// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: keyapis/encryption_profile/v1/keyapis_encryption_profile_encryption_profile_v1.proto

#ifndef GOOGLE_PROTOBUF_INCLUDED_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto_2epb_2eh
#define GOOGLE_PROTOBUF_INCLUDED_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto_2epb_2eh

#include <limits>
#include <string>
#include <type_traits>

#include "google/protobuf/port_def.inc"
#if PROTOBUF_VERSION < 4023000
#error "This file was generated by a newer version of protoc which is"
#error "incompatible with your Protocol Buffer headers. Please update"
#error "your headers."
#endif  // PROTOBUF_VERSION

#if 4023001 < PROTOBUF_MIN_PROTOC_VERSION
#error "This file was generated by an older version of protoc which is"
#error "incompatible with your Protocol Buffer headers. Please"
#error "regenerate this file with a newer version of protoc."
#endif  // PROTOBUF_MIN_PROTOC_VERSION
#include "google/protobuf/port_undef.inc"
#include "google/protobuf/io/coded_stream.h"
#include "google/protobuf/arena.h"
#include "google/protobuf/arenastring.h"
#include "google/protobuf/generated_message_util.h"
#include "google/protobuf/metadata_lite.h"
#include "google/protobuf/message_lite.h"
#include "google/protobuf/repeated_field.h"  // IWYU pragma: export
#include "google/protobuf/extension_set.h"  // IWYU pragma: export
#include "google/protobuf/generated_enum_util.h"
#include "google/protobuf/timestamp.pb.h"
#include "google/api/annotations.pb.h"
#include "google/api/field_behavior.pb.h"
#include "google/protobuf/descriptor.pb.h"
#include "google/protobuf/wrappers.pb.h"
// @@protoc_insertion_point(includes)

// Must be included last.
#include "google/protobuf/port_def.inc"

#define PROTOBUF_INTERNAL_EXPORT_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto

PROTOBUF_NAMESPACE_OPEN
namespace internal {
class AnyMetadata;
}  // namespace internal
PROTOBUF_NAMESPACE_CLOSE

// Internal implementation detail -- do not use these members.
struct TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto {
  static const ::uint32_t offsets[];
};
namespace keyapis {
namespace encryption_profile {
namespace v1 {
class DeleteEncryptionProfileRequest;
struct DeleteEncryptionProfileRequestDefaultTypeInternal;
extern DeleteEncryptionProfileRequestDefaultTypeInternal _DeleteEncryptionProfileRequest_default_instance_;
class DeleteEncryptionProfileResponse;
struct DeleteEncryptionProfileResponseDefaultTypeInternal;
extern DeleteEncryptionProfileResponseDefaultTypeInternal _DeleteEncryptionProfileResponse_default_instance_;
class DeleteEncryptionProfileResponse_Error;
struct DeleteEncryptionProfileResponse_ErrorDefaultTypeInternal;
extern DeleteEncryptionProfileResponse_ErrorDefaultTypeInternal _DeleteEncryptionProfileResponse_Error_default_instance_;
class DeleteEncryptionProfileResponse_Error_LinkedDevicesExists;
struct DeleteEncryptionProfileResponse_Error_LinkedDevicesExistsDefaultTypeInternal;
extern DeleteEncryptionProfileResponse_Error_LinkedDevicesExistsDefaultTypeInternal _DeleteEncryptionProfileResponse_Error_LinkedDevicesExists_default_instance_;
class EncryptionProfile;
struct EncryptionProfileDefaultTypeInternal;
extern EncryptionProfileDefaultTypeInternal _EncryptionProfile_default_instance_;
class EncryptionProfileFilter;
struct EncryptionProfileFilterDefaultTypeInternal;
extern EncryptionProfileFilterDefaultTypeInternal _EncryptionProfileFilter_default_instance_;
class EncryptionProfilePaging;
struct EncryptionProfilePagingDefaultTypeInternal;
extern EncryptionProfilePagingDefaultTypeInternal _EncryptionProfilePaging_default_instance_;
class EncryptionProfile_SavingError;
struct EncryptionProfile_SavingErrorDefaultTypeInternal;
extern EncryptionProfile_SavingErrorDefaultTypeInternal _EncryptionProfile_SavingError_default_instance_;
class EncryptionProfile_SavingError_Conflict;
struct EncryptionProfile_SavingError_ConflictDefaultTypeInternal;
extern EncryptionProfile_SavingError_ConflictDefaultTypeInternal _EncryptionProfile_SavingError_Conflict_default_instance_;
class EncryptionProfile_SavingError_RangeIsTooSmall;
struct EncryptionProfile_SavingError_RangeIsTooSmallDefaultTypeInternal;
extern EncryptionProfile_SavingError_RangeIsTooSmallDefaultTypeInternal _EncryptionProfile_SavingError_RangeIsTooSmall_default_instance_;
class GetEncryptionProfileCountRequest;
struct GetEncryptionProfileCountRequestDefaultTypeInternal;
extern GetEncryptionProfileCountRequestDefaultTypeInternal _GetEncryptionProfileCountRequest_default_instance_;
class GetEncryptionProfileCountResponse;
struct GetEncryptionProfileCountResponseDefaultTypeInternal;
extern GetEncryptionProfileCountResponseDefaultTypeInternal _GetEncryptionProfileCountResponse_default_instance_;
class GetEncryptionProfileCountResponse_Error;
struct GetEncryptionProfileCountResponse_ErrorDefaultTypeInternal;
extern GetEncryptionProfileCountResponse_ErrorDefaultTypeInternal _GetEncryptionProfileCountResponse_Error_default_instance_;
class GetEncryptionProfileListRequest;
struct GetEncryptionProfileListRequestDefaultTypeInternal;
extern GetEncryptionProfileListRequestDefaultTypeInternal _GetEncryptionProfileListRequest_default_instance_;
class GetEncryptionProfileListResponse;
struct GetEncryptionProfileListResponseDefaultTypeInternal;
extern GetEncryptionProfileListResponseDefaultTypeInternal _GetEncryptionProfileListResponse_default_instance_;
class GetEncryptionProfileListResponse_Error;
struct GetEncryptionProfileListResponse_ErrorDefaultTypeInternal;
extern GetEncryptionProfileListResponse_ErrorDefaultTypeInternal _GetEncryptionProfileListResponse_Error_default_instance_;
class GetEncryptionProfileRequest;
struct GetEncryptionProfileRequestDefaultTypeInternal;
extern GetEncryptionProfileRequestDefaultTypeInternal _GetEncryptionProfileRequest_default_instance_;
class GetEncryptionProfileResponse;
struct GetEncryptionProfileResponseDefaultTypeInternal;
extern GetEncryptionProfileResponseDefaultTypeInternal _GetEncryptionProfileResponse_default_instance_;
class GetEncryptionProfileResponse_Error;
struct GetEncryptionProfileResponse_ErrorDefaultTypeInternal;
extern GetEncryptionProfileResponse_ErrorDefaultTypeInternal _GetEncryptionProfileResponse_Error_default_instance_;
class PostEncryptionProfileRequest;
struct PostEncryptionProfileRequestDefaultTypeInternal;
extern PostEncryptionProfileRequestDefaultTypeInternal _PostEncryptionProfileRequest_default_instance_;
class PostEncryptionProfileResponse;
struct PostEncryptionProfileResponseDefaultTypeInternal;
extern PostEncryptionProfileResponseDefaultTypeInternal _PostEncryptionProfileResponse_default_instance_;
class PostEncryptionProfileResponse_Error;
struct PostEncryptionProfileResponse_ErrorDefaultTypeInternal;
extern PostEncryptionProfileResponse_ErrorDefaultTypeInternal _PostEncryptionProfileResponse_Error_default_instance_;
class PostEncryptionProfileRestoreRequest;
struct PostEncryptionProfileRestoreRequestDefaultTypeInternal;
extern PostEncryptionProfileRestoreRequestDefaultTypeInternal _PostEncryptionProfileRestoreRequest_default_instance_;
class PostEncryptionProfileRestoreResponse;
struct PostEncryptionProfileRestoreResponseDefaultTypeInternal;
extern PostEncryptionProfileRestoreResponseDefaultTypeInternal _PostEncryptionProfileRestoreResponse_default_instance_;
class ValidationError;
struct ValidationErrorDefaultTypeInternal;
extern ValidationErrorDefaultTypeInternal _ValidationError_default_instance_;
}  // namespace v1
}  // namespace encryption_profile
}  // namespace keyapis
PROTOBUF_NAMESPACE_OPEN
template <>
::keyapis::encryption_profile::v1::DeleteEncryptionProfileRequest* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::DeleteEncryptionProfileRequest>(Arena*);
template <>
::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse>(Arena*);
template <>
::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error>(Arena*);
template <>
::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists>(Arena*);
template <>
::keyapis::encryption_profile::v1::EncryptionProfile* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfile>(Arena*);
template <>
::keyapis::encryption_profile::v1::EncryptionProfileFilter* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfileFilter>(Arena*);
template <>
::keyapis::encryption_profile::v1::EncryptionProfilePaging* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfilePaging>(Arena*);
template <>
::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfile_SavingError>(Arena*);
template <>
::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict>(Arena*);
template <>
::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileCountRequest* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileCountRequest>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileListRequest* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileListRequest>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileRequest* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileRequest>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileResponse* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileResponse>(Arena*);
template <>
::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error>(Arena*);
template <>
::keyapis::encryption_profile::v1::PostEncryptionProfileRequest* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::PostEncryptionProfileRequest>(Arena*);
template <>
::keyapis::encryption_profile::v1::PostEncryptionProfileResponse* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::PostEncryptionProfileResponse>(Arena*);
template <>
::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error>(Arena*);
template <>
::keyapis::encryption_profile::v1::PostEncryptionProfileRestoreRequest* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::PostEncryptionProfileRestoreRequest>(Arena*);
template <>
::keyapis::encryption_profile::v1::PostEncryptionProfileRestoreResponse* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::PostEncryptionProfileRestoreResponse>(Arena*);
template <>
::keyapis::encryption_profile::v1::ValidationError* Arena::CreateMaybeMessage<::keyapis::encryption_profile::v1::ValidationError>(Arena*);
PROTOBUF_NAMESPACE_CLOSE

namespace keyapis {
namespace encryption_profile {
namespace v1 {
enum EncryptionProfile_Type : int {
  EncryptionProfile_Type_TYPE_UNKNOWN = 0,
  EncryptionProfile_Type_SL3 = 1,
  EncryptionProfile_Type_EncryptionProfile_Type_INT_MIN_SENTINEL_DO_NOT_USE_ =
      std::numeric_limits<::int32_t>::min(),
  EncryptionProfile_Type_EncryptionProfile_Type_INT_MAX_SENTINEL_DO_NOT_USE_ =
      std::numeric_limits<::int32_t>::max(),
};

bool EncryptionProfile_Type_IsValid(int value);
constexpr EncryptionProfile_Type EncryptionProfile_Type_Type_MIN = static_cast<EncryptionProfile_Type>(0);
constexpr EncryptionProfile_Type EncryptionProfile_Type_Type_MAX = static_cast<EncryptionProfile_Type>(1);
constexpr int EncryptionProfile_Type_Type_ARRAYSIZE = 1 + 1;
const std::string& EncryptionProfile_Type_Name(EncryptionProfile_Type value);
template <typename T>
const std::string& EncryptionProfile_Type_Name(T value) {
  static_assert(std::is_same<T, EncryptionProfile_Type>::value ||
                    std::is_integral<T>::value,
                "Incorrect type passed to Type_Name().");
  return EncryptionProfile_Type_Name(static_cast<EncryptionProfile_Type>(value));
}
const std::string& EncryptionProfile_Type_Name(EncryptionProfile_Type value);
bool EncryptionProfile_Type_Parse(absl::string_view name, EncryptionProfile_Type* value);
enum EncryptionProfilePaging_OrderByType : int {
  EncryptionProfilePaging_OrderByType_ORDER_BY_TYPE_UNKNOWN = 0,
  EncryptionProfilePaging_OrderByType_ID = 1,
  EncryptionProfilePaging_OrderByType_CHANGED_AT = 2,
  EncryptionProfilePaging_OrderByType_CREATED_AT = 3,
  EncryptionProfilePaging_OrderByType_RANK = 4,
  EncryptionProfilePaging_OrderByType_EncryptionProfilePaging_OrderByType_INT_MIN_SENTINEL_DO_NOT_USE_ =
      std::numeric_limits<::int32_t>::min(),
  EncryptionProfilePaging_OrderByType_EncryptionProfilePaging_OrderByType_INT_MAX_SENTINEL_DO_NOT_USE_ =
      std::numeric_limits<::int32_t>::max(),
};

bool EncryptionProfilePaging_OrderByType_IsValid(int value);
constexpr EncryptionProfilePaging_OrderByType EncryptionProfilePaging_OrderByType_OrderByType_MIN = static_cast<EncryptionProfilePaging_OrderByType>(0);
constexpr EncryptionProfilePaging_OrderByType EncryptionProfilePaging_OrderByType_OrderByType_MAX = static_cast<EncryptionProfilePaging_OrderByType>(4);
constexpr int EncryptionProfilePaging_OrderByType_OrderByType_ARRAYSIZE = 4 + 1;
const std::string& EncryptionProfilePaging_OrderByType_Name(EncryptionProfilePaging_OrderByType value);
template <typename T>
const std::string& EncryptionProfilePaging_OrderByType_Name(T value) {
  static_assert(std::is_same<T, EncryptionProfilePaging_OrderByType>::value ||
                    std::is_integral<T>::value,
                "Incorrect type passed to OrderByType_Name().");
  return EncryptionProfilePaging_OrderByType_Name(static_cast<EncryptionProfilePaging_OrderByType>(value));
}
const std::string& EncryptionProfilePaging_OrderByType_Name(EncryptionProfilePaging_OrderByType value);
bool EncryptionProfilePaging_OrderByType_Parse(absl::string_view name, EncryptionProfilePaging_OrderByType* value);
enum EncryptionProfilePaging_DirectionType : int {
  EncryptionProfilePaging_DirectionType_DIRECTION_TYPE_UNKNOWN = 0,
  EncryptionProfilePaging_DirectionType_DESC = 1,
  EncryptionProfilePaging_DirectionType_ASC = 2,
  EncryptionProfilePaging_DirectionType_EncryptionProfilePaging_DirectionType_INT_MIN_SENTINEL_DO_NOT_USE_ =
      std::numeric_limits<::int32_t>::min(),
  EncryptionProfilePaging_DirectionType_EncryptionProfilePaging_DirectionType_INT_MAX_SENTINEL_DO_NOT_USE_ =
      std::numeric_limits<::int32_t>::max(),
};

bool EncryptionProfilePaging_DirectionType_IsValid(int value);
constexpr EncryptionProfilePaging_DirectionType EncryptionProfilePaging_DirectionType_DirectionType_MIN = static_cast<EncryptionProfilePaging_DirectionType>(0);
constexpr EncryptionProfilePaging_DirectionType EncryptionProfilePaging_DirectionType_DirectionType_MAX = static_cast<EncryptionProfilePaging_DirectionType>(2);
constexpr int EncryptionProfilePaging_DirectionType_DirectionType_ARRAYSIZE = 2 + 1;
const std::string& EncryptionProfilePaging_DirectionType_Name(EncryptionProfilePaging_DirectionType value);
template <typename T>
const std::string& EncryptionProfilePaging_DirectionType_Name(T value) {
  static_assert(std::is_same<T, EncryptionProfilePaging_DirectionType>::value ||
                    std::is_integral<T>::value,
                "Incorrect type passed to DirectionType_Name().");
  return EncryptionProfilePaging_DirectionType_Name(static_cast<EncryptionProfilePaging_DirectionType>(value));
}
const std::string& EncryptionProfilePaging_DirectionType_Name(EncryptionProfilePaging_DirectionType value);
bool EncryptionProfilePaging_DirectionType_Parse(absl::string_view name, EncryptionProfilePaging_DirectionType* value);

// ===================================================================


// -------------------------------------------------------------------

class EncryptionProfile_SavingError_Conflict final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.Conflict) */ {
 public:
  inline EncryptionProfile_SavingError_Conflict() : EncryptionProfile_SavingError_Conflict(nullptr) {}
  ~EncryptionProfile_SavingError_Conflict() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR EncryptionProfile_SavingError_Conflict(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  EncryptionProfile_SavingError_Conflict(const EncryptionProfile_SavingError_Conflict& from);
  EncryptionProfile_SavingError_Conflict(EncryptionProfile_SavingError_Conflict&& from) noexcept
    : EncryptionProfile_SavingError_Conflict() {
    *this = ::std::move(from);
  }

  inline EncryptionProfile_SavingError_Conflict& operator=(const EncryptionProfile_SavingError_Conflict& from) {
    CopyFrom(from);
    return *this;
  }
  inline EncryptionProfile_SavingError_Conflict& operator=(EncryptionProfile_SavingError_Conflict&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const EncryptionProfile_SavingError_Conflict& default_instance() {
    return *internal_default_instance();
  }
  static inline const EncryptionProfile_SavingError_Conflict* internal_default_instance() {
    return reinterpret_cast<const EncryptionProfile_SavingError_Conflict*>(
               &_EncryptionProfile_SavingError_Conflict_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    0;

  friend void swap(EncryptionProfile_SavingError_Conflict& a, EncryptionProfile_SavingError_Conflict& b) {
    a.Swap(&b);
  }
  inline void Swap(EncryptionProfile_SavingError_Conflict* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(EncryptionProfile_SavingError_Conflict* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  EncryptionProfile_SavingError_Conflict* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<EncryptionProfile_SavingError_Conflict>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const EncryptionProfile_SavingError_Conflict& from);
  void MergeFrom(const EncryptionProfile_SavingError_Conflict& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(EncryptionProfile_SavingError_Conflict* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.EncryptionProfile.SavingError.Conflict";
  }
  protected:
  explicit EncryptionProfile_SavingError_Conflict(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.Conflict)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class EncryptionProfile_SavingError_RangeIsTooSmall final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.RangeIsTooSmall) */ {
 public:
  inline EncryptionProfile_SavingError_RangeIsTooSmall() : EncryptionProfile_SavingError_RangeIsTooSmall(nullptr) {}
  ~EncryptionProfile_SavingError_RangeIsTooSmall() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR EncryptionProfile_SavingError_RangeIsTooSmall(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  EncryptionProfile_SavingError_RangeIsTooSmall(const EncryptionProfile_SavingError_RangeIsTooSmall& from);
  EncryptionProfile_SavingError_RangeIsTooSmall(EncryptionProfile_SavingError_RangeIsTooSmall&& from) noexcept
    : EncryptionProfile_SavingError_RangeIsTooSmall() {
    *this = ::std::move(from);
  }

  inline EncryptionProfile_SavingError_RangeIsTooSmall& operator=(const EncryptionProfile_SavingError_RangeIsTooSmall& from) {
    CopyFrom(from);
    return *this;
  }
  inline EncryptionProfile_SavingError_RangeIsTooSmall& operator=(EncryptionProfile_SavingError_RangeIsTooSmall&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const EncryptionProfile_SavingError_RangeIsTooSmall& default_instance() {
    return *internal_default_instance();
  }
  static inline const EncryptionProfile_SavingError_RangeIsTooSmall* internal_default_instance() {
    return reinterpret_cast<const EncryptionProfile_SavingError_RangeIsTooSmall*>(
               &_EncryptionProfile_SavingError_RangeIsTooSmall_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    1;

  friend void swap(EncryptionProfile_SavingError_RangeIsTooSmall& a, EncryptionProfile_SavingError_RangeIsTooSmall& b) {
    a.Swap(&b);
  }
  inline void Swap(EncryptionProfile_SavingError_RangeIsTooSmall* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(EncryptionProfile_SavingError_RangeIsTooSmall* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  EncryptionProfile_SavingError_RangeIsTooSmall* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<EncryptionProfile_SavingError_RangeIsTooSmall>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const EncryptionProfile_SavingError_RangeIsTooSmall& from);
  void MergeFrom(const EncryptionProfile_SavingError_RangeIsTooSmall& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(EncryptionProfile_SavingError_RangeIsTooSmall* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.EncryptionProfile.SavingError.RangeIsTooSmall";
  }
  protected:
  explicit EncryptionProfile_SavingError_RangeIsTooSmall(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.RangeIsTooSmall)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class EncryptionProfile_SavingError final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.EncryptionProfile.SavingError) */ {
 public:
  inline EncryptionProfile_SavingError() : EncryptionProfile_SavingError(nullptr) {}
  ~EncryptionProfile_SavingError() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR EncryptionProfile_SavingError(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  EncryptionProfile_SavingError(const EncryptionProfile_SavingError& from);
  EncryptionProfile_SavingError(EncryptionProfile_SavingError&& from) noexcept
    : EncryptionProfile_SavingError() {
    *this = ::std::move(from);
  }

  inline EncryptionProfile_SavingError& operator=(const EncryptionProfile_SavingError& from) {
    CopyFrom(from);
    return *this;
  }
  inline EncryptionProfile_SavingError& operator=(EncryptionProfile_SavingError&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const EncryptionProfile_SavingError& default_instance() {
    return *internal_default_instance();
  }
  enum ReasonCase {
    kConflict = 1,
    kRangeIsTooSmall = 2,
    REASON_NOT_SET = 0,
  };

  static inline const EncryptionProfile_SavingError* internal_default_instance() {
    return reinterpret_cast<const EncryptionProfile_SavingError*>(
               &_EncryptionProfile_SavingError_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    2;

  friend void swap(EncryptionProfile_SavingError& a, EncryptionProfile_SavingError& b) {
    a.Swap(&b);
  }
  inline void Swap(EncryptionProfile_SavingError* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(EncryptionProfile_SavingError* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  EncryptionProfile_SavingError* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<EncryptionProfile_SavingError>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const EncryptionProfile_SavingError& from);
  void MergeFrom(const EncryptionProfile_SavingError& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(EncryptionProfile_SavingError* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.EncryptionProfile.SavingError";
  }
  protected:
  explicit EncryptionProfile_SavingError(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef EncryptionProfile_SavingError_Conflict Conflict;
  typedef EncryptionProfile_SavingError_RangeIsTooSmall RangeIsTooSmall;

  // accessors -------------------------------------------------------

  enum : int {
    kConflictFieldNumber = 1,
    kRangeIsTooSmallFieldNumber = 2,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfile.SavingError.Conflict conflict = 1;
  bool has_conflict() const;
  private:
  bool _internal_has_conflict() const;

  public:
  void clear_conflict() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict& conflict() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* release_conflict();
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* mutable_conflict();
  void set_allocated_conflict(::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* conflict);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict& _internal_conflict() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* _internal_mutable_conflict();
  public:
  void unsafe_arena_set_allocated_conflict(
      ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* conflict);
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* unsafe_arena_release_conflict();
  // .keyapis.encryption_profile.v1.EncryptionProfile.SavingError.RangeIsTooSmall range_is_too_small = 2;
  bool has_range_is_too_small() const;
  private:
  bool _internal_has_range_is_too_small() const;

  public:
  void clear_range_is_too_small() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall& range_is_too_small() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* release_range_is_too_small();
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* mutable_range_is_too_small();
  void set_allocated_range_is_too_small(::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* range_is_too_small);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall& _internal_range_is_too_small() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* _internal_mutable_range_is_too_small();
  public:
  void unsafe_arena_set_allocated_range_is_too_small(
      ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* range_is_too_small);
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* unsafe_arena_release_range_is_too_small();
  void clear_reason();
  ReasonCase reason_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.EncryptionProfile.SavingError)
 private:
  class _Internal;
  void set_has_conflict();
  void set_has_range_is_too_small();

  inline bool has_reason() const;
  inline void clear_has_reason();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union ReasonUnion {
      constexpr ReasonUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* conflict_;
      ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* range_is_too_small_;
    } reason_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class EncryptionProfile final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.EncryptionProfile) */ {
 public:
  inline EncryptionProfile() : EncryptionProfile(nullptr) {}
  ~EncryptionProfile() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR EncryptionProfile(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  EncryptionProfile(const EncryptionProfile& from);
  EncryptionProfile(EncryptionProfile&& from) noexcept
    : EncryptionProfile() {
    *this = ::std::move(from);
  }

  inline EncryptionProfile& operator=(const EncryptionProfile& from) {
    CopyFrom(from);
    return *this;
  }
  inline EncryptionProfile& operator=(EncryptionProfile&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const EncryptionProfile& default_instance() {
    return *internal_default_instance();
  }
  static inline const EncryptionProfile* internal_default_instance() {
    return reinterpret_cast<const EncryptionProfile*>(
               &_EncryptionProfile_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    3;

  friend void swap(EncryptionProfile& a, EncryptionProfile& b) {
    a.Swap(&b);
  }
  inline void Swap(EncryptionProfile* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(EncryptionProfile* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  EncryptionProfile* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<EncryptionProfile>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const EncryptionProfile& from);
  void MergeFrom(const EncryptionProfile& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(EncryptionProfile* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.EncryptionProfile";
  }
  protected:
  explicit EncryptionProfile(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef EncryptionProfile_SavingError SavingError;

  using Type = EncryptionProfile_Type;
  static constexpr Type TYPE_UNKNOWN = EncryptionProfile_Type_TYPE_UNKNOWN;
  static constexpr Type SL3 = EncryptionProfile_Type_SL3;
  static inline bool Type_IsValid(int value) {
    return EncryptionProfile_Type_IsValid(value);
  }
  static constexpr Type Type_MIN = EncryptionProfile_Type_Type_MIN;
  static constexpr Type Type_MAX = EncryptionProfile_Type_Type_MAX;
  static constexpr int Type_ARRAYSIZE = EncryptionProfile_Type_Type_ARRAYSIZE;
  template <typename T>
  static inline const std::string& Type_Name(T value) {
    return EncryptionProfile_Type_Name(value);
  }
  static inline bool Type_Parse(absl::string_view name, Type* value) {
    return EncryptionProfile_Type_Parse(name, value);
  }

  // accessors -------------------------------------------------------

  enum : int {
    kIdFieldNumber = 1,
    kNameFieldNumber = 2,
    kSecretAFieldNumber = 9,
    kEncryptedSecretAFieldNumber = 10,
    kSecretBFieldNumber = 11,
    kEncryptedSecretBFieldNumber = 12,
    kDescriptionFieldNumber = 3,
    kCreatedAtFieldNumber = 13,
    kChangedAtFieldNumber = 14,
    kDeletedAtFieldNumber = 15,
    kTypeFieldNumber = 4,
    kSectorNumberFieldNumber = 5,
    kBlockNumberFieldNumber = 6,
    kStartIndexFieldNumber = 7,
    kEndIndexFieldNumber = 8,
  };
  // string id = 1;
  void clear_id() ;
  const std::string& id() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_id(Arg_&& arg, Args_... args);
  std::string* mutable_id();
  PROTOBUF_NODISCARD std::string* release_id();
  void set_allocated_id(std::string* ptr);

  private:
  const std::string& _internal_id() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_id(
      const std::string& value);
  std::string* _internal_mutable_id();

  public:
  // string name = 2 [(.google.api.field_behavior) = REQUIRED];
  void clear_name() ;
  const std::string& name() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_name(Arg_&& arg, Args_... args);
  std::string* mutable_name();
  PROTOBUF_NODISCARD std::string* release_name();
  void set_allocated_name(std::string* ptr);

  private:
  const std::string& _internal_name() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_name(
      const std::string& value);
  std::string* _internal_mutable_name();

  public:
  // string secret_a = 9 [(.google.api.field_behavior) = INPUT_ONLY];
  void clear_secret_a() ;
  const std::string& secret_a() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_secret_a(Arg_&& arg, Args_... args);
  std::string* mutable_secret_a();
  PROTOBUF_NODISCARD std::string* release_secret_a();
  void set_allocated_secret_a(std::string* ptr);

  private:
  const std::string& _internal_secret_a() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_secret_a(
      const std::string& value);
  std::string* _internal_mutable_secret_a();

  public:
  // string encrypted_secret_a = 10 [(.google.api.field_behavior) = OUTPUT_ONLY];
  void clear_encrypted_secret_a() ;
  const std::string& encrypted_secret_a() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_encrypted_secret_a(Arg_&& arg, Args_... args);
  std::string* mutable_encrypted_secret_a();
  PROTOBUF_NODISCARD std::string* release_encrypted_secret_a();
  void set_allocated_encrypted_secret_a(std::string* ptr);

  private:
  const std::string& _internal_encrypted_secret_a() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_encrypted_secret_a(
      const std::string& value);
  std::string* _internal_mutable_encrypted_secret_a();

  public:
  // string secret_b = 11 [(.google.api.field_behavior) = INPUT_ONLY];
  void clear_secret_b() ;
  const std::string& secret_b() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_secret_b(Arg_&& arg, Args_... args);
  std::string* mutable_secret_b();
  PROTOBUF_NODISCARD std::string* release_secret_b();
  void set_allocated_secret_b(std::string* ptr);

  private:
  const std::string& _internal_secret_b() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_secret_b(
      const std::string& value);
  std::string* _internal_mutable_secret_b();

  public:
  // string encrypted_secret_b = 12 [(.google.api.field_behavior) = OUTPUT_ONLY];
  void clear_encrypted_secret_b() ;
  const std::string& encrypted_secret_b() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_encrypted_secret_b(Arg_&& arg, Args_... args);
  std::string* mutable_encrypted_secret_b();
  PROTOBUF_NODISCARD std::string* release_encrypted_secret_b();
  void set_allocated_encrypted_secret_b(std::string* ptr);

  private:
  const std::string& _internal_encrypted_secret_b() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_encrypted_secret_b(
      const std::string& value);
  std::string* _internal_mutable_encrypted_secret_b();

  public:
  // .google.protobuf.StringValue description = 3;
  bool has_description() const;
  void clear_description() ;
  const ::PROTOBUF_NAMESPACE_ID::StringValue& description() const;
  PROTOBUF_NODISCARD ::PROTOBUF_NAMESPACE_ID::StringValue* release_description();
  ::PROTOBUF_NAMESPACE_ID::StringValue* mutable_description();
  void set_allocated_description(::PROTOBUF_NAMESPACE_ID::StringValue* description);
  private:
  const ::PROTOBUF_NAMESPACE_ID::StringValue& _internal_description() const;
  ::PROTOBUF_NAMESPACE_ID::StringValue* _internal_mutable_description();
  public:
  void unsafe_arena_set_allocated_description(
      ::PROTOBUF_NAMESPACE_ID::StringValue* description);
  ::PROTOBUF_NAMESPACE_ID::StringValue* unsafe_arena_release_description();
  // .google.protobuf.Timestamp created_at = 13 [(.google.api.field_behavior) = OUTPUT_ONLY];
  bool has_created_at() const;
  void clear_created_at() ;
  const ::PROTOBUF_NAMESPACE_ID::Timestamp& created_at() const;
  PROTOBUF_NODISCARD ::PROTOBUF_NAMESPACE_ID::Timestamp* release_created_at();
  ::PROTOBUF_NAMESPACE_ID::Timestamp* mutable_created_at();
  void set_allocated_created_at(::PROTOBUF_NAMESPACE_ID::Timestamp* created_at);
  private:
  const ::PROTOBUF_NAMESPACE_ID::Timestamp& _internal_created_at() const;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* _internal_mutable_created_at();
  public:
  void unsafe_arena_set_allocated_created_at(
      ::PROTOBUF_NAMESPACE_ID::Timestamp* created_at);
  ::PROTOBUF_NAMESPACE_ID::Timestamp* unsafe_arena_release_created_at();
  // .google.protobuf.Timestamp changed_at = 14;
  bool has_changed_at() const;
  void clear_changed_at() ;
  const ::PROTOBUF_NAMESPACE_ID::Timestamp& changed_at() const;
  PROTOBUF_NODISCARD ::PROTOBUF_NAMESPACE_ID::Timestamp* release_changed_at();
  ::PROTOBUF_NAMESPACE_ID::Timestamp* mutable_changed_at();
  void set_allocated_changed_at(::PROTOBUF_NAMESPACE_ID::Timestamp* changed_at);
  private:
  const ::PROTOBUF_NAMESPACE_ID::Timestamp& _internal_changed_at() const;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* _internal_mutable_changed_at();
  public:
  void unsafe_arena_set_allocated_changed_at(
      ::PROTOBUF_NAMESPACE_ID::Timestamp* changed_at);
  ::PROTOBUF_NAMESPACE_ID::Timestamp* unsafe_arena_release_changed_at();
  // .google.protobuf.Timestamp deleted_at = 15 [(.google.api.field_behavior) = OUTPUT_ONLY];
  bool has_deleted_at() const;
  void clear_deleted_at() ;
  const ::PROTOBUF_NAMESPACE_ID::Timestamp& deleted_at() const;
  PROTOBUF_NODISCARD ::PROTOBUF_NAMESPACE_ID::Timestamp* release_deleted_at();
  ::PROTOBUF_NAMESPACE_ID::Timestamp* mutable_deleted_at();
  void set_allocated_deleted_at(::PROTOBUF_NAMESPACE_ID::Timestamp* deleted_at);
  private:
  const ::PROTOBUF_NAMESPACE_ID::Timestamp& _internal_deleted_at() const;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* _internal_mutable_deleted_at();
  public:
  void unsafe_arena_set_allocated_deleted_at(
      ::PROTOBUF_NAMESPACE_ID::Timestamp* deleted_at);
  ::PROTOBUF_NAMESPACE_ID::Timestamp* unsafe_arena_release_deleted_at();
  // .keyapis.encryption_profile.v1.EncryptionProfile.Type type = 4 [(.google.api.field_behavior) = REQUIRED];
  void clear_type() ;
  ::keyapis::encryption_profile::v1::EncryptionProfile_Type type() const;
  void set_type(::keyapis::encryption_profile::v1::EncryptionProfile_Type value);

  private:
  ::keyapis::encryption_profile::v1::EncryptionProfile_Type _internal_type() const;
  void _internal_set_type(::keyapis::encryption_profile::v1::EncryptionProfile_Type value);

  public:
  // int32 sector_number = 5;
  void clear_sector_number() ;
  ::int32_t sector_number() const;
  void set_sector_number(::int32_t value);

  private:
  ::int32_t _internal_sector_number() const;
  void _internal_set_sector_number(::int32_t value);

  public:
  // int32 block_number = 6;
  void clear_block_number() ;
  ::int32_t block_number() const;
  void set_block_number(::int32_t value);

  private:
  ::int32_t _internal_block_number() const;
  void _internal_set_block_number(::int32_t value);

  public:
  // int32 start_index = 7;
  void clear_start_index() ;
  ::int32_t start_index() const;
  void set_start_index(::int32_t value);

  private:
  ::int32_t _internal_start_index() const;
  void _internal_set_start_index(::int32_t value);

  public:
  // int32 end_index = 8;
  void clear_end_index() ;
  ::int32_t end_index() const;
  void set_end_index(::int32_t value);

  private:
  ::int32_t _internal_end_index() const;
  void _internal_set_end_index(::int32_t value);

  public:
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.EncryptionProfile)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::HasBits<1> _has_bits_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr id_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr name_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr secret_a_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr encrypted_secret_a_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr secret_b_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr encrypted_secret_b_;
    ::PROTOBUF_NAMESPACE_ID::StringValue* description_;
    ::PROTOBUF_NAMESPACE_ID::Timestamp* created_at_;
    ::PROTOBUF_NAMESPACE_ID::Timestamp* changed_at_;
    ::PROTOBUF_NAMESPACE_ID::Timestamp* deleted_at_;
    int type_;
    ::int32_t sector_number_;
    ::int32_t block_number_;
    ::int32_t start_index_;
    ::int32_t end_index_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class EncryptionProfileFilter final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.EncryptionProfileFilter) */ {
 public:
  inline EncryptionProfileFilter() : EncryptionProfileFilter(nullptr) {}
  ~EncryptionProfileFilter() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR EncryptionProfileFilter(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  EncryptionProfileFilter(const EncryptionProfileFilter& from);
  EncryptionProfileFilter(EncryptionProfileFilter&& from) noexcept
    : EncryptionProfileFilter() {
    *this = ::std::move(from);
  }

  inline EncryptionProfileFilter& operator=(const EncryptionProfileFilter& from) {
    CopyFrom(from);
    return *this;
  }
  inline EncryptionProfileFilter& operator=(EncryptionProfileFilter&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const EncryptionProfileFilter& default_instance() {
    return *internal_default_instance();
  }
  static inline const EncryptionProfileFilter* internal_default_instance() {
    return reinterpret_cast<const EncryptionProfileFilter*>(
               &_EncryptionProfileFilter_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    4;

  friend void swap(EncryptionProfileFilter& a, EncryptionProfileFilter& b) {
    a.Swap(&b);
  }
  inline void Swap(EncryptionProfileFilter* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(EncryptionProfileFilter* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  EncryptionProfileFilter* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<EncryptionProfileFilter>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const EncryptionProfileFilter& from);
  void MergeFrom(const EncryptionProfileFilter& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(EncryptionProfileFilter* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.EncryptionProfileFilter";
  }
  protected:
  explicit EncryptionProfileFilter(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kTypesFieldNumber = 2,
    kTextFieldNumber = 1,
    kShowDeletedFieldNumber = 3,
  };
  // repeated .keyapis.encryption_profile.v1.EncryptionProfile.Type types = 2;
  int types_size() const;
  private:
  int _internal_types_size() const;

  public:
  void clear_types() ;
  public:
  ::keyapis::encryption_profile::v1::EncryptionProfile_Type types(int index) const;
  void set_types(int index, ::keyapis::encryption_profile::v1::EncryptionProfile_Type value);
  void add_types(::keyapis::encryption_profile::v1::EncryptionProfile_Type value);
  const ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>& types() const;
  ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>* mutable_types();

  private:
  ::keyapis::encryption_profile::v1::EncryptionProfile_Type _internal_types(int index) const;
  void _internal_add_types(::keyapis::encryption_profile::v1::EncryptionProfile_Type value);
  const ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>& _internal_types() const;
  ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>* _internal_mutable_types();

  public:
  // string text = 1;
  void clear_text() ;
  const std::string& text() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_text(Arg_&& arg, Args_... args);
  std::string* mutable_text();
  PROTOBUF_NODISCARD std::string* release_text();
  void set_allocated_text(std::string* ptr);

  private:
  const std::string& _internal_text() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_text(
      const std::string& value);
  std::string* _internal_mutable_text();

  public:
  // .google.protobuf.BoolValue show_deleted = 3;
  bool has_show_deleted() const;
  void clear_show_deleted() ;
  const ::PROTOBUF_NAMESPACE_ID::BoolValue& show_deleted() const;
  PROTOBUF_NODISCARD ::PROTOBUF_NAMESPACE_ID::BoolValue* release_show_deleted();
  ::PROTOBUF_NAMESPACE_ID::BoolValue* mutable_show_deleted();
  void set_allocated_show_deleted(::PROTOBUF_NAMESPACE_ID::BoolValue* show_deleted);
  private:
  const ::PROTOBUF_NAMESPACE_ID::BoolValue& _internal_show_deleted() const;
  ::PROTOBUF_NAMESPACE_ID::BoolValue* _internal_mutable_show_deleted();
  public:
  void unsafe_arena_set_allocated_show_deleted(
      ::PROTOBUF_NAMESPACE_ID::BoolValue* show_deleted);
  ::PROTOBUF_NAMESPACE_ID::BoolValue* unsafe_arena_release_show_deleted();
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.EncryptionProfileFilter)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::HasBits<1> _has_bits_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::PROTOBUF_NAMESPACE_ID::RepeatedField<int> types_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _types_cached_byte_size_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr text_;
    ::PROTOBUF_NAMESPACE_ID::BoolValue* show_deleted_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class EncryptionProfilePaging final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.EncryptionProfilePaging) */ {
 public:
  inline EncryptionProfilePaging() : EncryptionProfilePaging(nullptr) {}
  ~EncryptionProfilePaging() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR EncryptionProfilePaging(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  EncryptionProfilePaging(const EncryptionProfilePaging& from);
  EncryptionProfilePaging(EncryptionProfilePaging&& from) noexcept
    : EncryptionProfilePaging() {
    *this = ::std::move(from);
  }

  inline EncryptionProfilePaging& operator=(const EncryptionProfilePaging& from) {
    CopyFrom(from);
    return *this;
  }
  inline EncryptionProfilePaging& operator=(EncryptionProfilePaging&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const EncryptionProfilePaging& default_instance() {
    return *internal_default_instance();
  }
  static inline const EncryptionProfilePaging* internal_default_instance() {
    return reinterpret_cast<const EncryptionProfilePaging*>(
               &_EncryptionProfilePaging_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    5;

  friend void swap(EncryptionProfilePaging& a, EncryptionProfilePaging& b) {
    a.Swap(&b);
  }
  inline void Swap(EncryptionProfilePaging* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(EncryptionProfilePaging* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  EncryptionProfilePaging* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<EncryptionProfilePaging>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const EncryptionProfilePaging& from);
  void MergeFrom(const EncryptionProfilePaging& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(EncryptionProfilePaging* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.EncryptionProfilePaging";
  }
  protected:
  explicit EncryptionProfilePaging(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  using OrderByType = EncryptionProfilePaging_OrderByType;
  static constexpr OrderByType ORDER_BY_TYPE_UNKNOWN = EncryptionProfilePaging_OrderByType_ORDER_BY_TYPE_UNKNOWN;
  static constexpr OrderByType ID = EncryptionProfilePaging_OrderByType_ID;
  static constexpr OrderByType CHANGED_AT = EncryptionProfilePaging_OrderByType_CHANGED_AT;
  static constexpr OrderByType CREATED_AT = EncryptionProfilePaging_OrderByType_CREATED_AT;
  static constexpr OrderByType RANK = EncryptionProfilePaging_OrderByType_RANK;
  static inline bool OrderByType_IsValid(int value) {
    return EncryptionProfilePaging_OrderByType_IsValid(value);
  }
  static constexpr OrderByType OrderByType_MIN = EncryptionProfilePaging_OrderByType_OrderByType_MIN;
  static constexpr OrderByType OrderByType_MAX = EncryptionProfilePaging_OrderByType_OrderByType_MAX;
  static constexpr int OrderByType_ARRAYSIZE = EncryptionProfilePaging_OrderByType_OrderByType_ARRAYSIZE;
  template <typename T>
  static inline const std::string& OrderByType_Name(T value) {
    return EncryptionProfilePaging_OrderByType_Name(value);
  }
  static inline bool OrderByType_Parse(absl::string_view name, OrderByType* value) {
    return EncryptionProfilePaging_OrderByType_Parse(name, value);
  }

  using DirectionType = EncryptionProfilePaging_DirectionType;
  static constexpr DirectionType DIRECTION_TYPE_UNKNOWN = EncryptionProfilePaging_DirectionType_DIRECTION_TYPE_UNKNOWN;
  static constexpr DirectionType DESC = EncryptionProfilePaging_DirectionType_DESC;
  static constexpr DirectionType ASC = EncryptionProfilePaging_DirectionType_ASC;
  static inline bool DirectionType_IsValid(int value) {
    return EncryptionProfilePaging_DirectionType_IsValid(value);
  }
  static constexpr DirectionType DirectionType_MIN = EncryptionProfilePaging_DirectionType_DirectionType_MIN;
  static constexpr DirectionType DirectionType_MAX = EncryptionProfilePaging_DirectionType_DirectionType_MAX;
  static constexpr int DirectionType_ARRAYSIZE = EncryptionProfilePaging_DirectionType_DirectionType_ARRAYSIZE;
  template <typename T>
  static inline const std::string& DirectionType_Name(T value) {
    return EncryptionProfilePaging_DirectionType_Name(value);
  }
  static inline bool DirectionType_Parse(absl::string_view name, DirectionType* value) {
    return EncryptionProfilePaging_DirectionType_Parse(name, value);
  }

  // accessors -------------------------------------------------------

  enum : int {
    kOrderByTypeFieldNumber = 1,
    kDirectionTypeFieldNumber = 2,
    kLimitFieldNumber = 3,
    kOffsetFieldNumber = 4,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfilePaging.OrderByType order_by_type = 1;
  void clear_order_by_type() ;
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType order_by_type() const;
  void set_order_by_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType value);

  private:
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType _internal_order_by_type() const;
  void _internal_set_order_by_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType value);

  public:
  // .keyapis.encryption_profile.v1.EncryptionProfilePaging.DirectionType direction_type = 2;
  void clear_direction_type() ;
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType direction_type() const;
  void set_direction_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType value);

  private:
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType _internal_direction_type() const;
  void _internal_set_direction_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType value);

  public:
  // int32 limit = 3;
  void clear_limit() ;
  ::int32_t limit() const;
  void set_limit(::int32_t value);

  private:
  ::int32_t _internal_limit() const;
  void _internal_set_limit(::int32_t value);

  public:
  // int32 offset = 4;
  void clear_offset() ;
  ::int32_t offset() const;
  void set_offset(::int32_t value);

  private:
  ::int32_t _internal_offset() const;
  void _internal_set_offset(::int32_t value);

  public:
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.EncryptionProfilePaging)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    int order_by_type_;
    int direction_type_;
    ::int32_t limit_;
    ::int32_t offset_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class PostEncryptionProfileRequest final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.PostEncryptionProfileRequest) */ {
 public:
  inline PostEncryptionProfileRequest() : PostEncryptionProfileRequest(nullptr) {}
  ~PostEncryptionProfileRequest() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR PostEncryptionProfileRequest(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  PostEncryptionProfileRequest(const PostEncryptionProfileRequest& from);
  PostEncryptionProfileRequest(PostEncryptionProfileRequest&& from) noexcept
    : PostEncryptionProfileRequest() {
    *this = ::std::move(from);
  }

  inline PostEncryptionProfileRequest& operator=(const PostEncryptionProfileRequest& from) {
    CopyFrom(from);
    return *this;
  }
  inline PostEncryptionProfileRequest& operator=(PostEncryptionProfileRequest&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const PostEncryptionProfileRequest& default_instance() {
    return *internal_default_instance();
  }
  static inline const PostEncryptionProfileRequest* internal_default_instance() {
    return reinterpret_cast<const PostEncryptionProfileRequest*>(
               &_PostEncryptionProfileRequest_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    6;

  friend void swap(PostEncryptionProfileRequest& a, PostEncryptionProfileRequest& b) {
    a.Swap(&b);
  }
  inline void Swap(PostEncryptionProfileRequest* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(PostEncryptionProfileRequest* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  PostEncryptionProfileRequest* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<PostEncryptionProfileRequest>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const PostEncryptionProfileRequest& from);
  void MergeFrom(const PostEncryptionProfileRequest& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(PostEncryptionProfileRequest* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.PostEncryptionProfileRequest";
  }
  protected:
  explicit PostEncryptionProfileRequest(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kDataFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfile data = 1 [(.google.api.field_behavior) = REQUIRED];
  bool has_data() const;
  void clear_data() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile& data() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile* release_data();
  ::keyapis::encryption_profile::v1::EncryptionProfile* mutable_data();
  void set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile& _internal_data() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile* _internal_mutable_data();
  public:
  void unsafe_arena_set_allocated_data(
      ::keyapis::encryption_profile::v1::EncryptionProfile* data);
  ::keyapis::encryption_profile::v1::EncryptionProfile* unsafe_arena_release_data();
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.PostEncryptionProfileRequest)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::HasBits<1> _has_bits_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::keyapis::encryption_profile::v1::EncryptionProfile* data_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class PostEncryptionProfileResponse_Error final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error) */ {
 public:
  inline PostEncryptionProfileResponse_Error() : PostEncryptionProfileResponse_Error(nullptr) {}
  ~PostEncryptionProfileResponse_Error() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR PostEncryptionProfileResponse_Error(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  PostEncryptionProfileResponse_Error(const PostEncryptionProfileResponse_Error& from);
  PostEncryptionProfileResponse_Error(PostEncryptionProfileResponse_Error&& from) noexcept
    : PostEncryptionProfileResponse_Error() {
    *this = ::std::move(from);
  }

  inline PostEncryptionProfileResponse_Error& operator=(const PostEncryptionProfileResponse_Error& from) {
    CopyFrom(from);
    return *this;
  }
  inline PostEncryptionProfileResponse_Error& operator=(PostEncryptionProfileResponse_Error&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const PostEncryptionProfileResponse_Error& default_instance() {
    return *internal_default_instance();
  }
  enum ReasonCase {
    kValidation = 1,
    kSaving = 2,
    REASON_NOT_SET = 0,
  };

  static inline const PostEncryptionProfileResponse_Error* internal_default_instance() {
    return reinterpret_cast<const PostEncryptionProfileResponse_Error*>(
               &_PostEncryptionProfileResponse_Error_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    7;

  friend void swap(PostEncryptionProfileResponse_Error& a, PostEncryptionProfileResponse_Error& b) {
    a.Swap(&b);
  }
  inline void Swap(PostEncryptionProfileResponse_Error* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(PostEncryptionProfileResponse_Error* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  PostEncryptionProfileResponse_Error* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<PostEncryptionProfileResponse_Error>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const PostEncryptionProfileResponse_Error& from);
  void MergeFrom(const PostEncryptionProfileResponse_Error& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(PostEncryptionProfileResponse_Error* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error";
  }
  protected:
  explicit PostEncryptionProfileResponse_Error(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kValidationFieldNumber = 1,
    kSavingFieldNumber = 2,
  };
  // .keyapis.encryption_profile.v1.ValidationError validation = 1;
  bool has_validation() const;
  private:
  bool _internal_has_validation() const;

  public:
  void clear_validation() ;
  const ::keyapis::encryption_profile::v1::ValidationError& validation() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::ValidationError* release_validation();
  ::keyapis::encryption_profile::v1::ValidationError* mutable_validation();
  void set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation);
  private:
  const ::keyapis::encryption_profile::v1::ValidationError& _internal_validation() const;
  ::keyapis::encryption_profile::v1::ValidationError* _internal_mutable_validation();
  public:
  void unsafe_arena_set_allocated_validation(
      ::keyapis::encryption_profile::v1::ValidationError* validation);
  ::keyapis::encryption_profile::v1::ValidationError* unsafe_arena_release_validation();
  // .keyapis.encryption_profile.v1.EncryptionProfile.SavingError saving = 2;
  bool has_saving() const;
  private:
  bool _internal_has_saving() const;

  public:
  void clear_saving() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError& saving() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* release_saving();
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* mutable_saving();
  void set_allocated_saving(::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* saving);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError& _internal_saving() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* _internal_mutable_saving();
  public:
  void unsafe_arena_set_allocated_saving(
      ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* saving);
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* unsafe_arena_release_saving();
  void clear_reason();
  ReasonCase reason_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error)
 private:
  class _Internal;
  void set_has_validation();
  void set_has_saving();

  inline bool has_reason() const;
  inline void clear_has_reason();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union ReasonUnion {
      constexpr ReasonUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::ValidationError* validation_;
      ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* saving_;
    } reason_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class PostEncryptionProfileResponse final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.PostEncryptionProfileResponse) */ {
 public:
  inline PostEncryptionProfileResponse() : PostEncryptionProfileResponse(nullptr) {}
  ~PostEncryptionProfileResponse() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR PostEncryptionProfileResponse(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  PostEncryptionProfileResponse(const PostEncryptionProfileResponse& from);
  PostEncryptionProfileResponse(PostEncryptionProfileResponse&& from) noexcept
    : PostEncryptionProfileResponse() {
    *this = ::std::move(from);
  }

  inline PostEncryptionProfileResponse& operator=(const PostEncryptionProfileResponse& from) {
    CopyFrom(from);
    return *this;
  }
  inline PostEncryptionProfileResponse& operator=(PostEncryptionProfileResponse&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const PostEncryptionProfileResponse& default_instance() {
    return *internal_default_instance();
  }
  enum TypeCase {
    kData = 1,
    kError = 2,
    TYPE_NOT_SET = 0,
  };

  static inline const PostEncryptionProfileResponse* internal_default_instance() {
    return reinterpret_cast<const PostEncryptionProfileResponse*>(
               &_PostEncryptionProfileResponse_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    8;

  friend void swap(PostEncryptionProfileResponse& a, PostEncryptionProfileResponse& b) {
    a.Swap(&b);
  }
  inline void Swap(PostEncryptionProfileResponse* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(PostEncryptionProfileResponse* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  PostEncryptionProfileResponse* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<PostEncryptionProfileResponse>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const PostEncryptionProfileResponse& from);
  void MergeFrom(const PostEncryptionProfileResponse& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(PostEncryptionProfileResponse* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.PostEncryptionProfileResponse";
  }
  protected:
  explicit PostEncryptionProfileResponse(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef PostEncryptionProfileResponse_Error Error;

  // accessors -------------------------------------------------------

  enum : int {
    kDataFieldNumber = 1,
    kErrorFieldNumber = 2,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfile data = 1;
  bool has_data() const;
  private:
  bool _internal_has_data() const;

  public:
  void clear_data() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile& data() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile* release_data();
  ::keyapis::encryption_profile::v1::EncryptionProfile* mutable_data();
  void set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile& _internal_data() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile* _internal_mutable_data();
  public:
  void unsafe_arena_set_allocated_data(
      ::keyapis::encryption_profile::v1::EncryptionProfile* data);
  ::keyapis::encryption_profile::v1::EncryptionProfile* unsafe_arena_release_data();
  // .keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error error = 2;
  bool has_error() const;
  private:
  bool _internal_has_error() const;

  public:
  void clear_error() ;
  const ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error& error() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* release_error();
  ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* mutable_error();
  void set_allocated_error(::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* error);
  private:
  const ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error& _internal_error() const;
  ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* _internal_mutable_error();
  public:
  void unsafe_arena_set_allocated_error(
      ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* error);
  ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* unsafe_arena_release_error();
  void clear_type();
  TypeCase type_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.PostEncryptionProfileResponse)
 private:
  class _Internal;
  void set_has_data();
  void set_has_error();

  inline bool has_type() const;
  inline void clear_has_type();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union TypeUnion {
      constexpr TypeUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::EncryptionProfile* data_;
      ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* error_;
    } type_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileListRequest final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest) */ {
 public:
  inline GetEncryptionProfileListRequest() : GetEncryptionProfileListRequest(nullptr) {}
  ~GetEncryptionProfileListRequest() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileListRequest(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileListRequest(const GetEncryptionProfileListRequest& from);
  GetEncryptionProfileListRequest(GetEncryptionProfileListRequest&& from) noexcept
    : GetEncryptionProfileListRequest() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileListRequest& operator=(const GetEncryptionProfileListRequest& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileListRequest& operator=(GetEncryptionProfileListRequest&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileListRequest& default_instance() {
    return *internal_default_instance();
  }
  enum PaginationCase {
    kPaging = 2,
    PAGINATION_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileListRequest* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileListRequest*>(
               &_GetEncryptionProfileListRequest_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    9;

  friend void swap(GetEncryptionProfileListRequest& a, GetEncryptionProfileListRequest& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileListRequest* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileListRequest* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileListRequest* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileListRequest>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileListRequest& from);
  void MergeFrom(const GetEncryptionProfileListRequest& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileListRequest* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileListRequest";
  }
  protected:
  explicit GetEncryptionProfileListRequest(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kFilterFieldNumber = 1,
    kPagingFieldNumber = 2,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfileFilter filter = 1;
  bool has_filter() const;
  void clear_filter() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& filter() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfileFilter* release_filter();
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* mutable_filter();
  void set_allocated_filter(::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& _internal_filter() const;
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* _internal_mutable_filter();
  public:
  void unsafe_arena_set_allocated_filter(
      ::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter);
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* unsafe_arena_release_filter();
  // .keyapis.encryption_profile.v1.EncryptionProfilePaging paging = 2;
  bool has_paging() const;
  private:
  bool _internal_has_paging() const;

  public:
  void clear_paging() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfilePaging& paging() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfilePaging* release_paging();
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging* mutable_paging();
  void set_allocated_paging(::keyapis::encryption_profile::v1::EncryptionProfilePaging* paging);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfilePaging& _internal_paging() const;
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging* _internal_mutable_paging();
  public:
  void unsafe_arena_set_allocated_paging(
      ::keyapis::encryption_profile::v1::EncryptionProfilePaging* paging);
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging* unsafe_arena_release_paging();
  void clear_pagination();
  PaginationCase pagination_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest)
 private:
  class _Internal;
  void set_has_paging();

  inline bool has_pagination() const;
  inline void clear_has_pagination();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::HasBits<1> _has_bits_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter_;
    union PaginationUnion {
      constexpr PaginationUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::EncryptionProfilePaging* paging_;
    } pagination_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileListResponse_Error final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error) */ {
 public:
  inline GetEncryptionProfileListResponse_Error() : GetEncryptionProfileListResponse_Error(nullptr) {}
  ~GetEncryptionProfileListResponse_Error() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileListResponse_Error(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileListResponse_Error(const GetEncryptionProfileListResponse_Error& from);
  GetEncryptionProfileListResponse_Error(GetEncryptionProfileListResponse_Error&& from) noexcept
    : GetEncryptionProfileListResponse_Error() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileListResponse_Error& operator=(const GetEncryptionProfileListResponse_Error& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileListResponse_Error& operator=(GetEncryptionProfileListResponse_Error&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileListResponse_Error& default_instance() {
    return *internal_default_instance();
  }
  enum ReasonCase {
    kValidation = 1,
    REASON_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileListResponse_Error* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileListResponse_Error*>(
               &_GetEncryptionProfileListResponse_Error_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    10;

  friend void swap(GetEncryptionProfileListResponse_Error& a, GetEncryptionProfileListResponse_Error& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileListResponse_Error* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileListResponse_Error* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileListResponse_Error* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileListResponse_Error>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileListResponse_Error& from);
  void MergeFrom(const GetEncryptionProfileListResponse_Error& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileListResponse_Error* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error";
  }
  protected:
  explicit GetEncryptionProfileListResponse_Error(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kValidationFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.ValidationError validation = 1;
  bool has_validation() const;
  private:
  bool _internal_has_validation() const;

  public:
  void clear_validation() ;
  const ::keyapis::encryption_profile::v1::ValidationError& validation() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::ValidationError* release_validation();
  ::keyapis::encryption_profile::v1::ValidationError* mutable_validation();
  void set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation);
  private:
  const ::keyapis::encryption_profile::v1::ValidationError& _internal_validation() const;
  ::keyapis::encryption_profile::v1::ValidationError* _internal_mutable_validation();
  public:
  void unsafe_arena_set_allocated_validation(
      ::keyapis::encryption_profile::v1::ValidationError* validation);
  ::keyapis::encryption_profile::v1::ValidationError* unsafe_arena_release_validation();
  void clear_reason();
  ReasonCase reason_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error)
 private:
  class _Internal;
  void set_has_validation();

  inline bool has_reason() const;
  inline void clear_has_reason();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union ReasonUnion {
      constexpr ReasonUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::ValidationError* validation_;
    } reason_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileListResponse final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse) */ {
 public:
  inline GetEncryptionProfileListResponse() : GetEncryptionProfileListResponse(nullptr) {}
  ~GetEncryptionProfileListResponse() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileListResponse(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileListResponse(const GetEncryptionProfileListResponse& from);
  GetEncryptionProfileListResponse(GetEncryptionProfileListResponse&& from) noexcept
    : GetEncryptionProfileListResponse() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileListResponse& operator=(const GetEncryptionProfileListResponse& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileListResponse& operator=(GetEncryptionProfileListResponse&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileListResponse& default_instance() {
    return *internal_default_instance();
  }
  enum TypeCase {
    kData = 1,
    kError = 2,
    TYPE_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileListResponse* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileListResponse*>(
               &_GetEncryptionProfileListResponse_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    11;

  friend void swap(GetEncryptionProfileListResponse& a, GetEncryptionProfileListResponse& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileListResponse* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileListResponse* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileListResponse* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileListResponse>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileListResponse& from);
  void MergeFrom(const GetEncryptionProfileListResponse& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileListResponse* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileListResponse";
  }
  protected:
  explicit GetEncryptionProfileListResponse(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef GetEncryptionProfileListResponse_Error Error;

  // accessors -------------------------------------------------------

  enum : int {
    kDataFieldNumber = 1,
    kErrorFieldNumber = 2,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfile data = 1;
  bool has_data() const;
  private:
  bool _internal_has_data() const;

  public:
  void clear_data() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile& data() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile* release_data();
  ::keyapis::encryption_profile::v1::EncryptionProfile* mutable_data();
  void set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile& _internal_data() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile* _internal_mutable_data();
  public:
  void unsafe_arena_set_allocated_data(
      ::keyapis::encryption_profile::v1::EncryptionProfile* data);
  ::keyapis::encryption_profile::v1::EncryptionProfile* unsafe_arena_release_data();
  // .keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error error = 2;
  bool has_error() const;
  private:
  bool _internal_has_error() const;

  public:
  void clear_error() ;
  const ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error& error() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* release_error();
  ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* mutable_error();
  void set_allocated_error(::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* error);
  private:
  const ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error& _internal_error() const;
  ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* _internal_mutable_error();
  public:
  void unsafe_arena_set_allocated_error(
      ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* error);
  ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* unsafe_arena_release_error();
  void clear_type();
  TypeCase type_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse)
 private:
  class _Internal;
  void set_has_data();
  void set_has_error();

  inline bool has_type() const;
  inline void clear_has_type();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union TypeUnion {
      constexpr TypeUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::EncryptionProfile* data_;
      ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* error_;
    } type_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileRequest final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileRequest) */ {
 public:
  inline GetEncryptionProfileRequest() : GetEncryptionProfileRequest(nullptr) {}
  ~GetEncryptionProfileRequest() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileRequest(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileRequest(const GetEncryptionProfileRequest& from);
  GetEncryptionProfileRequest(GetEncryptionProfileRequest&& from) noexcept
    : GetEncryptionProfileRequest() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileRequest& operator=(const GetEncryptionProfileRequest& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileRequest& operator=(GetEncryptionProfileRequest&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileRequest& default_instance() {
    return *internal_default_instance();
  }
  static inline const GetEncryptionProfileRequest* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileRequest*>(
               &_GetEncryptionProfileRequest_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    12;

  friend void swap(GetEncryptionProfileRequest& a, GetEncryptionProfileRequest& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileRequest* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileRequest* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileRequest* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileRequest>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileRequest& from);
  void MergeFrom(const GetEncryptionProfileRequest& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileRequest* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileRequest";
  }
  protected:
  explicit GetEncryptionProfileRequest(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kIdFieldNumber = 1,
  };
  // string id = 1 [(.google.api.field_behavior) = REQUIRED];
  void clear_id() ;
  const std::string& id() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_id(Arg_&& arg, Args_... args);
  std::string* mutable_id();
  PROTOBUF_NODISCARD std::string* release_id();
  void set_allocated_id(std::string* ptr);

  private:
  const std::string& _internal_id() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_id(
      const std::string& value);
  std::string* _internal_mutable_id();

  public:
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileRequest)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr id_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileResponse_Error final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error) */ {
 public:
  inline GetEncryptionProfileResponse_Error() : GetEncryptionProfileResponse_Error(nullptr) {}
  ~GetEncryptionProfileResponse_Error() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileResponse_Error(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileResponse_Error(const GetEncryptionProfileResponse_Error& from);
  GetEncryptionProfileResponse_Error(GetEncryptionProfileResponse_Error&& from) noexcept
    : GetEncryptionProfileResponse_Error() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileResponse_Error& operator=(const GetEncryptionProfileResponse_Error& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileResponse_Error& operator=(GetEncryptionProfileResponse_Error&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileResponse_Error& default_instance() {
    return *internal_default_instance();
  }
  enum ReasonCase {
    kValidation = 1,
    REASON_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileResponse_Error* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileResponse_Error*>(
               &_GetEncryptionProfileResponse_Error_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    13;

  friend void swap(GetEncryptionProfileResponse_Error& a, GetEncryptionProfileResponse_Error& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileResponse_Error* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileResponse_Error* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileResponse_Error* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileResponse_Error>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileResponse_Error& from);
  void MergeFrom(const GetEncryptionProfileResponse_Error& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileResponse_Error* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error";
  }
  protected:
  explicit GetEncryptionProfileResponse_Error(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kValidationFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.ValidationError validation = 1;
  bool has_validation() const;
  private:
  bool _internal_has_validation() const;

  public:
  void clear_validation() ;
  const ::keyapis::encryption_profile::v1::ValidationError& validation() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::ValidationError* release_validation();
  ::keyapis::encryption_profile::v1::ValidationError* mutable_validation();
  void set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation);
  private:
  const ::keyapis::encryption_profile::v1::ValidationError& _internal_validation() const;
  ::keyapis::encryption_profile::v1::ValidationError* _internal_mutable_validation();
  public:
  void unsafe_arena_set_allocated_validation(
      ::keyapis::encryption_profile::v1::ValidationError* validation);
  ::keyapis::encryption_profile::v1::ValidationError* unsafe_arena_release_validation();
  void clear_reason();
  ReasonCase reason_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error)
 private:
  class _Internal;
  void set_has_validation();

  inline bool has_reason() const;
  inline void clear_has_reason();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union ReasonUnion {
      constexpr ReasonUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::ValidationError* validation_;
    } reason_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileResponse final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileResponse) */ {
 public:
  inline GetEncryptionProfileResponse() : GetEncryptionProfileResponse(nullptr) {}
  ~GetEncryptionProfileResponse() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileResponse(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileResponse(const GetEncryptionProfileResponse& from);
  GetEncryptionProfileResponse(GetEncryptionProfileResponse&& from) noexcept
    : GetEncryptionProfileResponse() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileResponse& operator=(const GetEncryptionProfileResponse& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileResponse& operator=(GetEncryptionProfileResponse&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileResponse& default_instance() {
    return *internal_default_instance();
  }
  enum TypeCase {
    kData = 1,
    kError = 2,
    TYPE_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileResponse* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileResponse*>(
               &_GetEncryptionProfileResponse_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    14;

  friend void swap(GetEncryptionProfileResponse& a, GetEncryptionProfileResponse& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileResponse* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileResponse* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileResponse* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileResponse>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileResponse& from);
  void MergeFrom(const GetEncryptionProfileResponse& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileResponse* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileResponse";
  }
  protected:
  explicit GetEncryptionProfileResponse(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef GetEncryptionProfileResponse_Error Error;

  // accessors -------------------------------------------------------

  enum : int {
    kDataFieldNumber = 1,
    kErrorFieldNumber = 2,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfile data = 1;
  bool has_data() const;
  private:
  bool _internal_has_data() const;

  public:
  void clear_data() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfile& data() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfile* release_data();
  ::keyapis::encryption_profile::v1::EncryptionProfile* mutable_data();
  void set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfile& _internal_data() const;
  ::keyapis::encryption_profile::v1::EncryptionProfile* _internal_mutable_data();
  public:
  void unsafe_arena_set_allocated_data(
      ::keyapis::encryption_profile::v1::EncryptionProfile* data);
  ::keyapis::encryption_profile::v1::EncryptionProfile* unsafe_arena_release_data();
  // .keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error error = 2;
  bool has_error() const;
  private:
  bool _internal_has_error() const;

  public:
  void clear_error() ;
  const ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error& error() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* release_error();
  ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* mutable_error();
  void set_allocated_error(::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* error);
  private:
  const ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error& _internal_error() const;
  ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* _internal_mutable_error();
  public:
  void unsafe_arena_set_allocated_error(
      ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* error);
  ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* unsafe_arena_release_error();
  void clear_type();
  TypeCase type_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileResponse)
 private:
  class _Internal;
  void set_has_data();
  void set_has_error();

  inline bool has_type() const;
  inline void clear_has_type();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union TypeUnion {
      constexpr TypeUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::EncryptionProfile* data_;
      ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* error_;
    } type_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileCountRequest final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest) */ {
 public:
  inline GetEncryptionProfileCountRequest() : GetEncryptionProfileCountRequest(nullptr) {}
  ~GetEncryptionProfileCountRequest() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileCountRequest(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileCountRequest(const GetEncryptionProfileCountRequest& from);
  GetEncryptionProfileCountRequest(GetEncryptionProfileCountRequest&& from) noexcept
    : GetEncryptionProfileCountRequest() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileCountRequest& operator=(const GetEncryptionProfileCountRequest& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileCountRequest& operator=(GetEncryptionProfileCountRequest&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileCountRequest& default_instance() {
    return *internal_default_instance();
  }
  static inline const GetEncryptionProfileCountRequest* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileCountRequest*>(
               &_GetEncryptionProfileCountRequest_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    15;

  friend void swap(GetEncryptionProfileCountRequest& a, GetEncryptionProfileCountRequest& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileCountRequest* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileCountRequest* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileCountRequest* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileCountRequest>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileCountRequest& from);
  void MergeFrom(const GetEncryptionProfileCountRequest& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileCountRequest* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest";
  }
  protected:
  explicit GetEncryptionProfileCountRequest(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kFilterFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.EncryptionProfileFilter filter = 1;
  bool has_filter() const;
  void clear_filter() ;
  const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& filter() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::EncryptionProfileFilter* release_filter();
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* mutable_filter();
  void set_allocated_filter(::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter);
  private:
  const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& _internal_filter() const;
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* _internal_mutable_filter();
  public:
  void unsafe_arena_set_allocated_filter(
      ::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter);
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* unsafe_arena_release_filter();
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::HasBits<1> _has_bits_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileCountResponse_Error final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error) */ {
 public:
  inline GetEncryptionProfileCountResponse_Error() : GetEncryptionProfileCountResponse_Error(nullptr) {}
  ~GetEncryptionProfileCountResponse_Error() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileCountResponse_Error(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileCountResponse_Error(const GetEncryptionProfileCountResponse_Error& from);
  GetEncryptionProfileCountResponse_Error(GetEncryptionProfileCountResponse_Error&& from) noexcept
    : GetEncryptionProfileCountResponse_Error() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileCountResponse_Error& operator=(const GetEncryptionProfileCountResponse_Error& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileCountResponse_Error& operator=(GetEncryptionProfileCountResponse_Error&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileCountResponse_Error& default_instance() {
    return *internal_default_instance();
  }
  enum ReasonCase {
    kValidation = 1,
    REASON_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileCountResponse_Error* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileCountResponse_Error*>(
               &_GetEncryptionProfileCountResponse_Error_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    16;

  friend void swap(GetEncryptionProfileCountResponse_Error& a, GetEncryptionProfileCountResponse_Error& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileCountResponse_Error* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileCountResponse_Error* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileCountResponse_Error* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileCountResponse_Error>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileCountResponse_Error& from);
  void MergeFrom(const GetEncryptionProfileCountResponse_Error& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileCountResponse_Error* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error";
  }
  protected:
  explicit GetEncryptionProfileCountResponse_Error(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kValidationFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.ValidationError validation = 1;
  bool has_validation() const;
  private:
  bool _internal_has_validation() const;

  public:
  void clear_validation() ;
  const ::keyapis::encryption_profile::v1::ValidationError& validation() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::ValidationError* release_validation();
  ::keyapis::encryption_profile::v1::ValidationError* mutable_validation();
  void set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation);
  private:
  const ::keyapis::encryption_profile::v1::ValidationError& _internal_validation() const;
  ::keyapis::encryption_profile::v1::ValidationError* _internal_mutable_validation();
  public:
  void unsafe_arena_set_allocated_validation(
      ::keyapis::encryption_profile::v1::ValidationError* validation);
  ::keyapis::encryption_profile::v1::ValidationError* unsafe_arena_release_validation();
  void clear_reason();
  ReasonCase reason_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error)
 private:
  class _Internal;
  void set_has_validation();

  inline bool has_reason() const;
  inline void clear_has_reason();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union ReasonUnion {
      constexpr ReasonUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::ValidationError* validation_;
    } reason_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class GetEncryptionProfileCountResponse final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse) */ {
 public:
  inline GetEncryptionProfileCountResponse() : GetEncryptionProfileCountResponse(nullptr) {}
  ~GetEncryptionProfileCountResponse() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR GetEncryptionProfileCountResponse(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  GetEncryptionProfileCountResponse(const GetEncryptionProfileCountResponse& from);
  GetEncryptionProfileCountResponse(GetEncryptionProfileCountResponse&& from) noexcept
    : GetEncryptionProfileCountResponse() {
    *this = ::std::move(from);
  }

  inline GetEncryptionProfileCountResponse& operator=(const GetEncryptionProfileCountResponse& from) {
    CopyFrom(from);
    return *this;
  }
  inline GetEncryptionProfileCountResponse& operator=(GetEncryptionProfileCountResponse&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const GetEncryptionProfileCountResponse& default_instance() {
    return *internal_default_instance();
  }
  enum TypeCase {
    kData = 1,
    kError = 2,
    TYPE_NOT_SET = 0,
  };

  static inline const GetEncryptionProfileCountResponse* internal_default_instance() {
    return reinterpret_cast<const GetEncryptionProfileCountResponse*>(
               &_GetEncryptionProfileCountResponse_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    17;

  friend void swap(GetEncryptionProfileCountResponse& a, GetEncryptionProfileCountResponse& b) {
    a.Swap(&b);
  }
  inline void Swap(GetEncryptionProfileCountResponse* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(GetEncryptionProfileCountResponse* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  GetEncryptionProfileCountResponse* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<GetEncryptionProfileCountResponse>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const GetEncryptionProfileCountResponse& from);
  void MergeFrom(const GetEncryptionProfileCountResponse& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(GetEncryptionProfileCountResponse* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse";
  }
  protected:
  explicit GetEncryptionProfileCountResponse(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef GetEncryptionProfileCountResponse_Error Error;

  // accessors -------------------------------------------------------

  enum : int {
    kDataFieldNumber = 1,
    kErrorFieldNumber = 2,
  };
  // int32 data = 1;
  bool has_data() const;
  void clear_data() ;
  ::int32_t data() const;
  void set_data(::int32_t value);

  private:
  ::int32_t _internal_data() const;
  void _internal_set_data(::int32_t value);

  public:
  // .keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error error = 2;
  bool has_error() const;
  private:
  bool _internal_has_error() const;

  public:
  void clear_error() ;
  const ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error& error() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* release_error();
  ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* mutable_error();
  void set_allocated_error(::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* error);
  private:
  const ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error& _internal_error() const;
  ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* _internal_mutable_error();
  public:
  void unsafe_arena_set_allocated_error(
      ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* error);
  ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* unsafe_arena_release_error();
  void clear_type();
  TypeCase type_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse)
 private:
  class _Internal;
  void set_has_data();
  void set_has_error();

  inline bool has_type() const;
  inline void clear_has_type();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union TypeUnion {
      constexpr TypeUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::int32_t data_;
      ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* error_;
    } type_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class DeleteEncryptionProfileRequest final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest) */ {
 public:
  inline DeleteEncryptionProfileRequest() : DeleteEncryptionProfileRequest(nullptr) {}
  ~DeleteEncryptionProfileRequest() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR DeleteEncryptionProfileRequest(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  DeleteEncryptionProfileRequest(const DeleteEncryptionProfileRequest& from);
  DeleteEncryptionProfileRequest(DeleteEncryptionProfileRequest&& from) noexcept
    : DeleteEncryptionProfileRequest() {
    *this = ::std::move(from);
  }

  inline DeleteEncryptionProfileRequest& operator=(const DeleteEncryptionProfileRequest& from) {
    CopyFrom(from);
    return *this;
  }
  inline DeleteEncryptionProfileRequest& operator=(DeleteEncryptionProfileRequest&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const DeleteEncryptionProfileRequest& default_instance() {
    return *internal_default_instance();
  }
  static inline const DeleteEncryptionProfileRequest* internal_default_instance() {
    return reinterpret_cast<const DeleteEncryptionProfileRequest*>(
               &_DeleteEncryptionProfileRequest_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    18;

  friend void swap(DeleteEncryptionProfileRequest& a, DeleteEncryptionProfileRequest& b) {
    a.Swap(&b);
  }
  inline void Swap(DeleteEncryptionProfileRequest* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(DeleteEncryptionProfileRequest* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  DeleteEncryptionProfileRequest* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<DeleteEncryptionProfileRequest>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const DeleteEncryptionProfileRequest& from);
  void MergeFrom(const DeleteEncryptionProfileRequest& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(DeleteEncryptionProfileRequest* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest";
  }
  protected:
  explicit DeleteEncryptionProfileRequest(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kIdFieldNumber = 1,
  };
  // string id = 1 [(.google.api.field_behavior) = REQUIRED];
  void clear_id() ;
  const std::string& id() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_id(Arg_&& arg, Args_... args);
  std::string* mutable_id();
  PROTOBUF_NODISCARD std::string* release_id();
  void set_allocated_id(std::string* ptr);

  private:
  const std::string& _internal_id() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_id(
      const std::string& value);
  std::string* _internal_mutable_id();

  public:
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr id_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class DeleteEncryptionProfileResponse_Error_LinkedDevicesExists final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.LinkedDevicesExists) */ {
 public:
  inline DeleteEncryptionProfileResponse_Error_LinkedDevicesExists() : DeleteEncryptionProfileResponse_Error_LinkedDevicesExists(nullptr) {}
  ~DeleteEncryptionProfileResponse_Error_LinkedDevicesExists() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR DeleteEncryptionProfileResponse_Error_LinkedDevicesExists(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  DeleteEncryptionProfileResponse_Error_LinkedDevicesExists(const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& from);
  DeleteEncryptionProfileResponse_Error_LinkedDevicesExists(DeleteEncryptionProfileResponse_Error_LinkedDevicesExists&& from) noexcept
    : DeleteEncryptionProfileResponse_Error_LinkedDevicesExists() {
    *this = ::std::move(from);
  }

  inline DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& operator=(const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& from) {
    CopyFrom(from);
    return *this;
  }
  inline DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& operator=(DeleteEncryptionProfileResponse_Error_LinkedDevicesExists&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& default_instance() {
    return *internal_default_instance();
  }
  static inline const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* internal_default_instance() {
    return reinterpret_cast<const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists*>(
               &_DeleteEncryptionProfileResponse_Error_LinkedDevicesExists_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    19;

  friend void swap(DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& a, DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& b) {
    a.Swap(&b);
  }
  inline void Swap(DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<DeleteEncryptionProfileResponse_Error_LinkedDevicesExists>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& from);
  void MergeFrom(const DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.LinkedDevicesExists";
  }
  protected:
  explicit DeleteEncryptionProfileResponse_Error_LinkedDevicesExists(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.LinkedDevicesExists)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class DeleteEncryptionProfileResponse_Error final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error) */ {
 public:
  inline DeleteEncryptionProfileResponse_Error() : DeleteEncryptionProfileResponse_Error(nullptr) {}
  ~DeleteEncryptionProfileResponse_Error() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR DeleteEncryptionProfileResponse_Error(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  DeleteEncryptionProfileResponse_Error(const DeleteEncryptionProfileResponse_Error& from);
  DeleteEncryptionProfileResponse_Error(DeleteEncryptionProfileResponse_Error&& from) noexcept
    : DeleteEncryptionProfileResponse_Error() {
    *this = ::std::move(from);
  }

  inline DeleteEncryptionProfileResponse_Error& operator=(const DeleteEncryptionProfileResponse_Error& from) {
    CopyFrom(from);
    return *this;
  }
  inline DeleteEncryptionProfileResponse_Error& operator=(DeleteEncryptionProfileResponse_Error&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const DeleteEncryptionProfileResponse_Error& default_instance() {
    return *internal_default_instance();
  }
  enum ReasonCase {
    kLinkedDevicesExists = 1,
    REASON_NOT_SET = 0,
  };

  static inline const DeleteEncryptionProfileResponse_Error* internal_default_instance() {
    return reinterpret_cast<const DeleteEncryptionProfileResponse_Error*>(
               &_DeleteEncryptionProfileResponse_Error_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    20;

  friend void swap(DeleteEncryptionProfileResponse_Error& a, DeleteEncryptionProfileResponse_Error& b) {
    a.Swap(&b);
  }
  inline void Swap(DeleteEncryptionProfileResponse_Error* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(DeleteEncryptionProfileResponse_Error* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  DeleteEncryptionProfileResponse_Error* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<DeleteEncryptionProfileResponse_Error>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const DeleteEncryptionProfileResponse_Error& from);
  void MergeFrom(const DeleteEncryptionProfileResponse_Error& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(DeleteEncryptionProfileResponse_Error* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error";
  }
  protected:
  explicit DeleteEncryptionProfileResponse_Error(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef DeleteEncryptionProfileResponse_Error_LinkedDevicesExists LinkedDevicesExists;

  // accessors -------------------------------------------------------

  enum : int {
    kLinkedDevicesExistsFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.LinkedDevicesExists linked_devices_exists = 1;
  bool has_linked_devices_exists() const;
  private:
  bool _internal_has_linked_devices_exists() const;

  public:
  void clear_linked_devices_exists() ;
  const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& linked_devices_exists() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* release_linked_devices_exists();
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* mutable_linked_devices_exists();
  void set_allocated_linked_devices_exists(::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* linked_devices_exists);
  private:
  const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& _internal_linked_devices_exists() const;
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* _internal_mutable_linked_devices_exists();
  public:
  void unsafe_arena_set_allocated_linked_devices_exists(
      ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* linked_devices_exists);
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* unsafe_arena_release_linked_devices_exists();
  void clear_reason();
  ReasonCase reason_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error)
 private:
  class _Internal;
  void set_has_linked_devices_exists();

  inline bool has_reason() const;
  inline void clear_has_reason();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union ReasonUnion {
      constexpr ReasonUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* linked_devices_exists_;
    } reason_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class DeleteEncryptionProfileResponse final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse) */ {
 public:
  inline DeleteEncryptionProfileResponse() : DeleteEncryptionProfileResponse(nullptr) {}
  ~DeleteEncryptionProfileResponse() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR DeleteEncryptionProfileResponse(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  DeleteEncryptionProfileResponse(const DeleteEncryptionProfileResponse& from);
  DeleteEncryptionProfileResponse(DeleteEncryptionProfileResponse&& from) noexcept
    : DeleteEncryptionProfileResponse() {
    *this = ::std::move(from);
  }

  inline DeleteEncryptionProfileResponse& operator=(const DeleteEncryptionProfileResponse& from) {
    CopyFrom(from);
    return *this;
  }
  inline DeleteEncryptionProfileResponse& operator=(DeleteEncryptionProfileResponse&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const DeleteEncryptionProfileResponse& default_instance() {
    return *internal_default_instance();
  }
  enum TypeCase {
    kError = 1,
    TYPE_NOT_SET = 0,
  };

  static inline const DeleteEncryptionProfileResponse* internal_default_instance() {
    return reinterpret_cast<const DeleteEncryptionProfileResponse*>(
               &_DeleteEncryptionProfileResponse_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    21;

  friend void swap(DeleteEncryptionProfileResponse& a, DeleteEncryptionProfileResponse& b) {
    a.Swap(&b);
  }
  inline void Swap(DeleteEncryptionProfileResponse* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(DeleteEncryptionProfileResponse* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  DeleteEncryptionProfileResponse* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<DeleteEncryptionProfileResponse>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const DeleteEncryptionProfileResponse& from);
  void MergeFrom(const DeleteEncryptionProfileResponse& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(DeleteEncryptionProfileResponse* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse";
  }
  protected:
  explicit DeleteEncryptionProfileResponse(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  typedef DeleteEncryptionProfileResponse_Error Error;

  // accessors -------------------------------------------------------

  enum : int {
    kErrorFieldNumber = 1,
  };
  // .keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error error = 1;
  bool has_error() const;
  private:
  bool _internal_has_error() const;

  public:
  void clear_error() ;
  const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error& error() const;
  PROTOBUF_NODISCARD ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* release_error();
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* mutable_error();
  void set_allocated_error(::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* error);
  private:
  const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error& _internal_error() const;
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* _internal_mutable_error();
  public:
  void unsafe_arena_set_allocated_error(
      ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* error);
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* unsafe_arena_release_error();
  void clear_type();
  TypeCase type_case() const;
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse)
 private:
  class _Internal;
  void set_has_error();

  inline bool has_type() const;
  inline void clear_has_type();

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    union TypeUnion {
      constexpr TypeUnion() : _constinit_{} {}
        ::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized _constinit_;
      ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* error_;
    } type_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
    ::uint32_t _oneof_case_[1];

  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class PostEncryptionProfileRestoreRequest final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest) */ {
 public:
  inline PostEncryptionProfileRestoreRequest() : PostEncryptionProfileRestoreRequest(nullptr) {}
  ~PostEncryptionProfileRestoreRequest() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR PostEncryptionProfileRestoreRequest(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  PostEncryptionProfileRestoreRequest(const PostEncryptionProfileRestoreRequest& from);
  PostEncryptionProfileRestoreRequest(PostEncryptionProfileRestoreRequest&& from) noexcept
    : PostEncryptionProfileRestoreRequest() {
    *this = ::std::move(from);
  }

  inline PostEncryptionProfileRestoreRequest& operator=(const PostEncryptionProfileRestoreRequest& from) {
    CopyFrom(from);
    return *this;
  }
  inline PostEncryptionProfileRestoreRequest& operator=(PostEncryptionProfileRestoreRequest&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const PostEncryptionProfileRestoreRequest& default_instance() {
    return *internal_default_instance();
  }
  static inline const PostEncryptionProfileRestoreRequest* internal_default_instance() {
    return reinterpret_cast<const PostEncryptionProfileRestoreRequest*>(
               &_PostEncryptionProfileRestoreRequest_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    22;

  friend void swap(PostEncryptionProfileRestoreRequest& a, PostEncryptionProfileRestoreRequest& b) {
    a.Swap(&b);
  }
  inline void Swap(PostEncryptionProfileRestoreRequest* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(PostEncryptionProfileRestoreRequest* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  PostEncryptionProfileRestoreRequest* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<PostEncryptionProfileRestoreRequest>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const PostEncryptionProfileRestoreRequest& from);
  void MergeFrom(const PostEncryptionProfileRestoreRequest& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(PostEncryptionProfileRestoreRequest* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest";
  }
  protected:
  explicit PostEncryptionProfileRestoreRequest(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kIdFieldNumber = 1,
  };
  // string id = 1 [(.google.api.field_behavior) = REQUIRED];
  void clear_id() ;
  const std::string& id() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_id(Arg_&& arg, Args_... args);
  std::string* mutable_id();
  PROTOBUF_NODISCARD std::string* release_id();
  void set_allocated_id(std::string* ptr);

  private:
  const std::string& _internal_id() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_id(
      const std::string& value);
  std::string* _internal_mutable_id();

  public:
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr id_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class PostEncryptionProfileRestoreResponse final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreResponse) */ {
 public:
  inline PostEncryptionProfileRestoreResponse() : PostEncryptionProfileRestoreResponse(nullptr) {}
  ~PostEncryptionProfileRestoreResponse() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR PostEncryptionProfileRestoreResponse(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  PostEncryptionProfileRestoreResponse(const PostEncryptionProfileRestoreResponse& from);
  PostEncryptionProfileRestoreResponse(PostEncryptionProfileRestoreResponse&& from) noexcept
    : PostEncryptionProfileRestoreResponse() {
    *this = ::std::move(from);
  }

  inline PostEncryptionProfileRestoreResponse& operator=(const PostEncryptionProfileRestoreResponse& from) {
    CopyFrom(from);
    return *this;
  }
  inline PostEncryptionProfileRestoreResponse& operator=(PostEncryptionProfileRestoreResponse&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const PostEncryptionProfileRestoreResponse& default_instance() {
    return *internal_default_instance();
  }
  static inline const PostEncryptionProfileRestoreResponse* internal_default_instance() {
    return reinterpret_cast<const PostEncryptionProfileRestoreResponse*>(
               &_PostEncryptionProfileRestoreResponse_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    23;

  friend void swap(PostEncryptionProfileRestoreResponse& a, PostEncryptionProfileRestoreResponse& b) {
    a.Swap(&b);
  }
  inline void Swap(PostEncryptionProfileRestoreResponse* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(PostEncryptionProfileRestoreResponse* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  PostEncryptionProfileRestoreResponse* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<PostEncryptionProfileRestoreResponse>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const PostEncryptionProfileRestoreResponse& from);
  void MergeFrom(const PostEncryptionProfileRestoreResponse& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(PostEncryptionProfileRestoreResponse* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.PostEncryptionProfileRestoreResponse";
  }
  protected:
  explicit PostEncryptionProfileRestoreResponse(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreResponse)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};// -------------------------------------------------------------------

class ValidationError final :
    public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keyapis.encryption_profile.v1.ValidationError) */ {
 public:
  inline ValidationError() : ValidationError(nullptr) {}
  ~ValidationError() override;
  template<typename = void>
  explicit PROTOBUF_CONSTEXPR ValidationError(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);

  ValidationError(const ValidationError& from);
  ValidationError(ValidationError&& from) noexcept
    : ValidationError() {
    *this = ::std::move(from);
  }

  inline ValidationError& operator=(const ValidationError& from) {
    CopyFrom(from);
    return *this;
  }
  inline ValidationError& operator=(ValidationError&& from) noexcept {
    if (this == &from) return *this;
    if (GetOwningArena() == from.GetOwningArena()
  #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
        && GetOwningArena() != nullptr
  #endif  // !PROTOBUF_FORCE_COPY_IN_MOVE
    ) {
      InternalSwap(&from);
    } else {
      CopyFrom(from);
    }
    return *this;
  }

  inline const std::string& unknown_fields() const {
    return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
  }
  inline std::string* mutable_unknown_fields() {
    return _internal_metadata_.mutable_unknown_fields<std::string>();
  }

  static const ValidationError& default_instance() {
    return *internal_default_instance();
  }
  static inline const ValidationError* internal_default_instance() {
    return reinterpret_cast<const ValidationError*>(
               &_ValidationError_default_instance_);
  }
  static constexpr int kIndexInFileMessages =
    24;

  friend void swap(ValidationError& a, ValidationError& b) {
    a.Swap(&b);
  }
  inline void Swap(ValidationError* other) {
    if (other == this) return;
  #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() != nullptr &&
        GetOwningArena() == other->GetOwningArena()) {
   #else  // PROTOBUF_FORCE_COPY_IN_SWAP
    if (GetOwningArena() == other->GetOwningArena()) {
  #endif  // !PROTOBUF_FORCE_COPY_IN_SWAP
      InternalSwap(other);
    } else {
      ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
    }
  }
  void UnsafeArenaSwap(ValidationError* other) {
    if (other == this) return;
    ABSL_DCHECK(GetOwningArena() == other->GetOwningArena());
    InternalSwap(other);
  }

  // implements Message ----------------------------------------------

  ValidationError* New(::PROTOBUF_NAMESPACE_ID::Arena* arena = nullptr) const final {
    return CreateMaybeMessage<ValidationError>(arena);
  }
  void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from)  final;
  void CopyFrom(const ValidationError& from);
  void MergeFrom(const ValidationError& from);
  PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
  bool IsInitialized() const final;

  ::size_t ByteSizeLong() const final;
  const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
  ::uint8_t* _InternalSerialize(
      ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
  int GetCachedSize() const final { return _impl_._cached_size_.Get(); }

  private:
  void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  void SharedDtor();
  void SetCachedSize(int size) const;
  void InternalSwap(ValidationError* other);

  private:
  friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
  static ::absl::string_view FullMessageName() {
    return "keyapis.encryption_profile.v1.ValidationError";
  }
  protected:
  explicit ValidationError(::PROTOBUF_NAMESPACE_ID::Arena* arena);
  public:

  std::string GetTypeName() const final;

  // nested types ----------------------------------------------------

  // accessors -------------------------------------------------------

  enum : int {
    kPathFieldNumber = 1,
    kMessageFieldNumber = 2,
  };
  // string path = 1 [(.google.api.field_behavior) = REQUIRED];
  void clear_path() ;
  const std::string& path() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_path(Arg_&& arg, Args_... args);
  std::string* mutable_path();
  PROTOBUF_NODISCARD std::string* release_path();
  void set_allocated_path(std::string* ptr);

  private:
  const std::string& _internal_path() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_path(
      const std::string& value);
  std::string* _internal_mutable_path();

  public:
  // string message = 2 [(.google.api.field_behavior) = REQUIRED];
  void clear_message() ;
  const std::string& message() const;




  template <typename Arg_ = const std::string&, typename... Args_>
  void set_message(Arg_&& arg, Args_... args);
  std::string* mutable_message();
  PROTOBUF_NODISCARD std::string* release_message();
  void set_allocated_message(std::string* ptr);

  private:
  const std::string& _internal_message() const;
  inline PROTOBUF_ALWAYS_INLINE void _internal_set_message(
      const std::string& value);
  std::string* _internal_mutable_message();

  public:
  // @@protoc_insertion_point(class_scope:keyapis.encryption_profile.v1.ValidationError)
 private:
  class _Internal;

  template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
  typedef void InternalArenaConstructable_;
  typedef void DestructorSkippable_;
  struct Impl_ {
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr path_;
    ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr message_;
    mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
  };
  union { Impl_ _impl_; };
  friend struct ::TableStruct_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto;
};

// ===================================================================




// ===================================================================


#ifdef __GNUC__
#pragma GCC diagnostic push
#pragma GCC diagnostic ignored "-Wstrict-aliasing"
#endif  // __GNUC__
// -------------------------------------------------------------------

// EncryptionProfile_SavingError_Conflict

// -------------------------------------------------------------------

// EncryptionProfile_SavingError_RangeIsTooSmall

// -------------------------------------------------------------------

// EncryptionProfile_SavingError

// .keyapis.encryption_profile.v1.EncryptionProfile.SavingError.Conflict conflict = 1;
inline bool EncryptionProfile_SavingError::has_conflict() const {
  return reason_case() == kConflict;
}
inline bool EncryptionProfile_SavingError::_internal_has_conflict() const {
  return reason_case() == kConflict;
}
inline void EncryptionProfile_SavingError::set_has_conflict() {
  _impl_._oneof_case_[0] = kConflict;
}
inline void EncryptionProfile_SavingError::clear_conflict() {
  if (reason_case() == kConflict) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.conflict_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* EncryptionProfile_SavingError::release_conflict() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.conflict)
  if (reason_case() == kConflict) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* temp = _impl_.reason_.conflict_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.conflict_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict& EncryptionProfile_SavingError::_internal_conflict() const {
  return reason_case() == kConflict
      ? *_impl_.reason_.conflict_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict&>(::keyapis::encryption_profile::v1::_EncryptionProfile_SavingError_Conflict_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict& EncryptionProfile_SavingError::conflict() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.conflict)
  return _internal_conflict();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* EncryptionProfile_SavingError::unsafe_arena_release_conflict() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.conflict)
  if (reason_case() == kConflict) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* temp = _impl_.reason_.conflict_;
    _impl_.reason_.conflict_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void EncryptionProfile_SavingError::unsafe_arena_set_allocated_conflict(::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* conflict) {
  clear_reason();
  if (conflict) {
    set_has_conflict();
    _impl_.reason_.conflict_ = conflict;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.conflict)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* EncryptionProfile_SavingError::_internal_mutable_conflict() {
  if (reason_case() != kConflict) {
    clear_reason();
    set_has_conflict();
    _impl_.reason_.conflict_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict >(GetArenaForAllocation());
  }
  return _impl_.reason_.conflict_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* EncryptionProfile_SavingError::mutable_conflict() {
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_Conflict* _msg = _internal_mutable_conflict();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.conflict)
  return _msg;
}

// .keyapis.encryption_profile.v1.EncryptionProfile.SavingError.RangeIsTooSmall range_is_too_small = 2;
inline bool EncryptionProfile_SavingError::has_range_is_too_small() const {
  return reason_case() == kRangeIsTooSmall;
}
inline bool EncryptionProfile_SavingError::_internal_has_range_is_too_small() const {
  return reason_case() == kRangeIsTooSmall;
}
inline void EncryptionProfile_SavingError::set_has_range_is_too_small() {
  _impl_._oneof_case_[0] = kRangeIsTooSmall;
}
inline void EncryptionProfile_SavingError::clear_range_is_too_small() {
  if (reason_case() == kRangeIsTooSmall) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.range_is_too_small_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* EncryptionProfile_SavingError::release_range_is_too_small() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.range_is_too_small)
  if (reason_case() == kRangeIsTooSmall) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* temp = _impl_.reason_.range_is_too_small_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.range_is_too_small_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall& EncryptionProfile_SavingError::_internal_range_is_too_small() const {
  return reason_case() == kRangeIsTooSmall
      ? *_impl_.reason_.range_is_too_small_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall&>(::keyapis::encryption_profile::v1::_EncryptionProfile_SavingError_RangeIsTooSmall_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall& EncryptionProfile_SavingError::range_is_too_small() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.range_is_too_small)
  return _internal_range_is_too_small();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* EncryptionProfile_SavingError::unsafe_arena_release_range_is_too_small() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.range_is_too_small)
  if (reason_case() == kRangeIsTooSmall) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* temp = _impl_.reason_.range_is_too_small_;
    _impl_.reason_.range_is_too_small_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void EncryptionProfile_SavingError::unsafe_arena_set_allocated_range_is_too_small(::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* range_is_too_small) {
  clear_reason();
  if (range_is_too_small) {
    set_has_range_is_too_small();
    _impl_.reason_.range_is_too_small_ = range_is_too_small;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.range_is_too_small)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* EncryptionProfile_SavingError::_internal_mutable_range_is_too_small() {
  if (reason_case() != kRangeIsTooSmall) {
    clear_reason();
    set_has_range_is_too_small();
    _impl_.reason_.range_is_too_small_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall >(GetArenaForAllocation());
  }
  return _impl_.reason_.range_is_too_small_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* EncryptionProfile_SavingError::mutable_range_is_too_small() {
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError_RangeIsTooSmall* _msg = _internal_mutable_range_is_too_small();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.SavingError.range_is_too_small)
  return _msg;
}

inline bool EncryptionProfile_SavingError::has_reason() const {
  return reason_case() != REASON_NOT_SET;
}
inline void EncryptionProfile_SavingError::clear_has_reason() {
  _impl_._oneof_case_[0] = REASON_NOT_SET;
}
inline EncryptionProfile_SavingError::ReasonCase EncryptionProfile_SavingError::reason_case() const {
  return EncryptionProfile_SavingError::ReasonCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// EncryptionProfile

// string id = 1;
inline void EncryptionProfile::clear_id() {
  _impl_.id_.ClearToEmpty();
}
inline const std::string& EncryptionProfile::id() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.id)
  return _internal_id();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfile::set_id(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.id_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.id)
}
inline std::string* EncryptionProfile::mutable_id() {
  std::string* _s = _internal_mutable_id();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.id)
  return _s;
}
inline const std::string& EncryptionProfile::_internal_id() const {
  return _impl_.id_.Get();
}
inline void EncryptionProfile::_internal_set_id(const std::string& value) {
  ;


  _impl_.id_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfile::_internal_mutable_id() {
  ;
  return _impl_.id_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfile::release_id() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.id)
  return _impl_.id_.Release();
}
inline void EncryptionProfile::set_allocated_id(std::string* value) {
  _impl_.id_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.id_.IsDefault()) {
          _impl_.id_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.id)
}

// string name = 2 [(.google.api.field_behavior) = REQUIRED];
inline void EncryptionProfile::clear_name() {
  _impl_.name_.ClearToEmpty();
}
inline const std::string& EncryptionProfile::name() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.name)
  return _internal_name();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfile::set_name(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.name_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.name)
}
inline std::string* EncryptionProfile::mutable_name() {
  std::string* _s = _internal_mutable_name();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.name)
  return _s;
}
inline const std::string& EncryptionProfile::_internal_name() const {
  return _impl_.name_.Get();
}
inline void EncryptionProfile::_internal_set_name(const std::string& value) {
  ;


  _impl_.name_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfile::_internal_mutable_name() {
  ;
  return _impl_.name_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfile::release_name() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.name)
  return _impl_.name_.Release();
}
inline void EncryptionProfile::set_allocated_name(std::string* value) {
  _impl_.name_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.name_.IsDefault()) {
          _impl_.name_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.name)
}

// .google.protobuf.StringValue description = 3;
inline bool EncryptionProfile::has_description() const {
  bool value = (_impl_._has_bits_[0] & 0x00000001u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.description_ != nullptr);
  return value;
}
inline const ::PROTOBUF_NAMESPACE_ID::StringValue& EncryptionProfile::_internal_description() const {
  const ::PROTOBUF_NAMESPACE_ID::StringValue* p = _impl_.description_;
  return p != nullptr ? *p : reinterpret_cast<const ::PROTOBUF_NAMESPACE_ID::StringValue&>(
      ::PROTOBUF_NAMESPACE_ID::_StringValue_default_instance_);
}
inline const ::PROTOBUF_NAMESPACE_ID::StringValue& EncryptionProfile::description() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.description)
  return _internal_description();
}
inline void EncryptionProfile::unsafe_arena_set_allocated_description(
    ::PROTOBUF_NAMESPACE_ID::StringValue* description) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.description_);
  }
  _impl_.description_ = description;
  if (description) {
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.description)
}
inline ::PROTOBUF_NAMESPACE_ID::StringValue* EncryptionProfile::release_description() {
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::PROTOBUF_NAMESPACE_ID::StringValue* temp = _impl_.description_;
  _impl_.description_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::StringValue* EncryptionProfile::unsafe_arena_release_description() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.description)
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::PROTOBUF_NAMESPACE_ID::StringValue* temp = _impl_.description_;
  _impl_.description_ = nullptr;
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::StringValue* EncryptionProfile::_internal_mutable_description() {
  _impl_._has_bits_[0] |= 0x00000001u;
  if (_impl_.description_ == nullptr) {
    auto* p = CreateMaybeMessage<::PROTOBUF_NAMESPACE_ID::StringValue>(GetArenaForAllocation());
    _impl_.description_ = p;
  }
  return _impl_.description_;
}
inline ::PROTOBUF_NAMESPACE_ID::StringValue* EncryptionProfile::mutable_description() {
  ::PROTOBUF_NAMESPACE_ID::StringValue* _msg = _internal_mutable_description();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.description)
  return _msg;
}
inline void EncryptionProfile::set_allocated_description(::PROTOBUF_NAMESPACE_ID::StringValue* description) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete reinterpret_cast< ::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.description_);
  }
  if (description) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(
                reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(description));
    if (message_arena != submessage_arena) {
      description = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, description, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  _impl_.description_ = description;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.description)
}

// .keyapis.encryption_profile.v1.EncryptionProfile.Type type = 4 [(.google.api.field_behavior) = REQUIRED];
inline void EncryptionProfile::clear_type() {
  _impl_.type_ = 0;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_Type EncryptionProfile::type() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.type)
  return _internal_type();
}
inline void EncryptionProfile::set_type(::keyapis::encryption_profile::v1::EncryptionProfile_Type value) {
   _internal_set_type(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.type)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_Type EncryptionProfile::_internal_type() const {
  return static_cast<::keyapis::encryption_profile::v1::EncryptionProfile_Type>(_impl_.type_);
}
inline void EncryptionProfile::_internal_set_type(::keyapis::encryption_profile::v1::EncryptionProfile_Type value) {
  ;
  _impl_.type_ = value;
}

// int32 sector_number = 5;
inline void EncryptionProfile::clear_sector_number() {
  _impl_.sector_number_ = 0;
}
inline ::int32_t EncryptionProfile::sector_number() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.sector_number)
  return _internal_sector_number();
}
inline void EncryptionProfile::set_sector_number(::int32_t value) {
  _internal_set_sector_number(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.sector_number)
}
inline ::int32_t EncryptionProfile::_internal_sector_number() const {
  return _impl_.sector_number_;
}
inline void EncryptionProfile::_internal_set_sector_number(::int32_t value) {
  ;
  _impl_.sector_number_ = value;
}

// int32 block_number = 6;
inline void EncryptionProfile::clear_block_number() {
  _impl_.block_number_ = 0;
}
inline ::int32_t EncryptionProfile::block_number() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.block_number)
  return _internal_block_number();
}
inline void EncryptionProfile::set_block_number(::int32_t value) {
  _internal_set_block_number(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.block_number)
}
inline ::int32_t EncryptionProfile::_internal_block_number() const {
  return _impl_.block_number_;
}
inline void EncryptionProfile::_internal_set_block_number(::int32_t value) {
  ;
  _impl_.block_number_ = value;
}

// int32 start_index = 7;
inline void EncryptionProfile::clear_start_index() {
  _impl_.start_index_ = 0;
}
inline ::int32_t EncryptionProfile::start_index() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.start_index)
  return _internal_start_index();
}
inline void EncryptionProfile::set_start_index(::int32_t value) {
  _internal_set_start_index(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.start_index)
}
inline ::int32_t EncryptionProfile::_internal_start_index() const {
  return _impl_.start_index_;
}
inline void EncryptionProfile::_internal_set_start_index(::int32_t value) {
  ;
  _impl_.start_index_ = value;
}

// int32 end_index = 8;
inline void EncryptionProfile::clear_end_index() {
  _impl_.end_index_ = 0;
}
inline ::int32_t EncryptionProfile::end_index() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.end_index)
  return _internal_end_index();
}
inline void EncryptionProfile::set_end_index(::int32_t value) {
  _internal_set_end_index(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.end_index)
}
inline ::int32_t EncryptionProfile::_internal_end_index() const {
  return _impl_.end_index_;
}
inline void EncryptionProfile::_internal_set_end_index(::int32_t value) {
  ;
  _impl_.end_index_ = value;
}

// string secret_a = 9 [(.google.api.field_behavior) = INPUT_ONLY];
inline void EncryptionProfile::clear_secret_a() {
  _impl_.secret_a_.ClearToEmpty();
}
inline const std::string& EncryptionProfile::secret_a() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.secret_a)
  return _internal_secret_a();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfile::set_secret_a(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.secret_a_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.secret_a)
}
inline std::string* EncryptionProfile::mutable_secret_a() {
  std::string* _s = _internal_mutable_secret_a();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.secret_a)
  return _s;
}
inline const std::string& EncryptionProfile::_internal_secret_a() const {
  return _impl_.secret_a_.Get();
}
inline void EncryptionProfile::_internal_set_secret_a(const std::string& value) {
  ;


  _impl_.secret_a_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfile::_internal_mutable_secret_a() {
  ;
  return _impl_.secret_a_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfile::release_secret_a() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.secret_a)
  return _impl_.secret_a_.Release();
}
inline void EncryptionProfile::set_allocated_secret_a(std::string* value) {
  _impl_.secret_a_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.secret_a_.IsDefault()) {
          _impl_.secret_a_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.secret_a)
}

// string encrypted_secret_a = 10 [(.google.api.field_behavior) = OUTPUT_ONLY];
inline void EncryptionProfile::clear_encrypted_secret_a() {
  _impl_.encrypted_secret_a_.ClearToEmpty();
}
inline const std::string& EncryptionProfile::encrypted_secret_a() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_a)
  return _internal_encrypted_secret_a();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfile::set_encrypted_secret_a(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.encrypted_secret_a_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_a)
}
inline std::string* EncryptionProfile::mutable_encrypted_secret_a() {
  std::string* _s = _internal_mutable_encrypted_secret_a();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_a)
  return _s;
}
inline const std::string& EncryptionProfile::_internal_encrypted_secret_a() const {
  return _impl_.encrypted_secret_a_.Get();
}
inline void EncryptionProfile::_internal_set_encrypted_secret_a(const std::string& value) {
  ;


  _impl_.encrypted_secret_a_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfile::_internal_mutable_encrypted_secret_a() {
  ;
  return _impl_.encrypted_secret_a_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfile::release_encrypted_secret_a() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_a)
  return _impl_.encrypted_secret_a_.Release();
}
inline void EncryptionProfile::set_allocated_encrypted_secret_a(std::string* value) {
  _impl_.encrypted_secret_a_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.encrypted_secret_a_.IsDefault()) {
          _impl_.encrypted_secret_a_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_a)
}

// string secret_b = 11 [(.google.api.field_behavior) = INPUT_ONLY];
inline void EncryptionProfile::clear_secret_b() {
  _impl_.secret_b_.ClearToEmpty();
}
inline const std::string& EncryptionProfile::secret_b() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.secret_b)
  return _internal_secret_b();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfile::set_secret_b(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.secret_b_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.secret_b)
}
inline std::string* EncryptionProfile::mutable_secret_b() {
  std::string* _s = _internal_mutable_secret_b();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.secret_b)
  return _s;
}
inline const std::string& EncryptionProfile::_internal_secret_b() const {
  return _impl_.secret_b_.Get();
}
inline void EncryptionProfile::_internal_set_secret_b(const std::string& value) {
  ;


  _impl_.secret_b_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfile::_internal_mutable_secret_b() {
  ;
  return _impl_.secret_b_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfile::release_secret_b() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.secret_b)
  return _impl_.secret_b_.Release();
}
inline void EncryptionProfile::set_allocated_secret_b(std::string* value) {
  _impl_.secret_b_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.secret_b_.IsDefault()) {
          _impl_.secret_b_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.secret_b)
}

// string encrypted_secret_b = 12 [(.google.api.field_behavior) = OUTPUT_ONLY];
inline void EncryptionProfile::clear_encrypted_secret_b() {
  _impl_.encrypted_secret_b_.ClearToEmpty();
}
inline const std::string& EncryptionProfile::encrypted_secret_b() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_b)
  return _internal_encrypted_secret_b();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfile::set_encrypted_secret_b(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.encrypted_secret_b_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_b)
}
inline std::string* EncryptionProfile::mutable_encrypted_secret_b() {
  std::string* _s = _internal_mutable_encrypted_secret_b();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_b)
  return _s;
}
inline const std::string& EncryptionProfile::_internal_encrypted_secret_b() const {
  return _impl_.encrypted_secret_b_.Get();
}
inline void EncryptionProfile::_internal_set_encrypted_secret_b(const std::string& value) {
  ;


  _impl_.encrypted_secret_b_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfile::_internal_mutable_encrypted_secret_b() {
  ;
  return _impl_.encrypted_secret_b_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfile::release_encrypted_secret_b() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_b)
  return _impl_.encrypted_secret_b_.Release();
}
inline void EncryptionProfile::set_allocated_encrypted_secret_b(std::string* value) {
  _impl_.encrypted_secret_b_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.encrypted_secret_b_.IsDefault()) {
          _impl_.encrypted_secret_b_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.encrypted_secret_b)
}

// .google.protobuf.Timestamp created_at = 13 [(.google.api.field_behavior) = OUTPUT_ONLY];
inline bool EncryptionProfile::has_created_at() const {
  bool value = (_impl_._has_bits_[0] & 0x00000002u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.created_at_ != nullptr);
  return value;
}
inline const ::PROTOBUF_NAMESPACE_ID::Timestamp& EncryptionProfile::_internal_created_at() const {
  const ::PROTOBUF_NAMESPACE_ID::Timestamp* p = _impl_.created_at_;
  return p != nullptr ? *p : reinterpret_cast<const ::PROTOBUF_NAMESPACE_ID::Timestamp&>(
      ::PROTOBUF_NAMESPACE_ID::_Timestamp_default_instance_);
}
inline const ::PROTOBUF_NAMESPACE_ID::Timestamp& EncryptionProfile::created_at() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.created_at)
  return _internal_created_at();
}
inline void EncryptionProfile::unsafe_arena_set_allocated_created_at(
    ::PROTOBUF_NAMESPACE_ID::Timestamp* created_at) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.created_at_);
  }
  _impl_.created_at_ = created_at;
  if (created_at) {
    _impl_._has_bits_[0] |= 0x00000002u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000002u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.created_at)
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::release_created_at() {
  _impl_._has_bits_[0] &= ~0x00000002u;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* temp = _impl_.created_at_;
  _impl_.created_at_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::unsafe_arena_release_created_at() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.created_at)
  _impl_._has_bits_[0] &= ~0x00000002u;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* temp = _impl_.created_at_;
  _impl_.created_at_ = nullptr;
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::_internal_mutable_created_at() {
  _impl_._has_bits_[0] |= 0x00000002u;
  if (_impl_.created_at_ == nullptr) {
    auto* p = CreateMaybeMessage<::PROTOBUF_NAMESPACE_ID::Timestamp>(GetArenaForAllocation());
    _impl_.created_at_ = p;
  }
  return _impl_.created_at_;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::mutable_created_at() {
  ::PROTOBUF_NAMESPACE_ID::Timestamp* _msg = _internal_mutable_created_at();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.created_at)
  return _msg;
}
inline void EncryptionProfile::set_allocated_created_at(::PROTOBUF_NAMESPACE_ID::Timestamp* created_at) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete reinterpret_cast< ::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.created_at_);
  }
  if (created_at) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(
                reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(created_at));
    if (message_arena != submessage_arena) {
      created_at = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, created_at, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000002u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000002u;
  }
  _impl_.created_at_ = created_at;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.created_at)
}

// .google.protobuf.Timestamp changed_at = 14;
inline bool EncryptionProfile::has_changed_at() const {
  bool value = (_impl_._has_bits_[0] & 0x00000004u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.changed_at_ != nullptr);
  return value;
}
inline const ::PROTOBUF_NAMESPACE_ID::Timestamp& EncryptionProfile::_internal_changed_at() const {
  const ::PROTOBUF_NAMESPACE_ID::Timestamp* p = _impl_.changed_at_;
  return p != nullptr ? *p : reinterpret_cast<const ::PROTOBUF_NAMESPACE_ID::Timestamp&>(
      ::PROTOBUF_NAMESPACE_ID::_Timestamp_default_instance_);
}
inline const ::PROTOBUF_NAMESPACE_ID::Timestamp& EncryptionProfile::changed_at() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.changed_at)
  return _internal_changed_at();
}
inline void EncryptionProfile::unsafe_arena_set_allocated_changed_at(
    ::PROTOBUF_NAMESPACE_ID::Timestamp* changed_at) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.changed_at_);
  }
  _impl_.changed_at_ = changed_at;
  if (changed_at) {
    _impl_._has_bits_[0] |= 0x00000004u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000004u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.changed_at)
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::release_changed_at() {
  _impl_._has_bits_[0] &= ~0x00000004u;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* temp = _impl_.changed_at_;
  _impl_.changed_at_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::unsafe_arena_release_changed_at() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.changed_at)
  _impl_._has_bits_[0] &= ~0x00000004u;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* temp = _impl_.changed_at_;
  _impl_.changed_at_ = nullptr;
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::_internal_mutable_changed_at() {
  _impl_._has_bits_[0] |= 0x00000004u;
  if (_impl_.changed_at_ == nullptr) {
    auto* p = CreateMaybeMessage<::PROTOBUF_NAMESPACE_ID::Timestamp>(GetArenaForAllocation());
    _impl_.changed_at_ = p;
  }
  return _impl_.changed_at_;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::mutable_changed_at() {
  ::PROTOBUF_NAMESPACE_ID::Timestamp* _msg = _internal_mutable_changed_at();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.changed_at)
  return _msg;
}
inline void EncryptionProfile::set_allocated_changed_at(::PROTOBUF_NAMESPACE_ID::Timestamp* changed_at) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete reinterpret_cast< ::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.changed_at_);
  }
  if (changed_at) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(
                reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(changed_at));
    if (message_arena != submessage_arena) {
      changed_at = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, changed_at, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000004u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000004u;
  }
  _impl_.changed_at_ = changed_at;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.changed_at)
}

// .google.protobuf.Timestamp deleted_at = 15 [(.google.api.field_behavior) = OUTPUT_ONLY];
inline bool EncryptionProfile::has_deleted_at() const {
  bool value = (_impl_._has_bits_[0] & 0x00000008u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.deleted_at_ != nullptr);
  return value;
}
inline const ::PROTOBUF_NAMESPACE_ID::Timestamp& EncryptionProfile::_internal_deleted_at() const {
  const ::PROTOBUF_NAMESPACE_ID::Timestamp* p = _impl_.deleted_at_;
  return p != nullptr ? *p : reinterpret_cast<const ::PROTOBUF_NAMESPACE_ID::Timestamp&>(
      ::PROTOBUF_NAMESPACE_ID::_Timestamp_default_instance_);
}
inline const ::PROTOBUF_NAMESPACE_ID::Timestamp& EncryptionProfile::deleted_at() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfile.deleted_at)
  return _internal_deleted_at();
}
inline void EncryptionProfile::unsafe_arena_set_allocated_deleted_at(
    ::PROTOBUF_NAMESPACE_ID::Timestamp* deleted_at) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.deleted_at_);
  }
  _impl_.deleted_at_ = deleted_at;
  if (deleted_at) {
    _impl_._has_bits_[0] |= 0x00000008u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000008u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.deleted_at)
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::release_deleted_at() {
  _impl_._has_bits_[0] &= ~0x00000008u;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* temp = _impl_.deleted_at_;
  _impl_.deleted_at_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::unsafe_arena_release_deleted_at() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfile.deleted_at)
  _impl_._has_bits_[0] &= ~0x00000008u;
  ::PROTOBUF_NAMESPACE_ID::Timestamp* temp = _impl_.deleted_at_;
  _impl_.deleted_at_ = nullptr;
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::_internal_mutable_deleted_at() {
  _impl_._has_bits_[0] |= 0x00000008u;
  if (_impl_.deleted_at_ == nullptr) {
    auto* p = CreateMaybeMessage<::PROTOBUF_NAMESPACE_ID::Timestamp>(GetArenaForAllocation());
    _impl_.deleted_at_ = p;
  }
  return _impl_.deleted_at_;
}
inline ::PROTOBUF_NAMESPACE_ID::Timestamp* EncryptionProfile::mutable_deleted_at() {
  ::PROTOBUF_NAMESPACE_ID::Timestamp* _msg = _internal_mutable_deleted_at();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfile.deleted_at)
  return _msg;
}
inline void EncryptionProfile::set_allocated_deleted_at(::PROTOBUF_NAMESPACE_ID::Timestamp* deleted_at) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete reinterpret_cast< ::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.deleted_at_);
  }
  if (deleted_at) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(
                reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(deleted_at));
    if (message_arena != submessage_arena) {
      deleted_at = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, deleted_at, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000008u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000008u;
  }
  _impl_.deleted_at_ = deleted_at;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfile.deleted_at)
}

// -------------------------------------------------------------------

// EncryptionProfileFilter

// string text = 1;
inline void EncryptionProfileFilter::clear_text() {
  _impl_.text_.ClearToEmpty();
}
inline const std::string& EncryptionProfileFilter::text() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfileFilter.text)
  return _internal_text();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void EncryptionProfileFilter::set_text(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.text_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfileFilter.text)
}
inline std::string* EncryptionProfileFilter::mutable_text() {
  std::string* _s = _internal_mutable_text();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfileFilter.text)
  return _s;
}
inline const std::string& EncryptionProfileFilter::_internal_text() const {
  return _impl_.text_.Get();
}
inline void EncryptionProfileFilter::_internal_set_text(const std::string& value) {
  ;


  _impl_.text_.Set(value, GetArenaForAllocation());
}
inline std::string* EncryptionProfileFilter::_internal_mutable_text() {
  ;
  return _impl_.text_.Mutable( GetArenaForAllocation());
}
inline std::string* EncryptionProfileFilter::release_text() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfileFilter.text)
  return _impl_.text_.Release();
}
inline void EncryptionProfileFilter::set_allocated_text(std::string* value) {
  _impl_.text_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.text_.IsDefault()) {
          _impl_.text_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfileFilter.text)
}

// repeated .keyapis.encryption_profile.v1.EncryptionProfile.Type types = 2;
inline int EncryptionProfileFilter::_internal_types_size() const {
  return _impl_.types_.size();
}
inline int EncryptionProfileFilter::types_size() const {
  return _internal_types_size();
}
inline void EncryptionProfileFilter::clear_types() {
  _internal_mutable_types()->Clear();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_Type EncryptionProfileFilter::types(int index) const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfileFilter.types)
  return _internal_types(index);
}
inline void EncryptionProfileFilter::set_types(int index, ::keyapis::encryption_profile::v1::EncryptionProfile_Type value) {
  _internal_mutable_types()->Set(index, value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfileFilter.types)
}
inline void EncryptionProfileFilter::add_types(::keyapis::encryption_profile::v1::EncryptionProfile_Type value) {
  _internal_add_types(value);
  // @@protoc_insertion_point(field_add:keyapis.encryption_profile.v1.EncryptionProfileFilter.types)
}
inline const ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>& EncryptionProfileFilter::types() const {
  // @@protoc_insertion_point(field_list:keyapis.encryption_profile.v1.EncryptionProfileFilter.types)
  return _internal_types();
}
inline ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>* EncryptionProfileFilter::mutable_types() {
  // @@protoc_insertion_point(field_mutable_list:keyapis.encryption_profile.v1.EncryptionProfileFilter.types)
  return _internal_mutable_types();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_Type EncryptionProfileFilter::_internal_types(int index) const {
  return static_cast<::keyapis::encryption_profile::v1::EncryptionProfile_Type>(_internal_types().Get(index));
}
inline void EncryptionProfileFilter::_internal_add_types(::keyapis::encryption_profile::v1::EncryptionProfile_Type value) {
  _internal_mutable_types()->Add(value);
}
inline const ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>& EncryptionProfileFilter::_internal_types() const {
  return _impl_.types_;
}
inline ::PROTOBUF_NAMESPACE_ID::RepeatedField<int>* EncryptionProfileFilter::_internal_mutable_types() {
  return &_impl_.types_;
}

// .google.protobuf.BoolValue show_deleted = 3;
inline bool EncryptionProfileFilter::has_show_deleted() const {
  bool value = (_impl_._has_bits_[0] & 0x00000001u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.show_deleted_ != nullptr);
  return value;
}
inline const ::PROTOBUF_NAMESPACE_ID::BoolValue& EncryptionProfileFilter::_internal_show_deleted() const {
  const ::PROTOBUF_NAMESPACE_ID::BoolValue* p = _impl_.show_deleted_;
  return p != nullptr ? *p : reinterpret_cast<const ::PROTOBUF_NAMESPACE_ID::BoolValue&>(
      ::PROTOBUF_NAMESPACE_ID::_BoolValue_default_instance_);
}
inline const ::PROTOBUF_NAMESPACE_ID::BoolValue& EncryptionProfileFilter::show_deleted() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfileFilter.show_deleted)
  return _internal_show_deleted();
}
inline void EncryptionProfileFilter::unsafe_arena_set_allocated_show_deleted(
    ::PROTOBUF_NAMESPACE_ID::BoolValue* show_deleted) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.show_deleted_);
  }
  _impl_.show_deleted_ = show_deleted;
  if (show_deleted) {
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.EncryptionProfileFilter.show_deleted)
}
inline ::PROTOBUF_NAMESPACE_ID::BoolValue* EncryptionProfileFilter::release_show_deleted() {
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::PROTOBUF_NAMESPACE_ID::BoolValue* temp = _impl_.show_deleted_;
  _impl_.show_deleted_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::BoolValue* EncryptionProfileFilter::unsafe_arena_release_show_deleted() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.EncryptionProfileFilter.show_deleted)
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::PROTOBUF_NAMESPACE_ID::BoolValue* temp = _impl_.show_deleted_;
  _impl_.show_deleted_ = nullptr;
  return temp;
}
inline ::PROTOBUF_NAMESPACE_ID::BoolValue* EncryptionProfileFilter::_internal_mutable_show_deleted() {
  _impl_._has_bits_[0] |= 0x00000001u;
  if (_impl_.show_deleted_ == nullptr) {
    auto* p = CreateMaybeMessage<::PROTOBUF_NAMESPACE_ID::BoolValue>(GetArenaForAllocation());
    _impl_.show_deleted_ = p;
  }
  return _impl_.show_deleted_;
}
inline ::PROTOBUF_NAMESPACE_ID::BoolValue* EncryptionProfileFilter::mutable_show_deleted() {
  ::PROTOBUF_NAMESPACE_ID::BoolValue* _msg = _internal_mutable_show_deleted();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.EncryptionProfileFilter.show_deleted)
  return _msg;
}
inline void EncryptionProfileFilter::set_allocated_show_deleted(::PROTOBUF_NAMESPACE_ID::BoolValue* show_deleted) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete reinterpret_cast< ::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.show_deleted_);
  }
  if (show_deleted) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(
                reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(show_deleted));
    if (message_arena != submessage_arena) {
      show_deleted = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, show_deleted, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  _impl_.show_deleted_ = show_deleted;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.EncryptionProfileFilter.show_deleted)
}

// -------------------------------------------------------------------

// EncryptionProfilePaging

// .keyapis.encryption_profile.v1.EncryptionProfilePaging.OrderByType order_by_type = 1;
inline void EncryptionProfilePaging::clear_order_by_type() {
  _impl_.order_by_type_ = 0;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType EncryptionProfilePaging::order_by_type() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfilePaging.order_by_type)
  return _internal_order_by_type();
}
inline void EncryptionProfilePaging::set_order_by_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType value) {
   _internal_set_order_by_type(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfilePaging.order_by_type)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType EncryptionProfilePaging::_internal_order_by_type() const {
  return static_cast<::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType>(_impl_.order_by_type_);
}
inline void EncryptionProfilePaging::_internal_set_order_by_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType value) {
  ;
  _impl_.order_by_type_ = value;
}

// .keyapis.encryption_profile.v1.EncryptionProfilePaging.DirectionType direction_type = 2;
inline void EncryptionProfilePaging::clear_direction_type() {
  _impl_.direction_type_ = 0;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType EncryptionProfilePaging::direction_type() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfilePaging.direction_type)
  return _internal_direction_type();
}
inline void EncryptionProfilePaging::set_direction_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType value) {
   _internal_set_direction_type(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfilePaging.direction_type)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType EncryptionProfilePaging::_internal_direction_type() const {
  return static_cast<::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType>(_impl_.direction_type_);
}
inline void EncryptionProfilePaging::_internal_set_direction_type(::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType value) {
  ;
  _impl_.direction_type_ = value;
}

// int32 limit = 3;
inline void EncryptionProfilePaging::clear_limit() {
  _impl_.limit_ = 0;
}
inline ::int32_t EncryptionProfilePaging::limit() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfilePaging.limit)
  return _internal_limit();
}
inline void EncryptionProfilePaging::set_limit(::int32_t value) {
  _internal_set_limit(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfilePaging.limit)
}
inline ::int32_t EncryptionProfilePaging::_internal_limit() const {
  return _impl_.limit_;
}
inline void EncryptionProfilePaging::_internal_set_limit(::int32_t value) {
  ;
  _impl_.limit_ = value;
}

// int32 offset = 4;
inline void EncryptionProfilePaging::clear_offset() {
  _impl_.offset_ = 0;
}
inline ::int32_t EncryptionProfilePaging::offset() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.EncryptionProfilePaging.offset)
  return _internal_offset();
}
inline void EncryptionProfilePaging::set_offset(::int32_t value) {
  _internal_set_offset(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.EncryptionProfilePaging.offset)
}
inline ::int32_t EncryptionProfilePaging::_internal_offset() const {
  return _impl_.offset_;
}
inline void EncryptionProfilePaging::_internal_set_offset(::int32_t value) {
  ;
  _impl_.offset_ = value;
}

// -------------------------------------------------------------------

// PostEncryptionProfileRequest

// .keyapis.encryption_profile.v1.EncryptionProfile data = 1 [(.google.api.field_behavior) = REQUIRED];
inline bool PostEncryptionProfileRequest::has_data() const {
  bool value = (_impl_._has_bits_[0] & 0x00000001u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.data_ != nullptr);
  return value;
}
inline void PostEncryptionProfileRequest::clear_data() {
  if (_impl_.data_ != nullptr) _impl_.data_->Clear();
  _impl_._has_bits_[0] &= ~0x00000001u;
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& PostEncryptionProfileRequest::_internal_data() const {
  const ::keyapis::encryption_profile::v1::EncryptionProfile* p = _impl_.data_;
  return p != nullptr ? *p : reinterpret_cast<const ::keyapis::encryption_profile::v1::EncryptionProfile&>(
      ::keyapis::encryption_profile::v1::_EncryptionProfile_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& PostEncryptionProfileRequest::data() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.PostEncryptionProfileRequest.data)
  return _internal_data();
}
inline void PostEncryptionProfileRequest::unsafe_arena_set_allocated_data(
    ::keyapis::encryption_profile::v1::EncryptionProfile* data) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.data_);
  }
  _impl_.data_ = data;
  if (data) {
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileRequest.data)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileRequest::release_data() {
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.data_;
  _impl_.data_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileRequest::unsafe_arena_release_data() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.PostEncryptionProfileRequest.data)
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.data_;
  _impl_.data_ = nullptr;
  return temp;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileRequest::_internal_mutable_data() {
  _impl_._has_bits_[0] |= 0x00000001u;
  if (_impl_.data_ == nullptr) {
    auto* p = CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfile>(GetArenaForAllocation());
    _impl_.data_ = p;
  }
  return _impl_.data_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileRequest::mutable_data() {
  ::keyapis::encryption_profile::v1::EncryptionProfile* _msg = _internal_mutable_data();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.PostEncryptionProfileRequest.data)
  return _msg;
}
inline void PostEncryptionProfileRequest::set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete _impl_.data_;
  }
  if (data) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(data);
    if (message_arena != submessage_arena) {
      data = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, data, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  _impl_.data_ = data;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileRequest.data)
}

// -------------------------------------------------------------------

// PostEncryptionProfileResponse_Error

// .keyapis.encryption_profile.v1.ValidationError validation = 1;
inline bool PostEncryptionProfileResponse_Error::has_validation() const {
  return reason_case() == kValidation;
}
inline bool PostEncryptionProfileResponse_Error::_internal_has_validation() const {
  return reason_case() == kValidation;
}
inline void PostEncryptionProfileResponse_Error::set_has_validation() {
  _impl_._oneof_case_[0] = kValidation;
}
inline void PostEncryptionProfileResponse_Error::clear_validation() {
  if (reason_case() == kValidation) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.validation_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::ValidationError* PostEncryptionProfileResponse_Error::release_validation() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::ValidationError& PostEncryptionProfileResponse_Error::_internal_validation() const {
  return reason_case() == kValidation
      ? *_impl_.reason_.validation_
      : reinterpret_cast<::keyapis::encryption_profile::v1::ValidationError&>(::keyapis::encryption_profile::v1::_ValidationError_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::ValidationError& PostEncryptionProfileResponse_Error::validation() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.validation)
  return _internal_validation();
}
inline ::keyapis::encryption_profile::v1::ValidationError* PostEncryptionProfileResponse_Error::unsafe_arena_release_validation() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void PostEncryptionProfileResponse_Error::unsafe_arena_set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation) {
  clear_reason();
  if (validation) {
    set_has_validation();
    _impl_.reason_.validation_ = validation;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.validation)
}
inline ::keyapis::encryption_profile::v1::ValidationError* PostEncryptionProfileResponse_Error::_internal_mutable_validation() {
  if (reason_case() != kValidation) {
    clear_reason();
    set_has_validation();
    _impl_.reason_.validation_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::ValidationError >(GetArenaForAllocation());
  }
  return _impl_.reason_.validation_;
}
inline ::keyapis::encryption_profile::v1::ValidationError* PostEncryptionProfileResponse_Error::mutable_validation() {
  ::keyapis::encryption_profile::v1::ValidationError* _msg = _internal_mutable_validation();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.validation)
  return _msg;
}

// .keyapis.encryption_profile.v1.EncryptionProfile.SavingError saving = 2;
inline bool PostEncryptionProfileResponse_Error::has_saving() const {
  return reason_case() == kSaving;
}
inline bool PostEncryptionProfileResponse_Error::_internal_has_saving() const {
  return reason_case() == kSaving;
}
inline void PostEncryptionProfileResponse_Error::set_has_saving() {
  _impl_._oneof_case_[0] = kSaving;
}
inline void PostEncryptionProfileResponse_Error::clear_saving() {
  if (reason_case() == kSaving) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.saving_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* PostEncryptionProfileResponse_Error::release_saving() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.saving)
  if (reason_case() == kSaving) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* temp = _impl_.reason_.saving_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.saving_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError& PostEncryptionProfileResponse_Error::_internal_saving() const {
  return reason_case() == kSaving
      ? *_impl_.reason_.saving_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfile_SavingError&>(::keyapis::encryption_profile::v1::_EncryptionProfile_SavingError_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError& PostEncryptionProfileResponse_Error::saving() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.saving)
  return _internal_saving();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* PostEncryptionProfileResponse_Error::unsafe_arena_release_saving() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.saving)
  if (reason_case() == kSaving) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* temp = _impl_.reason_.saving_;
    _impl_.reason_.saving_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void PostEncryptionProfileResponse_Error::unsafe_arena_set_allocated_saving(::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* saving) {
  clear_reason();
  if (saving) {
    set_has_saving();
    _impl_.reason_.saving_ = saving;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.saving)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* PostEncryptionProfileResponse_Error::_internal_mutable_saving() {
  if (reason_case() != kSaving) {
    clear_reason();
    set_has_saving();
    _impl_.reason_.saving_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError >(GetArenaForAllocation());
  }
  return _impl_.reason_.saving_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* PostEncryptionProfileResponse_Error::mutable_saving() {
  ::keyapis::encryption_profile::v1::EncryptionProfile_SavingError* _msg = _internal_mutable_saving();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error.saving)
  return _msg;
}

inline bool PostEncryptionProfileResponse_Error::has_reason() const {
  return reason_case() != REASON_NOT_SET;
}
inline void PostEncryptionProfileResponse_Error::clear_has_reason() {
  _impl_._oneof_case_[0] = REASON_NOT_SET;
}
inline PostEncryptionProfileResponse_Error::ReasonCase PostEncryptionProfileResponse_Error::reason_case() const {
  return PostEncryptionProfileResponse_Error::ReasonCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// PostEncryptionProfileResponse

// .keyapis.encryption_profile.v1.EncryptionProfile data = 1;
inline bool PostEncryptionProfileResponse::has_data() const {
  return type_case() == kData;
}
inline bool PostEncryptionProfileResponse::_internal_has_data() const {
  return type_case() == kData;
}
inline void PostEncryptionProfileResponse::set_has_data() {
  _impl_._oneof_case_[0] = kData;
}
inline void PostEncryptionProfileResponse::clear_data() {
  if (type_case() == kData) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.data_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileResponse::release_data() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.data)
  if (type_case() == kData) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.type_.data_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.data_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& PostEncryptionProfileResponse::_internal_data() const {
  return type_case() == kData
      ? *_impl_.type_.data_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfile&>(::keyapis::encryption_profile::v1::_EncryptionProfile_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& PostEncryptionProfileResponse::data() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.data)
  return _internal_data();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileResponse::unsafe_arena_release_data() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.data)
  if (type_case() == kData) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.type_.data_;
    _impl_.type_.data_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void PostEncryptionProfileResponse::unsafe_arena_set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data) {
  clear_type();
  if (data) {
    set_has_data();
    _impl_.type_.data_ = data;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.data)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileResponse::_internal_mutable_data() {
  if (type_case() != kData) {
    clear_type();
    set_has_data();
    _impl_.type_.data_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfile >(GetArenaForAllocation());
  }
  return _impl_.type_.data_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* PostEncryptionProfileResponse::mutable_data() {
  ::keyapis::encryption_profile::v1::EncryptionProfile* _msg = _internal_mutable_data();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.data)
  return _msg;
}

// .keyapis.encryption_profile.v1.PostEncryptionProfileResponse.Error error = 2;
inline bool PostEncryptionProfileResponse::has_error() const {
  return type_case() == kError;
}
inline bool PostEncryptionProfileResponse::_internal_has_error() const {
  return type_case() == kError;
}
inline void PostEncryptionProfileResponse::set_has_error() {
  _impl_._oneof_case_[0] = kError;
}
inline void PostEncryptionProfileResponse::clear_error() {
  if (type_case() == kError) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.error_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* PostEncryptionProfileResponse::release_error() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* temp = _impl_.type_.error_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error& PostEncryptionProfileResponse::_internal_error() const {
  return type_case() == kError
      ? *_impl_.type_.error_
      : reinterpret_cast<::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error&>(::keyapis::encryption_profile::v1::_PostEncryptionProfileResponse_Error_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error& PostEncryptionProfileResponse::error() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.error)
  return _internal_error();
}
inline ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* PostEncryptionProfileResponse::unsafe_arena_release_error() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* temp = _impl_.type_.error_;
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void PostEncryptionProfileResponse::unsafe_arena_set_allocated_error(::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* error) {
  clear_type();
  if (error) {
    set_has_error();
    _impl_.type_.error_ = error;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.error)
}
inline ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* PostEncryptionProfileResponse::_internal_mutable_error() {
  if (type_case() != kError) {
    clear_type();
    set_has_error();
    _impl_.type_.error_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error >(GetArenaForAllocation());
  }
  return _impl_.type_.error_;
}
inline ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* PostEncryptionProfileResponse::mutable_error() {
  ::keyapis::encryption_profile::v1::PostEncryptionProfileResponse_Error* _msg = _internal_mutable_error();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.PostEncryptionProfileResponse.error)
  return _msg;
}

inline bool PostEncryptionProfileResponse::has_type() const {
  return type_case() != TYPE_NOT_SET;
}
inline void PostEncryptionProfileResponse::clear_has_type() {
  _impl_._oneof_case_[0] = TYPE_NOT_SET;
}
inline PostEncryptionProfileResponse::TypeCase PostEncryptionProfileResponse::type_case() const {
  return PostEncryptionProfileResponse::TypeCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileListRequest

// .keyapis.encryption_profile.v1.EncryptionProfileFilter filter = 1;
inline bool GetEncryptionProfileListRequest::has_filter() const {
  bool value = (_impl_._has_bits_[0] & 0x00000001u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.filter_ != nullptr);
  return value;
}
inline void GetEncryptionProfileListRequest::clear_filter() {
  if (_impl_.filter_ != nullptr) _impl_.filter_->Clear();
  _impl_._has_bits_[0] &= ~0x00000001u;
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& GetEncryptionProfileListRequest::_internal_filter() const {
  const ::keyapis::encryption_profile::v1::EncryptionProfileFilter* p = _impl_.filter_;
  return p != nullptr ? *p : reinterpret_cast<const ::keyapis::encryption_profile::v1::EncryptionProfileFilter&>(
      ::keyapis::encryption_profile::v1::_EncryptionProfileFilter_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& GetEncryptionProfileListRequest::filter() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.filter)
  return _internal_filter();
}
inline void GetEncryptionProfileListRequest::unsafe_arena_set_allocated_filter(
    ::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.filter_);
  }
  _impl_.filter_ = filter;
  if (filter) {
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.filter)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileListRequest::release_filter() {
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* temp = _impl_.filter_;
  _impl_.filter_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileListRequest::unsafe_arena_release_filter() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.filter)
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* temp = _impl_.filter_;
  _impl_.filter_ = nullptr;
  return temp;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileListRequest::_internal_mutable_filter() {
  _impl_._has_bits_[0] |= 0x00000001u;
  if (_impl_.filter_ == nullptr) {
    auto* p = CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfileFilter>(GetArenaForAllocation());
    _impl_.filter_ = p;
  }
  return _impl_.filter_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileListRequest::mutable_filter() {
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* _msg = _internal_mutable_filter();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.filter)
  return _msg;
}
inline void GetEncryptionProfileListRequest::set_allocated_filter(::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete _impl_.filter_;
  }
  if (filter) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(filter);
    if (message_arena != submessage_arena) {
      filter = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, filter, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  _impl_.filter_ = filter;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.filter)
}

// .keyapis.encryption_profile.v1.EncryptionProfilePaging paging = 2;
inline bool GetEncryptionProfileListRequest::has_paging() const {
  return pagination_case() == kPaging;
}
inline bool GetEncryptionProfileListRequest::_internal_has_paging() const {
  return pagination_case() == kPaging;
}
inline void GetEncryptionProfileListRequest::set_has_paging() {
  _impl_._oneof_case_[0] = kPaging;
}
inline void GetEncryptionProfileListRequest::clear_paging() {
  if (pagination_case() == kPaging) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.pagination_.paging_;
    }
    clear_has_pagination();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging* GetEncryptionProfileListRequest::release_paging() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.paging)
  if (pagination_case() == kPaging) {
    clear_has_pagination();
    ::keyapis::encryption_profile::v1::EncryptionProfilePaging* temp = _impl_.pagination_.paging_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.pagination_.paging_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfilePaging& GetEncryptionProfileListRequest::_internal_paging() const {
  return pagination_case() == kPaging
      ? *_impl_.pagination_.paging_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfilePaging&>(::keyapis::encryption_profile::v1::_EncryptionProfilePaging_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfilePaging& GetEncryptionProfileListRequest::paging() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.paging)
  return _internal_paging();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging* GetEncryptionProfileListRequest::unsafe_arena_release_paging() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.paging)
  if (pagination_case() == kPaging) {
    clear_has_pagination();
    ::keyapis::encryption_profile::v1::EncryptionProfilePaging* temp = _impl_.pagination_.paging_;
    _impl_.pagination_.paging_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileListRequest::unsafe_arena_set_allocated_paging(::keyapis::encryption_profile::v1::EncryptionProfilePaging* paging) {
  clear_pagination();
  if (paging) {
    set_has_paging();
    _impl_.pagination_.paging_ = paging;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.paging)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging* GetEncryptionProfileListRequest::_internal_mutable_paging() {
  if (pagination_case() != kPaging) {
    clear_pagination();
    set_has_paging();
    _impl_.pagination_.paging_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfilePaging >(GetArenaForAllocation());
  }
  return _impl_.pagination_.paging_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfilePaging* GetEncryptionProfileListRequest::mutable_paging() {
  ::keyapis::encryption_profile::v1::EncryptionProfilePaging* _msg = _internal_mutable_paging();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileListRequest.paging)
  return _msg;
}

inline bool GetEncryptionProfileListRequest::has_pagination() const {
  return pagination_case() != PAGINATION_NOT_SET;
}
inline void GetEncryptionProfileListRequest::clear_has_pagination() {
  _impl_._oneof_case_[0] = PAGINATION_NOT_SET;
}
inline GetEncryptionProfileListRequest::PaginationCase GetEncryptionProfileListRequest::pagination_case() const {
  return GetEncryptionProfileListRequest::PaginationCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileListResponse_Error

// .keyapis.encryption_profile.v1.ValidationError validation = 1;
inline bool GetEncryptionProfileListResponse_Error::has_validation() const {
  return reason_case() == kValidation;
}
inline bool GetEncryptionProfileListResponse_Error::_internal_has_validation() const {
  return reason_case() == kValidation;
}
inline void GetEncryptionProfileListResponse_Error::set_has_validation() {
  _impl_._oneof_case_[0] = kValidation;
}
inline void GetEncryptionProfileListResponse_Error::clear_validation() {
  if (reason_case() == kValidation) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.validation_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileListResponse_Error::release_validation() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::ValidationError& GetEncryptionProfileListResponse_Error::_internal_validation() const {
  return reason_case() == kValidation
      ? *_impl_.reason_.validation_
      : reinterpret_cast<::keyapis::encryption_profile::v1::ValidationError&>(::keyapis::encryption_profile::v1::_ValidationError_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::ValidationError& GetEncryptionProfileListResponse_Error::validation() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error.validation)
  return _internal_validation();
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileListResponse_Error::unsafe_arena_release_validation() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileListResponse_Error::unsafe_arena_set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation) {
  clear_reason();
  if (validation) {
    set_has_validation();
    _impl_.reason_.validation_ = validation;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error.validation)
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileListResponse_Error::_internal_mutable_validation() {
  if (reason_case() != kValidation) {
    clear_reason();
    set_has_validation();
    _impl_.reason_.validation_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::ValidationError >(GetArenaForAllocation());
  }
  return _impl_.reason_.validation_;
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileListResponse_Error::mutable_validation() {
  ::keyapis::encryption_profile::v1::ValidationError* _msg = _internal_mutable_validation();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error.validation)
  return _msg;
}

inline bool GetEncryptionProfileListResponse_Error::has_reason() const {
  return reason_case() != REASON_NOT_SET;
}
inline void GetEncryptionProfileListResponse_Error::clear_has_reason() {
  _impl_._oneof_case_[0] = REASON_NOT_SET;
}
inline GetEncryptionProfileListResponse_Error::ReasonCase GetEncryptionProfileListResponse_Error::reason_case() const {
  return GetEncryptionProfileListResponse_Error::ReasonCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileListResponse

// .keyapis.encryption_profile.v1.EncryptionProfile data = 1;
inline bool GetEncryptionProfileListResponse::has_data() const {
  return type_case() == kData;
}
inline bool GetEncryptionProfileListResponse::_internal_has_data() const {
  return type_case() == kData;
}
inline void GetEncryptionProfileListResponse::set_has_data() {
  _impl_._oneof_case_[0] = kData;
}
inline void GetEncryptionProfileListResponse::clear_data() {
  if (type_case() == kData) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.data_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileListResponse::release_data() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.data)
  if (type_case() == kData) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.type_.data_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.data_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& GetEncryptionProfileListResponse::_internal_data() const {
  return type_case() == kData
      ? *_impl_.type_.data_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfile&>(::keyapis::encryption_profile::v1::_EncryptionProfile_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& GetEncryptionProfileListResponse::data() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.data)
  return _internal_data();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileListResponse::unsafe_arena_release_data() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.data)
  if (type_case() == kData) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.type_.data_;
    _impl_.type_.data_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileListResponse::unsafe_arena_set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data) {
  clear_type();
  if (data) {
    set_has_data();
    _impl_.type_.data_ = data;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.data)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileListResponse::_internal_mutable_data() {
  if (type_case() != kData) {
    clear_type();
    set_has_data();
    _impl_.type_.data_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfile >(GetArenaForAllocation());
  }
  return _impl_.type_.data_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileListResponse::mutable_data() {
  ::keyapis::encryption_profile::v1::EncryptionProfile* _msg = _internal_mutable_data();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.data)
  return _msg;
}

// .keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.Error error = 2;
inline bool GetEncryptionProfileListResponse::has_error() const {
  return type_case() == kError;
}
inline bool GetEncryptionProfileListResponse::_internal_has_error() const {
  return type_case() == kError;
}
inline void GetEncryptionProfileListResponse::set_has_error() {
  _impl_._oneof_case_[0] = kError;
}
inline void GetEncryptionProfileListResponse::clear_error() {
  if (type_case() == kError) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.error_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* GetEncryptionProfileListResponse::release_error() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* temp = _impl_.type_.error_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error& GetEncryptionProfileListResponse::_internal_error() const {
  return type_case() == kError
      ? *_impl_.type_.error_
      : reinterpret_cast<::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error&>(::keyapis::encryption_profile::v1::_GetEncryptionProfileListResponse_Error_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error& GetEncryptionProfileListResponse::error() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.error)
  return _internal_error();
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* GetEncryptionProfileListResponse::unsafe_arena_release_error() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* temp = _impl_.type_.error_;
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileListResponse::unsafe_arena_set_allocated_error(::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* error) {
  clear_type();
  if (error) {
    set_has_error();
    _impl_.type_.error_ = error;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.error)
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* GetEncryptionProfileListResponse::_internal_mutable_error() {
  if (type_case() != kError) {
    clear_type();
    set_has_error();
    _impl_.type_.error_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error >(GetArenaForAllocation());
  }
  return _impl_.type_.error_;
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* GetEncryptionProfileListResponse::mutable_error() {
  ::keyapis::encryption_profile::v1::GetEncryptionProfileListResponse_Error* _msg = _internal_mutable_error();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileListResponse.error)
  return _msg;
}

inline bool GetEncryptionProfileListResponse::has_type() const {
  return type_case() != TYPE_NOT_SET;
}
inline void GetEncryptionProfileListResponse::clear_has_type() {
  _impl_._oneof_case_[0] = TYPE_NOT_SET;
}
inline GetEncryptionProfileListResponse::TypeCase GetEncryptionProfileListResponse::type_case() const {
  return GetEncryptionProfileListResponse::TypeCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileRequest

// string id = 1 [(.google.api.field_behavior) = REQUIRED];
inline void GetEncryptionProfileRequest::clear_id() {
  _impl_.id_.ClearToEmpty();
}
inline const std::string& GetEncryptionProfileRequest::id() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileRequest.id)
  return _internal_id();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void GetEncryptionProfileRequest::set_id(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.id_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.GetEncryptionProfileRequest.id)
}
inline std::string* GetEncryptionProfileRequest::mutable_id() {
  std::string* _s = _internal_mutable_id();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileRequest.id)
  return _s;
}
inline const std::string& GetEncryptionProfileRequest::_internal_id() const {
  return _impl_.id_.Get();
}
inline void GetEncryptionProfileRequest::_internal_set_id(const std::string& value) {
  ;


  _impl_.id_.Set(value, GetArenaForAllocation());
}
inline std::string* GetEncryptionProfileRequest::_internal_mutable_id() {
  ;
  return _impl_.id_.Mutable( GetArenaForAllocation());
}
inline std::string* GetEncryptionProfileRequest::release_id() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileRequest.id)
  return _impl_.id_.Release();
}
inline void GetEncryptionProfileRequest::set_allocated_id(std::string* value) {
  _impl_.id_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.id_.IsDefault()) {
          _impl_.id_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileRequest.id)
}

// -------------------------------------------------------------------

// GetEncryptionProfileResponse_Error

// .keyapis.encryption_profile.v1.ValidationError validation = 1;
inline bool GetEncryptionProfileResponse_Error::has_validation() const {
  return reason_case() == kValidation;
}
inline bool GetEncryptionProfileResponse_Error::_internal_has_validation() const {
  return reason_case() == kValidation;
}
inline void GetEncryptionProfileResponse_Error::set_has_validation() {
  _impl_._oneof_case_[0] = kValidation;
}
inline void GetEncryptionProfileResponse_Error::clear_validation() {
  if (reason_case() == kValidation) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.validation_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileResponse_Error::release_validation() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::ValidationError& GetEncryptionProfileResponse_Error::_internal_validation() const {
  return reason_case() == kValidation
      ? *_impl_.reason_.validation_
      : reinterpret_cast<::keyapis::encryption_profile::v1::ValidationError&>(::keyapis::encryption_profile::v1::_ValidationError_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::ValidationError& GetEncryptionProfileResponse_Error::validation() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error.validation)
  return _internal_validation();
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileResponse_Error::unsafe_arena_release_validation() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileResponse_Error::unsafe_arena_set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation) {
  clear_reason();
  if (validation) {
    set_has_validation();
    _impl_.reason_.validation_ = validation;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error.validation)
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileResponse_Error::_internal_mutable_validation() {
  if (reason_case() != kValidation) {
    clear_reason();
    set_has_validation();
    _impl_.reason_.validation_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::ValidationError >(GetArenaForAllocation());
  }
  return _impl_.reason_.validation_;
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileResponse_Error::mutable_validation() {
  ::keyapis::encryption_profile::v1::ValidationError* _msg = _internal_mutable_validation();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error.validation)
  return _msg;
}

inline bool GetEncryptionProfileResponse_Error::has_reason() const {
  return reason_case() != REASON_NOT_SET;
}
inline void GetEncryptionProfileResponse_Error::clear_has_reason() {
  _impl_._oneof_case_[0] = REASON_NOT_SET;
}
inline GetEncryptionProfileResponse_Error::ReasonCase GetEncryptionProfileResponse_Error::reason_case() const {
  return GetEncryptionProfileResponse_Error::ReasonCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileResponse

// .keyapis.encryption_profile.v1.EncryptionProfile data = 1;
inline bool GetEncryptionProfileResponse::has_data() const {
  return type_case() == kData;
}
inline bool GetEncryptionProfileResponse::_internal_has_data() const {
  return type_case() == kData;
}
inline void GetEncryptionProfileResponse::set_has_data() {
  _impl_._oneof_case_[0] = kData;
}
inline void GetEncryptionProfileResponse::clear_data() {
  if (type_case() == kData) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.data_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileResponse::release_data() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.data)
  if (type_case() == kData) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.type_.data_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.data_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& GetEncryptionProfileResponse::_internal_data() const {
  return type_case() == kData
      ? *_impl_.type_.data_
      : reinterpret_cast<::keyapis::encryption_profile::v1::EncryptionProfile&>(::keyapis::encryption_profile::v1::_EncryptionProfile_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfile& GetEncryptionProfileResponse::data() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.data)
  return _internal_data();
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileResponse::unsafe_arena_release_data() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.data)
  if (type_case() == kData) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::EncryptionProfile* temp = _impl_.type_.data_;
    _impl_.type_.data_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileResponse::unsafe_arena_set_allocated_data(::keyapis::encryption_profile::v1::EncryptionProfile* data) {
  clear_type();
  if (data) {
    set_has_data();
    _impl_.type_.data_ = data;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.data)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileResponse::_internal_mutable_data() {
  if (type_case() != kData) {
    clear_type();
    set_has_data();
    _impl_.type_.data_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::EncryptionProfile >(GetArenaForAllocation());
  }
  return _impl_.type_.data_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfile* GetEncryptionProfileResponse::mutable_data() {
  ::keyapis::encryption_profile::v1::EncryptionProfile* _msg = _internal_mutable_data();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.data)
  return _msg;
}

// .keyapis.encryption_profile.v1.GetEncryptionProfileResponse.Error error = 2;
inline bool GetEncryptionProfileResponse::has_error() const {
  return type_case() == kError;
}
inline bool GetEncryptionProfileResponse::_internal_has_error() const {
  return type_case() == kError;
}
inline void GetEncryptionProfileResponse::set_has_error() {
  _impl_._oneof_case_[0] = kError;
}
inline void GetEncryptionProfileResponse::clear_error() {
  if (type_case() == kError) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.error_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* GetEncryptionProfileResponse::release_error() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* temp = _impl_.type_.error_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error& GetEncryptionProfileResponse::_internal_error() const {
  return type_case() == kError
      ? *_impl_.type_.error_
      : reinterpret_cast<::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error&>(::keyapis::encryption_profile::v1::_GetEncryptionProfileResponse_Error_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error& GetEncryptionProfileResponse::error() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.error)
  return _internal_error();
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* GetEncryptionProfileResponse::unsafe_arena_release_error() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* temp = _impl_.type_.error_;
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileResponse::unsafe_arena_set_allocated_error(::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* error) {
  clear_type();
  if (error) {
    set_has_error();
    _impl_.type_.error_ = error;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.error)
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* GetEncryptionProfileResponse::_internal_mutable_error() {
  if (type_case() != kError) {
    clear_type();
    set_has_error();
    _impl_.type_.error_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error >(GetArenaForAllocation());
  }
  return _impl_.type_.error_;
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* GetEncryptionProfileResponse::mutable_error() {
  ::keyapis::encryption_profile::v1::GetEncryptionProfileResponse_Error* _msg = _internal_mutable_error();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileResponse.error)
  return _msg;
}

inline bool GetEncryptionProfileResponse::has_type() const {
  return type_case() != TYPE_NOT_SET;
}
inline void GetEncryptionProfileResponse::clear_has_type() {
  _impl_._oneof_case_[0] = TYPE_NOT_SET;
}
inline GetEncryptionProfileResponse::TypeCase GetEncryptionProfileResponse::type_case() const {
  return GetEncryptionProfileResponse::TypeCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileCountRequest

// .keyapis.encryption_profile.v1.EncryptionProfileFilter filter = 1;
inline bool GetEncryptionProfileCountRequest::has_filter() const {
  bool value = (_impl_._has_bits_[0] & 0x00000001u) != 0;
  PROTOBUF_ASSUME(!value || _impl_.filter_ != nullptr);
  return value;
}
inline void GetEncryptionProfileCountRequest::clear_filter() {
  if (_impl_.filter_ != nullptr) _impl_.filter_->Clear();
  _impl_._has_bits_[0] &= ~0x00000001u;
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& GetEncryptionProfileCountRequest::_internal_filter() const {
  const ::keyapis::encryption_profile::v1::EncryptionProfileFilter* p = _impl_.filter_;
  return p != nullptr ? *p : reinterpret_cast<const ::keyapis::encryption_profile::v1::EncryptionProfileFilter&>(
      ::keyapis::encryption_profile::v1::_EncryptionProfileFilter_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::EncryptionProfileFilter& GetEncryptionProfileCountRequest::filter() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest.filter)
  return _internal_filter();
}
inline void GetEncryptionProfileCountRequest::unsafe_arena_set_allocated_filter(
    ::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter) {
  if (GetArenaForAllocation() == nullptr) {
    delete reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(_impl_.filter_);
  }
  _impl_.filter_ = filter;
  if (filter) {
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest.filter)
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileCountRequest::release_filter() {
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* temp = _impl_.filter_;
  _impl_.filter_ = nullptr;
#ifdef PROTOBUF_FORCE_COPY_IN_RELEASE
  auto* old =  reinterpret_cast<::PROTOBUF_NAMESPACE_ID::MessageLite*>(temp);
  temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  if (GetArenaForAllocation() == nullptr) { delete old; }
#else  // PROTOBUF_FORCE_COPY_IN_RELEASE
  if (GetArenaForAllocation() != nullptr) {
    temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
  }
#endif  // !PROTOBUF_FORCE_COPY_IN_RELEASE
  return temp;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileCountRequest::unsafe_arena_release_filter() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest.filter)
  _impl_._has_bits_[0] &= ~0x00000001u;
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* temp = _impl_.filter_;
  _impl_.filter_ = nullptr;
  return temp;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileCountRequest::_internal_mutable_filter() {
  _impl_._has_bits_[0] |= 0x00000001u;
  if (_impl_.filter_ == nullptr) {
    auto* p = CreateMaybeMessage<::keyapis::encryption_profile::v1::EncryptionProfileFilter>(GetArenaForAllocation());
    _impl_.filter_ = p;
  }
  return _impl_.filter_;
}
inline ::keyapis::encryption_profile::v1::EncryptionProfileFilter* GetEncryptionProfileCountRequest::mutable_filter() {
  ::keyapis::encryption_profile::v1::EncryptionProfileFilter* _msg = _internal_mutable_filter();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest.filter)
  return _msg;
}
inline void GetEncryptionProfileCountRequest::set_allocated_filter(::keyapis::encryption_profile::v1::EncryptionProfileFilter* filter) {
  ::PROTOBUF_NAMESPACE_ID::Arena* message_arena = GetArenaForAllocation();
  if (message_arena == nullptr) {
    delete _impl_.filter_;
  }
  if (filter) {
    ::PROTOBUF_NAMESPACE_ID::Arena* submessage_arena =
        ::PROTOBUF_NAMESPACE_ID::Arena::InternalGetOwningArena(filter);
    if (message_arena != submessage_arena) {
      filter = ::PROTOBUF_NAMESPACE_ID::internal::GetOwnedMessage(
          message_arena, filter, submessage_arena);
    }
    _impl_._has_bits_[0] |= 0x00000001u;
  } else {
    _impl_._has_bits_[0] &= ~0x00000001u;
  }
  _impl_.filter_ = filter;
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileCountRequest.filter)
}

// -------------------------------------------------------------------

// GetEncryptionProfileCountResponse_Error

// .keyapis.encryption_profile.v1.ValidationError validation = 1;
inline bool GetEncryptionProfileCountResponse_Error::has_validation() const {
  return reason_case() == kValidation;
}
inline bool GetEncryptionProfileCountResponse_Error::_internal_has_validation() const {
  return reason_case() == kValidation;
}
inline void GetEncryptionProfileCountResponse_Error::set_has_validation() {
  _impl_._oneof_case_[0] = kValidation;
}
inline void GetEncryptionProfileCountResponse_Error::clear_validation() {
  if (reason_case() == kValidation) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.validation_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileCountResponse_Error::release_validation() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::ValidationError& GetEncryptionProfileCountResponse_Error::_internal_validation() const {
  return reason_case() == kValidation
      ? *_impl_.reason_.validation_
      : reinterpret_cast<::keyapis::encryption_profile::v1::ValidationError&>(::keyapis::encryption_profile::v1::_ValidationError_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::ValidationError& GetEncryptionProfileCountResponse_Error::validation() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error.validation)
  return _internal_validation();
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileCountResponse_Error::unsafe_arena_release_validation() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error.validation)
  if (reason_case() == kValidation) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::ValidationError* temp = _impl_.reason_.validation_;
    _impl_.reason_.validation_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileCountResponse_Error::unsafe_arena_set_allocated_validation(::keyapis::encryption_profile::v1::ValidationError* validation) {
  clear_reason();
  if (validation) {
    set_has_validation();
    _impl_.reason_.validation_ = validation;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error.validation)
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileCountResponse_Error::_internal_mutable_validation() {
  if (reason_case() != kValidation) {
    clear_reason();
    set_has_validation();
    _impl_.reason_.validation_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::ValidationError >(GetArenaForAllocation());
  }
  return _impl_.reason_.validation_;
}
inline ::keyapis::encryption_profile::v1::ValidationError* GetEncryptionProfileCountResponse_Error::mutable_validation() {
  ::keyapis::encryption_profile::v1::ValidationError* _msg = _internal_mutable_validation();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error.validation)
  return _msg;
}

inline bool GetEncryptionProfileCountResponse_Error::has_reason() const {
  return reason_case() != REASON_NOT_SET;
}
inline void GetEncryptionProfileCountResponse_Error::clear_has_reason() {
  _impl_._oneof_case_[0] = REASON_NOT_SET;
}
inline GetEncryptionProfileCountResponse_Error::ReasonCase GetEncryptionProfileCountResponse_Error::reason_case() const {
  return GetEncryptionProfileCountResponse_Error::ReasonCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// GetEncryptionProfileCountResponse

// int32 data = 1;
inline bool GetEncryptionProfileCountResponse::has_data() const {
  return type_case() == kData;
}
inline void GetEncryptionProfileCountResponse::set_has_data() {
  _impl_._oneof_case_[0] = kData;
}
inline void GetEncryptionProfileCountResponse::clear_data() {
  if (type_case() == kData) {
    _impl_.type_.data_ = 0;
    clear_has_type();
  }
}
inline ::int32_t GetEncryptionProfileCountResponse::data() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.data)
  return _internal_data();
}
inline void GetEncryptionProfileCountResponse::set_data(::int32_t value) {
  _internal_set_data(value);
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.data)
}
inline ::int32_t GetEncryptionProfileCountResponse::_internal_data() const {
  if (type_case() == kData) {
    return _impl_.type_.data_;
  }
  return 0;
}
inline void GetEncryptionProfileCountResponse::_internal_set_data(::int32_t value) {
  if (type_case() != kData) {
    clear_type();
    set_has_data();
  }
  _impl_.type_.data_ = value;
}

// .keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.Error error = 2;
inline bool GetEncryptionProfileCountResponse::has_error() const {
  return type_case() == kError;
}
inline bool GetEncryptionProfileCountResponse::_internal_has_error() const {
  return type_case() == kError;
}
inline void GetEncryptionProfileCountResponse::set_has_error() {
  _impl_._oneof_case_[0] = kError;
}
inline void GetEncryptionProfileCountResponse::clear_error() {
  if (type_case() == kError) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.error_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* GetEncryptionProfileCountResponse::release_error() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* temp = _impl_.type_.error_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error& GetEncryptionProfileCountResponse::_internal_error() const {
  return type_case() == kError
      ? *_impl_.type_.error_
      : reinterpret_cast<::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error&>(::keyapis::encryption_profile::v1::_GetEncryptionProfileCountResponse_Error_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error& GetEncryptionProfileCountResponse::error() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.error)
  return _internal_error();
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* GetEncryptionProfileCountResponse::unsafe_arena_release_error() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* temp = _impl_.type_.error_;
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void GetEncryptionProfileCountResponse::unsafe_arena_set_allocated_error(::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* error) {
  clear_type();
  if (error) {
    set_has_error();
    _impl_.type_.error_ = error;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.error)
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* GetEncryptionProfileCountResponse::_internal_mutable_error() {
  if (type_case() != kError) {
    clear_type();
    set_has_error();
    _impl_.type_.error_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error >(GetArenaForAllocation());
  }
  return _impl_.type_.error_;
}
inline ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* GetEncryptionProfileCountResponse::mutable_error() {
  ::keyapis::encryption_profile::v1::GetEncryptionProfileCountResponse_Error* _msg = _internal_mutable_error();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.GetEncryptionProfileCountResponse.error)
  return _msg;
}

inline bool GetEncryptionProfileCountResponse::has_type() const {
  return type_case() != TYPE_NOT_SET;
}
inline void GetEncryptionProfileCountResponse::clear_has_type() {
  _impl_._oneof_case_[0] = TYPE_NOT_SET;
}
inline GetEncryptionProfileCountResponse::TypeCase GetEncryptionProfileCountResponse::type_case() const {
  return GetEncryptionProfileCountResponse::TypeCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// DeleteEncryptionProfileRequest

// string id = 1 [(.google.api.field_behavior) = REQUIRED];
inline void DeleteEncryptionProfileRequest::clear_id() {
  _impl_.id_.ClearToEmpty();
}
inline const std::string& DeleteEncryptionProfileRequest::id() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest.id)
  return _internal_id();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void DeleteEncryptionProfileRequest::set_id(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.id_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest.id)
}
inline std::string* DeleteEncryptionProfileRequest::mutable_id() {
  std::string* _s = _internal_mutable_id();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest.id)
  return _s;
}
inline const std::string& DeleteEncryptionProfileRequest::_internal_id() const {
  return _impl_.id_.Get();
}
inline void DeleteEncryptionProfileRequest::_internal_set_id(const std::string& value) {
  ;


  _impl_.id_.Set(value, GetArenaForAllocation());
}
inline std::string* DeleteEncryptionProfileRequest::_internal_mutable_id() {
  ;
  return _impl_.id_.Mutable( GetArenaForAllocation());
}
inline std::string* DeleteEncryptionProfileRequest::release_id() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest.id)
  return _impl_.id_.Release();
}
inline void DeleteEncryptionProfileRequest::set_allocated_id(std::string* value) {
  _impl_.id_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.id_.IsDefault()) {
          _impl_.id_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.DeleteEncryptionProfileRequest.id)
}

// -------------------------------------------------------------------

// DeleteEncryptionProfileResponse_Error_LinkedDevicesExists

// -------------------------------------------------------------------

// DeleteEncryptionProfileResponse_Error

// .keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.LinkedDevicesExists linked_devices_exists = 1;
inline bool DeleteEncryptionProfileResponse_Error::has_linked_devices_exists() const {
  return reason_case() == kLinkedDevicesExists;
}
inline bool DeleteEncryptionProfileResponse_Error::_internal_has_linked_devices_exists() const {
  return reason_case() == kLinkedDevicesExists;
}
inline void DeleteEncryptionProfileResponse_Error::set_has_linked_devices_exists() {
  _impl_._oneof_case_[0] = kLinkedDevicesExists;
}
inline void DeleteEncryptionProfileResponse_Error::clear_linked_devices_exists() {
  if (reason_case() == kLinkedDevicesExists) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.reason_.linked_devices_exists_;
    }
    clear_has_reason();
  }
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* DeleteEncryptionProfileResponse_Error::release_linked_devices_exists() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.linked_devices_exists)
  if (reason_case() == kLinkedDevicesExists) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* temp = _impl_.reason_.linked_devices_exists_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.reason_.linked_devices_exists_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& DeleteEncryptionProfileResponse_Error::_internal_linked_devices_exists() const {
  return reason_case() == kLinkedDevicesExists
      ? *_impl_.reason_.linked_devices_exists_
      : reinterpret_cast<::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists&>(::keyapis::encryption_profile::v1::_DeleteEncryptionProfileResponse_Error_LinkedDevicesExists_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists& DeleteEncryptionProfileResponse_Error::linked_devices_exists() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.linked_devices_exists)
  return _internal_linked_devices_exists();
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* DeleteEncryptionProfileResponse_Error::unsafe_arena_release_linked_devices_exists() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.linked_devices_exists)
  if (reason_case() == kLinkedDevicesExists) {
    clear_has_reason();
    ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* temp = _impl_.reason_.linked_devices_exists_;
    _impl_.reason_.linked_devices_exists_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void DeleteEncryptionProfileResponse_Error::unsafe_arena_set_allocated_linked_devices_exists(::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* linked_devices_exists) {
  clear_reason();
  if (linked_devices_exists) {
    set_has_linked_devices_exists();
    _impl_.reason_.linked_devices_exists_ = linked_devices_exists;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.linked_devices_exists)
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* DeleteEncryptionProfileResponse_Error::_internal_mutable_linked_devices_exists() {
  if (reason_case() != kLinkedDevicesExists) {
    clear_reason();
    set_has_linked_devices_exists();
    _impl_.reason_.linked_devices_exists_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists >(GetArenaForAllocation());
  }
  return _impl_.reason_.linked_devices_exists_;
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* DeleteEncryptionProfileResponse_Error::mutable_linked_devices_exists() {
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error_LinkedDevicesExists* _msg = _internal_mutable_linked_devices_exists();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error.linked_devices_exists)
  return _msg;
}

inline bool DeleteEncryptionProfileResponse_Error::has_reason() const {
  return reason_case() != REASON_NOT_SET;
}
inline void DeleteEncryptionProfileResponse_Error::clear_has_reason() {
  _impl_._oneof_case_[0] = REASON_NOT_SET;
}
inline DeleteEncryptionProfileResponse_Error::ReasonCase DeleteEncryptionProfileResponse_Error::reason_case() const {
  return DeleteEncryptionProfileResponse_Error::ReasonCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// DeleteEncryptionProfileResponse

// .keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.Error error = 1;
inline bool DeleteEncryptionProfileResponse::has_error() const {
  return type_case() == kError;
}
inline bool DeleteEncryptionProfileResponse::_internal_has_error() const {
  return type_case() == kError;
}
inline void DeleteEncryptionProfileResponse::set_has_error() {
  _impl_._oneof_case_[0] = kError;
}
inline void DeleteEncryptionProfileResponse::clear_error() {
  if (type_case() == kError) {
    if (GetArenaForAllocation() == nullptr) {
      delete _impl_.type_.error_;
    }
    clear_has_type();
  }
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* DeleteEncryptionProfileResponse::release_error() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* temp = _impl_.type_.error_;
    if (GetArenaForAllocation() != nullptr) {
      temp = ::PROTOBUF_NAMESPACE_ID::internal::DuplicateIfNonNull(temp);
    }
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error& DeleteEncryptionProfileResponse::_internal_error() const {
  return type_case() == kError
      ? *_impl_.type_.error_
      : reinterpret_cast<::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error&>(::keyapis::encryption_profile::v1::_DeleteEncryptionProfileResponse_Error_default_instance_);
}
inline const ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error& DeleteEncryptionProfileResponse::error() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.error)
  return _internal_error();
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* DeleteEncryptionProfileResponse::unsafe_arena_release_error() {
  // @@protoc_insertion_point(field_unsafe_arena_release:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.error)
  if (type_case() == kError) {
    clear_has_type();
    ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* temp = _impl_.type_.error_;
    _impl_.type_.error_ = nullptr;
    return temp;
  } else {
    return nullptr;
  }
}
inline void DeleteEncryptionProfileResponse::unsafe_arena_set_allocated_error(::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* error) {
  clear_type();
  if (error) {
    set_has_error();
    _impl_.type_.error_ = error;
  }
  // @@protoc_insertion_point(field_unsafe_arena_set_allocated:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.error)
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* DeleteEncryptionProfileResponse::_internal_mutable_error() {
  if (type_case() != kError) {
    clear_type();
    set_has_error();
    _impl_.type_.error_ = CreateMaybeMessage< ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error >(GetArenaForAllocation());
  }
  return _impl_.type_.error_;
}
inline ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* DeleteEncryptionProfileResponse::mutable_error() {
  ::keyapis::encryption_profile::v1::DeleteEncryptionProfileResponse_Error* _msg = _internal_mutable_error();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.DeleteEncryptionProfileResponse.error)
  return _msg;
}

inline bool DeleteEncryptionProfileResponse::has_type() const {
  return type_case() != TYPE_NOT_SET;
}
inline void DeleteEncryptionProfileResponse::clear_has_type() {
  _impl_._oneof_case_[0] = TYPE_NOT_SET;
}
inline DeleteEncryptionProfileResponse::TypeCase DeleteEncryptionProfileResponse::type_case() const {
  return DeleteEncryptionProfileResponse::TypeCase(_impl_._oneof_case_[0]);
}
// -------------------------------------------------------------------

// PostEncryptionProfileRestoreRequest

// string id = 1 [(.google.api.field_behavior) = REQUIRED];
inline void PostEncryptionProfileRestoreRequest::clear_id() {
  _impl_.id_.ClearToEmpty();
}
inline const std::string& PostEncryptionProfileRestoreRequest::id() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest.id)
  return _internal_id();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void PostEncryptionProfileRestoreRequest::set_id(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.id_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest.id)
}
inline std::string* PostEncryptionProfileRestoreRequest::mutable_id() {
  std::string* _s = _internal_mutable_id();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest.id)
  return _s;
}
inline const std::string& PostEncryptionProfileRestoreRequest::_internal_id() const {
  return _impl_.id_.Get();
}
inline void PostEncryptionProfileRestoreRequest::_internal_set_id(const std::string& value) {
  ;


  _impl_.id_.Set(value, GetArenaForAllocation());
}
inline std::string* PostEncryptionProfileRestoreRequest::_internal_mutable_id() {
  ;
  return _impl_.id_.Mutable( GetArenaForAllocation());
}
inline std::string* PostEncryptionProfileRestoreRequest::release_id() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest.id)
  return _impl_.id_.Release();
}
inline void PostEncryptionProfileRestoreRequest::set_allocated_id(std::string* value) {
  _impl_.id_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.id_.IsDefault()) {
          _impl_.id_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.PostEncryptionProfileRestoreRequest.id)
}

// -------------------------------------------------------------------

// PostEncryptionProfileRestoreResponse

// -------------------------------------------------------------------

// ValidationError

// string path = 1 [(.google.api.field_behavior) = REQUIRED];
inline void ValidationError::clear_path() {
  _impl_.path_.ClearToEmpty();
}
inline const std::string& ValidationError::path() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.ValidationError.path)
  return _internal_path();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void ValidationError::set_path(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.path_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.ValidationError.path)
}
inline std::string* ValidationError::mutable_path() {
  std::string* _s = _internal_mutable_path();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.ValidationError.path)
  return _s;
}
inline const std::string& ValidationError::_internal_path() const {
  return _impl_.path_.Get();
}
inline void ValidationError::_internal_set_path(const std::string& value) {
  ;


  _impl_.path_.Set(value, GetArenaForAllocation());
}
inline std::string* ValidationError::_internal_mutable_path() {
  ;
  return _impl_.path_.Mutable( GetArenaForAllocation());
}
inline std::string* ValidationError::release_path() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.ValidationError.path)
  return _impl_.path_.Release();
}
inline void ValidationError::set_allocated_path(std::string* value) {
  _impl_.path_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.path_.IsDefault()) {
          _impl_.path_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.ValidationError.path)
}

// string message = 2 [(.google.api.field_behavior) = REQUIRED];
inline void ValidationError::clear_message() {
  _impl_.message_.ClearToEmpty();
}
inline const std::string& ValidationError::message() const {
  // @@protoc_insertion_point(field_get:keyapis.encryption_profile.v1.ValidationError.message)
  return _internal_message();
}
template <typename Arg_, typename... Args_>
inline PROTOBUF_ALWAYS_INLINE void ValidationError::set_message(Arg_&& arg,
                                                     Args_... args) {
  ;
  _impl_.message_.Set(static_cast<Arg_&&>(arg), args..., GetArenaForAllocation());
  // @@protoc_insertion_point(field_set:keyapis.encryption_profile.v1.ValidationError.message)
}
inline std::string* ValidationError::mutable_message() {
  std::string* _s = _internal_mutable_message();
  // @@protoc_insertion_point(field_mutable:keyapis.encryption_profile.v1.ValidationError.message)
  return _s;
}
inline const std::string& ValidationError::_internal_message() const {
  return _impl_.message_.Get();
}
inline void ValidationError::_internal_set_message(const std::string& value) {
  ;


  _impl_.message_.Set(value, GetArenaForAllocation());
}
inline std::string* ValidationError::_internal_mutable_message() {
  ;
  return _impl_.message_.Mutable( GetArenaForAllocation());
}
inline std::string* ValidationError::release_message() {
  // @@protoc_insertion_point(field_release:keyapis.encryption_profile.v1.ValidationError.message)
  return _impl_.message_.Release();
}
inline void ValidationError::set_allocated_message(std::string* value) {
  _impl_.message_.SetAllocated(value, GetArenaForAllocation());
  #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
        if (_impl_.message_.IsDefault()) {
          _impl_.message_.Set("", GetArenaForAllocation());
        }
  #endif  // PROTOBUF_FORCE_COPY_DEFAULT_STRING
  // @@protoc_insertion_point(field_set_allocated:keyapis.encryption_profile.v1.ValidationError.message)
}

#ifdef __GNUC__
#pragma GCC diagnostic pop
#endif  // __GNUC__

// @@protoc_insertion_point(namespace_scope)
}  // namespace v1
}  // namespace encryption_profile
}  // namespace keyapis


PROTOBUF_NAMESPACE_OPEN

template <>
struct is_proto_enum<::keyapis::encryption_profile::v1::EncryptionProfile_Type> : std::true_type {};
template <>
struct is_proto_enum<::keyapis::encryption_profile::v1::EncryptionProfilePaging_OrderByType> : std::true_type {};
template <>
struct is_proto_enum<::keyapis::encryption_profile::v1::EncryptionProfilePaging_DirectionType> : std::true_type {};

PROTOBUF_NAMESPACE_CLOSE

// @@protoc_insertion_point(global_scope)

#include "google/protobuf/port_undef.inc"

#endif  // GOOGLE_PROTOBUF_INCLUDED_keyapis_2fencryption_5fprofile_2fv1_2fkeyapis_5fencryption_5fprofile_5fencryption_5fprofile_5fv1_2eproto_2epb_2eh
