1 // Generated by the protocol buffer compiler. DO NOT EDIT!
2 // source: system/security/keystore/keystore_client.proto
3
4 #ifndef GOOGLE_PROTOBUF_INCLUDED_system_2fsecurity_2fkeystore_2fkeystore_5fclient_2eproto
5 #define GOOGLE_PROTOBUF_INCLUDED_system_2fsecurity_2fkeystore_2fkeystore_5fclient_2eproto
6
7 #include <cstdint>
8 #include <limits>
9 #include <string>
10
11 #include <google/protobuf/port_def.inc>
12 #if PROTOBUF_VERSION < 3021000
13 #error This file was generated by a newer version of protoc which is
14 #error incompatible with your Protocol Buffer headers. Please update
15 #error your headers.
16 #endif
17 #if 3021012 < PROTOBUF_MIN_PROTOC_VERSION
18 #error This file was generated by an older version of protoc which is
19 #error incompatible with your Protocol Buffer headers. Please
20 #error regenerate this file with a newer version of protoc.
21 #endif
22
23 #include <google/protobuf/port_undef.inc>
24 #include <google/protobuf/io/coded_stream.h>
25 #include <google/protobuf/arena.h>
26 #include <google/protobuf/arenastring.h>
27 #include <google/protobuf/generated_message_util.h>
28 #include <google/protobuf/metadata_lite.h>
29 #include <google/protobuf/message_lite.h>
30 #include <google/protobuf/repeated_field.h> // IWYU pragma: export
31 #include <google/protobuf/extension_set.h> // IWYU pragma: export
32 // @@protoc_insertion_point(includes)
33 #include <google/protobuf/port_def.inc>
34 #define PROTOBUF_INTERNAL_EXPORT_system_2fsecurity_2fkeystore_2fkeystore_5fclient_2eproto
35 PROTOBUF_NAMESPACE_OPEN
36 namespace internal {
37 class AnyMetadata;
38 } // namespace internal
39 PROTOBUF_NAMESPACE_CLOSE
40
41 // Internal implementation detail -- do not use these members.
42 struct TableStruct_system_2fsecurity_2fkeystore_2fkeystore_5fclient_2eproto {
43 static const ::uint32_t offsets[];
44 };
45 namespace keystore {
46 class EncryptedData;
47 struct EncryptedDataDefaultTypeInternal;
48 extern EncryptedDataDefaultTypeInternal _EncryptedData_default_instance_;
49 } // namespace keystore
50 PROTOBUF_NAMESPACE_OPEN
51 template<> ::keystore::EncryptedData* Arena::CreateMaybeMessage<::keystore::EncryptedData>(Arena*);
52 PROTOBUF_NAMESPACE_CLOSE
53 namespace keystore {
54
55 // ===================================================================
56
57 class EncryptedData final :
58 public ::PROTOBUF_NAMESPACE_ID::MessageLite /* @@protoc_insertion_point(class_definition:keystore.EncryptedData) */ {
59 public:
EncryptedData()60 inline EncryptedData() : EncryptedData(nullptr) {}
61 ~EncryptedData() override;
62 explicit PROTOBUF_CONSTEXPR EncryptedData(::PROTOBUF_NAMESPACE_ID::internal::ConstantInitialized);
63
64 EncryptedData(const EncryptedData& from);
EncryptedData(EncryptedData && from)65 EncryptedData(EncryptedData&& from) noexcept
66 : EncryptedData() {
67 *this = ::std::move(from);
68 }
69
70 inline EncryptedData& operator=(const EncryptedData& from) {
71 if (this == &from) return *this;
72 CopyFrom(from);
73 return *this;
74 }
75 inline EncryptedData& operator=(EncryptedData&& from) noexcept {
76 if (this == &from) return *this;
77 if (GetOwningArena() == from.GetOwningArena()
78 #ifdef PROTOBUF_FORCE_COPY_IN_MOVE
79 && GetOwningArena() != nullptr
80 #endif // !PROTOBUF_FORCE_COPY_IN_MOVE
81 ) {
82 InternalSwap(&from);
83 } else {
84 CopyFrom(from);
85 }
86 return *this;
87 }
88
unknown_fields()89 inline const std::string& unknown_fields() const {
90 return _internal_metadata_.unknown_fields<std::string>(::PROTOBUF_NAMESPACE_ID::internal::GetEmptyString);
91 }
mutable_unknown_fields()92 inline std::string* mutable_unknown_fields() {
93 return _internal_metadata_.mutable_unknown_fields<std::string>();
94 }
95
default_instance()96 static const EncryptedData& default_instance() {
97 return *internal_default_instance();
98 }
internal_default_instance()99 static inline const EncryptedData* internal_default_instance() {
100 return reinterpret_cast<const EncryptedData*>(
101 &_EncryptedData_default_instance_);
102 }
103 static constexpr int kIndexInFileMessages =
104 0;
105
swap(EncryptedData & a,EncryptedData & b)106 friend void swap(EncryptedData& a, EncryptedData& b) {
107 a.Swap(&b);
108 }
Swap(EncryptedData * other)109 inline void Swap(EncryptedData* other) {
110 if (other == this) return;
111 #ifdef PROTOBUF_FORCE_COPY_IN_SWAP
112 if (GetOwningArena() != nullptr &&
113 GetOwningArena() == other->GetOwningArena()) {
114 #else // PROTOBUF_FORCE_COPY_IN_SWAP
115 if (GetOwningArena() == other->GetOwningArena()) {
116 #endif // !PROTOBUF_FORCE_COPY_IN_SWAP
117 InternalSwap(other);
118 } else {
119 ::PROTOBUF_NAMESPACE_ID::internal::GenericSwap(this, other);
120 }
121 }
122 void UnsafeArenaSwap(EncryptedData* other) {
123 if (other == this) return;
124 GOOGLE_DCHECK(GetOwningArena() == other->GetOwningArena());
125 InternalSwap(other);
126 }
127
128 // implements Message ----------------------------------------------
129
130 EncryptedData* New(::PROTOBUF_NAMESPACE_ID::Arena* arena) const final {
131 return CreateMaybeMessage<EncryptedData>(arena);
132 }
133 EncryptedData* New() const {
134 return New(nullptr);
135 }
136 void CheckTypeAndMergeFrom(const ::PROTOBUF_NAMESPACE_ID::MessageLite& from) final;
137 void CopyFrom(const EncryptedData& from);
138 void MergeFrom(const EncryptedData& from);
139 PROTOBUF_ATTRIBUTE_REINITIALIZES void Clear() final;
140 bool IsInitialized() const final;
141
142 size_t ByteSizeLong() const final;
143 const char* _InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) final;
144 ::uint8_t* _InternalSerialize(
145 ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const final;
146 int GetCachedSize() const final { return _impl_._cached_size_.Get(); }
147
148 private:
149 void SharedCtor(::PROTOBUF_NAMESPACE_ID::Arena* arena, bool is_message_owned);
150 void SharedDtor();
151 void SetCachedSize(int size) const;
152 void InternalSwap(EncryptedData* other);
153
154 private:
155 friend class ::PROTOBUF_NAMESPACE_ID::internal::AnyMetadata;
156 static ::PROTOBUF_NAMESPACE_ID::StringPiece FullMessageName() {
157 return "keystore.EncryptedData";
158 }
159 protected:
160 explicit EncryptedData(::PROTOBUF_NAMESPACE_ID::Arena* arena,
161 bool is_message_owned = false);
162 public:
163
164 std::string GetTypeName() const final;
165
166 // nested types ----------------------------------------------------
167
168 // accessors -------------------------------------------------------
169
170 enum : int {
171 kInitVectorFieldNumber = 1,
172 kAuthenticationDataFieldNumber = 2,
173 kEncryptedDataFieldNumber = 3,
174 };
175 // optional bytes init_vector = 1;
176 bool has_init_vector() const;
177 private:
178 bool _internal_has_init_vector() const;
179 public:
180 void clear_init_vector();
181 const std::string& init_vector() const;
182 template <typename ArgT0 = const std::string&, typename... ArgT>
183 void set_init_vector(ArgT0&& arg0, ArgT... args);
184 std::string* mutable_init_vector();
185 PROTOBUF_NODISCARD std::string* release_init_vector();
186 void set_allocated_init_vector(std::string* init_vector);
187 private:
188 const std::string& _internal_init_vector() const;
189 inline PROTOBUF_ALWAYS_INLINE void _internal_set_init_vector(const std::string& value);
190 std::string* _internal_mutable_init_vector();
191 public:
192
193 // optional bytes authentication_data = 2;
194 bool has_authentication_data() const;
195 private:
196 bool _internal_has_authentication_data() const;
197 public:
198 void clear_authentication_data();
199 const std::string& authentication_data() const;
200 template <typename ArgT0 = const std::string&, typename... ArgT>
201 void set_authentication_data(ArgT0&& arg0, ArgT... args);
202 std::string* mutable_authentication_data();
203 PROTOBUF_NODISCARD std::string* release_authentication_data();
204 void set_allocated_authentication_data(std::string* authentication_data);
205 private:
206 const std::string& _internal_authentication_data() const;
207 inline PROTOBUF_ALWAYS_INLINE void _internal_set_authentication_data(const std::string& value);
208 std::string* _internal_mutable_authentication_data();
209 public:
210
211 // optional bytes encrypted_data = 3;
212 bool has_encrypted_data() const;
213 private:
214 bool _internal_has_encrypted_data() const;
215 public:
216 void clear_encrypted_data();
217 const std::string& encrypted_data() const;
218 template <typename ArgT0 = const std::string&, typename... ArgT>
219 void set_encrypted_data(ArgT0&& arg0, ArgT... args);
220 std::string* mutable_encrypted_data();
221 PROTOBUF_NODISCARD std::string* release_encrypted_data();
222 void set_allocated_encrypted_data(std::string* encrypted_data);
223 private:
224 const std::string& _internal_encrypted_data() const;
225 inline PROTOBUF_ALWAYS_INLINE void _internal_set_encrypted_data(const std::string& value);
226 std::string* _internal_mutable_encrypted_data();
227 public:
228
229 // @@protoc_insertion_point(class_scope:keystore.EncryptedData)
230 private:
231 class _Internal;
232
233 template <typename T> friend class ::PROTOBUF_NAMESPACE_ID::Arena::InternalHelper;
234 typedef void InternalArenaConstructable_;
235 typedef void DestructorSkippable_;
236 struct Impl_ {
237 ::PROTOBUF_NAMESPACE_ID::internal::HasBits<1> _has_bits_;
238 mutable ::PROTOBUF_NAMESPACE_ID::internal::CachedSize _cached_size_;
239 ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr init_vector_;
240 ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr authentication_data_;
241 ::PROTOBUF_NAMESPACE_ID::internal::ArenaStringPtr encrypted_data_;
242 };
243 union { Impl_ _impl_; };
244 friend struct ::TableStruct_system_2fsecurity_2fkeystore_2fkeystore_5fclient_2eproto;
245 };
246 // ===================================================================
247
248
249 // ===================================================================
250
251 #ifdef __GNUC__
252 #pragma GCC diagnostic push
253 #pragma GCC diagnostic ignored "-Wstrict-aliasing"
254 #endif // __GNUC__
255 // EncryptedData
256
257 // optional bytes init_vector = 1;
_internal_has_init_vector()258 inline bool EncryptedData::_internal_has_init_vector() const {
259 bool value = (_impl_._has_bits_[0] & 0x00000001u) != 0;
260 return value;
261 }
has_init_vector()262 inline bool EncryptedData::has_init_vector() const {
263 return _internal_has_init_vector();
264 }
clear_init_vector()265 inline void EncryptedData::clear_init_vector() {
266 _impl_.init_vector_.ClearToEmpty();
267 _impl_._has_bits_[0] &= ~0x00000001u;
268 }
init_vector()269 inline const std::string& EncryptedData::init_vector() const {
270 // @@protoc_insertion_point(field_get:keystore.EncryptedData.init_vector)
271 return _internal_init_vector();
272 }
273 template <typename ArgT0, typename... ArgT>
274 inline PROTOBUF_ALWAYS_INLINE
set_init_vector(ArgT0 && arg0,ArgT...args)275 void EncryptedData::set_init_vector(ArgT0&& arg0, ArgT... args) {
276 _impl_._has_bits_[0] |= 0x00000001u;
277 _impl_.init_vector_.SetBytes(static_cast<ArgT0 &&>(arg0), args..., GetArenaForAllocation());
278 // @@protoc_insertion_point(field_set:keystore.EncryptedData.init_vector)
279 }
mutable_init_vector()280 inline std::string* EncryptedData::mutable_init_vector() {
281 std::string* _s = _internal_mutable_init_vector();
282 // @@protoc_insertion_point(field_mutable:keystore.EncryptedData.init_vector)
283 return _s;
284 }
_internal_init_vector()285 inline const std::string& EncryptedData::_internal_init_vector() const {
286 return _impl_.init_vector_.Get();
287 }
_internal_set_init_vector(const std::string & value)288 inline void EncryptedData::_internal_set_init_vector(const std::string& value) {
289 _impl_._has_bits_[0] |= 0x00000001u;
290 _impl_.init_vector_.Set(value, GetArenaForAllocation());
291 }
_internal_mutable_init_vector()292 inline std::string* EncryptedData::_internal_mutable_init_vector() {
293 _impl_._has_bits_[0] |= 0x00000001u;
294 return _impl_.init_vector_.Mutable(GetArenaForAllocation());
295 }
release_init_vector()296 inline std::string* EncryptedData::release_init_vector() {
297 // @@protoc_insertion_point(field_release:keystore.EncryptedData.init_vector)
298 if (!_internal_has_init_vector()) {
299 return nullptr;
300 }
301 _impl_._has_bits_[0] &= ~0x00000001u;
302 auto* p = _impl_.init_vector_.Release();
303 #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
304 if (_impl_.init_vector_.IsDefault()) {
305 _impl_.init_vector_.Set("", GetArenaForAllocation());
306 }
307 #endif // PROTOBUF_FORCE_COPY_DEFAULT_STRING
308 return p;
309 }
set_allocated_init_vector(std::string * init_vector)310 inline void EncryptedData::set_allocated_init_vector(std::string* init_vector) {
311 if (init_vector != nullptr) {
312 _impl_._has_bits_[0] |= 0x00000001u;
313 } else {
314 _impl_._has_bits_[0] &= ~0x00000001u;
315 }
316 _impl_.init_vector_.SetAllocated(init_vector, GetArenaForAllocation());
317 #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
318 if (_impl_.init_vector_.IsDefault()) {
319 _impl_.init_vector_.Set("", GetArenaForAllocation());
320 }
321 #endif // PROTOBUF_FORCE_COPY_DEFAULT_STRING
322 // @@protoc_insertion_point(field_set_allocated:keystore.EncryptedData.init_vector)
323 }
324
325 // optional bytes authentication_data = 2;
_internal_has_authentication_data()326 inline bool EncryptedData::_internal_has_authentication_data() const {
327 bool value = (_impl_._has_bits_[0] & 0x00000002u) != 0;
328 return value;
329 }
has_authentication_data()330 inline bool EncryptedData::has_authentication_data() const {
331 return _internal_has_authentication_data();
332 }
clear_authentication_data()333 inline void EncryptedData::clear_authentication_data() {
334 _impl_.authentication_data_.ClearToEmpty();
335 _impl_._has_bits_[0] &= ~0x00000002u;
336 }
authentication_data()337 inline const std::string& EncryptedData::authentication_data() const {
338 // @@protoc_insertion_point(field_get:keystore.EncryptedData.authentication_data)
339 return _internal_authentication_data();
340 }
341 template <typename ArgT0, typename... ArgT>
342 inline PROTOBUF_ALWAYS_INLINE
set_authentication_data(ArgT0 && arg0,ArgT...args)343 void EncryptedData::set_authentication_data(ArgT0&& arg0, ArgT... args) {
344 _impl_._has_bits_[0] |= 0x00000002u;
345 _impl_.authentication_data_.SetBytes(static_cast<ArgT0 &&>(arg0), args..., GetArenaForAllocation());
346 // @@protoc_insertion_point(field_set:keystore.EncryptedData.authentication_data)
347 }
mutable_authentication_data()348 inline std::string* EncryptedData::mutable_authentication_data() {
349 std::string* _s = _internal_mutable_authentication_data();
350 // @@protoc_insertion_point(field_mutable:keystore.EncryptedData.authentication_data)
351 return _s;
352 }
_internal_authentication_data()353 inline const std::string& EncryptedData::_internal_authentication_data() const {
354 return _impl_.authentication_data_.Get();
355 }
_internal_set_authentication_data(const std::string & value)356 inline void EncryptedData::_internal_set_authentication_data(const std::string& value) {
357 _impl_._has_bits_[0] |= 0x00000002u;
358 _impl_.authentication_data_.Set(value, GetArenaForAllocation());
359 }
_internal_mutable_authentication_data()360 inline std::string* EncryptedData::_internal_mutable_authentication_data() {
361 _impl_._has_bits_[0] |= 0x00000002u;
362 return _impl_.authentication_data_.Mutable(GetArenaForAllocation());
363 }
release_authentication_data()364 inline std::string* EncryptedData::release_authentication_data() {
365 // @@protoc_insertion_point(field_release:keystore.EncryptedData.authentication_data)
366 if (!_internal_has_authentication_data()) {
367 return nullptr;
368 }
369 _impl_._has_bits_[0] &= ~0x00000002u;
370 auto* p = _impl_.authentication_data_.Release();
371 #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
372 if (_impl_.authentication_data_.IsDefault()) {
373 _impl_.authentication_data_.Set("", GetArenaForAllocation());
374 }
375 #endif // PROTOBUF_FORCE_COPY_DEFAULT_STRING
376 return p;
377 }
set_allocated_authentication_data(std::string * authentication_data)378 inline void EncryptedData::set_allocated_authentication_data(std::string* authentication_data) {
379 if (authentication_data != nullptr) {
380 _impl_._has_bits_[0] |= 0x00000002u;
381 } else {
382 _impl_._has_bits_[0] &= ~0x00000002u;
383 }
384 _impl_.authentication_data_.SetAllocated(authentication_data, GetArenaForAllocation());
385 #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
386 if (_impl_.authentication_data_.IsDefault()) {
387 _impl_.authentication_data_.Set("", GetArenaForAllocation());
388 }
389 #endif // PROTOBUF_FORCE_COPY_DEFAULT_STRING
390 // @@protoc_insertion_point(field_set_allocated:keystore.EncryptedData.authentication_data)
391 }
392
393 // optional bytes encrypted_data = 3;
_internal_has_encrypted_data()394 inline bool EncryptedData::_internal_has_encrypted_data() const {
395 bool value = (_impl_._has_bits_[0] & 0x00000004u) != 0;
396 return value;
397 }
has_encrypted_data()398 inline bool EncryptedData::has_encrypted_data() const {
399 return _internal_has_encrypted_data();
400 }
clear_encrypted_data()401 inline void EncryptedData::clear_encrypted_data() {
402 _impl_.encrypted_data_.ClearToEmpty();
403 _impl_._has_bits_[0] &= ~0x00000004u;
404 }
encrypted_data()405 inline const std::string& EncryptedData::encrypted_data() const {
406 // @@protoc_insertion_point(field_get:keystore.EncryptedData.encrypted_data)
407 return _internal_encrypted_data();
408 }
409 template <typename ArgT0, typename... ArgT>
410 inline PROTOBUF_ALWAYS_INLINE
set_encrypted_data(ArgT0 && arg0,ArgT...args)411 void EncryptedData::set_encrypted_data(ArgT0&& arg0, ArgT... args) {
412 _impl_._has_bits_[0] |= 0x00000004u;
413 _impl_.encrypted_data_.SetBytes(static_cast<ArgT0 &&>(arg0), args..., GetArenaForAllocation());
414 // @@protoc_insertion_point(field_set:keystore.EncryptedData.encrypted_data)
415 }
mutable_encrypted_data()416 inline std::string* EncryptedData::mutable_encrypted_data() {
417 std::string* _s = _internal_mutable_encrypted_data();
418 // @@protoc_insertion_point(field_mutable:keystore.EncryptedData.encrypted_data)
419 return _s;
420 }
_internal_encrypted_data()421 inline const std::string& EncryptedData::_internal_encrypted_data() const {
422 return _impl_.encrypted_data_.Get();
423 }
_internal_set_encrypted_data(const std::string & value)424 inline void EncryptedData::_internal_set_encrypted_data(const std::string& value) {
425 _impl_._has_bits_[0] |= 0x00000004u;
426 _impl_.encrypted_data_.Set(value, GetArenaForAllocation());
427 }
_internal_mutable_encrypted_data()428 inline std::string* EncryptedData::_internal_mutable_encrypted_data() {
429 _impl_._has_bits_[0] |= 0x00000004u;
430 return _impl_.encrypted_data_.Mutable(GetArenaForAllocation());
431 }
release_encrypted_data()432 inline std::string* EncryptedData::release_encrypted_data() {
433 // @@protoc_insertion_point(field_release:keystore.EncryptedData.encrypted_data)
434 if (!_internal_has_encrypted_data()) {
435 return nullptr;
436 }
437 _impl_._has_bits_[0] &= ~0x00000004u;
438 auto* p = _impl_.encrypted_data_.Release();
439 #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
440 if (_impl_.encrypted_data_.IsDefault()) {
441 _impl_.encrypted_data_.Set("", GetArenaForAllocation());
442 }
443 #endif // PROTOBUF_FORCE_COPY_DEFAULT_STRING
444 return p;
445 }
set_allocated_encrypted_data(std::string * encrypted_data)446 inline void EncryptedData::set_allocated_encrypted_data(std::string* encrypted_data) {
447 if (encrypted_data != nullptr) {
448 _impl_._has_bits_[0] |= 0x00000004u;
449 } else {
450 _impl_._has_bits_[0] &= ~0x00000004u;
451 }
452 _impl_.encrypted_data_.SetAllocated(encrypted_data, GetArenaForAllocation());
453 #ifdef PROTOBUF_FORCE_COPY_DEFAULT_STRING
454 if (_impl_.encrypted_data_.IsDefault()) {
455 _impl_.encrypted_data_.Set("", GetArenaForAllocation());
456 }
457 #endif // PROTOBUF_FORCE_COPY_DEFAULT_STRING
458 // @@protoc_insertion_point(field_set_allocated:keystore.EncryptedData.encrypted_data)
459 }
460
461 #ifdef __GNUC__
462 #pragma GCC diagnostic pop
463 #endif // __GNUC__
464
465 // @@protoc_insertion_point(namespace_scope)
466
467 } // namespace keystore
468
469 // @@protoc_insertion_point(global_scope)
470
471 #include <google/protobuf/port_undef.inc>
472 #endif // GOOGLE_PROTOBUF_INCLUDED_GOOGLE_PROTOBUF_INCLUDED_system_2fsecurity_2fkeystore_2fkeystore_5fclient_2eproto
473