com.google.crypto.tink.proto.AesCtrHmacStreamingParams Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of tink-android Show documentation
Show all versions of tink-android Show documentation
Tink is a small cryptographic library that provides a safe, simple, agile and fast way to accomplish some common cryptographic tasks.
The newest version!
// Generated by the protocol buffer compiler. DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: proto/aes_ctr_hmac_streaming.proto
// Protobuf Java Version: 4.28.2
package com.google.crypto.tink.proto;
/**
* Protobuf type {@code google.crypto.tink.AesCtrHmacStreamingParams}
*/
public final class AesCtrHmacStreamingParams extends
com.google.protobuf.GeneratedMessageLite<
AesCtrHmacStreamingParams, AesCtrHmacStreamingParams.Builder> implements
// @@protoc_insertion_point(message_implements:google.crypto.tink.AesCtrHmacStreamingParams)
AesCtrHmacStreamingParamsOrBuilder {
private AesCtrHmacStreamingParams() {
}
private int bitField0_;
public static final int CIPHERTEXT_SEGMENT_SIZE_FIELD_NUMBER = 1;
private int ciphertextSegmentSize_;
/**
* uint32 ciphertext_segment_size = 1;
* @return The ciphertextSegmentSize.
*/
@java.lang.Override
public int getCiphertextSegmentSize() {
return ciphertextSegmentSize_;
}
/**
* uint32 ciphertext_segment_size = 1;
* @param value The ciphertextSegmentSize to set.
*/
private void setCiphertextSegmentSize(int value) {
ciphertextSegmentSize_ = value;
}
/**
* uint32 ciphertext_segment_size = 1;
*/
private void clearCiphertextSegmentSize() {
ciphertextSegmentSize_ = 0;
}
public static final int DERIVED_KEY_SIZE_FIELD_NUMBER = 2;
private int derivedKeySize_;
/**
*
* size of AES-CTR keys derived for each segment
*
*
* uint32 derived_key_size = 2;
* @return The derivedKeySize.
*/
@java.lang.Override
public int getDerivedKeySize() {
return derivedKeySize_;
}
/**
*
* size of AES-CTR keys derived for each segment
*
*
* uint32 derived_key_size = 2;
* @param value The derivedKeySize to set.
*/
private void setDerivedKeySize(int value) {
derivedKeySize_ = value;
}
/**
*
* size of AES-CTR keys derived for each segment
*
*
* uint32 derived_key_size = 2;
*/
private void clearDerivedKeySize() {
derivedKeySize_ = 0;
}
public static final int HKDF_HASH_TYPE_FIELD_NUMBER = 3;
private int hkdfHashType_;
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @return The enum numeric value on the wire for hkdfHashType.
*/
@java.lang.Override
public int getHkdfHashTypeValue() {
return hkdfHashType_;
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @return The hkdfHashType.
*/
@java.lang.Override
public com.google.crypto.tink.proto.HashType getHkdfHashType() {
com.google.crypto.tink.proto.HashType result = com.google.crypto.tink.proto.HashType.forNumber(hkdfHashType_);
return result == null ? com.google.crypto.tink.proto.HashType.UNRECOGNIZED : result;
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @param value The enum numeric value on the wire for hkdfHashType to set.
*/
private void setHkdfHashTypeValue(int value) {
hkdfHashType_ = value;
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @param value The hkdfHashType to set.
*/
private void setHkdfHashType(com.google.crypto.tink.proto.HashType value) {
hkdfHashType_ = value.getNumber();
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
*/
private void clearHkdfHashType() {
hkdfHashType_ = 0;
}
public static final int HMAC_PARAMS_FIELD_NUMBER = 4;
private com.google.crypto.tink.proto.HmacParams hmacParams_;
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
@java.lang.Override
public boolean hasHmacParams() {
return ((bitField0_ & 0x00000001) != 0);
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
@java.lang.Override
public com.google.crypto.tink.proto.HmacParams getHmacParams() {
return hmacParams_ == null ? com.google.crypto.tink.proto.HmacParams.getDefaultInstance() : hmacParams_;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
private void setHmacParams(com.google.crypto.tink.proto.HmacParams value) {
value.getClass();
hmacParams_ = value;
bitField0_ |= 0x00000001;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
@java.lang.SuppressWarnings({"ReferenceEquality"})
private void mergeHmacParams(com.google.crypto.tink.proto.HmacParams value) {
value.getClass();
if (hmacParams_ != null &&
hmacParams_ != com.google.crypto.tink.proto.HmacParams.getDefaultInstance()) {
hmacParams_ =
com.google.crypto.tink.proto.HmacParams.newBuilder(hmacParams_).mergeFrom(value).buildPartial();
} else {
hmacParams_ = value;
}
bitField0_ |= 0x00000001;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
private void clearHmacParams() { hmacParams_ = null;
bitField0_ = (bitField0_ & ~0x00000001);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data, extensionRegistry);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data, extensionRegistry);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data, extensionRegistry);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input, extensionRegistry);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return parseDelimitedFrom(DEFAULT_INSTANCE, input);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return parseDelimitedFrom(DEFAULT_INSTANCE, input, extensionRegistry);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input, extensionRegistry);
}
public static Builder newBuilder() {
return (Builder) DEFAULT_INSTANCE.createBuilder();
}
public static Builder newBuilder(com.google.crypto.tink.proto.AesCtrHmacStreamingParams prototype) {
return DEFAULT_INSTANCE.createBuilder(prototype);
}
/**
* Protobuf type {@code google.crypto.tink.AesCtrHmacStreamingParams}
*/
public static final class Builder extends
com.google.protobuf.GeneratedMessageLite.Builder<
com.google.crypto.tink.proto.AesCtrHmacStreamingParams, Builder> implements
// @@protoc_insertion_point(builder_implements:google.crypto.tink.AesCtrHmacStreamingParams)
com.google.crypto.tink.proto.AesCtrHmacStreamingParamsOrBuilder {
// Construct using com.google.crypto.tink.proto.AesCtrHmacStreamingParams.newBuilder()
private Builder() {
super(DEFAULT_INSTANCE);
}
/**
* uint32 ciphertext_segment_size = 1;
* @return The ciphertextSegmentSize.
*/
@java.lang.Override
public int getCiphertextSegmentSize() {
return instance.getCiphertextSegmentSize();
}
/**
* uint32 ciphertext_segment_size = 1;
* @param value The ciphertextSegmentSize to set.
* @return This builder for chaining.
*/
public Builder setCiphertextSegmentSize(int value) {
copyOnWrite();
instance.setCiphertextSegmentSize(value);
return this;
}
/**
* uint32 ciphertext_segment_size = 1;
* @return This builder for chaining.
*/
public Builder clearCiphertextSegmentSize() {
copyOnWrite();
instance.clearCiphertextSegmentSize();
return this;
}
/**
*
* size of AES-CTR keys derived for each segment
*
*
* uint32 derived_key_size = 2;
* @return The derivedKeySize.
*/
@java.lang.Override
public int getDerivedKeySize() {
return instance.getDerivedKeySize();
}
/**
*
* size of AES-CTR keys derived for each segment
*
*
* uint32 derived_key_size = 2;
* @param value The derivedKeySize to set.
* @return This builder for chaining.
*/
public Builder setDerivedKeySize(int value) {
copyOnWrite();
instance.setDerivedKeySize(value);
return this;
}
/**
*
* size of AES-CTR keys derived for each segment
*
*
* uint32 derived_key_size = 2;
* @return This builder for chaining.
*/
public Builder clearDerivedKeySize() {
copyOnWrite();
instance.clearDerivedKeySize();
return this;
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @return The enum numeric value on the wire for hkdfHashType.
*/
@java.lang.Override
public int getHkdfHashTypeValue() {
return instance.getHkdfHashTypeValue();
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @param value The hkdfHashType to set.
* @return This builder for chaining.
*/
public Builder setHkdfHashTypeValue(int value) {
copyOnWrite();
instance.setHkdfHashTypeValue(value);
return this;
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @return The hkdfHashType.
*/
@java.lang.Override
public com.google.crypto.tink.proto.HashType getHkdfHashType() {
return instance.getHkdfHashType();
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @param value The enum numeric value on the wire for hkdfHashType to set.
* @return This builder for chaining.
*/
public Builder setHkdfHashType(com.google.crypto.tink.proto.HashType value) {
copyOnWrite();
instance.setHkdfHashType(value);
return this;
}
/**
*
* hash function for key derivation via HKDF
*
*
* .google.crypto.tink.HashType hkdf_hash_type = 3;
* @return This builder for chaining.
*/
public Builder clearHkdfHashType() {
copyOnWrite();
instance.clearHkdfHashType();
return this;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
@java.lang.Override
public boolean hasHmacParams() {
return instance.hasHmacParams();
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
@java.lang.Override
public com.google.crypto.tink.proto.HmacParams getHmacParams() {
return instance.getHmacParams();
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
public Builder setHmacParams(com.google.crypto.tink.proto.HmacParams value) {
copyOnWrite();
instance.setHmacParams(value);
return this;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
public Builder setHmacParams(
com.google.crypto.tink.proto.HmacParams.Builder builderForValue) {
copyOnWrite();
instance.setHmacParams(builderForValue.build());
return this;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
public Builder mergeHmacParams(com.google.crypto.tink.proto.HmacParams value) {
copyOnWrite();
instance.mergeHmacParams(value);
return this;
}
/**
*
* params for authentication tags
*
*
* .google.crypto.tink.HmacParams hmac_params = 4;
*/
public Builder clearHmacParams() { copyOnWrite();
instance.clearHmacParams();
return this;
}
// @@protoc_insertion_point(builder_scope:google.crypto.tink.AesCtrHmacStreamingParams)
}
@java.lang.Override
@java.lang.SuppressWarnings({"unchecked", "fallthrough"})
protected final java.lang.Object dynamicMethod(
com.google.protobuf.GeneratedMessageLite.MethodToInvoke method,
java.lang.Object arg0, java.lang.Object arg1) {
switch (method) {
case NEW_MUTABLE_INSTANCE: {
return new com.google.crypto.tink.proto.AesCtrHmacStreamingParams();
}
case NEW_BUILDER: {
return new Builder();
}
case BUILD_MESSAGE_INFO: {
java.lang.Object[] objects = new java.lang.Object[] {
"bitField0_",
"ciphertextSegmentSize_",
"derivedKeySize_",
"hkdfHashType_",
"hmacParams_",
};
java.lang.String info =
"\u0000\u0004\u0000\u0001\u0001\u0004\u0004\u0000\u0000\u0000\u0001\u000b\u0002\u000b" +
"\u0003\f\u0004\u1009\u0000";
return newMessageInfo(DEFAULT_INSTANCE, info, objects);
}
// fall through
case GET_DEFAULT_INSTANCE: {
return DEFAULT_INSTANCE;
}
case GET_PARSER: {
com.google.protobuf.Parser parser = PARSER;
if (parser == null) {
synchronized (com.google.crypto.tink.proto.AesCtrHmacStreamingParams.class) {
parser = PARSER;
if (parser == null) {
parser =
new DefaultInstanceBasedParser(
DEFAULT_INSTANCE);
PARSER = parser;
}
}
}
return parser;
}
case GET_MEMOIZED_IS_INITIALIZED: {
return (byte) 1;
}
case SET_MEMOIZED_IS_INITIALIZED: {
return null;
}
}
throw new UnsupportedOperationException();
}
// @@protoc_insertion_point(class_scope:google.crypto.tink.AesCtrHmacStreamingParams)
private static final com.google.crypto.tink.proto.AesCtrHmacStreamingParams DEFAULT_INSTANCE;
static {
AesCtrHmacStreamingParams defaultInstance = new AesCtrHmacStreamingParams();
// New instances are implicitly immutable so no need to make
// immutable.
DEFAULT_INSTANCE = defaultInstance;
com.google.protobuf.GeneratedMessageLite.registerDefaultInstance(
AesCtrHmacStreamingParams.class, defaultInstance);
}
public static com.google.crypto.tink.proto.AesCtrHmacStreamingParams getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static volatile com.google.protobuf.Parser PARSER;
public static com.google.protobuf.Parser parser() {
return DEFAULT_INSTANCE.getParserForType();
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy