diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java index 0f770893..6661626e 100644 --- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java +++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java @@ -2943,7 +2943,7 @@ public final UnaryCallable decryptCallable() { * * @param name Required. The resource name of the * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing. - * @param digest Required. The digest of the data to sign. The digest must be produced with the + * @param digest Optional. The digest of the data to sign. The digest must be produced with the * same digest algorithm as specified by the key version's * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. * @throws com.google.api.gax.rpc.ApiException if the remote call fails @@ -2980,7 +2980,7 @@ public final AsymmetricSignResponse asymmetricSign(CryptoKeyVersionName name, Di * * @param name Required. The resource name of the * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing. - * @param digest Required. The digest of the data to sign. The digest must be produced with the + * @param digest Optional. The digest of the data to sign. The digest must be produced with the * same digest algorithm as specified by the key version's * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. * @throws com.google.api.gax.rpc.ApiException if the remote call fails @@ -3015,6 +3015,8 @@ public final AsymmetricSignResponse asymmetricSign(String name, Digest digest) { * .toString()) * .setDigest(Digest.newBuilder().build()) * .setDigestCrc32C(Int64Value.newBuilder().build()) + * .setData(ByteString.EMPTY) + * .setDataCrc32C(Int64Value.newBuilder().build()) * .build(); * AsymmetricSignResponse response = keyManagementServiceClient.asymmetricSign(request); * } @@ -3051,6 +3053,8 @@ public final AsymmetricSignResponse asymmetricSign(AsymmetricSignRequest request * .toString()) * .setDigest(Digest.newBuilder().build()) * .setDigestCrc32C(Int64Value.newBuilder().build()) + * .setData(ByteString.EMPTY) + * .setDataCrc32C(Int64Value.newBuilder().build()) * .build(); * ApiFuture future = * keyManagementServiceClient.asymmetricSignCallable().futureCall(request); diff --git a/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java b/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java index ff588236..dbc318db 100644 --- a/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java +++ b/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java @@ -2077,6 +2077,7 @@ public void asymmetricSignTest() throws Exception { .setSignatureCrc32C(Int64Value.newBuilder().build()) .setVerifiedDigestCrc32C(true) .setName("name3373707") + .setVerifiedDataCrc32C(true) .setProtectionLevel(ProtectionLevel.forNumber(0)) .build(); mockKeyManagementService.addResponse(expectedResponse); @@ -2126,6 +2127,7 @@ public void asymmetricSignTest2() throws Exception { .setSignatureCrc32C(Int64Value.newBuilder().build()) .setVerifiedDigestCrc32C(true) .setName("name3373707") + .setVerifiedDataCrc32C(true) .setProtectionLevel(ProtectionLevel.forNumber(0)) .build(); mockKeyManagementService.addResponse(expectedResponse); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricDecryptRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricDecryptRequest.java index 023beba8..06751b1e 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricDecryptRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricDecryptRequest.java @@ -310,7 +310,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!ciphertext_.isEmpty()) { @@ -328,7 +328,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!ciphertext_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequest.java index 2f04d9b0..9e41135f 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequest.java @@ -39,6 +39,7 @@ private AsymmetricSignRequest(com.google.protobuf.GeneratedMessageV3.Builder private AsymmetricSignRequest() { name_ = ""; + data_ = com.google.protobuf.ByteString.EMPTY; } @java.lang.Override @@ -105,6 +106,26 @@ private AsymmetricSignRequest( digestCrc32C_ = subBuilder.buildPartial(); } + break; + } + case 50: + { + data_ = input.readBytes(); + break; + } + case 58: + { + com.google.protobuf.Int64Value.Builder subBuilder = null; + if (dataCrc32C_ != null) { + subBuilder = dataCrc32C_.toBuilder(); + } + dataCrc32C_ = + input.readMessage(com.google.protobuf.Int64Value.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(dataCrc32C_); + dataCrc32C_ = subBuilder.buildPartial(); + } + break; } default: @@ -200,12 +221,12 @@ public com.google.protobuf.ByteString getNameBytes() { * * *
-   * Required. The digest of the data to sign. The digest must be produced with
+   * Optional. The digest of the data to sign. The digest must be produced with
    * the same digest algorithm as specified by the key version's
    * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
    * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * * @return Whether the digest field is set. */ @@ -217,12 +238,12 @@ public boolean hasDigest() { * * *
-   * Required. The digest of the data to sign. The digest must be produced with
+   * Optional. The digest of the data to sign. The digest must be produced with
    * the same digest algorithm as specified by the key version's
    * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
    * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * * @return The digest. */ @@ -234,12 +255,12 @@ public com.google.cloud.kms.v1.Digest getDigest() { * * *
-   * Required. The digest of the data to sign. The digest must be produced with
+   * Optional. The digest of the data to sign. The digest must be produced with
    * the same digest algorithm as specified by the key version's
    * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
    * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; */ @java.lang.Override public com.google.cloud.kms.v1.DigestOrBuilder getDigestOrBuilder() { @@ -333,6 +354,111 @@ public com.google.protobuf.Int64ValueOrBuilder getDigestCrc32COrBuilder() { return getDigestCrc32C(); } + public static final int DATA_FIELD_NUMBER = 6; + private com.google.protobuf.ByteString data_; + /** + * + * + *
+   * Optional. This field will only be honored for RAW_PKCS1 keys.
+   * The data to sign. A digest is computed over the data that will be signed,
+   * PKCS #1 padding is applied to the digest directly and then encrypted.
+   * 
+ * + * bytes data = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The data. + */ + @java.lang.Override + public com.google.protobuf.ByteString getData() { + return data_; + } + + public static final int DATA_CRC32C_FIELD_NUMBER = 7; + private com.google.protobuf.Int64Value dataCrc32C_; + /** + * + * + *
+   * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+   * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+   * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+   * fails. If you receive a checksum error, your client should verify that
+   * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+   * number of retries. A persistent mismatch may indicate an issue in your
+   * computation of the CRC32C checksum.
+   * Note: This field is defined as int64 for reasons of compatibility across
+   * different languages. However, it is a non-negative integer, which will
+   * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+   * that support this type.
+   * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + * + * @return Whether the dataCrc32c field is set. + */ + @java.lang.Override + public boolean hasDataCrc32C() { + return dataCrc32C_ != null; + } + /** + * + * + *
+   * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+   * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+   * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+   * fails. If you receive a checksum error, your client should verify that
+   * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+   * number of retries. A persistent mismatch may indicate an issue in your
+   * computation of the CRC32C checksum.
+   * Note: This field is defined as int64 for reasons of compatibility across
+   * different languages. However, it is a non-negative integer, which will
+   * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+   * that support this type.
+   * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + * + * @return The dataCrc32c. + */ + @java.lang.Override + public com.google.protobuf.Int64Value getDataCrc32C() { + return dataCrc32C_ == null ? com.google.protobuf.Int64Value.getDefaultInstance() : dataCrc32C_; + } + /** + * + * + *
+   * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+   * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+   * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+   * fails. If you receive a checksum error, your client should verify that
+   * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+   * number of retries. A persistent mismatch may indicate an issue in your
+   * computation of the CRC32C checksum.
+   * Note: This field is defined as int64 for reasons of compatibility across
+   * different languages. However, it is a non-negative integer, which will
+   * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+   * that support this type.
+   * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + @java.lang.Override + public com.google.protobuf.Int64ValueOrBuilder getDataCrc32COrBuilder() { + return getDataCrc32C(); + } + private byte memoizedIsInitialized = -1; @java.lang.Override @@ -347,7 +473,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (digest_ != null) { @@ -356,6 +482,12 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (digestCrc32C_ != null) { output.writeMessage(4, getDigestCrc32C()); } + if (!data_.isEmpty()) { + output.writeBytes(6, data_); + } + if (dataCrc32C_ != null) { + output.writeMessage(7, getDataCrc32C()); + } unknownFields.writeTo(output); } @@ -365,7 +497,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (digest_ != null) { @@ -374,6 +506,12 @@ public int getSerializedSize() { if (digestCrc32C_ != null) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(4, getDigestCrc32C()); } + if (!data_.isEmpty()) { + size += com.google.protobuf.CodedOutputStream.computeBytesSize(6, data_); + } + if (dataCrc32C_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(7, getDataCrc32C()); + } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; @@ -399,6 +537,11 @@ public boolean equals(final java.lang.Object obj) { if (hasDigestCrc32C()) { if (!getDigestCrc32C().equals(other.getDigestCrc32C())) return false; } + if (!getData().equals(other.getData())) return false; + if (hasDataCrc32C() != other.hasDataCrc32C()) return false; + if (hasDataCrc32C()) { + if (!getDataCrc32C().equals(other.getDataCrc32C())) return false; + } if (!unknownFields.equals(other.unknownFields)) return false; return true; } @@ -420,6 +563,12 @@ public int hashCode() { hash = (37 * hash) + DIGEST_CRC32C_FIELD_NUMBER; hash = (53 * hash) + getDigestCrc32C().hashCode(); } + hash = (37 * hash) + DATA_FIELD_NUMBER; + hash = (53 * hash) + getData().hashCode(); + if (hasDataCrc32C()) { + hash = (37 * hash) + DATA_CRC32C_FIELD_NUMBER; + hash = (53 * hash) + getDataCrc32C().hashCode(); + } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; @@ -579,6 +728,14 @@ public Builder clear() { digestCrc32C_ = null; digestCrc32CBuilder_ = null; } + data_ = com.google.protobuf.ByteString.EMPTY; + + if (dataCrc32CBuilder_ == null) { + dataCrc32C_ = null; + } else { + dataCrc32C_ = null; + dataCrc32CBuilder_ = null; + } return this; } @@ -617,6 +774,12 @@ public com.google.cloud.kms.v1.AsymmetricSignRequest buildPartial() { } else { result.digestCrc32C_ = digestCrc32CBuilder_.build(); } + result.data_ = data_; + if (dataCrc32CBuilder_ == null) { + result.dataCrc32C_ = dataCrc32C_; + } else { + result.dataCrc32C_ = dataCrc32CBuilder_.build(); + } onBuilt(); return result; } @@ -676,6 +839,12 @@ public Builder mergeFrom(com.google.cloud.kms.v1.AsymmetricSignRequest other) { if (other.hasDigestCrc32C()) { mergeDigestCrc32C(other.getDigestCrc32C()); } + if (other.getData() != com.google.protobuf.ByteString.EMPTY) { + setData(other.getData()); + } + if (other.hasDataCrc32C()) { + mergeDataCrc32C(other.getDataCrc32C()); + } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; @@ -831,12 +1000,12 @@ public Builder setNameBytes(com.google.protobuf.ByteString value) { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * * * @return Whether the digest field is set. @@ -848,12 +1017,12 @@ public boolean hasDigest() { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The digest. @@ -869,12 +1038,12 @@ public com.google.cloud.kms.v1.Digest getDigest() { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ public Builder setDigest(com.google.cloud.kms.v1.Digest value) { @@ -894,12 +1063,12 @@ public Builder setDigest(com.google.cloud.kms.v1.Digest value) { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ public Builder setDigest(com.google.cloud.kms.v1.Digest.Builder builderForValue) { @@ -916,12 +1085,12 @@ public Builder setDigest(com.google.cloud.kms.v1.Digest.Builder builderForValue) * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ public Builder mergeDigest(com.google.cloud.kms.v1.Digest value) { @@ -943,12 +1112,12 @@ public Builder mergeDigest(com.google.cloud.kms.v1.Digest value) { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ public Builder clearDigest() { @@ -966,12 +1135,12 @@ public Builder clearDigest() { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ public com.google.cloud.kms.v1.Digest.Builder getDigestBuilder() { @@ -983,12 +1152,12 @@ public com.google.cloud.kms.v1.Digest.Builder getDigestBuilder() { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ public com.google.cloud.kms.v1.DigestOrBuilder getDigestOrBuilder() { @@ -1002,12 +1171,12 @@ public com.google.cloud.kms.v1.DigestOrBuilder getDigestOrBuilder() { * * *
-     * Required. The digest of the data to sign. The digest must be produced with
+     * Optional. The digest of the data to sign. The digest must be produced with
      * the same digest algorithm as specified by the key version's
      * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
      * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * */ private com.google.protobuf.SingleFieldBuilderV3< @@ -1338,6 +1507,369 @@ public com.google.protobuf.Int64ValueOrBuilder getDigestCrc32COrBuilder() { return digestCrc32CBuilder_; } + private com.google.protobuf.ByteString data_ = com.google.protobuf.ByteString.EMPTY; + /** + * + * + *
+     * Optional. This field will only be honored for RAW_PKCS1 keys.
+     * The data to sign. A digest is computed over the data that will be signed,
+     * PKCS #1 padding is applied to the digest directly and then encrypted.
+     * 
+ * + * bytes data = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The data. + */ + @java.lang.Override + public com.google.protobuf.ByteString getData() { + return data_; + } + /** + * + * + *
+     * Optional. This field will only be honored for RAW_PKCS1 keys.
+     * The data to sign. A digest is computed over the data that will be signed,
+     * PKCS #1 padding is applied to the digest directly and then encrypted.
+     * 
+ * + * bytes data = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The data to set. + * @return This builder for chaining. + */ + public Builder setData(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + + data_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. This field will only be honored for RAW_PKCS1 keys.
+     * The data to sign. A digest is computed over the data that will be signed,
+     * PKCS #1 padding is applied to the digest directly and then encrypted.
+     * 
+ * + * bytes data = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearData() { + + data_ = getDefaultInstance().getData(); + onChanged(); + return this; + } + + private com.google.protobuf.Int64Value dataCrc32C_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Int64Value, + com.google.protobuf.Int64Value.Builder, + com.google.protobuf.Int64ValueOrBuilder> + dataCrc32CBuilder_; + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + * + * @return Whether the dataCrc32c field is set. + */ + public boolean hasDataCrc32C() { + return dataCrc32CBuilder_ != null || dataCrc32C_ != null; + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + * + * @return The dataCrc32c. + */ + public com.google.protobuf.Int64Value getDataCrc32C() { + if (dataCrc32CBuilder_ == null) { + return dataCrc32C_ == null + ? com.google.protobuf.Int64Value.getDefaultInstance() + : dataCrc32C_; + } else { + return dataCrc32CBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + public Builder setDataCrc32C(com.google.protobuf.Int64Value value) { + if (dataCrc32CBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + dataCrc32C_ = value; + onChanged(); + } else { + dataCrc32CBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + public Builder setDataCrc32C(com.google.protobuf.Int64Value.Builder builderForValue) { + if (dataCrc32CBuilder_ == null) { + dataCrc32C_ = builderForValue.build(); + onChanged(); + } else { + dataCrc32CBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + public Builder mergeDataCrc32C(com.google.protobuf.Int64Value value) { + if (dataCrc32CBuilder_ == null) { + if (dataCrc32C_ != null) { + dataCrc32C_ = + com.google.protobuf.Int64Value.newBuilder(dataCrc32C_) + .mergeFrom(value) + .buildPartial(); + } else { + dataCrc32C_ = value; + } + onChanged(); + } else { + dataCrc32CBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + public Builder clearDataCrc32C() { + if (dataCrc32CBuilder_ == null) { + dataCrc32C_ = null; + onChanged(); + } else { + dataCrc32C_ = null; + dataCrc32CBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + public com.google.protobuf.Int64Value.Builder getDataCrc32CBuilder() { + + onChanged(); + return getDataCrc32CFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + public com.google.protobuf.Int64ValueOrBuilder getDataCrc32COrBuilder() { + if (dataCrc32CBuilder_ != null) { + return dataCrc32CBuilder_.getMessageOrBuilder(); + } else { + return dataCrc32C_ == null + ? com.google.protobuf.Int64Value.getDefaultInstance() + : dataCrc32C_; + } + } + /** + * + * + *
+     * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+     * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+     * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+     * fails. If you receive a checksum error, your client should verify that
+     * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+     * number of retries. A persistent mismatch may indicate an issue in your
+     * computation of the CRC32C checksum.
+     * Note: This field is defined as int64 for reasons of compatibility across
+     * different languages. However, it is a non-negative integer, which will
+     * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+     * that support this type.
+     * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Int64Value, + com.google.protobuf.Int64Value.Builder, + com.google.protobuf.Int64ValueOrBuilder> + getDataCrc32CFieldBuilder() { + if (dataCrc32CBuilder_ == null) { + dataCrc32CBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Int64Value, + com.google.protobuf.Int64Value.Builder, + com.google.protobuf.Int64ValueOrBuilder>( + getDataCrc32C(), getParentForChildren(), isClean()); + dataCrc32C_ = null; + } + return dataCrc32CBuilder_; + } + @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequestOrBuilder.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequestOrBuilder.java index 8d622feb..17a12c0d 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequestOrBuilder.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignRequestOrBuilder.java @@ -56,12 +56,12 @@ public interface AsymmetricSignRequestOrBuilder * * *
-   * Required. The digest of the data to sign. The digest must be produced with
+   * Optional. The digest of the data to sign. The digest must be produced with
    * the same digest algorithm as specified by the key version's
    * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
    * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * * @return Whether the digest field is set. */ @@ -70,12 +70,12 @@ public interface AsymmetricSignRequestOrBuilder * * *
-   * Required. The digest of the data to sign. The digest must be produced with
+   * Optional. The digest of the data to sign. The digest must be produced with
    * the same digest algorithm as specified by the key version's
    * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
    * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; * * @return The digest. */ @@ -84,12 +84,12 @@ public interface AsymmetricSignRequestOrBuilder * * *
-   * Required. The digest of the data to sign. The digest must be produced with
+   * Optional. The digest of the data to sign. The digest must be produced with
    * the same digest algorithm as specified by the key version's
    * [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
    * 
* - * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = REQUIRED]; + * .google.cloud.kms.v1.Digest digest = 3 [(.google.api.field_behavior) = OPTIONAL]; */ com.google.cloud.kms.v1.DigestOrBuilder getDigestOrBuilder(); @@ -166,4 +166,93 @@ public interface AsymmetricSignRequestOrBuilder *
*/ com.google.protobuf.Int64ValueOrBuilder getDigestCrc32COrBuilder(); + + /** + * + * + *
+   * Optional. This field will only be honored for RAW_PKCS1 keys.
+   * The data to sign. A digest is computed over the data that will be signed,
+   * PKCS #1 padding is applied to the digest directly and then encrypted.
+   * 
+ * + * bytes data = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The data. + */ + com.google.protobuf.ByteString getData(); + + /** + * + * + *
+   * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+   * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+   * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+   * fails. If you receive a checksum error, your client should verify that
+   * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+   * number of retries. A persistent mismatch may indicate an issue in your
+   * computation of the CRC32C checksum.
+   * Note: This field is defined as int64 for reasons of compatibility across
+   * different languages. However, it is a non-negative integer, which will
+   * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+   * that support this type.
+   * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + * + * @return Whether the dataCrc32c field is set. + */ + boolean hasDataCrc32C(); + /** + * + * + *
+   * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+   * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+   * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+   * fails. If you receive a checksum error, your client should verify that
+   * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+   * number of retries. A persistent mismatch may indicate an issue in your
+   * computation of the CRC32C checksum.
+   * Note: This field is defined as int64 for reasons of compatibility across
+   * different languages. However, it is a non-negative integer, which will
+   * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+   * that support this type.
+   * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + * + * @return The dataCrc32c. + */ + com.google.protobuf.Int64Value getDataCrc32C(); + /** + * + * + *
+   * Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If
+   * specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the
+   * received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum.
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification
+   * fails. If you receive a checksum error, your client should verify that
+   * CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited
+   * number of retries. A persistent mismatch may indicate an issue in your
+   * computation of the CRC32C checksum.
+   * Note: This field is defined as int64 for reasons of compatibility across
+   * different languages. However, it is a non-negative integer, which will
+   * never exceed 2^32-1, and can be safely downconverted to uint32 in languages
+   * that support this type.
+   * 
+ * + * .google.protobuf.Int64Value data_crc32c = 7 [(.google.api.field_behavior) = OPTIONAL]; + * + */ + com.google.protobuf.Int64ValueOrBuilder getDataCrc32COrBuilder(); } diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponse.java index 49035590..558131fb 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponse.java @@ -104,6 +104,11 @@ private AsymmetricSignResponse( name_ = s; break; } + case 40: + { + verifiedDataCrc32C_ = input.readBool(); + break; + } case 48: { int rawValue = input.readEnum(); @@ -317,6 +322,31 @@ public com.google.protobuf.ByteString getNameBytes() { } } + public static final int VERIFIED_DATA_CRC32C_FIELD_NUMBER = 5; + private boolean verifiedDataCrc32C_; + /** + * + * + *
+   * Integrity verification field. A flag indicating whether
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was received by
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] and used for the integrity verification of the
+   * [data][google.cloud.kms.v1.AsymmetricSignRequest.data]. A false value of this field
+   * indicates either that [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was left
+   * unset or that it was not delivered to [KeyManagementService][google.cloud.kms.v1.KeyManagementService]. If you've
+   * set [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] but this field is still false,
+   * discard the response and perform a limited number of retries.
+   * 
+ * + * bool verified_data_crc32c = 5; + * + * @return The verifiedDataCrc32c. + */ + @java.lang.Override + public boolean getVerifiedDataCrc32C() { + return verifiedDataCrc32C_; + } + public static final int PROTECTION_LEVEL_FIELD_NUMBER = 6; private int protectionLevel_; /** @@ -376,9 +406,12 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (verifiedDigestCrc32C_ != false) { output.writeBool(3, verifiedDigestCrc32C_); } - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, name_); } + if (verifiedDataCrc32C_ != false) { + output.writeBool(5, verifiedDataCrc32C_); + } if (protectionLevel_ != com.google.cloud.kms.v1.ProtectionLevel.PROTECTION_LEVEL_UNSPECIFIED.getNumber()) { output.writeEnum(6, protectionLevel_); @@ -401,9 +434,12 @@ public int getSerializedSize() { if (verifiedDigestCrc32C_ != false) { size += com.google.protobuf.CodedOutputStream.computeBoolSize(3, verifiedDigestCrc32C_); } - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, name_); } + if (verifiedDataCrc32C_ != false) { + size += com.google.protobuf.CodedOutputStream.computeBoolSize(5, verifiedDataCrc32C_); + } if (protectionLevel_ != com.google.cloud.kms.v1.ProtectionLevel.PROTECTION_LEVEL_UNSPECIFIED.getNumber()) { size += com.google.protobuf.CodedOutputStream.computeEnumSize(6, protectionLevel_); @@ -431,6 +467,7 @@ public boolean equals(final java.lang.Object obj) { } if (getVerifiedDigestCrc32C() != other.getVerifiedDigestCrc32C()) return false; if (!getName().equals(other.getName())) return false; + if (getVerifiedDataCrc32C() != other.getVerifiedDataCrc32C()) return false; if (protectionLevel_ != other.protectionLevel_) return false; if (!unknownFields.equals(other.unknownFields)) return false; return true; @@ -453,6 +490,8 @@ public int hashCode() { hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getVerifiedDigestCrc32C()); hash = (37 * hash) + NAME_FIELD_NUMBER; hash = (53 * hash) + getName().hashCode(); + hash = (37 * hash) + VERIFIED_DATA_CRC32C_FIELD_NUMBER; + hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getVerifiedDataCrc32C()); hash = (37 * hash) + PROTECTION_LEVEL_FIELD_NUMBER; hash = (53 * hash) + protectionLevel_; hash = (29 * hash) + unknownFields.hashCode(); @@ -612,6 +651,8 @@ public Builder clear() { name_ = ""; + verifiedDataCrc32C_ = false; + protectionLevel_ = 0; return this; @@ -649,6 +690,7 @@ public com.google.cloud.kms.v1.AsymmetricSignResponse buildPartial() { } result.verifiedDigestCrc32C_ = verifiedDigestCrc32C_; result.name_ = name_; + result.verifiedDataCrc32C_ = verifiedDataCrc32C_; result.protectionLevel_ = protectionLevel_; onBuilt(); return result; @@ -712,6 +754,9 @@ public Builder mergeFrom(com.google.cloud.kms.v1.AsymmetricSignResponse other) { name_ = other.name_; onChanged(); } + if (other.getVerifiedDataCrc32C() != false) { + setVerifiedDataCrc32C(other.getVerifiedDataCrc32C()); + } if (other.protectionLevel_ != 0) { setProtectionLevelValue(other.getProtectionLevelValue()); } @@ -1258,6 +1303,79 @@ public Builder setNameBytes(com.google.protobuf.ByteString value) { return this; } + private boolean verifiedDataCrc32C_; + /** + * + * + *
+     * Integrity verification field. A flag indicating whether
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was received by
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] and used for the integrity verification of the
+     * [data][google.cloud.kms.v1.AsymmetricSignRequest.data]. A false value of this field
+     * indicates either that [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was left
+     * unset or that it was not delivered to [KeyManagementService][google.cloud.kms.v1.KeyManagementService]. If you've
+     * set [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] but this field is still false,
+     * discard the response and perform a limited number of retries.
+     * 
+ * + * bool verified_data_crc32c = 5; + * + * @return The verifiedDataCrc32c. + */ + @java.lang.Override + public boolean getVerifiedDataCrc32C() { + return verifiedDataCrc32C_; + } + /** + * + * + *
+     * Integrity verification field. A flag indicating whether
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was received by
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] and used for the integrity verification of the
+     * [data][google.cloud.kms.v1.AsymmetricSignRequest.data]. A false value of this field
+     * indicates either that [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was left
+     * unset or that it was not delivered to [KeyManagementService][google.cloud.kms.v1.KeyManagementService]. If you've
+     * set [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] but this field is still false,
+     * discard the response and perform a limited number of retries.
+     * 
+ * + * bool verified_data_crc32c = 5; + * + * @param value The verifiedDataCrc32c to set. + * @return This builder for chaining. + */ + public Builder setVerifiedDataCrc32C(boolean value) { + + verifiedDataCrc32C_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Integrity verification field. A flag indicating whether
+     * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was received by
+     * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] and used for the integrity verification of the
+     * [data][google.cloud.kms.v1.AsymmetricSignRequest.data]. A false value of this field
+     * indicates either that [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was left
+     * unset or that it was not delivered to [KeyManagementService][google.cloud.kms.v1.KeyManagementService]. If you've
+     * set [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] but this field is still false,
+     * discard the response and perform a limited number of retries.
+     * 
+ * + * bool verified_data_crc32c = 5; + * + * @return This builder for chaining. + */ + public Builder clearVerifiedDataCrc32C() { + + verifiedDataCrc32C_ = false; + onChanged(); + return this; + } + private int protectionLevel_ = 0; /** * diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponseOrBuilder.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponseOrBuilder.java index da68b228..a435b80c 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponseOrBuilder.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/AsymmetricSignResponseOrBuilder.java @@ -148,6 +148,26 @@ public interface AsymmetricSignResponseOrBuilder */ com.google.protobuf.ByteString getNameBytes(); + /** + * + * + *
+   * Integrity verification field. A flag indicating whether
+   * [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was received by
+   * [KeyManagementService][google.cloud.kms.v1.KeyManagementService] and used for the integrity verification of the
+   * [data][google.cloud.kms.v1.AsymmetricSignRequest.data]. A false value of this field
+   * indicates either that [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was left
+   * unset or that it was not delivered to [KeyManagementService][google.cloud.kms.v1.KeyManagementService]. If you've
+   * set [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] but this field is still false,
+   * discard the response and perform a limited number of retries.
+   * 
+ * + * bool verified_data_crc32c = 5; + * + * @return The verifiedDataCrc32c. + */ + boolean getVerifiedDataCrc32C(); + /** * * diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyRequest.java index a4ba0fcb..de23ff24 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyRequest.java @@ -330,10 +330,10 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } - if (!getCryptoKeyIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(cryptoKeyId_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, cryptoKeyId_); } if (cryptoKey_ != null) { @@ -351,10 +351,10 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } - if (!getCryptoKeyIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(cryptoKeyId_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, cryptoKeyId_); } if (cryptoKey_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyVersionRequest.java index 70c79077..b832b637 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyVersionRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateCryptoKeyVersionRequest.java @@ -250,7 +250,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } if (cryptoKeyVersion_ != null) { @@ -265,7 +265,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } if (cryptoKeyVersion_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateImportJobRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateImportJobRequest.java index 9045e45b..c7afb6f4 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateImportJobRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateImportJobRequest.java @@ -303,10 +303,10 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } - if (!getImportJobIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importJobId_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, importJobId_); } if (importJob_ != null) { @@ -321,10 +321,10 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } - if (!getImportJobIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importJobId_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, importJobId_); } if (importJob_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateKeyRingRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateKeyRingRequest.java index d84984d8..c3a71221 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateKeyRingRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CreateKeyRingRequest.java @@ -303,10 +303,10 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } - if (!getKeyRingIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyRingId_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, keyRingId_); } if (keyRing_ != null) { @@ -321,10 +321,10 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } - if (!getKeyRingIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyRingId_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, keyRingId_); } if (keyRing_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKey.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKey.java index 7cdd6c3f..c17276b9 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKey.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKey.java @@ -1126,7 +1126,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (primary_ != null) { @@ -1166,7 +1166,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (primary_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersion.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersion.java index 7ed85429..7bfc339f 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersion.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersion.java @@ -409,6 +409,36 @@ public enum CryptoKeyVersionAlgorithm implements com.google.protobuf.ProtocolMes * RSA_SIGN_PKCS1_4096_SHA512 = 16; */ RSA_SIGN_PKCS1_4096_SHA512(16), + /** + * + * + *
+     * RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key.
+     * 
+ * + * RSA_SIGN_RAW_PKCS1_2048 = 28; + */ + RSA_SIGN_RAW_PKCS1_2048(28), + /** + * + * + *
+     * RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key.
+     * 
+ * + * RSA_SIGN_RAW_PKCS1_3072 = 29; + */ + RSA_SIGN_RAW_PKCS1_3072(29), + /** + * + * + *
+     * RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key.
+     * 
+ * + * RSA_SIGN_RAW_PKCS1_4096 = 30; + */ + RSA_SIGN_RAW_PKCS1_4096(30), /** * * @@ -633,6 +663,36 @@ public enum CryptoKeyVersionAlgorithm implements com.google.protobuf.ProtocolMes * RSA_SIGN_PKCS1_4096_SHA512 = 16; */ public static final int RSA_SIGN_PKCS1_4096_SHA512_VALUE = 16; + /** + * + * + *
+     * RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key.
+     * 
+ * + * RSA_SIGN_RAW_PKCS1_2048 = 28; + */ + public static final int RSA_SIGN_RAW_PKCS1_2048_VALUE = 28; + /** + * + * + *
+     * RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key.
+     * 
+ * + * RSA_SIGN_RAW_PKCS1_3072 = 29; + */ + public static final int RSA_SIGN_RAW_PKCS1_3072_VALUE = 29; + /** + * + * + *
+     * RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key.
+     * 
+ * + * RSA_SIGN_RAW_PKCS1_4096 = 30; + */ + public static final int RSA_SIGN_RAW_PKCS1_4096_VALUE = 30; /** * * @@ -799,6 +859,12 @@ public static CryptoKeyVersionAlgorithm forNumber(int value) { return RSA_SIGN_PKCS1_4096_SHA256; case 16: return RSA_SIGN_PKCS1_4096_SHA512; + case 28: + return RSA_SIGN_RAW_PKCS1_2048; + case 29: + return RSA_SIGN_RAW_PKCS1_3072; + case 30: + return RSA_SIGN_RAW_PKCS1_4096; case 8: return RSA_DECRYPT_OAEP_2048_SHA256; case 9: @@ -2037,7 +2103,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (state_ @@ -2071,13 +2137,13 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (generateTime_ != null) { output.writeMessage(11, getGenerateTime()); } - if (!getImportJobBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importJob_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 14, importJob_); } if (importTime_ != null) { output.writeMessage(15, getImportTime()); } - if (!getImportFailureReasonBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importFailureReason_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 16, importFailureReason_); } if (externalProtectionLevelOptions_ != null) { @@ -2095,7 +2161,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (state_ @@ -2129,13 +2195,13 @@ public int getSerializedSize() { if (generateTime_ != null) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(11, getGenerateTime()); } - if (!getImportJobBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importJob_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(14, importJob_); } if (importTime_ != null) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(15, getImportTime()); } - if (!getImportFailureReasonBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importFailureReason_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(16, importFailureReason_); } if (externalProtectionLevelOptions_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DecryptRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DecryptRequest.java index cfe21b4d..0d08aba0 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DecryptRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DecryptRequest.java @@ -443,7 +443,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!ciphertext_.isEmpty()) { @@ -467,7 +467,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!ciphertext_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DestroyCryptoKeyVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DestroyCryptoKeyVersionRequest.java index 2158f5ee..e46ec850 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DestroyCryptoKeyVersionRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DestroyCryptoKeyVersionRequest.java @@ -179,7 +179,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -191,7 +191,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptRequest.java index d55da426..a151f148 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptRequest.java @@ -458,7 +458,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!plaintext_.isEmpty()) { @@ -482,7 +482,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!plaintext_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptResponse.java index 5826b1a9..1c0c97cb 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/EncryptResponse.java @@ -398,7 +398,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!ciphertext_.isEmpty()) { @@ -426,7 +426,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!ciphertext_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java index 35f4bd27..50e49185 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java @@ -177,7 +177,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getExternalKeyUriBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(externalKeyUri_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, externalKeyUri_); } unknownFields.writeTo(output); @@ -189,7 +189,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getExternalKeyUriBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(externalKeyUri_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, externalKeyUri_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GenerateRandomBytesRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GenerateRandomBytesRequest.java index 99380a76..13e1aded 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GenerateRandomBytesRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GenerateRandomBytesRequest.java @@ -246,7 +246,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getLocationBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(location_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, location_); } if (lengthBytes_ != 0) { @@ -265,7 +265,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getLocationBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(location_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, location_); } if (lengthBytes_ != 0) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyRequest.java index 13429af5..f5b17c03 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyRequest.java @@ -178,7 +178,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -190,7 +190,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyVersionRequest.java index 4fe485c3..ed927ccf 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyVersionRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetCryptoKeyVersionRequest.java @@ -178,7 +178,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -190,7 +190,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetImportJobRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetImportJobRequest.java index 7ba9f935..f7256bfe 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetImportJobRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetImportJobRequest.java @@ -178,7 +178,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -190,7 +190,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetKeyRingRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetKeyRingRequest.java index 4356800a..32dcd488 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetKeyRingRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetKeyRingRequest.java @@ -178,7 +178,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -190,7 +190,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetPublicKeyRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetPublicKeyRequest.java index abc35d21..7b9ef1bd 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetPublicKeyRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/GetPublicKeyRequest.java @@ -180,7 +180,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -192,7 +192,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java index 244f6364..97f37d9a 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java @@ -507,7 +507,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } if (algorithm_ @@ -516,13 +516,13 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io .getNumber()) { output.writeEnum(2, algorithm_); } - if (!getImportJobBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importJob_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, importJob_); } if (wrappedKeyMaterialCase_ == 5) { output.writeBytes(5, (com.google.protobuf.ByteString) wrappedKeyMaterial_); } - if (!getCryptoKeyVersionBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(cryptoKeyVersion_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 6, cryptoKeyVersion_); } unknownFields.writeTo(output); @@ -534,7 +534,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } if (algorithm_ @@ -543,7 +543,7 @@ public int getSerializedSize() { .getNumber()) { size += com.google.protobuf.CodedOutputStream.computeEnumSize(2, algorithm_); } - if (!getImportJobBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(importJob_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, importJob_); } if (wrappedKeyMaterialCase_ == 5) { @@ -551,7 +551,7 @@ public int getSerializedSize() { com.google.protobuf.CodedOutputStream.computeBytesSize( 5, (com.google.protobuf.ByteString) wrappedKeyMaterial_); } - if (!getCryptoKeyVersionBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(cryptoKeyVersion_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, cryptoKeyVersion_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportJob.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportJob.java index 971c4bb2..881a4ceb 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportJob.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportJob.java @@ -820,7 +820,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getPemBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pem_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, pem_); } unknownFields.writeTo(output); @@ -832,7 +832,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getPemBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pem_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, pem_); } size += unknownFields.getSerializedSize(); @@ -1839,7 +1839,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (importMethod_ @@ -1882,7 +1882,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (importMethod_ diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyRing.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyRing.java index fe080e11..9e09a34d 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyRing.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyRing.java @@ -239,7 +239,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (createTime_ != null) { @@ -254,7 +254,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (createTime_ != null) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java index f2f63b2d..fed7e01c 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java @@ -299,208 +299,211 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "c32c\030\005 \001(\0132\033.google.protobuf.Int64ValueB" + "\003\340A\001\022N\n$additional_authenticated_data_cr" + "c32c\030\006 \001(\0132\033.google.protobuf.Int64ValueB" - + "\003\340A\001\"\302\001\n\025AsymmetricSignRequest\022>\n\004name\030\001" + + "\003\340A\001\"\214\002\n\025AsymmetricSignRequest\022>\n\004name\030\001" + " \001(\tB0\340A\002\372A*\n(cloudkms.googleapis.com/Cr" + "yptoKeyVersion\0220\n\006digest\030\003 \001(\0132\033.google." - + "cloud.kms.v1.DigestB\003\340A\002\0227\n\rdigest_crc32" + + "cloud.kms.v1.DigestB\003\340A\001\0227\n\rdigest_crc32" + "c\030\004 \001(\0132\033.google.protobuf.Int64ValueB\003\340A" - + "\001\"\260\001\n\030AsymmetricDecryptRequest\022>\n\004name\030\001" - + " \001(\tB0\340A\002\372A*\n(cloudkms.googleapis.com/Cr" - + "yptoKeyVersion\022\027\n\nciphertext\030\003 \001(\014B\003\340A\002\022" - + ";\n\021ciphertext_crc32c\030\004 \001(\0132\033.google.prot" - + "obuf.Int64ValueB\003\340A\001\"\232\001\n\016MacSignRequest\022" - + ">\n\004name\030\001 \001(\tB0\340A\002\372A*\n(cloudkms.googleap" - + "is.com/CryptoKeyVersion\022\021\n\004data\030\002 \001(\014B\003\340" - + "A\002\0225\n\013data_crc32c\030\003 \001(\0132\033.google.protobu" - + "f.Int64ValueB\003\340A\001\"\344\001\n\020MacVerifyRequest\022>" - + "\n\004name\030\001 \001(\tB0\340A\002\372A*\n(cloudkms.googleapi" - + "s.com/CryptoKeyVersion\022\021\n\004data\030\002 \001(\014B\003\340A" - + "\002\0225\n\013data_crc32c\030\003 \001(\0132\033.google.protobuf" - + ".Int64ValueB\003\340A\001\022\020\n\003mac\030\004 \001(\014B\003\340A\002\0224\n\nma" - + "c_crc32c\030\005 \001(\0132\033.google.protobuf.Int64Va" - + "lueB\003\340A\001\"\204\001\n\032GenerateRandomBytesRequest\022" - + "\020\n\010location\030\001 \001(\t\022\024\n\014length_bytes\030\002 \001(\005\022" - + ">\n\020protection_level\030\003 \001(\0162$.google.cloud" - + ".kms.v1.ProtectionLevel\"\205\002\n\017EncryptRespo" - + "nse\022\014\n\004name\030\001 \001(\t\022\022\n\nciphertext\030\002 \001(\014\0226\n" - + "\021ciphertext_crc32c\030\004 \001(\0132\033.google.protob" - + "uf.Int64Value\022!\n\031verified_plaintext_crc3" - + "2c\030\005 \001(\010\0225\n-verified_additional_authenti" - + "cated_data_crc32c\030\006 \001(\010\022>\n\020protection_le" - + "vel\030\007 \001(\0162$.google.cloud.kms.v1.Protecti" - + "onLevel\"\261\001\n\017DecryptResponse\022\021\n\tplaintext" - + "\030\001 \001(\014\0225\n\020plaintext_crc32c\030\002 \001(\0132\033.googl" - + "e.protobuf.Int64Value\022\024\n\014used_primary\030\003 " - + "\001(\010\022>\n\020protection_level\030\004 \001(\0162$.google.c" - + "loud.kms.v1.ProtectionLevel\"\320\001\n\026Asymmetr" - + "icSignResponse\022\021\n\tsignature\030\001 \001(\014\0225\n\020sig" - + "nature_crc32c\030\002 \001(\0132\033.google.protobuf.In" - + "t64Value\022\036\n\026verified_digest_crc32c\030\003 \001(\010" - + "\022\014\n\004name\030\004 \001(\t\022>\n\020protection_level\030\006 \001(\016" - + "2$.google.cloud.kms.v1.ProtectionLevel\"\311" - + "\001\n\031AsymmetricDecryptResponse\022\021\n\tplaintex" - + "t\030\001 \001(\014\0225\n\020plaintext_crc32c\030\002 \001(\0132\033.goog" - + "le.protobuf.Int64Value\022\"\n\032verified_ciphe" - + "rtext_crc32c\030\003 \001(\010\022>\n\020protection_level\030\004" - + " \001(\0162$.google.cloud.kms.v1.ProtectionLev" - + "el\"\273\001\n\017MacSignResponse\022\014\n\004name\030\001 \001(\t\022\013\n\003" - + "mac\030\002 \001(\014\022/\n\nmac_crc32c\030\003 \001(\0132\033.google.p" - + "rotobuf.Int64Value\022\034\n\024verified_data_crc3" - + "2c\030\004 \001(\010\022>\n\020protection_level\030\005 \001(\0162$.goo" - + "gle.cloud.kms.v1.ProtectionLevel\"\321\001\n\021Mac" - + "VerifyResponse\022\014\n\004name\030\001 \001(\t\022\017\n\007success\030" - + "\002 \001(\010\022\034\n\024verified_data_crc32c\030\003 \001(\010\022\033\n\023v" - + "erified_mac_crc32c\030\004 \001(\010\022\"\n\032verified_suc" - + "cess_integrity\030\005 \001(\010\022>\n\020protection_level" - + "\030\006 \001(\0162$.google.cloud.kms.v1.ProtectionL" - + "evel\"]\n\033GenerateRandomBytesResponse\022\014\n\004d" - + "ata\030\001 \001(\014\0220\n\013data_crc32c\030\003 \001(\0132\033.google." - + "protobuf.Int64Value\"H\n\006Digest\022\020\n\006sha256\030" - + "\001 \001(\014H\000\022\020\n\006sha384\030\002 \001(\014H\000\022\020\n\006sha512\030\003 \001(" - + "\014H\000B\010\n\006digest\"@\n\020LocationMetadata\022\025\n\rhsm" - + "_available\030\001 \001(\010\022\025\n\rekm_available\030\002 \001(\0102" - + "\206+\n\024KeyManagementService\022\242\001\n\014ListKeyRing" - + "s\022(.google.cloud.kms.v1.ListKeyRingsRequ" - + "est\032).google.cloud.kms.v1.ListKeyRingsRe" - + "sponse\"=\202\323\344\223\002.\022,/v1/{parent=projects/*/l" - + "ocations/*}/keyRings\332A\006parent\022\265\001\n\016ListCr" - + "yptoKeys\022*.google.cloud.kms.v1.ListCrypt" - + "oKeysRequest\032+.google.cloud.kms.v1.ListC" - + "ryptoKeysResponse\"J\202\323\344\223\002;\0229/v1/{parent=p" - + "rojects/*/locations/*/keyRings/*}/crypto" - + "Keys\332A\006parent\022\336\001\n\025ListCryptoKeyVersions\022" - + "1.google.cloud.kms.v1.ListCryptoKeyVersi" - + "onsRequest\0322.google.cloud.kms.v1.ListCry" - + "ptoKeyVersionsResponse\"^\202\323\344\223\002O\022M/v1/{par" - + "ent=projects/*/locations/*/keyRings/*/cr" - + "yptoKeys/*}/cryptoKeyVersions\332A\006parent\022\265" - + "\001\n\016ListImportJobs\022*.google.cloud.kms.v1." - + "ListImportJobsRequest\032+.google.cloud.kms" - + ".v1.ListImportJobsResponse\"J\202\323\344\223\002;\0229/v1/" - + "{parent=projects/*/locations/*/keyRings/" - + "*}/importJobs\332A\006parent\022\217\001\n\nGetKeyRing\022&." - + "google.cloud.kms.v1.GetKeyRingRequest\032\034." - + "google.cloud.kms.v1.KeyRing\";\202\323\344\223\002.\022,/v1" - + "/{name=projects/*/locations/*/keyRings/*" - + "}\332A\004name\022\242\001\n\014GetCryptoKey\022(.google.cloud" - + ".kms.v1.GetCryptoKeyRequest\032\036.google.clo" - + "ud.kms.v1.CryptoKey\"H\202\323\344\223\002;\0229/v1/{name=p" - + "rojects/*/locations/*/keyRings/*/cryptoK" - + "eys/*}\332A\004name\022\313\001\n\023GetCryptoKeyVersion\022/." - + "google.cloud.kms.v1.GetCryptoKeyVersionR" - + "equest\032%.google.cloud.kms.v1.CryptoKeyVe" - + "rsion\"\\\202\323\344\223\002O\022M/v1/{name=projects/*/loca" - + "tions/*/keyRings/*/cryptoKeys/*/cryptoKe" - + "yVersions/*}\332A\004name\022\300\001\n\014GetPublicKey\022(.g" - + "oogle.cloud.kms.v1.GetPublicKeyRequest\032\036" - + ".google.cloud.kms.v1.PublicKey\"f\202\323\344\223\002Y\022W" - + "/v1/{name=projects/*/locations/*/keyRing" - + "s/*/cryptoKeys/*/cryptoKeyVersions/*}/pu" - + "blicKey\332A\004name\022\242\001\n\014GetImportJob\022(.google" - + ".cloud.kms.v1.GetImportJobRequest\032\036.goog" - + "le.cloud.kms.v1.ImportJob\"H\202\323\344\223\002;\0229/v1/{" - + "name=projects/*/locations/*/keyRings/*/i" - + "mportJobs/*}\332A\004name\022\266\001\n\rCreateKeyRing\022)." - + "google.cloud.kms.v1.CreateKeyRingRequest" - + "\032\034.google.cloud.kms.v1.KeyRing\"\\\202\323\344\223\0028\"," + + "\001\022\021\n\004data\030\006 \001(\014B\003\340A\001\0225\n\013data_crc32c\030\007 \001(" + + "\0132\033.google.protobuf.Int64ValueB\003\340A\001\"\260\001\n\030" + + "AsymmetricDecryptRequest\022>\n\004name\030\001 \001(\tB0" + + "\340A\002\372A*\n(cloudkms.googleapis.com/CryptoKe" + + "yVersion\022\027\n\nciphertext\030\003 \001(\014B\003\340A\002\022;\n\021cip" + + "hertext_crc32c\030\004 \001(\0132\033.google.protobuf.I" + + "nt64ValueB\003\340A\001\"\232\001\n\016MacSignRequest\022>\n\004nam" + + "e\030\001 \001(\tB0\340A\002\372A*\n(cloudkms.googleapis.com" + + "/CryptoKeyVersion\022\021\n\004data\030\002 \001(\014B\003\340A\002\0225\n\013" + + "data_crc32c\030\003 \001(\0132\033.google.protobuf.Int6" + + "4ValueB\003\340A\001\"\344\001\n\020MacVerifyRequest\022>\n\004name" + + "\030\001 \001(\tB0\340A\002\372A*\n(cloudkms.googleapis.com/" + + "CryptoKeyVersion\022\021\n\004data\030\002 \001(\014B\003\340A\002\0225\n\013d" + + "ata_crc32c\030\003 \001(\0132\033.google.protobuf.Int64" + + "ValueB\003\340A\001\022\020\n\003mac\030\004 \001(\014B\003\340A\002\0224\n\nmac_crc3" + + "2c\030\005 \001(\0132\033.google.protobuf.Int64ValueB\003\340" + + "A\001\"\204\001\n\032GenerateRandomBytesRequest\022\020\n\010loc" + + "ation\030\001 \001(\t\022\024\n\014length_bytes\030\002 \001(\005\022>\n\020pro" + + "tection_level\030\003 \001(\0162$.google.cloud.kms.v" + + "1.ProtectionLevel\"\205\002\n\017EncryptResponse\022\014\n" + + "\004name\030\001 \001(\t\022\022\n\nciphertext\030\002 \001(\014\0226\n\021ciphe" + + "rtext_crc32c\030\004 \001(\0132\033.google.protobuf.Int" + + "64Value\022!\n\031verified_plaintext_crc32c\030\005 \001" + + "(\010\0225\n-verified_additional_authenticated_" + + "data_crc32c\030\006 \001(\010\022>\n\020protection_level\030\007 " + + "\001(\0162$.google.cloud.kms.v1.ProtectionLeve" + + "l\"\261\001\n\017DecryptResponse\022\021\n\tplaintext\030\001 \001(\014" + + "\0225\n\020plaintext_crc32c\030\002 \001(\0132\033.google.prot" + + "obuf.Int64Value\022\024\n\014used_primary\030\003 \001(\010\022>\n" + + "\020protection_level\030\004 \001(\0162$.google.cloud.k" + + "ms.v1.ProtectionLevel\"\356\001\n\026AsymmetricSign" + + "Response\022\021\n\tsignature\030\001 \001(\014\0225\n\020signature" + + "_crc32c\030\002 \001(\0132\033.google.protobuf.Int64Val" + + "ue\022\036\n\026verified_digest_crc32c\030\003 \001(\010\022\014\n\004na" + + "me\030\004 \001(\t\022\034\n\024verified_data_crc32c\030\005 \001(\010\022>" + + "\n\020protection_level\030\006 \001(\0162$.google.cloud." + + "kms.v1.ProtectionLevel\"\311\001\n\031AsymmetricDec" + + "ryptResponse\022\021\n\tplaintext\030\001 \001(\014\0225\n\020plain" + + "text_crc32c\030\002 \001(\0132\033.google.protobuf.Int6" + + "4Value\022\"\n\032verified_ciphertext_crc32c\030\003 \001" + + "(\010\022>\n\020protection_level\030\004 \001(\0162$.google.cl" + + "oud.kms.v1.ProtectionLevel\"\273\001\n\017MacSignRe" + + "sponse\022\014\n\004name\030\001 \001(\t\022\013\n\003mac\030\002 \001(\014\022/\n\nmac" + + "_crc32c\030\003 \001(\0132\033.google.protobuf.Int64Val" + + "ue\022\034\n\024verified_data_crc32c\030\004 \001(\010\022>\n\020prot" + + "ection_level\030\005 \001(\0162$.google.cloud.kms.v1" + + ".ProtectionLevel\"\321\001\n\021MacVerifyResponse\022\014" + + "\n\004name\030\001 \001(\t\022\017\n\007success\030\002 \001(\010\022\034\n\024verifie" + + "d_data_crc32c\030\003 \001(\010\022\033\n\023verified_mac_crc3" + + "2c\030\004 \001(\010\022\"\n\032verified_success_integrity\030\005" + + " \001(\010\022>\n\020protection_level\030\006 \001(\0162$.google." + + "cloud.kms.v1.ProtectionLevel\"]\n\033Generate" + + "RandomBytesResponse\022\014\n\004data\030\001 \001(\014\0220\n\013dat" + + "a_crc32c\030\003 \001(\0132\033.google.protobuf.Int64Va" + + "lue\"H\n\006Digest\022\020\n\006sha256\030\001 \001(\014H\000\022\020\n\006sha38" + + "4\030\002 \001(\014H\000\022\020\n\006sha512\030\003 \001(\014H\000B\010\n\006digest\"@\n" + + "\020LocationMetadata\022\025\n\rhsm_available\030\001 \001(\010" + + "\022\025\n\rekm_available\030\002 \001(\0102\206+\n\024KeyManagemen" + + "tService\022\242\001\n\014ListKeyRings\022(.google.cloud" + + ".kms.v1.ListKeyRingsRequest\032).google.clo" + + "ud.kms.v1.ListKeyRingsResponse\"=\202\323\344\223\002.\022," + "/v1/{parent=projects/*/locations/*}/keyR" - + "ings:\010key_ring\332A\033parent,key_ring_id,key_" - + "ring\022\317\001\n\017CreateCryptoKey\022+.google.cloud." - + "kms.v1.CreateCryptoKeyRequest\032\036.google.c" - + "loud.kms.v1.CryptoKey\"o\202\323\344\223\002G\"9/v1/{pare" - + "nt=projects/*/locations/*/keyRings/*}/cr" - + "yptoKeys:\ncrypto_key\332A\037parent,crypto_key" - + "_id,crypto_key\022\373\001\n\026CreateCryptoKeyVersio" - + "n\0222.google.cloud.kms.v1.CreateCryptoKeyV" + + "ings\332A\006parent\022\265\001\n\016ListCryptoKeys\022*.googl" + + "e.cloud.kms.v1.ListCryptoKeysRequest\032+.g" + + "oogle.cloud.kms.v1.ListCryptoKeysRespons" + + "e\"J\202\323\344\223\002;\0229/v1/{parent=projects/*/locati" + + "ons/*/keyRings/*}/cryptoKeys\332A\006parent\022\336\001" + + "\n\025ListCryptoKeyVersions\0221.google.cloud.k" + + "ms.v1.ListCryptoKeyVersionsRequest\0322.goo" + + "gle.cloud.kms.v1.ListCryptoKeyVersionsRe" + + "sponse\"^\202\323\344\223\002O\022M/v1/{parent=projects/*/l" + + "ocations/*/keyRings/*/cryptoKeys/*}/cryp" + + "toKeyVersions\332A\006parent\022\265\001\n\016ListImportJob" + + "s\022*.google.cloud.kms.v1.ListImportJobsRe" + + "quest\032+.google.cloud.kms.v1.ListImportJo" + + "bsResponse\"J\202\323\344\223\002;\0229/v1/{parent=projects" + + "/*/locations/*/keyRings/*}/importJobs\332A\006" + + "parent\022\217\001\n\nGetKeyRing\022&.google.cloud.kms" + + ".v1.GetKeyRingRequest\032\034.google.cloud.kms" + + ".v1.KeyRing\";\202\323\344\223\002.\022,/v1/{name=projects/" + + "*/locations/*/keyRings/*}\332A\004name\022\242\001\n\014Get" + + "CryptoKey\022(.google.cloud.kms.v1.GetCrypt" + + "oKeyRequest\032\036.google.cloud.kms.v1.Crypto" + + "Key\"H\202\323\344\223\002;\0229/v1/{name=projects/*/locati" + + "ons/*/keyRings/*/cryptoKeys/*}\332A\004name\022\313\001" + + "\n\023GetCryptoKeyVersion\022/.google.cloud.kms" + + ".v1.GetCryptoKeyVersionRequest\032%.google." + + "cloud.kms.v1.CryptoKeyVersion\"\\\202\323\344\223\002O\022M/" + + "v1/{name=projects/*/locations/*/keyRings" + + "/*/cryptoKeys/*/cryptoKeyVersions/*}\332A\004n" + + "ame\022\300\001\n\014GetPublicKey\022(.google.cloud.kms." + + "v1.GetPublicKeyRequest\032\036.google.cloud.km" + + "s.v1.PublicKey\"f\202\323\344\223\002Y\022W/v1/{name=projec" + + "ts/*/locations/*/keyRings/*/cryptoKeys/*" + + "/cryptoKeyVersions/*}/publicKey\332A\004name\022\242" + + "\001\n\014GetImportJob\022(.google.cloud.kms.v1.Ge" + + "tImportJobRequest\032\036.google.cloud.kms.v1." + + "ImportJob\"H\202\323\344\223\002;\0229/v1/{name=projects/*/" + + "locations/*/keyRings/*/importJobs/*}\332A\004n" + + "ame\022\266\001\n\rCreateKeyRing\022).google.cloud.kms" + + ".v1.CreateKeyRingRequest\032\034.google.cloud." + + "kms.v1.KeyRing\"\\\202\323\344\223\0028\",/v1/{parent=proj" + + "ects/*/locations/*}/keyRings:\010key_ring\332A" + + "\033parent,key_ring_id,key_ring\022\317\001\n\017CreateC" + + "ryptoKey\022+.google.cloud.kms.v1.CreateCry" + + "ptoKeyRequest\032\036.google.cloud.kms.v1.Cryp" + + "toKey\"o\202\323\344\223\002G\"9/v1/{parent=projects/*/lo" + + "cations/*/keyRings/*}/cryptoKeys:\ncrypto" + + "_key\332A\037parent,crypto_key_id,crypto_key\022\373" + + "\001\n\026CreateCryptoKeyVersion\0222.google.cloud" + + ".kms.v1.CreateCryptoKeyVersionRequest\032%." + + "google.cloud.kms.v1.CryptoKeyVersion\"\205\001\202" + + "\323\344\223\002c\"M/v1/{parent=projects/*/locations/" + + "*/keyRings/*/cryptoKeys/*}/cryptoKeyVers" + + "ions:\022crypto_key_version\332A\031parent,crypto" + + "_key_version\022\324\001\n\026ImportCryptoKeyVersion\022" + + "2.google.cloud.kms.v1.ImportCryptoKeyVer" + + "sionRequest\032%.google.cloud.kms.v1.Crypto" + + "KeyVersion\"_\202\323\344\223\002Y\"T/v1/{parent=projects" + + "/*/locations/*/keyRings/*/cryptoKeys/*}/" + + "cryptoKeyVersions:import:\001*\022\317\001\n\017CreateIm" + + "portJob\022+.google.cloud.kms.v1.CreateImpo" + + "rtJobRequest\032\036.google.cloud.kms.v1.Impor" + + "tJob\"o\202\323\344\223\002G\"9/v1/{parent=projects/*/loc" + + "ations/*/keyRings/*}/importJobs:\nimport_" + + "job\332A\037parent,import_job_id,import_job\022\321\001" + + "\n\017UpdateCryptoKey\022+.google.cloud.kms.v1." + + "UpdateCryptoKeyRequest\032\036.google.cloud.km" + + "s.v1.CryptoKey\"q\202\323\344\223\002R2D/v1/{crypto_key." + + "name=projects/*/locations/*/keyRings/*/c" + + "ryptoKeys/*}:\ncrypto_key\332A\026crypto_key,up" + + "date_mask\022\223\002\n\026UpdateCryptoKeyVersion\0222.g" + + "oogle.cloud.kms.v1.UpdateCryptoKeyVersio" + + "nRequest\032%.google.cloud.kms.v1.CryptoKey" + + "Version\"\235\001\202\323\344\223\002v2`/v1/{crypto_key_versio" + + "n.name=projects/*/locations/*/keyRings/*" + + "/cryptoKeys/*/cryptoKeyVersions/*}:\022cryp" + + "to_key_version\332A\036crypto_key_version,upda" + + "te_mask\022\362\001\n\035UpdateCryptoKeyPrimaryVersio" + + "n\0229.google.cloud.kms.v1.UpdateCryptoKeyP" + + "rimaryVersionRequest\032\036.google.cloud.kms." + + "v1.CryptoKey\"v\202\323\344\223\002S\"N/v1/{name=projects" + + "/*/locations/*/keyRings/*/cryptoKeys/*}:" + + "updatePrimaryVersion:\001*\332A\032name,crypto_ke" + + "y_version_id\022\336\001\n\027DestroyCryptoKeyVersion" + + "\0223.google.cloud.kms.v1.DestroyCryptoKeyV" + "ersionRequest\032%.google.cloud.kms.v1.Cryp" - + "toKeyVersion\"\205\001\202\323\344\223\002c\"M/v1/{parent=proje" - + "cts/*/locations/*/keyRings/*/cryptoKeys/" - + "*}/cryptoKeyVersions:\022crypto_key_version" - + "\332A\031parent,crypto_key_version\022\324\001\n\026ImportC" - + "ryptoKeyVersion\0222.google.cloud.kms.v1.Im" - + "portCryptoKeyVersionRequest\032%.google.clo" - + "ud.kms.v1.CryptoKeyVersion\"_\202\323\344\223\002Y\"T/v1/" - + "{parent=projects/*/locations/*/keyRings/" - + "*/cryptoKeys/*}/cryptoKeyVersions:import" - + ":\001*\022\317\001\n\017CreateImportJob\022+.google.cloud.k" - + "ms.v1.CreateImportJobRequest\032\036.google.cl" - + "oud.kms.v1.ImportJob\"o\202\323\344\223\002G\"9/v1/{paren" - + "t=projects/*/locations/*/keyRings/*}/imp" - + "ortJobs:\nimport_job\332A\037parent,import_job_" - + "id,import_job\022\321\001\n\017UpdateCryptoKey\022+.goog" - + "le.cloud.kms.v1.UpdateCryptoKeyRequest\032\036" - + ".google.cloud.kms.v1.CryptoKey\"q\202\323\344\223\002R2D" - + "/v1/{crypto_key.name=projects/*/location" - + "s/*/keyRings/*/cryptoKeys/*}:\ncrypto_key" - + "\332A\026crypto_key,update_mask\022\223\002\n\026UpdateCryp" - + "toKeyVersion\0222.google.cloud.kms.v1.Updat" - + "eCryptoKeyVersionRequest\032%.google.cloud." - + "kms.v1.CryptoKeyVersion\"\235\001\202\323\344\223\002v2`/v1/{c" - + "rypto_key_version.name=projects/*/locati" - + "ons/*/keyRings/*/cryptoKeys/*/cryptoKeyV" - + "ersions/*}:\022crypto_key_version\332A\036crypto_" - + "key_version,update_mask\022\362\001\n\035UpdateCrypto" - + "KeyPrimaryVersion\0229.google.cloud.kms.v1." - + "UpdateCryptoKeyPrimaryVersionRequest\032\036.g" - + "oogle.cloud.kms.v1.CryptoKey\"v\202\323\344\223\002S\"N/v" - + "1/{name=projects/*/locations/*/keyRings/" - + "*/cryptoKeys/*}:updatePrimaryVersion:\001*\332" - + "A\032name,crypto_key_version_id\022\336\001\n\027Destroy" - + "CryptoKeyVersion\0223.google.cloud.kms.v1.D" - + "estroyCryptoKeyVersionRequest\032%.google.c" - + "loud.kms.v1.CryptoKeyVersion\"g\202\323\344\223\002Z\"U/v" - + "1/{name=projects/*/locations/*/keyRings/" - + "*/cryptoKeys/*/cryptoKeyVersions/*}:dest" - + "roy:\001*\332A\004name\022\336\001\n\027RestoreCryptoKeyVersio" - + "n\0223.google.cloud.kms.v1.RestoreCryptoKey" - + "VersionRequest\032%.google.cloud.kms.v1.Cry" - + "ptoKeyVersion\"g\202\323\344\223\002Z\"U/v1/{name=project" - + "s/*/locations/*/keyRings/*/cryptoKeys/*/" - + "cryptoKeyVersions/*}:restore:\001*\332A\004name\022\264" - + "\001\n\007Encrypt\022#.google.cloud.kms.v1.Encrypt" - + "Request\032$.google.cloud.kms.v1.EncryptRes" - + "ponse\"^\202\323\344\223\002G\"B/v1/{name=projects/*/loca" - + "tions/*/keyRings/*/cryptoKeys/**}:encryp" - + "t:\001*\332A\016name,plaintext\022\264\001\n\007Decrypt\022#.goog" - + "le.cloud.kms.v1.DecryptRequest\032$.google." - + "cloud.kms.v1.DecryptResponse\"^\202\323\344\223\002F\"A/v" + + "toKeyVersion\"g\202\323\344\223\002Z\"U/v1/{name=projects" + + "/*/locations/*/keyRings/*/cryptoKeys/*/c" + + "ryptoKeyVersions/*}:destroy:\001*\332A\004name\022\336\001" + + "\n\027RestoreCryptoKeyVersion\0223.google.cloud" + + ".kms.v1.RestoreCryptoKeyVersionRequest\032%" + + ".google.cloud.kms.v1.CryptoKeyVersion\"g\202" + + "\323\344\223\002Z\"U/v1/{name=projects/*/locations/*/" + + "keyRings/*/cryptoKeys/*/cryptoKeyVersion" + + "s/*}:restore:\001*\332A\004name\022\264\001\n\007Encrypt\022#.goo" + + "gle.cloud.kms.v1.EncryptRequest\032$.google" + + ".cloud.kms.v1.EncryptResponse\"^\202\323\344\223\002G\"B/" + + "v1/{name=projects/*/locations/*/keyRings" + + "/*/cryptoKeys/**}:encrypt:\001*\332A\016name,plai" + + "ntext\022\264\001\n\007Decrypt\022#.google.cloud.kms.v1." + + "DecryptRequest\032$.google.cloud.kms.v1.Dec" + + "ryptResponse\"^\202\323\344\223\002F\"A/v1/{name=projects" + + "/*/locations/*/keyRings/*/cryptoKeys/*}:" + + "decrypt:\001*\332A\017name,ciphertext\022\340\001\n\016Asymmet" + + "ricSign\022*.google.cloud.kms.v1.Asymmetric" + + "SignRequest\032+.google.cloud.kms.v1.Asymme" + + "tricSignResponse\"u\202\323\344\223\002a\"\\/v1/{name=proj" + + "ects/*/locations/*/keyRings/*/cryptoKeys" + + "/*/cryptoKeyVersions/*}:asymmetricSign:\001" + + "*\332A\013name,digest\022\360\001\n\021AsymmetricDecrypt\022-." + + "google.cloud.kms.v1.AsymmetricDecryptReq" + + "uest\032..google.cloud.kms.v1.AsymmetricDec" + + "ryptResponse\"|\202\323\344\223\002d\"_/v1/{name=projects" + + "/*/locations/*/keyRings/*/cryptoKeys/*/c" + + "ryptoKeyVersions/*}:asymmetricDecrypt:\001*" + + "\332A\017name,ciphertext\022\302\001\n\007MacSign\022#.google." + + "cloud.kms.v1.MacSignRequest\032$.google.clo" + + "ud.kms.v1.MacSignResponse\"l\202\323\344\223\002Z\"U/v1/{" + + "name=projects/*/locations/*/keyRings/*/c" + + "ryptoKeys/*/cryptoKeyVersions/*}:macSign" + + ":\001*\332A\tname,data\022\316\001\n\tMacVerify\022%.google.c" + + "loud.kms.v1.MacVerifyRequest\032&.google.cl" + + "oud.kms.v1.MacVerifyResponse\"r\202\323\344\223\002\\\"W/v" + "1/{name=projects/*/locations/*/keyRings/" - + "*/cryptoKeys/*}:decrypt:\001*\332A\017name,cipher" - + "text\022\340\001\n\016AsymmetricSign\022*.google.cloud.k" - + "ms.v1.AsymmetricSignRequest\032+.google.clo" - + "ud.kms.v1.AsymmetricSignResponse\"u\202\323\344\223\002a" - + "\"\\/v1/{name=projects/*/locations/*/keyRi" - + "ngs/*/cryptoKeys/*/cryptoKeyVersions/*}:" - + "asymmetricSign:\001*\332A\013name,digest\022\360\001\n\021Asym" - + "metricDecrypt\022-.google.cloud.kms.v1.Asym" - + "metricDecryptRequest\032..google.cloud.kms." - + "v1.AsymmetricDecryptResponse\"|\202\323\344\223\002d\"_/v" - + "1/{name=projects/*/locations/*/keyRings/" - + "*/cryptoKeys/*/cryptoKeyVersions/*}:asym" - + "metricDecrypt:\001*\332A\017name,ciphertext\022\302\001\n\007M" - + "acSign\022#.google.cloud.kms.v1.MacSignRequ" - + "est\032$.google.cloud.kms.v1.MacSignRespons" - + "e\"l\202\323\344\223\002Z\"U/v1/{name=projects/*/location" - + "s/*/keyRings/*/cryptoKeys/*/cryptoKeyVer" - + "sions/*}:macSign:\001*\332A\tname,data\022\316\001\n\tMacV" - + "erify\022%.google.cloud.kms.v1.MacVerifyReq" - + "uest\032&.google.cloud.kms.v1.MacVerifyResp" - + "onse\"r\202\323\344\223\002\\\"W/v1/{name=projects/*/locat" - + "ions/*/keyRings/*/cryptoKeys/*/cryptoKey" - + "Versions/*}:macVerify:\001*\332A\rname,data,mac" - + "\022\347\001\n\023GenerateRandomBytes\022/.google.cloud." - + "kms.v1.GenerateRandomBytesRequest\0320.goog" - + "le.cloud.kms.v1.GenerateRandomBytesRespo" - + "nse\"m\202\323\344\223\002>\"9/v1/{location=projects/*/lo" - + "cations/*}:generateRandomBytes:\001*\332A&loca" - + "tion,length_bytes,protection_level\032t\312A\027c" - + "loudkms.googleapis.com\322AWhttps://www.goo" - + "gleapis.com/auth/cloud-platform,https://" - + "www.googleapis.com/auth/cloudkmsB\214\001\n\027com" - + ".google.cloud.kms.v1B\010KmsProtoP\001Z6google" - + ".golang.org/genproto/googleapis/cloud/km" - + "s/v1;kms\370\001\001\252\002\023Google.Cloud.Kms.V1\312\002\023Goog" - + "le\\Cloud\\Kms\\V1b\006proto3" + + "*/cryptoKeys/*/cryptoKeyVersions/*}:macV" + + "erify:\001*\332A\rname,data,mac\022\347\001\n\023GenerateRan" + + "domBytes\022/.google.cloud.kms.v1.GenerateR" + + "andomBytesRequest\0320.google.cloud.kms.v1." + + "GenerateRandomBytesResponse\"m\202\323\344\223\002>\"9/v1" + + "/{location=projects/*/locations/*}:gener" + + "ateRandomBytes:\001*\332A&location,length_byte" + + "s,protection_level\032t\312A\027cloudkms.googleap" + + "is.com\322AWhttps://www.googleapis.com/auth" + + "/cloud-platform,https://www.googleapis.c" + + "om/auth/cloudkmsB\214\001\n\027com.google.cloud.km" + + "s.v1B\010KmsProtoP\001Z6google.golang.org/genp" + + "roto/googleapis/cloud/kms/v1;kms\370\001\001\252\002\023Go" + + "ogle.Cloud.Kms.V1\312\002\023Google\\Cloud\\Kms\\V1b" + + "\006proto3" }; descriptor = com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( @@ -733,7 +736,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_kms_v1_AsymmetricSignRequest_descriptor, new java.lang.String[] { - "Name", "Digest", "DigestCrc32C", + "Name", "Digest", "DigestCrc32C", "Data", "DataCrc32C", }); internal_static_google_cloud_kms_v1_AsymmetricDecryptRequest_descriptor = getDescriptor().getMessageTypes().get(26); @@ -794,7 +797,12 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_kms_v1_AsymmetricSignResponse_descriptor, new java.lang.String[] { - "Signature", "SignatureCrc32C", "VerifiedDigestCrc32C", "Name", "ProtectionLevel", + "Signature", + "SignatureCrc32C", + "VerifiedDigestCrc32C", + "Name", + "VerifiedDataCrc32C", + "ProtectionLevel", }); internal_static_google_cloud_kms_v1_AsymmetricDecryptResponse_descriptor = getDescriptor().getMessageTypes().get(33); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java index 9ffdee60..b6e6b73e 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java @@ -119,7 +119,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "B\003\340A\003\022\024\n\007content\030\005 \001(\014B\003\340A\003\"k\n\021Attestati" + "onFormat\022\"\n\036ATTESTATION_FORMAT_UNSPECIFI" + "ED\020\000\022\030\n\024CAVIUM_V1_COMPRESSED\020\003\022\030\n\024CAVIUM" - + "_V2_COMPRESSED\020\004\"\271\017\n\020CryptoKeyVersion\022\021\n" + + "_V2_COMPRESSED\020\004\"\220\020\n\020CryptoKeyVersion\022\021\n" + "\004name\030\001 \001(\tB\003\340A\003\022J\n\005state\030\003 \001(\0162;.google" + ".cloud.kms.v1.CryptoKeyVersion.CryptoKey" + "VersionState\022C\n\020protection_level\030\007 \001(\0162$" @@ -139,7 +139,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "ilure_reason\030\020 \001(\tB\003\340A\003\022^\n!external_prot" + "ection_level_options\030\021 \001(\01323.google.clou" + "d.kms.v1.ExternalProtectionLevelOptions\022" - + "\036\n\021reimport_eligible\030\022 \001(\010B\003\340A\003\"\316\005\n\031Cryp" + + "\036\n\021reimport_eligible\030\022 \001(\010B\003\340A\003\"\245\006\n\031Cryp" + "toKeyVersionAlgorithm\022,\n(CRYPTO_KEY_VERS" + "ION_ALGORITHM_UNSPECIFIED\020\000\022\037\n\033GOOGLE_SY" + "MMETRIC_ENCRYPTION\020\001\022\034\n\030RSA_SIGN_PSS_204" @@ -148,70 +148,72 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "GN_PSS_4096_SHA512\020\017\022\036\n\032RSA_SIGN_PKCS1_2" + "048_SHA256\020\005\022\036\n\032RSA_SIGN_PKCS1_3072_SHA2" + "56\020\006\022\036\n\032RSA_SIGN_PKCS1_4096_SHA256\020\007\022\036\n\032" - + "RSA_SIGN_PKCS1_4096_SHA512\020\020\022 \n\034RSA_DECR" - + "YPT_OAEP_2048_SHA256\020\010\022 \n\034RSA_DECRYPT_OA" - + "EP_3072_SHA256\020\t\022 \n\034RSA_DECRYPT_OAEP_409" - + "6_SHA256\020\n\022 \n\034RSA_DECRYPT_OAEP_4096_SHA5" - + "12\020\021\022\036\n\032RSA_DECRYPT_OAEP_2048_SHA1\020%\022\036\n\032" - + "RSA_DECRYPT_OAEP_3072_SHA1\020&\022\036\n\032RSA_DECR" - + "YPT_OAEP_4096_SHA1\020\'\022\027\n\023EC_SIGN_P256_SHA" - + "256\020\014\022\027\n\023EC_SIGN_P384_SHA384\020\r\022\034\n\030EC_SIG" - + "N_SECP256K1_SHA256\020\037\022\017\n\013HMAC_SHA256\020 \022!\n" - + "\035EXTERNAL_SYMMETRIC_ENCRYPTION\020\022\"\301\001\n\025Cry" - + "ptoKeyVersionState\022(\n$CRYPTO_KEY_VERSION" - + "_STATE_UNSPECIFIED\020\000\022\026\n\022PENDING_GENERATI" - + "ON\020\005\022\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r\n\tDESTR" - + "OYED\020\003\022\025\n\021DESTROY_SCHEDULED\020\004\022\022\n\016PENDING" - + "_IMPORT\020\006\022\021\n\rIMPORT_FAILED\020\007\"I\n\024CryptoKe" - + "yVersionView\022\'\n#CRYPTO_KEY_VERSION_VIEW_" - + "UNSPECIFIED\020\000\022\010\n\004FULL\020\001:\252\001\352A\246\001\n(cloudkms" - + ".googleapis.com/CryptoKeyVersion\022zprojec" - + "ts/{project}/locations/{location}/keyRin" - + "gs/{key_ring}/cryptoKeys/{crypto_key}/cr" - + "yptoKeyVersions/{crypto_key_version}\"\234\003\n" - + "\tPublicKey\022\013\n\003pem\030\001 \001(\t\022R\n\talgorithm\030\002 \001" - + "(\0162?.google.cloud.kms.v1.CryptoKeyVersio" - + "n.CryptoKeyVersionAlgorithm\022/\n\npem_crc32" - + "c\030\003 \001(\0132\033.google.protobuf.Int64Value\022\014\n\004" - + "name\030\004 \001(\t\022>\n\020protection_level\030\005 \001(\0162$.g" - + "oogle.cloud.kms.v1.ProtectionLevel:\256\001\352A\252" - + "\001\n!cloudkms.googleapis.com/PublicKey\022\204\001p" - + "rojects/{project}/locations/{location}/k" - + "eyRings/{key_ring}/cryptoKeys/{crypto_ke" - + "y}/cryptoKeyVersions/{crypto_key_version" - + "}/publicKey\"\333\007\n\tImportJob\022\021\n\004name\030\001 \001(\tB" - + "\003\340A\003\022J\n\rimport_method\030\002 \001(\0162+.google.clo" - + "ud.kms.v1.ImportJob.ImportMethodB\006\340A\002\340A\005" - + "\022F\n\020protection_level\030\t \001(\0162$.google.clou" - + "d.kms.v1.ProtectionLevelB\006\340A\002\340A\005\0224\n\013crea" - + "te_time\030\003 \001(\0132\032.google.protobuf.Timestam" - + "pB\003\340A\003\0226\n\rgenerate_time\030\004 \001(\0132\032.google.p" - + "rotobuf.TimestampB\003\340A\003\0224\n\013expire_time\030\005 " - + "\001(\0132\032.google.protobuf.TimestampB\003\340A\003\022:\n\021" - + "expire_event_time\030\n \001(\0132\032.google.protobu" - + "f.TimestampB\003\340A\003\022A\n\005state\030\006 \001(\0162-.google" - + ".cloud.kms.v1.ImportJob.ImportJobStateB\003" - + "\340A\003\022I\n\npublic_key\030\007 \001(\01320.google.cloud.k" - + "ms.v1.ImportJob.WrappingPublicKeyB\003\340A\003\022F" - + "\n\013attestation\030\010 \001(\0132,.google.cloud.kms.v" - + "1.KeyOperationAttestationB\003\340A\003\032 \n\021Wrappi" - + "ngPublicKey\022\013\n\003pem\030\001 \001(\t\"m\n\014ImportMethod" - + "\022\035\n\031IMPORT_METHOD_UNSPECIFIED\020\000\022\036\n\032RSA_O" - + "AEP_3072_SHA1_AES_256\020\001\022\036\n\032RSA_OAEP_4096" - + "_SHA1_AES_256\020\002\"c\n\016ImportJobState\022 \n\034IMP" - + "ORT_JOB_STATE_UNSPECIFIED\020\000\022\026\n\022PENDING_G" - + "ENERATION\020\001\022\n\n\006ACTIVE\020\002\022\013\n\007EXPIRED\020\003:{\352A" - + "x\n!cloudkms.googleapis.com/ImportJob\022Spr" - + "ojects/{project}/locations/{location}/ke" - + "yRings/{key_ring}/importJobs/{import_job" - + "}\":\n\036ExternalProtectionLevelOptions\022\030\n\020e" - + "xternal_key_uri\030\001 \001(\t*X\n\017ProtectionLevel" - + "\022 \n\034PROTECTION_LEVEL_UNSPECIFIED\020\000\022\014\n\010SO" - + "FTWARE\020\001\022\007\n\003HSM\020\002\022\014\n\010EXTERNAL\020\003B\225\001\n\027com." - + "google.cloud.kms.v1B\021KmsResourcesProtoP\001" - + "Z6google.golang.org/genproto/googleapis/" - + "cloud/kms/v1;kms\370\001\001\252\002\023Google.Cloud.Kms.V" - + "1\312\002\023Google\\Cloud\\Kms\\V1b\006proto3" + + "RSA_SIGN_PKCS1_4096_SHA512\020\020\022\033\n\027RSA_SIGN" + + "_RAW_PKCS1_2048\020\034\022\033\n\027RSA_SIGN_RAW_PKCS1_" + + "3072\020\035\022\033\n\027RSA_SIGN_RAW_PKCS1_4096\020\036\022 \n\034R" + + "SA_DECRYPT_OAEP_2048_SHA256\020\010\022 \n\034RSA_DEC" + + "RYPT_OAEP_3072_SHA256\020\t\022 \n\034RSA_DECRYPT_O" + + "AEP_4096_SHA256\020\n\022 \n\034RSA_DECRYPT_OAEP_40" + + "96_SHA512\020\021\022\036\n\032RSA_DECRYPT_OAEP_2048_SHA" + + "1\020%\022\036\n\032RSA_DECRYPT_OAEP_3072_SHA1\020&\022\036\n\032R" + + "SA_DECRYPT_OAEP_4096_SHA1\020\'\022\027\n\023EC_SIGN_P" + + "256_SHA256\020\014\022\027\n\023EC_SIGN_P384_SHA384\020\r\022\034\n" + + "\030EC_SIGN_SECP256K1_SHA256\020\037\022\017\n\013HMAC_SHA2" + + "56\020 \022!\n\035EXTERNAL_SYMMETRIC_ENCRYPTION\020\022\"" + + "\301\001\n\025CryptoKeyVersionState\022(\n$CRYPTO_KEY_" + + "VERSION_STATE_UNSPECIFIED\020\000\022\026\n\022PENDING_G" + + "ENERATION\020\005\022\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r" + + "\n\tDESTROYED\020\003\022\025\n\021DESTROY_SCHEDULED\020\004\022\022\n\016" + + "PENDING_IMPORT\020\006\022\021\n\rIMPORT_FAILED\020\007\"I\n\024C" + + "ryptoKeyVersionView\022\'\n#CRYPTO_KEY_VERSIO" + + "N_VIEW_UNSPECIFIED\020\000\022\010\n\004FULL\020\001:\252\001\352A\246\001\n(c" + + "loudkms.googleapis.com/CryptoKeyVersion\022" + + "zprojects/{project}/locations/{location}" + + "/keyRings/{key_ring}/cryptoKeys/{crypto_" + + "key}/cryptoKeyVersions/{crypto_key_versi" + + "on}\"\234\003\n\tPublicKey\022\013\n\003pem\030\001 \001(\t\022R\n\talgori" + + "thm\030\002 \001(\0162?.google.cloud.kms.v1.CryptoKe" + + "yVersion.CryptoKeyVersionAlgorithm\022/\n\npe" + + "m_crc32c\030\003 \001(\0132\033.google.protobuf.Int64Va" + + "lue\022\014\n\004name\030\004 \001(\t\022>\n\020protection_level\030\005 " + + "\001(\0162$.google.cloud.kms.v1.ProtectionLeve" + + "l:\256\001\352A\252\001\n!cloudkms.googleapis.com/Public" + + "Key\022\204\001projects/{project}/locations/{loca" + + "tion}/keyRings/{key_ring}/cryptoKeys/{cr" + + "ypto_key}/cryptoKeyVersions/{crypto_key_" + + "version}/publicKey\"\333\007\n\tImportJob\022\021\n\004name" + + "\030\001 \001(\tB\003\340A\003\022J\n\rimport_method\030\002 \001(\0162+.goo" + + "gle.cloud.kms.v1.ImportJob.ImportMethodB" + + "\006\340A\002\340A\005\022F\n\020protection_level\030\t \001(\0162$.goog" + + "le.cloud.kms.v1.ProtectionLevelB\006\340A\002\340A\005\022" + + "4\n\013create_time\030\003 \001(\0132\032.google.protobuf.T" + + "imestampB\003\340A\003\0226\n\rgenerate_time\030\004 \001(\0132\032.g" + + "oogle.protobuf.TimestampB\003\340A\003\0224\n\013expire_" + + "time\030\005 \001(\0132\032.google.protobuf.TimestampB\003" + + "\340A\003\022:\n\021expire_event_time\030\n \001(\0132\032.google." + + "protobuf.TimestampB\003\340A\003\022A\n\005state\030\006 \001(\0162-" + + ".google.cloud.kms.v1.ImportJob.ImportJob" + + "StateB\003\340A\003\022I\n\npublic_key\030\007 \001(\01320.google." + + "cloud.kms.v1.ImportJob.WrappingPublicKey" + + "B\003\340A\003\022F\n\013attestation\030\010 \001(\0132,.google.clou" + + "d.kms.v1.KeyOperationAttestationB\003\340A\003\032 \n" + + "\021WrappingPublicKey\022\013\n\003pem\030\001 \001(\t\"m\n\014Impor" + + "tMethod\022\035\n\031IMPORT_METHOD_UNSPECIFIED\020\000\022\036" + + "\n\032RSA_OAEP_3072_SHA1_AES_256\020\001\022\036\n\032RSA_OA" + + "EP_4096_SHA1_AES_256\020\002\"c\n\016ImportJobState" + + "\022 \n\034IMPORT_JOB_STATE_UNSPECIFIED\020\000\022\026\n\022PE" + + "NDING_GENERATION\020\001\022\n\n\006ACTIVE\020\002\022\013\n\007EXPIRE" + + "D\020\003:{\352Ax\n!cloudkms.googleapis.com/Import" + + "Job\022Sprojects/{project}/locations/{locat" + + "ion}/keyRings/{key_ring}/importJobs/{imp" + + "ort_job}\":\n\036ExternalProtectionLevelOptio" + + "ns\022\030\n\020external_key_uri\030\001 \001(\t*X\n\017Protecti" + + "onLevel\022 \n\034PROTECTION_LEVEL_UNSPECIFIED\020" + + "\000\022\014\n\010SOFTWARE\020\001\022\007\n\003HSM\020\002\022\014\n\010EXTERNAL\020\003B\225" + + "\001\n\027com.google.cloud.kms.v1B\021KmsResources" + + "ProtoP\001Z6google.golang.org/genproto/goog" + + "leapis/cloud/kms/v1;kms\370\001\001\252\002\023Google.Clou" + + "d.Kms.V1\312\002\023Google\\Cloud\\Kms\\V1b\006proto3" }; descriptor = com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsRequest.java index 6439f0f9..9b7aa8bb 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsRequest.java @@ -438,13 +438,13 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } if (pageSize_ != 0) { output.writeInt32(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); } if (view_ @@ -453,10 +453,10 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io .getNumber()) { output.writeEnum(4, view_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 5, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 6, orderBy_); } unknownFields.writeTo(output); @@ -468,13 +468,13 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } if (pageSize_ != 0) { size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); } if (view_ @@ -483,10 +483,10 @@ public int getSerializedSize() { .getNumber()) { size += com.google.protobuf.CodedOutputStream.computeEnumSize(4, view_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, orderBy_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsResponse.java index 1fc724ff..31673320 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeyVersionsResponse.java @@ -292,7 +292,7 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io for (int i = 0; i < cryptoKeyVersions_.size(); i++) { output.writeMessage(1, cryptoKeyVersions_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); } if (totalSize_ != 0) { @@ -311,7 +311,7 @@ public int getSerializedSize() { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, cryptoKeyVersions_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); } if (totalSize_ != 0) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysRequest.java index 4e3bad86..777fa613 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysRequest.java @@ -437,13 +437,13 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } if (pageSize_ != 0) { output.writeInt32(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); } if (versionView_ @@ -452,10 +452,10 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io .getNumber()) { output.writeEnum(4, versionView_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 5, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 6, orderBy_); } unknownFields.writeTo(output); @@ -467,13 +467,13 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } if (pageSize_ != 0) { size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); } if (versionView_ @@ -482,10 +482,10 @@ public int getSerializedSize() { .getNumber()) { size += com.google.protobuf.CodedOutputStream.computeEnumSize(4, versionView_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, orderBy_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysResponse.java index e2b81b5d..14de4f0d 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListCryptoKeysResponse.java @@ -286,7 +286,7 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io for (int i = 0; i < cryptoKeys_.size(); i++) { output.writeMessage(1, cryptoKeys_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); } if (totalSize_ != 0) { @@ -304,7 +304,7 @@ public int getSerializedSize() { for (int i = 0; i < cryptoKeys_.size(); i++) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, cryptoKeys_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); } if (totalSize_ != 0) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsRequest.java index 6b9b34c6..5c9a0278 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsRequest.java @@ -391,19 +391,19 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } if (pageSize_ != 0) { output.writeInt32(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 5, orderBy_); } unknownFields.writeTo(output); @@ -415,19 +415,19 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } if (pageSize_ != 0) { size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, orderBy_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsResponse.java index e9fe76bd..2b95a2f5 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListImportJobsResponse.java @@ -286,7 +286,7 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io for (int i = 0; i < importJobs_.size(); i++) { output.writeMessage(1, importJobs_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); } if (totalSize_ != 0) { @@ -304,7 +304,7 @@ public int getSerializedSize() { for (int i = 0; i < importJobs_.size(); i++) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, importJobs_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); } if (totalSize_ != 0) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsRequest.java index c6f82526..19f5573a 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsRequest.java @@ -391,19 +391,19 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); } if (pageSize_ != 0) { output.writeInt32(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 5, orderBy_); } unknownFields.writeTo(output); @@ -415,19 +415,19 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getParentBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); } if (pageSize_ != 0) { size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); } - if (!getPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); } - if (!getFilterBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(filter_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, filter_); } - if (!getOrderByBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(orderBy_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, orderBy_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsResponse.java index 5bfbdcb4..d656f182 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ListKeyRingsResponse.java @@ -286,7 +286,7 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io for (int i = 0; i < keyRings_.size(); i++) { output.writeMessage(1, keyRings_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); } if (totalSize_ != 0) { @@ -304,7 +304,7 @@ public int getSerializedSize() { for (int i = 0; i < keyRings_.size(); i++) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, keyRings_.get(i)); } - if (!getNextPageTokenBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); } if (totalSize_ != 0) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignRequest.java index 36e5d012..753f6492 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignRequest.java @@ -303,7 +303,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!data_.isEmpty()) { @@ -321,7 +321,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!data_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignResponse.java index 7ae85711..0d62bf9e 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacSignResponse.java @@ -365,7 +365,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!mac_.isEmpty()) { @@ -390,7 +390,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!mac_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyRequest.java index 52ac29ad..ad0e86c2 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyRequest.java @@ -427,7 +427,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (!data_.isEmpty()) { @@ -451,7 +451,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (!data_.isEmpty()) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyResponse.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyResponse.java index 45e579ed..36766826 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyResponse.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/MacVerifyResponse.java @@ -332,7 +332,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } if (success_ != false) { @@ -360,7 +360,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } if (success_ != false) { diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKey.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKey.java index c4e73c85..3ca5ba84 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKey.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKey.java @@ -430,7 +430,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getPemBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pem_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, pem_); } if (algorithm_ @@ -442,7 +442,7 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (pemCrc32C_ != null) { output.writeMessage(3, getPemCrc32C()); } - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, name_); } if (protectionLevel_ @@ -458,7 +458,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getPemBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pem_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, pem_); } if (algorithm_ @@ -470,7 +470,7 @@ public int getSerializedSize() { if (pemCrc32C_ != null) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getPemCrc32C()); } - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, name_); } if (protectionLevel_ diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/RestoreCryptoKeyVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/RestoreCryptoKeyVersionRequest.java index e0f795c5..511d9cbf 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/RestoreCryptoKeyVersionRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/RestoreCryptoKeyVersionRequest.java @@ -179,7 +179,7 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } unknownFields.writeTo(output); @@ -191,7 +191,7 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/UpdateCryptoKeyPrimaryVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/UpdateCryptoKeyPrimaryVersionRequest.java index 6e209072..3cb3e317 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/UpdateCryptoKeyPrimaryVersionRequest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/UpdateCryptoKeyPrimaryVersionRequest.java @@ -237,10 +237,10 @@ public final boolean isInitialized() { @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); } - if (!getCryptoKeyVersionIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(cryptoKeyVersionId_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, cryptoKeyVersionId_); } unknownFields.writeTo(output); @@ -252,10 +252,10 @@ public int getSerializedSize() { if (size != -1) return size; size = 0; - if (!getNameBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); } - if (!getCryptoKeyVersionIdBytes().isEmpty()) { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(cryptoKeyVersionId_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, cryptoKeyVersionId_); } size += unknownFields.getSerializedSize(); diff --git a/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/resources.proto b/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/resources.proto index c3aa320f..70c670b0 100644 --- a/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/resources.proto +++ b/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/resources.proto @@ -288,6 +288,15 @@ message CryptoKeyVersion { // RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest. RSA_SIGN_PKCS1_4096_SHA512 = 16; + // RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key. + RSA_SIGN_RAW_PKCS1_2048 = 28; + + // RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key. + RSA_SIGN_RAW_PKCS1_3072 = 29; + + // RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key. + RSA_SIGN_RAW_PKCS1_4096 = 30; + // RSAES-OAEP 2048 bit key with a SHA256 digest. RSA_DECRYPT_OAEP_2048_SHA256 = 8; diff --git a/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/service.proto b/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/service.proto index 3f29c05a..497fb921 100644 --- a/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/service.proto +++ b/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/service.proto @@ -921,10 +921,10 @@ message AsymmetricSignRequest { } ]; - // Required. The digest of the data to sign. The digest must be produced with + // Optional. The digest of the data to sign. The digest must be produced with // the same digest algorithm as specified by the key version's // [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. - Digest digest = 3 [(google.api.field_behavior) = REQUIRED]; + Digest digest = 3 [(google.api.field_behavior) = OPTIONAL]; // Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.digest][google.cloud.kms.v1.AsymmetricSignRequest.digest]. If // specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the @@ -940,6 +940,26 @@ message AsymmetricSignRequest { // never exceed 2^32-1, and can be safely downconverted to uint32 in languages // that support this type. google.protobuf.Int64Value digest_crc32c = 4 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. This field will only be honored for RAW_PKCS1 keys. + // The data to sign. A digest is computed over the data that will be signed, + // PKCS #1 padding is applied to the digest directly and then encrypted. + bytes data = 6 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. An optional CRC32C checksum of the [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]. If + // specified, [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will verify the integrity of the + // received [AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data] using this checksum. + // [KeyManagementService][google.cloud.kms.v1.KeyManagementService] will report an error if the checksum verification + // fails. If you receive a checksum error, your client should verify that + // CRC32C([AsymmetricSignRequest.data][google.cloud.kms.v1.AsymmetricSignRequest.data]) is equal to + // [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c], and if so, perform a limited + // number of retries. A persistent mismatch may indicate an issue in your + // computation of the CRC32C checksum. + // Note: This field is defined as int64 for reasons of compatibility across + // different languages. However, it is a non-negative integer, which will + // never exceed 2^32-1, and can be safely downconverted to uint32 in languages + // that support this type. + google.protobuf.Int64Value data_crc32c = 7 [(google.api.field_behavior) = OPTIONAL]; } // Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. @@ -1172,6 +1192,16 @@ message AsymmetricSignResponse { // this field to verify that the intended resource was used for signing. string name = 4; + // Integrity verification field. A flag indicating whether + // [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was received by + // [KeyManagementService][google.cloud.kms.v1.KeyManagementService] and used for the integrity verification of the + // [data][google.cloud.kms.v1.AsymmetricSignRequest.data]. A false value of this field + // indicates either that [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] was left + // unset or that it was not delivered to [KeyManagementService][google.cloud.kms.v1.KeyManagementService]. If you've + // set [AsymmetricSignRequest.data_crc32c][google.cloud.kms.v1.AsymmetricSignRequest.data_crc32c] but this field is still false, + // discard the response and perform a limited number of retries. + bool verified_data_crc32c = 5; + // The [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used for signing. ProtectionLevel protection_level = 6; }