All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.elastictranscoder.model.Encryption Maven / Gradle / Ivy

Go to download

The AWS Java SDK for Amazon Elastic Transcoder module holds the client classes that are used for communicating with Amazon Elastic Transcoder Service

The newest version!
/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.elastictranscoder.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* The encryption settings, if any, that are used for decrypting your input files or encrypting your output files. If * your input file is encrypted, you must specify the mode that Elastic Transcoder uses to decrypt your file, otherwise * you must specify the mode you want Elastic Transcoder to use to encrypt your output files. *

*/ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class Encryption implements Serializable, Cloneable, StructuredPojo { /** *

* The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files * or encrypting your output files. Elastic Transcoder supports the following options: *

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are * used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, * you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning * that a file, key, or initialization vector that has been tampered with fails the decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it * is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your * data. *

*
*/ private String mode; /** *

* The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to * encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before * being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. *

*/ private String key; /** *

* The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to * encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not * corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. *

*/ private String keyMd5; /** *

* The series of random bits created by a random bit generator, unique for every encryption operation, that you used * to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded. *

*/ private String initializationVector; /** *

* The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files * or encrypting your output files. Elastic Transcoder supports the following options: *

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are * used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, * you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning * that a file, key, or initialization vector that has been tampered with fails the decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it * is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your * data. *

*
* * @param mode * The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your * input files or encrypting your output files. Elastic Transcoder supports the following options:

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys * that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, * meaning that a file, key, or initialization vector that has been tampered with fails the decryption * process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; * therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be * able to unencrypt your data. *

*/ public void setMode(String mode) { this.mode = mode; } /** *

* The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files * or encrypting your output files. Elastic Transcoder supports the following options: *

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are * used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, * you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning * that a file, key, or initialization vector that has been tampered with fails the decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it * is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your * data. *

*
* * @return The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your * input files or encrypting your output files. Elastic Transcoder supports the following options:

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys * that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, * meaning that a file, key, or initialization vector that has been tampered with fails the decryption * process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; * therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be * able to unencrypt your data. *

*/ public String getMode() { return this.mode; } /** *

* The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files * or encrypting your output files. Elastic Transcoder supports the following options: *

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are * used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, * you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning * that a file, key, or initialization vector that has been tampered with fails the decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it * is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your * data. *

*
* * @param mode * The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your * input files or encrypting your output files. Elastic Transcoder supports the following options:

*
    *
  • *

    * s3: Amazon S3 creates and manages the keys used for encrypting your files. *

    *
  • *
  • *

    * s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys * that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to your pipeline. *

    *
  • *
  • *

    * aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files. *

    *
  • *
  • *

    * aes-ctr: AES Counter Mode. *

    *
  • *
  • *

    * aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, * meaning that a file, key, or initialization vector that has been tampered with fails the decryption * process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; * therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be * able to unencrypt your data. *

* @return Returns a reference to this object so that method calls can be chained together. */ public Encryption withMode(String mode) { setMode(mode); return this; } /** *

* The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to * encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before * being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. *

* * @param key * The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was * used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded:

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. */ public void setKey(String key) { this.key = key; } /** *

* The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to * encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before * being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. *

* * @return The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was * used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded:

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. */ public String getKey() { return this.key; } /** *

* The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to * encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before * being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. *

* * @param key * The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was * used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded:

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management Service. * @return Returns a reference to this object so that method calls can be chained together. */ public Encryption withKey(String key) { setKey(key); return this; } /** *

* The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to * encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not * corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. *

* * @param keyMd5 * The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to * use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your * key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long * before being base64-encoded. */ public void setKeyMd5(String keyMd5) { this.keyMd5 = keyMd5; } /** *

* The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to * encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not * corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. *

* * @return The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder * to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure * your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 * bytes long before being base64-encoded. */ public String getKeyMd5() { return this.keyMd5; } /** *

* The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to * encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not * corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. *

* * @param keyMd5 * The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to * use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your * key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long * before being base64-encoded. * @return Returns a reference to this object so that method calls can be chained together. */ public Encryption withKeyMd5(String keyMd5) { setKeyMd5(keyMd5); return this; } /** *

* The series of random bits created by a random bit generator, unique for every encryption operation, that you used * to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded. *

* * @param initializationVector * The series of random bits created by a random bit generator, unique for every encryption operation, that * you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output * files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. */ public void setInitializationVector(String initializationVector) { this.initializationVector = initializationVector; } /** *

* The series of random bits created by a random bit generator, unique for every encryption operation, that you used * to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded. *

* * @return The series of random bits created by a random bit generator, unique for every encryption operation, that * you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output * files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before * being base64-encoded. */ public String getInitializationVector() { return this.initializationVector; } /** *

* The series of random bits created by a random bit generator, unique for every encryption operation, that you used * to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded. *

* * @param initializationVector * The series of random bits created by a random bit generator, unique for every encryption operation, that * you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output * files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. * @return Returns a reference to this object so that method calls can be chained together. */ public Encryption withInitializationVector(String initializationVector) { setInitializationVector(initializationVector); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getMode() != null) sb.append("Mode: ").append(getMode()).append(","); if (getKey() != null) sb.append("Key: ").append(getKey()).append(","); if (getKeyMd5() != null) sb.append("KeyMd5: ").append(getKeyMd5()).append(","); if (getInitializationVector() != null) sb.append("InitializationVector: ").append(getInitializationVector()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof Encryption == false) return false; Encryption other = (Encryption) obj; if (other.getMode() == null ^ this.getMode() == null) return false; if (other.getMode() != null && other.getMode().equals(this.getMode()) == false) return false; if (other.getKey() == null ^ this.getKey() == null) return false; if (other.getKey() != null && other.getKey().equals(this.getKey()) == false) return false; if (other.getKeyMd5() == null ^ this.getKeyMd5() == null) return false; if (other.getKeyMd5() != null && other.getKeyMd5().equals(this.getKeyMd5()) == false) return false; if (other.getInitializationVector() == null ^ this.getInitializationVector() == null) return false; if (other.getInitializationVector() != null && other.getInitializationVector().equals(this.getInitializationVector()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getMode() == null) ? 0 : getMode().hashCode()); hashCode = prime * hashCode + ((getKey() == null) ? 0 : getKey().hashCode()); hashCode = prime * hashCode + ((getKeyMd5() == null) ? 0 : getKeyMd5().hashCode()); hashCode = prime * hashCode + ((getInitializationVector() == null) ? 0 : getInitializationVector().hashCode()); return hashCode; } @Override public Encryption clone() { try { return (Encryption) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.elastictranscoder.model.transform.EncryptionMarshaller.getInstance().marshall(this, protocolMarshaller); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy