AWS SDK for C++  1.9.72
AWS SDK for C++
Public Member Functions | List of all members
Aws::ElasticTranscoder::Model::Encryption Class Reference

#include <Encryption.h>

Public Member Functions

 Encryption ()
 
 Encryption (Aws::Utils::Json::JsonView jsonValue)
 
Encryptionoperator= (Aws::Utils::Json::JsonView jsonValue)
 
Aws::Utils::Json::JsonValue Jsonize () const
 
const Aws::StringGetMode () const
 
bool ModeHasBeenSet () const
 
void SetMode (const Aws::String &value)
 
void SetMode (Aws::String &&value)
 
void SetMode (const char *value)
 
EncryptionWithMode (const Aws::String &value)
 
EncryptionWithMode (Aws::String &&value)
 
EncryptionWithMode (const char *value)
 
const Aws::StringGetKey () const
 
bool KeyHasBeenSet () const
 
void SetKey (const Aws::String &value)
 
void SetKey (Aws::String &&value)
 
void SetKey (const char *value)
 
EncryptionWithKey (const Aws::String &value)
 
EncryptionWithKey (Aws::String &&value)
 
EncryptionWithKey (const char *value)
 
const Aws::StringGetKeyMd5 () const
 
bool KeyMd5HasBeenSet () const
 
void SetKeyMd5 (const Aws::String &value)
 
void SetKeyMd5 (Aws::String &&value)
 
void SetKeyMd5 (const char *value)
 
EncryptionWithKeyMd5 (const Aws::String &value)
 
EncryptionWithKeyMd5 (Aws::String &&value)
 
EncryptionWithKeyMd5 (const char *value)
 
const Aws::StringGetInitializationVector () const
 
bool InitializationVectorHasBeenSet () const
 
void SetInitializationVector (const Aws::String &value)
 
void SetInitializationVector (Aws::String &&value)
 
void SetInitializationVector (const char *value)
 
EncryptionWithInitializationVector (const Aws::String &value)
 
EncryptionWithInitializationVector (Aws::String &&value)
 
EncryptionWithInitializationVector (const char *value)
 

Detailed Description

The encryption settings, if any, that are used for decrypting your input files or encrypting your output files. If your input file is encrypted, you must specify the mode that Elastic Transcoder uses to decrypt your file, otherwise you must specify the mode you want Elastic Transcoder to use to encrypt your output files.

See Also:

AWS API Reference

Definition at line 35 of file Encryption.h.

Constructor & Destructor Documentation

◆ Encryption() [1/2]

Aws::ElasticTranscoder::Model::Encryption::Encryption ( )

◆ Encryption() [2/2]

Aws::ElasticTranscoder::Model::Encryption::Encryption ( Aws::Utils::Json::JsonView  jsonValue)

Member Function Documentation

◆ GetInitializationVector()

const Aws::String& Aws::ElasticTranscoder::Model::Encryption::GetInitializationVector ( ) const
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 398 of file Encryption.h.

◆ GetKey()

const Aws::String& Aws::ElasticTranscoder::Model::Encryption::GetKey ( ) const
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 245 of file Encryption.h.

◆ GetKeyMd5()

const Aws::String& Aws::ElasticTranscoder::Model::Encryption::GetKeyMd5 ( ) const
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 325 of file Encryption.h.

◆ GetMode()

const Aws::String& Aws::ElasticTranscoder::Model::Encryption::GetMode ( ) const
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 66 of file Encryption.h.

◆ InitializationVectorHasBeenSet()

bool Aws::ElasticTranscoder::Model::Encryption::InitializationVectorHasBeenSet ( ) const
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 407 of file Encryption.h.

◆ Jsonize()

Aws::Utils::Json::JsonValue Aws::ElasticTranscoder::Model::Encryption::Jsonize ( ) const

◆ KeyHasBeenSet()

bool Aws::ElasticTranscoder::Model::Encryption::KeyHasBeenSet ( ) const
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 255 of file Encryption.h.

◆ KeyMd5HasBeenSet()

bool Aws::ElasticTranscoder::Model::Encryption::KeyMd5HasBeenSet ( ) const
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 334 of file Encryption.h.

◆ ModeHasBeenSet()

bool Aws::ElasticTranscoder::Model::Encryption::ModeHasBeenSet ( ) const
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 90 of file Encryption.h.

◆ operator=()

Encryption& Aws::ElasticTranscoder::Model::Encryption::operator= ( Aws::Utils::Json::JsonView  jsonValue)

◆ SetInitializationVector() [1/3]

void Aws::ElasticTranscoder::Model::Encryption::SetInitializationVector ( Aws::String &&  value)
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 425 of file Encryption.h.

◆ SetInitializationVector() [2/3]

void Aws::ElasticTranscoder::Model::Encryption::SetInitializationVector ( const Aws::String value)
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 416 of file Encryption.h.

◆ SetInitializationVector() [3/3]

void Aws::ElasticTranscoder::Model::Encryption::SetInitializationVector ( const char *  value)
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 434 of file Encryption.h.

◆ SetKey() [1/3]

void Aws::ElasticTranscoder::Model::Encryption::SetKey ( Aws::String &&  value)
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 275 of file Encryption.h.

◆ SetKey() [2/3]

void Aws::ElasticTranscoder::Model::Encryption::SetKey ( const Aws::String value)
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 265 of file Encryption.h.

◆ SetKey() [3/3]

void Aws::ElasticTranscoder::Model::Encryption::SetKey ( const char *  value)
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 285 of file Encryption.h.

◆ SetKeyMd5() [1/3]

void Aws::ElasticTranscoder::Model::Encryption::SetKeyMd5 ( Aws::String &&  value)
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 352 of file Encryption.h.

◆ SetKeyMd5() [2/3]

void Aws::ElasticTranscoder::Model::Encryption::SetKeyMd5 ( const Aws::String value)
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 343 of file Encryption.h.

◆ SetKeyMd5() [3/3]

void Aws::ElasticTranscoder::Model::Encryption::SetKeyMd5 ( const char *  value)
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 361 of file Encryption.h.

◆ SetMode() [1/3]

void Aws::ElasticTranscoder::Model::Encryption::SetMode ( Aws::String &&  value)
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 138 of file Encryption.h.

◆ SetMode() [2/3]

void Aws::ElasticTranscoder::Model::Encryption::SetMode ( const Aws::String value)
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 114 of file Encryption.h.

◆ SetMode() [3/3]

void Aws::ElasticTranscoder::Model::Encryption::SetMode ( const char *  value)
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 162 of file Encryption.h.

◆ WithInitializationVector() [1/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithInitializationVector ( Aws::String &&  value)
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 452 of file Encryption.h.

◆ WithInitializationVector() [2/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithInitializationVector ( const Aws::String value)
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 443 of file Encryption.h.

◆ WithInitializationVector() [3/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithInitializationVector ( const char *  value)
inline

The series of random bits created by a random bit generator, unique for every encryption operation, that you used to encrypt your input files or that you want Elastic Transcoder to use to encrypt your output files. The initialization vector must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 461 of file Encryption.h.

◆ WithKey() [1/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithKey ( Aws::String &&  value)
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 305 of file Encryption.h.

◆ WithKey() [2/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithKey ( const Aws::String value)
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 295 of file Encryption.h.

◆ WithKey() [3/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithKey ( const char *  value)
inline

The data encryption key that you want Elastic Transcoder to use to encrypt your output file, or that was used to encrypt your input file. The key must be base64-encoded and it must be one of the following bit lengths before being base64-encoded:

128, 192, or 256.

The key must also be encrypted by using the Amazon Key Management Service.

Definition at line 315 of file Encryption.h.

◆ WithKeyMd5() [1/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithKeyMd5 ( Aws::String &&  value)
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 379 of file Encryption.h.

◆ WithKeyMd5() [2/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithKeyMd5 ( const Aws::String value)
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 370 of file Encryption.h.

◆ WithKeyMd5() [3/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithKeyMd5 ( const char *  value)
inline

The MD5 digest of the key that you used to encrypt your input file, or that you want Elastic Transcoder to use to encrypt your output file. Elastic Transcoder uses the key digest as a checksum to make sure your key was not corrupted in transit. The key MD5 must be base64-encoded, and it must be exactly 16 bytes long before being base64-encoded.

Definition at line 388 of file Encryption.h.

◆ WithMode() [1/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithMode ( Aws::String &&  value)
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 210 of file Encryption.h.

◆ WithMode() [2/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithMode ( const Aws::String value)
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 186 of file Encryption.h.

◆ WithMode() [3/3]

Encryption& Aws::ElasticTranscoder::Model::Encryption::WithMode ( const char *  value)
inline

The specific server-side encryption mode that you want Elastic Transcoder to use when decrypting your input files or encrypting your output files. Elastic Transcoder supports the following options:

  • s3: Amazon S3 creates and manages the keys used for encrypting your files.

  • s3-aws-kms: Amazon S3 calls the Amazon Key Management Service, which creates and manages the keys that are used for encrypting your files. If you specify s3-aws-kms and you don't want to use the default key, you must add the AWS-KMS key that you want to use to your pipeline.

  • aes-cbc-pkcs7: A padded cipher-block mode of operation originally used for HLS files.

  • aes-ctr: AES Counter Mode.

  • aes-gcm: AES Galois Counter Mode, a mode of operation that is an authenticated encryption format, meaning that a file, key, or initialization vector that has been tampered with fails the decryption process.

For all three AES options, you must provide the following settings, which must be base64-encoded:

  • Key

  • Key MD5

  • Initialization Vector

For the AES modes, your private encryption keys and your unencrypted data are never stored by AWS; therefore, it is important that you safely manage your encryption keys. If you lose them, you won't be able to unencrypt your data.

Definition at line 234 of file Encryption.h.


The documentation for this class was generated from the following file: