1// Code generated by protoc-gen-go. DO NOT EDIT.
2// source: google/cloud/kms/v1/service.proto
3
4package kms
5
6import (
7	context "context"
8	fmt "fmt"
9	math "math"
10
11	proto "github.com/golang/protobuf/proto"
12	_ "google.golang.org/genproto/googleapis/api/annotations"
13	field_mask "google.golang.org/genproto/protobuf/field_mask"
14	grpc "google.golang.org/grpc"
15	codes "google.golang.org/grpc/codes"
16	status "google.golang.org/grpc/status"
17)
18
19// Reference imports to suppress errors if they are not otherwise used.
20var _ = proto.Marshal
21var _ = fmt.Errorf
22var _ = math.Inf
23
24// This is a compile-time assertion to ensure that this generated file
25// is compatible with the proto package it is being compiled against.
26// A compilation error at this line likely means your copy of the
27// proto package needs to be updated.
28const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
29
30// Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings].
31type ListKeyRingsRequest struct {
32	// Required. The resource name of the location associated with the
33	// [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`.
34	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
35	// Optional. Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to include in the
36	// response.  Further [KeyRings][google.cloud.kms.v1.KeyRing] can subsequently be obtained by
37	// including the [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] in a subsequent
38	// request.  If unspecified, the server will pick an appropriate default.
39	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
40	// Optional. Optional pagination token, returned earlier via
41	// [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token].
42	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
43	// Optional. Only include resources that match the filter in the response. For
44	// more information, see
45	// [Sorting and filtering list
46	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
47	Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"`
48	// Optional. Specify how the results should be sorted. If not specified, the
49	// results will be sorted in the default order.  For more information, see
50	// [Sorting and filtering list
51	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
52	OrderBy              string   `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
53	XXX_NoUnkeyedLiteral struct{} `json:"-"`
54	XXX_unrecognized     []byte   `json:"-"`
55	XXX_sizecache        int32    `json:"-"`
56}
57
58func (m *ListKeyRingsRequest) Reset()         { *m = ListKeyRingsRequest{} }
59func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) }
60func (*ListKeyRingsRequest) ProtoMessage()    {}
61func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) {
62	return fileDescriptor_723aeaeb61739a25, []int{0}
63}
64
65func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error {
66	return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b)
67}
68func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
69	return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic)
70}
71func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) {
72	xxx_messageInfo_ListKeyRingsRequest.Merge(m, src)
73}
74func (m *ListKeyRingsRequest) XXX_Size() int {
75	return xxx_messageInfo_ListKeyRingsRequest.Size(m)
76}
77func (m *ListKeyRingsRequest) XXX_DiscardUnknown() {
78	xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m)
79}
80
81var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo
82
83func (m *ListKeyRingsRequest) GetParent() string {
84	if m != nil {
85		return m.Parent
86	}
87	return ""
88}
89
90func (m *ListKeyRingsRequest) GetPageSize() int32 {
91	if m != nil {
92		return m.PageSize
93	}
94	return 0
95}
96
97func (m *ListKeyRingsRequest) GetPageToken() string {
98	if m != nil {
99		return m.PageToken
100	}
101	return ""
102}
103
104func (m *ListKeyRingsRequest) GetFilter() string {
105	if m != nil {
106		return m.Filter
107	}
108	return ""
109}
110
111func (m *ListKeyRingsRequest) GetOrderBy() string {
112	if m != nil {
113		return m.OrderBy
114	}
115	return ""
116}
117
118// Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
119type ListCryptoKeysRequest struct {
120	// Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format
121	// `projects/*/locations/*/keyRings/*`.
122	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
123	// Optional. Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] to include in the
124	// response.  Further [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by
125	// including the [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] in a subsequent
126	// request.  If unspecified, the server will pick an appropriate default.
127	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
128	// Optional. Optional pagination token, returned earlier via
129	// [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token].
130	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
131	// The fields of the primary version to include in the response.
132	VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"`
133	// Optional. Only include resources that match the filter in the response. For
134	// more information, see
135	// [Sorting and filtering list
136	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
137	Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"`
138	// Optional. Specify how the results should be sorted. If not specified, the
139	// results will be sorted in the default order. For more information, see
140	// [Sorting and filtering list
141	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
142	OrderBy              string   `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
143	XXX_NoUnkeyedLiteral struct{} `json:"-"`
144	XXX_unrecognized     []byte   `json:"-"`
145	XXX_sizecache        int32    `json:"-"`
146}
147
148func (m *ListCryptoKeysRequest) Reset()         { *m = ListCryptoKeysRequest{} }
149func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) }
150func (*ListCryptoKeysRequest) ProtoMessage()    {}
151func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) {
152	return fileDescriptor_723aeaeb61739a25, []int{1}
153}
154
155func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error {
156	return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b)
157}
158func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
159	return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic)
160}
161func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) {
162	xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src)
163}
164func (m *ListCryptoKeysRequest) XXX_Size() int {
165	return xxx_messageInfo_ListCryptoKeysRequest.Size(m)
166}
167func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() {
168	xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m)
169}
170
171var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo
172
173func (m *ListCryptoKeysRequest) GetParent() string {
174	if m != nil {
175		return m.Parent
176	}
177	return ""
178}
179
180func (m *ListCryptoKeysRequest) GetPageSize() int32 {
181	if m != nil {
182		return m.PageSize
183	}
184	return 0
185}
186
187func (m *ListCryptoKeysRequest) GetPageToken() string {
188	if m != nil {
189		return m.PageToken
190	}
191	return ""
192}
193
194func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView {
195	if m != nil {
196		return m.VersionView
197	}
198	return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED
199}
200
201func (m *ListCryptoKeysRequest) GetFilter() string {
202	if m != nil {
203		return m.Filter
204	}
205	return ""
206}
207
208func (m *ListCryptoKeysRequest) GetOrderBy() string {
209	if m != nil {
210		return m.OrderBy
211	}
212	return ""
213}
214
215// Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions].
216type ListCryptoKeyVersionsRequest struct {
217	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format
218	// `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
219	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
220	// Optional. Optional limit on the number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to
221	// include in the response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] can
222	// subsequently be obtained by including the
223	// [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] in a subsequent request.
224	// If unspecified, the server will pick an appropriate default.
225	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
226	// Optional. Optional pagination token, returned earlier via
227	// [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token].
228	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
229	// The fields to include in the response.
230	View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"`
231	// Optional. Only include resources that match the filter in the response. For
232	// more information, see
233	// [Sorting and filtering list
234	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
235	Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"`
236	// Optional. Specify how the results should be sorted. If not specified, the
237	// results will be sorted in the default order. For more information, see
238	// [Sorting and filtering list
239	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
240	OrderBy              string   `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
241	XXX_NoUnkeyedLiteral struct{} `json:"-"`
242	XXX_unrecognized     []byte   `json:"-"`
243	XXX_sizecache        int32    `json:"-"`
244}
245
246func (m *ListCryptoKeyVersionsRequest) Reset()         { *m = ListCryptoKeyVersionsRequest{} }
247func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) }
248func (*ListCryptoKeyVersionsRequest) ProtoMessage()    {}
249func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) {
250	return fileDescriptor_723aeaeb61739a25, []int{2}
251}
252
253func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error {
254	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b)
255}
256func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
257	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic)
258}
259func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) {
260	xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src)
261}
262func (m *ListCryptoKeyVersionsRequest) XXX_Size() int {
263	return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m)
264}
265func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() {
266	xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m)
267}
268
269var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo
270
271func (m *ListCryptoKeyVersionsRequest) GetParent() string {
272	if m != nil {
273		return m.Parent
274	}
275	return ""
276}
277
278func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 {
279	if m != nil {
280		return m.PageSize
281	}
282	return 0
283}
284
285func (m *ListCryptoKeyVersionsRequest) GetPageToken() string {
286	if m != nil {
287		return m.PageToken
288	}
289	return ""
290}
291
292func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView {
293	if m != nil {
294		return m.View
295	}
296	return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED
297}
298
299func (m *ListCryptoKeyVersionsRequest) GetFilter() string {
300	if m != nil {
301		return m.Filter
302	}
303	return ""
304}
305
306func (m *ListCryptoKeyVersionsRequest) GetOrderBy() string {
307	if m != nil {
308		return m.OrderBy
309	}
310	return ""
311}
312
313// Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs].
314type ListImportJobsRequest struct {
315	// Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format
316	// `projects/*/locations/*/keyRings/*`.
317	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
318	// Optional. Optional limit on the number of [ImportJobs][google.cloud.kms.v1.ImportJob] to include in the
319	// response. Further [ImportJobs][google.cloud.kms.v1.ImportJob] can subsequently be obtained by
320	// including the [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token] in a subsequent
321	// request. If unspecified, the server will pick an appropriate default.
322	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
323	// Optional. Optional pagination token, returned earlier via
324	// [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token].
325	PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
326	// Optional. Only include resources that match the filter in the response. For
327	// more information, see
328	// [Sorting and filtering list
329	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
330	Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"`
331	// Optional. Specify how the results should be sorted. If not specified, the
332	// results will be sorted in the default order. For more information, see
333	// [Sorting and filtering list
334	// results](https://cloud.google.com/kms/docs/sorting-and-filtering).
335	OrderBy              string   `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"`
336	XXX_NoUnkeyedLiteral struct{} `json:"-"`
337	XXX_unrecognized     []byte   `json:"-"`
338	XXX_sizecache        int32    `json:"-"`
339}
340
341func (m *ListImportJobsRequest) Reset()         { *m = ListImportJobsRequest{} }
342func (m *ListImportJobsRequest) String() string { return proto.CompactTextString(m) }
343func (*ListImportJobsRequest) ProtoMessage()    {}
344func (*ListImportJobsRequest) Descriptor() ([]byte, []int) {
345	return fileDescriptor_723aeaeb61739a25, []int{3}
346}
347
348func (m *ListImportJobsRequest) XXX_Unmarshal(b []byte) error {
349	return xxx_messageInfo_ListImportJobsRequest.Unmarshal(m, b)
350}
351func (m *ListImportJobsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
352	return xxx_messageInfo_ListImportJobsRequest.Marshal(b, m, deterministic)
353}
354func (m *ListImportJobsRequest) XXX_Merge(src proto.Message) {
355	xxx_messageInfo_ListImportJobsRequest.Merge(m, src)
356}
357func (m *ListImportJobsRequest) XXX_Size() int {
358	return xxx_messageInfo_ListImportJobsRequest.Size(m)
359}
360func (m *ListImportJobsRequest) XXX_DiscardUnknown() {
361	xxx_messageInfo_ListImportJobsRequest.DiscardUnknown(m)
362}
363
364var xxx_messageInfo_ListImportJobsRequest proto.InternalMessageInfo
365
366func (m *ListImportJobsRequest) GetParent() string {
367	if m != nil {
368		return m.Parent
369	}
370	return ""
371}
372
373func (m *ListImportJobsRequest) GetPageSize() int32 {
374	if m != nil {
375		return m.PageSize
376	}
377	return 0
378}
379
380func (m *ListImportJobsRequest) GetPageToken() string {
381	if m != nil {
382		return m.PageToken
383	}
384	return ""
385}
386
387func (m *ListImportJobsRequest) GetFilter() string {
388	if m != nil {
389		return m.Filter
390	}
391	return ""
392}
393
394func (m *ListImportJobsRequest) GetOrderBy() string {
395	if m != nil {
396		return m.OrderBy
397	}
398	return ""
399}
400
401// Response message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings].
402type ListKeyRingsResponse struct {
403	// The list of [KeyRings][google.cloud.kms.v1.KeyRing].
404	KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"`
405	// A token to retrieve next page of results. Pass this value in
406	// [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] to retrieve the next page of results.
407	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
408	// The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched the query.
409	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
410	XXX_NoUnkeyedLiteral struct{} `json:"-"`
411	XXX_unrecognized     []byte   `json:"-"`
412	XXX_sizecache        int32    `json:"-"`
413}
414
415func (m *ListKeyRingsResponse) Reset()         { *m = ListKeyRingsResponse{} }
416func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) }
417func (*ListKeyRingsResponse) ProtoMessage()    {}
418func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) {
419	return fileDescriptor_723aeaeb61739a25, []int{4}
420}
421
422func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error {
423	return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b)
424}
425func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
426	return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic)
427}
428func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) {
429	xxx_messageInfo_ListKeyRingsResponse.Merge(m, src)
430}
431func (m *ListKeyRingsResponse) XXX_Size() int {
432	return xxx_messageInfo_ListKeyRingsResponse.Size(m)
433}
434func (m *ListKeyRingsResponse) XXX_DiscardUnknown() {
435	xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m)
436}
437
438var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo
439
440func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing {
441	if m != nil {
442		return m.KeyRings
443	}
444	return nil
445}
446
447func (m *ListKeyRingsResponse) GetNextPageToken() string {
448	if m != nil {
449		return m.NextPageToken
450	}
451	return ""
452}
453
454func (m *ListKeyRingsResponse) GetTotalSize() int32 {
455	if m != nil {
456		return m.TotalSize
457	}
458	return 0
459}
460
461// Response message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
462type ListCryptoKeysResponse struct {
463	// The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey].
464	CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"`
465	// A token to retrieve next page of results. Pass this value in
466	// [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] to retrieve the next page of results.
467	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
468	// The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that matched the query.
469	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
470	XXX_NoUnkeyedLiteral struct{} `json:"-"`
471	XXX_unrecognized     []byte   `json:"-"`
472	XXX_sizecache        int32    `json:"-"`
473}
474
475func (m *ListCryptoKeysResponse) Reset()         { *m = ListCryptoKeysResponse{} }
476func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) }
477func (*ListCryptoKeysResponse) ProtoMessage()    {}
478func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) {
479	return fileDescriptor_723aeaeb61739a25, []int{5}
480}
481
482func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error {
483	return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b)
484}
485func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
486	return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic)
487}
488func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) {
489	xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src)
490}
491func (m *ListCryptoKeysResponse) XXX_Size() int {
492	return xxx_messageInfo_ListCryptoKeysResponse.Size(m)
493}
494func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() {
495	xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m)
496}
497
498var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo
499
500func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey {
501	if m != nil {
502		return m.CryptoKeys
503	}
504	return nil
505}
506
507func (m *ListCryptoKeysResponse) GetNextPageToken() string {
508	if m != nil {
509		return m.NextPageToken
510	}
511	return ""
512}
513
514func (m *ListCryptoKeysResponse) GetTotalSize() int32 {
515	if m != nil {
516		return m.TotalSize
517	}
518	return 0
519}
520
521// Response message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions].
522type ListCryptoKeyVersionsResponse struct {
523	// The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
524	CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"`
525	// A token to retrieve next page of results. Pass this value in
526	// [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] to retrieve the next page of
527	// results.
528	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
529	// The total number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the
530	// query.
531	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
532	XXX_NoUnkeyedLiteral struct{} `json:"-"`
533	XXX_unrecognized     []byte   `json:"-"`
534	XXX_sizecache        int32    `json:"-"`
535}
536
537func (m *ListCryptoKeyVersionsResponse) Reset()         { *m = ListCryptoKeyVersionsResponse{} }
538func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) }
539func (*ListCryptoKeyVersionsResponse) ProtoMessage()    {}
540func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) {
541	return fileDescriptor_723aeaeb61739a25, []int{6}
542}
543
544func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error {
545	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b)
546}
547func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
548	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic)
549}
550func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) {
551	xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src)
552}
553func (m *ListCryptoKeyVersionsResponse) XXX_Size() int {
554	return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m)
555}
556func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() {
557	xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m)
558}
559
560var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo
561
562func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion {
563	if m != nil {
564		return m.CryptoKeyVersions
565	}
566	return nil
567}
568
569func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string {
570	if m != nil {
571		return m.NextPageToken
572	}
573	return ""
574}
575
576func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 {
577	if m != nil {
578		return m.TotalSize
579	}
580	return 0
581}
582
583// Response message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs].
584type ListImportJobsResponse struct {
585	// The list of [ImportJobs][google.cloud.kms.v1.ImportJob].
586	ImportJobs []*ImportJob `protobuf:"bytes,1,rep,name=import_jobs,json=importJobs,proto3" json:"import_jobs,omitempty"`
587	// A token to retrieve next page of results. Pass this value in
588	// [ListImportJobsRequest.page_token][google.cloud.kms.v1.ListImportJobsRequest.page_token] to retrieve the next page of results.
589	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
590	// The total number of [ImportJobs][google.cloud.kms.v1.ImportJob] that matched the query.
591	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
592	XXX_NoUnkeyedLiteral struct{} `json:"-"`
593	XXX_unrecognized     []byte   `json:"-"`
594	XXX_sizecache        int32    `json:"-"`
595}
596
597func (m *ListImportJobsResponse) Reset()         { *m = ListImportJobsResponse{} }
598func (m *ListImportJobsResponse) String() string { return proto.CompactTextString(m) }
599func (*ListImportJobsResponse) ProtoMessage()    {}
600func (*ListImportJobsResponse) Descriptor() ([]byte, []int) {
601	return fileDescriptor_723aeaeb61739a25, []int{7}
602}
603
604func (m *ListImportJobsResponse) XXX_Unmarshal(b []byte) error {
605	return xxx_messageInfo_ListImportJobsResponse.Unmarshal(m, b)
606}
607func (m *ListImportJobsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
608	return xxx_messageInfo_ListImportJobsResponse.Marshal(b, m, deterministic)
609}
610func (m *ListImportJobsResponse) XXX_Merge(src proto.Message) {
611	xxx_messageInfo_ListImportJobsResponse.Merge(m, src)
612}
613func (m *ListImportJobsResponse) XXX_Size() int {
614	return xxx_messageInfo_ListImportJobsResponse.Size(m)
615}
616func (m *ListImportJobsResponse) XXX_DiscardUnknown() {
617	xxx_messageInfo_ListImportJobsResponse.DiscardUnknown(m)
618}
619
620var xxx_messageInfo_ListImportJobsResponse proto.InternalMessageInfo
621
622func (m *ListImportJobsResponse) GetImportJobs() []*ImportJob {
623	if m != nil {
624		return m.ImportJobs
625	}
626	return nil
627}
628
629func (m *ListImportJobsResponse) GetNextPageToken() string {
630	if m != nil {
631		return m.NextPageToken
632	}
633	return ""
634}
635
636func (m *ListImportJobsResponse) GetTotalSize() int32 {
637	if m != nil {
638		return m.TotalSize
639	}
640	return 0
641}
642
643// Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing].
644type GetKeyRingRequest struct {
645	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] to get.
646	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
647	XXX_NoUnkeyedLiteral struct{} `json:"-"`
648	XXX_unrecognized     []byte   `json:"-"`
649	XXX_sizecache        int32    `json:"-"`
650}
651
652func (m *GetKeyRingRequest) Reset()         { *m = GetKeyRingRequest{} }
653func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) }
654func (*GetKeyRingRequest) ProtoMessage()    {}
655func (*GetKeyRingRequest) Descriptor() ([]byte, []int) {
656	return fileDescriptor_723aeaeb61739a25, []int{8}
657}
658
659func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error {
660	return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b)
661}
662func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
663	return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic)
664}
665func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) {
666	xxx_messageInfo_GetKeyRingRequest.Merge(m, src)
667}
668func (m *GetKeyRingRequest) XXX_Size() int {
669	return xxx_messageInfo_GetKeyRingRequest.Size(m)
670}
671func (m *GetKeyRingRequest) XXX_DiscardUnknown() {
672	xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m)
673}
674
675var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo
676
677func (m *GetKeyRingRequest) GetName() string {
678	if m != nil {
679		return m.Name
680	}
681	return ""
682}
683
684// Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey].
685type GetCryptoKeyRequest struct {
686	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to get.
687	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
688	XXX_NoUnkeyedLiteral struct{} `json:"-"`
689	XXX_unrecognized     []byte   `json:"-"`
690	XXX_sizecache        int32    `json:"-"`
691}
692
693func (m *GetCryptoKeyRequest) Reset()         { *m = GetCryptoKeyRequest{} }
694func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
695func (*GetCryptoKeyRequest) ProtoMessage()    {}
696func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) {
697	return fileDescriptor_723aeaeb61739a25, []int{9}
698}
699
700func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
701	return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b)
702}
703func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
704	return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic)
705}
706func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) {
707	xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src)
708}
709func (m *GetCryptoKeyRequest) XXX_Size() int {
710	return xxx_messageInfo_GetCryptoKeyRequest.Size(m)
711}
712func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() {
713	xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m)
714}
715
716var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo
717
718func (m *GetCryptoKeyRequest) GetName() string {
719	if m != nil {
720		return m.Name
721	}
722	return ""
723}
724
725// Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion].
726type GetCryptoKeyVersionRequest struct {
727	// Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get.
728	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
729	XXX_NoUnkeyedLiteral struct{} `json:"-"`
730	XXX_unrecognized     []byte   `json:"-"`
731	XXX_sizecache        int32    `json:"-"`
732}
733
734func (m *GetCryptoKeyVersionRequest) Reset()         { *m = GetCryptoKeyVersionRequest{} }
735func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
736func (*GetCryptoKeyVersionRequest) ProtoMessage()    {}
737func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
738	return fileDescriptor_723aeaeb61739a25, []int{10}
739}
740
741func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
742	return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b)
743}
744func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
745	return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic)
746}
747func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
748	xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src)
749}
750func (m *GetCryptoKeyVersionRequest) XXX_Size() int {
751	return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m)
752}
753func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() {
754	xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m)
755}
756
757var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo
758
759func (m *GetCryptoKeyVersionRequest) GetName() string {
760	if m != nil {
761		return m.Name
762	}
763	return ""
764}
765
766// Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
767type GetPublicKeyRequest struct {
768	// Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to
769	// get.
770	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
771	XXX_NoUnkeyedLiteral struct{} `json:"-"`
772	XXX_unrecognized     []byte   `json:"-"`
773	XXX_sizecache        int32    `json:"-"`
774}
775
776func (m *GetPublicKeyRequest) Reset()         { *m = GetPublicKeyRequest{} }
777func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) }
778func (*GetPublicKeyRequest) ProtoMessage()    {}
779func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) {
780	return fileDescriptor_723aeaeb61739a25, []int{11}
781}
782
783func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error {
784	return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b)
785}
786func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
787	return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic)
788}
789func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) {
790	xxx_messageInfo_GetPublicKeyRequest.Merge(m, src)
791}
792func (m *GetPublicKeyRequest) XXX_Size() int {
793	return xxx_messageInfo_GetPublicKeyRequest.Size(m)
794}
795func (m *GetPublicKeyRequest) XXX_DiscardUnknown() {
796	xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m)
797}
798
799var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo
800
801func (m *GetPublicKeyRequest) GetName() string {
802	if m != nil {
803		return m.Name
804	}
805	return ""
806}
807
808// Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob].
809type GetImportJobRequest struct {
810	// Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] to get.
811	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
812	XXX_NoUnkeyedLiteral struct{} `json:"-"`
813	XXX_unrecognized     []byte   `json:"-"`
814	XXX_sizecache        int32    `json:"-"`
815}
816
817func (m *GetImportJobRequest) Reset()         { *m = GetImportJobRequest{} }
818func (m *GetImportJobRequest) String() string { return proto.CompactTextString(m) }
819func (*GetImportJobRequest) ProtoMessage()    {}
820func (*GetImportJobRequest) Descriptor() ([]byte, []int) {
821	return fileDescriptor_723aeaeb61739a25, []int{12}
822}
823
824func (m *GetImportJobRequest) XXX_Unmarshal(b []byte) error {
825	return xxx_messageInfo_GetImportJobRequest.Unmarshal(m, b)
826}
827func (m *GetImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
828	return xxx_messageInfo_GetImportJobRequest.Marshal(b, m, deterministic)
829}
830func (m *GetImportJobRequest) XXX_Merge(src proto.Message) {
831	xxx_messageInfo_GetImportJobRequest.Merge(m, src)
832}
833func (m *GetImportJobRequest) XXX_Size() int {
834	return xxx_messageInfo_GetImportJobRequest.Size(m)
835}
836func (m *GetImportJobRequest) XXX_DiscardUnknown() {
837	xxx_messageInfo_GetImportJobRequest.DiscardUnknown(m)
838}
839
840var xxx_messageInfo_GetImportJobRequest proto.InternalMessageInfo
841
842func (m *GetImportJobRequest) GetName() string {
843	if m != nil {
844		return m.Name
845	}
846	return ""
847}
848
849// Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing].
850type CreateKeyRingRequest struct {
851	// Required. The resource name of the location associated with the
852	// [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`.
853	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
854	// Required. It must be unique within a location and match the regular
855	// expression `[a-zA-Z0-9_-]{1,63}`
856	KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"`
857	// Required. A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values.
858	KeyRing              *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"`
859	XXX_NoUnkeyedLiteral struct{} `json:"-"`
860	XXX_unrecognized     []byte   `json:"-"`
861	XXX_sizecache        int32    `json:"-"`
862}
863
864func (m *CreateKeyRingRequest) Reset()         { *m = CreateKeyRingRequest{} }
865func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) }
866func (*CreateKeyRingRequest) ProtoMessage()    {}
867func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) {
868	return fileDescriptor_723aeaeb61739a25, []int{13}
869}
870
871func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error {
872	return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b)
873}
874func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
875	return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic)
876}
877func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) {
878	xxx_messageInfo_CreateKeyRingRequest.Merge(m, src)
879}
880func (m *CreateKeyRingRequest) XXX_Size() int {
881	return xxx_messageInfo_CreateKeyRingRequest.Size(m)
882}
883func (m *CreateKeyRingRequest) XXX_DiscardUnknown() {
884	xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m)
885}
886
887var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo
888
889func (m *CreateKeyRingRequest) GetParent() string {
890	if m != nil {
891		return m.Parent
892	}
893	return ""
894}
895
896func (m *CreateKeyRingRequest) GetKeyRingId() string {
897	if m != nil {
898		return m.KeyRingId
899	}
900	return ""
901}
902
903func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing {
904	if m != nil {
905		return m.KeyRing
906	}
907	return nil
908}
909
910// Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey].
911type CreateCryptoKeyRequest struct {
912	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing associated with the
913	// [CryptoKeys][google.cloud.kms.v1.CryptoKey].
914	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
915	// Required. It must be unique within a KeyRing and match the regular
916	// expression `[a-zA-Z0-9_-]{1,63}`
917	CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"`
918	// Required. A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values.
919	CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"`
920	// If set to true, the request will create a [CryptoKey][google.cloud.kms.v1.CryptoKey] without any
921	// [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. You must manually call
922	// [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or
923	// [ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]
924	// before you can use this [CryptoKey][google.cloud.kms.v1.CryptoKey].
925	SkipInitialVersionCreation bool     `protobuf:"varint,5,opt,name=skip_initial_version_creation,json=skipInitialVersionCreation,proto3" json:"skip_initial_version_creation,omitempty"`
926	XXX_NoUnkeyedLiteral       struct{} `json:"-"`
927	XXX_unrecognized           []byte   `json:"-"`
928	XXX_sizecache              int32    `json:"-"`
929}
930
931func (m *CreateCryptoKeyRequest) Reset()         { *m = CreateCryptoKeyRequest{} }
932func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
933func (*CreateCryptoKeyRequest) ProtoMessage()    {}
934func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) {
935	return fileDescriptor_723aeaeb61739a25, []int{14}
936}
937
938func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
939	return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b)
940}
941func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
942	return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic)
943}
944func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) {
945	xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src)
946}
947func (m *CreateCryptoKeyRequest) XXX_Size() int {
948	return xxx_messageInfo_CreateCryptoKeyRequest.Size(m)
949}
950func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() {
951	xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m)
952}
953
954var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo
955
956func (m *CreateCryptoKeyRequest) GetParent() string {
957	if m != nil {
958		return m.Parent
959	}
960	return ""
961}
962
963func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string {
964	if m != nil {
965		return m.CryptoKeyId
966	}
967	return ""
968}
969
970func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey {
971	if m != nil {
972		return m.CryptoKey
973	}
974	return nil
975}
976
977func (m *CreateCryptoKeyRequest) GetSkipInitialVersionCreation() bool {
978	if m != nil {
979		return m.SkipInitialVersionCreation
980	}
981	return false
982}
983
984// Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion].
985type CreateCryptoKeyVersionRequest struct {
986	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with
987	// the [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
988	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
989	// Required. A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial field values.
990	CryptoKeyVersion     *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"`
991	XXX_NoUnkeyedLiteral struct{}          `json:"-"`
992	XXX_unrecognized     []byte            `json:"-"`
993	XXX_sizecache        int32             `json:"-"`
994}
995
996func (m *CreateCryptoKeyVersionRequest) Reset()         { *m = CreateCryptoKeyVersionRequest{} }
997func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
998func (*CreateCryptoKeyVersionRequest) ProtoMessage()    {}
999func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1000	return fileDescriptor_723aeaeb61739a25, []int{15}
1001}
1002
1003func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1004	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b)
1005}
1006func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1007	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1008}
1009func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1010	xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src)
1011}
1012func (m *CreateCryptoKeyVersionRequest) XXX_Size() int {
1013	return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m)
1014}
1015func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1016	xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m)
1017}
1018
1019var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo
1020
1021func (m *CreateCryptoKeyVersionRequest) GetParent() string {
1022	if m != nil {
1023		return m.Parent
1024	}
1025	return ""
1026}
1027
1028func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion {
1029	if m != nil {
1030		return m.CryptoKeyVersion
1031	}
1032	return nil
1033}
1034
1035// Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion].
1036type ImportCryptoKeyVersionRequest struct {
1037	// Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to
1038	// be imported into.
1039	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
1040	// Required. The [algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] of
1041	// the key being imported. This does not need to match the
1042	// [version_template][google.cloud.kms.v1.CryptoKey.version_template] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] this
1043	// version imports into.
1044	Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"`
1045	// Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] that was used to
1046	// wrap this key material.
1047	ImportJob string `protobuf:"bytes,4,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"`
1048	// Required. The incoming wrapped key material that is to be imported.
1049	//
1050	// Types that are valid to be assigned to WrappedKeyMaterial:
1051	//	*ImportCryptoKeyVersionRequest_RsaAesWrappedKey
1052	WrappedKeyMaterial   isImportCryptoKeyVersionRequest_WrappedKeyMaterial `protobuf_oneof:"wrapped_key_material"`
1053	XXX_NoUnkeyedLiteral struct{}                                           `json:"-"`
1054	XXX_unrecognized     []byte                                             `json:"-"`
1055	XXX_sizecache        int32                                              `json:"-"`
1056}
1057
1058func (m *ImportCryptoKeyVersionRequest) Reset()         { *m = ImportCryptoKeyVersionRequest{} }
1059func (m *ImportCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1060func (*ImportCryptoKeyVersionRequest) ProtoMessage()    {}
1061func (*ImportCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1062	return fileDescriptor_723aeaeb61739a25, []int{16}
1063}
1064
1065func (m *ImportCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1066	return xxx_messageInfo_ImportCryptoKeyVersionRequest.Unmarshal(m, b)
1067}
1068func (m *ImportCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1069	return xxx_messageInfo_ImportCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1070}
1071func (m *ImportCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1072	xxx_messageInfo_ImportCryptoKeyVersionRequest.Merge(m, src)
1073}
1074func (m *ImportCryptoKeyVersionRequest) XXX_Size() int {
1075	return xxx_messageInfo_ImportCryptoKeyVersionRequest.Size(m)
1076}
1077func (m *ImportCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1078	xxx_messageInfo_ImportCryptoKeyVersionRequest.DiscardUnknown(m)
1079}
1080
1081var xxx_messageInfo_ImportCryptoKeyVersionRequest proto.InternalMessageInfo
1082
1083func (m *ImportCryptoKeyVersionRequest) GetParent() string {
1084	if m != nil {
1085		return m.Parent
1086	}
1087	return ""
1088}
1089
1090func (m *ImportCryptoKeyVersionRequest) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm {
1091	if m != nil {
1092		return m.Algorithm
1093	}
1094	return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED
1095}
1096
1097func (m *ImportCryptoKeyVersionRequest) GetImportJob() string {
1098	if m != nil {
1099		return m.ImportJob
1100	}
1101	return ""
1102}
1103
1104type isImportCryptoKeyVersionRequest_WrappedKeyMaterial interface {
1105	isImportCryptoKeyVersionRequest_WrappedKeyMaterial()
1106}
1107
1108type ImportCryptoKeyVersionRequest_RsaAesWrappedKey struct {
1109	RsaAesWrappedKey []byte `protobuf:"bytes,5,opt,name=rsa_aes_wrapped_key,json=rsaAesWrappedKey,proto3,oneof"`
1110}
1111
1112func (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey) isImportCryptoKeyVersionRequest_WrappedKeyMaterial() {
1113}
1114
1115func (m *ImportCryptoKeyVersionRequest) GetWrappedKeyMaterial() isImportCryptoKeyVersionRequest_WrappedKeyMaterial {
1116	if m != nil {
1117		return m.WrappedKeyMaterial
1118	}
1119	return nil
1120}
1121
1122func (m *ImportCryptoKeyVersionRequest) GetRsaAesWrappedKey() []byte {
1123	if x, ok := m.GetWrappedKeyMaterial().(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey); ok {
1124		return x.RsaAesWrappedKey
1125	}
1126	return nil
1127}
1128
1129// XXX_OneofWrappers is for the internal use of the proto package.
1130func (*ImportCryptoKeyVersionRequest) XXX_OneofWrappers() []interface{} {
1131	return []interface{}{
1132		(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey)(nil),
1133	}
1134}
1135
1136// Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob].
1137type CreateImportJobRequest struct {
1138	// Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] associated with the
1139	// [ImportJobs][google.cloud.kms.v1.ImportJob].
1140	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
1141	// Required. It must be unique within a KeyRing and match the regular
1142	// expression `[a-zA-Z0-9_-]{1,63}`
1143	ImportJobId string `protobuf:"bytes,2,opt,name=import_job_id,json=importJobId,proto3" json:"import_job_id,omitempty"`
1144	// Required. An [ImportJob][google.cloud.kms.v1.ImportJob] with initial field values.
1145	ImportJob            *ImportJob `protobuf:"bytes,3,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"`
1146	XXX_NoUnkeyedLiteral struct{}   `json:"-"`
1147	XXX_unrecognized     []byte     `json:"-"`
1148	XXX_sizecache        int32      `json:"-"`
1149}
1150
1151func (m *CreateImportJobRequest) Reset()         { *m = CreateImportJobRequest{} }
1152func (m *CreateImportJobRequest) String() string { return proto.CompactTextString(m) }
1153func (*CreateImportJobRequest) ProtoMessage()    {}
1154func (*CreateImportJobRequest) Descriptor() ([]byte, []int) {
1155	return fileDescriptor_723aeaeb61739a25, []int{17}
1156}
1157
1158func (m *CreateImportJobRequest) XXX_Unmarshal(b []byte) error {
1159	return xxx_messageInfo_CreateImportJobRequest.Unmarshal(m, b)
1160}
1161func (m *CreateImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1162	return xxx_messageInfo_CreateImportJobRequest.Marshal(b, m, deterministic)
1163}
1164func (m *CreateImportJobRequest) XXX_Merge(src proto.Message) {
1165	xxx_messageInfo_CreateImportJobRequest.Merge(m, src)
1166}
1167func (m *CreateImportJobRequest) XXX_Size() int {
1168	return xxx_messageInfo_CreateImportJobRequest.Size(m)
1169}
1170func (m *CreateImportJobRequest) XXX_DiscardUnknown() {
1171	xxx_messageInfo_CreateImportJobRequest.DiscardUnknown(m)
1172}
1173
1174var xxx_messageInfo_CreateImportJobRequest proto.InternalMessageInfo
1175
1176func (m *CreateImportJobRequest) GetParent() string {
1177	if m != nil {
1178		return m.Parent
1179	}
1180	return ""
1181}
1182
1183func (m *CreateImportJobRequest) GetImportJobId() string {
1184	if m != nil {
1185		return m.ImportJobId
1186	}
1187	return ""
1188}
1189
1190func (m *CreateImportJobRequest) GetImportJob() *ImportJob {
1191	if m != nil {
1192		return m.ImportJob
1193	}
1194	return nil
1195}
1196
1197// Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey].
1198type UpdateCryptoKeyRequest struct {
1199	// Required. [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values.
1200	CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"`
1201	// Required. List of fields to be updated in this request.
1202	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
1203	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
1204	XXX_unrecognized     []byte                `json:"-"`
1205	XXX_sizecache        int32                 `json:"-"`
1206}
1207
1208func (m *UpdateCryptoKeyRequest) Reset()         { *m = UpdateCryptoKeyRequest{} }
1209func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) }
1210func (*UpdateCryptoKeyRequest) ProtoMessage()    {}
1211func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) {
1212	return fileDescriptor_723aeaeb61739a25, []int{18}
1213}
1214
1215func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error {
1216	return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b)
1217}
1218func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1219	return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic)
1220}
1221func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) {
1222	xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src)
1223}
1224func (m *UpdateCryptoKeyRequest) XXX_Size() int {
1225	return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m)
1226}
1227func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() {
1228	xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m)
1229}
1230
1231var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo
1232
1233func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey {
1234	if m != nil {
1235		return m.CryptoKey
1236	}
1237	return nil
1238}
1239
1240func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask {
1241	if m != nil {
1242		return m.UpdateMask
1243	}
1244	return nil
1245}
1246
1247// Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion].
1248type UpdateCryptoKeyVersionRequest struct {
1249	// Required. [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated values.
1250	CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"`
1251	// Required. List of fields to be updated in this request.
1252	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
1253	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
1254	XXX_unrecognized     []byte                `json:"-"`
1255	XXX_sizecache        int32                 `json:"-"`
1256}
1257
1258func (m *UpdateCryptoKeyVersionRequest) Reset()         { *m = UpdateCryptoKeyVersionRequest{} }
1259func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1260func (*UpdateCryptoKeyVersionRequest) ProtoMessage()    {}
1261func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1262	return fileDescriptor_723aeaeb61739a25, []int{19}
1263}
1264
1265func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1266	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b)
1267}
1268func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1269	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1270}
1271func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1272	xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src)
1273}
1274func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int {
1275	return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m)
1276}
1277func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1278	xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m)
1279}
1280
1281var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo
1282
1283func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion {
1284	if m != nil {
1285		return m.CryptoKeyVersion
1286	}
1287	return nil
1288}
1289
1290func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask {
1291	if m != nil {
1292		return m.UpdateMask
1293	}
1294	return nil
1295}
1296
1297// Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
1298type EncryptRequest struct {
1299	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] or [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
1300	// to use for encryption.
1301	//
1302	// If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server will use its
1303	// [primary version][google.cloud.kms.v1.CryptoKey.primary].
1304	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1305	// Required. The data to encrypt. Must be no larger than 64KiB.
1306	//
1307	// The maximum size depends on the key version's
1308	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For
1309	// [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the plaintext must be no larger
1310	// than 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the
1311	// plaintext and additional_authenticated_data fields must be no larger than
1312	// 8KiB.
1313	Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1314	// Optional. Optional data that, if specified, must also be provided during decryption
1315	// through [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data].
1316	//
1317	// The maximum size depends on the key version's
1318	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For
1319	// [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD must be no larger than
1320	// 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the
1321	// plaintext and additional_authenticated_data fields must be no larger than
1322	// 8KiB.
1323	AdditionalAuthenticatedData []byte   `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"`
1324	XXX_NoUnkeyedLiteral        struct{} `json:"-"`
1325	XXX_unrecognized            []byte   `json:"-"`
1326	XXX_sizecache               int32    `json:"-"`
1327}
1328
1329func (m *EncryptRequest) Reset()         { *m = EncryptRequest{} }
1330func (m *EncryptRequest) String() string { return proto.CompactTextString(m) }
1331func (*EncryptRequest) ProtoMessage()    {}
1332func (*EncryptRequest) Descriptor() ([]byte, []int) {
1333	return fileDescriptor_723aeaeb61739a25, []int{20}
1334}
1335
1336func (m *EncryptRequest) XXX_Unmarshal(b []byte) error {
1337	return xxx_messageInfo_EncryptRequest.Unmarshal(m, b)
1338}
1339func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1340	return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic)
1341}
1342func (m *EncryptRequest) XXX_Merge(src proto.Message) {
1343	xxx_messageInfo_EncryptRequest.Merge(m, src)
1344}
1345func (m *EncryptRequest) XXX_Size() int {
1346	return xxx_messageInfo_EncryptRequest.Size(m)
1347}
1348func (m *EncryptRequest) XXX_DiscardUnknown() {
1349	xxx_messageInfo_EncryptRequest.DiscardUnknown(m)
1350}
1351
1352var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo
1353
1354func (m *EncryptRequest) GetName() string {
1355	if m != nil {
1356		return m.Name
1357	}
1358	return ""
1359}
1360
1361func (m *EncryptRequest) GetPlaintext() []byte {
1362	if m != nil {
1363		return m.Plaintext
1364	}
1365	return nil
1366}
1367
1368func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte {
1369	if m != nil {
1370		return m.AdditionalAuthenticatedData
1371	}
1372	return nil
1373}
1374
1375// Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
1376type DecryptRequest struct {
1377	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption.
1378	// The server will choose the appropriate version.
1379	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1380	// Required. The encrypted data originally returned in
1381	// [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext].
1382	Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1383	// Optional. Optional data that must match the data originally supplied in
1384	// [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data].
1385	AdditionalAuthenticatedData []byte   `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"`
1386	XXX_NoUnkeyedLiteral        struct{} `json:"-"`
1387	XXX_unrecognized            []byte   `json:"-"`
1388	XXX_sizecache               int32    `json:"-"`
1389}
1390
1391func (m *DecryptRequest) Reset()         { *m = DecryptRequest{} }
1392func (m *DecryptRequest) String() string { return proto.CompactTextString(m) }
1393func (*DecryptRequest) ProtoMessage()    {}
1394func (*DecryptRequest) Descriptor() ([]byte, []int) {
1395	return fileDescriptor_723aeaeb61739a25, []int{21}
1396}
1397
1398func (m *DecryptRequest) XXX_Unmarshal(b []byte) error {
1399	return xxx_messageInfo_DecryptRequest.Unmarshal(m, b)
1400}
1401func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1402	return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic)
1403}
1404func (m *DecryptRequest) XXX_Merge(src proto.Message) {
1405	xxx_messageInfo_DecryptRequest.Merge(m, src)
1406}
1407func (m *DecryptRequest) XXX_Size() int {
1408	return xxx_messageInfo_DecryptRequest.Size(m)
1409}
1410func (m *DecryptRequest) XXX_DiscardUnknown() {
1411	xxx_messageInfo_DecryptRequest.DiscardUnknown(m)
1412}
1413
1414var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo
1415
1416func (m *DecryptRequest) GetName() string {
1417	if m != nil {
1418		return m.Name
1419	}
1420	return ""
1421}
1422
1423func (m *DecryptRequest) GetCiphertext() []byte {
1424	if m != nil {
1425		return m.Ciphertext
1426	}
1427	return nil
1428}
1429
1430func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte {
1431	if m != nil {
1432		return m.AdditionalAuthenticatedData
1433	}
1434	return nil
1435}
1436
1437// Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign].
1438type AsymmetricSignRequest struct {
1439	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing.
1440	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1441	// Required. The digest of the data to sign. The digest must be produced with
1442	// the same digest algorithm as specified by the key version's
1443	// [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm].
1444	Digest               *Digest  `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"`
1445	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1446	XXX_unrecognized     []byte   `json:"-"`
1447	XXX_sizecache        int32    `json:"-"`
1448}
1449
1450func (m *AsymmetricSignRequest) Reset()         { *m = AsymmetricSignRequest{} }
1451func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) }
1452func (*AsymmetricSignRequest) ProtoMessage()    {}
1453func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) {
1454	return fileDescriptor_723aeaeb61739a25, []int{22}
1455}
1456
1457func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error {
1458	return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b)
1459}
1460func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1461	return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic)
1462}
1463func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) {
1464	xxx_messageInfo_AsymmetricSignRequest.Merge(m, src)
1465}
1466func (m *AsymmetricSignRequest) XXX_Size() int {
1467	return xxx_messageInfo_AsymmetricSignRequest.Size(m)
1468}
1469func (m *AsymmetricSignRequest) XXX_DiscardUnknown() {
1470	xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m)
1471}
1472
1473var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo
1474
1475func (m *AsymmetricSignRequest) GetName() string {
1476	if m != nil {
1477		return m.Name
1478	}
1479	return ""
1480}
1481
1482func (m *AsymmetricSignRequest) GetDigest() *Digest {
1483	if m != nil {
1484		return m.Digest
1485	}
1486	return nil
1487}
1488
1489// Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt].
1490type AsymmetricDecryptRequest struct {
1491	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for
1492	// decryption.
1493	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1494	// Required. The data encrypted with the named [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public
1495	// key using OAEP.
1496	Ciphertext           []byte   `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1497	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1498	XXX_unrecognized     []byte   `json:"-"`
1499	XXX_sizecache        int32    `json:"-"`
1500}
1501
1502func (m *AsymmetricDecryptRequest) Reset()         { *m = AsymmetricDecryptRequest{} }
1503func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) }
1504func (*AsymmetricDecryptRequest) ProtoMessage()    {}
1505func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) {
1506	return fileDescriptor_723aeaeb61739a25, []int{23}
1507}
1508
1509func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error {
1510	return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b)
1511}
1512func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1513	return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic)
1514}
1515func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) {
1516	xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src)
1517}
1518func (m *AsymmetricDecryptRequest) XXX_Size() int {
1519	return xxx_messageInfo_AsymmetricDecryptRequest.Size(m)
1520}
1521func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() {
1522	xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m)
1523}
1524
1525var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo
1526
1527func (m *AsymmetricDecryptRequest) GetName() string {
1528	if m != nil {
1529		return m.Name
1530	}
1531	return ""
1532}
1533
1534func (m *AsymmetricDecryptRequest) GetCiphertext() []byte {
1535	if m != nil {
1536		return m.Ciphertext
1537	}
1538	return nil
1539}
1540
1541// Response message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
1542type DecryptResponse struct {
1543	// The decrypted data originally supplied in [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext].
1544	Plaintext            []byte   `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1545	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1546	XXX_unrecognized     []byte   `json:"-"`
1547	XXX_sizecache        int32    `json:"-"`
1548}
1549
1550func (m *DecryptResponse) Reset()         { *m = DecryptResponse{} }
1551func (m *DecryptResponse) String() string { return proto.CompactTextString(m) }
1552func (*DecryptResponse) ProtoMessage()    {}
1553func (*DecryptResponse) Descriptor() ([]byte, []int) {
1554	return fileDescriptor_723aeaeb61739a25, []int{24}
1555}
1556
1557func (m *DecryptResponse) XXX_Unmarshal(b []byte) error {
1558	return xxx_messageInfo_DecryptResponse.Unmarshal(m, b)
1559}
1560func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1561	return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic)
1562}
1563func (m *DecryptResponse) XXX_Merge(src proto.Message) {
1564	xxx_messageInfo_DecryptResponse.Merge(m, src)
1565}
1566func (m *DecryptResponse) XXX_Size() int {
1567	return xxx_messageInfo_DecryptResponse.Size(m)
1568}
1569func (m *DecryptResponse) XXX_DiscardUnknown() {
1570	xxx_messageInfo_DecryptResponse.DiscardUnknown(m)
1571}
1572
1573var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo
1574
1575func (m *DecryptResponse) GetPlaintext() []byte {
1576	if m != nil {
1577		return m.Plaintext
1578	}
1579	return nil
1580}
1581
1582// Response message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
1583type EncryptResponse struct {
1584	// The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in encryption. Check
1585	// this field to verify that the intended resource was used for encryption.
1586	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1587	// The encrypted data.
1588	Ciphertext           []byte   `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
1589	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1590	XXX_unrecognized     []byte   `json:"-"`
1591	XXX_sizecache        int32    `json:"-"`
1592}
1593
1594func (m *EncryptResponse) Reset()         { *m = EncryptResponse{} }
1595func (m *EncryptResponse) String() string { return proto.CompactTextString(m) }
1596func (*EncryptResponse) ProtoMessage()    {}
1597func (*EncryptResponse) Descriptor() ([]byte, []int) {
1598	return fileDescriptor_723aeaeb61739a25, []int{25}
1599}
1600
1601func (m *EncryptResponse) XXX_Unmarshal(b []byte) error {
1602	return xxx_messageInfo_EncryptResponse.Unmarshal(m, b)
1603}
1604func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1605	return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic)
1606}
1607func (m *EncryptResponse) XXX_Merge(src proto.Message) {
1608	xxx_messageInfo_EncryptResponse.Merge(m, src)
1609}
1610func (m *EncryptResponse) XXX_Size() int {
1611	return xxx_messageInfo_EncryptResponse.Size(m)
1612}
1613func (m *EncryptResponse) XXX_DiscardUnknown() {
1614	xxx_messageInfo_EncryptResponse.DiscardUnknown(m)
1615}
1616
1617var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo
1618
1619func (m *EncryptResponse) GetName() string {
1620	if m != nil {
1621		return m.Name
1622	}
1623	return ""
1624}
1625
1626func (m *EncryptResponse) GetCiphertext() []byte {
1627	if m != nil {
1628		return m.Ciphertext
1629	}
1630	return nil
1631}
1632
1633// Response message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign].
1634type AsymmetricSignResponse struct {
1635	// The created signature.
1636	Signature            []byte   `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"`
1637	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1638	XXX_unrecognized     []byte   `json:"-"`
1639	XXX_sizecache        int32    `json:"-"`
1640}
1641
1642func (m *AsymmetricSignResponse) Reset()         { *m = AsymmetricSignResponse{} }
1643func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) }
1644func (*AsymmetricSignResponse) ProtoMessage()    {}
1645func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) {
1646	return fileDescriptor_723aeaeb61739a25, []int{26}
1647}
1648
1649func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error {
1650	return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b)
1651}
1652func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1653	return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic)
1654}
1655func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) {
1656	xxx_messageInfo_AsymmetricSignResponse.Merge(m, src)
1657}
1658func (m *AsymmetricSignResponse) XXX_Size() int {
1659	return xxx_messageInfo_AsymmetricSignResponse.Size(m)
1660}
1661func (m *AsymmetricSignResponse) XXX_DiscardUnknown() {
1662	xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m)
1663}
1664
1665var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo
1666
1667func (m *AsymmetricSignResponse) GetSignature() []byte {
1668	if m != nil {
1669		return m.Signature
1670	}
1671	return nil
1672}
1673
1674// Response message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt].
1675type AsymmetricDecryptResponse struct {
1676	// The decrypted data originally encrypted with the matching public key.
1677	Plaintext            []byte   `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
1678	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1679	XXX_unrecognized     []byte   `json:"-"`
1680	XXX_sizecache        int32    `json:"-"`
1681}
1682
1683func (m *AsymmetricDecryptResponse) Reset()         { *m = AsymmetricDecryptResponse{} }
1684func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) }
1685func (*AsymmetricDecryptResponse) ProtoMessage()    {}
1686func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) {
1687	return fileDescriptor_723aeaeb61739a25, []int{27}
1688}
1689
1690func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error {
1691	return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b)
1692}
1693func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1694	return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic)
1695}
1696func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) {
1697	xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src)
1698}
1699func (m *AsymmetricDecryptResponse) XXX_Size() int {
1700	return xxx_messageInfo_AsymmetricDecryptResponse.Size(m)
1701}
1702func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() {
1703	xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m)
1704}
1705
1706var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo
1707
1708func (m *AsymmetricDecryptResponse) GetPlaintext() []byte {
1709	if m != nil {
1710		return m.Plaintext
1711	}
1712	return nil
1713}
1714
1715// Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion].
1716type UpdateCryptoKeyPrimaryVersionRequest struct {
1717	// Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to update.
1718	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1719	// Required. The id of the child [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary.
1720	CryptoKeyVersionId   string   `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"`
1721	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1722	XXX_unrecognized     []byte   `json:"-"`
1723	XXX_sizecache        int32    `json:"-"`
1724}
1725
1726func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset()         { *m = UpdateCryptoKeyPrimaryVersionRequest{} }
1727func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) }
1728func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage()    {}
1729func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) {
1730	return fileDescriptor_723aeaeb61739a25, []int{28}
1731}
1732
1733func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error {
1734	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b)
1735}
1736func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1737	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic)
1738}
1739func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) {
1740	xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src)
1741}
1742func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int {
1743	return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m)
1744}
1745func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() {
1746	xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m)
1747}
1748
1749var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo
1750
1751func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string {
1752	if m != nil {
1753		return m.Name
1754	}
1755	return ""
1756}
1757
1758func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string {
1759	if m != nil {
1760		return m.CryptoKeyVersionId
1761	}
1762	return ""
1763}
1764
1765// Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion].
1766type DestroyCryptoKeyVersionRequest struct {
1767	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
1768	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1769	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1770	XXX_unrecognized     []byte   `json:"-"`
1771	XXX_sizecache        int32    `json:"-"`
1772}
1773
1774func (m *DestroyCryptoKeyVersionRequest) Reset()         { *m = DestroyCryptoKeyVersionRequest{} }
1775func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1776func (*DestroyCryptoKeyVersionRequest) ProtoMessage()    {}
1777func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1778	return fileDescriptor_723aeaeb61739a25, []int{29}
1779}
1780
1781func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1782	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b)
1783}
1784func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1785	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1786}
1787func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1788	xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src)
1789}
1790func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int {
1791	return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m)
1792}
1793func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1794	xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m)
1795}
1796
1797var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo
1798
1799func (m *DestroyCryptoKeyVersionRequest) GetName() string {
1800	if m != nil {
1801		return m.Name
1802	}
1803	return ""
1804}
1805
1806// Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion].
1807type RestoreCryptoKeyVersionRequest struct {
1808	// Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
1809	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
1810	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1811	XXX_unrecognized     []byte   `json:"-"`
1812	XXX_sizecache        int32    `json:"-"`
1813}
1814
1815func (m *RestoreCryptoKeyVersionRequest) Reset()         { *m = RestoreCryptoKeyVersionRequest{} }
1816func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) }
1817func (*RestoreCryptoKeyVersionRequest) ProtoMessage()    {}
1818func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) {
1819	return fileDescriptor_723aeaeb61739a25, []int{30}
1820}
1821
1822func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error {
1823	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b)
1824}
1825func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1826	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic)
1827}
1828func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) {
1829	xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src)
1830}
1831func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int {
1832	return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m)
1833}
1834func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() {
1835	xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m)
1836}
1837
1838var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo
1839
1840func (m *RestoreCryptoKeyVersionRequest) GetName() string {
1841	if m != nil {
1842		return m.Name
1843	}
1844	return ""
1845}
1846
1847// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest.
1848type Digest struct {
1849	// Required. The message digest.
1850	//
1851	// Types that are valid to be assigned to Digest:
1852	//	*Digest_Sha256
1853	//	*Digest_Sha384
1854	//	*Digest_Sha512
1855	Digest               isDigest_Digest `protobuf_oneof:"digest"`
1856	XXX_NoUnkeyedLiteral struct{}        `json:"-"`
1857	XXX_unrecognized     []byte          `json:"-"`
1858	XXX_sizecache        int32           `json:"-"`
1859}
1860
1861func (m *Digest) Reset()         { *m = Digest{} }
1862func (m *Digest) String() string { return proto.CompactTextString(m) }
1863func (*Digest) ProtoMessage()    {}
1864func (*Digest) Descriptor() ([]byte, []int) {
1865	return fileDescriptor_723aeaeb61739a25, []int{31}
1866}
1867
1868func (m *Digest) XXX_Unmarshal(b []byte) error {
1869	return xxx_messageInfo_Digest.Unmarshal(m, b)
1870}
1871func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1872	return xxx_messageInfo_Digest.Marshal(b, m, deterministic)
1873}
1874func (m *Digest) XXX_Merge(src proto.Message) {
1875	xxx_messageInfo_Digest.Merge(m, src)
1876}
1877func (m *Digest) XXX_Size() int {
1878	return xxx_messageInfo_Digest.Size(m)
1879}
1880func (m *Digest) XXX_DiscardUnknown() {
1881	xxx_messageInfo_Digest.DiscardUnknown(m)
1882}
1883
1884var xxx_messageInfo_Digest proto.InternalMessageInfo
1885
1886type isDigest_Digest interface {
1887	isDigest_Digest()
1888}
1889
1890type Digest_Sha256 struct {
1891	Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"`
1892}
1893
1894type Digest_Sha384 struct {
1895	Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"`
1896}
1897
1898type Digest_Sha512 struct {
1899	Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"`
1900}
1901
1902func (*Digest_Sha256) isDigest_Digest() {}
1903
1904func (*Digest_Sha384) isDigest_Digest() {}
1905
1906func (*Digest_Sha512) isDigest_Digest() {}
1907
1908func (m *Digest) GetDigest() isDigest_Digest {
1909	if m != nil {
1910		return m.Digest
1911	}
1912	return nil
1913}
1914
1915func (m *Digest) GetSha256() []byte {
1916	if x, ok := m.GetDigest().(*Digest_Sha256); ok {
1917		return x.Sha256
1918	}
1919	return nil
1920}
1921
1922func (m *Digest) GetSha384() []byte {
1923	if x, ok := m.GetDigest().(*Digest_Sha384); ok {
1924		return x.Sha384
1925	}
1926	return nil
1927}
1928
1929func (m *Digest) GetSha512() []byte {
1930	if x, ok := m.GetDigest().(*Digest_Sha512); ok {
1931		return x.Sha512
1932	}
1933	return nil
1934}
1935
1936// XXX_OneofWrappers is for the internal use of the proto package.
1937func (*Digest) XXX_OneofWrappers() []interface{} {
1938	return []interface{}{
1939		(*Digest_Sha256)(nil),
1940		(*Digest_Sha384)(nil),
1941		(*Digest_Sha512)(nil),
1942	}
1943}
1944
1945// Cloud KMS metadata for the given [google.cloud.location.Location][google.cloud.location.Location].
1946type LocationMetadata struct {
1947	// Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with
1948	// [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]
1949	// [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this location.
1950	HsmAvailable         bool     `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"`
1951	XXX_NoUnkeyedLiteral struct{} `json:"-"`
1952	XXX_unrecognized     []byte   `json:"-"`
1953	XXX_sizecache        int32    `json:"-"`
1954}
1955
1956func (m *LocationMetadata) Reset()         { *m = LocationMetadata{} }
1957func (m *LocationMetadata) String() string { return proto.CompactTextString(m) }
1958func (*LocationMetadata) ProtoMessage()    {}
1959func (*LocationMetadata) Descriptor() ([]byte, []int) {
1960	return fileDescriptor_723aeaeb61739a25, []int{32}
1961}
1962
1963func (m *LocationMetadata) XXX_Unmarshal(b []byte) error {
1964	return xxx_messageInfo_LocationMetadata.Unmarshal(m, b)
1965}
1966func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
1967	return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic)
1968}
1969func (m *LocationMetadata) XXX_Merge(src proto.Message) {
1970	xxx_messageInfo_LocationMetadata.Merge(m, src)
1971}
1972func (m *LocationMetadata) XXX_Size() int {
1973	return xxx_messageInfo_LocationMetadata.Size(m)
1974}
1975func (m *LocationMetadata) XXX_DiscardUnknown() {
1976	xxx_messageInfo_LocationMetadata.DiscardUnknown(m)
1977}
1978
1979var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo
1980
1981func (m *LocationMetadata) GetHsmAvailable() bool {
1982	if m != nil {
1983		return m.HsmAvailable
1984	}
1985	return false
1986}
1987
1988func init() {
1989	proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest")
1990	proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest")
1991	proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest")
1992	proto.RegisterType((*ListImportJobsRequest)(nil), "google.cloud.kms.v1.ListImportJobsRequest")
1993	proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse")
1994	proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse")
1995	proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse")
1996	proto.RegisterType((*ListImportJobsResponse)(nil), "google.cloud.kms.v1.ListImportJobsResponse")
1997	proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest")
1998	proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest")
1999	proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest")
2000	proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest")
2001	proto.RegisterType((*GetImportJobRequest)(nil), "google.cloud.kms.v1.GetImportJobRequest")
2002	proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest")
2003	proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest")
2004	proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest")
2005	proto.RegisterType((*ImportCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.ImportCryptoKeyVersionRequest")
2006	proto.RegisterType((*CreateImportJobRequest)(nil), "google.cloud.kms.v1.CreateImportJobRequest")
2007	proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest")
2008	proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest")
2009	proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest")
2010	proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest")
2011	proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest")
2012	proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest")
2013	proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse")
2014	proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse")
2015	proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse")
2016	proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse")
2017	proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest")
2018	proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest")
2019	proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest")
2020	proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest")
2021	proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata")
2022}
2023
2024func init() {
2025	proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25)
2026}
2027
2028var fileDescriptor_723aeaeb61739a25 = []byte{
2029	// 2304 bytes of a gzipped FileDescriptorProto
2030	0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x5a, 0xcd, 0x6f, 0x1b, 0xc7,
2031	0x15, 0xcf, 0xd0, 0xb6, 0x2c, 0x3d, 0xc9, 0x92, 0x3d, 0xb2, 0x65, 0x99, 0xb6, 0x64, 0x7b, 0x95,
2032	0x3a, 0xb6, 0xe2, 0x70, 0x2b, 0x3a, 0x76, 0x6d, 0xba, 0x86, 0xbb, 0xb2, 0x12, 0x5b, 0x51, 0x9c,
2033	0x0a, 0xf4, 0x57, 0x9b, 0xaa, 0xdd, 0x8c, 0xc8, 0x11, 0xb5, 0x21, 0x77, 0x97, 0xd9, 0x5d, 0x52,
2034	0x61, 0xda, 0x5c, 0x0a, 0xa4, 0x40, 0x81, 0x02, 0x3d, 0xe4, 0xd0, 0x02, 0x45, 0x8a, 0xa2, 0xc7,
2035	0x5e, 0x9b, 0xf6, 0xd0, 0x0f, 0xa0, 0xa7, 0x1e, 0xd2, 0x43, 0xd1, 0x8f, 0x93, 0x02, 0x04, 0x3e,
2036	0xf4, 0x0f, 0x28, 0x7a, 0x2a, 0xda, 0x4b, 0xb0, 0x33, 0xb3, 0x9f, 0xdc, 0x25, 0x29, 0x6a, 0x0d,
2037	0xe4, 0x66, 0xce, 0xbe, 0x79, 0xf3, 0xfb, 0xbd, 0x79, 0xef, 0xcd, 0xcc, 0xcf, 0x82, 0xf3, 0x35,
2038	0xd3, 0xac, 0x35, 0xa8, 0x5c, 0x69, 0x98, 0xad, 0xaa, 0x5c, 0xd7, 0x6d, 0xb9, 0xbd, 0x24, 0xdb,
2039	0xd4, 0x6a, 0x6b, 0x15, 0x5a, 0x68, 0x5a, 0xa6, 0x63, 0xe2, 0x69, 0x6e, 0x52, 0x60, 0x26, 0x85,
2040	0xba, 0x6e, 0x17, 0xda, 0x4b, 0xf9, 0x33, 0x62, 0x1e, 0x69, 0x6a, 0x32, 0x31, 0x0c, 0xd3, 0x21,
2041	0x8e, 0x66, 0x1a, 0x36, 0x9f, 0x92, 0x3f, 0x19, 0xfa, 0x5a, 0x69, 0x68, 0xd4, 0x70, 0xc4, 0x87,
2042	0xb3, 0xa1, 0x0f, 0x5b, 0x1a, 0x6d, 0x54, 0xd5, 0x4d, 0xba, 0x4d, 0xda, 0x9a, 0x69, 0x09, 0x83,
2043	0x53, 0x21, 0x03, 0x8b, 0xda, 0x66, 0xcb, 0xf2, 0x70, 0xe4, 0x17, 0x92, 0xa0, 0x7a, 0x36, 0xde,
2044	0xca, 0xe7, 0x84, 0x11, 0xfb, 0xb5, 0xd9, 0xda, 0x12, 0xab, 0xe8, 0xc4, 0xae, 0x73, 0x0b, 0xe9,
2045	0x53, 0x04, 0xd3, 0xaf, 0x6b, 0xb6, 0xb3, 0x46, 0x3b, 0x65, 0xcd, 0xa8, 0xd9, 0x65, 0xfa, 0x4e,
2046	0x8b, 0xda, 0x0e, 0x56, 0x60, 0xa4, 0x49, 0x2c, 0x6a, 0x38, 0xb3, 0xe8, 0x1c, 0xba, 0x38, 0xb6,
2047	0x7c, 0xe9, 0xa9, 0x92, 0xfb, 0x9f, 0xb2, 0x00, 0xe7, 0x1b, 0x66, 0x45, 0x90, 0xe3, 0xbe, 0x49,
2048	0x53, 0xb3, 0x0b, 0x15, 0x53, 0x97, 0x5f, 0x17, 0x1f, 0xca, 0x62, 0x22, 0x3e, 0x07, 0x63, 0x4d,
2049	0x52, 0xa3, 0xaa, 0xad, 0xbd, 0x47, 0x67, 0x73, 0xe7, 0xd0, 0xc5, 0x43, 0xcb, 0x07, 0x9e, 0x2a,
2050	0xa8, 0x3c, 0xea, 0x8e, 0x3e, 0xd0, 0xde, 0xa3, 0x58, 0x02, 0x60, 0x16, 0x8e, 0x59, 0xa7, 0xc6,
2051	0xec, 0x01, 0xb6, 0x10, 0x33, 0x61, 0x13, 0x1f, 0xba, 0xa3, 0xf8, 0x34, 0x8c, 0x6c, 0x69, 0x0d,
2052	0x87, 0x5a, 0xb3, 0x07, 0x83, 0xef, 0x62, 0x08, 0xcf, 0xc3, 0xa8, 0x69, 0x55, 0xa9, 0xa5, 0x6e,
2053	0x76, 0x66, 0x0f, 0x05, 0x9f, 0x0f, 0xb3, 0xc1, 0xe5, 0x8e, 0xf4, 0xbb, 0x1c, 0x9c, 0x70, 0xd9,
2054	0xdd, 0xb1, 0x3a, 0x4d, 0xc7, 0x5c, 0xa3, 0x1d, 0x9f, 0xdf, 0xed, 0x18, 0xbf, 0x17, 0x18, 0xbf,
2055	0xf3, 0x70, 0x96, 0xc5, 0xd3, 0xdd, 0xd6, 0x18, 0x3d, 0x11, 0xa0, 0x8c, 0xd9, 0x7d, 0x1b, 0x26,
2056	0xda, 0xd4, 0xb2, 0x35, 0xd3, 0x50, 0xdb, 0x1a, 0xdd, 0x61, 0x1c, 0x27, 0x8b, 0xa5, 0x42, 0x42,
2057	0x92, 0x15, 0x7c, 0x12, 0x8f, 0xf9, 0x8c, 0xae, 0x81, 0xc7, 0x1a, 0xdd, 0x29, 0x8f, 0xb7, 0x83,
2058	0x1f, 0xa1, 0xe0, 0x1d, 0xea, 0x1d, 0xbc, 0x91, 0x84, 0xe0, 0x7d, 0x9c, 0x83, 0x33, 0x91, 0xe0,
2059	0x89, 0x65, 0xfa, 0xe7, 0x48, 0x5a, 0x0c, 0x7d, 0x4f, 0x19, 0x47, 0xf1, 0x0d, 0x38, 0x98, 0x51,
2060	0xf4, 0x98, 0x9f, 0xfd, 0x85, 0xed, 0x53, 0xc4, 0x73, 0x6e, 0x55, 0x6f, 0x9a, 0x96, 0xf3, 0x9a,
2061	0xb9, 0xf9, 0x45, 0xcb, 0xb9, 0x7d, 0x55, 0xd4, 0x4f, 0x11, 0x1c, 0x8f, 0xf6, 0x0b, 0xbb, 0x69,
2062	0x1a, 0x36, 0xc5, 0x37, 0x60, 0xac, 0x4e, 0x3b, 0xaa, 0xe5, 0x0e, 0xce, 0xa2, 0x73, 0x07, 0x2e,
2063	0x8e, 0x17, 0xcf, 0x24, 0x6e, 0x84, 0x47, 0x6a, 0xb4, 0x2e, 0x5c, 0xe0, 0x0b, 0x30, 0x65, 0xd0,
2064	0x77, 0x1d, 0x35, 0x84, 0xdc, 0x25, 0x37, 0x56, 0x3e, 0xe2, 0x0e, 0xaf, 0xfb, 0xc0, 0xe7, 0x00,
2065	0x1c, 0xd3, 0x21, 0x0d, 0xce, 0xdf, 0x25, 0x77, 0xa8, 0x3c, 0xc6, 0x46, 0x5c, 0xee, 0xd2, 0x2f,
2066	0x10, 0xcc, 0xc4, 0x8b, 0x5d, 0x80, 0xbb, 0x0d, 0xe3, 0x15, 0x36, 0xaa, 0xd6, 0x69, 0xc7, 0x83,
2067	0x37, 0xdf, 0x3b, 0x4f, 0xca, 0x50, 0xf1, 0x1d, 0x65, 0x05, 0xf1, 0x8f, 0x08, 0xe6, 0x52, 0x4a,
2068	0x4a, 0x20, 0x7d, 0x04, 0xd3, 0x01, 0x52, 0x55, 0xd4, 0xb2, 0x87, 0xf8, 0x4b, 0x03, 0x65, 0x76,
2069	0xf9, 0x58, 0x25, 0xee, 0x3e, 0xeb, 0x10, 0x87, 0x73, 0x3b, 0x08, 0xb1, 0xc6, 0x46, 0xd5, 0xb7,
2070	0xcd, 0xcd, 0xde, 0x21, 0xf6, 0x67, 0x97, 0x41, 0xf3, 0x1d, 0x65, 0x05, 0x71, 0x1d, 0x8e, 0xdd,
2071	0xa5, 0x5e, 0x7a, 0x7a, 0x95, 0x77, 0x13, 0x0e, 0x1a, 0x44, 0xa7, 0x7b, 0xad, 0x3b, 0x36, 0x49,
2072	0x7a, 0x08, 0xd3, 0x77, 0x69, 0xb0, 0x65, 0x9e, 0xcf, 0x5b, 0x11, 0x9f, 0x7b, 0xe8, 0x7d, 0xdc,
2073	0xeb, 0x26, 0xe4, 0xc3, 0x5e, 0xbd, 0xbd, 0x13, 0xce, 0x57, 0x22, 0xce, 0xbf, 0xcc, 0x9c, 0x2f,
2074	0xc2, 0xc5, 0xbe, 0xce, 0x3d, 0x37, 0x7c, 0x8d, 0x6f, 0x31, 0xe4, 0xeb, 0xad, 0xcd, 0x86, 0x56,
2075	0x09, 0x21, 0xcf, 0xc6, 0x39, 0x0f, 0x4b, 0xb0, 0x97, 0xc3, 0x85, 0x25, 0x98, 0xcf, 0xbd, 0xfe,
2076	0x01, 0xc1, 0xf1, 0x3b, 0x16, 0x25, 0x0e, 0x8d, 0x6d, 0x61, 0x06, 0x17, 0x92, 0x05, 0x18, 0xf7,
2077	0x5a, 0x94, 0xaa, 0x55, 0x79, 0x76, 0xb9, 0xed, 0x2d, 0x57, 0x1e, 0x13, 0xbd, 0x68, 0xb5, 0x8a,
2078	0xbf, 0x0a, 0xa3, 0x9e, 0x11, 0x4b, 0xae, 0x3e, 0x6d, 0x8c, 0xcf, 0x3f, 0x2c, 0xe6, 0x4b, 0x3f,
2079	0xcc, 0xc1, 0x0c, 0x87, 0xdf, 0x95, 0x2f, 0xfb, 0xee, 0xfe, 0x2f, 0xc0, 0x91, 0x50, 0x6b, 0x88,
2080	0x12, 0x18, 0xf7, 0x4b, 0x7e, 0xb5, 0x8a, 0x97, 0x01, 0x02, 0x43, 0x41, 0xa2, 0x4f, 0xb3, 0x13,
2081	0x61, 0xf0, 0xbd, 0x60, 0x05, 0xe6, 0xec, 0xba, 0xd6, 0x54, 0x35, 0x43, 0x73, 0x34, 0xd2, 0xf0,
2082	0x3a, 0x91, 0x5a, 0x71, 0xc9, 0x69, 0xa6, 0xc1, 0x0e, 0x87, 0xd1, 0x72, 0xde, 0x35, 0x5a, 0xe5,
2083	0x36, 0x22, 0x3d, 0xee, 0x08, 0x0b, 0x77, 0x2b, 0xe7, 0x62, 0xb1, 0x88, 0x65, 0x79, 0x06, 0x17,
2084	0x88, 0x6f, 0x00, 0xee, 0xee, 0x97, 0x2c, 0x32, 0x83, 0xb6, 0x4b, 0x4e, 0xfd, 0x68, 0xbc, 0x67,
2085	0x4a, 0xbf, 0xce, 0xc1, 0x1c, 0xcf, 0xce, 0x67, 0x08, 0x7f, 0x13, 0xc6, 0x48, 0xa3, 0x66, 0x5a,
2086	0x9a, 0xb3, 0xad, 0x33, 0xd4, 0x93, 0xc5, 0xdb, 0xc3, 0x5d, 0x5f, 0x14, 0xcf, 0x8d, 0xd8, 0x4a,
2087	0xdf, 0xad, 0x7b, 0x27, 0x08, 0x3a, 0x73, 0x70, 0xe6, 0xe7, 0xca, 0x63, 0x7e, 0xf7, 0xc5, 0x32,
2088	0x4c, 0x5b, 0x36, 0x51, 0x09, 0xb5, 0xd5, 0x1d, 0x8b, 0x34, 0x9b, 0xb4, 0xca, 0x72, 0xc7, 0xdd,
2089	0xe4, 0x89, 0x7b, 0xcf, 0x95, 0x8f, 0x5a, 0x36, 0x51, 0xa8, 0xfd, 0x84, 0x7f, 0x72, 0xf3, 0x65,
2090	0x06, 0x8e, 0x87, 0x0c, 0x55, 0x9d, 0x38, 0xd4, 0xd2, 0x48, 0x43, 0xfa, 0x33, 0xf2, 0x0a, 0xa0,
2091	0xab, 0x33, 0x64, 0x51, 0x00, 0x01, 0x91, 0x78, 0x01, 0xf8, 0x5c, 0x78, 0x01, 0x84, 0x18, 0xf7,
2092	0x2a, 0x00, 0x1f, 0x64, 0x3c, 0x22, 0xd2, 0xcf, 0x11, 0xcc, 0x3c, 0x6a, 0x56, 0x93, 0x2a, 0x39,
2093	0x5a, 0x5f, 0x68, 0xa8, 0xfa, 0xfa, 0x1a, 0x8c, 0xb7, 0x98, 0x77, 0xf6, 0x18, 0x13, 0x09, 0x9b,
2094	0xf7, 0x9c, 0x78, 0xef, 0xb5, 0xc2, 0xab, 0xee, 0x7b, 0xed, 0x3e, 0xb1, 0xeb, 0xdc, 0x01, 0xf0,
2095	0x39, 0xee, 0x80, 0xf4, 0x7b, 0x04, 0x73, 0x31, 0x80, 0xb1, 0xfc, 0x4c, 0xae, 0x0d, 0xb4, 0xff,
2096	0xda, 0xc8, 0x00, 0xfd, 0xcf, 0x10, 0x4c, 0xbe, 0x62, 0x30, 0xc7, 0x1e, 0xdc, 0xb9, 0xc8, 0xc9,
2097	0x31, 0xc6, 0xb2, 0xe3, 0x00, 0xa0, 0x45, 0x7e, 0x32, 0xe0, 0xf3, 0x30, 0xd6, 0x6c, 0x10, 0xcd,
2098	0x70, 0xe8, 0xbb, 0x0e, 0x5b, 0x71, 0x42, 0x04, 0xd5, 0x1f, 0xc5, 0x77, 0x61, 0x8e, 0x54, 0xab,
2099	0x9a, 0xdb, 0x7d, 0x48, 0x43, 0x25, 0x2d, 0x67, 0x9b, 0x1a, 0x8e, 0x56, 0x21, 0x0e, 0xad, 0xaa,
2100	0x55, 0xe2, 0x10, 0x96, 0x0a, 0x13, 0xfc, 0x46, 0x7b, 0x3a, 0xb0, 0x54, 0xc2, 0x86, 0x2b, 0xc4,
2101	0x21, 0xee, 0x3d, 0x6d, 0x72, 0x85, 0x46, 0xd0, 0xed, 0xef, 0xb8, 0xc7, 0x0b, 0x00, 0x15, 0xad,
2102	0xb9, 0x4d, 0xad, 0x38, 0xfc, 0xd0, 0x70, 0x76, 0xf8, 0x7f, 0x82, 0xe0, 0x84, 0x62, 0x77, 0x74,
2103	0x9d, 0x3a, 0x96, 0x56, 0x79, 0xa0, 0xd5, 0xb2, 0xbd, 0x58, 0xe0, 0xeb, 0x30, 0x52, 0xd5, 0x6a,
2104	0xd4, 0x76, 0x44, 0x71, 0x9d, 0x4e, 0xcc, 0xa6, 0x15, 0x66, 0xc2, 0x69, 0x0a, 0x7b, 0xe9, 0x03,
2105	0x04, 0xb3, 0x01, 0xb2, 0x58, 0x8c, 0xb3, 0x01, 0x17, 0x0d, 0xf5, 0x81, 0xc4, 0x50, 0x4b, 0x32,
2106	0x4c, 0xf9, 0x8b, 0x8b, 0x1b, 0xec, 0x99, 0x70, 0x82, 0xb9, 0x10, 0x26, 0x42, 0xb9, 0x25, 0xbd,
2107	0x02, 0x53, 0x7e, 0xbe, 0x8a, 0x09, 0x38, 0x0c, 0x57, 0x2c, 0x3e, 0xdf, 0xbd, 0xcf, 0x91, 0x75,
2108	0xaf, 0xc1, 0x4c, 0x7c, 0x63, 0x82, 0xe5, 0x6d, 0xad, 0x66, 0x10, 0xa7, 0x65, 0x51, 0x6f, 0x79,
2109	0x7f, 0x40, 0xba, 0x01, 0xa7, 0x12, 0xc2, 0x36, 0x10, 0xf2, 0x8f, 0x10, 0x3c, 0x1f, 0x6b, 0x14,
2110	0xeb, 0x96, 0xa6, 0x13, 0x2b, 0xde, 0x2f, 0xf6, 0x99, 0xe2, 0xd7, 0xe0, 0x44, 0x77, 0xbb, 0x89,
2111	0xb5, 0x69, 0x1c, 0x6f, 0x25, 0xab, 0x55, 0x69, 0x0b, 0xe6, 0x57, 0xa8, 0xed, 0x58, 0x66, 0xe7,
2112	0xd9, 0xde, 0x86, 0xb7, 0x60, 0xbe, 0x4c, 0x6d, 0xc7, 0xb4, 0xe8, 0xb3, 0x5d, 0xe7, 0x2d, 0x18,
2113	0xe1, 0x99, 0x8f, 0x67, 0x61, 0xc4, 0xde, 0x26, 0xc5, 0xab, 0xd7, 0xf8, 0xa6, 0xdc, 0x7b, 0xae,
2114	0x2c, 0x7e, 0x8b, 0x2f, 0x57, 0xae, 0xbf, 0xcc, 0x53, 0x44, 0x7c, 0xb9, 0x72, 0xfd, 0x65, 0xf1,
2115	0xe5, 0xea, 0x52, 0x91, 0x67, 0xae, 0xf8, 0x72, 0x75, 0xa9, 0xb8, 0x3c, 0xea, 0x15, 0x9d, 0xf4,
2116	0x15, 0x38, 0xea, 0x5d, 0x6e, 0xef, 0x53, 0x87, 0xb8, 0xad, 0x01, 0x2f, 0xc0, 0x91, 0x6d, 0x5b,
2117	0x57, 0x49, 0x9b, 0x68, 0x0d, 0xb2, 0xd9, 0xe0, 0x24, 0x46, 0xcb, 0x13, 0xdb, 0xb6, 0xae, 0x78,
2118	0x63, 0xc5, 0x1f, 0x5c, 0x80, 0xe3, 0x6b, 0xb4, 0x73, 0x9f, 0x18, 0xa4, 0x46, 0x75, 0x6a, 0x38,
2119	0x0f, 0xb8, 0xb6, 0x89, 0x7f, 0x89, 0x60, 0x22, 0xfc, 0xac, 0xc7, 0x17, 0x13, 0x2b, 0x3a, 0x41,
2120	0x29, 0xcc, 0x5f, 0x1a, 0xc0, 0x92, 0xe7, 0xa9, 0x74, 0x6b, 0x57, 0x11, 0x67, 0xf9, 0xf7, 0xff,
2121	0xf1, 0xaf, 0x0f, 0x73, 0x05, 0x7c, 0x59, 0x6e, 0x2f, 0xc9, 0xdf, 0xe5, 0x43, 0xb7, 0x9a, 0x96,
2122	0xf9, 0x36, 0xad, 0x38, 0xb6, 0xbc, 0x28, 0xfb, 0x77, 0x7a, 0x79, 0xf1, 0x7d, 0xd9, 0xd7, 0x09,
2123	0x7e, 0x83, 0x60, 0x32, 0xfa, 0xc0, 0xc7, 0x8b, 0xa9, 0x8b, 0x77, 0x49, 0x7e, 0xf9, 0x17, 0x07,
2124	0xb2, 0x15, 0x50, 0x5f, 0x8b, 0x42, 0xbd, 0x89, 0x6f, 0xf4, 0x87, 0xea, 0x23, 0x75, 0x51, 0x87,
2125	0xc4, 0x83, 0xcf, 0x50, 0x4c, 0x85, 0xf4, 0x9f, 0xe5, 0x4b, 0xfd, 0x21, 0xc5, 0x44, 0xb7, 0x7c,
2126	0x71, 0x2f, 0x53, 0x04, 0x99, 0xef, 0x44, 0xc9, 0x7c, 0x1d, 0xdf, 0xdf, 0x13, 0x99, 0x10, 0x97,
2127	0x08, 0x33, 0x9f, 0x86, 0xb7, 0x31, 0x81, 0x2c, 0xd0, 0x63, 0x63, 0xba, 0x74, 0xb1, 0x1e, 0x1b,
2128	0xd3, 0xad, 0x33, 0xec, 0x7f, 0x63, 0x42, 0x92, 0xc3, 0x8f, 0x11, 0x40, 0x20, 0x16, 0xe0, 0x0b,
2129	0x89, 0x38, 0xba, 0xd4, 0x84, 0x7c, 0xcf, 0x07, 0xa1, 0x74, 0x73, 0x57, 0x61, 0x7d, 0x20, 0x92,
2130	0xe2, 0xee, 0xc0, 0x00, 0xe0, 0x58, 0x1d, 0x86, 0x65, 0x81, 0x94, 0x3a, 0x4c, 0xd0, 0x23, 0xf2,
2131	0x7d, 0x6e, 0xa0, 0xd2, 0xbd, 0x30, 0x2e, 0x2f, 0x6c, 0x83, 0xe1, 0x8a, 0x26, 0x00, 0xfe, 0x0b,
2132	0x8a, 0x2a, 0x22, 0xde, 0xad, 0x50, 0xee, 0x8b, 0x35, 0xda, 0x6f, 0xf3, 0x83, 0x5d, 0x42, 0xa5,
2133	0x8d, 0x30, 0x72, 0x2f, 0x79, 0x87, 0x40, 0xde, 0x9d, 0xb9, 0x2e, 0x9b, 0x3f, 0xf1, 0x90, 0xfb,
2134	0x2a, 0x49, 0x7a, 0xc8, 0xe3, 0x42, 0x4a, 0x4a, 0xc8, 0x7d, 0x33, 0x69, 0x2b, 0x0c, 0xfc, 0x9b,
2135	0xf8, 0x49, 0xa6, 0xc0, 0xe5, 0xa6, 0x8f, 0x58, 0x64, 0x8d, 0x5f, 0x2d, 0xe9, 0x14, 0xe2, 0x8f,
2136	0xb2, 0x7c, 0x9f, 0x67, 0xd1, 0xbe, 0xb2, 0x26, 0xa8, 0x34, 0x37, 0xce, 0xbf, 0x45, 0x70, 0x24,
2137	0xa2, 0xec, 0xe0, 0x4b, 0x29, 0xdb, 0xdf, 0xad, 0xfe, 0xf4, 0x29, 0xb9, 0x8d, 0x5d, 0xe5, 0x34,
2138	0x6f, 0x00, 0x97, 0x43, 0x02, 0x8f, 0xff, 0x6f, 0x86, 0xfd, 0xba, 0xb4, 0xa7, 0xc3, 0xa6, 0xe4,
2139	0xab, 0x40, 0xf8, 0xaf, 0x08, 0xa6, 0x62, 0x3a, 0x06, 0x7e, 0xb1, 0x07, 0xf4, 0x3d, 0x57, 0xa6,
2140	0xb9, 0xab, 0x9c, 0x15, 0xf0, 0x23, 0x02, 0x4f, 0xe8, 0x17, 0xa3, 0x70, 0x57, 0x1a, 0xfe, 0x10,
2141	0x2a, 0x85, 0x9e, 0xac, 0xf8, 0xff, 0xa8, 0x4b, 0xa5, 0xf2, 0x6a, 0xb8, 0x38, 0x08, 0xb1, 0xe1,
2142	0xca, 0xf8, 0x03, 0xb4, 0xab, 0x9c, 0xea, 0xe6, 0x29, 0x2e, 0x8a, 0x8c, 0x61, 0x45, 0xca, 0xf6,
2143	0x64, 0x2a, 0x25, 0x3c, 0x80, 0xf1, 0x3f, 0x11, 0xcc, 0x24, 0x0b, 0x3b, 0x29, 0xec, 0x7b, 0xaa,
2144	0x40, 0x83, 0xb2, 0x57, 0x79, 0x13, 0x90, 0x1e, 0x66, 0x4b, 0x90, 0xd7, 0x58, 0x09, 0x2d, 0x86,
2145	0xd2, 0x34, 0xe8, 0x03, 0xbd, 0xd2, 0x74, 0xcf, 0xad, 0x20, 0x94, 0xa6, 0x11, 0x19, 0x26, 0xf4,
2146	0x6b, 0xc8, 0x34, 0x0d, 0x1a, 0x45, 0x29, 0x24, 0xdc, 0xe0, 0xbf, 0x21, 0x98, 0x8a, 0x3d, 0x5c,
2147	0x52, 0x18, 0x25, 0x0b, 0x35, 0x7d, 0x0b, 0xef, 0x9d, 0x5d, 0x65, 0x26, 0x48, 0x90, 0xcb, 0x21,
2148	0x49, 0x83, 0x11, 0x29, 0x17, 0x57, 0x18, 0x91, 0xc0, 0xa4, 0x30, 0xcc, 0x79, 0x19, 0x29, 0xbd,
2149	0x0f, 0x73, 0x5d, 0xb2, 0x52, 0xef, 0xe4, 0xeb, 0x29, 0xf1, 0x0c, 0x9a, 0x7c, 0x1f, 0xa1, 0x5d,
2150	0x65, 0xbe, 0xbb, 0x14, 0xba, 0x18, 0xb7, 0x8b, 0x6f, 0xc5, 0x18, 0x7b, 0xa6, 0x85, 0xac, 0x8e,
2151	0xad, 0xc4, 0x92, 0xfc, 0x18, 0xc1, 0x61, 0xf1, 0xba, 0xc6, 0x0b, 0x89, 0x94, 0xa2, 0x5a, 0x51,
2152	0xfe, 0xf9, 0xde, 0x46, 0xc1, 0xbd, 0x77, 0xd2, 0xc5, 0x7d, 0xd9, 0x7f, 0x0c, 0x8b, 0x04, 0x5d,
2153	0x1e, 0xf6, 0x24, 0x5e, 0x7c, 0xbf, 0x44, 0xf9, 0x22, 0x6e, 0xc9, 0xb9, 0xb0, 0xc5, 0x5b, 0x3c,
2154	0x05, 0x76, 0x54, 0xe0, 0x48, 0x81, 0x1d, 0x7b, 0xce, 0xbb, 0xb0, 0xa7, 0x18, 0xec, 0x40, 0x37,
2155	0x60, 0xb8, 0x5f, 0x95, 0x94, 0xa1, 0x2f, 0x6d, 0xa5, 0x2a, 0xf5, 0x61, 0x3f, 0x45, 0x30, 0x19,
2156	0x15, 0x21, 0x52, 0xae, 0xeb, 0x89, 0x12, 0x52, 0xca, 0x75, 0x3d, 0x59, 0xd5, 0x90, 0x5a, 0xbb,
2157	0xca, 0x38, 0xe3, 0xc2, 0x9f, 0xae, 0x8c, 0x07, 0x91, 0x36, 0x32, 0xbd, 0x09, 0x95, 0x48, 0x64,
2158	0x6d, 0x97, 0xe2, 0xbf, 0x11, 0x1c, 0xeb, 0xd2, 0x4b, 0xf0, 0x4b, 0x7d, 0x90, 0xc7, 0x76, 0xab,
2159	0x30, 0xa8, 0xb9, 0xe0, 0xfa, 0xbd, 0x94, 0x7d, 0xab, 0x4a, 0xea, 0xb3, 0xe2, 0xbb, 0x12, 0xec,
2160	0xea, 0x7f, 0xba, 0xf5, 0xe0, 0xa8, 0xcc, 0x83, 0x6f, 0x0c, 0xd2, 0x60, 0x12, 0xa5, 0xa1, 0xbe,
2161	0x9d, 0xb4, 0xbd, 0xab, 0xe4, 0x39, 0xf5, 0x24, 0x05, 0x88, 0x45, 0xe1, 0x81, 0xf4, 0xc6, 0xf0,
2162	0xd9, 0xcb, 0x1b, 0x55, 0x14, 0x9b, 0x4b, 0xfa, 0x33, 0x04, 0x27, 0x53, 0xc4, 0x23, 0x7c, 0x25,
2163	0xa5, 0xd8, 0x7a, 0x49, 0x4d, 0x83, 0x36, 0xd4, 0x5a, 0xf8, 0x5a, 0xfc, 0xa6, 0xf4, 0x28, 0xdb,
2164	0xfd, 0xad, 0x72, 0x8c, 0x1e, 0xc1, 0x14, 0xd5, 0x2a, 0x85, 0x60, 0x6f, 0x8d, 0xeb, 0x8b, 0x41,
2165	0xd0, 0xe2, 0x18, 0x4b, 0x68, 0x31, 0xef, 0x7c, 0xa2, 0x9c, 0x4c, 0x11, 0xd8, 0xfe, 0xae, 0x3c,
2166	0xd9, 0x76, 0x9c, 0xa6, 0x5d, 0x92, 0xe5, 0x9d, 0x9d, 0x9d, 0xb8, 0xfa, 0x46, 0x5a, 0xce, 0x36,
2167	0xff, 0xeb, 0xb7, 0x97, 0x9a, 0x0d, 0xe2, 0x6c, 0x99, 0x96, 0x7e, 0x79, 0x20, 0xf3, 0xba, 0x6e,
2168	0x2f, 0xff, 0x08, 0xc1, 0xc9, 0x8a, 0xa9, 0x27, 0xc5, 0x62, 0x79, 0x74, 0x4d, 0xb7, 0xd7, 0x2d,
2169	0xd3, 0x31, 0xd7, 0xd1, 0x9b, 0xd7, 0x84, 0x41, 0xcd, 0x6c, 0x10, 0xa3, 0x56, 0x30, 0xad, 0x9a,
2170	0x5c, 0xa3, 0x06, 0xfb, 0x0f, 0x0e, 0x39, 0x58, 0x20, 0xf2, 0x47, 0x78, 0x37, 0xeb, 0xba, 0xfd,
2171	0x5f, 0x84, 0x7e, 0x95, 0x9b, 0xbe, 0xcb, 0xe7, 0xde, 0x61, 0xce, 0xd7, 0x74, 0xbb, 0xf0, 0x78,
2172	0xe9, 0x13, 0x6f, 0x74, 0x83, 0x8d, 0x6e, 0xac, 0xe9, 0xf6, 0xc6, 0xe3, 0xa5, 0xcd, 0x11, 0xe6,
2173	0xf1, 0xca, 0xe7, 0x01, 0x00, 0x00, 0xff, 0xff, 0x07, 0x13, 0xb6, 0xbb, 0x80, 0x28, 0x00, 0x00,
2174}
2175
2176// Reference imports to suppress errors if they are not otherwise used.
2177var _ context.Context
2178var _ grpc.ClientConnInterface
2179
2180// This is a compile-time assertion to ensure that this generated file
2181// is compatible with the grpc package it is being compiled against.
2182const _ = grpc.SupportPackageIsVersion6
2183
2184// KeyManagementServiceClient is the client API for KeyManagementService service.
2185//
2186// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
2187type KeyManagementServiceClient interface {
2188	// Lists [KeyRings][google.cloud.kms.v1.KeyRing].
2189	ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error)
2190	// Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
2191	ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error)
2192	// Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
2193	ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error)
2194	// Lists [ImportJobs][google.cloud.kms.v1.ImportJob].
2195	ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error)
2196	// Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
2197	GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error)
2198	// Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its
2199	// [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2200	GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2201	// Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2202	GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2203	// Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
2204	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2205	// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or
2206	// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
2207	GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error)
2208	// Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob].
2209	GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error)
2210	// Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location.
2211	CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error)
2212	// Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2213	//
2214	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
2215	// [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
2216	// are required.
2217	CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2218	// Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2219	//
2220	// The server will assign the next sequential id. If unset,
2221	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2222	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
2223	CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2224	// Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the
2225	// wrapped key material provided in the request.
2226	//
2227	// The version ID will be assigned the next sequential id within the
2228	// [CryptoKey][google.cloud.kms.v1.CryptoKey].
2229	ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2230	// Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2231	//
2232	// [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required.
2233	CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error)
2234	// Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2235	UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2236	// Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata.
2237	//
2238	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
2239	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and
2240	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this
2241	// method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
2242	// move between other states.
2243	UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2244	// Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
2245	// The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2246	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2247	Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error)
2248	// Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2249	// must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2250	Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error)
2251	// Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2252	// ASYMMETRIC_SIGN, producing a signature that can be verified with the public
2253	// key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
2254	AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error)
2255	// Decrypts data that was encrypted with a public key retrieved from
2256	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
2257	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
2258	AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error)
2259	// Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
2260	//
2261	// Returns an error if called on an asymmetric key.
2262	UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error)
2263	// Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
2264	//
2265	// Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2266	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2267	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
2268	// hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2269	// will be changed to
2270	// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
2271	// material will be irrevocably destroyed.
2272	//
2273	// Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
2274	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
2275	DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2276	// Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
2277	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2278	// state.
2279	//
2280	// Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2281	// will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
2282	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
2283	RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error)
2284}
2285
2286type keyManagementServiceClient struct {
2287	cc grpc.ClientConnInterface
2288}
2289
2290func NewKeyManagementServiceClient(cc grpc.ClientConnInterface) KeyManagementServiceClient {
2291	return &keyManagementServiceClient{cc}
2292}
2293
2294func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) {
2295	out := new(ListKeyRingsResponse)
2296	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...)
2297	if err != nil {
2298		return nil, err
2299	}
2300	return out, nil
2301}
2302
2303func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) {
2304	out := new(ListCryptoKeysResponse)
2305	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...)
2306	if err != nil {
2307		return nil, err
2308	}
2309	return out, nil
2310}
2311
2312func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) {
2313	out := new(ListCryptoKeyVersionsResponse)
2314	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...)
2315	if err != nil {
2316		return nil, err
2317	}
2318	return out, nil
2319}
2320
2321func (c *keyManagementServiceClient) ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) {
2322	out := new(ListImportJobsResponse)
2323	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", in, out, opts...)
2324	if err != nil {
2325		return nil, err
2326	}
2327	return out, nil
2328}
2329
2330func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) {
2331	out := new(KeyRing)
2332	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...)
2333	if err != nil {
2334		return nil, err
2335	}
2336	return out, nil
2337}
2338
2339func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2340	out := new(CryptoKey)
2341	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...)
2342	if err != nil {
2343		return nil, err
2344	}
2345	return out, nil
2346}
2347
2348func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2349	out := new(CryptoKeyVersion)
2350	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...)
2351	if err != nil {
2352		return nil, err
2353	}
2354	return out, nil
2355}
2356
2357func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) {
2358	out := new(PublicKey)
2359	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...)
2360	if err != nil {
2361		return nil, err
2362	}
2363	return out, nil
2364}
2365
2366func (c *keyManagementServiceClient) GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) {
2367	out := new(ImportJob)
2368	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetImportJob", in, out, opts...)
2369	if err != nil {
2370		return nil, err
2371	}
2372	return out, nil
2373}
2374
2375func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) {
2376	out := new(KeyRing)
2377	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...)
2378	if err != nil {
2379		return nil, err
2380	}
2381	return out, nil
2382}
2383
2384func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2385	out := new(CryptoKey)
2386	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...)
2387	if err != nil {
2388		return nil, err
2389	}
2390	return out, nil
2391}
2392
2393func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2394	out := new(CryptoKeyVersion)
2395	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...)
2396	if err != nil {
2397		return nil, err
2398	}
2399	return out, nil
2400}
2401
2402func (c *keyManagementServiceClient) ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2403	out := new(CryptoKeyVersion)
2404	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", in, out, opts...)
2405	if err != nil {
2406		return nil, err
2407	}
2408	return out, nil
2409}
2410
2411func (c *keyManagementServiceClient) CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) {
2412	out := new(ImportJob)
2413	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", in, out, opts...)
2414	if err != nil {
2415		return nil, err
2416	}
2417	return out, nil
2418}
2419
2420func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2421	out := new(CryptoKey)
2422	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...)
2423	if err != nil {
2424		return nil, err
2425	}
2426	return out, nil
2427}
2428
2429func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2430	out := new(CryptoKeyVersion)
2431	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...)
2432	if err != nil {
2433		return nil, err
2434	}
2435	return out, nil
2436}
2437
2438func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) {
2439	out := new(EncryptResponse)
2440	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...)
2441	if err != nil {
2442		return nil, err
2443	}
2444	return out, nil
2445}
2446
2447func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) {
2448	out := new(DecryptResponse)
2449	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...)
2450	if err != nil {
2451		return nil, err
2452	}
2453	return out, nil
2454}
2455
2456func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) {
2457	out := new(AsymmetricSignResponse)
2458	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...)
2459	if err != nil {
2460		return nil, err
2461	}
2462	return out, nil
2463}
2464
2465func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) {
2466	out := new(AsymmetricDecryptResponse)
2467	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...)
2468	if err != nil {
2469		return nil, err
2470	}
2471	return out, nil
2472}
2473
2474func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) {
2475	out := new(CryptoKey)
2476	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...)
2477	if err != nil {
2478		return nil, err
2479	}
2480	return out, nil
2481}
2482
2483func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2484	out := new(CryptoKeyVersion)
2485	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...)
2486	if err != nil {
2487		return nil, err
2488	}
2489	return out, nil
2490}
2491
2492func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) {
2493	out := new(CryptoKeyVersion)
2494	err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...)
2495	if err != nil {
2496		return nil, err
2497	}
2498	return out, nil
2499}
2500
2501// KeyManagementServiceServer is the server API for KeyManagementService service.
2502type KeyManagementServiceServer interface {
2503	// Lists [KeyRings][google.cloud.kms.v1.KeyRing].
2504	ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error)
2505	// Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
2506	ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error)
2507	// Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
2508	ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error)
2509	// Lists [ImportJobs][google.cloud.kms.v1.ImportJob].
2510	ListImportJobs(context.Context, *ListImportJobsRequest) (*ListImportJobsResponse, error)
2511	// Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
2512	GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error)
2513	// Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its
2514	// [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2515	GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error)
2516	// Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
2517	GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2518	// Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
2519	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2520	// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or
2521	// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
2522	GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error)
2523	// Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob].
2524	GetImportJob(context.Context, *GetImportJobRequest) (*ImportJob, error)
2525	// Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location.
2526	CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error)
2527	// Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2528	//
2529	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
2530	// [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
2531	// are required.
2532	CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error)
2533	// Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2534	//
2535	// The server will assign the next sequential id. If unset,
2536	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2537	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
2538	CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2539	// Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the
2540	// wrapped key material provided in the request.
2541	//
2542	// The version ID will be assigned the next sequential id within the
2543	// [CryptoKey][google.cloud.kms.v1.CryptoKey].
2544	ImportCryptoKeyVersion(context.Context, *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2545	// Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
2546	//
2547	// [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required.
2548	CreateImportJob(context.Context, *CreateImportJobRequest) (*ImportJob, error)
2549	// Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
2550	UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error)
2551	// Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata.
2552	//
2553	// [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
2554	// [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and
2555	// [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this
2556	// method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
2557	// move between other states.
2558	UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2559	// Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
2560	// The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
2561	// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2562	Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error)
2563	// Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2564	// must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
2565	Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error)
2566	// Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
2567	// ASYMMETRIC_SIGN, producing a signature that can be verified with the public
2568	// key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
2569	AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error)
2570	// Decrypts data that was encrypted with a public key retrieved from
2571	// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
2572	// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
2573	AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error)
2574	// Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
2575	//
2576	// Returns an error if called on an asymmetric key.
2577	UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error)
2578	// Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
2579	//
2580	// Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
2581	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2582	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
2583	// hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2584	// will be changed to
2585	// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
2586	// material will be irrevocably destroyed.
2587	//
2588	// Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
2589	// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
2590	DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2591	// Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
2592	// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
2593	// state.
2594	//
2595	// Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
2596	// will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
2597	// and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
2598	RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error)
2599}
2600
2601// UnimplementedKeyManagementServiceServer can be embedded to have forward compatible implementations.
2602type UnimplementedKeyManagementServiceServer struct {
2603}
2604
2605func (*UnimplementedKeyManagementServiceServer) ListKeyRings(ctx context.Context, req *ListKeyRingsRequest) (*ListKeyRingsResponse, error) {
2606	return nil, status.Errorf(codes.Unimplemented, "method ListKeyRings not implemented")
2607}
2608func (*UnimplementedKeyManagementServiceServer) ListCryptoKeys(ctx context.Context, req *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) {
2609	return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeys not implemented")
2610}
2611func (*UnimplementedKeyManagementServiceServer) ListCryptoKeyVersions(ctx context.Context, req *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) {
2612	return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeyVersions not implemented")
2613}
2614func (*UnimplementedKeyManagementServiceServer) ListImportJobs(ctx context.Context, req *ListImportJobsRequest) (*ListImportJobsResponse, error) {
2615	return nil, status.Errorf(codes.Unimplemented, "method ListImportJobs not implemented")
2616}
2617func (*UnimplementedKeyManagementServiceServer) GetKeyRing(ctx context.Context, req *GetKeyRingRequest) (*KeyRing, error) {
2618	return nil, status.Errorf(codes.Unimplemented, "method GetKeyRing not implemented")
2619}
2620func (*UnimplementedKeyManagementServiceServer) GetCryptoKey(ctx context.Context, req *GetCryptoKeyRequest) (*CryptoKey, error) {
2621	return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKey not implemented")
2622}
2623func (*UnimplementedKeyManagementServiceServer) GetCryptoKeyVersion(ctx context.Context, req *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2624	return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKeyVersion not implemented")
2625}
2626func (*UnimplementedKeyManagementServiceServer) GetPublicKey(ctx context.Context, req *GetPublicKeyRequest) (*PublicKey, error) {
2627	return nil, status.Errorf(codes.Unimplemented, "method GetPublicKey not implemented")
2628}
2629func (*UnimplementedKeyManagementServiceServer) GetImportJob(ctx context.Context, req *GetImportJobRequest) (*ImportJob, error) {
2630	return nil, status.Errorf(codes.Unimplemented, "method GetImportJob not implemented")
2631}
2632func (*UnimplementedKeyManagementServiceServer) CreateKeyRing(ctx context.Context, req *CreateKeyRingRequest) (*KeyRing, error) {
2633	return nil, status.Errorf(codes.Unimplemented, "method CreateKeyRing not implemented")
2634}
2635func (*UnimplementedKeyManagementServiceServer) CreateCryptoKey(ctx context.Context, req *CreateCryptoKeyRequest) (*CryptoKey, error) {
2636	return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKey not implemented")
2637}
2638func (*UnimplementedKeyManagementServiceServer) CreateCryptoKeyVersion(ctx context.Context, req *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2639	return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKeyVersion not implemented")
2640}
2641func (*UnimplementedKeyManagementServiceServer) ImportCryptoKeyVersion(ctx context.Context, req *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2642	return nil, status.Errorf(codes.Unimplemented, "method ImportCryptoKeyVersion not implemented")
2643}
2644func (*UnimplementedKeyManagementServiceServer) CreateImportJob(ctx context.Context, req *CreateImportJobRequest) (*ImportJob, error) {
2645	return nil, status.Errorf(codes.Unimplemented, "method CreateImportJob not implemented")
2646}
2647func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKey(ctx context.Context, req *UpdateCryptoKeyRequest) (*CryptoKey, error) {
2648	return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKey not implemented")
2649}
2650func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyVersion(ctx context.Context, req *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2651	return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyVersion not implemented")
2652}
2653func (*UnimplementedKeyManagementServiceServer) Encrypt(ctx context.Context, req *EncryptRequest) (*EncryptResponse, error) {
2654	return nil, status.Errorf(codes.Unimplemented, "method Encrypt not implemented")
2655}
2656func (*UnimplementedKeyManagementServiceServer) Decrypt(ctx context.Context, req *DecryptRequest) (*DecryptResponse, error) {
2657	return nil, status.Errorf(codes.Unimplemented, "method Decrypt not implemented")
2658}
2659func (*UnimplementedKeyManagementServiceServer) AsymmetricSign(ctx context.Context, req *AsymmetricSignRequest) (*AsymmetricSignResponse, error) {
2660	return nil, status.Errorf(codes.Unimplemented, "method AsymmetricSign not implemented")
2661}
2662func (*UnimplementedKeyManagementServiceServer) AsymmetricDecrypt(ctx context.Context, req *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) {
2663	return nil, status.Errorf(codes.Unimplemented, "method AsymmetricDecrypt not implemented")
2664}
2665func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) {
2666	return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyPrimaryVersion not implemented")
2667}
2668func (*UnimplementedKeyManagementServiceServer) DestroyCryptoKeyVersion(ctx context.Context, req *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2669	return nil, status.Errorf(codes.Unimplemented, "method DestroyCryptoKeyVersion not implemented")
2670}
2671func (*UnimplementedKeyManagementServiceServer) RestoreCryptoKeyVersion(ctx context.Context, req *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) {
2672	return nil, status.Errorf(codes.Unimplemented, "method RestoreCryptoKeyVersion not implemented")
2673}
2674
2675func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) {
2676	s.RegisterService(&_KeyManagementService_serviceDesc, srv)
2677}
2678
2679func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2680	in := new(ListKeyRingsRequest)
2681	if err := dec(in); err != nil {
2682		return nil, err
2683	}
2684	if interceptor == nil {
2685		return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in)
2686	}
2687	info := &grpc.UnaryServerInfo{
2688		Server:     srv,
2689		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings",
2690	}
2691	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2692		return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest))
2693	}
2694	return interceptor(ctx, in, info, handler)
2695}
2696
2697func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2698	in := new(ListCryptoKeysRequest)
2699	if err := dec(in); err != nil {
2700		return nil, err
2701	}
2702	if interceptor == nil {
2703		return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in)
2704	}
2705	info := &grpc.UnaryServerInfo{
2706		Server:     srv,
2707		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys",
2708	}
2709	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2710		return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest))
2711	}
2712	return interceptor(ctx, in, info, handler)
2713}
2714
2715func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2716	in := new(ListCryptoKeyVersionsRequest)
2717	if err := dec(in); err != nil {
2718		return nil, err
2719	}
2720	if interceptor == nil {
2721		return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in)
2722	}
2723	info := &grpc.UnaryServerInfo{
2724		Server:     srv,
2725		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions",
2726	}
2727	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2728		return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest))
2729	}
2730	return interceptor(ctx, in, info, handler)
2731}
2732
2733func _KeyManagementService_ListImportJobs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2734	in := new(ListImportJobsRequest)
2735	if err := dec(in); err != nil {
2736		return nil, err
2737	}
2738	if interceptor == nil {
2739		return srv.(KeyManagementServiceServer).ListImportJobs(ctx, in)
2740	}
2741	info := &grpc.UnaryServerInfo{
2742		Server:     srv,
2743		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListImportJobs",
2744	}
2745	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2746		return srv.(KeyManagementServiceServer).ListImportJobs(ctx, req.(*ListImportJobsRequest))
2747	}
2748	return interceptor(ctx, in, info, handler)
2749}
2750
2751func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2752	in := new(GetKeyRingRequest)
2753	if err := dec(in); err != nil {
2754		return nil, err
2755	}
2756	if interceptor == nil {
2757		return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in)
2758	}
2759	info := &grpc.UnaryServerInfo{
2760		Server:     srv,
2761		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing",
2762	}
2763	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2764		return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest))
2765	}
2766	return interceptor(ctx, in, info, handler)
2767}
2768
2769func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2770	in := new(GetCryptoKeyRequest)
2771	if err := dec(in); err != nil {
2772		return nil, err
2773	}
2774	if interceptor == nil {
2775		return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in)
2776	}
2777	info := &grpc.UnaryServerInfo{
2778		Server:     srv,
2779		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey",
2780	}
2781	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2782		return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest))
2783	}
2784	return interceptor(ctx, in, info, handler)
2785}
2786
2787func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2788	in := new(GetCryptoKeyVersionRequest)
2789	if err := dec(in); err != nil {
2790		return nil, err
2791	}
2792	if interceptor == nil {
2793		return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in)
2794	}
2795	info := &grpc.UnaryServerInfo{
2796		Server:     srv,
2797		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion",
2798	}
2799	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2800		return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest))
2801	}
2802	return interceptor(ctx, in, info, handler)
2803}
2804
2805func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2806	in := new(GetPublicKeyRequest)
2807	if err := dec(in); err != nil {
2808		return nil, err
2809	}
2810	if interceptor == nil {
2811		return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in)
2812	}
2813	info := &grpc.UnaryServerInfo{
2814		Server:     srv,
2815		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey",
2816	}
2817	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2818		return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest))
2819	}
2820	return interceptor(ctx, in, info, handler)
2821}
2822
2823func _KeyManagementService_GetImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2824	in := new(GetImportJobRequest)
2825	if err := dec(in); err != nil {
2826		return nil, err
2827	}
2828	if interceptor == nil {
2829		return srv.(KeyManagementServiceServer).GetImportJob(ctx, in)
2830	}
2831	info := &grpc.UnaryServerInfo{
2832		Server:     srv,
2833		FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetImportJob",
2834	}
2835	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2836		return srv.(KeyManagementServiceServer).GetImportJob(ctx, req.(*GetImportJobRequest))
2837	}
2838	return interceptor(ctx, in, info, handler)
2839}
2840
2841func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2842	in := new(CreateKeyRingRequest)
2843	if err := dec(in); err != nil {
2844		return nil, err
2845	}
2846	if interceptor == nil {
2847		return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in)
2848	}
2849	info := &grpc.UnaryServerInfo{
2850		Server:     srv,
2851		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing",
2852	}
2853	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2854		return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest))
2855	}
2856	return interceptor(ctx, in, info, handler)
2857}
2858
2859func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2860	in := new(CreateCryptoKeyRequest)
2861	if err := dec(in); err != nil {
2862		return nil, err
2863	}
2864	if interceptor == nil {
2865		return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in)
2866	}
2867	info := &grpc.UnaryServerInfo{
2868		Server:     srv,
2869		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey",
2870	}
2871	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2872		return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest))
2873	}
2874	return interceptor(ctx, in, info, handler)
2875}
2876
2877func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2878	in := new(CreateCryptoKeyVersionRequest)
2879	if err := dec(in); err != nil {
2880		return nil, err
2881	}
2882	if interceptor == nil {
2883		return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in)
2884	}
2885	info := &grpc.UnaryServerInfo{
2886		Server:     srv,
2887		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion",
2888	}
2889	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2890		return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest))
2891	}
2892	return interceptor(ctx, in, info, handler)
2893}
2894
2895func _KeyManagementService_ImportCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2896	in := new(ImportCryptoKeyVersionRequest)
2897	if err := dec(in); err != nil {
2898		return nil, err
2899	}
2900	if interceptor == nil {
2901		return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, in)
2902	}
2903	info := &grpc.UnaryServerInfo{
2904		Server:     srv,
2905		FullMethod: "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion",
2906	}
2907	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2908		return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, req.(*ImportCryptoKeyVersionRequest))
2909	}
2910	return interceptor(ctx, in, info, handler)
2911}
2912
2913func _KeyManagementService_CreateImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2914	in := new(CreateImportJobRequest)
2915	if err := dec(in); err != nil {
2916		return nil, err
2917	}
2918	if interceptor == nil {
2919		return srv.(KeyManagementServiceServer).CreateImportJob(ctx, in)
2920	}
2921	info := &grpc.UnaryServerInfo{
2922		Server:     srv,
2923		FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateImportJob",
2924	}
2925	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2926		return srv.(KeyManagementServiceServer).CreateImportJob(ctx, req.(*CreateImportJobRequest))
2927	}
2928	return interceptor(ctx, in, info, handler)
2929}
2930
2931func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2932	in := new(UpdateCryptoKeyRequest)
2933	if err := dec(in); err != nil {
2934		return nil, err
2935	}
2936	if interceptor == nil {
2937		return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in)
2938	}
2939	info := &grpc.UnaryServerInfo{
2940		Server:     srv,
2941		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey",
2942	}
2943	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2944		return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest))
2945	}
2946	return interceptor(ctx, in, info, handler)
2947}
2948
2949func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2950	in := new(UpdateCryptoKeyVersionRequest)
2951	if err := dec(in); err != nil {
2952		return nil, err
2953	}
2954	if interceptor == nil {
2955		return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in)
2956	}
2957	info := &grpc.UnaryServerInfo{
2958		Server:     srv,
2959		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion",
2960	}
2961	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2962		return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest))
2963	}
2964	return interceptor(ctx, in, info, handler)
2965}
2966
2967func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2968	in := new(EncryptRequest)
2969	if err := dec(in); err != nil {
2970		return nil, err
2971	}
2972	if interceptor == nil {
2973		return srv.(KeyManagementServiceServer).Encrypt(ctx, in)
2974	}
2975	info := &grpc.UnaryServerInfo{
2976		Server:     srv,
2977		FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt",
2978	}
2979	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2980		return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest))
2981	}
2982	return interceptor(ctx, in, info, handler)
2983}
2984
2985func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
2986	in := new(DecryptRequest)
2987	if err := dec(in); err != nil {
2988		return nil, err
2989	}
2990	if interceptor == nil {
2991		return srv.(KeyManagementServiceServer).Decrypt(ctx, in)
2992	}
2993	info := &grpc.UnaryServerInfo{
2994		Server:     srv,
2995		FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt",
2996	}
2997	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
2998		return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest))
2999	}
3000	return interceptor(ctx, in, info, handler)
3001}
3002
3003func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3004	in := new(AsymmetricSignRequest)
3005	if err := dec(in); err != nil {
3006		return nil, err
3007	}
3008	if interceptor == nil {
3009		return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in)
3010	}
3011	info := &grpc.UnaryServerInfo{
3012		Server:     srv,
3013		FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign",
3014	}
3015	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3016		return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest))
3017	}
3018	return interceptor(ctx, in, info, handler)
3019}
3020
3021func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3022	in := new(AsymmetricDecryptRequest)
3023	if err := dec(in); err != nil {
3024		return nil, err
3025	}
3026	if interceptor == nil {
3027		return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in)
3028	}
3029	info := &grpc.UnaryServerInfo{
3030		Server:     srv,
3031		FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt",
3032	}
3033	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3034		return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest))
3035	}
3036	return interceptor(ctx, in, info, handler)
3037}
3038
3039func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3040	in := new(UpdateCryptoKeyPrimaryVersionRequest)
3041	if err := dec(in); err != nil {
3042		return nil, err
3043	}
3044	if interceptor == nil {
3045		return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in)
3046	}
3047	info := &grpc.UnaryServerInfo{
3048		Server:     srv,
3049		FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion",
3050	}
3051	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3052		return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest))
3053	}
3054	return interceptor(ctx, in, info, handler)
3055}
3056
3057func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3058	in := new(DestroyCryptoKeyVersionRequest)
3059	if err := dec(in); err != nil {
3060		return nil, err
3061	}
3062	if interceptor == nil {
3063		return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in)
3064	}
3065	info := &grpc.UnaryServerInfo{
3066		Server:     srv,
3067		FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion",
3068	}
3069	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3070		return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest))
3071	}
3072	return interceptor(ctx, in, info, handler)
3073}
3074
3075func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
3076	in := new(RestoreCryptoKeyVersionRequest)
3077	if err := dec(in); err != nil {
3078		return nil, err
3079	}
3080	if interceptor == nil {
3081		return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in)
3082	}
3083	info := &grpc.UnaryServerInfo{
3084		Server:     srv,
3085		FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion",
3086	}
3087	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
3088		return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest))
3089	}
3090	return interceptor(ctx, in, info, handler)
3091}
3092
3093var _KeyManagementService_serviceDesc = grpc.ServiceDesc{
3094	ServiceName: "google.cloud.kms.v1.KeyManagementService",
3095	HandlerType: (*KeyManagementServiceServer)(nil),
3096	Methods: []grpc.MethodDesc{
3097		{
3098			MethodName: "ListKeyRings",
3099			Handler:    _KeyManagementService_ListKeyRings_Handler,
3100		},
3101		{
3102			MethodName: "ListCryptoKeys",
3103			Handler:    _KeyManagementService_ListCryptoKeys_Handler,
3104		},
3105		{
3106			MethodName: "ListCryptoKeyVersions",
3107			Handler:    _KeyManagementService_ListCryptoKeyVersions_Handler,
3108		},
3109		{
3110			MethodName: "ListImportJobs",
3111			Handler:    _KeyManagementService_ListImportJobs_Handler,
3112		},
3113		{
3114			MethodName: "GetKeyRing",
3115			Handler:    _KeyManagementService_GetKeyRing_Handler,
3116		},
3117		{
3118			MethodName: "GetCryptoKey",
3119			Handler:    _KeyManagementService_GetCryptoKey_Handler,
3120		},
3121		{
3122			MethodName: "GetCryptoKeyVersion",
3123			Handler:    _KeyManagementService_GetCryptoKeyVersion_Handler,
3124		},
3125		{
3126			MethodName: "GetPublicKey",
3127			Handler:    _KeyManagementService_GetPublicKey_Handler,
3128		},
3129		{
3130			MethodName: "GetImportJob",
3131			Handler:    _KeyManagementService_GetImportJob_Handler,
3132		},
3133		{
3134			MethodName: "CreateKeyRing",
3135			Handler:    _KeyManagementService_CreateKeyRing_Handler,
3136		},
3137		{
3138			MethodName: "CreateCryptoKey",
3139			Handler:    _KeyManagementService_CreateCryptoKey_Handler,
3140		},
3141		{
3142			MethodName: "CreateCryptoKeyVersion",
3143			Handler:    _KeyManagementService_CreateCryptoKeyVersion_Handler,
3144		},
3145		{
3146			MethodName: "ImportCryptoKeyVersion",
3147			Handler:    _KeyManagementService_ImportCryptoKeyVersion_Handler,
3148		},
3149		{
3150			MethodName: "CreateImportJob",
3151			Handler:    _KeyManagementService_CreateImportJob_Handler,
3152		},
3153		{
3154			MethodName: "UpdateCryptoKey",
3155			Handler:    _KeyManagementService_UpdateCryptoKey_Handler,
3156		},
3157		{
3158			MethodName: "UpdateCryptoKeyVersion",
3159			Handler:    _KeyManagementService_UpdateCryptoKeyVersion_Handler,
3160		},
3161		{
3162			MethodName: "Encrypt",
3163			Handler:    _KeyManagementService_Encrypt_Handler,
3164		},
3165		{
3166			MethodName: "Decrypt",
3167			Handler:    _KeyManagementService_Decrypt_Handler,
3168		},
3169		{
3170			MethodName: "AsymmetricSign",
3171			Handler:    _KeyManagementService_AsymmetricSign_Handler,
3172		},
3173		{
3174			MethodName: "AsymmetricDecrypt",
3175			Handler:    _KeyManagementService_AsymmetricDecrypt_Handler,
3176		},
3177		{
3178			MethodName: "UpdateCryptoKeyPrimaryVersion",
3179			Handler:    _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler,
3180		},
3181		{
3182			MethodName: "DestroyCryptoKeyVersion",
3183			Handler:    _KeyManagementService_DestroyCryptoKeyVersion_Handler,
3184		},
3185		{
3186			MethodName: "RestoreCryptoKeyVersion",
3187			Handler:    _KeyManagementService_RestoreCryptoKeyVersion_Handler,
3188		},
3189	},
3190	Streams:  []grpc.StreamDesc{},
3191	Metadata: "google/cloud/kms/v1/service.proto",
3192}
3193