diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/Digest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/Digest.java index 342db8fa..e9577b24 100644 --- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/Digest.java +++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/Digest.java @@ -169,6 +169,21 @@ public DigestCase getDigestCase() { } public static final int SHA256_FIELD_NUMBER = 1; + /** + * + * + *
+ * A message digest produced with the SHA-256 algorithm. + *+ * + *
bytes sha256 = 1;
+ *
+ * @return Whether the sha256 field is set.
+ */
+ @java.lang.Override
+ public boolean hasSha256() {
+ return digestCase_ == 1;
+ }
/**
*
*
@@ -189,6 +204,21 @@ public com.google.protobuf.ByteString getSha256() {
}
public static final int SHA384_FIELD_NUMBER = 2;
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-384 algorithm. + *+ * + *
bytes sha384 = 2;
+ *
+ * @return Whether the sha384 field is set.
+ */
+ @java.lang.Override
+ public boolean hasSha384() {
+ return digestCase_ == 2;
+ }
/**
*
*
@@ -209,6 +239,21 @@ public com.google.protobuf.ByteString getSha384() {
}
public static final int SHA512_FIELD_NUMBER = 3;
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-512 algorithm. + *+ * + *
bytes sha512 = 3;
+ *
+ * @return Whether the sha512 field is set.
+ */
+ @java.lang.Override
+ public boolean hasSha512() {
+ return digestCase_ == 3;
+ }
/**
*
*
@@ -623,6 +668,20 @@ public Builder clearDigest() {
return this;
}
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-256 algorithm. + *+ * + *
bytes sha256 = 1;
+ *
+ * @return Whether the sha256 field is set.
+ */
+ public boolean hasSha256() {
+ return digestCase_ == 1;
+ }
/**
*
*
@@ -681,6 +740,20 @@ public Builder clearSha256() {
return this;
}
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-384 algorithm. + *+ * + *
bytes sha384 = 2;
+ *
+ * @return Whether the sha384 field is set.
+ */
+ public boolean hasSha384() {
+ return digestCase_ == 2;
+ }
/**
*
*
@@ -739,6 +812,20 @@ public Builder clearSha384() {
return this;
}
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-512 algorithm. + *+ * + *
bytes sha512 = 3;
+ *
+ * @return Whether the sha512 field is set.
+ */
+ public boolean hasSha512() {
+ return digestCase_ == 3;
+ }
/**
*
*
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DigestOrBuilder.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DigestOrBuilder.java
index 863bfd4c..42e76853 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DigestOrBuilder.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/DigestOrBuilder.java
@@ -23,6 +23,18 @@ public interface DigestOrBuilder
// @@protoc_insertion_point(interface_extends:google.cloud.kms.v1.Digest)
com.google.protobuf.MessageOrBuilder {
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-256 algorithm. + *+ * + *
bytes sha256 = 1;
+ *
+ * @return Whether the sha256 field is set.
+ */
+ boolean hasSha256();
/**
*
*
@@ -36,6 +48,18 @@ public interface DigestOrBuilder
*/
com.google.protobuf.ByteString getSha256();
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-384 algorithm. + *+ * + *
bytes sha384 = 2;
+ *
+ * @return Whether the sha384 field is set.
+ */
+ boolean hasSha384();
/**
*
*
@@ -49,6 +73,18 @@ public interface DigestOrBuilder
*/
com.google.protobuf.ByteString getSha384();
+ /**
+ *
+ *
+ * + * A message digest produced with the SHA-512 algorithm. + *+ * + *
bytes sha512 = 3;
+ *
+ * @return Whether the sha512 field is set.
+ */
+ boolean hasSha512();
/**
*
*
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java
index 3468f2b2..8da68ca5 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequest.java
@@ -332,6 +332,40 @@ public com.google.protobuf.ByteString getImportJobBytes() {
}
public static final int RSA_AES_WRAPPED_KEY_FIELD_NUMBER = 5;
+ /**
+ *
+ *
+ * + * Wrapped key material produced with + * [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256] + * or + * [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256]. + * This field contains the concatenation of two wrapped keys: + * <ol> + * <li>An ephemeral AES-256 wrapping key wrapped with the + * [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1, + * MGF1 with SHA-1, and an empty label. + * </li> + * <li>The key to be imported, wrapped with the ephemeral AES-256 key + * using AES-KWP (RFC 5649). + * </li> + * </ol> + * If importing symmetric key material, it is expected that the unwrapped + * key contains plain bytes. If importing asymmetric key material, it is + * expected that the unwrapped key is in PKCS#8-encoded DER format (the + * PrivateKeyInfo structure from RFC 5208). + * This format is the same as the format produced by PKCS#11 mechanism + * CKM_RSA_AES_KEY_WRAP. + *+ * + *
bytes rsa_aes_wrapped_key = 5;
+ *
+ * @return Whether the rsaAesWrappedKey field is set.
+ */
+ @java.lang.Override
+ public boolean hasRsaAesWrappedKey() {
+ return wrappedKeyMaterialCase_ == 5;
+ }
/**
*
*
@@ -1132,6 +1166,39 @@ public Builder setImportJobBytes(com.google.protobuf.ByteString value) {
return this;
}
+ /**
+ *
+ *
+ * + * Wrapped key material produced with + * [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256] + * or + * [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256]. + * This field contains the concatenation of two wrapped keys: + * <ol> + * <li>An ephemeral AES-256 wrapping key wrapped with the + * [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1, + * MGF1 with SHA-1, and an empty label. + * </li> + * <li>The key to be imported, wrapped with the ephemeral AES-256 key + * using AES-KWP (RFC 5649). + * </li> + * </ol> + * If importing symmetric key material, it is expected that the unwrapped + * key contains plain bytes. If importing asymmetric key material, it is + * expected that the unwrapped key is in PKCS#8-encoded DER format (the + * PrivateKeyInfo structure from RFC 5208). + * This format is the same as the format produced by PKCS#11 mechanism + * CKM_RSA_AES_KEY_WRAP. + *+ * + *
bytes rsa_aes_wrapped_key = 5;
+ *
+ * @return Whether the rsaAesWrappedKey field is set.
+ */
+ public boolean hasRsaAesWrappedKey() {
+ return wrappedKeyMaterialCase_ == 5;
+ }
/**
*
*
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequestOrBuilder.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequestOrBuilder.java
index 48c7aaa9..e95e3a52 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequestOrBuilder.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ImportCryptoKeyVersionRequestOrBuilder.java
@@ -116,6 +116,37 @@ public interface ImportCryptoKeyVersionRequestOrBuilder
*/
com.google.protobuf.ByteString getImportJobBytes();
+ /**
+ *
+ *
+ * + * Wrapped key material produced with + * [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256] + * or + * [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256]. + * This field contains the concatenation of two wrapped keys: + * <ol> + * <li>An ephemeral AES-256 wrapping key wrapped with the + * [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1, + * MGF1 with SHA-1, and an empty label. + * </li> + * <li>The key to be imported, wrapped with the ephemeral AES-256 key + * using AES-KWP (RFC 5649). + * </li> + * </ol> + * If importing symmetric key material, it is expected that the unwrapped + * key contains plain bytes. If importing asymmetric key material, it is + * expected that the unwrapped key is in PKCS#8-encoded DER format (the + * PrivateKeyInfo structure from RFC 5208). + * This format is the same as the format produced by PKCS#11 mechanism + * CKM_RSA_AES_KEY_WRAP. + *+ * + *
bytes rsa_aes_wrapped_key = 5;
+ *
+ * @return Whether the rsaAesWrappedKey field is set.
+ */
+ boolean hasRsaAesWrappedKey();
/**
*
*
diff --git a/synth.metadata b/synth.metadata
index 013936f8..ac9b2e72 100644
--- a/synth.metadata
+++ b/synth.metadata
@@ -11,8 +11,8 @@
"git": {
"name": "googleapis",
"remote": "https://github.com/googleapis/googleapis.git",
- "sha": "3f914b89ae1ef459955f470f9ccb498314ad28d5",
- "internalRef": "357022763"
+ "sha": "f6dd7e47620566925a4b3f1ce029e74e1b2f2516",
+ "internalRef": "359781040"
}
},
{