaintext, null, additionalAuthenticationData); + public static EncryptParameters A128GcmParameters(byte[] plaintext, byte[] additionalAuthenticatedData = null) => + new EncryptParameters(EncryptionAlgorithm.A128Gcm, plaintext, null, additionalAuthenticatedData); /// /// Creates an instance of the class for the encryption algorithm. /// The nonce will be generated automatically and returned in the after encryption. /// /// The plaintext to encrypt. - /// Optional data that is authenticated but not encrypted. + /// Optional data that is authenticated but not encrypted. /// An instance of the class for the encryption algorithm. /// is null. - public static EncryptParameters A192GcmParameters(byte[] plaintext, byte[] additionalAuthenticationData = null) => - new EncryptParameters(EncryptionAlgorithm.A192Gcm, plaintext, null, additionalAuthenticationData); + public static EncryptParameters A192GcmParameters(byte[] plaintext, byte[] additionalAuthenticatedData = null) => + new EncryptParameters(EncryptionAlgorithm.A192Gcm, plaintext, null, additionalAuthenticatedData); /// /// Creates an instance of the class for the encryption algorithm. /// The nonce will be generated automatically and returned in the after encryption. /// /// The plaintext to encrypt. - /// Optional data that is authenticated but not encrypted. + /// Optional data that is authenticated but not encrypted. /// An instance of the class for the encryption algorithm. /// is null. - public static EncryptParameters A256GcmParameters(byte[] plaintext, byte[] additionalAuthenticationData = null) => - new EncryptParameters(EncryptionAlgorithm.A256Gcm, plaintext, null, additionalAuthenticationData); + public static EncryptParameters A256GcmParameters(byte[] plaintext, byte[] additionalAuthenticatedData = null) => + new EncryptParameters(EncryptionAlgorithm.A256Gcm, plaintext, null, additionalAuthenticatedData); /// /// Creates an instance of the class for the encryption algorithm. From 51ce14940a4f79687cb98e2f38a96c92ce04ba55 Mon Sep 17 00:00:00 2001 From: Heath Stewart Date: Mon, 24 May 2021 15:42:47 -0700 Subject: [PATCH 2/2] Update public APIs --- ...e.Security.KeyVault.Keys.netstandard2.0.cs | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/sdk/keyvault/Azure.Security.KeyVault.Keys/api/Azure.Security.KeyVault.Keys.netstandard2.0.cs b/sdk/keyvault/Azure.Security.KeyVault.Keys/api/Azure.Security.KeyVault.Keys.netstandard2.0.cs index 784d3a42b919..272f46bb080c 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Keys/api/Azure.Security.KeyVault.Keys.netstandard2.0.cs +++ b/sdk/keyvault/Azure.Security.KeyVault.Keys/api/Azure.Security.KeyVault.Keys.netstandard2.0.cs @@ -297,14 +297,14 @@ public CryptographyClient(System.Uri keyId, Azure.Core.TokenCredential credentia System.Threading.Tasks.Task Azure.Core.Cryptography.IKeyEncryptionKey.UnwrapKeyAsync(string algorithm, System.ReadOnlyMemory encryptedKey, System.Threading.CancellationToken cancellationToken) { throw null; } byte[] Azure.Core.Cryptography.IKeyEncryptionKey.WrapKey(string algorithm, System.ReadOnlyMemory key, System.Threading.CancellationToken cancellationToken) { throw null; } System.Threading.Tasks.Task Azure.Core.Cryptography.IKeyEncryptionKey.WrapKeyAsync(string algorithm, System.ReadOnlyMemory key, System.Threading.CancellationToken cancellationToken) { throw null; } - public virtual Azure.Security.KeyVault.Keys.Cryptography.DecryptResult Decrypt(Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters parameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } + public virtual Azure.Security.KeyVault.Keys.Cryptography.DecryptResult Decrypt(Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters decryptParameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual Azure.Security.KeyVault.Keys.Cryptography.DecryptResult Decrypt(Azure.Security.KeyVault.Keys.Cryptography.EncryptionAlgorithm algorithm, byte[] ciphertext, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } - public virtual System.Threading.Tasks.Task DecryptAsync(Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters parameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } + public virtual System.Threading.Tasks.Task DecryptAsync(Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters decryptParameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual System.Threading.Tasks.Task DecryptAsync(Azure.Security.KeyVault.Keys.Cryptography.EncryptionAlgorithm algorithm, byte[] ciphertext, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual Azure.Security.KeyVault.Keys.Cryptography.EncryptResult Encrypt(Azure.Security.KeyVault.Keys.Cryptography.EncryptionAlgorithm algorithm, byte[] plaintext, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } - public virtual Azure.Security.KeyVault.Keys.Cryptography.EncryptResult Encrypt(Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters parameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } + public virtual Azure.Security.KeyVault.Keys.Cryptography.EncryptResult Encrypt(Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters encryptParameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual System.Threading.Tasks.Task EncryptAsync(Azure.Security.KeyVault.Keys.Cryptography.EncryptionAlgorithm algorithm, byte[] plaintext, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } - public virtual System.Threading.Tasks.Task EncryptAsync(Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters parameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } + public virtual System.Threading.Tasks.Task EncryptAsync(Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters encryptParameters, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual Azure.Security.KeyVault.Keys.Cryptography.SignResult Sign(Azure.Security.KeyVault.Keys.Cryptography.SignatureAlgorithm algorithm, byte[] digest, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual System.Threading.Tasks.Task SignAsync(Azure.Security.KeyVault.Keys.Cryptography.SignatureAlgorithm algorithm, byte[] digest, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } public virtual Azure.Security.KeyVault.Keys.Cryptography.SignResult SignData(Azure.Security.KeyVault.Keys.Cryptography.SignatureAlgorithm algorithm, byte[] data, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) { throw null; } @@ -343,13 +343,13 @@ internal DecryptParameters() { } public byte[] Iv { get { throw null; } } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A128CbcPadParameters(byte[] ciphertext, byte[] iv) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A128CbcParameters(byte[] ciphertext, byte[] iv) { throw null; } - public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A128GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticationData = null) { throw null; } + public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A128GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticatedData = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A192CbcPadParameters(byte[] ciphertext, byte[] iv) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A192CbcParameters(byte[] ciphertext, byte[] iv) { throw null; } - public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A192GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticationData = null) { throw null; } + public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A192GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticatedData = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A256CbcPadParameters(byte[] ciphertext, byte[] iv) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A256CbcParameters(byte[] ciphertext, byte[] iv) { throw null; } - public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A256GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticationData = null) { throw null; } + public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters A256GcmParameters(byte[] ciphertext, byte[] iv, byte[] authenticationTag, byte[] additionalAuthenticatedData = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters Rsa15Parameters(byte[] ciphertext) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters RsaOaep256Parameters(byte[] ciphertext) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.DecryptParameters RsaOaepParameters(byte[] ciphertext) { throw null; } @@ -398,13 +398,13 @@ internal EncryptParameters() { } public byte[] Plaintext { get { throw null; } } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A128CbcPadParameters(byte[] plaintext, byte[] iv = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A128CbcParameters(byte[] plaintext, byte[] iv = null) { throw null; } - public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A128GcmParameters(byte[] plaintext, byte[] additionalAuthenticationData = null) { throw null; } + public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A128GcmParameters(byte[] plaintext, byte[] additionalAuthenticatedData = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A192CbcPadParameters(byte[] plaintext, byte[] iv = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A192CbcParameters(byte[] plaintext, byte[] iv = null) { throw null; } - public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A192GcmParameters(byte[] plaintext, byte[] additionalAuthenticationData = null) { throw null; } + public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A192GcmParameters(byte[] plaintext, byte[] additionalAuthenticatedData = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A256CbcPadParameters(byte[] plaintext, byte[] iv = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A256CbcParameters(byte[] plaintext, byte[] iv = null) { throw null; } - public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A256GcmParameters(byte[] plaintext, byte[] additionalAuthenticationData = null) { throw null; } + public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters A256GcmParameters(byte[] plaintext, byte[] additionalAuthenticatedData = null) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters Rsa15Parameters(byte[] plaintext) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters RsaOaep256Parameters(byte[] plaintext) { throw null; } public static Azure.Security.KeyVault.Keys.Cryptography.EncryptParameters RsaOaepParameters(byte[] plaintext) { throw null; }