Skip to content
This repository has been archived by the owner on Oct 2, 2023. It is now read-only.

feat(generator): update protoc to v3.15.3 #420

Merged
merged 1 commit into from Mar 2, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Expand Up @@ -169,6 +169,21 @@ public DigestCase getDigestCase() {
}

public static final int SHA256_FIELD_NUMBER = 1;
/**
*
*
* <pre>
* A message digest produced with the SHA-256 algorithm.
* </pre>
*
* <code>bytes sha256 = 1;</code>
*
* @return Whether the sha256 field is set.
*/
@java.lang.Override
public boolean hasSha256() {
return digestCase_ == 1;
}
/**
*
*
Expand All @@ -189,6 +204,21 @@ public com.google.protobuf.ByteString getSha256() {
}

public static final int SHA384_FIELD_NUMBER = 2;
/**
*
*
* <pre>
* A message digest produced with the SHA-384 algorithm.
* </pre>
*
* <code>bytes sha384 = 2;</code>
*
* @return Whether the sha384 field is set.
*/
@java.lang.Override
public boolean hasSha384() {
return digestCase_ == 2;
}
/**
*
*
Expand All @@ -209,6 +239,21 @@ public com.google.protobuf.ByteString getSha384() {
}

public static final int SHA512_FIELD_NUMBER = 3;
/**
*
*
* <pre>
* A message digest produced with the SHA-512 algorithm.
* </pre>
*
* <code>bytes sha512 = 3;</code>
*
* @return Whether the sha512 field is set.
*/
@java.lang.Override
public boolean hasSha512() {
return digestCase_ == 3;
}
/**
*
*
Expand Down Expand Up @@ -623,6 +668,20 @@ public Builder clearDigest() {
return this;
}

/**
*
*
* <pre>
* A message digest produced with the SHA-256 algorithm.
* </pre>
*
* <code>bytes sha256 = 1;</code>
*
* @return Whether the sha256 field is set.
*/
public boolean hasSha256() {
return digestCase_ == 1;
}
/**
*
*
Expand Down Expand Up @@ -681,6 +740,20 @@ public Builder clearSha256() {
return this;
}

/**
*
*
* <pre>
* A message digest produced with the SHA-384 algorithm.
* </pre>
*
* <code>bytes sha384 = 2;</code>
*
* @return Whether the sha384 field is set.
*/
public boolean hasSha384() {
return digestCase_ == 2;
}
/**
*
*
Expand Down Expand Up @@ -739,6 +812,20 @@ public Builder clearSha384() {
return this;
}

/**
*
*
* <pre>
* A message digest produced with the SHA-512 algorithm.
* </pre>
*
* <code>bytes sha512 = 3;</code>
*
* @return Whether the sha512 field is set.
*/
public boolean hasSha512() {
return digestCase_ == 3;
}
/**
*
*
Expand Down
Expand Up @@ -23,6 +23,18 @@ public interface DigestOrBuilder
// @@protoc_insertion_point(interface_extends:google.cloud.kms.v1.Digest)
com.google.protobuf.MessageOrBuilder {

/**
*
*
* <pre>
* A message digest produced with the SHA-256 algorithm.
* </pre>
*
* <code>bytes sha256 = 1;</code>
*
* @return Whether the sha256 field is set.
*/
boolean hasSha256();
/**
*
*
Expand All @@ -36,6 +48,18 @@ public interface DigestOrBuilder
*/
com.google.protobuf.ByteString getSha256();

/**
*
*
* <pre>
* A message digest produced with the SHA-384 algorithm.
* </pre>
*
* <code>bytes sha384 = 2;</code>
*
* @return Whether the sha384 field is set.
*/
boolean hasSha384();
/**
*
*
Expand All @@ -49,6 +73,18 @@ public interface DigestOrBuilder
*/
com.google.protobuf.ByteString getSha384();

/**
*
*
* <pre>
* A message digest produced with the SHA-512 algorithm.
* </pre>
*
* <code>bytes sha512 = 3;</code>
*
* @return Whether the sha512 field is set.
*/
boolean hasSha512();
/**
*
*
Expand Down
Expand Up @@ -332,6 +332,40 @@ public com.google.protobuf.ByteString getImportJobBytes() {
}

public static final int RSA_AES_WRAPPED_KEY_FIELD_NUMBER = 5;
/**
*
*
* <pre>
* Wrapped key material produced with
* [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256]
* or
* [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256].
* This field contains the concatenation of two wrapped keys:
* &lt;ol&gt;
* &lt;li&gt;An ephemeral AES-256 wrapping key wrapped with the
* [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1,
* MGF1 with SHA-1, and an empty label.
* &lt;/li&gt;
* &lt;li&gt;The key to be imported, wrapped with the ephemeral AES-256 key
* using AES-KWP (RFC 5649).
* &lt;/li&gt;
* &lt;/ol&gt;
* If importing symmetric key material, it is expected that the unwrapped
* key contains plain bytes. If importing asymmetric key material, it is
* expected that the unwrapped key is in PKCS#8-encoded DER format (the
* PrivateKeyInfo structure from RFC 5208).
* This format is the same as the format produced by PKCS#11 mechanism
* CKM_RSA_AES_KEY_WRAP.
* </pre>
*
* <code>bytes rsa_aes_wrapped_key = 5;</code>
*
* @return Whether the rsaAesWrappedKey field is set.
*/
@java.lang.Override
public boolean hasRsaAesWrappedKey() {
return wrappedKeyMaterialCase_ == 5;
}
/**
*
*
Expand Down Expand Up @@ -1132,6 +1166,39 @@ public Builder setImportJobBytes(com.google.protobuf.ByteString value) {
return this;
}

/**
*
*
* <pre>
* Wrapped key material produced with
* [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256]
* or
* [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256].
* This field contains the concatenation of two wrapped keys:
* &lt;ol&gt;
* &lt;li&gt;An ephemeral AES-256 wrapping key wrapped with the
* [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1,
* MGF1 with SHA-1, and an empty label.
* &lt;/li&gt;
* &lt;li&gt;The key to be imported, wrapped with the ephemeral AES-256 key
* using AES-KWP (RFC 5649).
* &lt;/li&gt;
* &lt;/ol&gt;
* If importing symmetric key material, it is expected that the unwrapped
* key contains plain bytes. If importing asymmetric key material, it is
* expected that the unwrapped key is in PKCS#8-encoded DER format (the
* PrivateKeyInfo structure from RFC 5208).
* This format is the same as the format produced by PKCS#11 mechanism
* CKM_RSA_AES_KEY_WRAP.
* </pre>
*
* <code>bytes rsa_aes_wrapped_key = 5;</code>
*
* @return Whether the rsaAesWrappedKey field is set.
*/
public boolean hasRsaAesWrappedKey() {
return wrappedKeyMaterialCase_ == 5;
}
/**
*
*
Expand Down
Expand Up @@ -116,6 +116,37 @@ public interface ImportCryptoKeyVersionRequestOrBuilder
*/
com.google.protobuf.ByteString getImportJobBytes();

/**
*
*
* <pre>
* Wrapped key material produced with
* [RSA_OAEP_3072_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_3072_SHA1_AES_256]
* or
* [RSA_OAEP_4096_SHA1_AES_256][google.cloud.kms.v1.ImportJob.ImportMethod.RSA_OAEP_4096_SHA1_AES_256].
* This field contains the concatenation of two wrapped keys:
* &lt;ol&gt;
* &lt;li&gt;An ephemeral AES-256 wrapping key wrapped with the
* [public_key][google.cloud.kms.v1.ImportJob.public_key] using RSAES-OAEP with SHA-1,
* MGF1 with SHA-1, and an empty label.
* &lt;/li&gt;
* &lt;li&gt;The key to be imported, wrapped with the ephemeral AES-256 key
* using AES-KWP (RFC 5649).
* &lt;/li&gt;
* &lt;/ol&gt;
* If importing symmetric key material, it is expected that the unwrapped
* key contains plain bytes. If importing asymmetric key material, it is
* expected that the unwrapped key is in PKCS#8-encoded DER format (the
* PrivateKeyInfo structure from RFC 5208).
* This format is the same as the format produced by PKCS#11 mechanism
* CKM_RSA_AES_KEY_WRAP.
* </pre>
*
* <code>bytes rsa_aes_wrapped_key = 5;</code>
*
* @return Whether the rsaAesWrappedKey field is set.
*/
boolean hasRsaAesWrappedKey();
/**
*
*
Expand Down
6 changes: 3 additions & 3 deletions synth.metadata
Expand Up @@ -4,15 +4,15 @@
"git": {
"name": ".",
"remote": "https://github.com/googleapis/java-kms.git",
"sha": "7dd7fc3ebbf940d7be1a75f74ef0492c59aacacc"
"sha": "204e7b807e1c60a71555552312d6567ebe109ea3"
}
},
{
"git": {
"name": "googleapis",
"remote": "https://github.com/googleapis/googleapis.git",
"sha": "3f914b89ae1ef459955f470f9ccb498314ad28d5",
"internalRef": "357022763"
"sha": "f6dd7e47620566925a4b3f1ce029e74e1b2f2516",
"internalRef": "359781040"
}
},
{
Expand Down