TransparencyLogInstance.java

// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: sigstore_trustroot.proto
// Protobuf Java Version: 4.30.2

package dev.sigstore.proto.trustroot.v1;

/**
 * <pre>
 * TransparencyLogInstance describes the immutable parameters from a
 * transparency log.
 * See https://www.rfc-editor.org/rfc/rfc9162.html#name-log-parameters
 * for more details.
 * The included parameters are the minimal set required to identify a log,
 * and verify an inclusion proof/promise.
 * </pre>
 *
 * Protobuf type {@code dev.sigstore.trustroot.v1.TransparencyLogInstance}
 */
@javax.annotation.Generated(value="protoc", comments="annotations:TransparencyLogInstance.java.pb.meta")
public final class TransparencyLogInstance extends
    com.google.protobuf.GeneratedMessage implements
    // @@protoc_insertion_point(message_implements:dev.sigstore.trustroot.v1.TransparencyLogInstance)
    TransparencyLogInstanceOrBuilder {
private static final long serialVersionUID = 0L;
  static {
    com.google.protobuf.RuntimeVersion.validateProtobufGencodeVersion(
      com.google.protobuf.RuntimeVersion.RuntimeDomain.PUBLIC,
      /* major= */ 4,
      /* minor= */ 30,
      /* patch= */ 2,
      /* suffix= */ "",
      TransparencyLogInstance.class.getName());
  }
  // Use TransparencyLogInstance.newBuilder() to construct.
  private TransparencyLogInstance(com.google.protobuf.GeneratedMessage.Builder<?> builder) {
    super(builder);
  }
  private TransparencyLogInstance() {
    baseUrl_ = "";
    hashAlgorithm_ = 0;
    operator_ = "";
  }

  public static final com.google.protobuf.Descriptors.Descriptor
      getDescriptor() {
    return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_descriptor;
  }

  @java.lang.Override
  protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
      internalGetFieldAccessorTable() {
    return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_fieldAccessorTable
        .ensureFieldAccessorsInitialized(
            dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.class, dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.Builder.class);
  }

  private int bitField0_;
  public static final int BASE_URL_FIELD_NUMBER = 1;
  @SuppressWarnings("serial")
  private volatile java.lang.Object baseUrl_ = "";
  /**
   * <pre>
   * The base URL at which can be used to URLs for the client.
   * SHOULD match the origin on the log checkpoint:
   * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
   * </pre>
   *
   * <code>string base_url = 1;</code>
   * @return The baseUrl.
   */
  @java.lang.Override
  public java.lang.String getBaseUrl() {
    java.lang.Object ref = baseUrl_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = 
          (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      baseUrl_ = s;
      return s;
    }
  }
  /**
   * <pre>
   * The base URL at which can be used to URLs for the client.
   * SHOULD match the origin on the log checkpoint:
   * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
   * </pre>
   *
   * <code>string base_url = 1;</code>
   * @return The bytes for baseUrl.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString
      getBaseUrlBytes() {
    java.lang.Object ref = baseUrl_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b = 
          com.google.protobuf.ByteString.copyFromUtf8(
              (java.lang.String) ref);
      baseUrl_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int HASH_ALGORITHM_FIELD_NUMBER = 2;
  private int hashAlgorithm_ = 0;
  /**
   * <pre>
   * The hash algorithm used for the Merkle Tree.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
   * @return The enum numeric value on the wire for hashAlgorithm.
   */
  @java.lang.Override public int getHashAlgorithmValue() {
    return hashAlgorithm_;
  }
  /**
   * <pre>
   * The hash algorithm used for the Merkle Tree.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
   * @return The hashAlgorithm.
   */
  @java.lang.Override public dev.sigstore.proto.common.v1.HashAlgorithm getHashAlgorithm() {
    dev.sigstore.proto.common.v1.HashAlgorithm result = dev.sigstore.proto.common.v1.HashAlgorithm.forNumber(hashAlgorithm_);
    return result == null ? dev.sigstore.proto.common.v1.HashAlgorithm.UNRECOGNIZED : result;
  }

  public static final int PUBLIC_KEY_FIELD_NUMBER = 3;
  private dev.sigstore.proto.common.v1.PublicKey publicKey_;
  /**
   * <pre>
   * The public key used to verify signatures generated by the log.
   * This attribute contains the signature algorithm used by the log.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
   * @return Whether the publicKey field is set.
   */
  @java.lang.Override
  public boolean hasPublicKey() {
    return ((bitField0_ & 0x00000001) != 0);
  }
  /**
   * <pre>
   * The public key used to verify signatures generated by the log.
   * This attribute contains the signature algorithm used by the log.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
   * @return The publicKey.
   */
  @java.lang.Override
  public dev.sigstore.proto.common.v1.PublicKey getPublicKey() {
    return publicKey_ == null ? dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
  }
  /**
   * <pre>
   * The public key used to verify signatures generated by the log.
   * This attribute contains the signature algorithm used by the log.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
   */
  @java.lang.Override
  public dev.sigstore.proto.common.v1.PublicKeyOrBuilder getPublicKeyOrBuilder() {
    return publicKey_ == null ? dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
  }

  public static final int LOG_ID_FIELD_NUMBER = 4;
  private dev.sigstore.proto.common.v1.LogId logId_;
  /**
   * <pre>
   * The unique identifier for this transparency log.
   * Represented as the SHA-256 hash of the log's public key,
   * calculated over the DER encoding of the key represented as
   * SubjectPublicKeyInfo.
   * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
   * MUST set checkpoint_key_id if multiple logs use the same
   * signing key.
   * Deprecated: Use checkpoint_key_id instead, since log_id is not
   * guaranteed to be unique across multiple deployments. Clients
   * must use the key name and key ID from a checkpoint to determine
   * the correct TransparencyLogInstance to verify a proof.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
   * @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
   *     See sigstore_trustroot.proto;l=53
   * @return Whether the logId field is set.
   */
  @java.lang.Override
  @java.lang.Deprecated public boolean hasLogId() {
    return ((bitField0_ & 0x00000002) != 0);
  }
  /**
   * <pre>
   * The unique identifier for this transparency log.
   * Represented as the SHA-256 hash of the log's public key,
   * calculated over the DER encoding of the key represented as
   * SubjectPublicKeyInfo.
   * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
   * MUST set checkpoint_key_id if multiple logs use the same
   * signing key.
   * Deprecated: Use checkpoint_key_id instead, since log_id is not
   * guaranteed to be unique across multiple deployments. Clients
   * must use the key name and key ID from a checkpoint to determine
   * the correct TransparencyLogInstance to verify a proof.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
   * @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
   *     See sigstore_trustroot.proto;l=53
   * @return The logId.
   */
  @java.lang.Override
  @java.lang.Deprecated public dev.sigstore.proto.common.v1.LogId getLogId() {
    return logId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
  }
  /**
   * <pre>
   * The unique identifier for this transparency log.
   * Represented as the SHA-256 hash of the log's public key,
   * calculated over the DER encoding of the key represented as
   * SubjectPublicKeyInfo.
   * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
   * MUST set checkpoint_key_id if multiple logs use the same
   * signing key.
   * Deprecated: Use checkpoint_key_id instead, since log_id is not
   * guaranteed to be unique across multiple deployments. Clients
   * must use the key name and key ID from a checkpoint to determine
   * the correct TransparencyLogInstance to verify a proof.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
   */
  @java.lang.Override
  @java.lang.Deprecated public dev.sigstore.proto.common.v1.LogIdOrBuilder getLogIdOrBuilder() {
    return logId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
  }

  public static final int CHECKPOINT_KEY_ID_FIELD_NUMBER = 5;
  private dev.sigstore.proto.common.v1.LogId checkpointKeyId_;
  /**
   * <pre>
   * The unique identifier for the log, used in the checkpoint.
   * Its calculation is described in
   * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
   * SHOULD be set for all logs. When not set, clients MUST use log_id.
   *
   * For Ed25519 signatures, the key ID is computed per the C2SP spec:
   * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
   * For ECDSA signatures, the key ID is computed per the C2SP spec:
   * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
   * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
   * "PKIX-RSA-PKCS#1v1.5":
   * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
   *
   * This is provided for convenience. Clients can also calculate the
   * checkpoint key ID given the log's public key.
   * SHOULD be 4 bytes long, as a truncated hash.
   *
   * To find a matching TransparencyLogInstance in the TrustedRoot,
   * clients will parse the checkpoint, and for each signature line,
   * use the key name (i.e. log origin, base_url from TrustedRoot)
   * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
   * which can then be compared against the TrustedRoot log instances.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
   * @return Whether the checkpointKeyId field is set.
   */
  @java.lang.Override
  public boolean hasCheckpointKeyId() {
    return ((bitField0_ & 0x00000004) != 0);
  }
  /**
   * <pre>
   * The unique identifier for the log, used in the checkpoint.
   * Its calculation is described in
   * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
   * SHOULD be set for all logs. When not set, clients MUST use log_id.
   *
   * For Ed25519 signatures, the key ID is computed per the C2SP spec:
   * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
   * For ECDSA signatures, the key ID is computed per the C2SP spec:
   * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
   * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
   * "PKIX-RSA-PKCS#1v1.5":
   * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
   *
   * This is provided for convenience. Clients can also calculate the
   * checkpoint key ID given the log's public key.
   * SHOULD be 4 bytes long, as a truncated hash.
   *
   * To find a matching TransparencyLogInstance in the TrustedRoot,
   * clients will parse the checkpoint, and for each signature line,
   * use the key name (i.e. log origin, base_url from TrustedRoot)
   * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
   * which can then be compared against the TrustedRoot log instances.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
   * @return The checkpointKeyId.
   */
  @java.lang.Override
  public dev.sigstore.proto.common.v1.LogId getCheckpointKeyId() {
    return checkpointKeyId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
  }
  /**
   * <pre>
   * The unique identifier for the log, used in the checkpoint.
   * Its calculation is described in
   * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
   * SHOULD be set for all logs. When not set, clients MUST use log_id.
   *
   * For Ed25519 signatures, the key ID is computed per the C2SP spec:
   * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
   * For ECDSA signatures, the key ID is computed per the C2SP spec:
   * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
   * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
   * "PKIX-RSA-PKCS#1v1.5":
   * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
   *
   * This is provided for convenience. Clients can also calculate the
   * checkpoint key ID given the log's public key.
   * SHOULD be 4 bytes long, as a truncated hash.
   *
   * To find a matching TransparencyLogInstance in the TrustedRoot,
   * clients will parse the checkpoint, and for each signature line,
   * use the key name (i.e. log origin, base_url from TrustedRoot)
   * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
   * which can then be compared against the TrustedRoot log instances.
   * </pre>
   *
   * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
   */
  @java.lang.Override
  public dev.sigstore.proto.common.v1.LogIdOrBuilder getCheckpointKeyIdOrBuilder() {
    return checkpointKeyId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
  }

  public static final int OPERATOR_FIELD_NUMBER = 6;
  @SuppressWarnings("serial")
  private volatile java.lang.Object operator_ = "";
  /**
   * <pre>
   * The name of the operator of this log deployment. Operator MUST be
   * formatted as a scheme-less URI, e.g. sigstore.dev
   * This MUST be used when there are multiple transparency log instances
   * to determine if log proof verification meets a specified threshold,
   * e.g. two proofs from log deployments operated by the same operator
   * should count as only one valid proof.
   * </pre>
   *
   * <code>string operator = 6;</code>
   * @return The operator.
   */
  @java.lang.Override
  public java.lang.String getOperator() {
    java.lang.Object ref = operator_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = 
          (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      operator_ = s;
      return s;
    }
  }
  /**
   * <pre>
   * The name of the operator of this log deployment. Operator MUST be
   * formatted as a scheme-less URI, e.g. sigstore.dev
   * This MUST be used when there are multiple transparency log instances
   * to determine if log proof verification meets a specified threshold,
   * e.g. two proofs from log deployments operated by the same operator
   * should count as only one valid proof.
   * </pre>
   *
   * <code>string operator = 6;</code>
   * @return The bytes for operator.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString
      getOperatorBytes() {
    java.lang.Object ref = operator_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b = 
          com.google.protobuf.ByteString.copyFromUtf8(
              (java.lang.String) ref);
      operator_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  private byte memoizedIsInitialized = -1;
  @java.lang.Override
  public final boolean isInitialized() {
    byte isInitialized = memoizedIsInitialized;
    if (isInitialized == 1) return true;
    if (isInitialized == 0) return false;

    memoizedIsInitialized = 1;
    return true;
  }

  @java.lang.Override
  public void writeTo(com.google.protobuf.CodedOutputStream output)
                      throws java.io.IOException {
    if (!com.google.protobuf.GeneratedMessage.isStringEmpty(baseUrl_)) {
      com.google.protobuf.GeneratedMessage.writeString(output, 1, baseUrl_);
    }
    if (hashAlgorithm_ != dev.sigstore.proto.common.v1.HashAlgorithm.HASH_ALGORITHM_UNSPECIFIED.getNumber()) {
      output.writeEnum(2, hashAlgorithm_);
    }
    if (((bitField0_ & 0x00000001) != 0)) {
      output.writeMessage(3, getPublicKey());
    }
    if (((bitField0_ & 0x00000002) != 0)) {
      output.writeMessage(4, getLogId());
    }
    if (((bitField0_ & 0x00000004) != 0)) {
      output.writeMessage(5, getCheckpointKeyId());
    }
    if (!com.google.protobuf.GeneratedMessage.isStringEmpty(operator_)) {
      com.google.protobuf.GeneratedMessage.writeString(output, 6, operator_);
    }
    getUnknownFields().writeTo(output);
  }

  @java.lang.Override
  public int getSerializedSize() {
    int size = memoizedSize;
    if (size != -1) return size;

    size = 0;
    if (!com.google.protobuf.GeneratedMessage.isStringEmpty(baseUrl_)) {
      size += com.google.protobuf.GeneratedMessage.computeStringSize(1, baseUrl_);
    }
    if (hashAlgorithm_ != dev.sigstore.proto.common.v1.HashAlgorithm.HASH_ALGORITHM_UNSPECIFIED.getNumber()) {
      size += com.google.protobuf.CodedOutputStream
        .computeEnumSize(2, hashAlgorithm_);
    }
    if (((bitField0_ & 0x00000001) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(3, getPublicKey());
    }
    if (((bitField0_ & 0x00000002) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(4, getLogId());
    }
    if (((bitField0_ & 0x00000004) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(5, getCheckpointKeyId());
    }
    if (!com.google.protobuf.GeneratedMessage.isStringEmpty(operator_)) {
      size += com.google.protobuf.GeneratedMessage.computeStringSize(6, operator_);
    }
    size += getUnknownFields().getSerializedSize();
    memoizedSize = size;
    return size;
  }

  @java.lang.Override
  public boolean equals(final java.lang.Object obj) {
    if (obj == this) {
     return true;
    }
    if (!(obj instanceof dev.sigstore.proto.trustroot.v1.TransparencyLogInstance)) {
      return super.equals(obj);
    }
    dev.sigstore.proto.trustroot.v1.TransparencyLogInstance other = (dev.sigstore.proto.trustroot.v1.TransparencyLogInstance) obj;

    if (!getBaseUrl()
        .equals(other.getBaseUrl())) return false;
    if (hashAlgorithm_ != other.hashAlgorithm_) return false;
    if (hasPublicKey() != other.hasPublicKey()) return false;
    if (hasPublicKey()) {
      if (!getPublicKey()
          .equals(other.getPublicKey())) return false;
    }
    if (hasLogId() != other.hasLogId()) return false;
    if (hasLogId()) {
      if (!getLogId()
          .equals(other.getLogId())) return false;
    }
    if (hasCheckpointKeyId() != other.hasCheckpointKeyId()) return false;
    if (hasCheckpointKeyId()) {
      if (!getCheckpointKeyId()
          .equals(other.getCheckpointKeyId())) return false;
    }
    if (!getOperator()
        .equals(other.getOperator())) return false;
    if (!getUnknownFields().equals(other.getUnknownFields())) return false;
    return true;
  }

  @java.lang.Override
  public int hashCode() {
    if (memoizedHashCode != 0) {
      return memoizedHashCode;
    }
    int hash = 41;
    hash = (19 * hash) + getDescriptor().hashCode();
    hash = (37 * hash) + BASE_URL_FIELD_NUMBER;
    hash = (53 * hash) + getBaseUrl().hashCode();
    hash = (37 * hash) + HASH_ALGORITHM_FIELD_NUMBER;
    hash = (53 * hash) + hashAlgorithm_;
    if (hasPublicKey()) {
      hash = (37 * hash) + PUBLIC_KEY_FIELD_NUMBER;
      hash = (53 * hash) + getPublicKey().hashCode();
    }
    if (hasLogId()) {
      hash = (37 * hash) + LOG_ID_FIELD_NUMBER;
      hash = (53 * hash) + getLogId().hashCode();
    }
    if (hasCheckpointKeyId()) {
      hash = (37 * hash) + CHECKPOINT_KEY_ID_FIELD_NUMBER;
      hash = (53 * hash) + getCheckpointKeyId().hashCode();
    }
    hash = (37 * hash) + OPERATOR_FIELD_NUMBER;
    hash = (53 * hash) + getOperator().hashCode();
    hash = (29 * hash) + getUnknownFields().hashCode();
    memoizedHashCode = hash;
    return hash;
  }

  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      java.nio.ByteBuffer data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      java.nio.ByteBuffer data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      com.google.protobuf.ByteString data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      com.google.protobuf.ByteString data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(byte[] data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      byte[] data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(java.io.InputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      java.io.InputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input, extensionRegistry);
  }

  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseDelimitedFrom(java.io.InputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseDelimitedWithIOException(PARSER, input);
  }

  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseDelimitedFrom(
      java.io.InputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseDelimitedWithIOException(PARSER, input, extensionRegistry);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      com.google.protobuf.CodedInputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input);
  }
  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
      com.google.protobuf.CodedInputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input, extensionRegistry);
  }

  @java.lang.Override
  public Builder newBuilderForType() { return newBuilder(); }
  public static Builder newBuilder() {
    return DEFAULT_INSTANCE.toBuilder();
  }
  public static Builder newBuilder(dev.sigstore.proto.trustroot.v1.TransparencyLogInstance prototype) {
    return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
  }
  @java.lang.Override
  public Builder toBuilder() {
    return this == DEFAULT_INSTANCE
        ? new Builder() : new Builder().mergeFrom(this);
  }

  @java.lang.Override
  protected Builder newBuilderForType(
      com.google.protobuf.GeneratedMessage.BuilderParent parent) {
    Builder builder = new Builder(parent);
    return builder;
  }
  /**
   * <pre>
   * TransparencyLogInstance describes the immutable parameters from a
   * transparency log.
   * See https://www.rfc-editor.org/rfc/rfc9162.html#name-log-parameters
   * for more details.
   * The included parameters are the minimal set required to identify a log,
   * and verify an inclusion proof/promise.
   * </pre>
   *
   * Protobuf type {@code dev.sigstore.trustroot.v1.TransparencyLogInstance}
   */
  public static final class Builder extends
      com.google.protobuf.GeneratedMessage.Builder<Builder> implements
      // @@protoc_insertion_point(builder_implements:dev.sigstore.trustroot.v1.TransparencyLogInstance)
      dev.sigstore.proto.trustroot.v1.TransparencyLogInstanceOrBuilder {
    public static final com.google.protobuf.Descriptors.Descriptor
        getDescriptor() {
      return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_descriptor;
    }

    @java.lang.Override
    protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
        internalGetFieldAccessorTable() {
      return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_fieldAccessorTable
          .ensureFieldAccessorsInitialized(
              dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.class, dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.Builder.class);
    }

    // Construct using dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.newBuilder()
    private Builder() {
      maybeForceBuilderInitialization();
    }

    private Builder(
        com.google.protobuf.GeneratedMessage.BuilderParent parent) {
      super(parent);
      maybeForceBuilderInitialization();
    }
    private void maybeForceBuilderInitialization() {
      if (com.google.protobuf.GeneratedMessage
              .alwaysUseFieldBuilders) {
        internalGetPublicKeyFieldBuilder();
        internalGetLogIdFieldBuilder();
        internalGetCheckpointKeyIdFieldBuilder();
      }
    }
    @java.lang.Override
    public Builder clear() {
      super.clear();
      bitField0_ = 0;
      baseUrl_ = "";
      hashAlgorithm_ = 0;
      publicKey_ = null;
      if (publicKeyBuilder_ != null) {
        publicKeyBuilder_.dispose();
        publicKeyBuilder_ = null;
      }
      logId_ = null;
      if (logIdBuilder_ != null) {
        logIdBuilder_.dispose();
        logIdBuilder_ = null;
      }
      checkpointKeyId_ = null;
      if (checkpointKeyIdBuilder_ != null) {
        checkpointKeyIdBuilder_.dispose();
        checkpointKeyIdBuilder_ = null;
      }
      operator_ = "";
      return this;
    }

    @java.lang.Override
    public com.google.protobuf.Descriptors.Descriptor
        getDescriptorForType() {
      return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_descriptor;
    }

    @java.lang.Override
    public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance getDefaultInstanceForType() {
      return dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.getDefaultInstance();
    }

    @java.lang.Override
    public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance build() {
      dev.sigstore.proto.trustroot.v1.TransparencyLogInstance result = buildPartial();
      if (!result.isInitialized()) {
        throw newUninitializedMessageException(result);
      }
      return result;
    }

    @java.lang.Override
    public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance buildPartial() {
      dev.sigstore.proto.trustroot.v1.TransparencyLogInstance result = new dev.sigstore.proto.trustroot.v1.TransparencyLogInstance(this);
      if (bitField0_ != 0) { buildPartial0(result); }
      onBuilt();
      return result;
    }

    private void buildPartial0(dev.sigstore.proto.trustroot.v1.TransparencyLogInstance result) {
      int from_bitField0_ = bitField0_;
      if (((from_bitField0_ & 0x00000001) != 0)) {
        result.baseUrl_ = baseUrl_;
      }
      if (((from_bitField0_ & 0x00000002) != 0)) {
        result.hashAlgorithm_ = hashAlgorithm_;
      }
      int to_bitField0_ = 0;
      if (((from_bitField0_ & 0x00000004) != 0)) {
        result.publicKey_ = publicKeyBuilder_ == null
            ? publicKey_
            : publicKeyBuilder_.build();
        to_bitField0_ |= 0x00000001;
      }
      if (((from_bitField0_ & 0x00000008) != 0)) {
        result.logId_ = logIdBuilder_ == null
            ? logId_
            : logIdBuilder_.build();
        to_bitField0_ |= 0x00000002;
      }
      if (((from_bitField0_ & 0x00000010) != 0)) {
        result.checkpointKeyId_ = checkpointKeyIdBuilder_ == null
            ? checkpointKeyId_
            : checkpointKeyIdBuilder_.build();
        to_bitField0_ |= 0x00000004;
      }
      if (((from_bitField0_ & 0x00000020) != 0)) {
        result.operator_ = operator_;
      }
      result.bitField0_ |= to_bitField0_;
    }

    @java.lang.Override
    public Builder mergeFrom(com.google.protobuf.Message other) {
      if (other instanceof dev.sigstore.proto.trustroot.v1.TransparencyLogInstance) {
        return mergeFrom((dev.sigstore.proto.trustroot.v1.TransparencyLogInstance)other);
      } else {
        super.mergeFrom(other);
        return this;
      }
    }

    public Builder mergeFrom(dev.sigstore.proto.trustroot.v1.TransparencyLogInstance other) {
      if (other == dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.getDefaultInstance()) return this;
      if (!other.getBaseUrl().isEmpty()) {
        baseUrl_ = other.baseUrl_;
        bitField0_ |= 0x00000001;
        onChanged();
      }
      if (other.hashAlgorithm_ != 0) {
        setHashAlgorithmValue(other.getHashAlgorithmValue());
      }
      if (other.hasPublicKey()) {
        mergePublicKey(other.getPublicKey());
      }
      if (other.hasLogId()) {
        mergeLogId(other.getLogId());
      }
      if (other.hasCheckpointKeyId()) {
        mergeCheckpointKeyId(other.getCheckpointKeyId());
      }
      if (!other.getOperator().isEmpty()) {
        operator_ = other.operator_;
        bitField0_ |= 0x00000020;
        onChanged();
      }
      this.mergeUnknownFields(other.getUnknownFields());
      onChanged();
      return this;
    }

    @java.lang.Override
    public final boolean isInitialized() {
      return true;
    }

    @java.lang.Override
    public Builder mergeFrom(
        com.google.protobuf.CodedInputStream input,
        com.google.protobuf.ExtensionRegistryLite extensionRegistry)
        throws java.io.IOException {
      if (extensionRegistry == null) {
        throw new java.lang.NullPointerException();
      }
      try {
        boolean done = false;
        while (!done) {
          int tag = input.readTag();
          switch (tag) {
            case 0:
              done = true;
              break;
            case 10: {
              baseUrl_ = input.readStringRequireUtf8();
              bitField0_ |= 0x00000001;
              break;
            } // case 10
            case 16: {
              hashAlgorithm_ = input.readEnum();
              bitField0_ |= 0x00000002;
              break;
            } // case 16
            case 26: {
              input.readMessage(
                  internalGetPublicKeyFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000004;
              break;
            } // case 26
            case 34: {
              input.readMessage(
                  internalGetLogIdFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000008;
              break;
            } // case 34
            case 42: {
              input.readMessage(
                  internalGetCheckpointKeyIdFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000010;
              break;
            } // case 42
            case 50: {
              operator_ = input.readStringRequireUtf8();
              bitField0_ |= 0x00000020;
              break;
            } // case 50
            default: {
              if (!super.parseUnknownField(input, extensionRegistry, tag)) {
                done = true; // was an endgroup tag
              }
              break;
            } // default:
          } // switch (tag)
        } // while (!done)
      } catch (com.google.protobuf.InvalidProtocolBufferException e) {
        throw e.unwrapIOException();
      } finally {
        onChanged();
      } // finally
      return this;
    }
    private int bitField0_;

    private java.lang.Object baseUrl_ = "";
    /**
     * <pre>
     * The base URL at which can be used to URLs for the client.
     * SHOULD match the origin on the log checkpoint:
     * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
     * </pre>
     *
     * <code>string base_url = 1;</code>
     * @return The baseUrl.
     */
    public java.lang.String getBaseUrl() {
      java.lang.Object ref = baseUrl_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs =
            (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        baseUrl_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     * <pre>
     * The base URL at which can be used to URLs for the client.
     * SHOULD match the origin on the log checkpoint:
     * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
     * </pre>
     *
     * <code>string base_url = 1;</code>
     * @return The bytes for baseUrl.
     */
    public com.google.protobuf.ByteString
        getBaseUrlBytes() {
      java.lang.Object ref = baseUrl_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b = 
            com.google.protobuf.ByteString.copyFromUtf8(
                (java.lang.String) ref);
        baseUrl_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     * <pre>
     * The base URL at which can be used to URLs for the client.
     * SHOULD match the origin on the log checkpoint:
     * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
     * </pre>
     *
     * <code>string base_url = 1;</code>
     * @param value The baseUrl to set.
     * @return This builder for chaining.
     */
    public Builder setBaseUrl(
        java.lang.String value) {
      if (value == null) { throw new NullPointerException(); }
      baseUrl_ = value;
      bitField0_ |= 0x00000001;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The base URL at which can be used to URLs for the client.
     * SHOULD match the origin on the log checkpoint:
     * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
     * </pre>
     *
     * <code>string base_url = 1;</code>
     * @return This builder for chaining.
     */
    public Builder clearBaseUrl() {
      baseUrl_ = getDefaultInstance().getBaseUrl();
      bitField0_ = (bitField0_ & ~0x00000001);
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The base URL at which can be used to URLs for the client.
     * SHOULD match the origin on the log checkpoint:
     * https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
     * </pre>
     *
     * <code>string base_url = 1;</code>
     * @param value The bytes for baseUrl to set.
     * @return This builder for chaining.
     */
    public Builder setBaseUrlBytes(
        com.google.protobuf.ByteString value) {
      if (value == null) { throw new NullPointerException(); }
      checkByteStringIsUtf8(value);
      baseUrl_ = value;
      bitField0_ |= 0x00000001;
      onChanged();
      return this;
    }

    private int hashAlgorithm_ = 0;
    /**
     * <pre>
     * The hash algorithm used for the Merkle Tree.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
     * @return The enum numeric value on the wire for hashAlgorithm.
     */
    @java.lang.Override public int getHashAlgorithmValue() {
      return hashAlgorithm_;
    }
    /**
     * <pre>
     * The hash algorithm used for the Merkle Tree.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
     * @param value The enum numeric value on the wire for hashAlgorithm to set.
     * @return This builder for chaining.
     */
    public Builder setHashAlgorithmValue(int value) {
      hashAlgorithm_ = value;
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The hash algorithm used for the Merkle Tree.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
     * @return The hashAlgorithm.
     */
    @java.lang.Override
    public dev.sigstore.proto.common.v1.HashAlgorithm getHashAlgorithm() {
      dev.sigstore.proto.common.v1.HashAlgorithm result = dev.sigstore.proto.common.v1.HashAlgorithm.forNumber(hashAlgorithm_);
      return result == null ? dev.sigstore.proto.common.v1.HashAlgorithm.UNRECOGNIZED : result;
    }
    /**
     * <pre>
     * The hash algorithm used for the Merkle Tree.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
     * @param value The hashAlgorithm to set.
     * @return This builder for chaining.
     */
    public Builder setHashAlgorithm(dev.sigstore.proto.common.v1.HashAlgorithm value) {
      if (value == null) {
        throw new NullPointerException();
      }
      bitField0_ |= 0x00000002;
      hashAlgorithm_ = value.getNumber();
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The hash algorithm used for the Merkle Tree.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
     * @return This builder for chaining.
     */
    public Builder clearHashAlgorithm() {
      bitField0_ = (bitField0_ & ~0x00000002);
      hashAlgorithm_ = 0;
      onChanged();
      return this;
    }

    private dev.sigstore.proto.common.v1.PublicKey publicKey_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.common.v1.PublicKey, dev.sigstore.proto.common.v1.PublicKey.Builder, dev.sigstore.proto.common.v1.PublicKeyOrBuilder> publicKeyBuilder_;
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     * @return Whether the publicKey field is set.
     */
    public boolean hasPublicKey() {
      return ((bitField0_ & 0x00000004) != 0);
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     * @return The publicKey.
     */
    public dev.sigstore.proto.common.v1.PublicKey getPublicKey() {
      if (publicKeyBuilder_ == null) {
        return publicKey_ == null ? dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
      } else {
        return publicKeyBuilder_.getMessage();
      }
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    public Builder setPublicKey(dev.sigstore.proto.common.v1.PublicKey value) {
      if (publicKeyBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        publicKey_ = value;
      } else {
        publicKeyBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    public Builder setPublicKey(
        dev.sigstore.proto.common.v1.PublicKey.Builder builderForValue) {
      if (publicKeyBuilder_ == null) {
        publicKey_ = builderForValue.build();
      } else {
        publicKeyBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    public Builder mergePublicKey(dev.sigstore.proto.common.v1.PublicKey value) {
      if (publicKeyBuilder_ == null) {
        if (((bitField0_ & 0x00000004) != 0) &&
          publicKey_ != null &&
          publicKey_ != dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance()) {
          getPublicKeyBuilder().mergeFrom(value);
        } else {
          publicKey_ = value;
        }
      } else {
        publicKeyBuilder_.mergeFrom(value);
      }
      if (publicKey_ != null) {
        bitField0_ |= 0x00000004;
        onChanged();
      }
      return this;
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    public Builder clearPublicKey() {
      bitField0_ = (bitField0_ & ~0x00000004);
      publicKey_ = null;
      if (publicKeyBuilder_ != null) {
        publicKeyBuilder_.dispose();
        publicKeyBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    public dev.sigstore.proto.common.v1.PublicKey.Builder getPublicKeyBuilder() {
      bitField0_ |= 0x00000004;
      onChanged();
      return internalGetPublicKeyFieldBuilder().getBuilder();
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    public dev.sigstore.proto.common.v1.PublicKeyOrBuilder getPublicKeyOrBuilder() {
      if (publicKeyBuilder_ != null) {
        return publicKeyBuilder_.getMessageOrBuilder();
      } else {
        return publicKey_ == null ?
            dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
      }
    }
    /**
     * <pre>
     * The public key used to verify signatures generated by the log.
     * This attribute contains the signature algorithm used by the log.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.common.v1.PublicKey, dev.sigstore.proto.common.v1.PublicKey.Builder, dev.sigstore.proto.common.v1.PublicKeyOrBuilder> 
        internalGetPublicKeyFieldBuilder() {
      if (publicKeyBuilder_ == null) {
        publicKeyBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.common.v1.PublicKey, dev.sigstore.proto.common.v1.PublicKey.Builder, dev.sigstore.proto.common.v1.PublicKeyOrBuilder>(
                getPublicKey(),
                getParentForChildren(),
                isClean());
        publicKey_ = null;
      }
      return publicKeyBuilder_;
    }

    private dev.sigstore.proto.common.v1.LogId logId_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder> logIdBuilder_;
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     * @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
     *     See sigstore_trustroot.proto;l=53
     * @return Whether the logId field is set.
     */
    @java.lang.Deprecated public boolean hasLogId() {
      return ((bitField0_ & 0x00000008) != 0);
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     * @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
     *     See sigstore_trustroot.proto;l=53
     * @return The logId.
     */
    @java.lang.Deprecated public dev.sigstore.proto.common.v1.LogId getLogId() {
      if (logIdBuilder_ == null) {
        return logId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
      } else {
        return logIdBuilder_.getMessage();
      }
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    @java.lang.Deprecated public Builder setLogId(dev.sigstore.proto.common.v1.LogId value) {
      if (logIdBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        logId_ = value;
      } else {
        logIdBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    @java.lang.Deprecated public Builder setLogId(
        dev.sigstore.proto.common.v1.LogId.Builder builderForValue) {
      if (logIdBuilder_ == null) {
        logId_ = builderForValue.build();
      } else {
        logIdBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    @java.lang.Deprecated public Builder mergeLogId(dev.sigstore.proto.common.v1.LogId value) {
      if (logIdBuilder_ == null) {
        if (((bitField0_ & 0x00000008) != 0) &&
          logId_ != null &&
          logId_ != dev.sigstore.proto.common.v1.LogId.getDefaultInstance()) {
          getLogIdBuilder().mergeFrom(value);
        } else {
          logId_ = value;
        }
      } else {
        logIdBuilder_.mergeFrom(value);
      }
      if (logId_ != null) {
        bitField0_ |= 0x00000008;
        onChanged();
      }
      return this;
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    @java.lang.Deprecated public Builder clearLogId() {
      bitField0_ = (bitField0_ & ~0x00000008);
      logId_ = null;
      if (logIdBuilder_ != null) {
        logIdBuilder_.dispose();
        logIdBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    @java.lang.Deprecated public dev.sigstore.proto.common.v1.LogId.Builder getLogIdBuilder() {
      bitField0_ |= 0x00000008;
      onChanged();
      return internalGetLogIdFieldBuilder().getBuilder();
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    @java.lang.Deprecated public dev.sigstore.proto.common.v1.LogIdOrBuilder getLogIdOrBuilder() {
      if (logIdBuilder_ != null) {
        return logIdBuilder_.getMessageOrBuilder();
      } else {
        return logId_ == null ?
            dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
      }
    }
    /**
     * <pre>
     * The unique identifier for this transparency log.
     * Represented as the SHA-256 hash of the log's public key,
     * calculated over the DER encoding of the key represented as
     * SubjectPublicKeyInfo.
     * See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
     * MUST set checkpoint_key_id if multiple logs use the same
     * signing key.
     * Deprecated: Use checkpoint_key_id instead, since log_id is not
     * guaranteed to be unique across multiple deployments. Clients
     * must use the key name and key ID from a checkpoint to determine
     * the correct TransparencyLogInstance to verify a proof.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder> 
        internalGetLogIdFieldBuilder() {
      if (logIdBuilder_ == null) {
        logIdBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder>(
                getLogId(),
                getParentForChildren(),
                isClean());
        logId_ = null;
      }
      return logIdBuilder_;
    }

    private dev.sigstore.proto.common.v1.LogId checkpointKeyId_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder> checkpointKeyIdBuilder_;
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     * @return Whether the checkpointKeyId field is set.
     */
    public boolean hasCheckpointKeyId() {
      return ((bitField0_ & 0x00000010) != 0);
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     * @return The checkpointKeyId.
     */
    public dev.sigstore.proto.common.v1.LogId getCheckpointKeyId() {
      if (checkpointKeyIdBuilder_ == null) {
        return checkpointKeyId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
      } else {
        return checkpointKeyIdBuilder_.getMessage();
      }
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    public Builder setCheckpointKeyId(dev.sigstore.proto.common.v1.LogId value) {
      if (checkpointKeyIdBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        checkpointKeyId_ = value;
      } else {
        checkpointKeyIdBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000010;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    public Builder setCheckpointKeyId(
        dev.sigstore.proto.common.v1.LogId.Builder builderForValue) {
      if (checkpointKeyIdBuilder_ == null) {
        checkpointKeyId_ = builderForValue.build();
      } else {
        checkpointKeyIdBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000010;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    public Builder mergeCheckpointKeyId(dev.sigstore.proto.common.v1.LogId value) {
      if (checkpointKeyIdBuilder_ == null) {
        if (((bitField0_ & 0x00000010) != 0) &&
          checkpointKeyId_ != null &&
          checkpointKeyId_ != dev.sigstore.proto.common.v1.LogId.getDefaultInstance()) {
          getCheckpointKeyIdBuilder().mergeFrom(value);
        } else {
          checkpointKeyId_ = value;
        }
      } else {
        checkpointKeyIdBuilder_.mergeFrom(value);
      }
      if (checkpointKeyId_ != null) {
        bitField0_ |= 0x00000010;
        onChanged();
      }
      return this;
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    public Builder clearCheckpointKeyId() {
      bitField0_ = (bitField0_ & ~0x00000010);
      checkpointKeyId_ = null;
      if (checkpointKeyIdBuilder_ != null) {
        checkpointKeyIdBuilder_.dispose();
        checkpointKeyIdBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    public dev.sigstore.proto.common.v1.LogId.Builder getCheckpointKeyIdBuilder() {
      bitField0_ |= 0x00000010;
      onChanged();
      return internalGetCheckpointKeyIdFieldBuilder().getBuilder();
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    public dev.sigstore.proto.common.v1.LogIdOrBuilder getCheckpointKeyIdOrBuilder() {
      if (checkpointKeyIdBuilder_ != null) {
        return checkpointKeyIdBuilder_.getMessageOrBuilder();
      } else {
        return checkpointKeyId_ == null ?
            dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
      }
    }
    /**
     * <pre>
     * The unique identifier for the log, used in the checkpoint.
     * Its calculation is described in
     * https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
     * SHOULD be set for all logs. When not set, clients MUST use log_id.
     *
     * For Ed25519 signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
     * For ECDSA signatures, the key ID is computed per the C2SP spec:
     * key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
     * For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
     * "PKIX-RSA-PKCS#1v1.5":
     * key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
     *
     * This is provided for convenience. Clients can also calculate the
     * checkpoint key ID given the log's public key.
     * SHOULD be 4 bytes long, as a truncated hash.
     *
     * To find a matching TransparencyLogInstance in the TrustedRoot,
     * clients will parse the checkpoint, and for each signature line,
     * use the key name (i.e. log origin, base_url from TrustedRoot)
     * and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
     * which can then be compared against the TrustedRoot log instances.
     * </pre>
     *
     * <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder> 
        internalGetCheckpointKeyIdFieldBuilder() {
      if (checkpointKeyIdBuilder_ == null) {
        checkpointKeyIdBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder>(
                getCheckpointKeyId(),
                getParentForChildren(),
                isClean());
        checkpointKeyId_ = null;
      }
      return checkpointKeyIdBuilder_;
    }

    private java.lang.Object operator_ = "";
    /**
     * <pre>
     * The name of the operator of this log deployment. Operator MUST be
     * formatted as a scheme-less URI, e.g. sigstore.dev
     * This MUST be used when there are multiple transparency log instances
     * to determine if log proof verification meets a specified threshold,
     * e.g. two proofs from log deployments operated by the same operator
     * should count as only one valid proof.
     * </pre>
     *
     * <code>string operator = 6;</code>
     * @return The operator.
     */
    public java.lang.String getOperator() {
      java.lang.Object ref = operator_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs =
            (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        operator_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     * <pre>
     * The name of the operator of this log deployment. Operator MUST be
     * formatted as a scheme-less URI, e.g. sigstore.dev
     * This MUST be used when there are multiple transparency log instances
     * to determine if log proof verification meets a specified threshold,
     * e.g. two proofs from log deployments operated by the same operator
     * should count as only one valid proof.
     * </pre>
     *
     * <code>string operator = 6;</code>
     * @return The bytes for operator.
     */
    public com.google.protobuf.ByteString
        getOperatorBytes() {
      java.lang.Object ref = operator_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b = 
            com.google.protobuf.ByteString.copyFromUtf8(
                (java.lang.String) ref);
        operator_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     * <pre>
     * The name of the operator of this log deployment. Operator MUST be
     * formatted as a scheme-less URI, e.g. sigstore.dev
     * This MUST be used when there are multiple transparency log instances
     * to determine if log proof verification meets a specified threshold,
     * e.g. two proofs from log deployments operated by the same operator
     * should count as only one valid proof.
     * </pre>
     *
     * <code>string operator = 6;</code>
     * @param value The operator to set.
     * @return This builder for chaining.
     */
    public Builder setOperator(
        java.lang.String value) {
      if (value == null) { throw new NullPointerException(); }
      operator_ = value;
      bitField0_ |= 0x00000020;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The name of the operator of this log deployment. Operator MUST be
     * formatted as a scheme-less URI, e.g. sigstore.dev
     * This MUST be used when there are multiple transparency log instances
     * to determine if log proof verification meets a specified threshold,
     * e.g. two proofs from log deployments operated by the same operator
     * should count as only one valid proof.
     * </pre>
     *
     * <code>string operator = 6;</code>
     * @return This builder for chaining.
     */
    public Builder clearOperator() {
      operator_ = getDefaultInstance().getOperator();
      bitField0_ = (bitField0_ & ~0x00000020);
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The name of the operator of this log deployment. Operator MUST be
     * formatted as a scheme-less URI, e.g. sigstore.dev
     * This MUST be used when there are multiple transparency log instances
     * to determine if log proof verification meets a specified threshold,
     * e.g. two proofs from log deployments operated by the same operator
     * should count as only one valid proof.
     * </pre>
     *
     * <code>string operator = 6;</code>
     * @param value The bytes for operator to set.
     * @return This builder for chaining.
     */
    public Builder setOperatorBytes(
        com.google.protobuf.ByteString value) {
      if (value == null) { throw new NullPointerException(); }
      checkByteStringIsUtf8(value);
      operator_ = value;
      bitField0_ |= 0x00000020;
      onChanged();
      return this;
    }

    // @@protoc_insertion_point(builder_scope:dev.sigstore.trustroot.v1.TransparencyLogInstance)
  }

  // @@protoc_insertion_point(class_scope:dev.sigstore.trustroot.v1.TransparencyLogInstance)
  private static final dev.sigstore.proto.trustroot.v1.TransparencyLogInstance DEFAULT_INSTANCE;
  static {
    DEFAULT_INSTANCE = new dev.sigstore.proto.trustroot.v1.TransparencyLogInstance();
  }

  public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance getDefaultInstance() {
    return DEFAULT_INSTANCE;
  }

  private static final com.google.protobuf.Parser<TransparencyLogInstance>
      PARSER = new com.google.protobuf.AbstractParser<TransparencyLogInstance>() {
    @java.lang.Override
    public TransparencyLogInstance parsePartialFrom(
        com.google.protobuf.CodedInputStream input,
        com.google.protobuf.ExtensionRegistryLite extensionRegistry)
        throws com.google.protobuf.InvalidProtocolBufferException {
      Builder builder = newBuilder();
      try {
        builder.mergeFrom(input, extensionRegistry);
      } catch (com.google.protobuf.InvalidProtocolBufferException e) {
        throw e.setUnfinishedMessage(builder.buildPartial());
      } catch (com.google.protobuf.UninitializedMessageException e) {
        throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
      } catch (java.io.IOException e) {
        throw new com.google.protobuf.InvalidProtocolBufferException(e)
            .setUnfinishedMessage(builder.buildPartial());
      }
      return builder.buildPartial();
    }
  };

  public static com.google.protobuf.Parser<TransparencyLogInstance> parser() {
    return PARSER;
  }

  @java.lang.Override
  public com.google.protobuf.Parser<TransparencyLogInstance> getParserForType() {
    return PARSER;
  }

  @java.lang.Override
  public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance getDefaultInstanceForType() {
    return DEFAULT_INSTANCE;
  }

}