1// Code generated by protoc-gen-go. DO NOT EDIT.
2// source: google/cloud/kms/v1/service.proto
3
4package kms
5
6import (
7	context "context"
8	fmt "fmt"
9	math "math"
10
11	proto "github.com/golang/protobuf/proto"
12	_ "github.com/golang/protobuf/ptypes/struct"
13	_ "github.com/golang/protobuf/ptypes/wrappers"
14	_ "google.golang.org/genproto/googleapis/api/annotations"
15	field_mask "google.golang.org/genproto/protobuf/field_mask"
16	grpc "google.golang.org/grpc"
17)
18
19// Reference imports to suppress errors if they are not otherwise used.
20var _ = proto.Marshal
21var _ = fmt.Errorf
22var _ = math.Inf
23
24// This is a compile-time assertion to ensure that this generated file
25// is compatible with the proto package it is being compiled against.
26// A compilation error at this line likely means your copy of the
27// proto package needs to be updated.
28const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
29
30// Request message for
31// [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings].
32type ListKeyRingsRequest struct {
33	// Required. The resource name of the location associated with the
34	// [KeyRings][google.cloud.kms.v1.KeyRing], in the format
35	// `projects/*/locations/*`.
36	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
37	// Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to
38	// include in the response.  Further [KeyRings][google.cloud.kms.v1.KeyRing]
39	// can subsequently be obtained by including the
40	// [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token]
41	// in a subsequent request.  If unspecified, the server will pick an
42	// appropriate default.
43	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
44	// Optional pagination token, returned earlier via
45	// [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token].
46	PageToken            string   `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
47	XXX_NoUnkeyedLiteral struct{} `json:"-"`
48	XXX_unrecognized     []byte   `json:"-"`
49	XXX_sizecache        int32    `json:"-"`
50}
51
52func (m *ListKeyRingsRequest) Reset()         { *m = ListKeyRingsRequest{} }
53func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) }
54func (*ListKeyRingsRequest) ProtoMessage()    {}
55func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) {
56	return fileDescriptor_723aeaeb61739a25, []int{0}
57}
58
59func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error {
60	return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b)
61}
62func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
63	return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic)
64}
65func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) {
66	xxx_messageInfo_ListKeyRingsRequest.Merge(m, src)
67}
68func (m *ListKeyRingsRequest) XXX_Size() int {
69	return xxx_messageInfo_ListKeyRingsRequest.Size(m)
70}
71func (m *ListKeyRingsRequest) XXX_DiscardUnknown() {
72	xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m)
73}
74
75var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo
76
77func (m *ListKeyRingsRequest) GetParent() string {
78	if m != nil {
79		return m.Parent
80	}
81	return ""
82}
83
84func (m *ListKeyRingsRequest) GetPageSize() int32 {
85	if m != nil {
86		return m.PageSize
87	}
88	return 0
89}
90
91func (m *ListKeyRingsRequest) GetPageToken() string {
92	if m != nil {
93		return m.PageToken
94	}
95	return ""
96}
97
98// Request message for
99// [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
100type ListCryptoKeysRequest struct {
101	// Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing]
102	// to list, in the format `projects/*/locations/*/keyRings/*`.
103	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
104	// Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey]
105	// to include in the response.  Further
106	// [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by
107	// including the
108	// [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token]
109	// in a subsequent request.  If unspecified, the server will pick an
110	// appropriate default.
111	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
112	// Optional pagination token, returned earlier via
113	// [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token].
114	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
115	// The fields of the primary version to include in the response.
116	VersionView          CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"`
117	XXX_NoUnkeyedLiteral struct{}                              `json:"-"`
118	XXX_unrecognized     []byte                                `json:"-"`
119	XXX_sizecache        int32                                 `json:"-"`
120}
121
122func (m *ListCryptoKeysRequest) Reset()         { *m = ListCryptoKeysRequest{} }
123func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) }
124func (*ListCryptoKeysRequest) ProtoMessage()    {}
125func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) {
126	return fileDescriptor_723aeaeb61739a25, []int{1}
127}
128
129func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error {
130	return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b)
131}
132func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
133	return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic)
134}
135func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) {
136	xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src)
137}
138func (m *ListCryptoKeysRequest) XXX_Size() int {
139	return xxx_messageInfo_ListCryptoKeysRequest.Size(m)
140}
141func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() {
142	xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m)
143}
144
145var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo
146
147func (m *ListCryptoKeysRequest) GetParent() string {
148	if m != nil {
149		return m.Parent
150	}
151	return ""
152}
153
154func (m *ListCryptoKeysRequest) GetPageSize() int32 {
155	if m != nil {
156		return m.PageSize
157	}
158	return 0
159}
160
161func (m *ListCryptoKeysRequest) GetPageToken() string {
162	if m != nil {
163		return m.PageToken
164	}
165	return ""
166}
167
168func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView {
169	if m != nil {
170		return m.VersionView
171	}
172	return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED
173}
174
175// Request message for
176// [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions].
177type ListCryptoKeyVersionsRequest struct {
178	// Required. The resource name of the
179	// [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format
180	// `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
181	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
182	// Optional limit on the number of
183	// [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to include in the
184	// response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]
185	// can subsequently be obtained by including the
186	// [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token]
187	// in a subsequent request. If unspecified, the server will pick an
188	// appropriate default.
189	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
190	// Optional pagination token, returned earlier via
191	// [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token].
192	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
193	// The fields to include in the response.
194	View                 CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"`
195	XXX_NoUnkeyedLiteral struct{}                              `json:"-"`
196	XXX_unrecognized     []byte                                `json:"-"`
197	XXX_sizecache        int32                                 `json:"-"`
198}
199
200func (m *ListCryptoKeyVersionsRequest) Reset()         { *m = ListCryptoKeyVersionsRequest{} }
201func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) }
202func (*ListCryptoKeyVersionsRequest) ProtoMessage()    {}
203func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) {
204	return fileDescriptor_723aeaeb61739a25, []int{2}
205}
206
207func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error {
208	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b)
209}
210func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
211	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic)
212}
213func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) {
214	xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src)
215}
216func (m *ListCryptoKeyVersionsRequest) XXX_Size() int {
217	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m)
218}
219func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() {
220	xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m)
221}
222
223var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo
224
225func (m *ListCryptoKeyVersionsRequest) GetParent() string {
226	if m != nil {
227		return m.Parent
228	}
229	return ""
230}
231
232func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 {
233	if m != nil {
234		return m.PageSize
235	}
236	return 0
237}
238
239func (m *ListCryptoKeyVersionsRequest) GetPageToken() string {
240	if m != nil {
241		return m.PageToken
242	}
243	return ""
244}
245
246func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView {
247	if m != nil {
248		return m.View
249	}
250	return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED
251}
252
253// Response message for
254// [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings].
255type ListKeyRingsResponse struct {
256	// The list of [KeyRings][google.cloud.kms.v1.KeyRing].
257	KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"`
258	// A token to retrieve next page of results. Pass this value in
259	// [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token]
260	// to retrieve the next page of results.
261	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
262	// The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched
263	// the query.
264	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
265	XXX_NoUnkeyedLiteral struct{} `json:"-"`
266	XXX_unrecognized     []byte   `json:"-"`
267	XXX_sizecache        int32    `json:"-"`
268}
269
270func (m *ListKeyRingsResponse) Reset()         { *m = ListKeyRingsResponse{} }
271func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) }
272func (*ListKeyRingsResponse) ProtoMessage()    {}
273func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) {
274	return fileDescriptor_723aeaeb61739a25, []int{3}
275}
276
277func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error {
278	return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b)
279}
280func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
281	return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic)
282}
283func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) {
284	xxx_messageInfo_ListKeyRingsResponse.Merge(m, src)
285}
286func (m *ListKeyRingsResponse) XXX_Size() int {
287	return xxx_messageInfo_ListKeyRingsResponse.Size(m)
288}
289func (m *ListKeyRingsResponse) XXX_DiscardUnknown() {
290	xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m)
291}
292
293var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo
294
295func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing {
296	if m != nil {
297		return m.KeyRings
298	}
299	return nil
300}
301
302func (m *ListKeyRingsResponse) GetNextPageToken() string {
303	if m != nil {
304		return m.NextPageToken
305	}
306	return ""
307}
308
309func (m *ListKeyRingsResponse) GetTotalSize() int32 {
310	if m != nil {
311		return m.TotalSize
312	}
313	return 0
314}
315
316// Response message for
317// [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
318type ListCryptoKeysResponse struct {
319	// The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey].
320	CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"`
321	// A token to retrieve next page of results. Pass this value in
322	// [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token]
323	// to retrieve the next page of results.
324	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
325	// The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that
326	// matched the query.
327	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
328	XXX_NoUnkeyedLiteral struct{} `json:"-"`
329	XXX_unrecognized     []byte   `json:"-"`
330	XXX_sizecache        int32    `json:"-"`
331}
332
333func (m *ListCryptoKeysResponse) Reset()         { *m = ListCryptoKeysResponse{} }
334func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) }
335func (*ListCryptoKeysResponse) ProtoMessage()    {}
336func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) {
337	return fileDescriptor_723aeaeb61739a25, []int{4}
338}
339
340func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error {
341	return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b)
342}
343func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
344	return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic)
345}
346func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) {
347	xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src)
348}
349func (m *ListCryptoKeysResponse) XXX_Size() int {
350	return xxx_messageInfo_ListCryptoKeysResponse.Size(m)
351}
352func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() {
353	xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m)
354}
355
356var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo
357
358func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey {
359	if m != nil {
360		return m.CryptoKeys
361	}
362	return nil
363}
364
365func (m *ListCryptoKeysResponse) GetNextPageToken() string {
366	if m != nil {
367		return m.NextPageToken
368	}
369	return ""
370}
371
372func (m *ListCryptoKeysResponse) GetTotalSize() int32 {
373	if m != nil {
374		return m.TotalSize
375	}
376	return 0
377}
378
379// Response message for
380// [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions].
381type ListCryptoKeyVersionsResponse struct {
382	// The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
383	CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"`
384	// A token to retrieve next page of results. Pass this value in
385	// [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token]
386	// to retrieve the next page of results.
387	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
388	// The total number of
389	// [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the
390	// query.
391	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
392	XXX_NoUnkeyedLiteral struct{} `json:"-"`
393	XXX_unrecognized     []byte   `json:"-"`
394	XXX_sizecache        int32    `json:"-"`
395}
396
397func (m *ListCryptoKeyVersionsResponse) Reset()         { *m = ListCryptoKeyVersionsResponse{} }
398func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) }
399func (*ListCryptoKeyVersionsResponse) ProtoMessage()    {}
400func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) {
401	return fileDescriptor_723aeaeb61739a25, []int{5}
402}
403
404func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error {
405	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b)
406}
407func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
408	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic)
409}
410func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) {
411	xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src)
412}
413func (m *ListCryptoKeyVersionsResponse) XXX_Size() int {
414	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m)
415}
416func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() {
417	xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m)
418}
419
420var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo
421
422func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion {
423	if m != nil {
424		return m.CryptoKeyVersions
425	}
426	return nil
427}
428
429func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string {
430	if m != nil {
431		return m.NextPageToken
432	}
433	return ""
434}
435
436func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 {
437	if m != nil {
438		return m.TotalSize
439	}
440	return 0
441}
442
443// Request message for
444// [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing].
445type GetKeyRingRequest struct {
446	// The [name][google.cloud.kms.v1.KeyRing.name] of the
447	// [KeyRing][google.cloud.kms.v1.KeyRing] to get.
448	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
449	XXX_NoUnkeyedLiteral struct{} `json:"-"`
450	XXX_unrecognized     []byte   `json:"-"`
451	XXX_sizecache        int32    `json:"-"`
452}
453
454func (m *GetKeyRingRequest) Reset()         { *m = GetKeyRingRequest{} }
455func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) }
456func (*GetKeyRingRequest) ProtoMessage()    {}
457func (*GetKeyRingRequest) Descriptor() ([]byte, []int) {
458	return fileDescriptor_723aeaeb61739a25, []int{6}
459}
460
461func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error {
462	return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b)
463}
464func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
465	return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic)
466}
467func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) {
468	xxx_messageInfo_GetKeyRingRequest.Merge(m, src)
469}
470func (m *GetKeyRingRequest) XXX_Size() int {
471	return xxx_messageInfo_GetKeyRingRequest.Size(m)
472}
473func (m *GetKeyRingRequest) XXX_DiscardUnknown() {
474	xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m)
475}
476
477var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo
478
479func (m *GetKeyRingRequest) GetName() string {
480	if m != nil {
481		return m.Name
482	}
483	return ""
484}
485
486// Request message for
487// [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey].
488type GetCryptoKeyRequest struct {
489	// The [name][google.cloud.kms.v1.CryptoKey.name] of the
490	// [CryptoKey][google.cloud.kms.v1.CryptoKey] to get.
491	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
492	XXX_NoUnkeyedLiteral struct{} `json:"-"`
493	XXX_unrecognized     []byte   `json:"-"`
494	XXX_sizecache        int32    `json:"-"`
495}
496
497func (m *GetCryptoKeyRequest) Reset()         { *m = GetCryptoKeyRequest{} }
498func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
499func (*GetCryptoKeyRequest) ProtoMessage()    {}
500func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) {
501	return fileDescriptor_723aeaeb61739a25, []int{7}
502}
503
504func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
505	return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b)
506}
507func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
508	return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic)
509}
510func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) {
511	xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src)
512}
513func (m *GetCryptoKeyRequest) XXX_Size() int {
514	return xxx_messageInfo_GetCryptoKeyRequest.Size(m)
515}
516func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() {
517	xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m)
518}
519
520var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo
521
522func (m *GetCryptoKeyRequest) GetName() string {
523	if m != nil {
524		return m.Name
525	}
526	return ""
527}
528
529// Request message for
530// [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion].
531type GetCryptoKeyVersionRequest struct {
532	// The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the
533	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get.
534	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
535	XXX_NoUnkeyedLiteral struct{} `json:"-"`
536	XXX_unrecognized     []byte   `json:"-"`
537	XXX_sizecache        int32    `json:"-"`
538}
539
540func (m *GetCryptoKeyVersionRequest) Reset()         { *m = GetCryptoKeyVersionRequest{} }
541func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
542func (*GetCryptoKeyVersionRequest) ProtoMessage()    {}
543func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
544	return fileDescriptor_723aeaeb61739a25, []int{8}
545}
546
547func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
548	return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b)
549}
550func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
551	return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic)
552}
553func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
554	xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src)
555}
556func (m *GetCryptoKeyVersionRequest) XXX_Size() int {
557	return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m)
558}
559func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() {
560	xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m)
561}
562
563var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo
564
565func (m *GetCryptoKeyVersionRequest) GetName() string {
566	if m != nil {
567		return m.Name
568	}
569	return ""
570}
571
572// Request message for
573// [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
574type GetPublicKeyRequest struct {
575	// The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the
576	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to get.
577	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
578	XXX_NoUnkeyedLiteral struct{} `json:"-"`
579	XXX_unrecognized     []byte   `json:"-"`
580	XXX_sizecache        int32    `json:"-"`
581}
582
583func (m *GetPublicKeyRequest) Reset()         { *m = GetPublicKeyRequest{} }
584func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) }
585func (*GetPublicKeyRequest) ProtoMessage()    {}
586func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) {
587	return fileDescriptor_723aeaeb61739a25, []int{9}
588}
589
590func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error {
591	return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b)
592}
593func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
594	return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic)
595}
596func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) {
597	xxx_messageInfo_GetPublicKeyRequest.Merge(m, src)
598}
599func (m *GetPublicKeyRequest) XXX_Size() int {
600	return xxx_messageInfo_GetPublicKeyRequest.Size(m)
601}
602func (m *GetPublicKeyRequest) XXX_DiscardUnknown() {
603	xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m)
604}
605
606var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo
607
608func (m *GetPublicKeyRequest) GetName() string {
609	if m != nil {
610		return m.Name
611	}
612	return ""
613}
614
615// Request message for
616// [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing].
617type CreateKeyRingRequest struct {
618	// Required. The resource name of the location associated with the
619	// [KeyRings][google.cloud.kms.v1.KeyRing], in the format
620	// `projects/*/locations/*`.
621	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
622	// Required. It must be unique within a location and match the regular
623	// expression `[a-zA-Z0-9_-]{1,63}`
624	KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"`
625	// A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values.
626	KeyRing              *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"`
627	XXX_NoUnkeyedLiteral struct{} `json:"-"`
628	XXX_unrecognized     []byte   `json:"-"`
629	XXX_sizecache        int32    `json:"-"`
630}
631
632func (m *CreateKeyRingRequest) Reset()         { *m = CreateKeyRingRequest{} }
633func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) }
634func (*CreateKeyRingRequest) ProtoMessage()    {}
635func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) {
636	return fileDescriptor_723aeaeb61739a25, []int{10}
637}
638
639func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error {
640	return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b)
641}
642func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
643	return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic)
644}
645func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) {
646	xxx_messageInfo_CreateKeyRingRequest.Merge(m, src)
647}
648func (m *CreateKeyRingRequest) XXX_Size() int {
649	return xxx_messageInfo_CreateKeyRingRequest.Size(m)
650}
651func (m *CreateKeyRingRequest) XXX_DiscardUnknown() {
652	xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m)
653}
654
655var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo
656
657func (m *CreateKeyRingRequest) GetParent() string {
658	if m != nil {
659		return m.Parent
660	}
661	return ""
662}
663
664func (m *CreateKeyRingRequest) GetKeyRingId() string {
665	if m != nil {
666		return m.KeyRingId
667	}
668	return ""
669}
670
671func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing {
672	if m != nil {
673		return m.KeyRing
674	}
675	return nil
676}
677
678// Request message for
679// [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey].
680type CreateCryptoKeyRequest struct {
681	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing
682	// associated with the [CryptoKeys][google.cloud.kms.v1.CryptoKey].
683	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
684	// Required. It must be unique within a KeyRing and match the regular
685	// expression `[a-zA-Z0-9_-]{1,63}`
686	CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"`
687	// A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values.
688	CryptoKey            *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"`
689	XXX_NoUnkeyedLiteral struct{}   `json:"-"`
690	XXX_unrecognized     []byte     `json:"-"`
691	XXX_sizecache        int32      `json:"-"`
692}
693
694func (m *CreateCryptoKeyRequest) Reset()         { *m = CreateCryptoKeyRequest{} }
695func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
696func (*CreateCryptoKeyRequest) ProtoMessage()    {}
697func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) {
698	return fileDescriptor_723aeaeb61739a25, []int{11}
699}
700
701func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
702	return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b)
703}
704func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
705	return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic)
706}
707func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) {
708	xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src)
709}
710func (m *CreateCryptoKeyRequest) XXX_Size() int {
711	return xxx_messageInfo_CreateCryptoKeyRequest.Size(m)
712}
713func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() {
714	xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m)
715}
716
717var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo
718
719func (m *CreateCryptoKeyRequest) GetParent() string {
720	if m != nil {
721		return m.Parent
722	}
723	return ""
724}
725
726func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string {
727	if m != nil {
728		return m.CryptoKeyId
729	}
730	return ""
731}
732
733func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey {
734	if m != nil {
735		return m.CryptoKey
736	}
737	return nil
738}
739
740// Request message for
741// [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion].
742type CreateCryptoKeyVersionRequest struct {
743	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the
744	// [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with the
745	// [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
746	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
747	// A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial
748	// field values.
749	CryptoKeyVersion     *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"`
750	XXX_NoUnkeyedLiteral struct{}          `json:"-"`
751	XXX_unrecognized     []byte            `json:"-"`
752	XXX_sizecache        int32             `json:"-"`
753}
754
755func (m *CreateCryptoKeyVersionRequest) Reset()         { *m = CreateCryptoKeyVersionRequest{} }
756func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
757func (*CreateCryptoKeyVersionRequest) ProtoMessage()    {}
758func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
759	return fileDescriptor_723aeaeb61739a25, []int{12}
760}
761
762func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
763	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b)
764}
765func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
766	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic)
767}
768func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
769	xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src)
770}
771func (m *CreateCryptoKeyVersionRequest) XXX_Size() int {
772	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m)
773}
774func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() {
775	xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m)
776}
777
778var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo
779
780func (m *CreateCryptoKeyVersionRequest) GetParent() string {
781	if m != nil {
782		return m.Parent
783	}
784	return ""
785}
786
787func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion {
788	if m != nil {
789		return m.CryptoKeyVersion
790	}
791	return nil
792}
793
794// Request message for
795// [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey].
796type UpdateCryptoKeyRequest struct {
797	// [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values.
798	CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"`
799	// Required list of fields to be updated in this request.
800	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
801	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
802	XXX_unrecognized     []byte                `json:"-"`
803	XXX_sizecache        int32                 `json:"-"`
804}
805
806func (m *UpdateCryptoKeyRequest) Reset()         { *m = UpdateCryptoKeyRequest{} }
807func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
808func (*UpdateCryptoKeyRequest) ProtoMessage()    {}
809func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) {
810	return fileDescriptor_723aeaeb61739a25, []int{13}
811}
812
813func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
814	return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b)
815}
816func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
817	return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic)
818}
819func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) {
820	xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src)
821}
822func (m *UpdateCryptoKeyRequest) XXX_Size() int {
823	return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m)
824}
825func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() {
826	xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m)
827}
828
829var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo
830
831func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey {
832	if m != nil {
833		return m.CryptoKey
834	}
835	return nil
836}
837
838func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask {
839	if m != nil {
840		return m.UpdateMask
841	}
842	return nil
843}
844
845// Request message for
846// [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion].
847type UpdateCryptoKeyVersionRequest struct {
848	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated
849	// values.
850	CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"`
851	// Required list of fields to be updated in this request.
852	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
853	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
854	XXX_unrecognized     []byte                `json:"-"`
855	XXX_sizecache        int32                 `json:"-"`
856}
857
858func (m *UpdateCryptoKeyVersionRequest) Reset()         { *m = UpdateCryptoKeyVersionRequest{} }
859func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
860func (*UpdateCryptoKeyVersionRequest) ProtoMessage()    {}
861func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
862	return fileDescriptor_723aeaeb61739a25, []int{14}
863}
864
865func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
866	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b)
867}
868func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
869	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic)
870}
871func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
872	xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src)
873}
874func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int {
875	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m)
876}
877func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() {
878	xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m)
879}
880
881var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo
882
883func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion {
884	if m != nil {
885		return m.CryptoKeyVersion
886	}
887	return nil
888}
889
890func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask {
891	if m != nil {
892		return m.UpdateMask
893	}
894	return nil
895}
896
897// Request message for
898// [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
899type EncryptRequest struct {
900	// Required. The resource name of the
901	// [CryptoKey][google.cloud.kms.v1.CryptoKey] or
902	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for
903	// encryption.
904	//
905	// If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server
906	// will use its [primary version][google.cloud.kms.v1.CryptoKey.primary].
907	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
908	// Required. The data to encrypt. Must be no larger than 64KiB.
909	//
910	// The maximum size depends on the key version's
911	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level].
912	// For [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the
913	// plaintext must be no larger than 64KiB. For
914	// [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of
915	// the plaintext and additional_authenticated_data fields must be no larger
916	// than 8KiB.
917	Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
918	// Optional data that, if specified, must also be provided during decryption
919	// through
920	// [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data].
921	//
922	// The maximum size depends on the key version's
923	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level].
924	// For [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD
925	// must be no larger than 64KiB. For
926	// [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of
927	// the plaintext and additional_authenticated_data fields must be no larger
928	// than 8KiB.
929	AdditionalAuthenticatedData []byte   `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"`
930	XXX_NoUnkeyedLiteral        struct{} `json:"-"`
931	XXX_unrecognized            []byte   `json:"-"`
932	XXX_sizecache               int32    `json:"-"`
933}
934
935func (m *EncryptRequest) Reset()         { *m = EncryptRequest{} }
936func (m *EncryptRequest) String() string { return proto.CompactTextString(m) }
937func (*EncryptRequest) ProtoMessage()    {}
938func (*EncryptRequest) Descriptor() ([]byte, []int) {
939	return fileDescriptor_723aeaeb61739a25, []int{15}
940}
941
942func (m *EncryptRequest) XXX_Unmarshal(b []byte) error {
943	return xxx_messageInfo_EncryptRequest.Unmarshal(m, b)
944}
945func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
946	return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic)
947}
948func (m *EncryptRequest) XXX_Merge(src proto.Message) {
949	xxx_messageInfo_EncryptRequest.Merge(m, src)
950}
951func (m *EncryptRequest) XXX_Size() int {
952	return xxx_messageInfo_EncryptRequest.Size(m)
953}
954func (m *EncryptRequest) XXX_DiscardUnknown() {
955	xxx_messageInfo_EncryptRequest.DiscardUnknown(m)
956}
957
958var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo
959
960func (m *EncryptRequest) GetName() string {
961	if m != nil {
962		return m.Name
963	}
964	return ""
965}
966
967func (m *EncryptRequest) GetPlaintext() []byte {
968	if m != nil {
969		return m.Plaintext
970	}
971	return nil
972}
973
974func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte {
975	if m != nil {
976		return m.AdditionalAuthenticatedData
977	}
978	return nil
979}
980
981// Request message for
982// [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
983type DecryptRequest struct {
984	// Required. The resource name of the
985	// [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption. The
986	// server will choose the appropriate version.
987	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
988	// Required. The encrypted data originally returned in
989	// [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext].
990	Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
991	// Optional data that must match the data originally supplied in
992	// [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data].
993	AdditionalAuthenticatedData []byte   `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"`
994	XXX_NoUnkeyedLiteral        struct{} `json:"-"`
995	XXX_unrecognized            []byte   `json:"-"`
996	XXX_sizecache               int32    `json:"-"`
997}
998
999func (m *DecryptRequest) Reset()         { *m = DecryptRequest{} }
1000func (m *DecryptRequest) String() string { return proto.CompactTextString(m) }
1001func (*DecryptRequest) ProtoMessage()    {}
1002func (*DecryptRequest) Descriptor() ([]byte, []int) {
1003	return fileDescriptor_723aeaeb61739a25, []int{16}
1004}
1005
1006func (m *DecryptRequest) XXX_Unmarshal(b []byte) error {
1007	return xxx_messageInfo_DecryptRequest.Unmarshal(m, b)
1008}
1009func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1010	return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic)
1011}
1012func (m *DecryptRequest) XXX_Merge(src proto.Message) {
1013	xxx_messageInfo_DecryptRequest.Merge(m, src)
1014}
1015func (m *DecryptRequest) XXX_Size() int {
1016	return xxx_messageInfo_DecryptRequest.Size(m)
1017}
1018func (m *DecryptRequest) XXX_DiscardUnknown() {
1019	xxx_messageInfo_DecryptRequest.DiscardUnknown(m)
1020}
1021
1022var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo
1023
1024func (m *DecryptRequest) GetName() string {
1025	if m != nil {
1026		return m.Name
1027	}
1028	return ""
1029}
1030
1031func (m *DecryptRequest) GetCiphertext() []byte {
1032	if m != nil {
1033		return m.Ciphertext
1034	}
1035	return nil
1036}
1037
1038func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte {
1039	if m != nil {
1040		return m.AdditionalAuthenticatedData
1041	}
1042	return nil
1043}
1044
1045// Request message for
1046// [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign].
1047type AsymmetricSignRequest struct {
1048	// Required. The resource name of the
1049	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for
1050	// signing.
1051	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1052	// Required. The digest of the data to sign. The digest must be produced with
1053	// the same digest algorithm as specified by the key version's
1054	// [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
1055	Digest               *Digest  `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"`
1056	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1057	XXX_unrecognized     []byte   `json:"-"`
1058	XXX_sizecache        int32    `json:"-"`
1059}
1060
1061func (m *AsymmetricSignRequest) Reset()         { *m = AsymmetricSignRequest{} }
1062func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) }
1063func (*AsymmetricSignRequest) ProtoMessage()    {}
1064func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) {
1065	return fileDescriptor_723aeaeb61739a25, []int{17}
1066}
1067
1068func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error {
1069	return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b)
1070}
1071func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1072	return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic)
1073}
1074func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) {
1075	xxx_messageInfo_AsymmetricSignRequest.Merge(m, src)
1076}
1077func (m *AsymmetricSignRequest) XXX_Size() int {
1078	return xxx_messageInfo_AsymmetricSignRequest.Size(m)
1079}
1080func (m *AsymmetricSignRequest) XXX_DiscardUnknown() {
1081	xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m)
1082}
1083
1084var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo
1085
1086func (m *AsymmetricSignRequest) GetName() string {
1087	if m != nil {
1088		return m.Name
1089	}
1090	return ""
1091}
1092
1093func (m *AsymmetricSignRequest) GetDigest() *Digest {
1094	if m != nil {
1095		return m.Digest
1096	}
1097	return nil
1098}
1099
1100// Request message for
1101// [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt].
1102type AsymmetricDecryptRequest struct {
1103	// Required. The resource name of the
1104	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for
1105	// decryption.
1106	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1107	// Required. The data encrypted with the named
1108	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public key using
1109	// OAEP.
1110	Ciphertext           []byte   `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1111	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1112	XXX_unrecognized     []byte   `json:"-"`
1113	XXX_sizecache        int32    `json:"-"`
1114}
1115
1116func (m *AsymmetricDecryptRequest) Reset()         { *m = AsymmetricDecryptRequest{} }
1117func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) }
1118func (*AsymmetricDecryptRequest) ProtoMessage()    {}
1119func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) {
1120	return fileDescriptor_723aeaeb61739a25, []int{18}
1121}
1122
1123func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error {
1124	return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b)
1125}
1126func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1127	return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic)
1128}
1129func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) {
1130	xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src)
1131}
1132func (m *AsymmetricDecryptRequest) XXX_Size() int {
1133	return xxx_messageInfo_AsymmetricDecryptRequest.Size(m)
1134}
1135func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() {
1136	xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m)
1137}
1138
1139var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo
1140
1141func (m *AsymmetricDecryptRequest) GetName() string {
1142	if m != nil {
1143		return m.Name
1144	}
1145	return ""
1146}
1147
1148func (m *AsymmetricDecryptRequest) GetCiphertext() []byte {
1149	if m != nil {
1150		return m.Ciphertext
1151	}
1152	return nil
1153}
1154
1155// Response message for
1156// [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
1157type DecryptResponse struct {
1158	// The decrypted data originally supplied in
1159	// [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext].
1160	Plaintext            []byte   `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1161	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1162	XXX_unrecognized     []byte   `json:"-"`
1163	XXX_sizecache        int32    `json:"-"`
1164}
1165
1166func (m *DecryptResponse) Reset()         { *m = DecryptResponse{} }
1167func (m *DecryptResponse) String() string { return proto.CompactTextString(m) }
1168func (*DecryptResponse) ProtoMessage()    {}
1169func (*DecryptResponse) Descriptor() ([]byte, []int) {
1170	return fileDescriptor_723aeaeb61739a25, []int{19}
1171}
1172
1173func (m *DecryptResponse) XXX_Unmarshal(b []byte) error {
1174	return xxx_messageInfo_DecryptResponse.Unmarshal(m, b)
1175}
1176func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1177	return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic)
1178}
1179func (m *DecryptResponse) XXX_Merge(src proto.Message) {
1180	xxx_messageInfo_DecryptResponse.Merge(m, src)
1181}
1182func (m *DecryptResponse) XXX_Size() int {
1183	return xxx_messageInfo_DecryptResponse.Size(m)
1184}
1185func (m *DecryptResponse) XXX_DiscardUnknown() {
1186	xxx_messageInfo_DecryptResponse.DiscardUnknown(m)
1187}
1188
1189var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo
1190
1191func (m *DecryptResponse) GetPlaintext() []byte {
1192	if m != nil {
1193		return m.Plaintext
1194	}
1195	return nil
1196}
1197
1198// Response message for
1199// [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
1200type EncryptResponse struct {
1201	// The resource name of the
1202	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in
1203	// encryption.
1204	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1205	// The encrypted data.
1206	Ciphertext           []byte   `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1207	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1208	XXX_unrecognized     []byte   `json:"-"`
1209	XXX_sizecache        int32    `json:"-"`
1210}
1211
1212func (m *EncryptResponse) Reset()         { *m = EncryptResponse{} }
1213func (m *EncryptResponse) String() string { return proto.CompactTextString(m) }
1214func (*EncryptResponse) ProtoMessage()    {}
1215func (*EncryptResponse) Descriptor() ([]byte, []int) {
1216	return fileDescriptor_723aeaeb61739a25, []int{20}
1217}
1218
1219func (m *EncryptResponse) XXX_Unmarshal(b []byte) error {
1220	return xxx_messageInfo_EncryptResponse.Unmarshal(m, b)
1221}
1222func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1223	return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic)
1224}
1225func (m *EncryptResponse) XXX_Merge(src proto.Message) {
1226	xxx_messageInfo_EncryptResponse.Merge(m, src)
1227}
1228func (m *EncryptResponse) XXX_Size() int {
1229	return xxx_messageInfo_EncryptResponse.Size(m)
1230}
1231func (m *EncryptResponse) XXX_DiscardUnknown() {
1232	xxx_messageInfo_EncryptResponse.DiscardUnknown(m)
1233}
1234
1235var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo
1236
1237func (m *EncryptResponse) GetName() string {
1238	if m != nil {
1239		return m.Name
1240	}
1241	return ""
1242}
1243
1244func (m *EncryptResponse) GetCiphertext() []byte {
1245	if m != nil {
1246		return m.Ciphertext
1247	}
1248	return nil
1249}
1250
1251// Response message for
1252// [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign].
1253type AsymmetricSignResponse struct {
1254	// The created signature.
1255	Signature            []byte   `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"`
1256	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1257	XXX_unrecognized     []byte   `json:"-"`
1258	XXX_sizecache        int32    `json:"-"`
1259}
1260
1261func (m *AsymmetricSignResponse) Reset()         { *m = AsymmetricSignResponse{} }
1262func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) }
1263func (*AsymmetricSignResponse) ProtoMessage()    {}
1264func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) {
1265	return fileDescriptor_723aeaeb61739a25, []int{21}
1266}
1267
1268func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error {
1269	return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b)
1270}
1271func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1272	return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic)
1273}
1274func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) {
1275	xxx_messageInfo_AsymmetricSignResponse.Merge(m, src)
1276}
1277func (m *AsymmetricSignResponse) XXX_Size() int {
1278	return xxx_messageInfo_AsymmetricSignResponse.Size(m)
1279}
1280func (m *AsymmetricSignResponse) XXX_DiscardUnknown() {
1281	xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m)
1282}
1283
1284var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo
1285
1286func (m *AsymmetricSignResponse) GetSignature() []byte {
1287	if m != nil {
1288		return m.Signature
1289	}
1290	return nil
1291}
1292
1293// Response message for
1294// [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt].
1295type AsymmetricDecryptResponse struct {
1296	// The decrypted data originally encrypted with the matching public key.
1297	Plaintext            []byte   `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1298	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1299	XXX_unrecognized     []byte   `json:"-"`
1300	XXX_sizecache        int32    `json:"-"`
1301}
1302
1303func (m *AsymmetricDecryptResponse) Reset()         { *m = AsymmetricDecryptResponse{} }
1304func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) }
1305func (*AsymmetricDecryptResponse) ProtoMessage()    {}
1306func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) {
1307	return fileDescriptor_723aeaeb61739a25, []int{22}
1308}
1309
1310func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error {
1311	return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b)
1312}
1313func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1314	return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic)
1315}
1316func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) {
1317	xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src)
1318}
1319func (m *AsymmetricDecryptResponse) XXX_Size() int {
1320	return xxx_messageInfo_AsymmetricDecryptResponse.Size(m)
1321}
1322func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() {
1323	xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m)
1324}
1325
1326var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo
1327
1328func (m *AsymmetricDecryptResponse) GetPlaintext() []byte {
1329	if m != nil {
1330		return m.Plaintext
1331	}
1332	return nil
1333}
1334
1335// Request message for
1336// [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion].
1337type UpdateCryptoKeyPrimaryVersionRequest struct {
1338	// The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to
1339	// update.
1340	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1341	// The id of the child
1342	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary.
1343	CryptoKeyVersionId   string   `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"`
1344	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1345	XXX_unrecognized     []byte   `json:"-"`
1346	XXX_sizecache        int32    `json:"-"`
1347}
1348
1349func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset()         { *m = UpdateCryptoKeyPrimaryVersionRequest{} }
1350func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) }
1351func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage()    {}
1352func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) {
1353	return fileDescriptor_723aeaeb61739a25, []int{23}
1354}
1355
1356func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error {
1357	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b)
1358}
1359func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1360	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic)
1361}
1362func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) {
1363	xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src)
1364}
1365func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int {
1366	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m)
1367}
1368func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() {
1369	xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m)
1370}
1371
1372var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo
1373
1374func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string {
1375	if m != nil {
1376		return m.Name
1377	}
1378	return ""
1379}
1380
1381func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string {
1382	if m != nil {
1383		return m.CryptoKeyVersionId
1384	}
1385	return ""
1386}
1387
1388// Request message for
1389// [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion].
1390type DestroyCryptoKeyVersionRequest struct {
1391	// The resource name of the
1392	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
1393	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1394	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1395	XXX_unrecognized     []byte   `json:"-"`
1396	XXX_sizecache        int32    `json:"-"`
1397}
1398
1399func (m *DestroyCryptoKeyVersionRequest) Reset()         { *m = DestroyCryptoKeyVersionRequest{} }
1400func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1401func (*DestroyCryptoKeyVersionRequest) ProtoMessage()    {}
1402func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1403	return fileDescriptor_723aeaeb61739a25, []int{24}
1404}
1405
1406func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1407	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b)
1408}
1409func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1410	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1411}
1412func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1413	xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src)
1414}
1415func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int {
1416	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m)
1417}
1418func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1419	xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m)
1420}
1421
1422var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo
1423
1424func (m *DestroyCryptoKeyVersionRequest) GetName() string {
1425	if m != nil {
1426		return m.Name
1427	}
1428	return ""
1429}
1430
1431// Request message for
1432// [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion].
1433type RestoreCryptoKeyVersionRequest struct {
1434	// The resource name of the
1435	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
1436	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1437	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1438	XXX_unrecognized     []byte   `json:"-"`
1439	XXX_sizecache        int32    `json:"-"`
1440}
1441
1442func (m *RestoreCryptoKeyVersionRequest) Reset()         { *m = RestoreCryptoKeyVersionRequest{} }
1443func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1444func (*RestoreCryptoKeyVersionRequest) ProtoMessage()    {}
1445func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1446	return fileDescriptor_723aeaeb61739a25, []int{25}
1447}
1448
1449func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1450	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b)
1451}
1452func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1453	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1454}
1455func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1456	xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src)
1457}
1458func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int {
1459	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m)
1460}
1461func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1462	xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m)
1463}
1464
1465var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo
1466
1467func (m *RestoreCryptoKeyVersionRequest) GetName() string {
1468	if m != nil {
1469		return m.Name
1470	}
1471	return ""
1472}
1473
1474// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest.
1475type Digest struct {
1476	// Required. The message digest.
1477	//
1478	// Types that are valid to be assigned to Digest:
1479	//	*Digest_Sha256
1480	//	*Digest_Sha384
1481	//	*Digest_Sha512
1482	Digest               isDigest_Digest `protobuf_oneof:"digest"`
1483	XXX_NoUnkeyedLiteral struct{}        `json:"-"`
1484	XXX_unrecognized     []byte          `json:"-"`
1485	XXX_sizecache        int32           `json:"-"`
1486}
1487
1488func (m *Digest) Reset()         { *m = Digest{} }
1489func (m *Digest) String() string { return proto.CompactTextString(m) }
1490func (*Digest) ProtoMessage()    {}
1491func (*Digest) Descriptor() ([]byte, []int) {
1492	return fileDescriptor_723aeaeb61739a25, []int{26}
1493}
1494
1495func (m *Digest) XXX_Unmarshal(b []byte) error {
1496	return xxx_messageInfo_Digest.Unmarshal(m, b)
1497}
1498func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1499	return xxx_messageInfo_Digest.Marshal(b, m, deterministic)
1500}
1501func (m *Digest) XXX_Merge(src proto.Message) {
1502	xxx_messageInfo_Digest.Merge(m, src)
1503}
1504func (m *Digest) XXX_Size() int {
1505	return xxx_messageInfo_Digest.Size(m)
1506}
1507func (m *Digest) XXX_DiscardUnknown() {
1508	xxx_messageInfo_Digest.DiscardUnknown(m)
1509}
1510
1511var xxx_messageInfo_Digest proto.InternalMessageInfo
1512
1513type isDigest_Digest interface {
1514	isDigest_Digest()
1515}
1516
1517type Digest_Sha256 struct {
1518	Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"`
1519}
1520
1521type Digest_Sha384 struct {
1522	Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"`
1523}
1524
1525type Digest_Sha512 struct {
1526	Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"`
1527}
1528
1529func (*Digest_Sha256) isDigest_Digest() {}
1530
1531func (*Digest_Sha384) isDigest_Digest() {}
1532
1533func (*Digest_Sha512) isDigest_Digest() {}
1534
1535func (m *Digest) GetDigest() isDigest_Digest {
1536	if m != nil {
1537		return m.Digest
1538	}
1539	return nil
1540}
1541
1542func (m *Digest) GetSha256() []byte {
1543	if x, ok := m.GetDigest().(*Digest_Sha256); ok {
1544		return x.Sha256
1545	}
1546	return nil
1547}
1548
1549func (m *Digest) GetSha384() []byte {
1550	if x, ok := m.GetDigest().(*Digest_Sha384); ok {
1551		return x.Sha384
1552	}
1553	return nil
1554}
1555
1556func (m *Digest) GetSha512() []byte {
1557	if x, ok := m.GetDigest().(*Digest_Sha512); ok {
1558		return x.Sha512
1559	}
1560	return nil
1561}
1562
1563// XXX_OneofWrappers is for the internal use of the proto package.
1564func (*Digest) XXX_OneofWrappers() []interface{} {
1565	return []interface{}{
1566		(*Digest_Sha256)(nil),
1567		(*Digest_Sha384)(nil),
1568		(*Digest_Sha512)(nil),
1569	}
1570}
1571
1572// Cloud KMS metadata for the given
1573// [google.cloud.location.Location][google.cloud.location.Location].
1574type LocationMetadata struct {
1575	// Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with
1576	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]
1577	// [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this
1578	// location.
1579	HsmAvailable         bool     `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"`
1580	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1581	XXX_unrecognized     []byte   `json:"-"`
1582	XXX_sizecache        int32    `json:"-"`
1583}
1584
1585func (m *LocationMetadata) Reset()         { *m = LocationMetadata{} }
1586func (m *LocationMetadata) String() string { return proto.CompactTextString(m) }
1587func (*LocationMetadata) ProtoMessage()    {}
1588func (*LocationMetadata) Descriptor() ([]byte, []int) {
1589	return fileDescriptor_723aeaeb61739a25, []int{27}
1590}
1591
1592func (m *LocationMetadata) XXX_Unmarshal(b []byte) error {
1593	return xxx_messageInfo_LocationMetadata.Unmarshal(m, b)
1594}
1595func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1596	return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic)
1597}
1598func (m *LocationMetadata) XXX_Merge(src proto.Message) {
1599	xxx_messageInfo_LocationMetadata.Merge(m, src)
1600}
1601func (m *LocationMetadata) XXX_Size() int {
1602	return xxx_messageInfo_LocationMetadata.Size(m)
1603}
1604func (m *LocationMetadata) XXX_DiscardUnknown() {
1605	xxx_messageInfo_LocationMetadata.DiscardUnknown(m)
1606}
1607
1608var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo
1609
1610func (m *LocationMetadata) GetHsmAvailable() bool {
1611	if m != nil {
1612		return m.HsmAvailable
1613	}
1614	return false
1615}
1616
1617func init() {
1618	proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest")
1619	proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest")
1620	proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest")
1621	proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse")
1622	proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse")
1623	proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse")
1624	proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest")
1625	proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest")
1626	proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest")
1627	proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest")
1628	proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest")
1629	proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest")
1630	proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest")
1631	proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest")
1632	proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest")
1633	proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest")
1634	proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest")
1635	proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest")
1636	proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest")
1637	proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse")
1638	proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse")
1639	proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse")
1640	proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse")
1641	proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest")
1642	proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest")
1643	proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest")
1644	proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest")
1645	proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata")
1646}
1647
1648func init() { proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25) }
1649
1650var fileDescriptor_723aeaeb61739a25 = []byte{
1651	// 1666 bytes of a gzipped FileDescriptorProto
1652	0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xc4, 0x59, 0xcd, 0x73, 0x1b, 0xc5,
1653	0x12, 0x7f, 0x63, 0xe7, 0x39, 0x76, 0xfb, 0x2b, 0x19, 0x27, 0x8e, 0x9f, 0x62, 0xbb, 0xfc, 0x26,
1654	0x79, 0x79, 0x8e, 0x03, 0x12, 0x92, 0x9d, 0x0f, 0x2b, 0x15, 0x28, 0x3b, 0x4e, 0x4c, 0xca, 0x71,
1655	0x70, 0xad, 0xb1, 0x21, 0x29, 0x53, 0xf2, 0x58, 0x3b, 0x91, 0x37, 0xd2, 0xee, 0x8a, 0xdd, 0x95,
1656	0x12, 0x05, 0x72, 0xe1, 0x00, 0x39, 0xe4, 0x16, 0x0e, 0xa1, 0xb8, 0x50, 0x70, 0xa3, 0xe0, 0xc0,
1657	0x0d, 0x0e, 0x5c, 0x28, 0x4e, 0xa9, 0xe2, 0x02, 0x95, 0xe2, 0x96, 0x13, 0xff, 0x00, 0x37, 0x8e,
1658	0xd4, 0xce, 0xce, 0xae, 0xb4, 0xab, 0x5d, 0x7d, 0x45, 0x29, 0x6e, 0xde, 0x99, 0x9e, 0x9e, 0xdf,
1659	0xaf, 0xfb, 0x37, 0x33, 0xdd, 0x32, 0xfc, 0x37, 0xa7, 0xeb, 0xb9, 0x02, 0x4b, 0x64, 0x0b, 0x7a,
1660	0x49, 0x4e, 0xe4, 0x55, 0x33, 0x51, 0x4e, 0x26, 0x4c, 0x66, 0x94, 0x95, 0x2c, 0x8b, 0x17, 0x0d,
1661	0xdd, 0xd2, 0xf1, 0x98, 0x63, 0x12, 0xe7, 0x26, 0xf1, 0xbc, 0x6a, 0xc6, 0xcb, 0xc9, 0xd8, 0xa4,
1662	0x58, 0x47, 0x8b, 0x4a, 0x82, 0x6a, 0x9a, 0x6e, 0x51, 0x4b, 0xd1, 0x35, 0xd3, 0x59, 0x12, 0x3b,
1663	0x11, 0xe6, 0xd5, 0x60, 0xa6, 0x5e, 0x32, 0xb2, 0xcc, 0x35, 0x9a, 0x11, 0x46, 0xfc, 0x6b, 0xaf,
1664	0x74, 0x3b, 0x71, 0x5b, 0x61, 0x05, 0x39, 0xa3, 0x52, 0x33, 0x2f, 0x2c, 0x26, 0x83, 0x16, 0xa6,
1665	0x65, 0x94, 0xb2, 0x96, 0x98, 0x9d, 0x0e, 0xce, 0xde, 0x35, 0x68, 0xb1, 0xc8, 0x0c, 0xe1, 0x9f,
1666	0x28, 0x30, 0x76, 0x5d, 0x31, 0xad, 0x35, 0x56, 0x91, 0x14, 0x2d, 0x67, 0x4a, 0xec, 0xfd, 0x12,
1667	0x33, 0x2d, 0x3c, 0x0e, 0x7d, 0x45, 0x6a, 0x30, 0xcd, 0x9a, 0x40, 0x33, 0x68, 0x76, 0x40, 0x12,
1668	0x5f, 0xf8, 0x38, 0x0c, 0x14, 0x69, 0x8e, 0x65, 0x4c, 0xe5, 0x3e, 0x9b, 0xe8, 0x99, 0x41, 0xb3,
1669	0xff, 0x96, 0xfa, 0xed, 0x81, 0x4d, 0xe5, 0x3e, 0xc3, 0x53, 0x00, 0x7c, 0xd2, 0xd2, 0xf3, 0x4c,
1670	0x9b, 0xe8, 0xe5, 0x0b, 0xb9, 0xf9, 0xdb, 0xf6, 0x00, 0x79, 0x8a, 0xe0, 0xa8, 0xbd, 0xd7, 0x65,
1671	0xa3, 0x52, 0xb4, 0xf4, 0x35, 0x56, 0x79, 0x99, 0xbb, 0xe1, 0xf7, 0x60, 0xa8, 0xcc, 0x0c, 0x53,
1672	0xd1, 0xb5, 0x4c, 0x59, 0x61, 0x77, 0x27, 0x0e, 0xcc, 0xa0, 0xd9, 0x91, 0x54, 0x3a, 0x1e, 0x92,
1673	0xa7, 0xb8, 0x87, 0x68, 0xdb, 0x59, 0x51, 0x37, 0xb0, 0xad, 0xb0, 0xbb, 0xd2, 0x60, 0xb9, 0xfa,
1674	0x41, 0x7e, 0x42, 0x30, 0xe9, 0x23, 0x23, 0x2c, 0x5f, 0x2a, 0xa7, 0x1b, 0x70, 0xa0, 0x4b, 0x5c,
1675	0xb8, 0x1f, 0xf2, 0x04, 0xc1, 0x11, 0x7f, 0xf6, 0xcd, 0xa2, 0xae, 0x99, 0x0c, 0x2f, 0xc2, 0x40,
1676	0x9e, 0x55, 0x32, 0x86, 0x3d, 0x38, 0x81, 0x66, 0x7a, 0x67, 0x07, 0x53, 0x93, 0xa1, 0xbb, 0x89,
1677	0x95, 0x52, 0x7f, 0x5e, 0xb8, 0xc0, 0xa7, 0x60, 0x54, 0x63, 0xf7, 0xac, 0x4c, 0x0d, 0x8f, 0x1e,
1678	0xce, 0x63, 0xd8, 0x1e, 0xde, 0xf0, 0xb8, 0x4c, 0x01, 0x58, 0xba, 0x45, 0x0b, 0x4e, 0x20, 0x7a,
1679	0x79, 0x20, 0x06, 0xf8, 0x88, 0x1d, 0x09, 0xf2, 0x05, 0x82, 0xf1, 0xa0, 0x58, 0x04, 0xb8, 0x37,
1680	0x60, 0x30, 0xcb, 0x47, 0x33, 0x79, 0x56, 0x71, 0xe1, 0x4d, 0x37, 0x0e, 0x86, 0x04, 0x59, 0xcf,
1681	0x51, 0xb7, 0x20, 0xfe, 0x88, 0x60, 0x2a, 0x42, 0x02, 0x02, 0xe9, 0x16, 0x8c, 0x55, 0x91, 0x66,
1682	0x84, 0x7c, 0x5c, 0xc4, 0xff, 0x6b, 0x29, 0x7d, 0xd2, 0xe1, 0x6c, 0xd0, 0x7d, 0xb7, 0xf0, 0xff,
1683	0x1f, 0x0e, 0xaf, 0x32, 0x37, 0xf7, 0xae, 0x6c, 0x31, 0x1c, 0xd0, 0xa8, 0xca, 0x84, 0x68, 0xf9,
1684	0xdf, 0xe4, 0x34, 0x8c, 0xad, 0xb2, 0x2a, 0xcd, 0x46, 0xa6, 0xaf, 0x41, 0xac, 0xd6, 0xd4, 0x25,
1685	0xd1, 0xd4, 0xf9, 0x46, 0x69, 0xaf, 0xa0, 0x64, 0x9b, 0x38, 0xff, 0x04, 0xc1, 0x91, 0xcb, 0x06,
1686	0xa3, 0x16, 0x0b, 0x80, 0x8e, 0x3a, 0x6b, 0xd3, 0x30, 0xe8, 0xca, 0x38, 0xa3, 0xc8, 0x22, 0x48,
1687	0x03, 0x42, 0xaa, 0xd7, 0x64, 0x7c, 0x1e, 0xfa, 0xdd, 0x79, 0x1e, 0x9e, 0x66, 0x2a, 0x3f, 0x28,
1688	0x96, 0x92, 0xc7, 0x08, 0xc6, 0x1d, 0x24, 0x75, 0x51, 0x89, 0xc2, 0x42, 0x60, 0xb8, 0x46, 0x0b,
1689	0x1e, 0x9a, 0x41, 0x2f, 0xbd, 0xd7, 0x64, 0x7c, 0x09, 0xa0, 0x6a, 0x23, 0x10, 0x35, 0x13, 0xf6,
1690	0x80, 0xe7, 0x80, 0x3c, 0x42, 0x30, 0x15, 0x40, 0x15, 0x48, 0x40, 0x14, 0xb8, 0x4d, 0xc0, 0xf5,
1691	0x42, 0xe5, 0x08, 0x5b, 0xd6, 0xe9, 0xa1, 0xa0, 0x4e, 0xc9, 0xa7, 0x08, 0xc6, 0xb7, 0x8a, 0x72,
1692	0x58, 0x90, 0xfc, 0x44, 0x51, 0x9b, 0x44, 0xf1, 0x45, 0x18, 0x2c, 0x71, 0xc7, 0xfc, 0x1d, 0x14,
1693	0x38, 0x63, 0xee, 0x7a, 0xf7, 0xa9, 0x8b, 0x5f, 0xb5, 0x9f, 0xca, 0x75, 0x6a, 0xe6, 0x25, 0x70,
1694	0xcc, 0xed, 0xbf, 0xc9, 0x77, 0x08, 0xa6, 0x02, 0xb0, 0x02, 0x51, 0x0a, 0x8f, 0x06, 0x7a, 0xa1,
1695	0x68, 0xbc, 0x18, 0xe6, 0x8f, 0x11, 0x8c, 0x5c, 0xd1, 0xb8, 0xcf, 0x06, 0x07, 0x04, 0x4f, 0xc2,
1696	0x40, 0xb1, 0x40, 0x15, 0xcd, 0x62, 0xf7, 0x2c, 0xbe, 0xc3, 0x90, 0x54, 0x1d, 0xc0, 0xcb, 0x30,
1697	0x45, 0x65, 0x59, 0xb1, 0x4b, 0x10, 0x5a, 0xc8, 0xd0, 0x92, 0xb5, 0xcf, 0x34, 0x4b, 0xc9, 0x52,
1698	0x8b, 0xc9, 0x19, 0x99, 0x5a, 0x94, 0x0b, 0x6e, 0x48, 0x3a, 0x5e, 0x35, 0x5a, 0xaa, 0xb5, 0x59,
1699	0xa1, 0x16, 0x25, 0x0f, 0x11, 0x8c, 0xac, 0xb0, 0xa6, 0x40, 0xa6, 0x01, 0xb2, 0x4a, 0x71, 0x9f,
1700	0x19, 0x35, 0x48, 0x6a, 0x46, 0xba, 0x02, 0x65, 0x17, 0x8e, 0x2e, 0x99, 0x15, 0x55, 0x65, 0x96,
1701	0xa1, 0x64, 0x37, 0x95, 0x5c, 0xa3, 0x5b, 0x06, 0xcf, 0x43, 0x9f, 0xac, 0xe4, 0x98, 0x69, 0x89,
1702	0x53, 0x75, 0x3c, 0x34, 0x8d, 0x2b, 0xdc, 0x44, 0x12, 0xa6, 0xe4, 0x06, 0x4c, 0x54, 0x77, 0x68,
1703	0x9b, 0x75, 0x6f, 0x90, 0x35, 0x49, 0xc0, 0xa8, 0xe7, 0x45, 0xbc, 0x10, 0xbe, 0x8c, 0xa1, 0x40,
1704	0xc6, 0xc8, 0x15, 0x18, 0xf5, 0xb2, 0x2e, 0x16, 0x74, 0x10, 0x6d, 0x72, 0x0e, 0xc6, 0x83, 0x91,
1705	0xaa, 0x6e, 0x6f, 0x2a, 0x39, 0x8d, 0x5a, 0x25, 0x83, 0xb9, 0xdb, 0x7b, 0x03, 0x64, 0x11, 0xfe,
1706	0x13, 0xc2, 0xbf, 0x25, 0xe4, 0x2a, 0x9c, 0x0c, 0x9c, 0xb1, 0x0d, 0x43, 0x51, 0xa9, 0xd1, 0xc2,
1707	0x8b, 0x80, 0x93, 0x70, 0xb4, 0xfe, 0xf8, 0x55, 0x6f, 0x4c, 0x1c, 0x3c, 0x5a, 0xd7, 0x64, 0xb2,
1708	0x00, 0xd3, 0x2b, 0xcc, 0xb4, 0x0c, 0xbd, 0xd2, 0xce, 0xd3, 0xb3, 0x00, 0xd3, 0x12, 0x33, 0x2d,
1709	0xdd, 0x60, 0xed, 0xac, 0xda, 0x85, 0x3e, 0x47, 0x27, 0x78, 0x02, 0xfa, 0xcc, 0x7d, 0x9a, 0x3a,
1710	0x7b, 0xce, 0xe1, 0xff, 0xe6, 0xbf, 0x24, 0xf1, 0x2d, 0x66, 0xe6, 0x2f, 0x2c, 0x38, 0xd9, 0x10,
1711	0x33, 0xf3, 0x17, 0x16, 0xc4, 0xcc, 0xd9, 0x64, 0xca, 0xd1, 0x87, 0x98, 0x39, 0x9b, 0x4c, 0x2d,
1712	0xf7, 0xbb, 0x12, 0x25, 0xe7, 0xe1, 0xd0, 0x75, 0x3d, 0xcb, 0x7b, 0x85, 0x75, 0x66, 0x51, 0xfb,
1713	0x40, 0xe0, 0x13, 0x30, 0xbc, 0x6f, 0xaa, 0x19, 0x5a, 0xa6, 0x4a, 0x81, 0xee, 0x15, 0x1c, 0x48,
1714	0xfd, 0xd2, 0xd0, 0xbe, 0xa9, 0x2e, 0xb9, 0x63, 0xa9, 0x5f, 0x26, 0xe1, 0xc8, 0x1a, 0xab, 0xac,
1715	0x53, 0x8d, 0xe6, 0x98, 0xca, 0x34, 0x6b, 0xd3, 0xe9, 0x51, 0xf0, 0x67, 0x08, 0x86, 0x6a, 0x0b,
1716	0x3d, 0x3c, 0x1b, 0xaa, 0xff, 0x90, 0x4e, 0x20, 0x76, 0xba, 0x05, 0x4b, 0x47, 0x12, 0x64, 0xe1,
1717	0xa3, 0xdf, 0xfe, 0x78, 0xdc, 0x13, 0xc7, 0xaf, 0xd8, 0x8d, 0xcc, 0x07, 0xce, 0xd3, 0x72, 0xa9,
1718	0x68, 0xe8, 0x77, 0x58, 0xd6, 0x32, 0x13, 0x73, 0x89, 0x82, 0x20, 0x65, 0x26, 0xe6, 0x1e, 0x24,
1719	0xbc, 0x82, 0xf1, 0x1b, 0x04, 0x23, 0xfe, 0x4a, 0x0f, 0xcf, 0x45, 0xee, 0x59, 0xd7, 0x3b, 0xc4,
1720	0xce, 0xb4, 0x64, 0x2b, 0x10, 0x2e, 0x71, 0x84, 0x17, 0xf1, 0x62, 0x73, 0x84, 0x1e, 0x40, 0x1b,
1721	0x6c, 0x4d, 0xf1, 0xf8, 0x2c, 0xd8, 0xc5, 0x78, 0x65, 0x59, 0xb2, 0x39, 0x92, 0x40, 0x93, 0x10,
1722	0x4b, 0xb5, 0xb3, 0x44, 0x70, 0xd8, 0xe2, 0x1c, 0xde, 0xc2, 0xeb, 0x6d, 0x71, 0xa8, 0xa1, 0xe0,
1723	0x23, 0xe4, 0xa1, 0x7f, 0x88, 0x00, 0xaa, 0xe5, 0x20, 0x3e, 0x15, 0x8a, 0xac, 0xae, 0x5e, 0x8c,
1724	0x35, 0x2c, 0x98, 0x02, 0x8a, 0xb0, 0x8f, 0x4f, 0x0b, 0xd1, 0xc6, 0x9f, 0x23, 0x18, 0xaa, 0xad,
1725	0x22, 0x23, 0xd4, 0x1a, 0x52, 0x93, 0xc6, 0x9a, 0x14, 0x11, 0x01, 0x01, 0xb4, 0x06, 0xc8, 0x1f,
1726	0x3a, 0xfc, 0x33, 0xf2, 0x97, 0xc3, 0xee, 0x03, 0x9f, 0x68, 0x0a, 0xd2, 0x7f, 0xb9, 0xc4, 0x5a,
1727	0x2b, 0x25, 0x02, 0xf9, 0xee, 0x00, 0x72, 0x7d, 0xb2, 0x6d, 0x1a, 0x3f, 0x38, 0x41, 0xf6, 0x0a,
1728	0xef, 0xe8, 0x20, 0x07, 0x6b, 0xf3, 0x88, 0x20, 0x7b, 0x66, 0x24, 0xc3, 0x11, 0xdf, 0xc4, 0xef,
1729	0x74, 0x15, 0x71, 0xa2, 0xe8, 0x41, 0x7d, 0x82, 0x60, 0xd8, 0xd7, 0x08, 0xe0, 0xd3, 0x11, 0xb1,
1730	0xac, 0x6f, 0x16, 0x9a, 0x28, 0xf6, 0x75, 0x8e, 0xfd, 0x02, 0x69, 0xeb, 0x0e, 0x4b, 0x7b, 0x6d,
1731	0x04, 0xfe, 0x16, 0xc1, 0x68, 0xa0, 0x06, 0xc7, 0x67, 0x1a, 0x80, 0x6b, 0x5b, 0xc1, 0xeb, 0x1c,
1732	0xe0, 0x2a, 0xe9, 0xfc, 0x0a, 0x4b, 0xd7, 0xd4, 0xde, 0xf8, 0x79, 0x7d, 0x27, 0xe3, 0x0a, 0x3a,
1733	0xd5, 0x0a, 0xec, 0xce, 0x34, 0xad, 0x70, 0x12, 0x59, 0xd2, 0xdd, 0x3b, 0x2c, 0x1d, 0x52, 0xb6,
1734	0xe3, 0xef, 0x11, 0x8c, 0x06, 0x4a, 0x91, 0x88, 0x84, 0x84, 0xf7, 0x2a, 0x4d, 0x13, 0xf2, 0x2e,
1735	0xe7, 0x22, 0xa5, 0x56, 0x38, 0x97, 0x2a, 0x82, 0x78, 0x27, 0xb7, 0x8b, 0x2f, 0x37, 0x7f, 0xd6,
1736	0x37, 0x50, 0x8d, 0x73, 0xd3, 0xb0, 0xad, 0x69, 0x35, 0x37, 0x1f, 0x72, 0x3e, 0xe5, 0xd4, 0x6e,
1737	0x80, 0x8f, 0x1b, 0xd1, 0x78, 0xb7, 0x0e, 0x74, 0x68, 0xba, 0xbe, 0x42, 0x70, 0x50, 0xd4, 0xbc,
1738	0xf8, 0x44, 0x28, 0x60, 0x7f, 0x1f, 0x14, 0x3b, 0xd9, 0xd8, 0x48, 0x3c, 0x9a, 0xee, 0xa9, 0x59,
1739	0xee, 0xf4, 0x4a, 0x9a, 0x7b, 0x90, 0x66, 0x8e, 0xcf, 0x34, 0x9a, 0xc3, 0x5f, 0x22, 0x38, 0x28,
1740	0x0a, 0xe2, 0x08, 0x94, 0xfe, 0x76, 0x21, 0x02, 0x65, 0xa0, 0xa6, 0x26, 0xd7, 0x39, 0xca, 0xab,
1741	0x64, 0xa9, 0xe3, 0xd7, 0x29, 0x2d, 0x33, 0x0f, 0xe4, 0xaf, 0x08, 0x46, 0xfc, 0x75, 0x7f, 0x44,
1742	0x61, 0x15, 0xda, 0x46, 0x45, 0x14, 0x56, 0xe1, 0x8d, 0x04, 0xc9, 0x71, 0xe4, 0x94, 0xec, 0x74,
1743	0xf5, 0xca, 0x4f, 0x53, 0xdf, 0x6e, 0x36, 0xa9, 0xe7, 0x08, 0x0e, 0xd7, 0x35, 0x25, 0xf8, 0xd5,
1744	0x26, 0x58, 0x03, 0xd9, 0x88, 0xb7, 0x6a, 0x2e, 0xd8, 0xdd, 0xe1, 0xec, 0x64, 0x92, 0x79, 0x59,
1745	0xec, 0x56, 0xaa, 0x59, 0x7b, 0x56, 0xff, 0xf3, 0x84, 0xbf, 0x75, 0xc2, 0x8b, 0xad, 0x9c, 0xfd,
1746	0xd0, 0x76, 0xab, 0xe9, 0x5d, 0x76, 0x93, 0x13, 0xdd, 0x24, 0x37, 0x3a, 0x17, 0xa0, 0xf3, 0xab,
1747	0x85, 0x7f, 0x7b, 0x9b, 0xd7, 0xef, 0x08, 0x8e, 0x45, 0xf4, 0x68, 0x78, 0x3e, 0xe2, 0x74, 0x34,
1748	0xea, 0xe8, 0x5a, 0xbd, 0xce, 0x76, 0x39, 0xa5, 0x5b, 0x64, 0xab, 0xbb, 0xb9, 0x93, 0x1d, 0x70,
1749	0x2e, 0xb3, 0x88, 0x3e, 0x32, 0x82, 0x59, 0xe3, 0xae, 0xf3, 0x1f, 0x66, 0x66, 0x38, 0xe0, 0xd2,
1750	0x68, 0x6e, 0xf9, 0x11, 0x82, 0x63, 0x59, 0x5d, 0x0d, 0x83, 0xb3, 0xdc, 0xbf, 0xa6, 0x9a, 0x1b,
1751	0x86, 0x6e, 0xe9, 0x1b, 0xe8, 0xd6, 0x39, 0x61, 0x90, 0xd3, 0x0b, 0x54, 0xcb, 0xc5, 0x75, 0x23,
1752	0x97, 0xc8, 0x31, 0x8d, 0xff, 0xa6, 0x95, 0x70, 0xa6, 0x68, 0x51, 0x31, 0x7d, 0xff, 0xe8, 0xba,
1753	0x98, 0x57, 0xcd, 0xbf, 0x10, 0xfa, 0xba, 0x67, 0x6c, 0xd5, 0x59, 0x7b, 0x99, 0x3b, 0x5f, 0x53,
1754	0xcd, 0xf8, 0x76, 0xf2, 0xa9, 0x3b, 0xba, 0xc3, 0x47, 0x77, 0xd6, 0x54, 0x73, 0x67, 0x3b, 0xb9,
1755	0xd7, 0xc7, 0x3d, 0xce, 0xff, 0x1d, 0x00, 0x00, 0xff, 0xff, 0xac, 0x72, 0x95, 0x44, 0x8f, 0x1b,
1756	0x00, 0x00,
1757}
1758
1759// Reference imports to suppress errors if they are not otherwise used.
1760var _ context.Context
1761var _ grpc.ClientConn
1762
1763// This is a compile-time assertion to ensure that this generated file
1764// is compatible with the grpc package it is being compiled against.
1765const _ = grpc.SupportPackageIsVersion4
1766
1767// KeyManagementServiceClient is the client API for KeyManagementService service.
1768//
1769// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
1770type KeyManagementServiceClient interface {
1771	// Lists [KeyRings][google.cloud.kms.v1.KeyRing].
1772	ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error)
1773	// Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
1774	ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error)
1775	// Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
1776	ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error)
1777	// Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
1778	GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error)
1779	// Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as
1780	// well as its [primary][google.cloud.kms.v1.CryptoKey.primary]
1781	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
1782	GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
1783	// Returns metadata for a given
1784	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
1785	GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
1786	// Returns the public key for the given
1787	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
1788	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
1789	// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN]
1790	// or
1791	// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
1792	GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error)
1793	// Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and
1794	// Location.
1795	CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error)
1796	// Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a
1797	// [KeyRing][google.cloud.kms.v1.KeyRing].
1798	//
1799	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
1800	// [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
1801	// are required.
1802	CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
1803	// Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a
1804	// [CryptoKey][google.cloud.kms.v1.CryptoKey].
1805	//
1806	// The server will assign the next sequential id. If unset,
1807	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
1808	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
1809	CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
1810	// Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
1811	UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
1812	// Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s
1813	// metadata.
1814	//
1815	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
1816	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]
1817	// and
1818	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED]
1819	// using this method. See
1820	// [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]
1821	// and
1822	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
1823	// to move between other states.
1824	UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
1825	// Encrypts data, so that it can only be recovered by a call to
1826	// [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The
1827	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
1828	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
1829	Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error)
1830	// Decrypts data that was protected by
1831	// [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The
1832	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
1833	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
1834	Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error)
1835	// Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
1836	// with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
1837	// ASYMMETRIC_SIGN, producing a signature that can be verified with the public
1838	// key retrieved from
1839	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
1840	AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error)
1841	// Decrypts data that was encrypted with a public key retrieved from
1842	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]
1843	// corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
1844	// with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
1845	// ASYMMETRIC_DECRYPT.
1846	AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error)
1847	// Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that
1848	// will be used in
1849	// [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
1850	//
1851	// Returns an error if called on an asymmetric key.
1852	UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error)
1853	// Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for
1854	// destruction.
1855	//
1856	// Upon calling this method,
1857	// [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will
1858	// be set to
1859	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
1860	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will
1861	// be set to a time 24 hours in the future, at which point the
1862	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be changed to
1863	// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED],
1864	// and the key material will be irrevocably destroyed.
1865	//
1866	// Before the
1867	// [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is
1868	// reached,
1869	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
1870	// may be called to reverse the process.
1871	DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
1872	// Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
1873	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
1874	// state.
1875	//
1876	// Upon restoration of the CryptoKeyVersion,
1877	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
1878	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
1879	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will
1880	// be cleared.
1881	RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
1882}
1883
1884type keyManagementServiceClient struct {
1885	cc *grpc.ClientConn
1886}
1887
1888func NewKeyManagementServiceClient(cc *grpc.ClientConn) KeyManagementServiceClient {
1889	return &keyManagementServiceClient{cc}
1890}
1891
1892func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) {
1893	out := new(ListKeyRingsResponse)
1894	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...)
1895	if err != nil {
1896		return nil, err
1897	}
1898	return out, nil
1899}
1900
1901func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) {
1902	out := new(ListCryptoKeysResponse)
1903	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...)
1904	if err != nil {
1905		return nil, err
1906	}
1907	return out, nil
1908}
1909
1910func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) {
1911	out := new(ListCryptoKeyVersionsResponse)
1912	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...)
1913	if err != nil {
1914		return nil, err
1915	}
1916	return out, nil
1917}
1918
1919func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) {
1920	out := new(KeyRing)
1921	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...)
1922	if err != nil {
1923		return nil, err
1924	}
1925	return out, nil
1926}
1927
1928func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
1929	out := new(CryptoKey)
1930	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...)
1931	if err != nil {
1932		return nil, err
1933	}
1934	return out, nil
1935}
1936
1937func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
1938	out := new(CryptoKeyVersion)
1939	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...)
1940	if err != nil {
1941		return nil, err
1942	}
1943	return out, nil
1944}
1945
1946func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) {
1947	out := new(PublicKey)
1948	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...)
1949	if err != nil {
1950		return nil, err
1951	}
1952	return out, nil
1953}
1954
1955func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) {
1956	out := new(KeyRing)
1957	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...)
1958	if err != nil {
1959		return nil, err
1960	}
1961	return out, nil
1962}
1963
1964func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
1965	out := new(CryptoKey)
1966	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...)
1967	if err != nil {
1968		return nil, err
1969	}
1970	return out, nil
1971}
1972
1973func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
1974	out := new(CryptoKeyVersion)
1975	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...)
1976	if err != nil {
1977		return nil, err
1978	}
1979	return out, nil
1980}
1981
1982func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
1983	out := new(CryptoKey)
1984	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...)
1985	if err != nil {
1986		return nil, err
1987	}
1988	return out, nil
1989}
1990
1991func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
1992	out := new(CryptoKeyVersion)
1993	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...)
1994	if err != nil {
1995		return nil, err
1996	}
1997	return out, nil
1998}
1999
2000func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) {
2001	out := new(EncryptResponse)
2002	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...)
2003	if err != nil {
2004		return nil, err
2005	}
2006	return out, nil
2007}
2008
2009func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) {
2010	out := new(DecryptResponse)
2011	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...)
2012	if err != nil {
2013		return nil, err
2014	}
2015	return out, nil
2016}
2017
2018func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) {
2019	out := new(AsymmetricSignResponse)
2020	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...)
2021	if err != nil {
2022		return nil, err
2023	}
2024	return out, nil
2025}
2026
2027func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) {
2028	out := new(AsymmetricDecryptResponse)
2029	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...)
2030	if err != nil {
2031		return nil, err
2032	}
2033	return out, nil
2034}
2035
2036func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2037	out := new(CryptoKey)
2038	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...)
2039	if err != nil {
2040		return nil, err
2041	}
2042	return out, nil
2043}
2044
2045func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2046	out := new(CryptoKeyVersion)
2047	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...)
2048	if err != nil {
2049		return nil, err
2050	}
2051	return out, nil
2052}
2053
2054func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2055	out := new(CryptoKeyVersion)
2056	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...)
2057	if err != nil {
2058		return nil, err
2059	}
2060	return out, nil
2061}
2062
2063// KeyManagementServiceServer is the server API for KeyManagementService service.
2064type KeyManagementServiceServer interface {
2065	// Lists [KeyRings][google.cloud.kms.v1.KeyRing].
2066	ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error)
2067	// Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
2068	ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error)
2069	// Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
2070	ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error)
2071	// Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
2072	GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error)
2073	// Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as
2074	// well as its [primary][google.cloud.kms.v1.CryptoKey.primary]
2075	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2076	GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error)
2077	// Returns metadata for a given
2078	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2079	GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2080	// Returns the public key for the given
2081	// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
2082	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2083	// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN]
2084	// or
2085	// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
2086	GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error)
2087	// Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and
2088	// Location.
2089	CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error)
2090	// Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a
2091	// [KeyRing][google.cloud.kms.v1.KeyRing].
2092	//
2093	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
2094	// [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
2095	// are required.
2096	CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error)
2097	// Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a
2098	// [CryptoKey][google.cloud.kms.v1.CryptoKey].
2099	//
2100	// The server will assign the next sequential id. If unset,
2101	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2102	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
2103	CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2104	// Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2105	UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error)
2106	// Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s
2107	// metadata.
2108	//
2109	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
2110	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]
2111	// and
2112	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED]
2113	// using this method. See
2114	// [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]
2115	// and
2116	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
2117	// to move between other states.
2118	UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2119	// Encrypts data, so that it can only be recovered by a call to
2120	// [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The
2121	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2122	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2123	Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error)
2124	// Decrypts data that was protected by
2125	// [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The
2126	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2127	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2128	Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error)
2129	// Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
2130	// with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2131	// ASYMMETRIC_SIGN, producing a signature that can be verified with the public
2132	// key retrieved from
2133	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
2134	AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error)
2135	// Decrypts data that was encrypted with a public key retrieved from
2136	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]
2137	// corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
2138	// with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2139	// ASYMMETRIC_DECRYPT.
2140	AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error)
2141	// Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that
2142	// will be used in
2143	// [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
2144	//
2145	// Returns an error if called on an asymmetric key.
2146	UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error)
2147	// Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for
2148	// destruction.
2149	//
2150	// Upon calling this method,
2151	// [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will
2152	// be set to
2153	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2154	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will
2155	// be set to a time 24 hours in the future, at which point the
2156	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be changed to
2157	// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED],
2158	// and the key material will be irrevocably destroyed.
2159	//
2160	// Before the
2161	// [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is
2162	// reached,
2163	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
2164	// may be called to reverse the process.
2165	DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2166	// Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
2167	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2168	// state.
2169	//
2170	// Upon restoration of the CryptoKeyVersion,
2171	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2172	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
2173	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will
2174	// be cleared.
2175	RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2176}
2177
2178func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) {
2179	s.RegisterService(&_KeyManagementService_serviceDesc, srv)
2180}
2181
2182func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2183	in := new(ListKeyRingsRequest)
2184	if err := dec(in); err != nil {
2185		return nil, err
2186	}
2187	if interceptor == nil {
2188		return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in)
2189	}
2190	info := &grpc.UnaryServerInfo{
2191		Server:     srv,
2192		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings",
2193	}
2194	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2195		return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest))
2196	}
2197	return interceptor(ctx, in, info, handler)
2198}
2199
2200func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2201	in := new(ListCryptoKeysRequest)
2202	if err := dec(in); err != nil {
2203		return nil, err
2204	}
2205	if interceptor == nil {
2206		return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in)
2207	}
2208	info := &grpc.UnaryServerInfo{
2209		Server:     srv,
2210		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys",
2211	}
2212	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2213		return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest))
2214	}
2215	return interceptor(ctx, in, info, handler)
2216}
2217
2218func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2219	in := new(ListCryptoKeyVersionsRequest)
2220	if err := dec(in); err != nil {
2221		return nil, err
2222	}
2223	if interceptor == nil {
2224		return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in)
2225	}
2226	info := &grpc.UnaryServerInfo{
2227		Server:     srv,
2228		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions",
2229	}
2230	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2231		return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest))
2232	}
2233	return interceptor(ctx, in, info, handler)
2234}
2235
2236func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2237	in := new(GetKeyRingRequest)
2238	if err := dec(in); err != nil {
2239		return nil, err
2240	}
2241	if interceptor == nil {
2242		return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in)
2243	}
2244	info := &grpc.UnaryServerInfo{
2245		Server:     srv,
2246		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing",
2247	}
2248	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2249		return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest))
2250	}
2251	return interceptor(ctx, in, info, handler)
2252}
2253
2254func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2255	in := new(GetCryptoKeyRequest)
2256	if err := dec(in); err != nil {
2257		return nil, err
2258	}
2259	if interceptor == nil {
2260		return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in)
2261	}
2262	info := &grpc.UnaryServerInfo{
2263		Server:     srv,
2264		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey",
2265	}
2266	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2267		return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest))
2268	}
2269	return interceptor(ctx, in, info, handler)
2270}
2271
2272func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2273	in := new(GetCryptoKeyVersionRequest)
2274	if err := dec(in); err != nil {
2275		return nil, err
2276	}
2277	if interceptor == nil {
2278		return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in)
2279	}
2280	info := &grpc.UnaryServerInfo{
2281		Server:     srv,
2282		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion",
2283	}
2284	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2285		return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest))
2286	}
2287	return interceptor(ctx, in, info, handler)
2288}
2289
2290func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2291	in := new(GetPublicKeyRequest)
2292	if err := dec(in); err != nil {
2293		return nil, err
2294	}
2295	if interceptor == nil {
2296		return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in)
2297	}
2298	info := &grpc.UnaryServerInfo{
2299		Server:     srv,
2300		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey",
2301	}
2302	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2303		return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest))
2304	}
2305	return interceptor(ctx, in, info, handler)
2306}
2307
2308func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2309	in := new(CreateKeyRingRequest)
2310	if err := dec(in); err != nil {
2311		return nil, err
2312	}
2313	if interceptor == nil {
2314		return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in)
2315	}
2316	info := &grpc.UnaryServerInfo{
2317		Server:     srv,
2318		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing",
2319	}
2320	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2321		return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest))
2322	}
2323	return interceptor(ctx, in, info, handler)
2324}
2325
2326func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2327	in := new(CreateCryptoKeyRequest)
2328	if err := dec(in); err != nil {
2329		return nil, err
2330	}
2331	if interceptor == nil {
2332		return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in)
2333	}
2334	info := &grpc.UnaryServerInfo{
2335		Server:     srv,
2336		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey",
2337	}
2338	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2339		return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest))
2340	}
2341	return interceptor(ctx, in, info, handler)
2342}
2343
2344func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2345	in := new(CreateCryptoKeyVersionRequest)
2346	if err := dec(in); err != nil {
2347		return nil, err
2348	}
2349	if interceptor == nil {
2350		return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in)
2351	}
2352	info := &grpc.UnaryServerInfo{
2353		Server:     srv,
2354		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion",
2355	}
2356	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2357		return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest))
2358	}
2359	return interceptor(ctx, in, info, handler)
2360}
2361
2362func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2363	in := new(UpdateCryptoKeyRequest)
2364	if err := dec(in); err != nil {
2365		return nil, err
2366	}
2367	if interceptor == nil {
2368		return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in)
2369	}
2370	info := &grpc.UnaryServerInfo{
2371		Server:     srv,
2372		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey",
2373	}
2374	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2375		return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest))
2376	}
2377	return interceptor(ctx, in, info, handler)
2378}
2379
2380func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2381	in := new(UpdateCryptoKeyVersionRequest)
2382	if err := dec(in); err != nil {
2383		return nil, err
2384	}
2385	if interceptor == nil {
2386		return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in)
2387	}
2388	info := &grpc.UnaryServerInfo{
2389		Server:     srv,
2390		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion",
2391	}
2392	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2393		return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest))
2394	}
2395	return interceptor(ctx, in, info, handler)
2396}
2397
2398func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2399	in := new(EncryptRequest)
2400	if err := dec(in); err != nil {
2401		return nil, err
2402	}
2403	if interceptor == nil {
2404		return srv.(KeyManagementServiceServer).Encrypt(ctx, in)
2405	}
2406	info := &grpc.UnaryServerInfo{
2407		Server:     srv,
2408		FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt",
2409	}
2410	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2411		return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest))
2412	}
2413	return interceptor(ctx, in, info, handler)
2414}
2415
2416func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2417	in := new(DecryptRequest)
2418	if err := dec(in); err != nil {
2419		return nil, err
2420	}
2421	if interceptor == nil {
2422		return srv.(KeyManagementServiceServer).Decrypt(ctx, in)
2423	}
2424	info := &grpc.UnaryServerInfo{
2425		Server:     srv,
2426		FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt",
2427	}
2428	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2429		return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest))
2430	}
2431	return interceptor(ctx, in, info, handler)
2432}
2433
2434func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2435	in := new(AsymmetricSignRequest)
2436	if err := dec(in); err != nil {
2437		return nil, err
2438	}
2439	if interceptor == nil {
2440		return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in)
2441	}
2442	info := &grpc.UnaryServerInfo{
2443		Server:     srv,
2444		FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign",
2445	}
2446	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2447		return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest))
2448	}
2449	return interceptor(ctx, in, info, handler)
2450}
2451
2452func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2453	in := new(AsymmetricDecryptRequest)
2454	if err := dec(in); err != nil {
2455		return nil, err
2456	}
2457	if interceptor == nil {
2458		return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in)
2459	}
2460	info := &grpc.UnaryServerInfo{
2461		Server:     srv,
2462		FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt",
2463	}
2464	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2465		return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest))
2466	}
2467	return interceptor(ctx, in, info, handler)
2468}
2469
2470func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2471	in := new(UpdateCryptoKeyPrimaryVersionRequest)
2472	if err := dec(in); err != nil {
2473		return nil, err
2474	}
2475	if interceptor == nil {
2476		return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in)
2477	}
2478	info := &grpc.UnaryServerInfo{
2479		Server:     srv,
2480		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion",
2481	}
2482	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2483		return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest))
2484	}
2485	return interceptor(ctx, in, info, handler)
2486}
2487
2488func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2489	in := new(DestroyCryptoKeyVersionRequest)
2490	if err := dec(in); err != nil {
2491		return nil, err
2492	}
2493	if interceptor == nil {
2494		return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in)
2495	}
2496	info := &grpc.UnaryServerInfo{
2497		Server:     srv,
2498		FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion",
2499	}
2500	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2501		return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest))
2502	}
2503	return interceptor(ctx, in, info, handler)
2504}
2505
2506func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2507	in := new(RestoreCryptoKeyVersionRequest)
2508	if err := dec(in); err != nil {
2509		return nil, err
2510	}
2511	if interceptor == nil {
2512		return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in)
2513	}
2514	info := &grpc.UnaryServerInfo{
2515		Server:     srv,
2516		FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion",
2517	}
2518	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2519		return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest))
2520	}
2521	return interceptor(ctx, in, info, handler)
2522}
2523
2524var _KeyManagementService_serviceDesc = grpc.ServiceDesc{
2525	ServiceName: "google.cloud.kms.v1.KeyManagementService",
2526	HandlerType: (*KeyManagementServiceServer)(nil),
2527	Methods: []grpc.MethodDesc{
2528		{
2529			MethodName: "ListKeyRings",
2530			Handler:    _KeyManagementService_ListKeyRings_Handler,
2531		},
2532		{
2533			MethodName: "ListCryptoKeys",
2534			Handler:    _KeyManagementService_ListCryptoKeys_Handler,
2535		},
2536		{
2537			MethodName: "ListCryptoKeyVersions",
2538			Handler:    _KeyManagementService_ListCryptoKeyVersions_Handler,
2539		},
2540		{
2541			MethodName: "GetKeyRing",
2542			Handler:    _KeyManagementService_GetKeyRing_Handler,
2543		},
2544		{
2545			MethodName: "GetCryptoKey",
2546			Handler:    _KeyManagementService_GetCryptoKey_Handler,
2547		},
2548		{
2549			MethodName: "GetCryptoKeyVersion",
2550			Handler:    _KeyManagementService_GetCryptoKeyVersion_Handler,
2551		},
2552		{
2553			MethodName: "GetPublicKey",
2554			Handler:    _KeyManagementService_GetPublicKey_Handler,
2555		},
2556		{
2557			MethodName: "CreateKeyRing",
2558			Handler:    _KeyManagementService_CreateKeyRing_Handler,
2559		},
2560		{
2561			MethodName: "CreateCryptoKey",
2562			Handler:    _KeyManagementService_CreateCryptoKey_Handler,
2563		},
2564		{
2565			MethodName: "CreateCryptoKeyVersion",
2566			Handler:    _KeyManagementService_CreateCryptoKeyVersion_Handler,
2567		},
2568		{
2569			MethodName: "UpdateCryptoKey",
2570			Handler:    _KeyManagementService_UpdateCryptoKey_Handler,
2571		},
2572		{
2573			MethodName: "UpdateCryptoKeyVersion",
2574			Handler:    _KeyManagementService_UpdateCryptoKeyVersion_Handler,
2575		},
2576		{
2577			MethodName: "Encrypt",
2578			Handler:    _KeyManagementService_Encrypt_Handler,
2579		},
2580		{
2581			MethodName: "Decrypt",
2582			Handler:    _KeyManagementService_Decrypt_Handler,
2583		},
2584		{
2585			MethodName: "AsymmetricSign",
2586			Handler:    _KeyManagementService_AsymmetricSign_Handler,
2587		},
2588		{
2589			MethodName: "AsymmetricDecrypt",
2590			Handler:    _KeyManagementService_AsymmetricDecrypt_Handler,
2591		},
2592		{
2593			MethodName: "UpdateCryptoKeyPrimaryVersion",
2594			Handler:    _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler,
2595		},
2596		{
2597			MethodName: "DestroyCryptoKeyVersion",
2598			Handler:    _KeyManagementService_DestroyCryptoKeyVersion_Handler,
2599		},
2600		{
2601			MethodName: "RestoreCryptoKeyVersion",
2602			Handler:    _KeyManagementService_RestoreCryptoKeyVersion_Handler,
2603		},
2604	},
2605	Streams:  []grpc.StreamDesc{},
2606	Metadata: "google/cloud/kms/v1/service.proto",
2607}
2608