All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.crypto.tink.proto.AesGcmHkdfStreamingParams Maven / Gradle / Ivy

Go to download

Tink is a small cryptographic library that provides a safe, simple, agile and fast way to accomplish some common cryptographic tasks.

The newest version!
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: proto/aes_gcm_hkdf_streaming.proto
// Protobuf Java Version: 4.28.2

package com.google.crypto.tink.proto;

/**
 * Protobuf type {@code google.crypto.tink.AesGcmHkdfStreamingParams}
 */
public  final class AesGcmHkdfStreamingParams extends
    com.google.protobuf.GeneratedMessageLite<
        AesGcmHkdfStreamingParams, AesGcmHkdfStreamingParams.Builder> implements
    // @@protoc_insertion_point(message_implements:google.crypto.tink.AesGcmHkdfStreamingParams)
    AesGcmHkdfStreamingParamsOrBuilder {
  private AesGcmHkdfStreamingParams() {
  }
  public static final int CIPHERTEXT_SEGMENT_SIZE_FIELD_NUMBER = 1;
  private int ciphertextSegmentSize_;
  /**
   * uint32 ciphertext_segment_size = 1;
   * @return The ciphertextSegmentSize.
   */
  @java.lang.Override
  public int getCiphertextSegmentSize() {
    return ciphertextSegmentSize_;
  }
  /**
   * uint32 ciphertext_segment_size = 1;
   * @param value The ciphertextSegmentSize to set.
   */
  private void setCiphertextSegmentSize(int value) {
    
    ciphertextSegmentSize_ = value;
  }
  /**
   * uint32 ciphertext_segment_size = 1;
   */
  private void clearCiphertextSegmentSize() {

    ciphertextSegmentSize_ = 0;
  }

  public static final int DERIVED_KEY_SIZE_FIELD_NUMBER = 2;
  private int derivedKeySize_;
  /**
   * 
   * size of AES-GCM keys derived for each segment
   * 
* * uint32 derived_key_size = 2; * @return The derivedKeySize. */ @java.lang.Override public int getDerivedKeySize() { return derivedKeySize_; } /** *
   * size of AES-GCM keys derived for each segment
   * 
* * uint32 derived_key_size = 2; * @param value The derivedKeySize to set. */ private void setDerivedKeySize(int value) { derivedKeySize_ = value; } /** *
   * size of AES-GCM keys derived for each segment
   * 
* * uint32 derived_key_size = 2; */ private void clearDerivedKeySize() { derivedKeySize_ = 0; } public static final int HKDF_HASH_TYPE_FIELD_NUMBER = 3; private int hkdfHashType_; /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The enum numeric value on the wire for hkdfHashType. */ @java.lang.Override public int getHkdfHashTypeValue() { return hkdfHashType_; } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The hkdfHashType. */ @java.lang.Override public com.google.crypto.tink.proto.HashType getHkdfHashType() { com.google.crypto.tink.proto.HashType result = com.google.crypto.tink.proto.HashType.forNumber(hkdfHashType_); return result == null ? com.google.crypto.tink.proto.HashType.UNRECOGNIZED : result; } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The enum numeric value on the wire for hkdfHashType to set. */ private void setHkdfHashTypeValue(int value) { hkdfHashType_ = value; } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The hkdfHashType to set. */ private void setHkdfHashType(com.google.crypto.tink.proto.HashType value) { hkdfHashType_ = value.getNumber(); } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; */ private void clearHkdfHashType() { hkdfHashType_ = 0; } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static Builder newBuilder() { return (Builder) DEFAULT_INSTANCE.createBuilder(); } public static Builder newBuilder(com.google.crypto.tink.proto.AesGcmHkdfStreamingParams prototype) { return DEFAULT_INSTANCE.createBuilder(prototype); } /** * Protobuf type {@code google.crypto.tink.AesGcmHkdfStreamingParams} */ public static final class Builder extends com.google.protobuf.GeneratedMessageLite.Builder< com.google.crypto.tink.proto.AesGcmHkdfStreamingParams, Builder> implements // @@protoc_insertion_point(builder_implements:google.crypto.tink.AesGcmHkdfStreamingParams) com.google.crypto.tink.proto.AesGcmHkdfStreamingParamsOrBuilder { // Construct using com.google.crypto.tink.proto.AesGcmHkdfStreamingParams.newBuilder() private Builder() { super(DEFAULT_INSTANCE); } /** * uint32 ciphertext_segment_size = 1; * @return The ciphertextSegmentSize. */ @java.lang.Override public int getCiphertextSegmentSize() { return instance.getCiphertextSegmentSize(); } /** * uint32 ciphertext_segment_size = 1; * @param value The ciphertextSegmentSize to set. * @return This builder for chaining. */ public Builder setCiphertextSegmentSize(int value) { copyOnWrite(); instance.setCiphertextSegmentSize(value); return this; } /** * uint32 ciphertext_segment_size = 1; * @return This builder for chaining. */ public Builder clearCiphertextSegmentSize() { copyOnWrite(); instance.clearCiphertextSegmentSize(); return this; } /** *
     * size of AES-GCM keys derived for each segment
     * 
* * uint32 derived_key_size = 2; * @return The derivedKeySize. */ @java.lang.Override public int getDerivedKeySize() { return instance.getDerivedKeySize(); } /** *
     * size of AES-GCM keys derived for each segment
     * 
* * uint32 derived_key_size = 2; * @param value The derivedKeySize to set. * @return This builder for chaining. */ public Builder setDerivedKeySize(int value) { copyOnWrite(); instance.setDerivedKeySize(value); return this; } /** *
     * size of AES-GCM keys derived for each segment
     * 
* * uint32 derived_key_size = 2; * @return This builder for chaining. */ public Builder clearDerivedKeySize() { copyOnWrite(); instance.clearDerivedKeySize(); return this; } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The enum numeric value on the wire for hkdfHashType. */ @java.lang.Override public int getHkdfHashTypeValue() { return instance.getHkdfHashTypeValue(); } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The hkdfHashType to set. * @return This builder for chaining. */ public Builder setHkdfHashTypeValue(int value) { copyOnWrite(); instance.setHkdfHashTypeValue(value); return this; } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return The hkdfHashType. */ @java.lang.Override public com.google.crypto.tink.proto.HashType getHkdfHashType() { return instance.getHkdfHashType(); } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @param value The enum numeric value on the wire for hkdfHashType to set. * @return This builder for chaining. */ public Builder setHkdfHashType(com.google.crypto.tink.proto.HashType value) { copyOnWrite(); instance.setHkdfHashType(value); return this; } /** * .google.crypto.tink.HashType hkdf_hash_type = 3; * @return This builder for chaining. */ public Builder clearHkdfHashType() { copyOnWrite(); instance.clearHkdfHashType(); return this; } // @@protoc_insertion_point(builder_scope:google.crypto.tink.AesGcmHkdfStreamingParams) } @java.lang.Override @java.lang.SuppressWarnings({"unchecked", "fallthrough"}) protected final java.lang.Object dynamicMethod( com.google.protobuf.GeneratedMessageLite.MethodToInvoke method, java.lang.Object arg0, java.lang.Object arg1) { switch (method) { case NEW_MUTABLE_INSTANCE: { return new com.google.crypto.tink.proto.AesGcmHkdfStreamingParams(); } case NEW_BUILDER: { return new Builder(); } case BUILD_MESSAGE_INFO: { java.lang.Object[] objects = new java.lang.Object[] { "ciphertextSegmentSize_", "derivedKeySize_", "hkdfHashType_", }; java.lang.String info = "\u0000\u0003\u0000\u0000\u0001\u0003\u0003\u0000\u0000\u0000\u0001\u000b\u0002\u000b" + "\u0003\f"; return newMessageInfo(DEFAULT_INSTANCE, info, objects); } // fall through case GET_DEFAULT_INSTANCE: { return DEFAULT_INSTANCE; } case GET_PARSER: { com.google.protobuf.Parser parser = PARSER; if (parser == null) { synchronized (com.google.crypto.tink.proto.AesGcmHkdfStreamingParams.class) { parser = PARSER; if (parser == null) { parser = new DefaultInstanceBasedParser( DEFAULT_INSTANCE); PARSER = parser; } } } return parser; } case GET_MEMOIZED_IS_INITIALIZED: { return (byte) 1; } case SET_MEMOIZED_IS_INITIALIZED: { return null; } } throw new UnsupportedOperationException(); } // @@protoc_insertion_point(class_scope:google.crypto.tink.AesGcmHkdfStreamingParams) private static final com.google.crypto.tink.proto.AesGcmHkdfStreamingParams DEFAULT_INSTANCE; static { AesGcmHkdfStreamingParams defaultInstance = new AesGcmHkdfStreamingParams(); // New instances are implicitly immutable so no need to make // immutable. DEFAULT_INSTANCE = defaultInstance; com.google.protobuf.GeneratedMessageLite.registerDefaultInstance( AesGcmHkdfStreamingParams.class, defaultInstance); } public static com.google.crypto.tink.proto.AesGcmHkdfStreamingParams getDefaultInstance() { return DEFAULT_INSTANCE; } private static volatile com.google.protobuf.Parser PARSER; public static com.google.protobuf.Parser parser() { return DEFAULT_INSTANCE.getParserForType(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy