All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat Maven / Gradle / Ivy

// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: proto/kms_envelope.proto
// Protobuf Java Version: 4.28.2

package com.google.crypto.tink.proto;

/**
 * Protobuf type {@code google.crypto.tink.KmsEnvelopeAeadKeyFormat}
 */
public  final class KmsEnvelopeAeadKeyFormat extends
    com.google.protobuf.GeneratedMessageLite<
        KmsEnvelopeAeadKeyFormat, KmsEnvelopeAeadKeyFormat.Builder> implements
    // @@protoc_insertion_point(message_implements:google.crypto.tink.KmsEnvelopeAeadKeyFormat)
    KmsEnvelopeAeadKeyFormatOrBuilder {
  private KmsEnvelopeAeadKeyFormat() {
    kekUri_ = "";
  }
  private int bitField0_;
  public static final int KEK_URI_FIELD_NUMBER = 1;
  private java.lang.String kekUri_;
  /**
   * 
   * Required.
   * The location of the KEK in a remote KMS.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string kek_uri = 1; * @return The kekUri. */ @java.lang.Override public java.lang.String getKekUri() { return kekUri_; } /** *
   * Required.
   * The location of the KEK in a remote KMS.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string kek_uri = 1; * @return The bytes for kekUri. */ @java.lang.Override public com.google.protobuf.ByteString getKekUriBytes() { return com.google.protobuf.ByteString.copyFromUtf8(kekUri_); } /** *
   * Required.
   * The location of the KEK in a remote KMS.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string kek_uri = 1; * @param value The kekUri to set. */ private void setKekUri( java.lang.String value) { java.lang.Class valueClass = value.getClass(); kekUri_ = value; } /** *
   * Required.
   * The location of the KEK in a remote KMS.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string kek_uri = 1; */ private void clearKekUri() { kekUri_ = getDefaultInstance().getKekUri(); } /** *
   * Required.
   * The location of the KEK in a remote KMS.
   * With Google Cloud KMS, valid values have this format:
   * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
   * With AWS KMS, valid values have this format:
   * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
   * 
* * string kek_uri = 1; * @param value The bytes for kekUri to set. */ private void setKekUriBytes( com.google.protobuf.ByteString value) { checkByteStringIsUtf8(value); kekUri_ = value.toStringUtf8(); } public static final int DEK_TEMPLATE_FIELD_NUMBER = 2; private com.google.crypto.tink.proto.KeyTemplate dekTemplate_; /** *
   * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
   * Required.
   * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ @java.lang.Override public boolean hasDekTemplate() { return ((bitField0_ & 0x00000001) != 0); } /** *
   * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
   * Required.
   * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ @java.lang.Override public com.google.crypto.tink.proto.KeyTemplate getDekTemplate() { return dekTemplate_ == null ? com.google.crypto.tink.proto.KeyTemplate.getDefaultInstance() : dekTemplate_; } /** *
   * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
   * Required.
   * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ private void setDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) { value.getClass(); dekTemplate_ = value; bitField0_ |= 0x00000001; } /** *
   * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
   * Required.
   * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ @java.lang.SuppressWarnings({"ReferenceEquality"}) private void mergeDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) { value.getClass(); if (dekTemplate_ != null && dekTemplate_ != com.google.crypto.tink.proto.KeyTemplate.getDefaultInstance()) { dekTemplate_ = com.google.crypto.tink.proto.KeyTemplate.newBuilder(dekTemplate_).mergeFrom(value).buildPartial(); } else { dekTemplate_ = value; } bitField0_ |= 0x00000001; } /** *
   * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
   * Required.
   * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ private void clearDekTemplate() { dekTemplate_ = null; bitField0_ = (bitField0_ & ~0x00000001); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, data, extensionRegistry); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return parseDelimitedFrom(DEFAULT_INSTANCE, input, extensionRegistry); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageLite.parseFrom( DEFAULT_INSTANCE, input, extensionRegistry); } public static Builder newBuilder() { return (Builder) DEFAULT_INSTANCE.createBuilder(); } public static Builder newBuilder(com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat prototype) { return DEFAULT_INSTANCE.createBuilder(prototype); } /** * Protobuf type {@code google.crypto.tink.KmsEnvelopeAeadKeyFormat} */ public static final class Builder extends com.google.protobuf.GeneratedMessageLite.Builder< com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat, Builder> implements // @@protoc_insertion_point(builder_implements:google.crypto.tink.KmsEnvelopeAeadKeyFormat) com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormatOrBuilder { // Construct using com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat.newBuilder() private Builder() { super(DEFAULT_INSTANCE); } /** *
     * Required.
     * The location of the KEK in a remote KMS.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string kek_uri = 1; * @return The kekUri. */ @java.lang.Override public java.lang.String getKekUri() { return instance.getKekUri(); } /** *
     * Required.
     * The location of the KEK in a remote KMS.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string kek_uri = 1; * @return The bytes for kekUri. */ @java.lang.Override public com.google.protobuf.ByteString getKekUriBytes() { return instance.getKekUriBytes(); } /** *
     * Required.
     * The location of the KEK in a remote KMS.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string kek_uri = 1; * @param value The kekUri to set. * @return This builder for chaining. */ public Builder setKekUri( java.lang.String value) { copyOnWrite(); instance.setKekUri(value); return this; } /** *
     * Required.
     * The location of the KEK in a remote KMS.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string kek_uri = 1; * @return This builder for chaining. */ public Builder clearKekUri() { copyOnWrite(); instance.clearKekUri(); return this; } /** *
     * Required.
     * The location of the KEK in a remote KMS.
     * With Google Cloud KMS, valid values have this format:
     * gcp-kms://projects/*/locations/*/keyRings/*/cryptoKeys/*.
     * With AWS KMS, valid values have this format:
     * aws-kms://arn:aws:kms:<region>:<account-id>:key/<key-id>
     * 
* * string kek_uri = 1; * @param value The bytes for kekUri to set. * @return This builder for chaining. */ public Builder setKekUriBytes( com.google.protobuf.ByteString value) { copyOnWrite(); instance.setKekUriBytes(value); return this; } /** *
     * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
     * Required.
     * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ @java.lang.Override public boolean hasDekTemplate() { return instance.hasDekTemplate(); } /** *
     * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
     * Required.
     * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ @java.lang.Override public com.google.crypto.tink.proto.KeyTemplate getDekTemplate() { return instance.getDekTemplate(); } /** *
     * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
     * Required.
     * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ public Builder setDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) { copyOnWrite(); instance.setDekTemplate(value); return this; } /** *
     * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
     * Required.
     * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ public Builder setDekTemplate( com.google.crypto.tink.proto.KeyTemplate.Builder builderForValue) { copyOnWrite(); instance.setDekTemplate(builderForValue.build()); return this; } /** *
     * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
     * Required.
     * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ public Builder mergeDekTemplate(com.google.crypto.tink.proto.KeyTemplate value) { copyOnWrite(); instance.mergeDekTemplate(value); return this; } /** *
     * Key template of the Data Encryption Key, e.g., AesCtrHmacAeadKeyFormat.
     * Required.
     * 
* * .google.crypto.tink.KeyTemplate dek_template = 2; */ public Builder clearDekTemplate() { copyOnWrite(); instance.clearDekTemplate(); return this; } // @@protoc_insertion_point(builder_scope:google.crypto.tink.KmsEnvelopeAeadKeyFormat) } @java.lang.Override @java.lang.SuppressWarnings({"unchecked", "fallthrough"}) protected final java.lang.Object dynamicMethod( com.google.protobuf.GeneratedMessageLite.MethodToInvoke method, java.lang.Object arg0, java.lang.Object arg1) { switch (method) { case NEW_MUTABLE_INSTANCE: { return new com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat(); } case NEW_BUILDER: { return new Builder(); } case BUILD_MESSAGE_INFO: { java.lang.Object[] objects = new java.lang.Object[] { "bitField0_", "kekUri_", "dekTemplate_", }; java.lang.String info = "\u0000\u0002\u0000\u0001\u0001\u0002\u0002\u0000\u0000\u0000\u0001\u0208\u0002\u1009" + "\u0000"; return newMessageInfo(DEFAULT_INSTANCE, info, objects); } // fall through case GET_DEFAULT_INSTANCE: { return DEFAULT_INSTANCE; } case GET_PARSER: { com.google.protobuf.Parser parser = PARSER; if (parser == null) { synchronized (com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat.class) { parser = PARSER; if (parser == null) { parser = new DefaultInstanceBasedParser( DEFAULT_INSTANCE); PARSER = parser; } } } return parser; } case GET_MEMOIZED_IS_INITIALIZED: { return (byte) 1; } case SET_MEMOIZED_IS_INITIALIZED: { return null; } } throw new UnsupportedOperationException(); } // @@protoc_insertion_point(class_scope:google.crypto.tink.KmsEnvelopeAeadKeyFormat) private static final com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat DEFAULT_INSTANCE; static { KmsEnvelopeAeadKeyFormat defaultInstance = new KmsEnvelopeAeadKeyFormat(); // New instances are implicitly immutable so no need to make // immutable. DEFAULT_INSTANCE = defaultInstance; com.google.protobuf.GeneratedMessageLite.registerDefaultInstance( KmsEnvelopeAeadKeyFormat.class, defaultInstance); } public static com.google.crypto.tink.proto.KmsEnvelopeAeadKeyFormat getDefaultInstance() { return DEFAULT_INSTANCE; } private static volatile com.google.protobuf.Parser PARSER; public static com.google.protobuf.Parser parser() { return DEFAULT_INSTANCE.getParserForType(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy