Github user davies commented on a diff in the pull request:

    https://github.com/apache/spark/pull/10527#discussion_r53546006
  
    --- Diff: sql/core/src/main/scala/org/apache/spark/sql/functions.scala ---
    @@ -1931,6 +1931,42 @@ object functions extends LegacyFunctions {
         new Murmur3Hash(cols.map(_.expr))
       }
     
    +  /**
    +   * Encrypts input using AES and Returns the result as a binary column.
    +   * Key lengths of 128, 192 or 256 bits can be used. 192 and 256 bits 
keys can be used if Java
    +   * Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy 
Files are installed. If
    +   * either argument is NULL, the result will also be null. If input is 
invalid, key length is not
    +   * one of the permitted values or using 192/256 bits key before 
installing JCE, an exception will
    +   * be thrown.
    +   *
    +   * @param input binary column to encrypt input
    +   * @param key binary column of 128, 192 or 256 bits key
    +   *
    +   * @group misc_funcs
    +   * @since 2.0.0
    +   */
    +  def aes_encrypt(input: Column, key: Column): Column = withExpr {
    --- End diff --
    
    Some of the functions take literals, some not., In 2.0, should we clean up 
all the mess?


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to