diff --git a/specification/compute/resource-manager/Microsoft.Compute/ComputeRP/stable/2024-07-01/computeRPCommon.json b/specification/compute/resource-manager/Microsoft.Compute/ComputeRP/stable/2024-07-01/computeRPCommon.json index 52ebc7191a78..05695b79797d 100644 --- a/specification/compute/resource-manager/Microsoft.Compute/ComputeRP/stable/2024-07-01/computeRPCommon.json +++ b/specification/compute/resource-manager/Microsoft.Compute/ComputeRP/stable/2024-07-01/computeRPCommon.json @@ -27,7 +27,7 @@ "type": "oauth2", "authorizationUrl": "https://login.microsoftonline.com/common/oauth2/authorize", "flow": "implicit", - "description": "Azure Active Directory OAuth2 Flow", + "description": "Azure Active Directory OAuth2 Flow test", "scopes": { "user_impersonation": "impersonate your user account" } diff --git a/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json b/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json index 04e7fd4ce67e..c10eb950290a 100644 --- a/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json +++ b/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.5", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json b/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json index aea5a3a92e25..46b4546f66b4 100644 --- a/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json +++ b/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.6-preview.1", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/Security.KeyVault.Keys/models.tsp b/specification/keyvault/Security.KeyVault.Keys/models.tsp index 79adb4ee74f7..1229c5f7012f 100644 --- a/specification/keyvault/Security.KeyVault.Keys/models.tsp +++ b/specification/keyvault/Security.KeyVault.Keys/models.tsp @@ -146,7 +146,7 @@ union JsonWebKeyEncryptionAlgorithm { string, /** - * RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. + * [Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems. */ RSA_OAEP: "RSA-OAEP", @@ -155,7 +155,7 @@ union JsonWebKeyEncryptionAlgorithm { */ RSA_OAEP256: "RSA-OAEP-256", - /** RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. */ + /** [Not recommended] RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption. */ RSA1_5: "RSA1_5", /** 128-bit AES-GCM. */ diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json index aea5a3a92e25..46b4546f66b4 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.6-preview.1", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json index f861ee5a84be..1c7795a2c6c5 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json @@ -1577,7 +1577,7 @@ { "name": "RSA_OAEP", "value": "RSA-OAEP", - "description": "RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1." + "description": "[Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems." }, { "name": "RSA_OAEP256", @@ -1587,7 +1587,7 @@ { "name": "RSA1_5", "value": "RSA1_5", - "description": "RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447." + "description": "[Not recommended] RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption." }, { "name": "A128_GCM", diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json index 04e7fd4ce67e..c10eb950290a 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.5", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json index 13aaf35d233d..0b5da112a860 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json @@ -1575,7 +1575,7 @@ { "name": "RSA_OAEP", "value": "RSA-OAEP", - "description": "RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1." + "description": "[Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems." }, { "name": "RSA_OAEP256", @@ -1585,7 +1585,7 @@ { "name": "RSA1_5", "value": "RSA1_5", - "description": "RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447." + "description": "[Not recommended] RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption." }, { "name": "A128_GCM", diff --git a/specificationRepositoryConfiguration.json b/specificationRepositoryConfiguration.json index 9c6ad529e741..0b2c1930d549 100644 --- a/specificationRepositoryConfiguration.json +++ b/specificationRepositoryConfiguration.json @@ -17,10 +17,6 @@ "mainRepository": "Azure/azure-sdk-for-js" }, "azure-sdk-for-net": { - "integrationRepository": "azure-sdk/azure-sdk-for-net", - "mainRepository": "Azure/azure-sdk-for-net" - }, - "azure-sdk-for-net-track2": { "integrationRepository": "azure-sdk/azure-sdk-for-net", "mainRepository": "Azure/azure-sdk-for-net", "configFilePath": "eng/swagger_to_sdk_config.json" @@ -52,10 +48,6 @@ "mainRepository": "Azure/azure-sdk-for-js-pr" }, "azure-sdk-for-net": { - "integrationRepository": "azure-sdk/azure-sdk-for-net-pr", - "mainRepository": "Azure/azure-sdk-for-net-pr" - }, - "azure-sdk-for-net-track2": { "integrationRepository": "azure-sdk/azure-sdk-for-net-pr", "mainRepository": "Azure/azure-sdk-for-net-pr", "configFilePath": "eng/swagger_to_sdk_config.json" @@ -74,7 +66,7 @@ "typespecEmitterToSdkRepositoryMapping": { "@azure-tools/typespec-python": "azure-sdk-for-python", "@azure-tools/typespec-java": "azure-sdk-for-java", - "@azure-tools/typespec-csharp": "azure-sdk-for-net-track2", + "@azure-tools/typespec-csharp": "azure-sdk-for-net", "@azure-tools/typespec-ts": "azure-sdk-for-js", "@azure-tools/typespec-go": "azure-sdk-for-go" }