com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat Maven / Gradle / Ivy
// Generated by the protocol buffer compiler. DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: proto/kms_envelope.proto
// Protobuf Java Version: 4.28.2
package com.google.crypto.tink.proto;
/**
* Protobuf type {@code google.crypto.tink.KmsEnvelopeAeadKeyFormat}
*/
public final class KmsEnvelopeAeadKeyFormat extends
com.google.protobuf.GeneratedMessageLite<
KmsEnvelopeAeadKeyFormat, KmsEnvelopeAeadKeyFormat.Builder> implements
// @@protoc_insertion_point(message_implements:google.crypto.tink.KmsEnvelopeAeadKeyFormat)
KmsEnvelopeAeadKeyFormatOrBuilder {
private KmsEnvelopeAeadKeyFormat() {
kekUri_ = "";
}
private int bitField0_;
public static final int KEK_URI_FIELD_NUMBER = 1;
private java.lang.String kekUri_;
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @return The kekUri.
*/
@java.lang.Override
public java.lang.String getKekUri() {
return kekUri_;
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @return The bytes for kekUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString
getKekUriBytes() {
return com.google.protobuf.ByteString.copyFromUtf8(kekUri_);
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @param value The kekUri to set.
*/
private void setKekUri(
java.lang.String value) {
java.lang.Class> valueClass = value.getClass();
kekUri_ = value;
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
*/
private void clearKekUri() {
kekUri_ = getDefaultInstance().getKekUri();
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @param value The bytes for kekUri to set.
*/
private void setKekUriBytes(
com.google.protobuf.ByteString value) {
checkByteStringIsUtf8(value);
kekUri_ = value.toStringUtf8();
}
public static final int DEK_TEMPLATE_FIELD_NUMBER = 2;
private com.google.crypto.tink.proto.KeyTemplate dekTemplate_;
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
@java.lang.Override
public boolean hasDekTemplate() {
return ((bitField0_ & 0x00000001) != 0);
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
@java.lang.Override
public com.google.crypto.tink.proto.KeyTemplate getDekTemplate() {
return dekTemplate_ == null ? com.google.crypto.tink.proto.KeyTemplate.getDefaultInstance() : dekTemplate_;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
private void setDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) {
value.getClass();
dekTemplate_ = value;
bitField0_ |= 0x00000001;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
@java.lang.SuppressWarnings({"ReferenceEquality"})
private void mergeDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) {
value.getClass();
if (dekTemplate_ != null &&
dekTemplate_ != com.google.crypto.tink.proto.KeyTemplate.getDefaultInstance()) {
dekTemplate_ =
com.google.crypto.tink.proto.KeyTemplate.newBuilder(dekTemplate_).mergeFrom(value).buildPartial();
} else {
dekTemplate_ = value;
}
bitField0_ |= 0x00000001;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
private void clearDekTemplate() { dekTemplate_ = null;
bitField0_ = (bitField0_ & ~0x00000001);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data, extensionRegistry);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data, extensionRegistry);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, data, extensionRegistry);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input, extensionRegistry);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return parseDelimitedFrom(DEFAULT_INSTANCE, input);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return parseDelimitedFrom(DEFAULT_INSTANCE, input, extensionRegistry);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageLite.parseFrom(
DEFAULT_INSTANCE, input, extensionRegistry);
}
public static Builder newBuilder() {
return (Builder) DEFAULT_INSTANCE.createBuilder();
}
public static Builder newBuilder(com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat prototype) {
return DEFAULT_INSTANCE.createBuilder(prototype);
}
/**
* Protobuf type {@code google.crypto.tink.KmsEnvelopeAeadKeyFormat}
*/
public static final class Builder extends
com.google.protobuf.GeneratedMessageLite.Builder<
com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat, Builder> implements
// @@protoc_insertion_point(builder_implements:google.crypto.tink.KmsEnvelopeAeadKeyFormat)
com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormatOrBuilder {
// Construct using com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat.newBuilder()
private Builder() {
super(DEFAULT_INSTANCE);
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @return The kekUri.
*/
@java.lang.Override
public java.lang.String getKekUri() {
return instance.getKekUri();
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @return The bytes for kekUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString
getKekUriBytes() {
return instance.getKekUriBytes();
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @param value The kekUri to set.
* @return This builder for chaining.
*/
public Builder setKekUri(
java.lang.String value) {
copyOnWrite();
instance.setKekUri(value);
return this;
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @return This builder for chaining.
*/
public Builder clearKekUri() {
copyOnWrite();
instance.clearKekUri();
return this;
}
/**
*
* Required.
* The location of the KEK in a remote KMS.
* With Google Cloud KMS, valid values have this format:
* gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
* With AWS KMS, valid values have this format:
* aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
*
*
* string kek_uri = 1;
* @param value The bytes for kekUri to set.
* @return This builder for chaining.
*/
public Builder setKekUriBytes(
com.google.protobuf.ByteString value) {
copyOnWrite();
instance.setKekUriBytes(value);
return this;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
@java.lang.Override
public boolean hasDekTemplate() {
return instance.hasDekTemplate();
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
@java.lang.Override
public com.google.crypto.tink.proto.KeyTemplate getDekTemplate() {
return instance.getDekTemplate();
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
public Builder setDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) {
copyOnWrite();
instance.setDekTemplate(value);
return this;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
public Builder setDekTemplate(
com.google.crypto.tink.proto.KeyTemplate.Builder builderForValue) {
copyOnWrite();
instance.setDekTemplate(builderForValue.build());
return this;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
public Builder mergeDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) {
copyOnWrite();
instance.mergeDekTemplate(value);
return this;
}
/**
*
* Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
* Required.
*
*
* .google.crypto.tink.KeyTemplate dek_template = 2;
*/
public Builder clearDekTemplate() { copyOnWrite();
instance.clearDekTemplate();
return this;
}
// @@protoc_insertion_point(builder_scope:google.crypto.tink.KmsEnvelopeAeadKeyFormat)
}
@java.lang.Override
@java.lang.SuppressWarnings({"unchecked", "fallthrough"})
protected final java.lang.Object dynamicMethod(
com.google.protobuf.GeneratedMessageLite.MethodToInvoke method,
java.lang.Object arg0, java.lang.Object arg1) {
switch (method) {
case NEW_MUTABLE_INSTANCE: {
return new com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat();
}
case NEW_BUILDER: {
return new Builder();
}
case BUILD_MESSAGE_INFO: {
java.lang.Object[] objects = new java.lang.Object[] {
"bitField0_",
"kekUri_",
"dekTemplate_",
};
java.lang.String info =
"\u0000\u0002\u0000\u0001\u0001\u0002\u0002\u0000\u0000\u0000\u0001\u0208\u0002\u1009" +
"\u0000";
return newMessageInfo(DEFAULT_INSTANCE, info, objects);
}
// fall through
case GET_DEFAULT_INSTANCE: {
return DEFAULT_INSTANCE;
}
case GET_PARSER: {
com.google.protobuf.Parser parser = PARSER;
if (parser == null) {
synchronized (com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat.class) {
parser = PARSER;
if (parser == null) {
parser =
new DefaultInstanceBasedParser(
DEFAULT_INSTANCE);
PARSER = parser;
}
}
}
return parser;
}
case GET_MEMOIZED_IS_INITIALIZED: {
return (byte) 1;
}
case SET_MEMOIZED_IS_INITIALIZED: {
return null;
}
}
throw new UnsupportedOperationException();
}
// @@protoc_insertion_point(class_scope:google.crypto.tink.KmsEnvelopeAeadKeyFormat)
private static final com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat DEFAULT_INSTANCE;
static {
KmsEnvelopeAeadKeyFormat defaultInstance = new KmsEnvelopeAeadKeyFormat();
// New instances are implicitly immutable so no need to make
// immutable.
DEFAULT_INSTANCE = defaultInstance;
com.google.protobuf.GeneratedMessageLite.registerDefaultInstance(
KmsEnvelopeAeadKeyFormat.class, defaultInstance);
}
public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static volatile com.google.protobuf.Parser PARSER;
public static com.google.protobuf.Parser parser() {
return DEFAULT_INSTANCE.getParserForType();
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy