@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class Encryption extends Object implements Serializable, Cloneable, StructuredPojo
The encryption settings, if any, that are used for decrypting your input files or encrypting your output files. If your input file is encrypted, you must specify the mode that Elastic Transcoder uses to decrypt your file, otherwise you must specify the mode you want Elastic Transcoder to use to encrypt your output files.
Constructor and Description |
---|
Encryption() |
Modifier and Type | Method and Description |
---|---|
Encryption |
clone() |
boolean |
equals(Object obj) |
String |
getInitializationVector()
The series of random bits created by a random bit generator, unique for every encryption operation, that you used
to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files.
|
String |
getKey()
The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to
encrypt your input file.
|
String |
getKeyMd5()
The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to
encrypt your output file.
|
String |
getMode()
The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files
or encrypting your output files.
|
int |
hashCode() |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setInitializationVector(String initializationVector)
The series of random bits created by a random bit generator, unique for every encryption operation, that you used
to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files.
|
void |
setKey(String key)
The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to
encrypt your input file.
|
void |
setKeyMd5(String keyMd5)
The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to
encrypt your output file.
|
void |
setMode(String mode)
The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files
or encrypting your output files.
|
String |
toString()
Returns a string representation of this object; useful for testing and debugging.
|
Encryption |
withInitializationVector(String initializationVector)
The series of random bits created by a random bit generator, unique for every encryption operation, that you used
to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files.
|
Encryption |
withKey(String key)
The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to
encrypt your input file.
|
Encryption |
withKeyMd5(String keyMd5)
The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to
encrypt your output file.
|
Encryption |
withMode(String mode)
The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files
or encrypting your output files.
|
public void setMode(String mode)
The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:
S3: Amazon S3 creates and manages the keys used for encrypting your files.
S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are
used for encrypting your files. If you specify S3-AWS-KMS
and you don't want to use the default key,
you must add the AWS-KMS key that you want to use to your pipeline.
AES-CBC-PKCS7: A padded cipher-block mode of operation originally used for HLS files.
AES-CTR: AES Counter Mode.
AES-GCM: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.
For all three AES options, you must provide the following settings, which must be base64-encoded:
Key
Key MD5
Initialization Vector
For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.
mode
- The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your
input files or encrypting your output files. Elastic Transcoder supports the following options:
S3: Amazon S3 creates and manages the keys used for encrypting your files.
S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys
that are used for encrypting your files. If you specify S3-AWS-KMS
and you don't want to use
the default key, you must add the AWS-KMS key that you want to use to your pipeline.
AES-CBC-PKCS7: A padded cipher-block mode of operation originally used for HLS files.
AES-CTR: AES Counter Mode.
AES-GCM: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.
For all three AES options, you must provide the following settings, which must be base64-encoded:
Key
Key MD5
Initialization Vector
For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.
public String getMode()
The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:
S3: Amazon S3 creates and manages the keys used for encrypting your files.
S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are
used for encrypting your files. If you specify S3-AWS-KMS
and you don't want to use the default key,
you must add the AWS-KMS key that you want to use to your pipeline.
AES-CBC-PKCS7: A padded cipher-block mode of operation originally used for HLS files.
AES-CTR: AES Counter Mode.
AES-GCM: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.
For all three AES options, you must provide the following settings, which must be base64-encoded:
Key
Key MD5
Initialization Vector
For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.
S3: Amazon S3 creates and manages the keys used for encrypting your files.
S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys
that are used for encrypting your files. If you specify S3-AWS-KMS
and you don't want to use
the default key, you must add the AWS-KMS key that you want to use to your pipeline.
AES-CBC-PKCS7: A padded cipher-block mode of operation originally used for HLS files.
AES-CTR: AES Counter Mode.
AES-GCM: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.
For all three AES options, you must provide the following settings, which must be base64-encoded:
Key
Key MD5
Initialization Vector
For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.
public Encryption withMode(String mode)
The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:
S3: Amazon S3 creates and manages the keys used for encrypting your files.
S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are
used for encrypting your files. If you specify S3-AWS-KMS
and you don't want to use the default key,
you must add the AWS-KMS key that you want to use to your pipeline.
AES-CBC-PKCS7: A padded cipher-block mode of operation originally used for HLS files.
AES-CTR: AES Counter Mode.
AES-GCM: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.
For all three AES options, you must provide the following settings, which must be base64-encoded:
Key
Key MD5
Initialization Vector
For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.
mode
- The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your
input files or encrypting your output files. Elastic Transcoder supports the following options:
S3: Amazon S3 creates and manages the keys used for encrypting your files.
S3-AWS-KMS: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys
that are used for encrypting your files. If you specify S3-AWS-KMS
and you don't want to use
the default key, you must add the AWS-KMS key that you want to use to your pipeline.
AES-CBC-PKCS7: A padded cipher-block mode of operation originally used for HLS files.
AES-CTR: AES Counter Mode.
AES-GCM: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.
For all three AES options, you must provide the following settings, which must be base64-encoded:
Key
Key MD5
Initialization Vector
For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.
public void setKey(String key)
The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:
128
, 192
, or 256
.
The key must also be encrypted by using the Amazon Key Management Service.
key
- The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was
used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit
lengths before being base64-encoded:
128
, 192
, or 256
.
The key must also be encrypted by using the Amazon Key Management Service.
public String getKey()
The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:
128
, 192
, or 256
.
The key must also be encrypted by using the Amazon Key Management Service.
128
, 192
, or 256
.
The key must also be encrypted by using the Amazon Key Management Service.
public Encryption withKey(String key)
The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:
128
, 192
, or 256
.
The key must also be encrypted by using the Amazon Key Management Service.
key
- The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was
used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit
lengths before being base64-encoded:
128
, 192
, or 256
.
The key must also be encrypted by using the Amazon Key Management Service.
public void setKeyMd5(String keyMd5)
The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.
keyMd5
- The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to
use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your
key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long
before being base64-encoded.public String getKeyMd5()
The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.
public Encryption withKeyMd5(String keyMd5)
The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.
keyMd5
- The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to
use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your
key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long
before being base64-encoded.public void setInitializationVector(String initializationVector)
The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.
initializationVector
- The series of random bits created by a random bit generator, unique for every encryption operation, that
you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output
files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being
base64-encoded.public String getInitializationVector()
The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.
public Encryption withInitializationVector(String initializationVector)
The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.
initializationVector
- The series of random bits created by a random bit generator, unique for every encryption operation, that
you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output
files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being
base64-encoded.public String toString()
toString
in class Object
Object.toString()
public Encryption clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.Copyright © 2013 Amazon Web Services, Inc. All Rights Reserved.