All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.elastictranscoder.model.Encryption Maven / Gradle / Ivy

Go to download

The AWS SDK for Java with support for OSGi. The AWS SDK for Java provides Java APIs for building software on AWS' cost-effective, scalable, and reliable infrastructure products. The AWS Java SDK allows developers to code against APIs for all of Amazon's infrastructure web services (Amazon S3, Amazon EC2, Amazon SQS, Amazon Relational Database Service, Amazon AutoScaling, etc).

There is a newer version: 1.11.60
Show newest version
/*
 * Copyright 2011-2016 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not
 * use this file except in compliance with the License. A copy of the License is
 * located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on
 * an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
 * express or implied. See the License for the specific language governing
 * permissions and limitations under the License.
 */
package com.amazonaws.services.elastictranscoder.model;

import java.io.Serializable;

/**
 * 

* The encryption settings, if any, that are used for decrypting your input * files or encrypting your output files. If your input file is encrypted, you * must specify the mode that Elastic Transcoder will use to decrypt your file, * otherwise you must specify the mode you want Elastic Transcoder to use to * encrypt your output files. *

*/ public class Encryption implements Serializable, Cloneable { /** *

* The specific server-side encryption mode that you want Elastic Transcoder * to use when decrypting your input files or encrypting your output files. * Elastic Transcoder supports the following options: *

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for encrypting * your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, * which creates and manages the keys that are used for encrypting your * files. If you specify S3-AWS-KMS and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to * your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation originally * used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that is an * authenticated encryption format, meaning that a file, key, or * initialization vector that has been tampered with will fail the * decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which * must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data * are never stored by AWS; therefore, it is important that you safely * manage your encryption keys. If you lose them, you won't be able to * unencrypt your data. *

*
*/ private String mode; /** *

* The data encryption key that you want Elastic Transcoder to use to * encrypt your output file, or that was used to encrypt your input file. * The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. *

*/ private String key; /** *

* The MD5 digest of the key that you used to encrypt your input file, or * that you want Elastic Transcoder to use to encrypt your output file. * Elastic Transcoder uses the key digest as a checksum to make sure your * key was not corrupted in transit. The key MD5 must be base64-encoded, and * it must be exactly 16 bytes long before being base64-encoded. *

*/ private String keyMd5; /** *

* The series of random bits created by a random bit generator, unique for * every encryption operation, that you used to encrypt your input files or * that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 * bytes long before being base64-encoded. *

*/ private String initializationVector; /** *

* The specific server-side encryption mode that you want Elastic Transcoder * to use when decrypting your input files or encrypting your output files. * Elastic Transcoder supports the following options: *

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for encrypting * your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, * which creates and manages the keys that are used for encrypting your * files. If you specify S3-AWS-KMS and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to * your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation originally * used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that is an * authenticated encryption format, meaning that a file, key, or * initialization vector that has been tampered with will fail the * decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which * must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data * are never stored by AWS; therefore, it is important that you safely * manage your encryption keys. If you lose them, you won't be able to * unencrypt your data. *

*
* * @param mode * The specific server-side encryption mode that you want Elastic * Transcoder to use when decrypting your input files or encrypting * your output files. Elastic Transcoder supports the following * options:

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for * encrypting your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management * Service, which creates and manages the keys that are used for * encrypting your files. If you specify S3-AWS-KMS and * you don't want to use the default key, you must add the AWS-KMS * key that you want to use to your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation * originally used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that * is an authenticated encryption format, meaning that a file, key, * or initialization vector that has been tampered with will fail the * decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following * settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your * unencrypted data are never stored by AWS; therefore, it is * important that you safely manage your encryption keys. If you lose * them, you won't be able to unencrypt your data. *

*/ public void setMode(String mode) { this.mode = mode; } /** *

* The specific server-side encryption mode that you want Elastic Transcoder * to use when decrypting your input files or encrypting your output files. * Elastic Transcoder supports the following options: *

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for encrypting * your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, * which creates and manages the keys that are used for encrypting your * files. If you specify S3-AWS-KMS and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to * your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation originally * used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that is an * authenticated encryption format, meaning that a file, key, or * initialization vector that has been tampered with will fail the * decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which * must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data * are never stored by AWS; therefore, it is important that you safely * manage your encryption keys. If you lose them, you won't be able to * unencrypt your data. *

*
* * @return The specific server-side encryption mode that you want Elastic * Transcoder to use when decrypting your input files or encrypting * your output files. Elastic Transcoder supports the following * options:

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for * encrypting your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management * Service, which creates and manages the keys that are used for * encrypting your files. If you specify S3-AWS-KMS and * you don't want to use the default key, you must add the AWS-KMS * key that you want to use to your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation * originally used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that * is an authenticated encryption format, meaning that a file, key, * or initialization vector that has been tampered with will fail * the decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following * settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your * unencrypted data are never stored by AWS; therefore, it is * important that you safely manage your encryption keys. If you * lose them, you won't be able to unencrypt your data. *

*/ public String getMode() { return this.mode; } /** *

* The specific server-side encryption mode that you want Elastic Transcoder * to use when decrypting your input files or encrypting your output files. * Elastic Transcoder supports the following options: *

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for encrypting * your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, * which creates and manages the keys that are used for encrypting your * files. If you specify S3-AWS-KMS and you don't want to use * the default key, you must add the AWS-KMS key that you want to use to * your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation originally * used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that is an * authenticated encryption format, meaning that a file, key, or * initialization vector that has been tampered with will fail the * decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following settings, which * must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your unencrypted data * are never stored by AWS; therefore, it is important that you safely * manage your encryption keys. If you lose them, you won't be able to * unencrypt your data. *

*
* * @param mode * The specific server-side encryption mode that you want Elastic * Transcoder to use when decrypting your input files or encrypting * your output files. Elastic Transcoder supports the following * options:

*
    *
  • *

    * S3: Amazon S3 creates and manages the keys used for * encrypting your files. *

    *
  • *
  • *

    * S3-AWS-KMS: Amazon S3 calls the Amazon Key Management * Service, which creates and manages the keys that are used for * encrypting your files. If you specify S3-AWS-KMS and * you don't want to use the default key, you must add the AWS-KMS * key that you want to use to your pipeline. *

    *
  • *
  • *

    * AES-CBC-PKCS7: A padded cipher-block mode of operation * originally used for HLS files. *

    *
  • *
  • *

    * AES-CTR: AES Counter Mode. *

    *
  • *
  • *

    * AES-GCM: AES Galois Counter Mode, a mode of operation that * is an authenticated encryption format, meaning that a file, key, * or initialization vector that has been tampered with will fail the * decryption process. *

    *
  • *
*

* For all three AES options, you must provide the following * settings, which must be base64-encoded: *

*
    *
  • *

    * Key *

    *
  • *
  • *

    * Key MD5 *

    *
  • *
  • *

    * Initialization Vector *

    *
  • *
* *

* For the AES modes, your private encryption keys and your * unencrypted data are never stored by AWS; therefore, it is * important that you safely manage your encryption keys. If you lose * them, you won't be able to unencrypt your data. *

* @return Returns a reference to this object so that method calls can be * chained together. */ public Encryption withMode(String mode) { setMode(mode); return this; } /** *

* The data encryption key that you want Elastic Transcoder to use to * encrypt your output file, or that was used to encrypt your input file. * The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. *

* * @param key * The data encryption key that you want Elastic Transcoder to use to * encrypt your output file, or that was used to encrypt your input * file. The key must be base64-encoded and it must be one of the * following bit lengths before being base64-encoded:

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. */ public void setKey(String key) { this.key = key; } /** *

* The data encryption key that you want Elastic Transcoder to use to * encrypt your output file, or that was used to encrypt your input file. * The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. *

* * @return The data encryption key that you want Elastic Transcoder to use * to encrypt your output file, or that was used to encrypt your * input file. The key must be base64-encoded and it must be one of * the following bit lengths before being base64-encoded:

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. */ public String getKey() { return this.key; } /** *

* The data encryption key that you want Elastic Transcoder to use to * encrypt your output file, or that was used to encrypt your input file. * The key must be base64-encoded and it must be one of the following bit * lengths before being base64-encoded: *

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. *

* * @param key * The data encryption key that you want Elastic Transcoder to use to * encrypt your output file, or that was used to encrypt your input * file. The key must be base64-encoded and it must be one of the * following bit lengths before being base64-encoded:

*

* 128, 192, or 256. *

*

* The key must also be encrypted by using the Amazon Key Management * Service. * @return Returns a reference to this object so that method calls can be * chained together. */ public Encryption withKey(String key) { setKey(key); return this; } /** *

* The MD5 digest of the key that you used to encrypt your input file, or * that you want Elastic Transcoder to use to encrypt your output file. * Elastic Transcoder uses the key digest as a checksum to make sure your * key was not corrupted in transit. The key MD5 must be base64-encoded, and * it must be exactly 16 bytes long before being base64-encoded. *

* * @param keyMd5 * The MD5 digest of the key that you used to encrypt your input * file, or that you want Elastic Transcoder to use to encrypt your * output file. Elastic Transcoder uses the key digest as a checksum * to make sure your key was not corrupted in transit. The key MD5 * must be base64-encoded, and it must be exactly 16 bytes long * before being base64-encoded. */ public void setKeyMd5(String keyMd5) { this.keyMd5 = keyMd5; } /** *

* The MD5 digest of the key that you used to encrypt your input file, or * that you want Elastic Transcoder to use to encrypt your output file. * Elastic Transcoder uses the key digest as a checksum to make sure your * key was not corrupted in transit. The key MD5 must be base64-encoded, and * it must be exactly 16 bytes long before being base64-encoded. *

* * @return The MD5 digest of the key that you used to encrypt your input * file, or that you want Elastic Transcoder to use to encrypt your * output file. Elastic Transcoder uses the key digest as a checksum * to make sure your key was not corrupted in transit. The key MD5 * must be base64-encoded, and it must be exactly 16 bytes long * before being base64-encoded. */ public String getKeyMd5() { return this.keyMd5; } /** *

* The MD5 digest of the key that you used to encrypt your input file, or * that you want Elastic Transcoder to use to encrypt your output file. * Elastic Transcoder uses the key digest as a checksum to make sure your * key was not corrupted in transit. The key MD5 must be base64-encoded, and * it must be exactly 16 bytes long before being base64-encoded. *

* * @param keyMd5 * The MD5 digest of the key that you used to encrypt your input * file, or that you want Elastic Transcoder to use to encrypt your * output file. Elastic Transcoder uses the key digest as a checksum * to make sure your key was not corrupted in transit. The key MD5 * must be base64-encoded, and it must be exactly 16 bytes long * before being base64-encoded. * @return Returns a reference to this object so that method calls can be * chained together. */ public Encryption withKeyMd5(String keyMd5) { setKeyMd5(keyMd5); return this; } /** *

* The series of random bits created by a random bit generator, unique for * every encryption operation, that you used to encrypt your input files or * that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 * bytes long before being base64-encoded. *

* * @param initializationVector * The series of random bits created by a random bit generator, * unique for every encryption operation, that you used to encrypt * your input files or that you want Elastic Transcoder to use to * encrypt your output files. The initialization vector must be * base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. */ public void setInitializationVector(String initializationVector) { this.initializationVector = initializationVector; } /** *

* The series of random bits created by a random bit generator, unique for * every encryption operation, that you used to encrypt your input files or * that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 * bytes long before being base64-encoded. *

* * @return The series of random bits created by a random bit generator, * unique for every encryption operation, that you used to encrypt * your input files or that you want Elastic Transcoder to use to * encrypt your output files. The initialization vector must be * base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. */ public String getInitializationVector() { return this.initializationVector; } /** *

* The series of random bits created by a random bit generator, unique for * every encryption operation, that you used to encrypt your input files or * that you want Elastic Transcoder to use to encrypt your output files. The * initialization vector must be base64-encoded, and it must be exactly 16 * bytes long before being base64-encoded. *

* * @param initializationVector * The series of random bits created by a random bit generator, * unique for every encryption operation, that you used to encrypt * your input files or that you want Elastic Transcoder to use to * encrypt your output files. The initialization vector must be * base64-encoded, and it must be exactly 16 bytes long before being * base64-encoded. * @return Returns a reference to this object so that method calls can be * chained together. */ public Encryption withInitializationVector(String initializationVector) { setInitializationVector(initializationVector); return this; } /** * Returns a string representation of this object; useful for testing and * debugging. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getMode() != null) sb.append("Mode: " + getMode() + ","); if (getKey() != null) sb.append("Key: " + getKey() + ","); if (getKeyMd5() != null) sb.append("KeyMd5: " + getKeyMd5() + ","); if (getInitializationVector() != null) sb.append("InitializationVector: " + getInitializationVector()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof Encryption == false) return false; Encryption other = (Encryption) obj; if (other.getMode() == null ^ this.getMode() == null) return false; if (other.getMode() != null && other.getMode().equals(this.getMode()) == false) return false; if (other.getKey() == null ^ this.getKey() == null) return false; if (other.getKey() != null && other.getKey().equals(this.getKey()) == false) return false; if (other.getKeyMd5() == null ^ this.getKeyMd5() == null) return false; if (other.getKeyMd5() != null && other.getKeyMd5().equals(this.getKeyMd5()) == false) return false; if (other.getInitializationVector() == null ^ this.getInitializationVector() == null) return false; if (other.getInitializationVector() != null && other.getInitializationVector().equals( this.getInitializationVector()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getMode() == null) ? 0 : getMode().hashCode()); hashCode = prime * hashCode + ((getKey() == null) ? 0 : getKey().hashCode()); hashCode = prime * hashCode + ((getKeyMd5() == null) ? 0 : getKeyMd5().hashCode()); hashCode = prime * hashCode + ((getInitializationVector() == null) ? 0 : getInitializationVector().hashCode()); return hashCode; } @Override public Encryption clone() { try { return (Encryption) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException( "Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy