All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.crypto.tink.proto.AesCtrHmacStreamingParams Maven / Gradle / Ivy

Go to download

Tink is a small cryptographic library that provides a safe, simple, agile and fast way to accomplish some common cryptographic tasks.

The newest version!
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: proto/aes_ctr_hmac_streaming.proto
// Protobuf Java Version: 4.28.2

package com.google.crypto.tink.proto;

/**
 * Protobuf type {@code google.crypto.tink.AesCtrHmacStreamingParams}
 */
public  final class AesCtrHmacStreamingParams extends
    com.google.protobuf.GeneratedMessageLite<
        AesCtrHmacStreamingParams, AesCtrHmacStreamingParams.Builder> implements
    // @@protoc_insertion_point(message_implements:google.crypto.tink.AesCtrHmacStreamingParams)
    AesCtrHmacStreamingParamsOrBuilder {
  private AesCtrHmacStreamingParams() {
  }
  private int bitField0_;
  public static final int CIPHERTEXT_SEGMENT_SIZE_FIELD_NUMBER = 1;
  private int ciphertextSegmentSize_;
  /**
   * uint32 ciphertext_segment_size = 1;
   * @return The ciphertextSegmentSize.
   */
  @java.lang.Override
  public int getCiphertextSegmentSize() {
    return ciphertextSegmentSize_;
  }
  /**
   * uint32 ciphertext_segment_size = 1;
   * @param value The ciphertextSegmentSize to set.
   */
  private void setCiphertextSegmentSize(int value) {
    
    ciphertextSegmentSize_ = value;
  }
  /**
   * uint32 ciphertext_segment_size = 1;
   */
  private void clearCiphertextSegmentSize() {

    ciphertextSegmentSize_ = 0;
  }

  public static final int DERIVED_KEY_SIZE_FIELD_NUMBER = 2;
  private int derivedKeySize_;
  /**
   * 
   * size of AES-CTR keys derived for each segment
   * 
* * uint32 derived_key_size = 2; * @return The derivedKeySize. */ @java.lang.Override public int getDerivedKeySize() { return derivedKeySize_; } /** *
   * size of AES-CTR keys derived for each segment
   * 
* * uint32 derived_key_size = 2; * @param value The derivedKeySize to set. */ private void setDerivedKeySize(int value) { derivedKeySize_ = value; } /** *
   * size of AES-CTR keys derived for each segment
   * 
* * uint32 derived_key_size = 2; */ private void clearDerivedKeySize() { derivedKeySize_ = 0; } public static final int HKDF_HASH_TYPE_FIELD_NUMBER = 3; private int hkdfHashType_; /** *
   * hash function for key derivation via HKDF
   * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The enum numeric value on the wire for hkdfHashType. */ @java.lang.Override public int getHkdfHashTypeValue() { return hkdfHashType_; } /** *
   * hash function for key derivation via HKDF
   * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The hkdfHashType. */ @java.lang.Override public com.google.crypto.tink.proto.HashType getHkdfHashType() { com.google.crypto.tink.proto.HashType result = com.google.crypto.tink.proto.HashType.forNumber(hkdfHashType_); return result == null ? com.google.crypto.tink.proto.HashType.UNRECOGNIZED : result; } /** *
   * hash function for key derivation via HKDF
   * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The enum numeric value on the wire for hkdfHashType to set. */ private void setHkdfHashTypeValue(int value) { hkdfHashType_ = value; } /** *
   * hash function for key derivation via HKDF
   * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The hkdfHashType to set. */ private void setHkdfHashType(com.google.crypto.tink.proto.HashType value) { hkdfHashType_ = value.getNumber(); } /** *
   * hash function for key derivation via HKDF
   * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; */ private void clearHkdfHashType() { hkdfHashType_ = 0; } public static final int HMAC_PARAMS_FIELD_NUMBER = 4; private com.google.crypto.tink.proto.HmacParams hmacParams_; /** *
   * params for authentication tags
   * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ @java.lang.Override public boolean hasHmacParams() { return ((bitField0_ & 0x00000001) != 0); } /** *
   * params for authentication tags
   * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ @java.lang.Override public com.google.crypto.tink.proto.HmacParams getHmacParams() { return hmacParams_ == null ? com.google.crypto.tink.proto.HmacParams.getDefaultInstance() : hmacParams_; } /** *
   * params for authentication tags
   * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ private void setHmacParams(com.google.crypto.tink.proto.HmacParams value) { value.getClass(); hmacParams_ = value; bitField0_ |= 0x00000001; } /** *
   * params for authentication tags
   * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ @java.lang.SuppressWarnings({"ReferenceEquality"}) private void mergeHmacParams(com.google.crypto.tink.proto.HmacParams value) { value.getClass(); if (hmacParams_ != null && hmacParams_ != com.google.crypto.tink.proto.HmacParams.getDefaultInstance()) { hmacParams_ = com.google.crypto.tink.proto.HmacParams.newBuilder(hmacParams_).mergeFrom(value).buildPartial(); } else { hmacParams_ = value; } bitField0_ |= 0x00000001; } /** *
   * params for authentication tags
   * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ private void clearHmacParams() { hmacParams_ = null; bitField0_ = (bitField0_ & ~0x00000001); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static Builder newBuilder() { return (Builder) DEFAULT_INSTANCE.createBuilder(); } public static Builder newBuilder(com.google.crypto.tink.proto.AesCtrHmacStreamingParams prototype) { return DEFAULT_INSTANCE.createBuilder(prototype); } /** * Protobuf type {@code google.crypto.tink.AesCtrHmacStreamingParams} */ public static final class Builder extends com.google.protobuf.GeneratedMessageLite.Builder< com.google.crypto.tink.proto.AesCtrHmacStreamingParams, Builder> implements // @@protoc_insertion_point(builder_implements:google.crypto.tink.AesCtrHmacStreamingParams) com.google.crypto.tink.proto.AesCtrHmacStreamingParamsOrBuilder { // Construct using com.google.crypto.tink.proto.AesCtrHmacStreamingParams.newBuilder() private Builder() { super(DEFAULT_INSTANCE); } /** * uint32 ciphertext_segment_size = 1; * @return The ciphertextSegmentSize. */ @java.lang.Override public int getCiphertextSegmentSize() { return instance.getCiphertextSegmentSize(); } /** * uint32 ciphertext_segment_size = 1; * @param value The ciphertextSegmentSize to set. * @return This builder for chaining. */ public Builder setCiphertextSegmentSize(int value) { copyOnWrite(); instance.setCiphertextSegmentSize(value); return this; } /** * uint32 ciphertext_segment_size = 1; * @return This builder for chaining. */ public Builder clearCiphertextSegmentSize() { copyOnWrite(); instance.clearCiphertextSegmentSize(); return this; } /** *
     * size of AES-CTR keys derived for each segment
     * 
* * uint32 derived_key_size = 2; * @return The derivedKeySize. */ @java.lang.Override public int getDerivedKeySize() { return instance.getDerivedKeySize(); } /** *
     * size of AES-CTR keys derived for each segment
     * 
* * uint32 derived_key_size = 2; * @param value The derivedKeySize to set. * @return This builder for chaining. */ public Builder setDerivedKeySize(int value) { copyOnWrite(); instance.setDerivedKeySize(value); return this; } /** *
     * size of AES-CTR keys derived for each segment
     * 
* * uint32 derived_key_size = 2; * @return This builder for chaining. */ public Builder clearDerivedKeySize() { copyOnWrite(); instance.clearDerivedKeySize(); return this; } /** *
     * hash function for key derivation via HKDF
     * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The enum numeric value on the wire for hkdfHashType. */ @java.lang.Override public int getHkdfHashTypeValue() { return instance.getHkdfHashTypeValue(); } /** *
     * hash function for key derivation via HKDF
     * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The hkdfHashType to set. * @return This builder for chaining. */ public Builder setHkdfHashTypeValue(int value) { copyOnWrite(); instance.setHkdfHashTypeValue(value); return this; } /** *
     * hash function for key derivation via HKDF
     * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The hkdfHashType. */ @java.lang.Override public com.google.crypto.tink.proto.HashType getHkdfHashType() { return instance.getHkdfHashType(); } /** *
     * hash function for key derivation via HKDF
     * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The enum numeric value on the wire for hkdfHashType to set. * @return This builder for chaining. */ public Builder setHkdfHashType(com.google.crypto.tink.proto.HashType value) { copyOnWrite(); instance.setHkdfHashType(value); return this; } /** *
     * hash function for key derivation via HKDF
     * 
* * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return This builder for chaining. */ public Builder clearHkdfHashType() { copyOnWrite(); instance.clearHkdfHashType(); return this; } /** *
     * params for authentication tags
     * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ @java.lang.Override public boolean hasHmacParams() { return instance.hasHmacParams(); } /** *
     * params for authentication tags
     * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ @java.lang.Override public com.google.crypto.tink.proto.HmacParams getHmacParams() { return instance.getHmacParams(); } /** *
     * params for authentication tags
     * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ public Builder setHmacParams(com.google.crypto.tink.proto.HmacParams value) { copyOnWrite(); instance.setHmacParams(value); return this; } /** *
     * params for authentication tags
     * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ public Builder setHmacParams( com.google.crypto.tink.proto.HmacParams.Builder builderForValue) { copyOnWrite(); instance.setHmacParams(builderForValue.build()); return this; } /** *
     * params for authentication tags
     * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ public Builder mergeHmacParams(com.google.crypto.tink.proto.HmacParams value) { copyOnWrite(); instance.mergeHmacParams(value); return this; } /** *
     * params for authentication tags
     * 
* * .google.crypto.tink.HmacParams hmac_params = 4; */ public Builder clearHmacParams() { copyOnWrite(); instance.clearHmacParams(); return this; } // @@protoc_insertion_point(builder_scope:google.crypto.tink.AesCtrHmacStreamingParams) } @java.lang.Override @java.lang.SuppressWarnings({"unchecked", "fallthrough"}) protected final java.lang.Object dynamicMethod( com.google.protobuf.GeneratedMessageLite.MethodToInvoke method, java.lang.Object arg0, java.lang.Object arg1) { switch (method) { case NEW_MUTABLE_INSTANCE: { return new com.google.crypto.tink.proto.AesCtrHmacStreamingParams(); } case NEW_BUILDER: { return new Builder(); } case BUILD_MESSAGE_INFO: { java.lang.Object[] objects = new java.lang.Object[] { "bitField0_", "ciphertextSegmentSize_", "derivedKeySize_", "hkdfHashType_", "hmacParams_", }; java.lang.String info = "\u0000\u0004\u0000\u0001\u0001\u0004\u0004\u0000\u0000\u0000\u0001\u000b\u0002\u000b" + "\u0003\f\u0004\u1009\u0000"; return newMessageInfo(DEFAULT_INSTANCE, info, objects); } // fall through case GET_DEFAULT_INSTANCE: { return DEFAULT_INSTANCE; } case GET_PARSER: { com.google.protobuf.Parser parser = PARSER; if (parser == null) { synchronized (com.google.crypto.tink.proto.AesCtrHmacStreamingParams.class) { parser = PARSER; if (parser == null) { parser = new DefaultInstanceBasedParser( DEFAULT_INSTANCE); PARSER = parser; } } } return parser; } case GET_MEMOIZED_IS_INITIALIZED: { return (byte) 1; } case SET_MEMOIZED_IS_INITIALIZED: { return null; } } throw new UnsupportedOperationException(); } // @@protoc_insertion_point(class_scope:google.crypto.tink.AesCtrHmacStreamingParams) private static final com.google.crypto.tink.proto.AesCtrHmacStreamingParams DEFAULT_INSTANCE; static { AesCtrHmacStreamingParams defaultInstance = new AesCtrHmacStreamingParams(); // New instances are implicitly immutable so no need to make // immutable. DEFAULT_INSTANCE = defaultInstance; com.google.protobuf.GeneratedMessageLite.registerDefaultInstance( AesCtrHmacStreamingParams.class, defaultInstance); } public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams getDefaultInstance() { return DEFAULT_INSTANCE; } private static volatile com.google.protobuf.Parser PARSER; public static com.google.protobuf.Parser parser() { return DEFAULT_INSTANCE.getParserForType(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy