public override EncryptResult Encrypt(EncryptOptions options, CancellationToken cancellationToken = default) { Argument.AssertNotNull(options, nameof(options)); ThrowIfTimeInvalid(); EncryptionAlgorithm algorithm = options.Algorithm; if (algorithm.GetAesCbcEncryptionAlgorithm() is AesCbc aesCbc) { // Make sure the IV is initialized. options.Initialize(); using ICryptoTransform encryptor = aesCbc.CreateEncryptor(KeyMaterial.K, options.Iv); byte[] plaintext = options.Plaintext; byte[] ciphertext = encryptor.TransformFinalBlock(plaintext, 0, plaintext.Length); return(new EncryptResult { Algorithm = algorithm, KeyId = KeyMaterial.Id, Ciphertext = ciphertext, Iv = options.Iv, }); } else { KeysEventSource.Singleton.AlgorithmNotSupported(nameof(Encrypt), algorithm); return(null); } }
public override EncryptResult Encrypt(EncryptOptions options, CancellationToken cancellationToken = default) { Argument.AssertNotNull(options, nameof(options)); ThrowIfTimeInvalid(); EncryptionAlgorithm algorithm = options.Algorithm; if (algorithm.GetAesCbcEncryptionAlgorithm() is AesCbc aesCbc) { // Make sure the IV is initialized. options.Initialize(); using ICryptoTransform encryptor = aesCbc.CreateEncryptor(KeyMaterial.K, options.Iv); byte[] plaintext = options.Plaintext; byte[] ciphertext = encryptor.TransformFinalBlock(plaintext, 0, plaintext.Length); return(new EncryptResult { Algorithm = algorithm, KeyId = KeyMaterial.Id, Ciphertext = ciphertext, Iv = options.Iv, }); } else if (algorithm.IsAesGcm() && AesGcmProxy.TryCreate(KeyMaterial.K, out AesGcmProxy aesGcm)) { using (aesGcm) { byte[] plaintext = options.Plaintext; byte[] ciphertext = new byte[plaintext.Length]; byte[] tag = new byte[AesGcmProxy.NonceByteSize]; // Generate an nonce only for local AES-GCM; Managed HSM will do it service-side and err if serialized. byte[] iv = Crypto.GenerateIv(AesGcmProxy.NonceByteSize); aesGcm.Encrypt(iv, plaintext, ciphertext, tag, options.AdditionalAuthenticatedData); return(new EncryptResult { Algorithm = algorithm, KeyId = KeyMaterial.Id, Ciphertext = ciphertext, Iv = iv, AuthenticationTag = tag, AdditionalAuthenticatedData = options.AdditionalAuthenticatedData, }); } } else { KeysEventSource.Singleton.AlgorithmNotSupported(nameof(Encrypt), algorithm); return(null); } }
public virtual async Task <Response <EncryptResult> > EncryptAsync(EncryptOptions options, CancellationToken cancellationToken = default) { using DiagnosticScope scope = Pipeline.CreateScope($"{nameof(RemoteCryptographyClient)}.{nameof(Encrypt)}"); scope.AddAttribute("key", _keyId); scope.Start(); try { // Make sure the IV is initialized. // TODO: Remove this call once the service will initialized it: https://github.com/Azure/azure-sdk-for-net/issues/16175 options.Initialize(); return(await Pipeline.SendRequestAsync(RequestMethod.Post, options, () => new EncryptResult { Algorithm = options.Algorithm }, cancellationToken, "/encrypt").ConfigureAwait(false)); } catch (Exception e) { scope.Failed(e); throw; } }