A union type representing all supported AES-GCM encryption algorithms.
The various key types a CryptographyClient can hold. The key may be an identifier (URL) to a KeyVault key, the actual KeyVault key, or a local-only JsonWebKey.
If an identifier is used, it will be exchanged for a KeyVaultKey during the first operation call.
The set of operations a CryptographyProvider supports.
This corresponds to every single method on the interface so that providers can declare whether they support this method or not.
Purposely more granular than KnownKeyOperations because some providers support verifyData but not verify.
A type representing all currently supported decryption parameters as they apply to different encryption algorithms.
A type representing all currently supported encryption parameters as they apply to different encryption algorithms.
Defines values for KeyEncryptionAlgorithm. KnownKeyExportEncryptionAlgorithm can be used interchangeably with KeyEncryptionAlgorithm, this enum contains the known values that the service supports.
CKM_RSA_AES_KEY_WRAP
RSA_AES_KEY_WRAP_256
RSA_AES_KEY_WRAP_384
The action that will be executed.
Supported algorithms for key wrapping/unwrapping
A union type representing all supported RSA encryption algorithms.
The latest supported Key Vault service API version
The @azure/logger configuration for this package.
Creates a new ChallengeBasedAuthenticationPolicy factory.
The TokenCredential implementation that can supply the challenge token.
Returns a function that can be used for tracing options.
The prefix to use, likely the name of the class / client.
Fill in the PEM with 64 character lines as per RFC:
"To represent the encapsulated text of a PEM message, the encoding function's output is delimited into text lines (using local conventions), with each line except the last containing exactly 64 printable characters and the final line containing 64 or fewer printable characters."
A helper method to either get the passed down generated client or initialize a new one. An already constructed generated client may be passed down from KeyClient in which case we should reuse it.
The credential to use when initializing a new client.
The options for constructing a client or the underlying client if one already exists.
Parses the given Key Vault Key Id. An example is:
https://
On parsing the above Id, this function returns:
{
sourceId: "https://<keyvault-name>.vault.azure.net/keys/<key-name>/<unique-version-id>",
vaultUrl: "https://<keyvault-name>.vault.azure.net",
version: "<unique-version-id>",
name: "<key-name>"
}
The Id of the Key Vault Key.
Parses an WWW-Authenticate response.
This transforms a string value like:
Bearer authorization="https://some.url/tenantId", resource="https://some.url"
into an object like:
{ authorization: "https://some.url/tenantId", resource: "https://some.url" }
String value in the WWW-Authenticate header
Generated using TypeDoc
A union type representing all supported AES-CBC encryption algorithms.