📂 File Browser

AgentAI/vendor/google/apiclient-services/src/CloudKMS
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AddQuorumMember.php
▶ Open 📄 View Source
🐘 ApproveSingleTenantHsmInstanceProposalRequest.php
▶ Open 📄 View Source
🐘 ApproveSingleTenantHsmInstanceProposalResponse.php
▶ Open 📄 View Source
🐘 AsymmetricDecryptRequest.php
▶ Open 📄 View Source
🐘 AsymmetricDecryptResponse.php
▶ Open 📄 View Source
🐘 AsymmetricSignRequest.php
▶ Open 📄 View Source
🐘 AsymmetricSignResponse.php
▶ Open 📄 View Source
🐘 AuditConfig.php
▶ Open 📄 View Source
🐘 AuditLogConfig.php
▶ Open 📄 View Source
🐘 AutokeyConfig.php
▶ Open 📄 View Source
🐘 Binding.php
▶ Open 📄 View Source
🐘 Certificate.php
▶ Open 📄 View Source
🐘 CertificateChains.php
▶ Open 📄 View Source
🐘 Challenge.php
▶ Open 📄 View Source
🐘 ChallengeReply.php
▶ Open 📄 View Source
🐘 ChecksummedData.php
▶ Open 📄 View Source
🐘 CloudkmsEmpty.php
▶ Open 📄 View Source
🐘 CryptoKey.php
▶ Open 📄 View Source
🐘 CryptoKeyVersion.php
▶ Open 📄 View Source
🐘 CryptoKeyVersionTemplate.php
▶ Open 📄 View Source
🐘 DecapsulateRequest.php
▶ Open 📄 View Source
🐘 DecapsulateResponse.php
▶ Open 📄 View Source
🐘 DecryptRequest.php
▶ Open 📄 View Source
🐘 DecryptResponse.php
▶ Open 📄 View Source
🐘 DeleteSingleTenantHsmInstance.php
▶ Open 📄 View Source
🐘 DestroyCryptoKeyVersionRequest.php
▶ Open 📄 View Source
🐘 Digest.php
▶ Open 📄 View Source
🐘 DisableSingleTenantHsmInstance.php
▶ Open 📄 View Source
🐘 EkmConfig.php
▶ Open 📄 View Source
🐘 EkmConnection.php
▶ Open 📄 View Source
🐘 EnableSingleTenantHsmInstance.php
▶ Open 📄 View Source
🐘 EncryptRequest.php
▶ Open 📄 View Source
🐘 EncryptResponse.php
▶ Open 📄 View Source
🐘 ExecuteSingleTenantHsmInstanceProposalRequest.php
▶ Open 📄 View Source
🐘 Expr.php
▶ Open 📄 View Source
🐘 ExternalProtectionLevelOptions.php
▶ Open 📄 View Source
🐘 GenerateRandomBytesRequest.php
▶ Open 📄 View Source
🐘 GenerateRandomBytesResponse.php
▶ Open 📄 View Source
🐘 ImportCryptoKeyVersionRequest.php
▶ Open 📄 View Source
🐘 ImportJob.php
▶ Open 📄 View Source
🐘 KeyAccessJustificationsEnrollmentConfig.php
▶ Open 📄 View Source
🐘 KeyAccessJustificationsPolicy.php
▶ Open 📄 View Source
🐘 KeyAccessJustificationsPolicyConfig.php
▶ Open 📄 View Source
🐘 KeyHandle.php
▶ Open 📄 View Source
🐘 KeyOperationAttestation.php
▶ Open 📄 View Source
🐘 KeyRing.php
▶ Open 📄 View Source
🐘 ListCryptoKeyVersionsResponse.php
▶ Open 📄 View Source
🐘 ListCryptoKeysResponse.php
▶ Open 📄 View Source
🐘 ListEkmConnectionsResponse.php
▶ Open 📄 View Source
🐘 ListImportJobsResponse.php
▶ Open 📄 View Source
🐘 ListKeyHandlesResponse.php
▶ Open 📄 View Source
🐘 ListKeyRingsResponse.php
▶ Open 📄 View Source
🐘 ListLocationsResponse.php
▶ Open 📄 View Source
🐘 ListRetiredResourcesResponse.php
▶ Open 📄 View Source
🐘 ListSingleTenantHsmInstanceProposalsResponse.php
▶ Open 📄 View Source
🐘 ListSingleTenantHsmInstancesResponse.php
▶ Open 📄 View Source
🐘 Location.php
▶ Open 📄 View Source
🐘 LocationMetadata.php
▶ Open 📄 View Source
🐘 MacSignRequest.php
▶ Open 📄 View Source
🐘 MacSignResponse.php
▶ Open 📄 View Source
🐘 MacVerifyRequest.php
▶ Open 📄 View Source
🐘 MacVerifyResponse.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 Policy.php
▶ Open 📄 View Source
🐘 PublicKey.php
▶ Open 📄 View Source
🐘 QuorumAuth.php
▶ Open 📄 View Source
🐘 QuorumParameters.php
▶ Open 📄 View Source
🐘 QuorumReply.php
▶ Open 📄 View Source
🐘 RawDecryptRequest.php
▶ Open 📄 View Source
🐘 RawDecryptResponse.php
▶ Open 📄 View Source
🐘 RawEncryptRequest.php
▶ Open 📄 View Source
🐘 RawEncryptResponse.php
▶ Open 📄 View Source
🐘 RefreshSingleTenantHsmInstance.php
▶ Open 📄 View Source
🐘 RegisterTwoFactorAuthKeys.php
▶ Open 📄 View Source
🐘 RemoveQuorumMember.php
▶ Open 📄 View Source
🐘 RequiredActionQuorumParameters.php
▶ Open 📄 View Source
🐘 RequiredActionQuorumReply.php
▶ Open 📄 View Source
🐘 RestoreCryptoKeyVersionRequest.php
▶ Open 📄 View Source
🐘 RetiredResource.php
▶ Open 📄 View Source
🐘 ServiceResolver.php
▶ Open 📄 View Source
🐘 SetIamPolicyRequest.php
▶ Open 📄 View Source
🐘 ShowEffectiveAutokeyConfigResponse.php
▶ Open 📄 View Source
🐘 ShowEffectiveKeyAccessJustificationsEnrollmentConfigResponse.php
▶ Open 📄 View Source
🐘 ShowEffectiveKeyAccessJustificationsPolicyConfigResponse.php
▶ Open 📄 View Source
🐘 SingleTenantHsmInstance.php
▶ Open 📄 View Source
🐘 SingleTenantHsmInstanceProposal.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 TestIamPermissionsRequest.php
▶ Open 📄 View Source
🐘 TestIamPermissionsResponse.php
▶ Open 📄 View Source
🐘 UpdateCryptoKeyPrimaryVersionRequest.php
▶ Open 📄 View Source
🐘 VerifyConnectivityResponse.php
▶ Open 📄 View Source
🐘 WrappingPublicKey.php
▶ Open 📄 View Source

📄 Source: ImportCryptoKeyVersionRequest.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\CloudKMS;

class ImportCryptoKeyVersionRequest extends \Google\Model
{
  /**
   * Not specified.
   */
  public const ALGORITHM_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED = 'CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED';
  /**
   * Creates symmetric encryption keys.
   */
  public const ALGORITHM_GOOGLE_SYMMETRIC_ENCRYPTION = 'GOOGLE_SYMMETRIC_ENCRYPTION';
  /**
   * AES-GCM (Galois Counter Mode) using 128-bit keys.
   */
  public const ALGORITHM_AES_128_GCM = 'AES_128_GCM';
  /**
   * AES-GCM (Galois Counter Mode) using 256-bit keys.
   */
  public const ALGORITHM_AES_256_GCM = 'AES_256_GCM';
  /**
   * AES-CBC (Cipher Block Chaining Mode) using 128-bit keys.
   */
  public const ALGORITHM_AES_128_CBC = 'AES_128_CBC';
  /**
   * AES-CBC (Cipher Block Chaining Mode) using 256-bit keys.
   */
  public const ALGORITHM_AES_256_CBC = 'AES_256_CBC';
  /**
   * AES-CTR (Counter Mode) using 128-bit keys.
   */
  public const ALGORITHM_AES_128_CTR = 'AES_128_CTR';
  /**
   * AES-CTR (Counter Mode) using 256-bit keys.
   */
  public const ALGORITHM_AES_256_CTR = 'AES_256_CTR';
  /**
   * RSASSA-PSS 2048 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_2048_SHA256 = 'RSA_SIGN_PSS_2048_SHA256';
  /**
   * RSASSA-PSS 3072 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_3072_SHA256 = 'RSA_SIGN_PSS_3072_SHA256';
  /**
   * RSASSA-PSS 4096 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_4096_SHA256 = 'RSA_SIGN_PSS_4096_SHA256';
  /**
   * RSASSA-PSS 4096 bit key with a SHA512 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_4096_SHA512 = 'RSA_SIGN_PSS_4096_SHA512';
  /**
   * RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_2048_SHA256 = 'RSA_SIGN_PKCS1_2048_SHA256';
  /**
   * RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_3072_SHA256 = 'RSA_SIGN_PKCS1_3072_SHA256';
  /**
   * RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_4096_SHA256 = 'RSA_SIGN_PKCS1_4096_SHA256';
  /**
   * RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_4096_SHA512 = 'RSA_SIGN_PKCS1_4096_SHA512';
  /**
   * RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key.
   */
  public const ALGORITHM_RSA_SIGN_RAW_PKCS1_2048 = 'RSA_SIGN_RAW_PKCS1_2048';
  /**
   * RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key.
   */
  public const ALGORITHM_RSA_SIGN_RAW_PKCS1_3072 = 'RSA_SIGN_RAW_PKCS1_3072';
  /**
   * RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key.
   */
  public const ALGORITHM_RSA_SIGN_RAW_PKCS1_4096 = 'RSA_SIGN_RAW_PKCS1_4096';
  /**
   * RSAES-OAEP 2048 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_2048_SHA256 = 'RSA_DECRYPT_OAEP_2048_SHA256';
  /**
   * RSAES-OAEP 3072 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_3072_SHA256 = 'RSA_DECRYPT_OAEP_3072_SHA256';
  /**
   * RSAES-OAEP 4096 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_4096_SHA256 = 'RSA_DECRYPT_OAEP_4096_SHA256';
  /**
   * RSAES-OAEP 4096 bit key with a SHA512 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_4096_SHA512 = 'RSA_DECRYPT_OAEP_4096_SHA512';
  /**
   * RSAES-OAEP 2048 bit key with a SHA1 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_2048_SHA1 = 'RSA_DECRYPT_OAEP_2048_SHA1';
  /**
   * RSAES-OAEP 3072 bit key with a SHA1 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_3072_SHA1 = 'RSA_DECRYPT_OAEP_3072_SHA1';
  /**
   * RSAES-OAEP 4096 bit key with a SHA1 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_4096_SHA1 = 'RSA_DECRYPT_OAEP_4096_SHA1';
  /**
   * ECDSA on the NIST P-256 curve with a SHA256 digest. Other hash functions
   * can also be used: https://cloud.google.com/kms/docs/create-validate-
   * signatures#ecdsa_support_for_other_hash_algorithms
   */
  public const ALGORITHM_EC_SIGN_P256_SHA256 = 'EC_SIGN_P256_SHA256';
  /**
   * ECDSA on the NIST P-384 curve with a SHA384 digest. Other hash functions
   * can also be used: https://cloud.google.com/kms/docs/create-validate-
   * signatures#ecdsa_support_for_other_hash_algorithms
   */
  public const ALGORITHM_EC_SIGN_P384_SHA384 = 'EC_SIGN_P384_SHA384';
  /**
   * ECDSA on the non-NIST secp256k1 curve. This curve is only supported for HSM
   * protection level. Other hash functions can also be used:
   * https://cloud.google.com/kms/docs/create-validate-
   * signatures#ecdsa_support_for_other_hash_algorithms
   */
  public const ALGORITHM_EC_SIGN_SECP256K1_SHA256 = 'EC_SIGN_SECP256K1_SHA256';
  /**
   * EdDSA on the Curve25519 in pure mode (taking data as input).
   */
  public const ALGORITHM_EC_SIGN_ED25519 = 'EC_SIGN_ED25519';
  /**
   * HMAC-SHA256 signing with a 256 bit key.
   */
  public const ALGORITHM_HMAC_SHA256 = 'HMAC_SHA256';
  /**
   * HMAC-SHA1 signing with a 160 bit key.
   */
  public const ALGORITHM_HMAC_SHA1 = 'HMAC_SHA1';
  /**
   * HMAC-SHA384 signing with a 384 bit key.
   */
  public const ALGORITHM_HMAC_SHA384 = 'HMAC_SHA384';
  /**
   * HMAC-SHA512 signing with a 512 bit key.
   */
  public const ALGORITHM_HMAC_SHA512 = 'HMAC_SHA512';
  /**
   * HMAC-SHA224 signing with a 224 bit key.
   */
  public const ALGORITHM_HMAC_SHA224 = 'HMAC_SHA224';
  /**
   * Algorithm representing symmetric encryption by an external key manager.
   */
  public const ALGORITHM_EXTERNAL_SYMMETRIC_ENCRYPTION = 'EXTERNAL_SYMMETRIC_ENCRYPTION';
  /**
   * ML-KEM-768 (FIPS 203)
   */
  public const ALGORITHM_ML_KEM_768 = 'ML_KEM_768';
  /**
   * ML-KEM-1024 (FIPS 203)
   */
  public const ALGORITHM_ML_KEM_1024 = 'ML_KEM_1024';
  /**
   * X-Wing hybrid KEM combining ML-KEM-768 with X25519 following
   * datatracker.ietf.org/doc/draft-connolly-cfrg-xwing-kem/.
   */
  public const ALGORITHM_KEM_XWING = 'KEM_XWING';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 1. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_44 = 'PQ_SIGN_ML_DSA_44';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 3. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_65 = 'PQ_SIGN_ML_DSA_65';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 5. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_87 = 'PQ_SIGN_ML_DSA_87';
  /**
   * The post-quantum stateless hash-based digital signature algorithm, at
   * security level 1. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_SLH_DSA_SHA2_128S = 'PQ_SIGN_SLH_DSA_SHA2_128S';
  /**
   * The post-quantum stateless hash-based digital signature algorithm, at
   * security level 1. Randomized pre-hash version supporting SHA256 digests.
   */
  public const ALGORITHM_PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256 = 'PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 1. Randomized version supporting externally-computed message
   * representatives.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_44_EXTERNAL_MU = 'PQ_SIGN_ML_DSA_44_EXTERNAL_MU';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 3. Randomized version supporting externally-computed message
   * representatives.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_65_EXTERNAL_MU = 'PQ_SIGN_ML_DSA_65_EXTERNAL_MU';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 5. Randomized version supporting externally-computed message
   * representatives.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_87_EXTERNAL_MU = 'PQ_SIGN_ML_DSA_87_EXTERNAL_MU';
  /**
   * Required. The algorithm of the key being imported. This does not need to
   * match the version_template of the CryptoKey this version imports into.
   *
   * @var string
   */
  public $algorithm;
  /**
   * Optional. The optional name of an existing CryptoKeyVersion to target for
   * an import operation. If this field is not present, a new CryptoKeyVersion
   * containing the supplied key material is created. If this field is present,
   * the supplied key material is imported into the existing CryptoKeyVersion.
   * To import into an existing CryptoKeyVersion, the CryptoKeyVersion must be a
   * child of ImportCryptoKeyVersionRequest.parent, have been previously created
   * via ImportCryptoKeyVersion, and be in DESTROYED or IMPORT_FAILED state. The
   * key material and algorithm must match the previous CryptoKeyVersion exactly
   * if the CryptoKeyVersion has ever contained key material.
   *
   * @var string
   */
  public $cryptoKeyVersion;
  /**
   * Required. The name of the ImportJob that was used to wrap this key
   * material.
   *
   * @var string
   */
  public $importJob;
  /**
   * Optional. This field has the same meaning as wrapped_key. Prefer to use
   * that field in new work. Either that field or this field (but not both) must
   * be specified.
   *
   * @var string
   */
  public $rsaAesWrappedKey;
  /**
   * Optional. The wrapped key material to import. Before wrapping, key material
   * must be formatted. If importing symmetric key material, the expected key
   * material format is plain bytes. If importing asymmetric key material, the
   * expected key material format is PKCS#8-encoded DER (the PrivateKeyInfo
   * structure from RFC 5208). When wrapping with import methods
   * (RSA_OAEP_3072_SHA1_AES_256 or RSA_OAEP_4096_SHA1_AES_256 or
   * RSA_OAEP_3072_SHA256_AES_256 or RSA_OAEP_4096_SHA256_AES_256), this field
   * must contain the concatenation of: 1. An ephemeral AES-256 wrapping key
   * wrapped with the public_key using RSAES-OAEP with SHA-1/SHA-256, MGF1 with
   * SHA-1/SHA-256, and an empty label. 2. The formatted key to be imported,
   * wrapped with the ephemeral AES-256 key using AES-KWP (RFC 5649). This
   * format is the same as the format produced by PKCS#11 mechanism
   * CKM_RSA_AES_KEY_WRAP. When wrapping with import methods
   * (RSA_OAEP_3072_SHA256 or RSA_OAEP_4096_SHA256), this field must contain the
   * formatted key to be imported, wrapped with the public_key using RSAES-OAEP
   * with SHA-256, MGF1 with SHA-256, and an empty label.
   *
   * @var string
   */
  public $wrappedKey;

  /**
   * Required. The algorithm of the key being imported. This does not need to
   * match the version_template of the CryptoKey this version imports into.
   *
   * Accepted values: CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED,
   * GOOGLE_SYMMETRIC_ENCRYPTION, AES_128_GCM, AES_256_GCM, AES_128_CBC,
   * AES_256_CBC, AES_128_CTR, AES_256_CTR, RSA_SIGN_PSS_2048_SHA256,
   * RSA_SIGN_PSS_3072_SHA256, RSA_SIGN_PSS_4096_SHA256,
   * RSA_SIGN_PSS_4096_SHA512, RSA_SIGN_PKCS1_2048_SHA256,
   * RSA_SIGN_PKCS1_3072_SHA256, RSA_SIGN_PKCS1_4096_SHA256,
   * RSA_SIGN_PKCS1_4096_SHA512, RSA_SIGN_RAW_PKCS1_2048,
   * RSA_SIGN_RAW_PKCS1_3072, RSA_SIGN_RAW_PKCS1_4096,
   * RSA_DECRYPT_OAEP_2048_SHA256, RSA_DECRYPT_OAEP_3072_SHA256,
   * RSA_DECRYPT_OAEP_4096_SHA256, RSA_DECRYPT_OAEP_4096_SHA512,
   * RSA_DECRYPT_OAEP_2048_SHA1, RSA_DECRYPT_OAEP_3072_SHA1,
   * RSA_DECRYPT_OAEP_4096_SHA1, EC_SIGN_P256_SHA256, EC_SIGN_P384_SHA384,
   * EC_SIGN_SECP256K1_SHA256, EC_SIGN_ED25519, HMAC_SHA256, HMAC_SHA1,
   * HMAC_SHA384, HMAC_SHA512, HMAC_SHA224, EXTERNAL_SYMMETRIC_ENCRYPTION,
   * ML_KEM_768, ML_KEM_1024, KEM_XWING, PQ_SIGN_ML_DSA_44, PQ_SIGN_ML_DSA_65,
   * PQ_SIGN_ML_DSA_87, PQ_SIGN_SLH_DSA_SHA2_128S,
   * PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256, PQ_SIGN_ML_DSA_44_EXTERNAL_MU,
   * PQ_SIGN_ML_DSA_65_EXTERNAL_MU, PQ_SIGN_ML_DSA_87_EXTERNAL_MU
   *
   * @param self::ALGORITHM_* $algorithm
   */
  public function setAlgorithm($algorithm)
  {
    $this->algorithm = $algorithm;
  }
  /**
   * @return self::ALGORITHM_*
   */
  public function getAlgorithm()
  {
    return $this->algorithm;
  }
  /**
   * Optional. The optional name of an existing CryptoKeyVersion to target for
   * an import operation. If this field is not present, a new CryptoKeyVersion
   * containing the supplied key material is created. If this field is present,
   * the supplied key material is imported into the existing CryptoKeyVersion.
   * To import into an existing CryptoKeyVersion, the CryptoKeyVersion must be a
   * child of ImportCryptoKeyVersionRequest.parent, have been previously created
   * via ImportCryptoKeyVersion, and be in DESTROYED or IMPORT_FAILED state. The
   * key material and algorithm must match the previous CryptoKeyVersion exactly
   * if the CryptoKeyVersion has ever contained key material.
   *
   * @param string $cryptoKeyVersion
   */
  public function setCryptoKeyVersion($cryptoKeyVersion)
  {
    $this->cryptoKeyVersion = $cryptoKeyVersion;
  }
  /**
   * @return string
   */
  public function getCryptoKeyVersion()
  {
    return $this->cryptoKeyVersion;
  }
  /**
   * Required. The name of the ImportJob that was used to wrap this key
   * material.
   *
   * @param string $importJob
   */
  public function setImportJob($importJob)
  {
    $this->importJob = $importJob;
  }
  /**
   * @return string
   */
  public function getImportJob()
  {
    return $this->importJob;
  }
  /**
   * Optional. This field has the same meaning as wrapped_key. Prefer to use
   * that field in new work. Either that field or this field (but not both) must
   * be specified.
   *
   * @param string $rsaAesWrappedKey
   */
  public function setRsaAesWrappedKey($rsaAesWrappedKey)
  {
    $this->rsaAesWrappedKey = $rsaAesWrappedKey;
  }
  /**
   * @return string
   */
  public function getRsaAesWrappedKey()
  {
    return $this->rsaAesWrappedKey;
  }
  /**
   * Optional. The wrapped key material to import. Before wrapping, key material
   * must be formatted. If importing symmetric key material, the expected key
   * material format is plain bytes. If importing asymmetric key material, the
   * expected key material format is PKCS#8-encoded DER (the PrivateKeyInfo
   * structure from RFC 5208). When wrapping with import methods
   * (RSA_OAEP_3072_SHA1_AES_256 or RSA_OAEP_4096_SHA1_AES_256 or
   * RSA_OAEP_3072_SHA256_AES_256 or RSA_OAEP_4096_SHA256_AES_256), this field
   * must contain the concatenation of: 1. An ephemeral AES-256 wrapping key
   * wrapped with the public_key using RSAES-OAEP with SHA-1/SHA-256, MGF1 with
   * SHA-1/SHA-256, and an empty label. 2. The formatted key to be imported,
   * wrapped with the ephemeral AES-256 key using AES-KWP (RFC 5649). This
   * format is the same as the format produced by PKCS#11 mechanism
   * CKM_RSA_AES_KEY_WRAP. When wrapping with import methods
   * (RSA_OAEP_3072_SHA256 or RSA_OAEP_4096_SHA256), this field must contain the
   * formatted key to be imported, wrapped with the public_key using RSAES-OAEP
   * with SHA-256, MGF1 with SHA-256, and an empty label.
   *
   * @param string $wrappedKey
   */
  public function setWrappedKey($wrappedKey)
  {
    $this->wrappedKey = $wrappedKey;
  }
  /**
   * @return string
   */
  public function getWrappedKey()
  {
    return $this->wrappedKey;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(ImportCryptoKeyVersionRequest::class, 'Google_Service_CloudKMS_ImportCryptoKeyVersionRequest');
← Back