d0e2badbae
The result will still pass gofmtcheck and won't trigger additional changes if someone isn't using goimports, but it will avoid the piecemeal imports changes we've been seeing.
223 lines
7.8 KiB
Go
223 lines
7.8 KiB
Go
// Code generated by protoc-gen-go. DO NOT EDIT.
|
|
// source: physical/types.proto
|
|
|
|
package physical
|
|
|
|
import (
|
|
fmt "fmt"
|
|
math "math"
|
|
|
|
proto "github.com/golang/protobuf/proto"
|
|
)
|
|
|
|
// Reference imports to suppress errors if they are not otherwise used.
|
|
var _ = proto.Marshal
|
|
var _ = fmt.Errorf
|
|
var _ = math.Inf
|
|
|
|
// This is a compile-time assertion to ensure that this generated file
|
|
// is compatible with the proto package it is being compiled against.
|
|
// A compilation error at this line likely means your copy of the
|
|
// proto package needs to be updated.
|
|
const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
|
|
|
|
type EncryptedBlobInfo struct {
|
|
Ciphertext []byte `protobuf:"bytes,1,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
|
|
IV []byte `protobuf:"bytes,2,opt,name=iv,proto3" json:"iv,omitempty"`
|
|
HMAC []byte `protobuf:"bytes,3,opt,name=hmac,proto3" json:"hmac,omitempty"`
|
|
Wrapped bool `protobuf:"varint,4,opt,name=wrapped,proto3" json:"wrapped,omitempty"`
|
|
KeyInfo *SealKeyInfo `protobuf:"bytes,5,opt,name=key_info,json=keyInfo,proto3" json:"key_info,omitempty"`
|
|
// Key is the Key value for the entry that corresponds to
|
|
// physical.Entry.Key's value
|
|
Key string `protobuf:"bytes,6,opt,name=key,proto3" json:"key,omitempty"`
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
XXX_unrecognized []byte `json:"-"`
|
|
XXX_sizecache int32 `json:"-"`
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) Reset() { *m = EncryptedBlobInfo{} }
|
|
func (m *EncryptedBlobInfo) String() string { return proto.CompactTextString(m) }
|
|
func (*EncryptedBlobInfo) ProtoMessage() {}
|
|
func (*EncryptedBlobInfo) Descriptor() ([]byte, []int) {
|
|
return fileDescriptor_deea33bd14ea5328, []int{0}
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) XXX_Unmarshal(b []byte) error {
|
|
return xxx_messageInfo_EncryptedBlobInfo.Unmarshal(m, b)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
return xxx_messageInfo_EncryptedBlobInfo.Marshal(b, m, deterministic)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_Merge(src proto.Message) {
|
|
xxx_messageInfo_EncryptedBlobInfo.Merge(m, src)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_Size() int {
|
|
return xxx_messageInfo_EncryptedBlobInfo.Size(m)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_DiscardUnknown() {
|
|
xxx_messageInfo_EncryptedBlobInfo.DiscardUnknown(m)
|
|
}
|
|
|
|
var xxx_messageInfo_EncryptedBlobInfo proto.InternalMessageInfo
|
|
|
|
func (m *EncryptedBlobInfo) GetCiphertext() []byte {
|
|
if m != nil {
|
|
return m.Ciphertext
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetIV() []byte {
|
|
if m != nil {
|
|
return m.IV
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetHMAC() []byte {
|
|
if m != nil {
|
|
return m.HMAC
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetWrapped() bool {
|
|
if m != nil {
|
|
return m.Wrapped
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetKeyInfo() *SealKeyInfo {
|
|
if m != nil {
|
|
return m.KeyInfo
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetKey() string {
|
|
if m != nil {
|
|
return m.Key
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// SealKeyInfo contains information regarding the seal used to encrypt the entry.
|
|
type SealKeyInfo struct {
|
|
// Mechanism is the method used by the seal to encrypt and sign the
|
|
// data as defined by the seal.
|
|
Mechanism uint64 `protobuf:"varint,1,opt,name=Mechanism,proto3" json:"Mechanism,omitempty"`
|
|
HMACMechanism uint64 `protobuf:"varint,2,opt,name=HMACMechanism,proto3" json:"HMACMechanism,omitempty"`
|
|
// This is an opaque ID used by the seal to identify the specific
|
|
// key to use as defined by the seal. This could be a version, key
|
|
// label, or something else.
|
|
KeyID string `protobuf:"bytes,3,opt,name=KeyID,proto3" json:"KeyID,omitempty"`
|
|
HMACKeyID string `protobuf:"bytes,4,opt,name=HMACKeyID,proto3" json:"HMACKeyID,omitempty"`
|
|
// These value are used when generating our own data encryption keys
|
|
// and encrypting them using the autoseal
|
|
WrappedKey []byte `protobuf:"bytes,5,opt,name=WrappedKey,proto3" json:"WrappedKey,omitempty"`
|
|
// Mechanism specific flags
|
|
Flags uint64 `protobuf:"varint,6,opt,name=Flags,proto3" json:"Flags,omitempty"`
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
XXX_unrecognized []byte `json:"-"`
|
|
XXX_sizecache int32 `json:"-"`
|
|
}
|
|
|
|
func (m *SealKeyInfo) Reset() { *m = SealKeyInfo{} }
|
|
func (m *SealKeyInfo) String() string { return proto.CompactTextString(m) }
|
|
func (*SealKeyInfo) ProtoMessage() {}
|
|
func (*SealKeyInfo) Descriptor() ([]byte, []int) {
|
|
return fileDescriptor_deea33bd14ea5328, []int{1}
|
|
}
|
|
|
|
func (m *SealKeyInfo) XXX_Unmarshal(b []byte) error {
|
|
return xxx_messageInfo_SealKeyInfo.Unmarshal(m, b)
|
|
}
|
|
func (m *SealKeyInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
return xxx_messageInfo_SealKeyInfo.Marshal(b, m, deterministic)
|
|
}
|
|
func (m *SealKeyInfo) XXX_Merge(src proto.Message) {
|
|
xxx_messageInfo_SealKeyInfo.Merge(m, src)
|
|
}
|
|
func (m *SealKeyInfo) XXX_Size() int {
|
|
return xxx_messageInfo_SealKeyInfo.Size(m)
|
|
}
|
|
func (m *SealKeyInfo) XXX_DiscardUnknown() {
|
|
xxx_messageInfo_SealKeyInfo.DiscardUnknown(m)
|
|
}
|
|
|
|
var xxx_messageInfo_SealKeyInfo proto.InternalMessageInfo
|
|
|
|
func (m *SealKeyInfo) GetMechanism() uint64 {
|
|
if m != nil {
|
|
return m.Mechanism
|
|
}
|
|
return 0
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetHMACMechanism() uint64 {
|
|
if m != nil {
|
|
return m.HMACMechanism
|
|
}
|
|
return 0
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetKeyID() string {
|
|
if m != nil {
|
|
return m.KeyID
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetHMACKeyID() string {
|
|
if m != nil {
|
|
return m.HMACKeyID
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetWrappedKey() []byte {
|
|
if m != nil {
|
|
return m.WrappedKey
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetFlags() uint64 {
|
|
if m != nil {
|
|
return m.Flags
|
|
}
|
|
return 0
|
|
}
|
|
|
|
func init() {
|
|
proto.RegisterType((*EncryptedBlobInfo)(nil), "physical.EncryptedBlobInfo")
|
|
proto.RegisterType((*SealKeyInfo)(nil), "physical.SealKeyInfo")
|
|
}
|
|
|
|
func init() { proto.RegisterFile("physical/types.proto", fileDescriptor_deea33bd14ea5328) }
|
|
|
|
var fileDescriptor_deea33bd14ea5328 = []byte{
|
|
// 312 bytes of a gzipped FileDescriptorProto
|
|
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0x5f, 0x4b, 0xc3, 0x30,
|
|
0x14, 0xc5, 0x69, 0xd7, 0xfd, 0xbb, 0x9b, 0xa2, 0x61, 0x42, 0x1e, 0x44, 0xca, 0x54, 0xe8, 0x53,
|
|
0x2b, 0xfa, 0x09, 0x9c, 0x7f, 0x50, 0xc6, 0x5e, 0xe2, 0x83, 0xe0, 0x8b, 0x64, 0x59, 0xb6, 0x84,
|
|
0x75, 0x4d, 0x68, 0xb3, 0x69, 0x3e, 0x98, 0x4f, 0x7e, 0x39, 0x49, 0x4a, 0xd9, 0x7c, 0xbb, 0xf7,
|
|
0x97, 0xc3, 0xe1, 0x9c, 0x1b, 0x18, 0x69, 0x61, 0x2b, 0xc9, 0x68, 0x9e, 0x19, 0xab, 0x79, 0x95,
|
|
0xea, 0x52, 0x19, 0x85, 0x7a, 0x0d, 0x1d, 0xff, 0x04, 0x70, 0xfa, 0x54, 0xb0, 0xd2, 0x6a, 0xc3,
|
|
0x17, 0x93, 0x5c, 0xcd, 0x5f, 0x8b, 0xa5, 0x42, 0x17, 0x00, 0x4c, 0x6a, 0xc1, 0x4b, 0xc3, 0xbf,
|
|
0x0d, 0x0e, 0xe2, 0x20, 0x19, 0x92, 0x03, 0x82, 0x8e, 0x21, 0x94, 0x3b, 0x1c, 0x7a, 0x1e, 0xca,
|
|
0x1d, 0x42, 0x10, 0x89, 0x0d, 0x65, 0xb8, 0xe5, 0x89, 0x9f, 0x11, 0x86, 0xee, 0x57, 0x49, 0xb5,
|
|
0xe6, 0x0b, 0x1c, 0xc5, 0x41, 0xd2, 0x23, 0xcd, 0x8a, 0x6e, 0xa0, 0xb7, 0xe6, 0xf6, 0x53, 0x16,
|
|
0x4b, 0x85, 0xdb, 0x71, 0x90, 0x0c, 0x6e, 0xcf, 0xd2, 0x26, 0x50, 0xfa, 0xc6, 0x69, 0x3e, 0xe5,
|
|
0xd6, 0xc5, 0x20, 0xdd, 0x75, 0x3d, 0xa0, 0x13, 0x68, 0xad, 0xb9, 0xc5, 0x9d, 0x38, 0x48, 0xfa,
|
|
0xc4, 0x8d, 0xe3, 0xdf, 0x00, 0x06, 0x07, 0x52, 0x74, 0x0e, 0xfd, 0x19, 0x67, 0x82, 0x16, 0xb2,
|
|
0xda, 0xf8, 0xc0, 0x11, 0xd9, 0x03, 0x74, 0x05, 0x47, 0x2f, 0xb3, 0xfb, 0x87, 0xbd, 0x22, 0xf4,
|
|
0x8a, 0xff, 0x10, 0x8d, 0xa0, 0xed, 0xec, 0x1e, 0x7d, 0x8d, 0x3e, 0xa9, 0x17, 0xe7, 0xec, 0x64,
|
|
0xf5, 0x4b, 0xe4, 0x5f, 0xf6, 0xc0, 0x5d, 0xea, 0xbd, 0xae, 0x35, 0xe5, 0xd6, 0xb7, 0x19, 0x92,
|
|
0x03, 0xe2, 0x3c, 0x9f, 0x73, 0xba, 0xaa, 0x7c, 0xf6, 0x88, 0xd4, 0xcb, 0xe4, 0xfa, 0xe3, 0x72,
|
|
0x25, 0x8d, 0xd8, 0xce, 0x53, 0xa6, 0x36, 0x99, 0xa0, 0x95, 0x90, 0x4c, 0x95, 0x3a, 0xdb, 0xd1,
|
|
0x6d, 0x6e, 0xb2, 0xe6, 0x16, 0xf3, 0x8e, 0xff, 0xad, 0xbb, 0xbf, 0x00, 0x00, 0x00, 0xff, 0xff,
|
|
0x01, 0x95, 0xea, 0x9d, 0xc5, 0x01, 0x00, 0x00,
|
|
}
|