All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.crypto.tink.proto.KmsAeadKeyFormat Maven / Gradle / Ivy

Go to download

Tink is a small cryptographic library that provides a safe, simple, agile and fast way to accomplish some common cryptographic tasks.

The newest version!
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: proto/kms_aead.proto
// Protobuf Java Version: 4.28.2

package com.google.crypto.tink.proto;

/**
 * Protobuf type {@code google.crypto.tink.KmsAeadKeyFormat}
 */
public  final class KmsAeadKeyFormat extends
    com.google.protobuf.GeneratedMessageLite<
        KmsAeadKeyFormat, KmsAeadKeyFormat.Builder> implements
    // @@protoc_insertion_point(message_implements:google.crypto.tink.KmsAeadKeyFormat)
    KmsAeadKeyFormatOrBuilder {
  private KmsAeadKeyFormat() {
    keyUri_ = "";
  }
  public static final int KEY_URI_FIELD_NUMBER = 1;
  private java.lang.String keyUri_;
  /**
   * 
   * Required.
   * The location of a KMS key.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string key_uri = 1; * @return The keyUri. */ @java.lang.Override public java.lang.String getKeyUri() { return keyUri_; } /** *
   * Required.
   * The location of a KMS key.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string key_uri = 1; * @return The bytes for keyUri. */ @java.lang.Override public com.google.protobuf.ByteString getKeyUriBytes() { return com.google.protobuf.ByteString.copyFromUtf8(keyUri_); } /** *
   * Required.
   * The location of a KMS key.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string key_uri = 1; * @param value The keyUri to set. */ private void setKeyUri( java.lang.String value) { java.lang.Class valueClass = value.getClass(); keyUri_ = value; } /** *
   * Required.
   * The location of a KMS key.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string key_uri = 1; */ private void clearKeyUri() { keyUri_ = getDefaultInstance().getKeyUri(); } /** *
   * Required.
   * The location of a KMS key.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string key_uri = 1; * @param value The bytes for keyUri to set. */ private void setKeyUriBytes( com.google.protobuf.ByteString value) { checkByteStringIsUtf8(value); keyUri_ = value.toStringUtf8(); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static Builder newBuilder() { return (Builder) DEFAULT_INSTANCE.createBuilder(); } public static Builder newBuilder(com.google.crypto.tink.proto.KmsAeadKeyFormat prototype) { return DEFAULT_INSTANCE.createBuilder(prototype); } /** * Protobuf type {@code google.crypto.tink.KmsAeadKeyFormat} */ public static final class Builder extends com.google.protobuf.GeneratedMessageLite.Builder< com.google.crypto.tink.proto.KmsAeadKeyFormat, Builder> implements // @@protoc_insertion_point(builder_implements:google.crypto.tink.KmsAeadKeyFormat) com.google.crypto.tink.proto.KmsAeadKeyFormatOrBuilder { // Construct using com.google.crypto.tink.proto.KmsAeadKeyFormat.newBuilder() private Builder() { super(DEFAULT_INSTANCE); } /** *
     * Required.
     * The location of a KMS key.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string key_uri = 1; * @return The keyUri. */ @java.lang.Override public java.lang.String getKeyUri() { return instance.getKeyUri(); } /** *
     * Required.
     * The location of a KMS key.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string key_uri = 1; * @return The bytes for keyUri. */ @java.lang.Override public com.google.protobuf.ByteString getKeyUriBytes() { return instance.getKeyUriBytes(); } /** *
     * Required.
     * The location of a KMS key.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string key_uri = 1; * @param value The keyUri to set. * @return This builder for chaining. */ public Builder setKeyUri( java.lang.String value) { copyOnWrite(); instance.setKeyUri(value); return this; } /** *
     * Required.
     * The location of a KMS key.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string key_uri = 1; * @return This builder for chaining. */ public Builder clearKeyUri() { copyOnWrite(); instance.clearKeyUri(); return this; } /** *
     * Required.
     * The location of a KMS key.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string key_uri = 1; * @param value The bytes for keyUri to set. * @return This builder for chaining. */ public Builder setKeyUriBytes( com.google.protobuf.ByteString value) { copyOnWrite(); instance.setKeyUriBytes(value); return this; } // @@protoc_insertion_point(builder_scope:google.crypto.tink.KmsAeadKeyFormat) } @java.lang.Override @java.lang.SuppressWarnings({"unchecked", "fallthrough"}) protected final java.lang.Object dynamicMethod( com.google.protobuf.GeneratedMessageLite.MethodToInvoke method, java.lang.Object arg0, java.lang.Object arg1) { switch (method) { case NEW_MUTABLE_INSTANCE: { return new com.google.crypto.tink.proto.KmsAeadKeyFormat(); } case NEW_BUILDER: { return new Builder(); } case BUILD_MESSAGE_INFO: { java.lang.Object[] objects = new java.lang.Object[] { "keyUri_", }; java.lang.String info = "\u0000\u0001\u0000\u0000\u0001\u0001\u0001\u0000\u0000\u0000\u0001\u0208"; return newMessageInfo(DEFAULT_INSTANCE, info, objects); } // fall through case GET_DEFAULT_INSTANCE: { return DEFAULT_INSTANCE; } case GET_PARSER: { com.google.protobuf.Parser parser = PARSER; if (parser == null) { synchronized (com.google.crypto.tink.proto.KmsAeadKeyFormat.class) { parser = PARSER; if (parser == null) { parser = new DefaultInstanceBasedParser( DEFAULT_INSTANCE); PARSER = parser; } } } return parser; } case GET_MEMOIZED_IS_INITIALIZED: { return (byte) 1; } case SET_MEMOIZED_IS_INITIALIZED: { return null; } } throw new UnsupportedOperationException(); } // @@protoc_insertion_point(class_scope:google.crypto.tink.KmsAeadKeyFormat) private static final com.google.crypto.tink.proto.KmsAeadKeyFormat DEFAULT_INSTANCE; static { KmsAeadKeyFormat defaultInstance = new KmsAeadKeyFormat(); // New instances are implicitly immutable so no need to make // immutable. DEFAULT_INSTANCE = defaultInstance; com.google.protobuf.GeneratedMessageLite.registerDefaultInstance( KmsAeadKeyFormat.class, defaultInstance); } public static com.google.crypto.tink.proto.KmsAeadKeyFormat getDefaultInstance() { return DEFAULT_INSTANCE; } private static volatile com.google.protobuf.Parser PARSER; public static com.google.protobuf.Parser parser() { return DEFAULT_INSTANCE.getParserForType(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy