Skip to content
This repository has been archived by the owner on Oct 2, 2023. It is now read-only.

Commit

Permalink
feat(generator): update protoc to v3.15.3 (#420)
Browse files Browse the repository at this point in the history
This PR was generated using Autosynth. 🌈

Synth log will be available here:
https://source.cloud.google.com/results/invocations/03645e34-b7a2-470a-9ea5-23f9d034150c/targets

- [ ] To automatically regenerate this PR, check this box.

PiperOrigin-RevId: 359781040
Source-Link: googleapis/googleapis@f6dd7e4
  • Loading branch information
yoshi-automation committed Mar 2, 2021
1 parent 4fb7cb6 commit 3904700
Show file tree
Hide file tree
Showing 5 changed files with 223 additions and 2 deletions.
Expand Up @@ -169,6 +169,21 @@ public DigestCase getDigestCase() {
}

public static final int SHA256_FIELD_NUMBER = 1;
/**
*
*
* <pre>
* A message digest produced with the SHA-256 algorithm.
* </pre>
*
* <code>bytes sha256 = 1;</code>
*
* @return Whether the sha256 field is set.
*/
@java.lang.Override
public boolean hasSha256() {
return digestCase_ == 1;
}
/**
*
*
Expand All @@ -189,6 +204,21 @@ public com.google.protobuf.ByteString getSha256() {
}

public static final int SHA384_FIELD_NUMBER = 2;
/**
*
*
* <pre>
* A message digest produced with the SHA-384 algorithm.
* </pre>
*
* <code>bytes sha384 = 2;</code>
*
* @return Whether the sha384 field is set.
*/
@java.lang.Override
public boolean hasSha384() {
return digestCase_ == 2;
}
/**
*
*
Expand All @@ -209,6 +239,21 @@ public com.google.protobuf.ByteString getSha384() {
}

public static final int SHA512_FIELD_NUMBER = 3;
/**
*
*
* <pre>
* A message digest produced with the SHA-512 algorithm.
* </pre>
*
* <code>bytes sha512 = 3;</code>
*
* @return Whether the sha512 field is set.
*/
@java.lang.Override
public boolean hasSha512() {
return digestCase_ == 3;
}
/**
*
*
Expand Down Expand Up @@ -623,6 +668,20 @@ public Builder clearDigest() {
return this;
}

/**
*
*
* <pre>
* A message digest produced with the SHA-256 algorithm.
* </pre>
*
* <code>bytes sha256 = 1;</code>
*
* @return Whether the sha256 field is set.
*/
public boolean hasSha256() {
return digestCase_ == 1;
}
/**
*
*
Expand Down Expand Up @@ -681,6 +740,20 @@ public Builder clearSha256() {
return this;
}

/**
*
*
* <pre>
* A message digest produced with the SHA-384 algorithm.
* </pre>
*
* <code>bytes sha384 = 2;</code>
*
* @return Whether the sha384 field is set.
*/
public boolean hasSha384() {
return digestCase_ == 2;
}
/**
*
*
Expand Down Expand Up @@ -739,6 +812,20 @@ public Builder clearSha384() {
return this;
}

/**
*
*
* <pre>
* A message digest produced with the SHA-512 algorithm.
* </pre>
*
* <code>bytes sha512 = 3;</code>
*
* @return Whether the sha512 field is set.
*/
public boolean hasSha512() {
return digestCase_ == 3;
}
/**
*
*
Expand Down
Expand Up @@ -23,6 +23,18 @@ public interface DigestOrBuilder
// @@protoc_insertion_point(interface_extends:google.cloud.kms.v1.Digest)
com.google.protobuf.MessageOrBuilder {

/**
*
*
* <pre>
* A message digest produced with the SHA-256 algorithm.
* </pre>
*
* <code>bytes sha256 = 1;</code>
*
* @return Whether the sha256 field is set.
*/
boolean hasSha256();
/**
*
*
Expand All @@ -36,6 +48,18 @@ public interface DigestOrBuilder
*/
com.google.protobuf.ByteString getSha256();

/**
*
*
* <pre>
* A message digest produced with the SHA-384 algorithm.
* </pre>
*
* <code>bytes sha384 = 2;</code>
*
* @return Whether the sha384 field is set.
*/
boolean hasSha384();
/**
*
*
Expand All @@ -49,6 +73,18 @@ public interface DigestOrBuilder
*/
com.google.protobuf.ByteString getSha384();

/**
*
*
* <pre>
* A message digest produced with the SHA-512 algorithm.
* </pre>
*
* <code>bytes sha512 = 3;</code>
*
* @return Whether the sha512 field is set.
*/
boolean hasSha512();
/**
*
*
Expand Down
Expand Up @@ -332,6 +332,40 @@ public com.google.protobuf.ByteString getImportJobBytes() {
}

public static final int RSA_AES_WRAPPED_KEY_FIELD_NUMBER = 5;
/**
*
*
* <pre>
* Wrapped key material produced with
* [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256]
* or
* [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256].
* This field contains the concatenation of two wrapped keys:
* &lt;ol&gt;
* &lt;li&gt;An ephemeral AES-256 wrapping key wrapped with the
* [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1,
* MGF1 with SHA-1, and an empty label.
* &lt;/li&gt;
* &lt;li&gt;The key to be imported, wrapped with the ephemeral AES-256 key
* using AES-KWP (RFC 5649).
* &lt;/li&gt;
* &lt;/ol&gt;
* If importing symmetric key material, it is expected that the unwrapped
* key contains plain bytes. If importing asymmetric key material, it is
* expected that the unwrapped key is in PKCS#8-encoded DER format (the
* PrivateKeyInfo structure from RFC 5208).
* This format is the same as the format produced by PKCS#11 mechanism
* CKM_RSA_AES_KEY_WRAP.
* </pre>
*
* <code>bytes rsa_aes_wrapped_key = 5;</code>
*
* @return Whether the rsaAesWrappedKey field is set.
*/
@java.lang.Override
public boolean hasRsaAesWrappedKey() {
return wrappedKeyMaterialCase_ == 5;
}
/**
*
*
Expand Down Expand Up @@ -1132,6 +1166,39 @@ public Builder setImportJobBytes(com.google.protobuf.ByteString value) {
return this;
}

/**
*
*
* <pre>
* Wrapped key material produced with
* [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256]
* or
* [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256].
* This field contains the concatenation of two wrapped keys:
* &lt;ol&gt;
* &lt;li&gt;An ephemeral AES-256 wrapping key wrapped with the
* [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1,
* MGF1 with SHA-1, and an empty label.
* &lt;/li&gt;
* &lt;li&gt;The key to be imported, wrapped with the ephemeral AES-256 key
* using AES-KWP (RFC 5649).
* &lt;/li&gt;
* &lt;/ol&gt;
* If importing symmetric key material, it is expected that the unwrapped
* key contains plain bytes. If importing asymmetric key material, it is
* expected that the unwrapped key is in PKCS#8-encoded DER format (the
* PrivateKeyInfo structure from RFC 5208).
* This format is the same as the format produced by PKCS#11 mechanism
* CKM_RSA_AES_KEY_WRAP.
* </pre>
*
* <code>bytes rsa_aes_wrapped_key = 5;</code>
*
* @return Whether the rsaAesWrappedKey field is set.
*/
public boolean hasRsaAesWrappedKey() {
return wrappedKeyMaterialCase_ == 5;
}
/**
*
*
Expand Down
Expand Up @@ -116,6 +116,37 @@ public interface ImportCryptoKeyVersionRequestOrBuilder
*/
com.google.protobuf.ByteString getImportJobBytes();

/**
*
*
* <pre>
* Wrapped key material produced with
* [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256]
* or
* [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256].
* This field contains the concatenation of two wrapped keys:
* &lt;ol&gt;
* &lt;li&gt;An ephemeral AES-256 wrapping key wrapped with the
* [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1,
* MGF1 with SHA-1, and an empty label.
* &lt;/li&gt;
* &lt;li&gt;The key to be imported, wrapped with the ephemeral AES-256 key
* using AES-KWP (RFC 5649).
* &lt;/li&gt;
* &lt;/ol&gt;
* If importing symmetric key material, it is expected that the unwrapped
* key contains plain bytes. If importing asymmetric key material, it is
* expected that the unwrapped key is in PKCS#8-encoded DER format (the
* PrivateKeyInfo structure from RFC 5208).
* This format is the same as the format produced by PKCS#11 mechanism
* CKM_RSA_AES_KEY_WRAP.
* </pre>
*
* <code>bytes rsa_aes_wrapped_key = 5;</code>
*
* @return Whether the rsaAesWrappedKey field is set.
*/
boolean hasRsaAesWrappedKey();
/**
*
*
Expand Down
4 changes: 2 additions & 2 deletions synth.metadata
Expand Up @@ -11,8 +11,8 @@
"git": {
"name": "googleapis",
"remote": "https://github.com/googleapis/googleapis.git",
"sha": "3f914b89ae1ef459955f470f9ccb498314ad28d5",
"internalRef": "357022763"
"sha": "f6dd7e47620566925a4b3f1ce029e74e1b2f2516",
"internalRef": "359781040"
}
},
{
Expand Down

0 comments on commit 3904700

Please sign in to comment.