1// Code generated by protoc-gen-go. DO NOT EDIT.
2// source: google/cloud/kms/v1/service.proto
3
4package kms
5
6import (
7	context "context"
8	fmt "fmt"
9	math "math"
10
11	proto "github.com/golang/protobuf/proto"
12	_ "google.golang.org/genproto/googleapis/api/annotations"
13	field_mask "google.golang.org/genproto/protobuf/field_mask"
14	grpc "google.golang.org/grpc"
15	codes "google.golang.org/grpc/codes"
16	status "google.golang.org/grpc/status"
17)
18
19// Reference imports to suppress errors if they are not otherwise used.
20var _ = proto.Marshal
21var _ = fmt.Errorf
22var _ = math.Inf
23
24// This is a compile-time assertion to ensure that this generated file
25// is compatible with the proto package it is being compiled against.
26// A compilation error at this line likely means your copy of the
27// proto package needs to be updated.
28const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
29
30// Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings].
31type ListKeyRingsRequest struct {
32	// Required. The resource name of the location associated with the
33	// [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`.
34	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
35	// Optional. Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to include in the
36	// response.  Further [KeyRings][google.cloud.kms.v1.KeyRing] can subsequently be obtained by
37	// including the [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] in a subsequent
38	// request.  If unspecified, the server will pick an appropriate default.
39	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
40	// Optional. Optional pagination token, returned earlier via
41	// [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token].
42	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
43	// Optional. Only include resources that match the filter in the response. For
44	// more information, see
45	// [Sorting and filtering list
46	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
47	Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"`
48	// Optional. Specify how the results should be sorted. If not specified, the
49	// results will be sorted in the default order.  For more information, see
50	// [Sorting and filtering list
51	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
52	OrderBy              string   `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
53	XXX_NoUnkeyedLiteral struct{} `json:"-"`
54	XXX_unrecognized     []byte   `json:"-"`
55	XXX_sizecache        int32    `json:"-"`
56}
57
58func (m *ListKeyRingsRequest) Reset()         { *m = ListKeyRingsRequest{} }
59func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) }
60func (*ListKeyRingsRequest) ProtoMessage()    {}
61func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) {
62	return fileDescriptor_723aeaeb61739a25, []int{0}
63}
64
65func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error {
66	return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b)
67}
68func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
69	return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic)
70}
71func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) {
72	xxx_messageInfo_ListKeyRingsRequest.Merge(m, src)
73}
74func (m *ListKeyRingsRequest) XXX_Size() int {
75	return xxx_messageInfo_ListKeyRingsRequest.Size(m)
76}
77func (m *ListKeyRingsRequest) XXX_DiscardUnknown() {
78	xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m)
79}
80
81var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo
82
83func (m *ListKeyRingsRequest) GetParent() string {
84	if m != nil {
85		return m.Parent
86	}
87	return ""
88}
89
90func (m *ListKeyRingsRequest) GetPageSize() int32 {
91	if m != nil {
92		return m.PageSize
93	}
94	return 0
95}
96
97func (m *ListKeyRingsRequest) GetPageToken() string {
98	if m != nil {
99		return m.PageToken
100	}
101	return ""
102}
103
104func (m *ListKeyRingsRequest) GetFilter() string {
105	if m != nil {
106		return m.Filter
107	}
108	return ""
109}
110
111func (m *ListKeyRingsRequest) GetOrderBy() string {
112	if m != nil {
113		return m.OrderBy
114	}
115	return ""
116}
117
118// Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
119type ListCryptoKeysRequest struct {
120	// Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format
121	// `projects/*/locations/*/keyRings/*`.
122	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
123	// Optional. Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] to include in the
124	// response.  Further [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by
125	// including the [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] in a subsequent
126	// request.  If unspecified, the server will pick an appropriate default.
127	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
128	// Optional. Optional pagination token, returned earlier via
129	// [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token].
130	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
131	// The fields of the primary version to include in the response.
132	VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"`
133	// Optional. Only include resources that match the filter in the response. For
134	// more information, see
135	// [Sorting and filtering list
136	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
137	Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"`
138	// Optional. Specify how the results should be sorted. If not specified, the
139	// results will be sorted in the default order. For more information, see
140	// [Sorting and filtering list
141	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
142	OrderBy              string   `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
143	XXX_NoUnkeyedLiteral struct{} `json:"-"`
144	XXX_unrecognized     []byte   `json:"-"`
145	XXX_sizecache        int32    `json:"-"`
146}
147
148func (m *ListCryptoKeysRequest) Reset()         { *m = ListCryptoKeysRequest{} }
149func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) }
150func (*ListCryptoKeysRequest) ProtoMessage()    {}
151func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) {
152	return fileDescriptor_723aeaeb61739a25, []int{1}
153}
154
155func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error {
156	return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b)
157}
158func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
159	return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic)
160}
161func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) {
162	xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src)
163}
164func (m *ListCryptoKeysRequest) XXX_Size() int {
165	return xxx_messageInfo_ListCryptoKeysRequest.Size(m)
166}
167func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() {
168	xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m)
169}
170
171var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo
172
173func (m *ListCryptoKeysRequest) GetParent() string {
174	if m != nil {
175		return m.Parent
176	}
177	return ""
178}
179
180func (m *ListCryptoKeysRequest) GetPageSize() int32 {
181	if m != nil {
182		return m.PageSize
183	}
184	return 0
185}
186
187func (m *ListCryptoKeysRequest) GetPageToken() string {
188	if m != nil {
189		return m.PageToken
190	}
191	return ""
192}
193
194func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView {
195	if m != nil {
196		return m.VersionView
197	}
198	return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED
199}
200
201func (m *ListCryptoKeysRequest) GetFilter() string {
202	if m != nil {
203		return m.Filter
204	}
205	return ""
206}
207
208func (m *ListCryptoKeysRequest) GetOrderBy() string {
209	if m != nil {
210		return m.OrderBy
211	}
212	return ""
213}
214
215// Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions].
216type ListCryptoKeyVersionsRequest struct {
217	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format
218	// `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
219	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
220	// Optional. Optional limit on the number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to
221	// include in the response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] can
222	// subsequently be obtained by including the
223	// [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] in a subsequent request.
224	// If unspecified, the server will pick an appropriate default.
225	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
226	// Optional. Optional pagination token, returned earlier via
227	// [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token].
228	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
229	// The fields to include in the response.
230	View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"`
231	// Optional. Only include resources that match the filter in the response. For
232	// more information, see
233	// [Sorting and filtering list
234	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
235	Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"`
236	// Optional. Specify how the results should be sorted. If not specified, the
237	// results will be sorted in the default order. For more information, see
238	// [Sorting and filtering list
239	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
240	OrderBy              string   `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
241	XXX_NoUnkeyedLiteral struct{} `json:"-"`
242	XXX_unrecognized     []byte   `json:"-"`
243	XXX_sizecache        int32    `json:"-"`
244}
245
246func (m *ListCryptoKeyVersionsRequest) Reset()         { *m = ListCryptoKeyVersionsRequest{} }
247func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) }
248func (*ListCryptoKeyVersionsRequest) ProtoMessage()    {}
249func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) {
250	return fileDescriptor_723aeaeb61739a25, []int{2}
251}
252
253func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error {
254	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b)
255}
256func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
257	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic)
258}
259func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) {
260	xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src)
261}
262func (m *ListCryptoKeyVersionsRequest) XXX_Size() int {
263	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m)
264}
265func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() {
266	xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m)
267}
268
269var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo
270
271func (m *ListCryptoKeyVersionsRequest) GetParent() string {
272	if m != nil {
273		return m.Parent
274	}
275	return ""
276}
277
278func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 {
279	if m != nil {
280		return m.PageSize
281	}
282	return 0
283}
284
285func (m *ListCryptoKeyVersionsRequest) GetPageToken() string {
286	if m != nil {
287		return m.PageToken
288	}
289	return ""
290}
291
292func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView {
293	if m != nil {
294		return m.View
295	}
296	return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED
297}
298
299func (m *ListCryptoKeyVersionsRequest) GetFilter() string {
300	if m != nil {
301		return m.Filter
302	}
303	return ""
304}
305
306func (m *ListCryptoKeyVersionsRequest) GetOrderBy() string {
307	if m != nil {
308		return m.OrderBy
309	}
310	return ""
311}
312
313// Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs].
314type ListImportJobsRequest struct {
315	// Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format
316	// `projects/*/locations/*/keyRings/*`.
317	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
318	// Optional. Optional limit on the number of [ImportJobs][google.cloud.kms.v1.ImportJob] to include in the
319	// response. Further [ImportJobs][google.cloud.kms.v1.ImportJob] can subsequently be obtained by
320	// including the [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token] in a subsequent
321	// request. If unspecified, the server will pick an appropriate default.
322	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
323	// Optional. Optional pagination token, returned earlier via
324	// [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token].
325	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
326	// Optional. Only include resources that match the filter in the response. For
327	// more information, see
328	// [Sorting and filtering list
329	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
330	Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"`
331	// Optional. Specify how the results should be sorted. If not specified, the
332	// results will be sorted in the default order. For more information, see
333	// [Sorting and filtering list
334	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
335	OrderBy              string   `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
336	XXX_NoUnkeyedLiteral struct{} `json:"-"`
337	XXX_unrecognized     []byte   `json:"-"`
338	XXX_sizecache        int32    `json:"-"`
339}
340
341func (m *ListImportJobsRequest) Reset()         { *m = ListImportJobsRequest{} }
342func (m *ListImportJobsRequest) String() string { return proto.CompactTextString(m) }
343func (*ListImportJobsRequest) ProtoMessage()    {}
344func (*ListImportJobsRequest) Descriptor() ([]byte, []int) {
345	return fileDescriptor_723aeaeb61739a25, []int{3}
346}
347
348func (m *ListImportJobsRequest) XXX_Unmarshal(b []byte) error {
349	return xxx_messageInfo_ListImportJobsRequest.Unmarshal(m, b)
350}
351func (m *ListImportJobsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
352	return xxx_messageInfo_ListImportJobsRequest.Marshal(b, m, deterministic)
353}
354func (m *ListImportJobsRequest) XXX_Merge(src proto.Message) {
355	xxx_messageInfo_ListImportJobsRequest.Merge(m, src)
356}
357func (m *ListImportJobsRequest) XXX_Size() int {
358	return xxx_messageInfo_ListImportJobsRequest.Size(m)
359}
360func (m *ListImportJobsRequest) XXX_DiscardUnknown() {
361	xxx_messageInfo_ListImportJobsRequest.DiscardUnknown(m)
362}
363
364var xxx_messageInfo_ListImportJobsRequest proto.InternalMessageInfo
365
366func (m *ListImportJobsRequest) GetParent() string {
367	if m != nil {
368		return m.Parent
369	}
370	return ""
371}
372
373func (m *ListImportJobsRequest) GetPageSize() int32 {
374	if m != nil {
375		return m.PageSize
376	}
377	return 0
378}
379
380func (m *ListImportJobsRequest) GetPageToken() string {
381	if m != nil {
382		return m.PageToken
383	}
384	return ""
385}
386
387func (m *ListImportJobsRequest) GetFilter() string {
388	if m != nil {
389		return m.Filter
390	}
391	return ""
392}
393
394func (m *ListImportJobsRequest) GetOrderBy() string {
395	if m != nil {
396		return m.OrderBy
397	}
398	return ""
399}
400
401// Response message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings].
402type ListKeyRingsResponse struct {
403	// The list of [KeyRings][google.cloud.kms.v1.KeyRing].
404	KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"`
405	// A token to retrieve next page of results. Pass this value in
406	// [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] to retrieve the next page of results.
407	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
408	// The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched the query.
409	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
410	XXX_NoUnkeyedLiteral struct{} `json:"-"`
411	XXX_unrecognized     []byte   `json:"-"`
412	XXX_sizecache        int32    `json:"-"`
413}
414
415func (m *ListKeyRingsResponse) Reset()         { *m = ListKeyRingsResponse{} }
416func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) }
417func (*ListKeyRingsResponse) ProtoMessage()    {}
418func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) {
419	return fileDescriptor_723aeaeb61739a25, []int{4}
420}
421
422func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error {
423	return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b)
424}
425func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
426	return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic)
427}
428func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) {
429	xxx_messageInfo_ListKeyRingsResponse.Merge(m, src)
430}
431func (m *ListKeyRingsResponse) XXX_Size() int {
432	return xxx_messageInfo_ListKeyRingsResponse.Size(m)
433}
434func (m *ListKeyRingsResponse) XXX_DiscardUnknown() {
435	xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m)
436}
437
438var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo
439
440func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing {
441	if m != nil {
442		return m.KeyRings
443	}
444	return nil
445}
446
447func (m *ListKeyRingsResponse) GetNextPageToken() string {
448	if m != nil {
449		return m.NextPageToken
450	}
451	return ""
452}
453
454func (m *ListKeyRingsResponse) GetTotalSize() int32 {
455	if m != nil {
456		return m.TotalSize
457	}
458	return 0
459}
460
461// Response message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
462type ListCryptoKeysResponse struct {
463	// The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey].
464	CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"`
465	// A token to retrieve next page of results. Pass this value in
466	// [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] to retrieve the next page of results.
467	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
468	// The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that matched the query.
469	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
470	XXX_NoUnkeyedLiteral struct{} `json:"-"`
471	XXX_unrecognized     []byte   `json:"-"`
472	XXX_sizecache        int32    `json:"-"`
473}
474
475func (m *ListCryptoKeysResponse) Reset()         { *m = ListCryptoKeysResponse{} }
476func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) }
477func (*ListCryptoKeysResponse) ProtoMessage()    {}
478func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) {
479	return fileDescriptor_723aeaeb61739a25, []int{5}
480}
481
482func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error {
483	return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b)
484}
485func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
486	return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic)
487}
488func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) {
489	xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src)
490}
491func (m *ListCryptoKeysResponse) XXX_Size() int {
492	return xxx_messageInfo_ListCryptoKeysResponse.Size(m)
493}
494func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() {
495	xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m)
496}
497
498var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo
499
500func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey {
501	if m != nil {
502		return m.CryptoKeys
503	}
504	return nil
505}
506
507func (m *ListCryptoKeysResponse) GetNextPageToken() string {
508	if m != nil {
509		return m.NextPageToken
510	}
511	return ""
512}
513
514func (m *ListCryptoKeysResponse) GetTotalSize() int32 {
515	if m != nil {
516		return m.TotalSize
517	}
518	return 0
519}
520
521// Response message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions].
522type ListCryptoKeyVersionsResponse struct {
523	// The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
524	CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"`
525	// A token to retrieve next page of results. Pass this value in
526	// [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] to retrieve the next page of
527	// results.
528	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
529	// The total number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the
530	// query.
531	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
532	XXX_NoUnkeyedLiteral struct{} `json:"-"`
533	XXX_unrecognized     []byte   `json:"-"`
534	XXX_sizecache        int32    `json:"-"`
535}
536
537func (m *ListCryptoKeyVersionsResponse) Reset()         { *m = ListCryptoKeyVersionsResponse{} }
538func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) }
539func (*ListCryptoKeyVersionsResponse) ProtoMessage()    {}
540func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) {
541	return fileDescriptor_723aeaeb61739a25, []int{6}
542}
543
544func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error {
545	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b)
546}
547func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
548	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic)
549}
550func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) {
551	xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src)
552}
553func (m *ListCryptoKeyVersionsResponse) XXX_Size() int {
554	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m)
555}
556func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() {
557	xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m)
558}
559
560var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo
561
562func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion {
563	if m != nil {
564		return m.CryptoKeyVersions
565	}
566	return nil
567}
568
569func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string {
570	if m != nil {
571		return m.NextPageToken
572	}
573	return ""
574}
575
576func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 {
577	if m != nil {
578		return m.TotalSize
579	}
580	return 0
581}
582
583// Response message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs].
584type ListImportJobsResponse struct {
585	// The list of [ImportJobs][google.cloud.kms.v1.ImportJob].
586	ImportJobs []*ImportJob `protobuf:"bytes,1,rep,name=import_jobs,json=importJobs,proto3" json:"import_jobs,omitempty"`
587	// A token to retrieve next page of results. Pass this value in
588	// [ListImportJobsRequest.page_token][google.cloud.kms.v1.ListImportJobsRequest.page_token] to retrieve the next page of results.
589	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
590	// The total number of [ImportJobs][google.cloud.kms.v1.ImportJob] that matched the query.
591	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
592	XXX_NoUnkeyedLiteral struct{} `json:"-"`
593	XXX_unrecognized     []byte   `json:"-"`
594	XXX_sizecache        int32    `json:"-"`
595}
596
597func (m *ListImportJobsResponse) Reset()         { *m = ListImportJobsResponse{} }
598func (m *ListImportJobsResponse) String() string { return proto.CompactTextString(m) }
599func (*ListImportJobsResponse) ProtoMessage()    {}
600func (*ListImportJobsResponse) Descriptor() ([]byte, []int) {
601	return fileDescriptor_723aeaeb61739a25, []int{7}
602}
603
604func (m *ListImportJobsResponse) XXX_Unmarshal(b []byte) error {
605	return xxx_messageInfo_ListImportJobsResponse.Unmarshal(m, b)
606}
607func (m *ListImportJobsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
608	return xxx_messageInfo_ListImportJobsResponse.Marshal(b, m, deterministic)
609}
610func (m *ListImportJobsResponse) XXX_Merge(src proto.Message) {
611	xxx_messageInfo_ListImportJobsResponse.Merge(m, src)
612}
613func (m *ListImportJobsResponse) XXX_Size() int {
614	return xxx_messageInfo_ListImportJobsResponse.Size(m)
615}
616func (m *ListImportJobsResponse) XXX_DiscardUnknown() {
617	xxx_messageInfo_ListImportJobsResponse.DiscardUnknown(m)
618}
619
620var xxx_messageInfo_ListImportJobsResponse proto.InternalMessageInfo
621
622func (m *ListImportJobsResponse) GetImportJobs() []*ImportJob {
623	if m != nil {
624		return m.ImportJobs
625	}
626	return nil
627}
628
629func (m *ListImportJobsResponse) GetNextPageToken() string {
630	if m != nil {
631		return m.NextPageToken
632	}
633	return ""
634}
635
636func (m *ListImportJobsResponse) GetTotalSize() int32 {
637	if m != nil {
638		return m.TotalSize
639	}
640	return 0
641}
642
643// Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing].
644type GetKeyRingRequest struct {
645	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] to get.
646	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
647	XXX_NoUnkeyedLiteral struct{} `json:"-"`
648	XXX_unrecognized     []byte   `json:"-"`
649	XXX_sizecache        int32    `json:"-"`
650}
651
652func (m *GetKeyRingRequest) Reset()         { *m = GetKeyRingRequest{} }
653func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) }
654func (*GetKeyRingRequest) ProtoMessage()    {}
655func (*GetKeyRingRequest) Descriptor() ([]byte, []int) {
656	return fileDescriptor_723aeaeb61739a25, []int{8}
657}
658
659func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error {
660	return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b)
661}
662func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
663	return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic)
664}
665func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) {
666	xxx_messageInfo_GetKeyRingRequest.Merge(m, src)
667}
668func (m *GetKeyRingRequest) XXX_Size() int {
669	return xxx_messageInfo_GetKeyRingRequest.Size(m)
670}
671func (m *GetKeyRingRequest) XXX_DiscardUnknown() {
672	xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m)
673}
674
675var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo
676
677func (m *GetKeyRingRequest) GetName() string {
678	if m != nil {
679		return m.Name
680	}
681	return ""
682}
683
684// Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey].
685type GetCryptoKeyRequest struct {
686	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to get.
687	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
688	XXX_NoUnkeyedLiteral struct{} `json:"-"`
689	XXX_unrecognized     []byte   `json:"-"`
690	XXX_sizecache        int32    `json:"-"`
691}
692
693func (m *GetCryptoKeyRequest) Reset()         { *m = GetCryptoKeyRequest{} }
694func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
695func (*GetCryptoKeyRequest) ProtoMessage()    {}
696func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) {
697	return fileDescriptor_723aeaeb61739a25, []int{9}
698}
699
700func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
701	return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b)
702}
703func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
704	return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic)
705}
706func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) {
707	xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src)
708}
709func (m *GetCryptoKeyRequest) XXX_Size() int {
710	return xxx_messageInfo_GetCryptoKeyRequest.Size(m)
711}
712func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() {
713	xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m)
714}
715
716var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo
717
718func (m *GetCryptoKeyRequest) GetName() string {
719	if m != nil {
720		return m.Name
721	}
722	return ""
723}
724
725// Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion].
726type GetCryptoKeyVersionRequest struct {
727	// Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get.
728	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
729	XXX_NoUnkeyedLiteral struct{} `json:"-"`
730	XXX_unrecognized     []byte   `json:"-"`
731	XXX_sizecache        int32    `json:"-"`
732}
733
734func (m *GetCryptoKeyVersionRequest) Reset()         { *m = GetCryptoKeyVersionRequest{} }
735func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
736func (*GetCryptoKeyVersionRequest) ProtoMessage()    {}
737func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
738	return fileDescriptor_723aeaeb61739a25, []int{10}
739}
740
741func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
742	return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b)
743}
744func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
745	return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic)
746}
747func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
748	xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src)
749}
750func (m *GetCryptoKeyVersionRequest) XXX_Size() int {
751	return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m)
752}
753func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() {
754	xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m)
755}
756
757var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo
758
759func (m *GetCryptoKeyVersionRequest) GetName() string {
760	if m != nil {
761		return m.Name
762	}
763	return ""
764}
765
766// Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
767type GetPublicKeyRequest struct {
768	// Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to
769	// get.
770	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
771	XXX_NoUnkeyedLiteral struct{} `json:"-"`
772	XXX_unrecognized     []byte   `json:"-"`
773	XXX_sizecache        int32    `json:"-"`
774}
775
776func (m *GetPublicKeyRequest) Reset()         { *m = GetPublicKeyRequest{} }
777func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) }
778func (*GetPublicKeyRequest) ProtoMessage()    {}
779func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) {
780	return fileDescriptor_723aeaeb61739a25, []int{11}
781}
782
783func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error {
784	return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b)
785}
786func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
787	return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic)
788}
789func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) {
790	xxx_messageInfo_GetPublicKeyRequest.Merge(m, src)
791}
792func (m *GetPublicKeyRequest) XXX_Size() int {
793	return xxx_messageInfo_GetPublicKeyRequest.Size(m)
794}
795func (m *GetPublicKeyRequest) XXX_DiscardUnknown() {
796	xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m)
797}
798
799var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo
800
801func (m *GetPublicKeyRequest) GetName() string {
802	if m != nil {
803		return m.Name
804	}
805	return ""
806}
807
808// Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob].
809type GetImportJobRequest struct {
810	// Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] to get.
811	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
812	XXX_NoUnkeyedLiteral struct{} `json:"-"`
813	XXX_unrecognized     []byte   `json:"-"`
814	XXX_sizecache        int32    `json:"-"`
815}
816
817func (m *GetImportJobRequest) Reset()         { *m = GetImportJobRequest{} }
818func (m *GetImportJobRequest) String() string { return proto.CompactTextString(m) }
819func (*GetImportJobRequest) ProtoMessage()    {}
820func (*GetImportJobRequest) Descriptor() ([]byte, []int) {
821	return fileDescriptor_723aeaeb61739a25, []int{12}
822}
823
824func (m *GetImportJobRequest) XXX_Unmarshal(b []byte) error {
825	return xxx_messageInfo_GetImportJobRequest.Unmarshal(m, b)
826}
827func (m *GetImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
828	return xxx_messageInfo_GetImportJobRequest.Marshal(b, m, deterministic)
829}
830func (m *GetImportJobRequest) XXX_Merge(src proto.Message) {
831	xxx_messageInfo_GetImportJobRequest.Merge(m, src)
832}
833func (m *GetImportJobRequest) XXX_Size() int {
834	return xxx_messageInfo_GetImportJobRequest.Size(m)
835}
836func (m *GetImportJobRequest) XXX_DiscardUnknown() {
837	xxx_messageInfo_GetImportJobRequest.DiscardUnknown(m)
838}
839
840var xxx_messageInfo_GetImportJobRequest proto.InternalMessageInfo
841
842func (m *GetImportJobRequest) GetName() string {
843	if m != nil {
844		return m.Name
845	}
846	return ""
847}
848
849// Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing].
850type CreateKeyRingRequest struct {
851	// Required. The resource name of the location associated with the
852	// [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`.
853	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
854	// Required. It must be unique within a location and match the regular
855	// expression `[a-zA-Z0-9_-]{1,63}`
856	KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"`
857	// Required. A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values.
858	KeyRing              *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"`
859	XXX_NoUnkeyedLiteral struct{} `json:"-"`
860	XXX_unrecognized     []byte   `json:"-"`
861	XXX_sizecache        int32    `json:"-"`
862}
863
864func (m *CreateKeyRingRequest) Reset()         { *m = CreateKeyRingRequest{} }
865func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) }
866func (*CreateKeyRingRequest) ProtoMessage()    {}
867func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) {
868	return fileDescriptor_723aeaeb61739a25, []int{13}
869}
870
871func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error {
872	return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b)
873}
874func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
875	return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic)
876}
877func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) {
878	xxx_messageInfo_CreateKeyRingRequest.Merge(m, src)
879}
880func (m *CreateKeyRingRequest) XXX_Size() int {
881	return xxx_messageInfo_CreateKeyRingRequest.Size(m)
882}
883func (m *CreateKeyRingRequest) XXX_DiscardUnknown() {
884	xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m)
885}
886
887var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo
888
889func (m *CreateKeyRingRequest) GetParent() string {
890	if m != nil {
891		return m.Parent
892	}
893	return ""
894}
895
896func (m *CreateKeyRingRequest) GetKeyRingId() string {
897	if m != nil {
898		return m.KeyRingId
899	}
900	return ""
901}
902
903func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing {
904	if m != nil {
905		return m.KeyRing
906	}
907	return nil
908}
909
910// Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey].
911type CreateCryptoKeyRequest struct {
912	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing associated with the
913	// [CryptoKeys][google.cloud.kms.v1.CryptoKey].
914	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
915	// Required. It must be unique within a KeyRing and match the regular
916	// expression `[a-zA-Z0-9_-]{1,63}`
917	CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"`
918	// Required. A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values.
919	CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"`
920	// If set to true, the request will create a [CryptoKey][google.cloud.kms.v1.CryptoKey] without any
921	// [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. You must manually call
922	// [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or
923	// [ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]
924	// before you can use this [CryptoKey][google.cloud.kms.v1.CryptoKey].
925	SkipInitialVersionCreation bool     `protobuf:"varint,5,opt,name=skip_initial_version_creation,json=skipInitialVersionCreation,proto3" json:"skip_initial_version_creation,omitempty"`
926	XXX_NoUnkeyedLiteral       struct{} `json:"-"`
927	XXX_unrecognized           []byte   `json:"-"`
928	XXX_sizecache              int32    `json:"-"`
929}
930
931func (m *CreateCryptoKeyRequest) Reset()         { *m = CreateCryptoKeyRequest{} }
932func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
933func (*CreateCryptoKeyRequest) ProtoMessage()    {}
934func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) {
935	return fileDescriptor_723aeaeb61739a25, []int{14}
936}
937
938func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
939	return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b)
940}
941func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
942	return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic)
943}
944func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) {
945	xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src)
946}
947func (m *CreateCryptoKeyRequest) XXX_Size() int {
948	return xxx_messageInfo_CreateCryptoKeyRequest.Size(m)
949}
950func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() {
951	xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m)
952}
953
954var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo
955
956func (m *CreateCryptoKeyRequest) GetParent() string {
957	if m != nil {
958		return m.Parent
959	}
960	return ""
961}
962
963func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string {
964	if m != nil {
965		return m.CryptoKeyId
966	}
967	return ""
968}
969
970func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey {
971	if m != nil {
972		return m.CryptoKey
973	}
974	return nil
975}
976
977func (m *CreateCryptoKeyRequest) GetSkipInitialVersionCreation() bool {
978	if m != nil {
979		return m.SkipInitialVersionCreation
980	}
981	return false
982}
983
984// Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion].
985type CreateCryptoKeyVersionRequest struct {
986	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with
987	// the [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
988	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
989	// Required. A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial field values.
990	CryptoKeyVersion     *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"`
991	XXX_NoUnkeyedLiteral struct{}          `json:"-"`
992	XXX_unrecognized     []byte            `json:"-"`
993	XXX_sizecache        int32             `json:"-"`
994}
995
996func (m *CreateCryptoKeyVersionRequest) Reset()         { *m = CreateCryptoKeyVersionRequest{} }
997func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
998func (*CreateCryptoKeyVersionRequest) ProtoMessage()    {}
999func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1000	return fileDescriptor_723aeaeb61739a25, []int{15}
1001}
1002
1003func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1004	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b)
1005}
1006func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1007	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1008}
1009func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1010	xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src)
1011}
1012func (m *CreateCryptoKeyVersionRequest) XXX_Size() int {
1013	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m)
1014}
1015func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1016	xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m)
1017}
1018
1019var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo
1020
1021func (m *CreateCryptoKeyVersionRequest) GetParent() string {
1022	if m != nil {
1023		return m.Parent
1024	}
1025	return ""
1026}
1027
1028func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion {
1029	if m != nil {
1030		return m.CryptoKeyVersion
1031	}
1032	return nil
1033}
1034
1035// Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion].
1036type ImportCryptoKeyVersionRequest struct {
1037	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to
1038	// be imported into.
1039	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
1040	// Required. The [algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] of
1041	// the key being imported. This does not need to match the
1042	// [version_template][google.cloud.kms.v1.CryptoKey.version_template] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] this
1043	// version imports into.
1044	Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"`
1045	// Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] that was used to
1046	// wrap this key material.
1047	ImportJob string `protobuf:"bytes,4,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"`
1048	// Required. The incoming wrapped key material that is to be imported.
1049	//
1050	// Types that are valid to be assigned to WrappedKeyMaterial:
1051	//	*ImportCryptoKeyVersionRequest_RsaAesWrappedKey
1052	WrappedKeyMaterial   isImportCryptoKeyVersionRequest_WrappedKeyMaterial `protobuf_oneof:"wrapped_key_material"`
1053	XXX_NoUnkeyedLiteral struct{}                                           `json:"-"`
1054	XXX_unrecognized     []byte                                             `json:"-"`
1055	XXX_sizecache        int32                                              `json:"-"`
1056}
1057
1058func (m *ImportCryptoKeyVersionRequest) Reset()         { *m = ImportCryptoKeyVersionRequest{} }
1059func (m *ImportCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1060func (*ImportCryptoKeyVersionRequest) ProtoMessage()    {}
1061func (*ImportCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1062	return fileDescriptor_723aeaeb61739a25, []int{16}
1063}
1064
1065func (m *ImportCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1066	return xxx_messageInfo_ImportCryptoKeyVersionRequest.Unmarshal(m, b)
1067}
1068func (m *ImportCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1069	return xxx_messageInfo_ImportCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1070}
1071func (m *ImportCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1072	xxx_messageInfo_ImportCryptoKeyVersionRequest.Merge(m, src)
1073}
1074func (m *ImportCryptoKeyVersionRequest) XXX_Size() int {
1075	return xxx_messageInfo_ImportCryptoKeyVersionRequest.Size(m)
1076}
1077func (m *ImportCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1078	xxx_messageInfo_ImportCryptoKeyVersionRequest.DiscardUnknown(m)
1079}
1080
1081var xxx_messageInfo_ImportCryptoKeyVersionRequest proto.InternalMessageInfo
1082
1083func (m *ImportCryptoKeyVersionRequest) GetParent() string {
1084	if m != nil {
1085		return m.Parent
1086	}
1087	return ""
1088}
1089
1090func (m *ImportCryptoKeyVersionRequest) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm {
1091	if m != nil {
1092		return m.Algorithm
1093	}
1094	return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED
1095}
1096
1097func (m *ImportCryptoKeyVersionRequest) GetImportJob() string {
1098	if m != nil {
1099		return m.ImportJob
1100	}
1101	return ""
1102}
1103
1104type isImportCryptoKeyVersionRequest_WrappedKeyMaterial interface {
1105	isImportCryptoKeyVersionRequest_WrappedKeyMaterial()
1106}
1107
1108type ImportCryptoKeyVersionRequest_RsaAesWrappedKey struct {
1109	RsaAesWrappedKey []byte `protobuf:"bytes,5,opt,name=rsa_aes_wrapped_key,json=rsaAesWrappedKey,proto3,oneof"`
1110}
1111
1112func (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey) isImportCryptoKeyVersionRequest_WrappedKeyMaterial() {
1113}
1114
1115func (m *ImportCryptoKeyVersionRequest) GetWrappedKeyMaterial() isImportCryptoKeyVersionRequest_WrappedKeyMaterial {
1116	if m != nil {
1117		return m.WrappedKeyMaterial
1118	}
1119	return nil
1120}
1121
1122func (m *ImportCryptoKeyVersionRequest) GetRsaAesWrappedKey() []byte {
1123	if x, ok := m.GetWrappedKeyMaterial().(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey); ok {
1124		return x.RsaAesWrappedKey
1125	}
1126	return nil
1127}
1128
1129// XXX_OneofWrappers is for the internal use of the proto package.
1130func (*ImportCryptoKeyVersionRequest) XXX_OneofWrappers() []interface{} {
1131	return []interface{}{
1132		(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey)(nil),
1133	}
1134}
1135
1136// Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob].
1137type CreateImportJobRequest struct {
1138	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] associated with the
1139	// [ImportJobs][google.cloud.kms.v1.ImportJob].
1140	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
1141	// Required. It must be unique within a KeyRing and match the regular
1142	// expression `[a-zA-Z0-9_-]{1,63}`
1143	ImportJobId string `protobuf:"bytes,2,opt,name=import_job_id,json=importJobId,proto3" json:"import_job_id,omitempty"`
1144	// Required. An [ImportJob][google.cloud.kms.v1.ImportJob] with initial field values.
1145	ImportJob            *ImportJob `protobuf:"bytes,3,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"`
1146	XXX_NoUnkeyedLiteral struct{}   `json:"-"`
1147	XXX_unrecognized     []byte     `json:"-"`
1148	XXX_sizecache        int32      `json:"-"`
1149}
1150
1151func (m *CreateImportJobRequest) Reset()         { *m = CreateImportJobRequest{} }
1152func (m *CreateImportJobRequest) String() string { return proto.CompactTextString(m) }
1153func (*CreateImportJobRequest) ProtoMessage()    {}
1154func (*CreateImportJobRequest) Descriptor() ([]byte, []int) {
1155	return fileDescriptor_723aeaeb61739a25, []int{17}
1156}
1157
1158func (m *CreateImportJobRequest) XXX_Unmarshal(b []byte) error {
1159	return xxx_messageInfo_CreateImportJobRequest.Unmarshal(m, b)
1160}
1161func (m *CreateImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1162	return xxx_messageInfo_CreateImportJobRequest.Marshal(b, m, deterministic)
1163}
1164func (m *CreateImportJobRequest) XXX_Merge(src proto.Message) {
1165	xxx_messageInfo_CreateImportJobRequest.Merge(m, src)
1166}
1167func (m *CreateImportJobRequest) XXX_Size() int {
1168	return xxx_messageInfo_CreateImportJobRequest.Size(m)
1169}
1170func (m *CreateImportJobRequest) XXX_DiscardUnknown() {
1171	xxx_messageInfo_CreateImportJobRequest.DiscardUnknown(m)
1172}
1173
1174var xxx_messageInfo_CreateImportJobRequest proto.InternalMessageInfo
1175
1176func (m *CreateImportJobRequest) GetParent() string {
1177	if m != nil {
1178		return m.Parent
1179	}
1180	return ""
1181}
1182
1183func (m *CreateImportJobRequest) GetImportJobId() string {
1184	if m != nil {
1185		return m.ImportJobId
1186	}
1187	return ""
1188}
1189
1190func (m *CreateImportJobRequest) GetImportJob() *ImportJob {
1191	if m != nil {
1192		return m.ImportJob
1193	}
1194	return nil
1195}
1196
1197// Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey].
1198type UpdateCryptoKeyRequest struct {
1199	// Required. [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values.
1200	CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"`
1201	// Required. List of fields to be updated in this request.
1202	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
1203	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
1204	XXX_unrecognized     []byte                `json:"-"`
1205	XXX_sizecache        int32                 `json:"-"`
1206}
1207
1208func (m *UpdateCryptoKeyRequest) Reset()         { *m = UpdateCryptoKeyRequest{} }
1209func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
1210func (*UpdateCryptoKeyRequest) ProtoMessage()    {}
1211func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) {
1212	return fileDescriptor_723aeaeb61739a25, []int{18}
1213}
1214
1215func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
1216	return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b)
1217}
1218func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1219	return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic)
1220}
1221func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) {
1222	xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src)
1223}
1224func (m *UpdateCryptoKeyRequest) XXX_Size() int {
1225	return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m)
1226}
1227func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() {
1228	xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m)
1229}
1230
1231var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo
1232
1233func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey {
1234	if m != nil {
1235		return m.CryptoKey
1236	}
1237	return nil
1238}
1239
1240func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask {
1241	if m != nil {
1242		return m.UpdateMask
1243	}
1244	return nil
1245}
1246
1247// Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion].
1248type UpdateCryptoKeyVersionRequest struct {
1249	// Required. [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated values.
1250	CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"`
1251	// Required. List of fields to be updated in this request.
1252	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
1253	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
1254	XXX_unrecognized     []byte                `json:"-"`
1255	XXX_sizecache        int32                 `json:"-"`
1256}
1257
1258func (m *UpdateCryptoKeyVersionRequest) Reset()         { *m = UpdateCryptoKeyVersionRequest{} }
1259func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1260func (*UpdateCryptoKeyVersionRequest) ProtoMessage()    {}
1261func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1262	return fileDescriptor_723aeaeb61739a25, []int{19}
1263}
1264
1265func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1266	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b)
1267}
1268func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1269	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1270}
1271func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1272	xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src)
1273}
1274func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int {
1275	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m)
1276}
1277func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1278	xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m)
1279}
1280
1281var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo
1282
1283func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion {
1284	if m != nil {
1285		return m.CryptoKeyVersion
1286	}
1287	return nil
1288}
1289
1290func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask {
1291	if m != nil {
1292		return m.UpdateMask
1293	}
1294	return nil
1295}
1296
1297// Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
1298type EncryptRequest struct {
1299	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] or [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
1300	// to use for encryption.
1301	//
1302	// If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server will use its
1303	// [primary version][google.cloud.kms.v1.CryptoKey.primary].
1304	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1305	// Required. The data to encrypt. Must be no larger than 64KiB.
1306	//
1307	// The maximum size depends on the key version's
1308	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For
1309	// [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the plaintext must be no larger
1310	// than 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the
1311	// plaintext and additional_authenticated_data fields must be no larger than
1312	// 8KiB.
1313	Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1314	// Optional. Optional data that, if specified, must also be provided during decryption
1315	// through [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data].
1316	//
1317	// The maximum size depends on the key version's
1318	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For
1319	// [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD must be no larger than
1320	// 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the
1321	// plaintext and additional_authenticated_data fields must be no larger than
1322	// 8KiB.
1323	AdditionalAuthenticatedData []byte   `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"`
1324	XXX_NoUnkeyedLiteral        struct{} `json:"-"`
1325	XXX_unrecognized            []byte   `json:"-"`
1326	XXX_sizecache               int32    `json:"-"`
1327}
1328
1329func (m *EncryptRequest) Reset()         { *m = EncryptRequest{} }
1330func (m *EncryptRequest) String() string { return proto.CompactTextString(m) }
1331func (*EncryptRequest) ProtoMessage()    {}
1332func (*EncryptRequest) Descriptor() ([]byte, []int) {
1333	return fileDescriptor_723aeaeb61739a25, []int{20}
1334}
1335
1336func (m *EncryptRequest) XXX_Unmarshal(b []byte) error {
1337	return xxx_messageInfo_EncryptRequest.Unmarshal(m, b)
1338}
1339func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1340	return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic)
1341}
1342func (m *EncryptRequest) XXX_Merge(src proto.Message) {
1343	xxx_messageInfo_EncryptRequest.Merge(m, src)
1344}
1345func (m *EncryptRequest) XXX_Size() int {
1346	return xxx_messageInfo_EncryptRequest.Size(m)
1347}
1348func (m *EncryptRequest) XXX_DiscardUnknown() {
1349	xxx_messageInfo_EncryptRequest.DiscardUnknown(m)
1350}
1351
1352var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo
1353
1354func (m *EncryptRequest) GetName() string {
1355	if m != nil {
1356		return m.Name
1357	}
1358	return ""
1359}
1360
1361func (m *EncryptRequest) GetPlaintext() []byte {
1362	if m != nil {
1363		return m.Plaintext
1364	}
1365	return nil
1366}
1367
1368func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte {
1369	if m != nil {
1370		return m.AdditionalAuthenticatedData
1371	}
1372	return nil
1373}
1374
1375// Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
1376type DecryptRequest struct {
1377	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption.
1378	// The server will choose the appropriate version.
1379	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1380	// Required. The encrypted data originally returned in
1381	// [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext].
1382	Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1383	// Optional. Optional data that must match the data originally supplied in
1384	// [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data].
1385	AdditionalAuthenticatedData []byte   `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"`
1386	XXX_NoUnkeyedLiteral        struct{} `json:"-"`
1387	XXX_unrecognized            []byte   `json:"-"`
1388	XXX_sizecache               int32    `json:"-"`
1389}
1390
1391func (m *DecryptRequest) Reset()         { *m = DecryptRequest{} }
1392func (m *DecryptRequest) String() string { return proto.CompactTextString(m) }
1393func (*DecryptRequest) ProtoMessage()    {}
1394func (*DecryptRequest) Descriptor() ([]byte, []int) {
1395	return fileDescriptor_723aeaeb61739a25, []int{21}
1396}
1397
1398func (m *DecryptRequest) XXX_Unmarshal(b []byte) error {
1399	return xxx_messageInfo_DecryptRequest.Unmarshal(m, b)
1400}
1401func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1402	return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic)
1403}
1404func (m *DecryptRequest) XXX_Merge(src proto.Message) {
1405	xxx_messageInfo_DecryptRequest.Merge(m, src)
1406}
1407func (m *DecryptRequest) XXX_Size() int {
1408	return xxx_messageInfo_DecryptRequest.Size(m)
1409}
1410func (m *DecryptRequest) XXX_DiscardUnknown() {
1411	xxx_messageInfo_DecryptRequest.DiscardUnknown(m)
1412}
1413
1414var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo
1415
1416func (m *DecryptRequest) GetName() string {
1417	if m != nil {
1418		return m.Name
1419	}
1420	return ""
1421}
1422
1423func (m *DecryptRequest) GetCiphertext() []byte {
1424	if m != nil {
1425		return m.Ciphertext
1426	}
1427	return nil
1428}
1429
1430func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte {
1431	if m != nil {
1432		return m.AdditionalAuthenticatedData
1433	}
1434	return nil
1435}
1436
1437// Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign].
1438type AsymmetricSignRequest struct {
1439	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing.
1440	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1441	// Required. The digest of the data to sign. The digest must be produced with
1442	// the same digest algorithm as specified by the key version's
1443	// [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
1444	Digest               *Digest  `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"`
1445	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1446	XXX_unrecognized     []byte   `json:"-"`
1447	XXX_sizecache        int32    `json:"-"`
1448}
1449
1450func (m *AsymmetricSignRequest) Reset()         { *m = AsymmetricSignRequest{} }
1451func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) }
1452func (*AsymmetricSignRequest) ProtoMessage()    {}
1453func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) {
1454	return fileDescriptor_723aeaeb61739a25, []int{22}
1455}
1456
1457func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error {
1458	return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b)
1459}
1460func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1461	return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic)
1462}
1463func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) {
1464	xxx_messageInfo_AsymmetricSignRequest.Merge(m, src)
1465}
1466func (m *AsymmetricSignRequest) XXX_Size() int {
1467	return xxx_messageInfo_AsymmetricSignRequest.Size(m)
1468}
1469func (m *AsymmetricSignRequest) XXX_DiscardUnknown() {
1470	xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m)
1471}
1472
1473var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo
1474
1475func (m *AsymmetricSignRequest) GetName() string {
1476	if m != nil {
1477		return m.Name
1478	}
1479	return ""
1480}
1481
1482func (m *AsymmetricSignRequest) GetDigest() *Digest {
1483	if m != nil {
1484		return m.Digest
1485	}
1486	return nil
1487}
1488
1489// Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt].
1490type AsymmetricDecryptRequest struct {
1491	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for
1492	// decryption.
1493	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1494	// Required. The data encrypted with the named [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public
1495	// key using OAEP.
1496	Ciphertext           []byte   `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1497	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1498	XXX_unrecognized     []byte   `json:"-"`
1499	XXX_sizecache        int32    `json:"-"`
1500}
1501
1502func (m *AsymmetricDecryptRequest) Reset()         { *m = AsymmetricDecryptRequest{} }
1503func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) }
1504func (*AsymmetricDecryptRequest) ProtoMessage()    {}
1505func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) {
1506	return fileDescriptor_723aeaeb61739a25, []int{23}
1507}
1508
1509func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error {
1510	return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b)
1511}
1512func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1513	return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic)
1514}
1515func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) {
1516	xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src)
1517}
1518func (m *AsymmetricDecryptRequest) XXX_Size() int {
1519	return xxx_messageInfo_AsymmetricDecryptRequest.Size(m)
1520}
1521func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() {
1522	xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m)
1523}
1524
1525var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo
1526
1527func (m *AsymmetricDecryptRequest) GetName() string {
1528	if m != nil {
1529		return m.Name
1530	}
1531	return ""
1532}
1533
1534func (m *AsymmetricDecryptRequest) GetCiphertext() []byte {
1535	if m != nil {
1536		return m.Ciphertext
1537	}
1538	return nil
1539}
1540
1541// Response message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
1542type DecryptResponse struct {
1543	// The decrypted data originally supplied in [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext].
1544	Plaintext            []byte   `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1545	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1546	XXX_unrecognized     []byte   `json:"-"`
1547	XXX_sizecache        int32    `json:"-"`
1548}
1549
1550func (m *DecryptResponse) Reset()         { *m = DecryptResponse{} }
1551func (m *DecryptResponse) String() string { return proto.CompactTextString(m) }
1552func (*DecryptResponse) ProtoMessage()    {}
1553func (*DecryptResponse) Descriptor() ([]byte, []int) {
1554	return fileDescriptor_723aeaeb61739a25, []int{24}
1555}
1556
1557func (m *DecryptResponse) XXX_Unmarshal(b []byte) error {
1558	return xxx_messageInfo_DecryptResponse.Unmarshal(m, b)
1559}
1560func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1561	return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic)
1562}
1563func (m *DecryptResponse) XXX_Merge(src proto.Message) {
1564	xxx_messageInfo_DecryptResponse.Merge(m, src)
1565}
1566func (m *DecryptResponse) XXX_Size() int {
1567	return xxx_messageInfo_DecryptResponse.Size(m)
1568}
1569func (m *DecryptResponse) XXX_DiscardUnknown() {
1570	xxx_messageInfo_DecryptResponse.DiscardUnknown(m)
1571}
1572
1573var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo
1574
1575func (m *DecryptResponse) GetPlaintext() []byte {
1576	if m != nil {
1577		return m.Plaintext
1578	}
1579	return nil
1580}
1581
1582// Response message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
1583type EncryptResponse struct {
1584	// The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in encryption. Check
1585	// this field to verify that the intended resource was used for encryption.
1586	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1587	// The encrypted data.
1588	Ciphertext           []byte   `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1589	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1590	XXX_unrecognized     []byte   `json:"-"`
1591	XXX_sizecache        int32    `json:"-"`
1592}
1593
1594func (m *EncryptResponse) Reset()         { *m = EncryptResponse{} }
1595func (m *EncryptResponse) String() string { return proto.CompactTextString(m) }
1596func (*EncryptResponse) ProtoMessage()    {}
1597func (*EncryptResponse) Descriptor() ([]byte, []int) {
1598	return fileDescriptor_723aeaeb61739a25, []int{25}
1599}
1600
1601func (m *EncryptResponse) XXX_Unmarshal(b []byte) error {
1602	return xxx_messageInfo_EncryptResponse.Unmarshal(m, b)
1603}
1604func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1605	return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic)
1606}
1607func (m *EncryptResponse) XXX_Merge(src proto.Message) {
1608	xxx_messageInfo_EncryptResponse.Merge(m, src)
1609}
1610func (m *EncryptResponse) XXX_Size() int {
1611	return xxx_messageInfo_EncryptResponse.Size(m)
1612}
1613func (m *EncryptResponse) XXX_DiscardUnknown() {
1614	xxx_messageInfo_EncryptResponse.DiscardUnknown(m)
1615}
1616
1617var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo
1618
1619func (m *EncryptResponse) GetName() string {
1620	if m != nil {
1621		return m.Name
1622	}
1623	return ""
1624}
1625
1626func (m *EncryptResponse) GetCiphertext() []byte {
1627	if m != nil {
1628		return m.Ciphertext
1629	}
1630	return nil
1631}
1632
1633// Response message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign].
1634type AsymmetricSignResponse struct {
1635	// The created signature.
1636	Signature            []byte   `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"`
1637	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1638	XXX_unrecognized     []byte   `json:"-"`
1639	XXX_sizecache        int32    `json:"-"`
1640}
1641
1642func (m *AsymmetricSignResponse) Reset()         { *m = AsymmetricSignResponse{} }
1643func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) }
1644func (*AsymmetricSignResponse) ProtoMessage()    {}
1645func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) {
1646	return fileDescriptor_723aeaeb61739a25, []int{26}
1647}
1648
1649func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error {
1650	return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b)
1651}
1652func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1653	return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic)
1654}
1655func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) {
1656	xxx_messageInfo_AsymmetricSignResponse.Merge(m, src)
1657}
1658func (m *AsymmetricSignResponse) XXX_Size() int {
1659	return xxx_messageInfo_AsymmetricSignResponse.Size(m)
1660}
1661func (m *AsymmetricSignResponse) XXX_DiscardUnknown() {
1662	xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m)
1663}
1664
1665var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo
1666
1667func (m *AsymmetricSignResponse) GetSignature() []byte {
1668	if m != nil {
1669		return m.Signature
1670	}
1671	return nil
1672}
1673
1674// Response message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt].
1675type AsymmetricDecryptResponse struct {
1676	// The decrypted data originally encrypted with the matching public key.
1677	Plaintext            []byte   `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1678	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1679	XXX_unrecognized     []byte   `json:"-"`
1680	XXX_sizecache        int32    `json:"-"`
1681}
1682
1683func (m *AsymmetricDecryptResponse) Reset()         { *m = AsymmetricDecryptResponse{} }
1684func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) }
1685func (*AsymmetricDecryptResponse) ProtoMessage()    {}
1686func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) {
1687	return fileDescriptor_723aeaeb61739a25, []int{27}
1688}
1689
1690func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error {
1691	return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b)
1692}
1693func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1694	return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic)
1695}
1696func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) {
1697	xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src)
1698}
1699func (m *AsymmetricDecryptResponse) XXX_Size() int {
1700	return xxx_messageInfo_AsymmetricDecryptResponse.Size(m)
1701}
1702func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() {
1703	xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m)
1704}
1705
1706var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo
1707
1708func (m *AsymmetricDecryptResponse) GetPlaintext() []byte {
1709	if m != nil {
1710		return m.Plaintext
1711	}
1712	return nil
1713}
1714
1715// Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion].
1716type UpdateCryptoKeyPrimaryVersionRequest struct {
1717	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to update.
1718	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1719	// Required. The id of the child [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary.
1720	CryptoKeyVersionId   string   `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"`
1721	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1722	XXX_unrecognized     []byte   `json:"-"`
1723	XXX_sizecache        int32    `json:"-"`
1724}
1725
1726func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset()         { *m = UpdateCryptoKeyPrimaryVersionRequest{} }
1727func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) }
1728func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage()    {}
1729func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) {
1730	return fileDescriptor_723aeaeb61739a25, []int{28}
1731}
1732
1733func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error {
1734	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b)
1735}
1736func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1737	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic)
1738}
1739func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) {
1740	xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src)
1741}
1742func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int {
1743	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m)
1744}
1745func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() {
1746	xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m)
1747}
1748
1749var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo
1750
1751func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string {
1752	if m != nil {
1753		return m.Name
1754	}
1755	return ""
1756}
1757
1758func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string {
1759	if m != nil {
1760		return m.CryptoKeyVersionId
1761	}
1762	return ""
1763}
1764
1765// Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion].
1766type DestroyCryptoKeyVersionRequest struct {
1767	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
1768	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1769	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1770	XXX_unrecognized     []byte   `json:"-"`
1771	XXX_sizecache        int32    `json:"-"`
1772}
1773
1774func (m *DestroyCryptoKeyVersionRequest) Reset()         { *m = DestroyCryptoKeyVersionRequest{} }
1775func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1776func (*DestroyCryptoKeyVersionRequest) ProtoMessage()    {}
1777func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1778	return fileDescriptor_723aeaeb61739a25, []int{29}
1779}
1780
1781func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1782	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b)
1783}
1784func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1785	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1786}
1787func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1788	xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src)
1789}
1790func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int {
1791	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m)
1792}
1793func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1794	xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m)
1795}
1796
1797var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo
1798
1799func (m *DestroyCryptoKeyVersionRequest) GetName() string {
1800	if m != nil {
1801		return m.Name
1802	}
1803	return ""
1804}
1805
1806// Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion].
1807type RestoreCryptoKeyVersionRequest struct {
1808	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
1809	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1810	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1811	XXX_unrecognized     []byte   `json:"-"`
1812	XXX_sizecache        int32    `json:"-"`
1813}
1814
1815func (m *RestoreCryptoKeyVersionRequest) Reset()         { *m = RestoreCryptoKeyVersionRequest{} }
1816func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1817func (*RestoreCryptoKeyVersionRequest) ProtoMessage()    {}
1818func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1819	return fileDescriptor_723aeaeb61739a25, []int{30}
1820}
1821
1822func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1823	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b)
1824}
1825func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1826	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1827}
1828func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1829	xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src)
1830}
1831func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int {
1832	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m)
1833}
1834func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1835	xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m)
1836}
1837
1838var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo
1839
1840func (m *RestoreCryptoKeyVersionRequest) GetName() string {
1841	if m != nil {
1842		return m.Name
1843	}
1844	return ""
1845}
1846
1847// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest.
1848type Digest struct {
1849	// Required. The message digest.
1850	//
1851	// Types that are valid to be assigned to Digest:
1852	//	*Digest_Sha256
1853	//	*Digest_Sha384
1854	//	*Digest_Sha512
1855	Digest               isDigest_Digest `protobuf_oneof:"digest"`
1856	XXX_NoUnkeyedLiteral struct{}        `json:"-"`
1857	XXX_unrecognized     []byte          `json:"-"`
1858	XXX_sizecache        int32           `json:"-"`
1859}
1860
1861func (m *Digest) Reset()         { *m = Digest{} }
1862func (m *Digest) String() string { return proto.CompactTextString(m) }
1863func (*Digest) ProtoMessage()    {}
1864func (*Digest) Descriptor() ([]byte, []int) {
1865	return fileDescriptor_723aeaeb61739a25, []int{31}
1866}
1867
1868func (m *Digest) XXX_Unmarshal(b []byte) error {
1869	return xxx_messageInfo_Digest.Unmarshal(m, b)
1870}
1871func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1872	return xxx_messageInfo_Digest.Marshal(b, m, deterministic)
1873}
1874func (m *Digest) XXX_Merge(src proto.Message) {
1875	xxx_messageInfo_Digest.Merge(m, src)
1876}
1877func (m *Digest) XXX_Size() int {
1878	return xxx_messageInfo_Digest.Size(m)
1879}
1880func (m *Digest) XXX_DiscardUnknown() {
1881	xxx_messageInfo_Digest.DiscardUnknown(m)
1882}
1883
1884var xxx_messageInfo_Digest proto.InternalMessageInfo
1885
1886type isDigest_Digest interface {
1887	isDigest_Digest()
1888}
1889
1890type Digest_Sha256 struct {
1891	Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"`
1892}
1893
1894type Digest_Sha384 struct {
1895	Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"`
1896}
1897
1898type Digest_Sha512 struct {
1899	Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"`
1900}
1901
1902func (*Digest_Sha256) isDigest_Digest() {}
1903
1904func (*Digest_Sha384) isDigest_Digest() {}
1905
1906func (*Digest_Sha512) isDigest_Digest() {}
1907
1908func (m *Digest) GetDigest() isDigest_Digest {
1909	if m != nil {
1910		return m.Digest
1911	}
1912	return nil
1913}
1914
1915func (m *Digest) GetSha256() []byte {
1916	if x, ok := m.GetDigest().(*Digest_Sha256); ok {
1917		return x.Sha256
1918	}
1919	return nil
1920}
1921
1922func (m *Digest) GetSha384() []byte {
1923	if x, ok := m.GetDigest().(*Digest_Sha384); ok {
1924		return x.Sha384
1925	}
1926	return nil
1927}
1928
1929func (m *Digest) GetSha512() []byte {
1930	if x, ok := m.GetDigest().(*Digest_Sha512); ok {
1931		return x.Sha512
1932	}
1933	return nil
1934}
1935
1936// XXX_OneofWrappers is for the internal use of the proto package.
1937func (*Digest) XXX_OneofWrappers() []interface{} {
1938	return []interface{}{
1939		(*Digest_Sha256)(nil),
1940		(*Digest_Sha384)(nil),
1941		(*Digest_Sha512)(nil),
1942	}
1943}
1944
1945// Cloud KMS metadata for the given [google.cloud.location.Location][google.cloud.location.Location].
1946type LocationMetadata struct {
1947	// Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with
1948	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]
1949	// [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this location.
1950	HsmAvailable bool `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"`
1951	// Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with
1952	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]
1953	// [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location.
1954	EkmAvailable         bool     `protobuf:"varint,2,opt,name=ekm_available,json=ekmAvailable,proto3" json:"ekm_available,omitempty"`
1955	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1956	XXX_unrecognized     []byte   `json:"-"`
1957	XXX_sizecache        int32    `json:"-"`
1958}
1959
1960func (m *LocationMetadata) Reset()         { *m = LocationMetadata{} }
1961func (m *LocationMetadata) String() string { return proto.CompactTextString(m) }
1962func (*LocationMetadata) ProtoMessage()    {}
1963func (*LocationMetadata) Descriptor() ([]byte, []int) {
1964	return fileDescriptor_723aeaeb61739a25, []int{32}
1965}
1966
1967func (m *LocationMetadata) XXX_Unmarshal(b []byte) error {
1968	return xxx_messageInfo_LocationMetadata.Unmarshal(m, b)
1969}
1970func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1971	return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic)
1972}
1973func (m *LocationMetadata) XXX_Merge(src proto.Message) {
1974	xxx_messageInfo_LocationMetadata.Merge(m, src)
1975}
1976func (m *LocationMetadata) XXX_Size() int {
1977	return xxx_messageInfo_LocationMetadata.Size(m)
1978}
1979func (m *LocationMetadata) XXX_DiscardUnknown() {
1980	xxx_messageInfo_LocationMetadata.DiscardUnknown(m)
1981}
1982
1983var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo
1984
1985func (m *LocationMetadata) GetHsmAvailable() bool {
1986	if m != nil {
1987		return m.HsmAvailable
1988	}
1989	return false
1990}
1991
1992func (m *LocationMetadata) GetEkmAvailable() bool {
1993	if m != nil {
1994		return m.EkmAvailable
1995	}
1996	return false
1997}
1998
1999func init() {
2000	proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest")
2001	proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest")
2002	proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest")
2003	proto.RegisterType((*ListImportJobsRequest)(nil), "google.cloud.kms.v1.ListImportJobsRequest")
2004	proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse")
2005	proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse")
2006	proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse")
2007	proto.RegisterType((*ListImportJobsResponse)(nil), "google.cloud.kms.v1.ListImportJobsResponse")
2008	proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest")
2009	proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest")
2010	proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest")
2011	proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest")
2012	proto.RegisterType((*GetImportJobRequest)(nil), "google.cloud.kms.v1.GetImportJobRequest")
2013	proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest")
2014	proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest")
2015	proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest")
2016	proto.RegisterType((*ImportCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.ImportCryptoKeyVersionRequest")
2017	proto.RegisterType((*CreateImportJobRequest)(nil), "google.cloud.kms.v1.CreateImportJobRequest")
2018	proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest")
2019	proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest")
2020	proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest")
2021	proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest")
2022	proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest")
2023	proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest")
2024	proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse")
2025	proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse")
2026	proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse")
2027	proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse")
2028	proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest")
2029	proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest")
2030	proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest")
2031	proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest")
2032	proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata")
2033}
2034
2035func init() {
2036	proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25)
2037}
2038
2039var fileDescriptor_723aeaeb61739a25 = []byte{
2040	// 2314 bytes of a gzipped FileDescriptorProto
2041	0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x5a, 0xcd, 0x6f, 0x1b, 0xc7,
2042	0x15, 0xcf, 0xd0, 0xb1, 0x2c, 0x3d, 0xc9, 0x92, 0x3d, 0xb2, 0x65, 0x99, 0xb6, 0x64, 0x7b, 0x95,
2043	0x3a, 0xb6, 0xe2, 0x70, 0x2b, 0x3a, 0x36, 0x6c, 0xba, 0x86, 0xbb, 0xb2, 0x12, 0xdb, 0x51, 0x9c,
2044	0x0a, 0xf4, 0x57, 0x9b, 0xaa, 0xdd, 0x0c, 0xc9, 0x11, 0xb5, 0x21, 0x77, 0x97, 0xd9, 0x5d, 0x52,
2045	0x61, 0xda, 0x5c, 0x0a, 0xa4, 0x40, 0x81, 0x02, 0x3d, 0xe4, 0xd0, 0x02, 0x45, 0x8a, 0xa2, 0xc7,
2046	0x5e, 0x9b, 0xf6, 0xd0, 0x0f, 0xa0, 0xa7, 0x1e, 0xd2, 0x43, 0xd1, 0x8f, 0x93, 0x02, 0x04, 0x3e,
2047	0xf4, 0x0f, 0x28, 0x7a, 0x2a, 0xda, 0x4b, 0xb1, 0x33, 0xb3, 0x9f, 0xdc, 0x25, 0x29, 0x6a, 0x0d,
2048	0xe4, 0x66, 0xce, 0xbe, 0x79, 0xf3, 0xfb, 0xbd, 0x79, 0xef, 0xcd, 0xcc, 0xcf, 0x82, 0x73, 0x75,
2049	0xd3, 0xac, 0x37, 0xa9, 0x5c, 0x6d, 0x9a, 0xed, 0x9a, 0xdc, 0xd0, 0x6d, 0xb9, 0xb3, 0x22, 0xdb,
2050	0xd4, 0xea, 0x68, 0x55, 0x5a, 0x68, 0x59, 0xa6, 0x63, 0xe2, 0x59, 0x6e, 0x52, 0x60, 0x26, 0x85,
2051	0x86, 0x6e, 0x17, 0x3a, 0x2b, 0xf9, 0xd3, 0x62, 0x1e, 0x69, 0x69, 0x32, 0x31, 0x0c, 0xd3, 0x21,
2052	0x8e, 0x66, 0x1a, 0x36, 0x9f, 0x92, 0x3f, 0x11, 0xfa, 0x5a, 0x6d, 0x6a, 0xd4, 0x70, 0xc4, 0x87,
2053	0x33, 0xa1, 0x0f, 0x5b, 0x1a, 0x6d, 0xd6, 0xd4, 0x0a, 0xdd, 0x26, 0x1d, 0xcd, 0xb4, 0x84, 0xc1,
2054	0xc9, 0x90, 0x81, 0x45, 0x6d, 0xb3, 0x6d, 0x79, 0x38, 0xf2, 0x4b, 0x49, 0x50, 0x3d, 0x1b, 0x6f,
2055	0xe5, 0xb3, 0xc2, 0x88, 0xfd, 0xaa, 0xb4, 0xb7, 0xc4, 0x2a, 0x3a, 0xb1, 0x1b, 0xdc, 0x42, 0xfa,
2056	0x0c, 0xc1, 0xec, 0x1b, 0x9a, 0xed, 0xac, 0xd3, 0x6e, 0x59, 0x33, 0xea, 0x76, 0x99, 0xbe, 0xdb,
2057	0xa6, 0xb6, 0x83, 0x15, 0x18, 0x6b, 0x11, 0x8b, 0x1a, 0xce, 0x3c, 0x3a, 0x8b, 0x2e, 0x4c, 0xac,
2058	0x5e, 0x7c, 0xaa, 0xe4, 0xfe, 0xab, 0x2c, 0xc1, 0xb9, 0xa6, 0x59, 0x15, 0xe4, 0xb8, 0x6f, 0xd2,
2059	0xd2, 0xec, 0x42, 0xd5, 0xd4, 0xe5, 0x37, 0xc4, 0x87, 0xb2, 0x98, 0x88, 0xcf, 0xc2, 0x44, 0x8b,
2060	0xd4, 0xa9, 0x6a, 0x6b, 0xef, 0xd3, 0xf9, 0xdc, 0x59, 0x74, 0xe1, 0xe0, 0xea, 0x81, 0xa7, 0x0a,
2061	0x2a, 0x8f, 0xbb, 0xa3, 0x0f, 0xb4, 0xf7, 0x29, 0x96, 0x00, 0x98, 0x85, 0x63, 0x36, 0xa8, 0x31,
2062	0x7f, 0x80, 0x2d, 0xc4, 0x4c, 0xd8, 0xc4, 0x87, 0xee, 0x28, 0x3e, 0x05, 0x63, 0x5b, 0x5a, 0xd3,
2063	0xa1, 0xd6, 0xfc, 0xf3, 0xc1, 0x77, 0x31, 0x84, 0x17, 0x61, 0xdc, 0xb4, 0x6a, 0xd4, 0x52, 0x2b,
2064	0xdd, 0xf9, 0x83, 0xc1, 0xe7, 0x43, 0x6c, 0x70, 0xb5, 0x2b, 0xfd, 0x36, 0x07, 0xc7, 0x5d, 0x76,
2065	0xb7, 0xad, 0x6e, 0xcb, 0x31, 0xd7, 0x69, 0xd7, 0xe7, 0x77, 0x2b, 0xc6, 0xef, 0x45, 0xc6, 0xef,
2066	0x1c, 0x9c, 0x61, 0xf1, 0x74, 0xb7, 0x35, 0x46, 0x4f, 0x04, 0x28, 0x63, 0x76, 0xdf, 0x82, 0xa9,
2067	0x0e, 0xb5, 0x6c, 0xcd, 0x34, 0xd4, 0x8e, 0x46, 0x77, 0x18, 0xc7, 0xe9, 0x62, 0xa9, 0x90, 0x90,
2068	0x64, 0x05, 0x9f, 0xc4, 0x63, 0x3e, 0xa3, 0x67, 0xe0, 0xb1, 0x46, 0x77, 0xca, 0x93, 0x9d, 0xe0,
2069	0x47, 0x28, 0x78, 0x07, 0xfb, 0x07, 0x6f, 0x2c, 0x21, 0x78, 0x9f, 0xe4, 0xe0, 0x74, 0x24, 0x78,
2070	0x62, 0x99, 0xc1, 0x39, 0x92, 0x16, 0x43, 0xdf, 0x53, 0xc6, 0x51, 0x7c, 0x13, 0x9e, 0xcf, 0x28,
2071	0x7a, 0xcc, 0xcf, 0xfe, 0xc2, 0xf6, 0x19, 0xe2, 0x39, 0x77, 0x4f, 0x6f, 0x99, 0x96, 0xf3, 0xba,
2072	0x59, 0xf9, 0xa2, 0xe5, 0xdc, 0xbe, 0x2a, 0xea, 0x27, 0x08, 0x8e, 0x45, 0xfb, 0x85, 0xdd, 0x32,
2073	0x0d, 0x9b, 0xe2, 0xeb, 0x30, 0xd1, 0xa0, 0x5d, 0xd5, 0x72, 0x07, 0xe7, 0xd1, 0xd9, 0x03, 0x17,
2074	0x26, 0x8b, 0xa7, 0x13, 0x37, 0xc2, 0x23, 0x35, 0xde, 0x10, 0x2e, 0xf0, 0x79, 0x98, 0x31, 0xe8,
2075	0x7b, 0x8e, 0x1a, 0x42, 0xee, 0x92, 0x9b, 0x28, 0x1f, 0x76, 0x87, 0x37, 0x7c, 0xe0, 0x0b, 0x00,
2076	0x8e, 0xe9, 0x90, 0x26, 0xe7, 0xef, 0x92, 0x3b, 0x58, 0x9e, 0x60, 0x23, 0x2e, 0x77, 0xe9, 0xe7,
2077	0x08, 0xe6, 0xe2, 0xc5, 0x2e, 0xc0, 0xdd, 0x82, 0xc9, 0x2a, 0x1b, 0x55, 0x1b, 0xb4, 0xeb, 0xc1,
2078	0x5b, 0xec, 0x9f, 0x27, 0x65, 0xa8, 0xfa, 0x8e, 0xb2, 0x82, 0xf8, 0x07, 0x04, 0x0b, 0x29, 0x25,
2079	0x25, 0x90, 0x3e, 0x82, 0xd9, 0x00, 0xa9, 0x2a, 0x6a, 0xd9, 0x43, 0xfc, 0xa5, 0xa1, 0x32, 0xbb,
2080	0x7c, 0xb4, 0x1a, 0x77, 0x9f, 0x75, 0x88, 0xc3, 0xb9, 0x1d, 0x84, 0x58, 0x63, 0xa3, 0xea, 0x3b,
2081	0x66, 0xa5, 0x7f, 0x88, 0xfd, 0xd9, 0x65, 0xd0, 0x7c, 0x47, 0x59, 0x41, 0xdc, 0x80, 0xa3, 0x77,
2082	0xa8, 0x97, 0x9e, 0x5e, 0xe5, 0xdd, 0x80, 0xe7, 0x0d, 0xa2, 0xd3, 0xbd, 0xd6, 0x1d, 0x9b, 0x24,
2083	0x3d, 0x84, 0xd9, 0x3b, 0x34, 0xd8, 0x32, 0xcf, 0xe7, 0xcd, 0x88, 0xcf, 0x3d, 0xf4, 0x3e, 0xee,
2084	0xb5, 0x02, 0xf9, 0xb0, 0x57, 0x6f, 0xef, 0x84, 0xf3, 0xb5, 0x88, 0xf3, 0x2f, 0x33, 0xe7, 0xcb,
2085	0x70, 0x61, 0xa0, 0x73, 0xcf, 0x0d, 0x5f, 0xe3, 0x9b, 0x0c, 0xf9, 0x46, 0xbb, 0xd2, 0xd4, 0xaa,
2086	0x21, 0xe4, 0xd9, 0x38, 0xe7, 0x61, 0x09, 0xf6, 0x72, 0xb4, 0xb0, 0x04, 0xf3, 0xb9, 0xd7, 0xdf,
2087	0x23, 0x38, 0x76, 0xdb, 0xa2, 0xc4, 0xa1, 0xb1, 0x2d, 0xcc, 0xe0, 0x42, 0xb2, 0x04, 0x93, 0x5e,
2088	0x8b, 0x52, 0xb5, 0x1a, 0xcf, 0x2e, 0xb7, 0xbd, 0xe5, 0xca, 0x13, 0xa2, 0x17, 0xdd, 0xab, 0xe1,
2089	0xaf, 0xc0, 0xb8, 0x67, 0xc4, 0x92, 0x6b, 0x40, 0x1b, 0xe3, 0xf3, 0x0f, 0x89, 0xf9, 0xd2, 0x0f,
2090	0x72, 0x30, 0xc7, 0xe1, 0xf7, 0xe4, 0xcb, 0xbe, 0xbb, 0xff, 0x8b, 0x70, 0x38, 0xd4, 0x1a, 0xa2,
2091	0x04, 0x26, 0xfd, 0x92, 0xbf, 0x57, 0xc3, 0xab, 0x00, 0x81, 0xa1, 0x20, 0x31, 0xa0, 0xd9, 0x89,
2092	0x30, 0xf8, 0x5e, 0xb0, 0x02, 0x0b, 0x76, 0x43, 0x6b, 0xa9, 0x9a, 0xa1, 0x39, 0x1a, 0x69, 0x7a,
2093	0x9d, 0x48, 0xad, 0xba, 0xe4, 0x34, 0xd3, 0x60, 0x87, 0xc3, 0x78, 0x39, 0xef, 0x1a, 0xdd, 0xe3,
2094	0x36, 0x22, 0x3d, 0x6e, 0x0b, 0x0b, 0x77, 0x2b, 0x17, 0x62, 0xb1, 0x88, 0x65, 0x79, 0x06, 0x17,
2095	0x88, 0xaf, 0x03, 0xee, 0xed, 0x97, 0x2c, 0x32, 0xc3, 0xb6, 0x4b, 0x4e, 0xfd, 0x48, 0xbc, 0x67,
2096	0x4a, 0xbf, 0xca, 0xc1, 0x02, 0xcf, 0xce, 0x67, 0x08, 0xbf, 0x02, 0x13, 0xa4, 0x59, 0x37, 0x2d,
2097	0xcd, 0xd9, 0xd6, 0x19, 0xea, 0xe9, 0xe2, 0xad, 0xd1, 0xae, 0x2f, 0x8a, 0xe7, 0x46, 0x6c, 0xa5,
2098	0xef, 0xd6, 0xbd, 0x13, 0x04, 0x9d, 0x39, 0x38, 0xf3, 0x73, 0xe5, 0x09, 0xbf, 0xfb, 0x62, 0x19,
2099	0x66, 0x2d, 0x9b, 0xa8, 0x84, 0xda, 0xea, 0x8e, 0x45, 0x5a, 0x2d, 0x5a, 0x63, 0xb9, 0xe3, 0x6e,
2100	0xf2, 0xd4, 0xdd, 0xe7, 0xca, 0x47, 0x2c, 0x9b, 0x28, 0xd4, 0x7e, 0xc2, 0x3f, 0xb9, 0xf9, 0x32,
2101	0x07, 0xc7, 0x42, 0x86, 0xaa, 0x4e, 0x1c, 0x6a, 0x69, 0xa4, 0x29, 0xfd, 0x09, 0x79, 0x05, 0xd0,
2102	0xd3, 0x19, 0xb2, 0x28, 0x80, 0x80, 0x48, 0xbc, 0x00, 0x7c, 0x2e, 0xbc, 0x00, 0x42, 0x8c, 0xfb,
2103	0x15, 0x80, 0x0f, 0x32, 0x1e, 0x11, 0xe9, 0x67, 0x08, 0xe6, 0x1e, 0xb5, 0x6a, 0x49, 0x95, 0x1c,
2104	0xad, 0x2f, 0x34, 0x52, 0x7d, 0x7d, 0x15, 0x26, 0xdb, 0xcc, 0x3b, 0x7b, 0x8c, 0x89, 0x84, 0xcd,
2105	0x7b, 0x4e, 0xbc, 0xf7, 0x5a, 0xe1, 0x35, 0xf7, 0xbd, 0x76, 0x9f, 0xd8, 0x0d, 0xee, 0x00, 0xf8,
2106	0x1c, 0x77, 0x40, 0xfa, 0x1d, 0x82, 0x85, 0x18, 0xc0, 0x58, 0x7e, 0x26, 0xd7, 0x06, 0xda, 0x7f,
2107	0x6d, 0x64, 0x80, 0xfe, 0xa7, 0x08, 0xa6, 0x5f, 0x35, 0x98, 0x63, 0x0f, 0xee, 0x42, 0xe4, 0xe4,
2108	0x98, 0x60, 0xd9, 0x71, 0x00, 0xd0, 0x32, 0x3f, 0x19, 0xf0, 0x39, 0x98, 0x68, 0x35, 0x89, 0x66,
2109	0x38, 0xf4, 0x3d, 0x87, 0xad, 0x38, 0x25, 0x82, 0xea, 0x8f, 0xe2, 0x3b, 0xb0, 0x40, 0x6a, 0x35,
2110	0xcd, 0xed, 0x3e, 0xa4, 0xa9, 0x92, 0xb6, 0xb3, 0x4d, 0x0d, 0x47, 0xab, 0x12, 0x87, 0xd6, 0xd4,
2111	0x1a, 0x71, 0x08, 0x4b, 0x85, 0x29, 0x7e, 0xa3, 0x3d, 0x15, 0x58, 0x2a, 0x61, 0xc3, 0x35, 0xe2,
2112	0x10, 0xf7, 0x9e, 0x36, 0xbd, 0x46, 0x23, 0xe8, 0xf6, 0x77, 0xdc, 0xe3, 0x25, 0x80, 0xaa, 0xd6,
2113	0xda, 0xa6, 0x56, 0x1c, 0x7e, 0x68, 0x38, 0x3b, 0xfc, 0x3f, 0x46, 0x70, 0x5c, 0xb1, 0xbb, 0xba,
2114	0x4e, 0x1d, 0x4b, 0xab, 0x3e, 0xd0, 0xea, 0xd9, 0x5e, 0x2c, 0xf0, 0x35, 0x18, 0xab, 0x69, 0x75,
2115	0x6a, 0x3b, 0xa2, 0xb8, 0x4e, 0x25, 0x66, 0xd3, 0x1a, 0x33, 0xe1, 0x34, 0x85, 0xbd, 0xf4, 0x21,
2116	0x82, 0xf9, 0x00, 0x59, 0x2c, 0xc6, 0xd9, 0x80, 0x8b, 0x86, 0xfa, 0x40, 0x62, 0xa8, 0x25, 0x19,
2117	0x66, 0xfc, 0xc5, 0xc5, 0x0d, 0xf6, 0x74, 0x38, 0xc1, 0x5c, 0x08, 0x53, 0xa1, 0xdc, 0x92, 0x5e,
2118	0x85, 0x19, 0x3f, 0x5f, 0xc5, 0x04, 0x1c, 0x86, 0x2b, 0x16, 0x5f, 0xec, 0xdd, 0xe7, 0xc8, 0xba,
2119	0x57, 0x61, 0x2e, 0xbe, 0x31, 0xc1, 0xf2, 0xb6, 0x56, 0x37, 0x88, 0xd3, 0xb6, 0xa8, 0xb7, 0xbc,
2120	0x3f, 0x20, 0x5d, 0x87, 0x93, 0x09, 0x61, 0x1b, 0x0a, 0xf9, 0xc7, 0x08, 0x5e, 0x88, 0x35, 0x8a,
2121	0x0d, 0x4b, 0xd3, 0x89, 0x15, 0xef, 0x17, 0xfb, 0x4c, 0xf1, 0xab, 0x70, 0xbc, 0xb7, 0xdd, 0xc4,
2122	0xda, 0x34, 0x8e, 0xb7, 0x92, 0x7b, 0x35, 0x69, 0x0b, 0x16, 0xd7, 0xa8, 0xed, 0x58, 0x66, 0xf7,
2123	0xd9, 0xde, 0x86, 0xb7, 0x60, 0xb1, 0x4c, 0x6d, 0xc7, 0xb4, 0xe8, 0xb3, 0x5d, 0xe7, 0x6d, 0x18,
2124	0xe3, 0x99, 0x8f, 0xe7, 0x61, 0xcc, 0xde, 0x26, 0xc5, 0x2b, 0x57, 0xf9, 0xa6, 0xdc, 0x7d, 0xae,
2125	0x2c, 0x7e, 0x8b, 0x2f, 0x97, 0xaf, 0xbd, 0xc2, 0x53, 0x44, 0x7c, 0xb9, 0x7c, 0xed, 0x15, 0xf1,
2126	0xe5, 0xca, 0x4a, 0x91, 0x67, 0xae, 0xf8, 0x72, 0x65, 0xa5, 0xb8, 0x3a, 0xee, 0x15, 0x9d, 0xb4,
2127	0x09, 0x47, 0xbc, 0xcb, 0xed, 0x7d, 0xea, 0x10, 0xb7, 0x35, 0xe0, 0x25, 0x38, 0xbc, 0x6d, 0xeb,
2128	0x2a, 0xe9, 0x10, 0xad, 0x49, 0x2a, 0x4d, 0x4e, 0x62, 0xbc, 0x3c, 0xb5, 0x6d, 0xeb, 0x8a, 0x37,
2129	0xe6, 0x1a, 0xd1, 0x46, 0xd8, 0x28, 0xc7, 0x8d, 0x68, 0x23, 0x30, 0x2a, 0x7e, 0xff, 0x3c, 0x1c,
2130	0x5b, 0xa7, 0xdd, 0xfb, 0xc4, 0x20, 0x75, 0xaa, 0x53, 0xc3, 0x79, 0xc0, 0x05, 0x50, 0xfc, 0x0b,
2131	0x04, 0x53, 0xe1, 0xb7, 0x3f, 0xbe, 0x90, 0x58, 0xf6, 0x09, 0x72, 0x62, 0xfe, 0xe2, 0x10, 0x96,
2132	0x3c, 0x99, 0xa5, 0x9b, 0xbb, 0x8a, 0x38, 0xf0, 0xbf, 0xf7, 0xf7, 0x7f, 0x7e, 0x94, 0x2b, 0xe0,
2133	0x4b, 0x72, 0x67, 0x45, 0xfe, 0x0e, 0x1f, 0xba, 0xd9, 0xb2, 0xcc, 0x77, 0x68, 0xd5, 0xb1, 0xe5,
2134	0x65, 0xd9, 0xbf, 0xf8, 0xcb, 0xcb, 0x1f, 0xc8, 0xbe, 0x98, 0xf0, 0x6b, 0x04, 0xd3, 0x51, 0x15,
2135	0x00, 0x2f, 0xa7, 0x2e, 0xde, 0xa3, 0x0b, 0xe6, 0x5f, 0x1a, 0xca, 0x56, 0x40, 0x7d, 0x3d, 0x0a,
2136	0xf5, 0x06, 0xbe, 0x3e, 0x18, 0xaa, 0x8f, 0xd4, 0x45, 0x1d, 0x52, 0x18, 0x3e, 0x47, 0x31, 0xa9,
2137	0xd2, 0x7f, 0xbb, 0xaf, 0x0c, 0x86, 0x14, 0x53, 0xe6, 0xf2, 0xc5, 0xbd, 0x4c, 0x11, 0x64, 0xbe,
2138	0x1d, 0x25, 0xf3, 0x35, 0x7c, 0x7f, 0x4f, 0x64, 0x42, 0x5c, 0x22, 0xcc, 0x7c, 0x1a, 0xde, 0xc6,
2139	0x04, 0xda, 0x41, 0x9f, 0x8d, 0xe9, 0x11, 0xcf, 0xfa, 0x6c, 0x4c, 0xaf, 0x18, 0xb1, 0xff, 0x8d,
2140	0x09, 0xe9, 0x12, 0x3f, 0x42, 0x00, 0x81, 0xa2, 0x80, 0xcf, 0x27, 0xe2, 0xe8, 0x91, 0x1c, 0xf2,
2141	0x7d, 0x5f, 0x8d, 0xd2, 0x8d, 0x5d, 0x85, 0x35, 0x8b, 0x48, 0x8a, 0xbb, 0x03, 0x43, 0x80, 0x63,
2142	0x75, 0x18, 0xd6, 0x0e, 0x52, 0xea, 0x30, 0x41, 0xb4, 0xc8, 0x0f, 0xb8, 0xa6, 0x4a, 0x77, 0xc3,
2143	0xb8, 0xbc, 0xb0, 0x0d, 0x87, 0x2b, 0x9a, 0x00, 0xf8, 0xcf, 0x28, 0x2a, 0x9b, 0x78, 0x57, 0x47,
2144	0x79, 0x20, 0xd6, 0x68, 0x53, 0xce, 0x0f, 0x77, 0x53, 0x95, 0x36, 0xc3, 0xc8, 0xbd, 0xe4, 0x1d,
2145	0x01, 0x79, 0x6f, 0xe6, 0xba, 0x6c, 0xfe, 0xc8, 0x43, 0xee, 0x4b, 0x29, 0xe9, 0x21, 0x8f, 0xab,
2146	0x2d, 0x29, 0x21, 0xf7, 0xcd, 0xa4, 0xad, 0x30, 0xf0, 0x6f, 0xe0, 0x27, 0x99, 0x02, 0x97, 0x5b,
2147	0x3e, 0x62, 0x91, 0x35, 0x7e, 0xb5, 0xa4, 0x53, 0x88, 0xbf, 0xdc, 0xf2, 0x03, 0xde, 0x4e, 0xfb,
2148	0xca, 0x9a, 0xa0, 0xd2, 0xdc, 0x38, 0xff, 0x06, 0xc1, 0xe1, 0x88, 0xfc, 0x83, 0x2f, 0xa6, 0x6c,
2149	0x7f, 0xaf, 0x44, 0x34, 0xa0, 0xe4, 0x36, 0x77, 0x95, 0x53, 0xbc, 0x01, 0x5c, 0x0a, 0xa9, 0x40,
2150	0xfe, 0xbf, 0x19, 0xf6, 0x6b, 0xd2, 0x9e, 0x0e, 0x9b, 0x92, 0x2f, 0x15, 0xe1, 0xbf, 0x20, 0x98,
2151	0x89, 0x89, 0x1d, 0xf8, 0xa5, 0x3e, 0xd0, 0xf7, 0x5c, 0x99, 0xe6, 0xae, 0x72, 0x46, 0xc0, 0x8f,
2152	0xa8, 0x40, 0xa1, 0x5f, 0x8c, 0xc2, 0x1d, 0x69, 0xf4, 0x43, 0xa8, 0x14, 0x7a, 0xd7, 0xe2, 0xff,
2153	0xa1, 0x1e, 0x29, 0xcb, 0xab, 0xe1, 0xe2, 0x30, 0xc4, 0x46, 0x2b, 0xe3, 0x0f, 0xd1, 0xae, 0x72,
2154	0xb2, 0x97, 0xa7, 0xb8, 0x4d, 0x32, 0x86, 0x55, 0x29, 0xdb, 0x93, 0xa9, 0x94, 0xf0, 0x4a, 0xc6,
2155	0xff, 0x40, 0x30, 0x97, 0xac, 0xfe, 0xa4, 0xb0, 0xef, 0x2b, 0x15, 0x0d, 0xcb, 0x5e, 0xe5, 0x4d,
2156	0x40, 0x7a, 0x98, 0x2d, 0x41, 0x5e, 0x63, 0x25, 0xb4, 0x1c, 0x4a, 0xd3, 0xa0, 0x0f, 0xf4, 0x4b,
2157	0xd3, 0x3d, 0xb7, 0x82, 0x50, 0x9a, 0x46, 0xb4, 0x9a, 0xd0, 0xaf, 0x11, 0xd3, 0x34, 0x68, 0x14,
2158	0xa5, 0x90, 0xba, 0x83, 0xff, 0x8a, 0x60, 0x26, 0xf6, 0xba, 0x49, 0x61, 0x94, 0xac, 0xe6, 0x0c,
2159	0x2c, 0xbc, 0x77, 0x77, 0x95, 0xb9, 0x20, 0x41, 0x2e, 0x85, 0x74, 0x0f, 0x46, 0xa4, 0x5c, 0x5c,
2160	0x63, 0x44, 0x02, 0x93, 0xc2, 0x28, 0xe7, 0x65, 0xa4, 0xf4, 0x3e, 0xca, 0xf5, 0x68, 0x4f, 0xfd,
2161	0x93, 0xaf, 0xaf, 0x0e, 0x34, 0x6c, 0xf2, 0x7d, 0x8c, 0x76, 0x95, 0xc5, 0xde, 0x52, 0xe8, 0x61,
2162	0xdc, 0x29, 0xbe, 0x1d, 0x63, 0xec, 0x99, 0x16, 0xb2, 0x3a, 0xb6, 0x12, 0x4b, 0xf2, 0x13, 0x04,
2163	0x87, 0xc4, 0x13, 0x1c, 0x2f, 0x25, 0x52, 0x8a, 0x0a, 0x4a, 0xf9, 0x17, 0xfa, 0x1b, 0x05, 0xf7,
2164	0xde, 0x69, 0x17, 0xf7, 0x25, 0xff, 0xc5, 0x2c, 0x12, 0x74, 0x75, 0xd4, 0x93, 0x78, 0xf9, 0x83,
2165	0x12, 0xe5, 0x8b, 0xb8, 0x25, 0xe7, 0xc2, 0x16, 0x0f, 0xf6, 0x14, 0xd8, 0x51, 0x15, 0x24, 0x05,
2166	0x76, 0xec, 0xcd, 0xef, 0xc2, 0x9e, 0x61, 0xb0, 0x03, 0x71, 0x81, 0xe1, 0x7e, 0x4d, 0x52, 0x46,
2167	0xbe, 0xb4, 0x95, 0x6a, 0xd4, 0x87, 0xfd, 0x14, 0xc1, 0x74, 0x54, 0xa9, 0x48, 0xb9, 0xae, 0x27,
2168	0xea, 0x4c, 0x29, 0xd7, 0xf5, 0x64, 0xe9, 0x43, 0x6a, 0xef, 0x2a, 0x93, 0x8c, 0x0b, 0x7f, 0xdf,
2169	0x32, 0x1e, 0x44, 0xda, 0xcc, 0xf4, 0x26, 0x54, 0x22, 0x91, 0xb5, 0x5d, 0x8a, 0xff, 0x42, 0x70,
2170	0xb4, 0x47, 0x54, 0xc1, 0x2f, 0x0f, 0x40, 0x1e, 0xdb, 0xad, 0xc2, 0xb0, 0xe6, 0x82, 0xeb, 0x77,
2171	0x53, 0xf6, 0xad, 0x26, 0xa9, 0xcf, 0x8a, 0xef, 0x5a, 0xb0, 0xab, 0xff, 0xee, 0x15, 0x8d, 0xa3,
2172	0x5a, 0x10, 0xbe, 0x3e, 0x4c, 0x83, 0x49, 0xd4, 0x8f, 0x06, 0x76, 0xd2, 0xce, 0xae, 0x92, 0xe7,
2173	0xd4, 0x93, 0x64, 0x22, 0x16, 0x85, 0x07, 0xd2, 0x9b, 0xa3, 0x67, 0x2f, 0x6f, 0x54, 0x51, 0x6c,
2174	0x2e, 0xe9, 0xcf, 0x11, 0x9c, 0x48, 0x51, 0x98, 0xf0, 0xe5, 0x94, 0x62, 0xeb, 0xa7, 0x47, 0x0d,
2175	0xdb, 0x50, 0xeb, 0xe1, 0x6b, 0xf1, 0x5b, 0xd2, 0xa3, 0x6c, 0xf7, 0xb7, 0xc6, 0x31, 0x7a, 0x04,
2176	0x53, 0xa4, 0xad, 0x14, 0x82, 0xfd, 0x85, 0xb0, 0x2f, 0x06, 0x41, 0x8b, 0x63, 0x2c, 0xa1, 0xe5,
2177	0xbc, 0xf3, 0xa9, 0x72, 0x22, 0x45, 0x85, 0xfb, 0x9b, 0xf2, 0x64, 0xdb, 0x71, 0x5a, 0x76, 0x49,
2178	0x96, 0x77, 0x76, 0x76, 0xe2, 0x12, 0x1d, 0x69, 0x3b, 0xdb, 0xfc, 0x4f, 0xe4, 0x5e, 0x6e, 0x35,
2179	0x89, 0xb3, 0x65, 0x5a, 0xfa, 0xa5, 0xa1, 0xcc, 0x1b, 0xba, 0xbd, 0xfa, 0x43, 0x04, 0x27, 0xaa,
2180	0xa6, 0x9e, 0x14, 0x8b, 0xd5, 0xf1, 0x75, 0xdd, 0xde, 0xb0, 0x4c, 0xc7, 0xdc, 0x40, 0x6f, 0x5d,
2181	0x15, 0x06, 0x75, 0xb3, 0x49, 0x8c, 0x7a, 0xc1, 0xb4, 0xea, 0x72, 0x9d, 0x1a, 0xec, 0x7f, 0x41,
2182	0xe4, 0x60, 0x81, 0xc8, 0x5f, 0xea, 0xdd, 0x68, 0xe8, 0xf6, 0x7f, 0x10, 0xfa, 0x65, 0x6e, 0xf6,
2183	0x0e, 0x9f, 0x7b, 0x9b, 0x39, 0x5f, 0xd7, 0xed, 0xc2, 0xe3, 0x95, 0x4f, 0xbd, 0xd1, 0x4d, 0x36,
2184	0xba, 0xb9, 0xae, 0xdb, 0x9b, 0x8f, 0x57, 0x2a, 0x63, 0xcc, 0xe3, 0xe5, 0xff, 0x07, 0x00, 0x00,
2185	0xff, 0xff, 0x97, 0x2c, 0x57, 0x2d, 0xa5, 0x28, 0x00, 0x00,
2186}
2187
2188// Reference imports to suppress errors if they are not otherwise used.
2189var _ context.Context
2190var _ grpc.ClientConnInterface
2191
2192// This is a compile-time assertion to ensure that this generated file
2193// is compatible with the grpc package it is being compiled against.
2194const _ = grpc.SupportPackageIsVersion6
2195
2196// KeyManagementServiceClient is the client API for KeyManagementService service.
2197//
2198// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
2199type KeyManagementServiceClient interface {
2200	// Lists [KeyRings][google.cloud.kms.v1.KeyRing].
2201	ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error)
2202	// Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
2203	ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error)
2204	// Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
2205	ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error)
2206	// Lists [ImportJobs][google.cloud.kms.v1.ImportJob].
2207	ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error)
2208	// Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
2209	GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error)
2210	// Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its
2211	// [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2212	GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2213	// Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2214	GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2215	// Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
2216	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2217	// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or
2218	// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
2219	GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error)
2220	// Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob].
2221	GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error)
2222	// Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location.
2223	CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error)
2224	// Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2225	//
2226	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
2227	// [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
2228	// are required.
2229	CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2230	// Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2231	//
2232	// The server will assign the next sequential id. If unset,
2233	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2234	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
2235	CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2236	// Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the
2237	// wrapped key material provided in the request.
2238	//
2239	// The version ID will be assigned the next sequential id within the
2240	// [CryptoKey][google.cloud.kms.v1.CryptoKey].
2241	ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2242	// Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2243	//
2244	// [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required.
2245	CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error)
2246	// Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2247	UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2248	// Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata.
2249	//
2250	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
2251	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and
2252	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this
2253	// method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
2254	// move between other states.
2255	UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2256	// Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
2257	// The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2258	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2259	Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error)
2260	// Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2261	// must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2262	Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error)
2263	// Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2264	// ASYMMETRIC_SIGN, producing a signature that can be verified with the public
2265	// key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
2266	AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error)
2267	// Decrypts data that was encrypted with a public key retrieved from
2268	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
2269	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
2270	AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error)
2271	// Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
2272	//
2273	// Returns an error if called on an asymmetric key.
2274	UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2275	// Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
2276	//
2277	// Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2278	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2279	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
2280	// hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2281	// will be changed to
2282	// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
2283	// material will be irrevocably destroyed.
2284	//
2285	// Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
2286	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
2287	DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2288	// Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
2289	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2290	// state.
2291	//
2292	// Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2293	// will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
2294	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
2295	RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2296}
2297
2298type keyManagementServiceClient struct {
2299	cc grpc.ClientConnInterface
2300}
2301
2302func NewKeyManagementServiceClient(cc grpc.ClientConnInterface) KeyManagementServiceClient {
2303	return &keyManagementServiceClient{cc}
2304}
2305
2306func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) {
2307	out := new(ListKeyRingsResponse)
2308	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...)
2309	if err != nil {
2310		return nil, err
2311	}
2312	return out, nil
2313}
2314
2315func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) {
2316	out := new(ListCryptoKeysResponse)
2317	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...)
2318	if err != nil {
2319		return nil, err
2320	}
2321	return out, nil
2322}
2323
2324func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) {
2325	out := new(ListCryptoKeyVersionsResponse)
2326	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...)
2327	if err != nil {
2328		return nil, err
2329	}
2330	return out, nil
2331}
2332
2333func (c *keyManagementServiceClient) ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) {
2334	out := new(ListImportJobsResponse)
2335	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", in, out, opts...)
2336	if err != nil {
2337		return nil, err
2338	}
2339	return out, nil
2340}
2341
2342func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) {
2343	out := new(KeyRing)
2344	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...)
2345	if err != nil {
2346		return nil, err
2347	}
2348	return out, nil
2349}
2350
2351func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2352	out := new(CryptoKey)
2353	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...)
2354	if err != nil {
2355		return nil, err
2356	}
2357	return out, nil
2358}
2359
2360func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2361	out := new(CryptoKeyVersion)
2362	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...)
2363	if err != nil {
2364		return nil, err
2365	}
2366	return out, nil
2367}
2368
2369func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) {
2370	out := new(PublicKey)
2371	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...)
2372	if err != nil {
2373		return nil, err
2374	}
2375	return out, nil
2376}
2377
2378func (c *keyManagementServiceClient) GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) {
2379	out := new(ImportJob)
2380	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetImportJob", in, out, opts...)
2381	if err != nil {
2382		return nil, err
2383	}
2384	return out, nil
2385}
2386
2387func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) {
2388	out := new(KeyRing)
2389	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...)
2390	if err != nil {
2391		return nil, err
2392	}
2393	return out, nil
2394}
2395
2396func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2397	out := new(CryptoKey)
2398	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...)
2399	if err != nil {
2400		return nil, err
2401	}
2402	return out, nil
2403}
2404
2405func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2406	out := new(CryptoKeyVersion)
2407	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...)
2408	if err != nil {
2409		return nil, err
2410	}
2411	return out, nil
2412}
2413
2414func (c *keyManagementServiceClient) ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2415	out := new(CryptoKeyVersion)
2416	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", in, out, opts...)
2417	if err != nil {
2418		return nil, err
2419	}
2420	return out, nil
2421}
2422
2423func (c *keyManagementServiceClient) CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) {
2424	out := new(ImportJob)
2425	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", in, out, opts...)
2426	if err != nil {
2427		return nil, err
2428	}
2429	return out, nil
2430}
2431
2432func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2433	out := new(CryptoKey)
2434	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...)
2435	if err != nil {
2436		return nil, err
2437	}
2438	return out, nil
2439}
2440
2441func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2442	out := new(CryptoKeyVersion)
2443	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...)
2444	if err != nil {
2445		return nil, err
2446	}
2447	return out, nil
2448}
2449
2450func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) {
2451	out := new(EncryptResponse)
2452	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...)
2453	if err != nil {
2454		return nil, err
2455	}
2456	return out, nil
2457}
2458
2459func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) {
2460	out := new(DecryptResponse)
2461	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...)
2462	if err != nil {
2463		return nil, err
2464	}
2465	return out, nil
2466}
2467
2468func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) {
2469	out := new(AsymmetricSignResponse)
2470	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...)
2471	if err != nil {
2472		return nil, err
2473	}
2474	return out, nil
2475}
2476
2477func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) {
2478	out := new(AsymmetricDecryptResponse)
2479	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...)
2480	if err != nil {
2481		return nil, err
2482	}
2483	return out, nil
2484}
2485
2486func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2487	out := new(CryptoKey)
2488	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...)
2489	if err != nil {
2490		return nil, err
2491	}
2492	return out, nil
2493}
2494
2495func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2496	out := new(CryptoKeyVersion)
2497	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...)
2498	if err != nil {
2499		return nil, err
2500	}
2501	return out, nil
2502}
2503
2504func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2505	out := new(CryptoKeyVersion)
2506	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...)
2507	if err != nil {
2508		return nil, err
2509	}
2510	return out, nil
2511}
2512
2513// KeyManagementServiceServer is the server API for KeyManagementService service.
2514type KeyManagementServiceServer interface {
2515	// Lists [KeyRings][google.cloud.kms.v1.KeyRing].
2516	ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error)
2517	// Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
2518	ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error)
2519	// Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
2520	ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error)
2521	// Lists [ImportJobs][google.cloud.kms.v1.ImportJob].
2522	ListImportJobs(context.Context, *ListImportJobsRequest) (*ListImportJobsResponse, error)
2523	// Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
2524	GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error)
2525	// Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its
2526	// [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2527	GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error)
2528	// Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2529	GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2530	// Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
2531	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2532	// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or
2533	// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
2534	GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error)
2535	// Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob].
2536	GetImportJob(context.Context, *GetImportJobRequest) (*ImportJob, error)
2537	// Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location.
2538	CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error)
2539	// Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2540	//
2541	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
2542	// [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
2543	// are required.
2544	CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error)
2545	// Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2546	//
2547	// The server will assign the next sequential id. If unset,
2548	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2549	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
2550	CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2551	// Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the
2552	// wrapped key material provided in the request.
2553	//
2554	// The version ID will be assigned the next sequential id within the
2555	// [CryptoKey][google.cloud.kms.v1.CryptoKey].
2556	ImportCryptoKeyVersion(context.Context, *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2557	// Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2558	//
2559	// [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required.
2560	CreateImportJob(context.Context, *CreateImportJobRequest) (*ImportJob, error)
2561	// Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2562	UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error)
2563	// Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata.
2564	//
2565	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
2566	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and
2567	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this
2568	// method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
2569	// move between other states.
2570	UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2571	// Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
2572	// The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2573	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2574	Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error)
2575	// Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2576	// must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2577	Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error)
2578	// Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2579	// ASYMMETRIC_SIGN, producing a signature that can be verified with the public
2580	// key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
2581	AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error)
2582	// Decrypts data that was encrypted with a public key retrieved from
2583	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
2584	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
2585	AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error)
2586	// Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
2587	//
2588	// Returns an error if called on an asymmetric key.
2589	UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error)
2590	// Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
2591	//
2592	// Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2593	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2594	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
2595	// hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2596	// will be changed to
2597	// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
2598	// material will be irrevocably destroyed.
2599	//
2600	// Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
2601	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
2602	DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2603	// Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
2604	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2605	// state.
2606	//
2607	// Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2608	// will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
2609	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
2610	RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2611}
2612
2613// UnimplementedKeyManagementServiceServer can be embedded to have forward compatible implementations.
2614type UnimplementedKeyManagementServiceServer struct {
2615}
2616
2617func (*UnimplementedKeyManagementServiceServer) ListKeyRings(ctx context.Context, req *ListKeyRingsRequest) (*ListKeyRingsResponse, error) {
2618	return nil, status.Errorf(codes.Unimplemented, "method ListKeyRings not implemented")
2619}
2620func (*UnimplementedKeyManagementServiceServer) ListCryptoKeys(ctx context.Context, req *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) {
2621	return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeys not implemented")
2622}
2623func (*UnimplementedKeyManagementServiceServer) ListCryptoKeyVersions(ctx context.Context, req *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) {
2624	return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeyVersions not implemented")
2625}
2626func (*UnimplementedKeyManagementServiceServer) ListImportJobs(ctx context.Context, req *ListImportJobsRequest) (*ListImportJobsResponse, error) {
2627	return nil, status.Errorf(codes.Unimplemented, "method ListImportJobs not implemented")
2628}
2629func (*UnimplementedKeyManagementServiceServer) GetKeyRing(ctx context.Context, req *GetKeyRingRequest) (*KeyRing, error) {
2630	return nil, status.Errorf(codes.Unimplemented, "method GetKeyRing not implemented")
2631}
2632func (*UnimplementedKeyManagementServiceServer) GetCryptoKey(ctx context.Context, req *GetCryptoKeyRequest) (*CryptoKey, error) {
2633	return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKey not implemented")
2634}
2635func (*UnimplementedKeyManagementServiceServer) GetCryptoKeyVersion(ctx context.Context, req *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2636	return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKeyVersion not implemented")
2637}
2638func (*UnimplementedKeyManagementServiceServer) GetPublicKey(ctx context.Context, req *GetPublicKeyRequest) (*PublicKey, error) {
2639	return nil, status.Errorf(codes.Unimplemented, "method GetPublicKey not implemented")
2640}
2641func (*UnimplementedKeyManagementServiceServer) GetImportJob(ctx context.Context, req *GetImportJobRequest) (*ImportJob, error) {
2642	return nil, status.Errorf(codes.Unimplemented, "method GetImportJob not implemented")
2643}
2644func (*UnimplementedKeyManagementServiceServer) CreateKeyRing(ctx context.Context, req *CreateKeyRingRequest) (*KeyRing, error) {
2645	return nil, status.Errorf(codes.Unimplemented, "method CreateKeyRing not implemented")
2646}
2647func (*UnimplementedKeyManagementServiceServer) CreateCryptoKey(ctx context.Context, req *CreateCryptoKeyRequest) (*CryptoKey, error) {
2648	return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKey not implemented")
2649}
2650func (*UnimplementedKeyManagementServiceServer) CreateCryptoKeyVersion(ctx context.Context, req *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2651	return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKeyVersion not implemented")
2652}
2653func (*UnimplementedKeyManagementServiceServer) ImportCryptoKeyVersion(ctx context.Context, req *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2654	return nil, status.Errorf(codes.Unimplemented, "method ImportCryptoKeyVersion not implemented")
2655}
2656func (*UnimplementedKeyManagementServiceServer) CreateImportJob(ctx context.Context, req *CreateImportJobRequest) (*ImportJob, error) {
2657	return nil, status.Errorf(codes.Unimplemented, "method CreateImportJob not implemented")
2658}
2659func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKey(ctx context.Context, req *UpdateCryptoKeyRequest) (*CryptoKey, error) {
2660	return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKey not implemented")
2661}
2662func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyVersion(ctx context.Context, req *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2663	return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyVersion not implemented")
2664}
2665func (*UnimplementedKeyManagementServiceServer) Encrypt(ctx context.Context, req *EncryptRequest) (*EncryptResponse, error) {
2666	return nil, status.Errorf(codes.Unimplemented, "method Encrypt not implemented")
2667}
2668func (*UnimplementedKeyManagementServiceServer) Decrypt(ctx context.Context, req *DecryptRequest) (*DecryptResponse, error) {
2669	return nil, status.Errorf(codes.Unimplemented, "method Decrypt not implemented")
2670}
2671func (*UnimplementedKeyManagementServiceServer) AsymmetricSign(ctx context.Context, req *AsymmetricSignRequest) (*AsymmetricSignResponse, error) {
2672	return nil, status.Errorf(codes.Unimplemented, "method AsymmetricSign not implemented")
2673}
2674func (*UnimplementedKeyManagementServiceServer) AsymmetricDecrypt(ctx context.Context, req *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) {
2675	return nil, status.Errorf(codes.Unimplemented, "method AsymmetricDecrypt not implemented")
2676}
2677func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) {
2678	return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyPrimaryVersion not implemented")
2679}
2680func (*UnimplementedKeyManagementServiceServer) DestroyCryptoKeyVersion(ctx context.Context, req *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2681	return nil, status.Errorf(codes.Unimplemented, "method DestroyCryptoKeyVersion not implemented")
2682}
2683func (*UnimplementedKeyManagementServiceServer) RestoreCryptoKeyVersion(ctx context.Context, req *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2684	return nil, status.Errorf(codes.Unimplemented, "method RestoreCryptoKeyVersion not implemented")
2685}
2686
2687func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) {
2688	s.RegisterService(&_KeyManagementService_serviceDesc, srv)
2689}
2690
2691func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2692	in := new(ListKeyRingsRequest)
2693	if err := dec(in); err != nil {
2694		return nil, err
2695	}
2696	if interceptor == nil {
2697		return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in)
2698	}
2699	info := &grpc.UnaryServerInfo{
2700		Server:     srv,
2701		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings",
2702	}
2703	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2704		return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest))
2705	}
2706	return interceptor(ctx, in, info, handler)
2707}
2708
2709func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2710	in := new(ListCryptoKeysRequest)
2711	if err := dec(in); err != nil {
2712		return nil, err
2713	}
2714	if interceptor == nil {
2715		return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in)
2716	}
2717	info := &grpc.UnaryServerInfo{
2718		Server:     srv,
2719		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys",
2720	}
2721	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2722		return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest))
2723	}
2724	return interceptor(ctx, in, info, handler)
2725}
2726
2727func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2728	in := new(ListCryptoKeyVersionsRequest)
2729	if err := dec(in); err != nil {
2730		return nil, err
2731	}
2732	if interceptor == nil {
2733		return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in)
2734	}
2735	info := &grpc.UnaryServerInfo{
2736		Server:     srv,
2737		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions",
2738	}
2739	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2740		return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest))
2741	}
2742	return interceptor(ctx, in, info, handler)
2743}
2744
2745func _KeyManagementService_ListImportJobs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2746	in := new(ListImportJobsRequest)
2747	if err := dec(in); err != nil {
2748		return nil, err
2749	}
2750	if interceptor == nil {
2751		return srv.(KeyManagementServiceServer).ListImportJobs(ctx, in)
2752	}
2753	info := &grpc.UnaryServerInfo{
2754		Server:     srv,
2755		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListImportJobs",
2756	}
2757	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2758		return srv.(KeyManagementServiceServer).ListImportJobs(ctx, req.(*ListImportJobsRequest))
2759	}
2760	return interceptor(ctx, in, info, handler)
2761}
2762
2763func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2764	in := new(GetKeyRingRequest)
2765	if err := dec(in); err != nil {
2766		return nil, err
2767	}
2768	if interceptor == nil {
2769		return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in)
2770	}
2771	info := &grpc.UnaryServerInfo{
2772		Server:     srv,
2773		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing",
2774	}
2775	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2776		return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest))
2777	}
2778	return interceptor(ctx, in, info, handler)
2779}
2780
2781func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2782	in := new(GetCryptoKeyRequest)
2783	if err := dec(in); err != nil {
2784		return nil, err
2785	}
2786	if interceptor == nil {
2787		return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in)
2788	}
2789	info := &grpc.UnaryServerInfo{
2790		Server:     srv,
2791		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey",
2792	}
2793	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2794		return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest))
2795	}
2796	return interceptor(ctx, in, info, handler)
2797}
2798
2799func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2800	in := new(GetCryptoKeyVersionRequest)
2801	if err := dec(in); err != nil {
2802		return nil, err
2803	}
2804	if interceptor == nil {
2805		return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in)
2806	}
2807	info := &grpc.UnaryServerInfo{
2808		Server:     srv,
2809		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion",
2810	}
2811	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2812		return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest))
2813	}
2814	return interceptor(ctx, in, info, handler)
2815}
2816
2817func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2818	in := new(GetPublicKeyRequest)
2819	if err := dec(in); err != nil {
2820		return nil, err
2821	}
2822	if interceptor == nil {
2823		return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in)
2824	}
2825	info := &grpc.UnaryServerInfo{
2826		Server:     srv,
2827		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey",
2828	}
2829	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2830		return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest))
2831	}
2832	return interceptor(ctx, in, info, handler)
2833}
2834
2835func _KeyManagementService_GetImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2836	in := new(GetImportJobRequest)
2837	if err := dec(in); err != nil {
2838		return nil, err
2839	}
2840	if interceptor == nil {
2841		return srv.(KeyManagementServiceServer).GetImportJob(ctx, in)
2842	}
2843	info := &grpc.UnaryServerInfo{
2844		Server:     srv,
2845		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetImportJob",
2846	}
2847	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2848		return srv.(KeyManagementServiceServer).GetImportJob(ctx, req.(*GetImportJobRequest))
2849	}
2850	return interceptor(ctx, in, info, handler)
2851}
2852
2853func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2854	in := new(CreateKeyRingRequest)
2855	if err := dec(in); err != nil {
2856		return nil, err
2857	}
2858	if interceptor == nil {
2859		return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in)
2860	}
2861	info := &grpc.UnaryServerInfo{
2862		Server:     srv,
2863		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing",
2864	}
2865	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2866		return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest))
2867	}
2868	return interceptor(ctx, in, info, handler)
2869}
2870
2871func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2872	in := new(CreateCryptoKeyRequest)
2873	if err := dec(in); err != nil {
2874		return nil, err
2875	}
2876	if interceptor == nil {
2877		return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in)
2878	}
2879	info := &grpc.UnaryServerInfo{
2880		Server:     srv,
2881		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey",
2882	}
2883	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2884		return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest))
2885	}
2886	return interceptor(ctx, in, info, handler)
2887}
2888
2889func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2890	in := new(CreateCryptoKeyVersionRequest)
2891	if err := dec(in); err != nil {
2892		return nil, err
2893	}
2894	if interceptor == nil {
2895		return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in)
2896	}
2897	info := &grpc.UnaryServerInfo{
2898		Server:     srv,
2899		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion",
2900	}
2901	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2902		return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest))
2903	}
2904	return interceptor(ctx, in, info, handler)
2905}
2906
2907func _KeyManagementService_ImportCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2908	in := new(ImportCryptoKeyVersionRequest)
2909	if err := dec(in); err != nil {
2910		return nil, err
2911	}
2912	if interceptor == nil {
2913		return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, in)
2914	}
2915	info := &grpc.UnaryServerInfo{
2916		Server:     srv,
2917		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion",
2918	}
2919	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2920		return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, req.(*ImportCryptoKeyVersionRequest))
2921	}
2922	return interceptor(ctx, in, info, handler)
2923}
2924
2925func _KeyManagementService_CreateImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2926	in := new(CreateImportJobRequest)
2927	if err := dec(in); err != nil {
2928		return nil, err
2929	}
2930	if interceptor == nil {
2931		return srv.(KeyManagementServiceServer).CreateImportJob(ctx, in)
2932	}
2933	info := &grpc.UnaryServerInfo{
2934		Server:     srv,
2935		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateImportJob",
2936	}
2937	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2938		return srv.(KeyManagementServiceServer).CreateImportJob(ctx, req.(*CreateImportJobRequest))
2939	}
2940	return interceptor(ctx, in, info, handler)
2941}
2942
2943func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2944	in := new(UpdateCryptoKeyRequest)
2945	if err := dec(in); err != nil {
2946		return nil, err
2947	}
2948	if interceptor == nil {
2949		return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in)
2950	}
2951	info := &grpc.UnaryServerInfo{
2952		Server:     srv,
2953		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey",
2954	}
2955	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2956		return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest))
2957	}
2958	return interceptor(ctx, in, info, handler)
2959}
2960
2961func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2962	in := new(UpdateCryptoKeyVersionRequest)
2963	if err := dec(in); err != nil {
2964		return nil, err
2965	}
2966	if interceptor == nil {
2967		return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in)
2968	}
2969	info := &grpc.UnaryServerInfo{
2970		Server:     srv,
2971		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion",
2972	}
2973	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2974		return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest))
2975	}
2976	return interceptor(ctx, in, info, handler)
2977}
2978
2979func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2980	in := new(EncryptRequest)
2981	if err := dec(in); err != nil {
2982		return nil, err
2983	}
2984	if interceptor == nil {
2985		return srv.(KeyManagementServiceServer).Encrypt(ctx, in)
2986	}
2987	info := &grpc.UnaryServerInfo{
2988		Server:     srv,
2989		FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt",
2990	}
2991	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2992		return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest))
2993	}
2994	return interceptor(ctx, in, info, handler)
2995}
2996
2997func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2998	in := new(DecryptRequest)
2999	if err := dec(in); err != nil {
3000		return nil, err
3001	}
3002	if interceptor == nil {
3003		return srv.(KeyManagementServiceServer).Decrypt(ctx, in)
3004	}
3005	info := &grpc.UnaryServerInfo{
3006		Server:     srv,
3007		FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt",
3008	}
3009	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3010		return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest))
3011	}
3012	return interceptor(ctx, in, info, handler)
3013}
3014
3015func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3016	in := new(AsymmetricSignRequest)
3017	if err := dec(in); err != nil {
3018		return nil, err
3019	}
3020	if interceptor == nil {
3021		return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in)
3022	}
3023	info := &grpc.UnaryServerInfo{
3024		Server:     srv,
3025		FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign",
3026	}
3027	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3028		return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest))
3029	}
3030	return interceptor(ctx, in, info, handler)
3031}
3032
3033func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3034	in := new(AsymmetricDecryptRequest)
3035	if err := dec(in); err != nil {
3036		return nil, err
3037	}
3038	if interceptor == nil {
3039		return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in)
3040	}
3041	info := &grpc.UnaryServerInfo{
3042		Server:     srv,
3043		FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt",
3044	}
3045	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3046		return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest))
3047	}
3048	return interceptor(ctx, in, info, handler)
3049}
3050
3051func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3052	in := new(UpdateCryptoKeyPrimaryVersionRequest)
3053	if err := dec(in); err != nil {
3054		return nil, err
3055	}
3056	if interceptor == nil {
3057		return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in)
3058	}
3059	info := &grpc.UnaryServerInfo{
3060		Server:     srv,
3061		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion",
3062	}
3063	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3064		return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest))
3065	}
3066	return interceptor(ctx, in, info, handler)
3067}
3068
3069func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3070	in := new(DestroyCryptoKeyVersionRequest)
3071	if err := dec(in); err != nil {
3072		return nil, err
3073	}
3074	if interceptor == nil {
3075		return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in)
3076	}
3077	info := &grpc.UnaryServerInfo{
3078		Server:     srv,
3079		FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion",
3080	}
3081	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3082		return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest))
3083	}
3084	return interceptor(ctx, in, info, handler)
3085}
3086
3087func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3088	in := new(RestoreCryptoKeyVersionRequest)
3089	if err := dec(in); err != nil {
3090		return nil, err
3091	}
3092	if interceptor == nil {
3093		return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in)
3094	}
3095	info := &grpc.UnaryServerInfo{
3096		Server:     srv,
3097		FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion",
3098	}
3099	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3100		return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest))
3101	}
3102	return interceptor(ctx, in, info, handler)
3103}
3104
3105var _KeyManagementService_serviceDesc = grpc.ServiceDesc{
3106	ServiceName: "google.cloud.kms.v1.KeyManagementService",
3107	HandlerType: (*KeyManagementServiceServer)(nil),
3108	Methods: []grpc.MethodDesc{
3109		{
3110			MethodName: "ListKeyRings",
3111			Handler:    _KeyManagementService_ListKeyRings_Handler,
3112		},
3113		{
3114			MethodName: "ListCryptoKeys",
3115			Handler:    _KeyManagementService_ListCryptoKeys_Handler,
3116		},
3117		{
3118			MethodName: "ListCryptoKeyVersions",
3119			Handler:    _KeyManagementService_ListCryptoKeyVersions_Handler,
3120		},
3121		{
3122			MethodName: "ListImportJobs",
3123			Handler:    _KeyManagementService_ListImportJobs_Handler,
3124		},
3125		{
3126			MethodName: "GetKeyRing",
3127			Handler:    _KeyManagementService_GetKeyRing_Handler,
3128		},
3129		{
3130			MethodName: "GetCryptoKey",
3131			Handler:    _KeyManagementService_GetCryptoKey_Handler,
3132		},
3133		{
3134			MethodName: "GetCryptoKeyVersion",
3135			Handler:    _KeyManagementService_GetCryptoKeyVersion_Handler,
3136		},
3137		{
3138			MethodName: "GetPublicKey",
3139			Handler:    _KeyManagementService_GetPublicKey_Handler,
3140		},
3141		{
3142			MethodName: "GetImportJob",
3143			Handler:    _KeyManagementService_GetImportJob_Handler,
3144		},
3145		{
3146			MethodName: "CreateKeyRing",
3147			Handler:    _KeyManagementService_CreateKeyRing_Handler,
3148		},
3149		{
3150			MethodName: "CreateCryptoKey",
3151			Handler:    _KeyManagementService_CreateCryptoKey_Handler,
3152		},
3153		{
3154			MethodName: "CreateCryptoKeyVersion",
3155			Handler:    _KeyManagementService_CreateCryptoKeyVersion_Handler,
3156		},
3157		{
3158			MethodName: "ImportCryptoKeyVersion",
3159			Handler:    _KeyManagementService_ImportCryptoKeyVersion_Handler,
3160		},
3161		{
3162			MethodName: "CreateImportJob",
3163			Handler:    _KeyManagementService_CreateImportJob_Handler,
3164		},
3165		{
3166			MethodName: "UpdateCryptoKey",
3167			Handler:    _KeyManagementService_UpdateCryptoKey_Handler,
3168		},
3169		{
3170			MethodName: "UpdateCryptoKeyVersion",
3171			Handler:    _KeyManagementService_UpdateCryptoKeyVersion_Handler,
3172		},
3173		{
3174			MethodName: "Encrypt",
3175			Handler:    _KeyManagementService_Encrypt_Handler,
3176		},
3177		{
3178			MethodName: "Decrypt",
3179			Handler:    _KeyManagementService_Decrypt_Handler,
3180		},
3181		{
3182			MethodName: "AsymmetricSign",
3183			Handler:    _KeyManagementService_AsymmetricSign_Handler,
3184		},
3185		{
3186			MethodName: "AsymmetricDecrypt",
3187			Handler:    _KeyManagementService_AsymmetricDecrypt_Handler,
3188		},
3189		{
3190			MethodName: "UpdateCryptoKeyPrimaryVersion",
3191			Handler:    _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler,
3192		},
3193		{
3194			MethodName: "DestroyCryptoKeyVersion",
3195			Handler:    _KeyManagementService_DestroyCryptoKeyVersion_Handler,
3196		},
3197		{
3198			MethodName: "RestoreCryptoKeyVersion",
3199			Handler:    _KeyManagementService_RestoreCryptoKeyVersion_Handler,
3200		},
3201	},
3202	Streams:  []grpc.StreamDesc{},
3203	Metadata: "google/cloud/kms/v1/service.proto",
3204}
3205