PostLAMessages.pb.cc 40 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049
  1. // Generated by the protocol buffer compiler. DO NOT EDIT!
  2. // source: PostLAMessages.proto
  3. #include "PostLAMessages.pb.h"
  4. #include <algorithm>
  5. #include <google/protobuf/io/coded_stream.h>
  6. #include <google/protobuf/extension_set.h>
  7. #include <google/protobuf/wire_format_lite.h>
  8. #include <google/protobuf/io/zero_copy_stream_impl_lite.h>
  9. // @@protoc_insertion_point(includes)
  10. #include <google/protobuf/port_def.inc>
  11. extern PROTOBUF_INTERNAL_EXPORT_PostLAMessages_2eproto ::PROTOBUF_NAMESPACE_ID::internal::SCCInfo<0> scc_info_ciphertext_client_data_field_PostLAMessages_2eproto;
  12. class ciphertext_client_data_fieldDefaultTypeInternal {
  13. public:
  14. ::PROTOBUF_NAMESPACE_ID::internal::ExplicitlyConstructed<ciphertext_client_data_field> _instance;
  15. } _ciphertext_client_data_field_default_instance_;
  16. class extension_to_decryptor_enclosed_msgDefaultTypeInternal {
  17. public:
  18. ::PROTOBUF_NAMESPACE_ID::internal::ExplicitlyConstructed<extension_to_decryptor_enclosed_msg> _instance;
  19. } _extension_to_decryptor_enclosed_msg_default_instance_;
  20. class extension_to_decryptor_ciphertext_msgDefaultTypeInternal {
  21. public:
  22. ::PROTOBUF_NAMESPACE_ID::internal::ExplicitlyConstructed<extension_to_decryptor_ciphertext_msg> _instance;
  23. } _extension_to_decryptor_ciphertext_msg_default_instance_;
  24. class decryptor_to_extension_msg_tDefaultTypeInternal {
  25. public:
  26. ::PROTOBUF_NAMESPACE_ID::internal::ExplicitlyConstructed<decryptor_to_extension_msg_t> _instance;
  27. } _decryptor_to_extension_msg_t_default_instance_;
  28. static void InitDefaultsscc_info_ciphertext_client_data_field_PostLAMessages_2eproto() {
  29. GOOGLE_PROTOBUF_VERIFY_VERSION;
  30. {
  31. void* ptr = &::_ciphertext_client_data_field_default_instance_;
  32. new (ptr) ::ciphertext_client_data_field();
  33. ::PROTOBUF_NAMESPACE_ID::internal::OnShutdownDestroyMessage(ptr);
  34. }
  35. ::ciphertext_client_data_field::InitAsDefaultInstance();
  36. }
  37. ::PROTOBUF_NAMESPACE_ID::internal::SCCInfo<0> scc_info_ciphertext_client_data_field_PostLAMessages_2eproto =
  38. {{ATOMIC_VAR_INIT(::PROTOBUF_NAMESPACE_ID::internal::SCCInfoBase::kUninitialized), 0, InitDefaultsscc_info_ciphertext_client_data_field_PostLAMessages_2eproto}, {}};
  39. static void InitDefaultsscc_info_decryptor_to_extension_msg_t_PostLAMessages_2eproto() {
  40. GOOGLE_PROTOBUF_VERIFY_VERSION;
  41. {
  42. void* ptr = &::_decryptor_to_extension_msg_t_default_instance_;
  43. new (ptr) ::decryptor_to_extension_msg_t();
  44. ::PROTOBUF_NAMESPACE_ID::internal::OnShutdownDestroyMessage(ptr);
  45. }
  46. ::decryptor_to_extension_msg_t::InitAsDefaultInstance();
  47. }
  48. ::PROTOBUF_NAMESPACE_ID::internal::SCCInfo<1> scc_info_decryptor_to_extension_msg_t_PostLAMessages_2eproto =
  49. {{ATOMIC_VAR_INIT(::PROTOBUF_NAMESPACE_ID::internal::SCCInfoBase::kUninitialized), 1, InitDefaultsscc_info_decryptor_to_extension_msg_t_PostLAMessages_2eproto}, {
  50. &scc_info_ciphertext_client_data_field_PostLAMessages_2eproto.base,}};
  51. static void InitDefaultsscc_info_extension_to_decryptor_ciphertext_msg_PostLAMessages_2eproto() {
  52. GOOGLE_PROTOBUF_VERIFY_VERSION;
  53. {
  54. void* ptr = &::_extension_to_decryptor_ciphertext_msg_default_instance_;
  55. new (ptr) ::extension_to_decryptor_ciphertext_msg();
  56. ::PROTOBUF_NAMESPACE_ID::internal::OnShutdownDestroyMessage(ptr);
  57. }
  58. ::extension_to_decryptor_ciphertext_msg::InitAsDefaultInstance();
  59. }
  60. ::PROTOBUF_NAMESPACE_ID::internal::SCCInfo<0> scc_info_extension_to_decryptor_ciphertext_msg_PostLAMessages_2eproto =
  61. {{ATOMIC_VAR_INIT(::PROTOBUF_NAMESPACE_ID::internal::SCCInfoBase::kUninitialized), 0, InitDefaultsscc_info_extension_to_decryptor_ciphertext_msg_PostLAMessages_2eproto}, {}};
  62. static void InitDefaultsscc_info_extension_to_decryptor_enclosed_msg_PostLAMessages_2eproto() {
  63. GOOGLE_PROTOBUF_VERIFY_VERSION;
  64. {
  65. void* ptr = &::_extension_to_decryptor_enclosed_msg_default_instance_;
  66. new (ptr) ::extension_to_decryptor_enclosed_msg();
  67. ::PROTOBUF_NAMESPACE_ID::internal::OnShutdownDestroyMessage(ptr);
  68. }
  69. ::extension_to_decryptor_enclosed_msg::InitAsDefaultInstance();
  70. }
  71. ::PROTOBUF_NAMESPACE_ID::internal::SCCInfo<1> scc_info_extension_to_decryptor_enclosed_msg_PostLAMessages_2eproto =
  72. {{ATOMIC_VAR_INIT(::PROTOBUF_NAMESPACE_ID::internal::SCCInfoBase::kUninitialized), 1, InitDefaultsscc_info_extension_to_decryptor_enclosed_msg_PostLAMessages_2eproto}, {
  73. &scc_info_ciphertext_client_data_field_PostLAMessages_2eproto.base,}};
  74. // ===================================================================
  75. void ciphertext_client_data_field::InitAsDefaultInstance() {
  76. }
  77. class ciphertext_client_data_field::_Internal {
  78. public:
  79. };
  80. ciphertext_client_data_field::ciphertext_client_data_field()
  81. : ::PROTOBUF_NAMESPACE_ID::MessageLite(), _internal_metadata_(nullptr) {
  82. SharedCtor();
  83. // @@protoc_insertion_point(constructor:ciphertext_client_data_field)
  84. }
  85. ciphertext_client_data_field::ciphertext_client_data_field(const ciphertext_client_data_field& from)
  86. : ::PROTOBUF_NAMESPACE_ID::MessageLite(),
  87. _internal_metadata_(nullptr),
  88. bytes_(from.bytes_) {
  89. _internal_metadata_.MergeFrom(from._internal_metadata_);
  90. // @@protoc_insertion_point(copy_constructor:ciphertext_client_data_field)
  91. }
  92. void ciphertext_client_data_field::SharedCtor() {
  93. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&scc_info_ciphertext_client_data_field_PostLAMessages_2eproto.base);
  94. }
  95. ciphertext_client_data_field::~ciphertext_client_data_field() {
  96. // @@protoc_insertion_point(destructor:ciphertext_client_data_field)
  97. SharedDtor();
  98. }
  99. void ciphertext_client_data_field::SharedDtor() {
  100. }
  101. void ciphertext_client_data_field::SetCachedSize(int size) const {
  102. _cached_size_.Set(size);
  103. }
  104. const ciphertext_client_data_field& ciphertext_client_data_field::default_instance() {
  105. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&::scc_info_ciphertext_client_data_field_PostLAMessages_2eproto.base);
  106. return *internal_default_instance();
  107. }
  108. void ciphertext_client_data_field::Clear() {
  109. // @@protoc_insertion_point(message_clear_start:ciphertext_client_data_field)
  110. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  111. // Prevent compiler warnings about cached_has_bits being unused
  112. (void) cached_has_bits;
  113. bytes_.Clear();
  114. _internal_metadata_.Clear();
  115. }
  116. #if GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  117. const char* ciphertext_client_data_field::_InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) {
  118. #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
  119. while (!ctx->Done(&ptr)) {
  120. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  121. ptr = ::PROTOBUF_NAMESPACE_ID::internal::ReadTag(ptr, &tag);
  122. CHK_(ptr);
  123. switch (tag >> 3) {
  124. // repeated bytes bytes = 1;
  125. case 1:
  126. if (PROTOBUF_PREDICT_TRUE(static_cast<::PROTOBUF_NAMESPACE_ID::uint8>(tag) == 10)) {
  127. ptr -= 1;
  128. do {
  129. ptr += 1;
  130. ptr = ::PROTOBUF_NAMESPACE_ID::internal::InlineGreedyStringParser(add_bytes(), ptr, ctx);
  131. CHK_(ptr);
  132. if (!ctx->DataAvailable(ptr)) break;
  133. } while (::PROTOBUF_NAMESPACE_ID::internal::UnalignedLoad<::PROTOBUF_NAMESPACE_ID::uint8>(ptr) == 10);
  134. } else goto handle_unusual;
  135. continue;
  136. default: {
  137. handle_unusual:
  138. if ((tag & 7) == 4 || tag == 0) {
  139. ctx->SetLastTag(tag);
  140. goto success;
  141. }
  142. ptr = UnknownFieldParse(tag, &_internal_metadata_, ptr, ctx);
  143. CHK_(ptr != nullptr);
  144. continue;
  145. }
  146. } // switch
  147. } // while
  148. success:
  149. return ptr;
  150. failure:
  151. ptr = nullptr;
  152. goto success;
  153. #undef CHK_
  154. }
  155. #else // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  156. bool ciphertext_client_data_field::MergePartialFromCodedStream(
  157. ::PROTOBUF_NAMESPACE_ID::io::CodedInputStream* input) {
  158. #define DO_(EXPRESSION) if (!PROTOBUF_PREDICT_TRUE(EXPRESSION)) goto failure
  159. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  160. ::PROTOBUF_NAMESPACE_ID::internal::LiteUnknownFieldSetter unknown_fields_setter(
  161. &_internal_metadata_);
  162. ::PROTOBUF_NAMESPACE_ID::io::StringOutputStream unknown_fields_output(
  163. unknown_fields_setter.buffer());
  164. ::PROTOBUF_NAMESPACE_ID::io::CodedOutputStream unknown_fields_stream(
  165. &unknown_fields_output, false);
  166. // @@protoc_insertion_point(parse_start:ciphertext_client_data_field)
  167. for (;;) {
  168. ::std::pair<::PROTOBUF_NAMESPACE_ID::uint32, bool> p = input->ReadTagWithCutoffNoLastTag(127u);
  169. tag = p.first;
  170. if (!p.second) goto handle_unusual;
  171. switch (::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::GetTagFieldNumber(tag)) {
  172. // repeated bytes bytes = 1;
  173. case 1: {
  174. if (static_cast< ::PROTOBUF_NAMESPACE_ID::uint8>(tag) == (10 & 0xFF)) {
  175. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::ReadBytes(
  176. input, this->add_bytes()));
  177. } else {
  178. goto handle_unusual;
  179. }
  180. break;
  181. }
  182. default: {
  183. handle_unusual:
  184. if (tag == 0) {
  185. goto success;
  186. }
  187. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::SkipField(
  188. input, tag, &unknown_fields_stream));
  189. break;
  190. }
  191. }
  192. }
  193. success:
  194. // @@protoc_insertion_point(parse_success:ciphertext_client_data_field)
  195. return true;
  196. failure:
  197. // @@protoc_insertion_point(parse_failure:ciphertext_client_data_field)
  198. return false;
  199. #undef DO_
  200. }
  201. #endif // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  202. ::PROTOBUF_NAMESPACE_ID::uint8* ciphertext_client_data_field::InternalSerializeWithCachedSizesToArray(
  203. ::PROTOBUF_NAMESPACE_ID::uint8* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
  204. // @@protoc_insertion_point(serialize_to_array_start:ciphertext_client_data_field)
  205. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  206. (void) cached_has_bits;
  207. // repeated bytes bytes = 1;
  208. for (auto it = this->bytes().pointer_begin(),
  209. end = this->bytes().pointer_end(); it < end; ++it) {
  210. const auto& s = **it;
  211. target = stream->WriteBytes(1, s, target);
  212. }
  213. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  214. target = stream->WriteRaw(_internal_metadata_.unknown_fields().data(),
  215. static_cast<int>(_internal_metadata_.unknown_fields().size()), target);
  216. }
  217. // @@protoc_insertion_point(serialize_to_array_end:ciphertext_client_data_field)
  218. return target;
  219. }
  220. size_t ciphertext_client_data_field::ByteSizeLong() const {
  221. // @@protoc_insertion_point(message_byte_size_start:ciphertext_client_data_field)
  222. size_t total_size = 0;
  223. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  224. // Prevent compiler warnings about cached_has_bits being unused
  225. (void) cached_has_bits;
  226. // repeated bytes bytes = 1;
  227. total_size += 1 *
  228. ::PROTOBUF_NAMESPACE_ID::internal::FromIntSize(this->bytes_size());
  229. for (int i = 0, n = this->bytes_size(); i < n; i++) {
  230. total_size += ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::BytesSize(
  231. this->bytes(i));
  232. }
  233. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  234. total_size += _internal_metadata_.unknown_fields().size();
  235. }
  236. int cached_size = ::PROTOBUF_NAMESPACE_ID::internal::ToCachedSize(total_size);
  237. SetCachedSize(cached_size);
  238. return total_size;
  239. }
  240. void ciphertext_client_data_field::CheckTypeAndMergeFrom(
  241. const ::PROTOBUF_NAMESPACE_ID::MessageLite& from) {
  242. MergeFrom(*::PROTOBUF_NAMESPACE_ID::internal::DownCast<const ciphertext_client_data_field*>(
  243. &from));
  244. }
  245. void ciphertext_client_data_field::MergeFrom(const ciphertext_client_data_field& from) {
  246. // @@protoc_insertion_point(class_specific_merge_from_start:ciphertext_client_data_field)
  247. GOOGLE_DCHECK_NE(&from, this);
  248. _internal_metadata_.MergeFrom(from._internal_metadata_);
  249. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  250. (void) cached_has_bits;
  251. bytes_.MergeFrom(from.bytes_);
  252. }
  253. void ciphertext_client_data_field::CopyFrom(const ciphertext_client_data_field& from) {
  254. // @@protoc_insertion_point(class_specific_copy_from_start:ciphertext_client_data_field)
  255. if (&from == this) return;
  256. Clear();
  257. MergeFrom(from);
  258. }
  259. bool ciphertext_client_data_field::IsInitialized() const {
  260. return true;
  261. }
  262. void ciphertext_client_data_field::InternalSwap(ciphertext_client_data_field* other) {
  263. using std::swap;
  264. _internal_metadata_.Swap(&other->_internal_metadata_);
  265. bytes_.InternalSwap(CastToBase(&other->bytes_));
  266. }
  267. std::string ciphertext_client_data_field::GetTypeName() const {
  268. return "ciphertext_client_data_field";
  269. }
  270. // ===================================================================
  271. void extension_to_decryptor_enclosed_msg::InitAsDefaultInstance() {
  272. }
  273. class extension_to_decryptor_enclosed_msg::_Internal {
  274. public:
  275. };
  276. extension_to_decryptor_enclosed_msg::extension_to_decryptor_enclosed_msg()
  277. : ::PROTOBUF_NAMESPACE_ID::MessageLite(), _internal_metadata_(nullptr) {
  278. SharedCtor();
  279. // @@protoc_insertion_point(constructor:extension_to_decryptor_enclosed_msg)
  280. }
  281. extension_to_decryptor_enclosed_msg::extension_to_decryptor_enclosed_msg(const extension_to_decryptor_enclosed_msg& from)
  282. : ::PROTOBUF_NAMESPACE_ID::MessageLite(),
  283. _internal_metadata_(nullptr),
  284. ciphertext_client_public_key_(from.ciphertext_client_public_key_),
  285. ciphertext_fields_(from.ciphertext_fields_) {
  286. _internal_metadata_.MergeFrom(from._internal_metadata_);
  287. // @@protoc_insertion_point(copy_constructor:extension_to_decryptor_enclosed_msg)
  288. }
  289. void extension_to_decryptor_enclosed_msg::SharedCtor() {
  290. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&scc_info_extension_to_decryptor_enclosed_msg_PostLAMessages_2eproto.base);
  291. }
  292. extension_to_decryptor_enclosed_msg::~extension_to_decryptor_enclosed_msg() {
  293. // @@protoc_insertion_point(destructor:extension_to_decryptor_enclosed_msg)
  294. SharedDtor();
  295. }
  296. void extension_to_decryptor_enclosed_msg::SharedDtor() {
  297. }
  298. void extension_to_decryptor_enclosed_msg::SetCachedSize(int size) const {
  299. _cached_size_.Set(size);
  300. }
  301. const extension_to_decryptor_enclosed_msg& extension_to_decryptor_enclosed_msg::default_instance() {
  302. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&::scc_info_extension_to_decryptor_enclosed_msg_PostLAMessages_2eproto.base);
  303. return *internal_default_instance();
  304. }
  305. void extension_to_decryptor_enclosed_msg::Clear() {
  306. // @@protoc_insertion_point(message_clear_start:extension_to_decryptor_enclosed_msg)
  307. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  308. // Prevent compiler warnings about cached_has_bits being unused
  309. (void) cached_has_bits;
  310. ciphertext_client_public_key_.Clear();
  311. ciphertext_fields_.Clear();
  312. _internal_metadata_.Clear();
  313. }
  314. #if GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  315. const char* extension_to_decryptor_enclosed_msg::_InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) {
  316. #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
  317. while (!ctx->Done(&ptr)) {
  318. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  319. ptr = ::PROTOBUF_NAMESPACE_ID::internal::ReadTag(ptr, &tag);
  320. CHK_(ptr);
  321. switch (tag >> 3) {
  322. // repeated bytes ciphertext_client_public_key = 1;
  323. case 1:
  324. if (PROTOBUF_PREDICT_TRUE(static_cast<::PROTOBUF_NAMESPACE_ID::uint8>(tag) == 10)) {
  325. ptr -= 1;
  326. do {
  327. ptr += 1;
  328. ptr = ::PROTOBUF_NAMESPACE_ID::internal::InlineGreedyStringParser(add_ciphertext_client_public_key(), ptr, ctx);
  329. CHK_(ptr);
  330. if (!ctx->DataAvailable(ptr)) break;
  331. } while (::PROTOBUF_NAMESPACE_ID::internal::UnalignedLoad<::PROTOBUF_NAMESPACE_ID::uint8>(ptr) == 10);
  332. } else goto handle_unusual;
  333. continue;
  334. // repeated .ciphertext_client_data_field ciphertext_fields = 2;
  335. case 2:
  336. if (PROTOBUF_PREDICT_TRUE(static_cast<::PROTOBUF_NAMESPACE_ID::uint8>(tag) == 18)) {
  337. ptr -= 1;
  338. do {
  339. ptr += 1;
  340. ptr = ctx->ParseMessage(add_ciphertext_fields(), ptr);
  341. CHK_(ptr);
  342. if (!ctx->DataAvailable(ptr)) break;
  343. } while (::PROTOBUF_NAMESPACE_ID::internal::UnalignedLoad<::PROTOBUF_NAMESPACE_ID::uint8>(ptr) == 18);
  344. } else goto handle_unusual;
  345. continue;
  346. default: {
  347. handle_unusual:
  348. if ((tag & 7) == 4 || tag == 0) {
  349. ctx->SetLastTag(tag);
  350. goto success;
  351. }
  352. ptr = UnknownFieldParse(tag, &_internal_metadata_, ptr, ctx);
  353. CHK_(ptr != nullptr);
  354. continue;
  355. }
  356. } // switch
  357. } // while
  358. success:
  359. return ptr;
  360. failure:
  361. ptr = nullptr;
  362. goto success;
  363. #undef CHK_
  364. }
  365. #else // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  366. bool extension_to_decryptor_enclosed_msg::MergePartialFromCodedStream(
  367. ::PROTOBUF_NAMESPACE_ID::io::CodedInputStream* input) {
  368. #define DO_(EXPRESSION) if (!PROTOBUF_PREDICT_TRUE(EXPRESSION)) goto failure
  369. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  370. ::PROTOBUF_NAMESPACE_ID::internal::LiteUnknownFieldSetter unknown_fields_setter(
  371. &_internal_metadata_);
  372. ::PROTOBUF_NAMESPACE_ID::io::StringOutputStream unknown_fields_output(
  373. unknown_fields_setter.buffer());
  374. ::PROTOBUF_NAMESPACE_ID::io::CodedOutputStream unknown_fields_stream(
  375. &unknown_fields_output, false);
  376. // @@protoc_insertion_point(parse_start:extension_to_decryptor_enclosed_msg)
  377. for (;;) {
  378. ::std::pair<::PROTOBUF_NAMESPACE_ID::uint32, bool> p = input->ReadTagWithCutoffNoLastTag(127u);
  379. tag = p.first;
  380. if (!p.second) goto handle_unusual;
  381. switch (::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::GetTagFieldNumber(tag)) {
  382. // repeated bytes ciphertext_client_public_key = 1;
  383. case 1: {
  384. if (static_cast< ::PROTOBUF_NAMESPACE_ID::uint8>(tag) == (10 & 0xFF)) {
  385. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::ReadBytes(
  386. input, this->add_ciphertext_client_public_key()));
  387. } else {
  388. goto handle_unusual;
  389. }
  390. break;
  391. }
  392. // repeated .ciphertext_client_data_field ciphertext_fields = 2;
  393. case 2: {
  394. if (static_cast< ::PROTOBUF_NAMESPACE_ID::uint8>(tag) == (18 & 0xFF)) {
  395. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::ReadMessage(
  396. input, add_ciphertext_fields()));
  397. } else {
  398. goto handle_unusual;
  399. }
  400. break;
  401. }
  402. default: {
  403. handle_unusual:
  404. if (tag == 0) {
  405. goto success;
  406. }
  407. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::SkipField(
  408. input, tag, &unknown_fields_stream));
  409. break;
  410. }
  411. }
  412. }
  413. success:
  414. // @@protoc_insertion_point(parse_success:extension_to_decryptor_enclosed_msg)
  415. return true;
  416. failure:
  417. // @@protoc_insertion_point(parse_failure:extension_to_decryptor_enclosed_msg)
  418. return false;
  419. #undef DO_
  420. }
  421. #endif // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  422. ::PROTOBUF_NAMESPACE_ID::uint8* extension_to_decryptor_enclosed_msg::InternalSerializeWithCachedSizesToArray(
  423. ::PROTOBUF_NAMESPACE_ID::uint8* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
  424. // @@protoc_insertion_point(serialize_to_array_start:extension_to_decryptor_enclosed_msg)
  425. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  426. (void) cached_has_bits;
  427. // repeated bytes ciphertext_client_public_key = 1;
  428. for (auto it = this->ciphertext_client_public_key().pointer_begin(),
  429. end = this->ciphertext_client_public_key().pointer_end(); it < end; ++it) {
  430. const auto& s = **it;
  431. target = stream->WriteBytes(1, s, target);
  432. }
  433. // repeated .ciphertext_client_data_field ciphertext_fields = 2;
  434. for (auto it = this->ciphertext_fields().pointer_begin(),
  435. end = this->ciphertext_fields().pointer_end(); it < end; ++it) {
  436. stream->EnsureSpace(&target);
  437. target = ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::
  438. InternalWriteMessageToArray(2, **it, target, stream);
  439. }
  440. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  441. target = stream->WriteRaw(_internal_metadata_.unknown_fields().data(),
  442. static_cast<int>(_internal_metadata_.unknown_fields().size()), target);
  443. }
  444. // @@protoc_insertion_point(serialize_to_array_end:extension_to_decryptor_enclosed_msg)
  445. return target;
  446. }
  447. size_t extension_to_decryptor_enclosed_msg::ByteSizeLong() const {
  448. // @@protoc_insertion_point(message_byte_size_start:extension_to_decryptor_enclosed_msg)
  449. size_t total_size = 0;
  450. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  451. // Prevent compiler warnings about cached_has_bits being unused
  452. (void) cached_has_bits;
  453. // repeated bytes ciphertext_client_public_key = 1;
  454. total_size += 1 *
  455. ::PROTOBUF_NAMESPACE_ID::internal::FromIntSize(this->ciphertext_client_public_key_size());
  456. for (int i = 0, n = this->ciphertext_client_public_key_size(); i < n; i++) {
  457. total_size += ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::BytesSize(
  458. this->ciphertext_client_public_key(i));
  459. }
  460. // repeated .ciphertext_client_data_field ciphertext_fields = 2;
  461. {
  462. unsigned int count = static_cast<unsigned int>(this->ciphertext_fields_size());
  463. total_size += 1UL * count;
  464. for (unsigned int i = 0; i < count; i++) {
  465. total_size +=
  466. ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::MessageSize(
  467. this->ciphertext_fields(static_cast<int>(i)));
  468. }
  469. }
  470. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  471. total_size += _internal_metadata_.unknown_fields().size();
  472. }
  473. int cached_size = ::PROTOBUF_NAMESPACE_ID::internal::ToCachedSize(total_size);
  474. SetCachedSize(cached_size);
  475. return total_size;
  476. }
  477. void extension_to_decryptor_enclosed_msg::CheckTypeAndMergeFrom(
  478. const ::PROTOBUF_NAMESPACE_ID::MessageLite& from) {
  479. MergeFrom(*::PROTOBUF_NAMESPACE_ID::internal::DownCast<const extension_to_decryptor_enclosed_msg*>(
  480. &from));
  481. }
  482. void extension_to_decryptor_enclosed_msg::MergeFrom(const extension_to_decryptor_enclosed_msg& from) {
  483. // @@protoc_insertion_point(class_specific_merge_from_start:extension_to_decryptor_enclosed_msg)
  484. GOOGLE_DCHECK_NE(&from, this);
  485. _internal_metadata_.MergeFrom(from._internal_metadata_);
  486. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  487. (void) cached_has_bits;
  488. ciphertext_client_public_key_.MergeFrom(from.ciphertext_client_public_key_);
  489. ciphertext_fields_.MergeFrom(from.ciphertext_fields_);
  490. }
  491. void extension_to_decryptor_enclosed_msg::CopyFrom(const extension_to_decryptor_enclosed_msg& from) {
  492. // @@protoc_insertion_point(class_specific_copy_from_start:extension_to_decryptor_enclosed_msg)
  493. if (&from == this) return;
  494. Clear();
  495. MergeFrom(from);
  496. }
  497. bool extension_to_decryptor_enclosed_msg::IsInitialized() const {
  498. return true;
  499. }
  500. void extension_to_decryptor_enclosed_msg::InternalSwap(extension_to_decryptor_enclosed_msg* other) {
  501. using std::swap;
  502. _internal_metadata_.Swap(&other->_internal_metadata_);
  503. ciphertext_client_public_key_.InternalSwap(CastToBase(&other->ciphertext_client_public_key_));
  504. CastToBase(&ciphertext_fields_)->InternalSwap(CastToBase(&other->ciphertext_fields_));
  505. }
  506. std::string extension_to_decryptor_enclosed_msg::GetTypeName() const {
  507. return "extension_to_decryptor_enclosed_msg";
  508. }
  509. // ===================================================================
  510. void extension_to_decryptor_ciphertext_msg::InitAsDefaultInstance() {
  511. }
  512. class extension_to_decryptor_ciphertext_msg::_Internal {
  513. public:
  514. };
  515. extension_to_decryptor_ciphertext_msg::extension_to_decryptor_ciphertext_msg()
  516. : ::PROTOBUF_NAMESPACE_ID::MessageLite(), _internal_metadata_(nullptr) {
  517. SharedCtor();
  518. // @@protoc_insertion_point(constructor:extension_to_decryptor_ciphertext_msg)
  519. }
  520. extension_to_decryptor_ciphertext_msg::extension_to_decryptor_ciphertext_msg(const extension_to_decryptor_ciphertext_msg& from)
  521. : ::PROTOBUF_NAMESPACE_ID::MessageLite(),
  522. _internal_metadata_(nullptr),
  523. bytes_(from.bytes_) {
  524. _internal_metadata_.MergeFrom(from._internal_metadata_);
  525. // @@protoc_insertion_point(copy_constructor:extension_to_decryptor_ciphertext_msg)
  526. }
  527. void extension_to_decryptor_ciphertext_msg::SharedCtor() {
  528. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&scc_info_extension_to_decryptor_ciphertext_msg_PostLAMessages_2eproto.base);
  529. }
  530. extension_to_decryptor_ciphertext_msg::~extension_to_decryptor_ciphertext_msg() {
  531. // @@protoc_insertion_point(destructor:extension_to_decryptor_ciphertext_msg)
  532. SharedDtor();
  533. }
  534. void extension_to_decryptor_ciphertext_msg::SharedDtor() {
  535. }
  536. void extension_to_decryptor_ciphertext_msg::SetCachedSize(int size) const {
  537. _cached_size_.Set(size);
  538. }
  539. const extension_to_decryptor_ciphertext_msg& extension_to_decryptor_ciphertext_msg::default_instance() {
  540. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&::scc_info_extension_to_decryptor_ciphertext_msg_PostLAMessages_2eproto.base);
  541. return *internal_default_instance();
  542. }
  543. void extension_to_decryptor_ciphertext_msg::Clear() {
  544. // @@protoc_insertion_point(message_clear_start:extension_to_decryptor_ciphertext_msg)
  545. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  546. // Prevent compiler warnings about cached_has_bits being unused
  547. (void) cached_has_bits;
  548. bytes_.Clear();
  549. _internal_metadata_.Clear();
  550. }
  551. #if GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  552. const char* extension_to_decryptor_ciphertext_msg::_InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) {
  553. #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
  554. while (!ctx->Done(&ptr)) {
  555. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  556. ptr = ::PROTOBUF_NAMESPACE_ID::internal::ReadTag(ptr, &tag);
  557. CHK_(ptr);
  558. switch (tag >> 3) {
  559. // repeated bytes bytes = 1;
  560. case 1:
  561. if (PROTOBUF_PREDICT_TRUE(static_cast<::PROTOBUF_NAMESPACE_ID::uint8>(tag) == 10)) {
  562. ptr -= 1;
  563. do {
  564. ptr += 1;
  565. ptr = ::PROTOBUF_NAMESPACE_ID::internal::InlineGreedyStringParser(add_bytes(), ptr, ctx);
  566. CHK_(ptr);
  567. if (!ctx->DataAvailable(ptr)) break;
  568. } while (::PROTOBUF_NAMESPACE_ID::internal::UnalignedLoad<::PROTOBUF_NAMESPACE_ID::uint8>(ptr) == 10);
  569. } else goto handle_unusual;
  570. continue;
  571. default: {
  572. handle_unusual:
  573. if ((tag & 7) == 4 || tag == 0) {
  574. ctx->SetLastTag(tag);
  575. goto success;
  576. }
  577. ptr = UnknownFieldParse(tag, &_internal_metadata_, ptr, ctx);
  578. CHK_(ptr != nullptr);
  579. continue;
  580. }
  581. } // switch
  582. } // while
  583. success:
  584. return ptr;
  585. failure:
  586. ptr = nullptr;
  587. goto success;
  588. #undef CHK_
  589. }
  590. #else // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  591. bool extension_to_decryptor_ciphertext_msg::MergePartialFromCodedStream(
  592. ::PROTOBUF_NAMESPACE_ID::io::CodedInputStream* input) {
  593. #define DO_(EXPRESSION) if (!PROTOBUF_PREDICT_TRUE(EXPRESSION)) goto failure
  594. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  595. ::PROTOBUF_NAMESPACE_ID::internal::LiteUnknownFieldSetter unknown_fields_setter(
  596. &_internal_metadata_);
  597. ::PROTOBUF_NAMESPACE_ID::io::StringOutputStream unknown_fields_output(
  598. unknown_fields_setter.buffer());
  599. ::PROTOBUF_NAMESPACE_ID::io::CodedOutputStream unknown_fields_stream(
  600. &unknown_fields_output, false);
  601. // @@protoc_insertion_point(parse_start:extension_to_decryptor_ciphertext_msg)
  602. for (;;) {
  603. ::std::pair<::PROTOBUF_NAMESPACE_ID::uint32, bool> p = input->ReadTagWithCutoffNoLastTag(127u);
  604. tag = p.first;
  605. if (!p.second) goto handle_unusual;
  606. switch (::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::GetTagFieldNumber(tag)) {
  607. // repeated bytes bytes = 1;
  608. case 1: {
  609. if (static_cast< ::PROTOBUF_NAMESPACE_ID::uint8>(tag) == (10 & 0xFF)) {
  610. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::ReadBytes(
  611. input, this->add_bytes()));
  612. } else {
  613. goto handle_unusual;
  614. }
  615. break;
  616. }
  617. default: {
  618. handle_unusual:
  619. if (tag == 0) {
  620. goto success;
  621. }
  622. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::SkipField(
  623. input, tag, &unknown_fields_stream));
  624. break;
  625. }
  626. }
  627. }
  628. success:
  629. // @@protoc_insertion_point(parse_success:extension_to_decryptor_ciphertext_msg)
  630. return true;
  631. failure:
  632. // @@protoc_insertion_point(parse_failure:extension_to_decryptor_ciphertext_msg)
  633. return false;
  634. #undef DO_
  635. }
  636. #endif // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  637. ::PROTOBUF_NAMESPACE_ID::uint8* extension_to_decryptor_ciphertext_msg::InternalSerializeWithCachedSizesToArray(
  638. ::PROTOBUF_NAMESPACE_ID::uint8* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
  639. // @@protoc_insertion_point(serialize_to_array_start:extension_to_decryptor_ciphertext_msg)
  640. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  641. (void) cached_has_bits;
  642. // repeated bytes bytes = 1;
  643. for (auto it = this->bytes().pointer_begin(),
  644. end = this->bytes().pointer_end(); it < end; ++it) {
  645. const auto& s = **it;
  646. target = stream->WriteBytes(1, s, target);
  647. }
  648. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  649. target = stream->WriteRaw(_internal_metadata_.unknown_fields().data(),
  650. static_cast<int>(_internal_metadata_.unknown_fields().size()), target);
  651. }
  652. // @@protoc_insertion_point(serialize_to_array_end:extension_to_decryptor_ciphertext_msg)
  653. return target;
  654. }
  655. size_t extension_to_decryptor_ciphertext_msg::ByteSizeLong() const {
  656. // @@protoc_insertion_point(message_byte_size_start:extension_to_decryptor_ciphertext_msg)
  657. size_t total_size = 0;
  658. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  659. // Prevent compiler warnings about cached_has_bits being unused
  660. (void) cached_has_bits;
  661. // repeated bytes bytes = 1;
  662. total_size += 1 *
  663. ::PROTOBUF_NAMESPACE_ID::internal::FromIntSize(this->bytes_size());
  664. for (int i = 0, n = this->bytes_size(); i < n; i++) {
  665. total_size += ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::BytesSize(
  666. this->bytes(i));
  667. }
  668. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  669. total_size += _internal_metadata_.unknown_fields().size();
  670. }
  671. int cached_size = ::PROTOBUF_NAMESPACE_ID::internal::ToCachedSize(total_size);
  672. SetCachedSize(cached_size);
  673. return total_size;
  674. }
  675. void extension_to_decryptor_ciphertext_msg::CheckTypeAndMergeFrom(
  676. const ::PROTOBUF_NAMESPACE_ID::MessageLite& from) {
  677. MergeFrom(*::PROTOBUF_NAMESPACE_ID::internal::DownCast<const extension_to_decryptor_ciphertext_msg*>(
  678. &from));
  679. }
  680. void extension_to_decryptor_ciphertext_msg::MergeFrom(const extension_to_decryptor_ciphertext_msg& from) {
  681. // @@protoc_insertion_point(class_specific_merge_from_start:extension_to_decryptor_ciphertext_msg)
  682. GOOGLE_DCHECK_NE(&from, this);
  683. _internal_metadata_.MergeFrom(from._internal_metadata_);
  684. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  685. (void) cached_has_bits;
  686. bytes_.MergeFrom(from.bytes_);
  687. }
  688. void extension_to_decryptor_ciphertext_msg::CopyFrom(const extension_to_decryptor_ciphertext_msg& from) {
  689. // @@protoc_insertion_point(class_specific_copy_from_start:extension_to_decryptor_ciphertext_msg)
  690. if (&from == this) return;
  691. Clear();
  692. MergeFrom(from);
  693. }
  694. bool extension_to_decryptor_ciphertext_msg::IsInitialized() const {
  695. return true;
  696. }
  697. void extension_to_decryptor_ciphertext_msg::InternalSwap(extension_to_decryptor_ciphertext_msg* other) {
  698. using std::swap;
  699. _internal_metadata_.Swap(&other->_internal_metadata_);
  700. bytes_.InternalSwap(CastToBase(&other->bytes_));
  701. }
  702. std::string extension_to_decryptor_ciphertext_msg::GetTypeName() const {
  703. return "extension_to_decryptor_ciphertext_msg";
  704. }
  705. // ===================================================================
  706. void decryptor_to_extension_msg_t::InitAsDefaultInstance() {
  707. }
  708. class decryptor_to_extension_msg_t::_Internal {
  709. public:
  710. };
  711. decryptor_to_extension_msg_t::decryptor_to_extension_msg_t()
  712. : ::PROTOBUF_NAMESPACE_ID::MessageLite(), _internal_metadata_(nullptr) {
  713. SharedCtor();
  714. // @@protoc_insertion_point(constructor:decryptor_to_extension_msg_t)
  715. }
  716. decryptor_to_extension_msg_t::decryptor_to_extension_msg_t(const decryptor_to_extension_msg_t& from)
  717. : ::PROTOBUF_NAMESPACE_ID::MessageLite(),
  718. _internal_metadata_(nullptr),
  719. ciphertext_fields_(from.ciphertext_fields_) {
  720. _internal_metadata_.MergeFrom(from._internal_metadata_);
  721. // @@protoc_insertion_point(copy_constructor:decryptor_to_extension_msg_t)
  722. }
  723. void decryptor_to_extension_msg_t::SharedCtor() {
  724. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&scc_info_decryptor_to_extension_msg_t_PostLAMessages_2eproto.base);
  725. }
  726. decryptor_to_extension_msg_t::~decryptor_to_extension_msg_t() {
  727. // @@protoc_insertion_point(destructor:decryptor_to_extension_msg_t)
  728. SharedDtor();
  729. }
  730. void decryptor_to_extension_msg_t::SharedDtor() {
  731. }
  732. void decryptor_to_extension_msg_t::SetCachedSize(int size) const {
  733. _cached_size_.Set(size);
  734. }
  735. const decryptor_to_extension_msg_t& decryptor_to_extension_msg_t::default_instance() {
  736. ::PROTOBUF_NAMESPACE_ID::internal::InitSCC(&::scc_info_decryptor_to_extension_msg_t_PostLAMessages_2eproto.base);
  737. return *internal_default_instance();
  738. }
  739. void decryptor_to_extension_msg_t::Clear() {
  740. // @@protoc_insertion_point(message_clear_start:decryptor_to_extension_msg_t)
  741. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  742. // Prevent compiler warnings about cached_has_bits being unused
  743. (void) cached_has_bits;
  744. ciphertext_fields_.Clear();
  745. _internal_metadata_.Clear();
  746. }
  747. #if GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  748. const char* decryptor_to_extension_msg_t::_InternalParse(const char* ptr, ::PROTOBUF_NAMESPACE_ID::internal::ParseContext* ctx) {
  749. #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
  750. while (!ctx->Done(&ptr)) {
  751. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  752. ptr = ::PROTOBUF_NAMESPACE_ID::internal::ReadTag(ptr, &tag);
  753. CHK_(ptr);
  754. switch (tag >> 3) {
  755. // repeated .ciphertext_client_data_field ciphertext_fields = 1;
  756. case 1:
  757. if (PROTOBUF_PREDICT_TRUE(static_cast<::PROTOBUF_NAMESPACE_ID::uint8>(tag) == 10)) {
  758. ptr -= 1;
  759. do {
  760. ptr += 1;
  761. ptr = ctx->ParseMessage(add_ciphertext_fields(), ptr);
  762. CHK_(ptr);
  763. if (!ctx->DataAvailable(ptr)) break;
  764. } while (::PROTOBUF_NAMESPACE_ID::internal::UnalignedLoad<::PROTOBUF_NAMESPACE_ID::uint8>(ptr) == 10);
  765. } else goto handle_unusual;
  766. continue;
  767. default: {
  768. handle_unusual:
  769. if ((tag & 7) == 4 || tag == 0) {
  770. ctx->SetLastTag(tag);
  771. goto success;
  772. }
  773. ptr = UnknownFieldParse(tag, &_internal_metadata_, ptr, ctx);
  774. CHK_(ptr != nullptr);
  775. continue;
  776. }
  777. } // switch
  778. } // while
  779. success:
  780. return ptr;
  781. failure:
  782. ptr = nullptr;
  783. goto success;
  784. #undef CHK_
  785. }
  786. #else // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  787. bool decryptor_to_extension_msg_t::MergePartialFromCodedStream(
  788. ::PROTOBUF_NAMESPACE_ID::io::CodedInputStream* input) {
  789. #define DO_(EXPRESSION) if (!PROTOBUF_PREDICT_TRUE(EXPRESSION)) goto failure
  790. ::PROTOBUF_NAMESPACE_ID::uint32 tag;
  791. ::PROTOBUF_NAMESPACE_ID::internal::LiteUnknownFieldSetter unknown_fields_setter(
  792. &_internal_metadata_);
  793. ::PROTOBUF_NAMESPACE_ID::io::StringOutputStream unknown_fields_output(
  794. unknown_fields_setter.buffer());
  795. ::PROTOBUF_NAMESPACE_ID::io::CodedOutputStream unknown_fields_stream(
  796. &unknown_fields_output, false);
  797. // @@protoc_insertion_point(parse_start:decryptor_to_extension_msg_t)
  798. for (;;) {
  799. ::std::pair<::PROTOBUF_NAMESPACE_ID::uint32, bool> p = input->ReadTagWithCutoffNoLastTag(127u);
  800. tag = p.first;
  801. if (!p.second) goto handle_unusual;
  802. switch (::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::GetTagFieldNumber(tag)) {
  803. // repeated .ciphertext_client_data_field ciphertext_fields = 1;
  804. case 1: {
  805. if (static_cast< ::PROTOBUF_NAMESPACE_ID::uint8>(tag) == (10 & 0xFF)) {
  806. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::ReadMessage(
  807. input, add_ciphertext_fields()));
  808. } else {
  809. goto handle_unusual;
  810. }
  811. break;
  812. }
  813. default: {
  814. handle_unusual:
  815. if (tag == 0) {
  816. goto success;
  817. }
  818. DO_(::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::SkipField(
  819. input, tag, &unknown_fields_stream));
  820. break;
  821. }
  822. }
  823. }
  824. success:
  825. // @@protoc_insertion_point(parse_success:decryptor_to_extension_msg_t)
  826. return true;
  827. failure:
  828. // @@protoc_insertion_point(parse_failure:decryptor_to_extension_msg_t)
  829. return false;
  830. #undef DO_
  831. }
  832. #endif // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
  833. ::PROTOBUF_NAMESPACE_ID::uint8* decryptor_to_extension_msg_t::InternalSerializeWithCachedSizesToArray(
  834. ::PROTOBUF_NAMESPACE_ID::uint8* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
  835. // @@protoc_insertion_point(serialize_to_array_start:decryptor_to_extension_msg_t)
  836. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  837. (void) cached_has_bits;
  838. // repeated .ciphertext_client_data_field ciphertext_fields = 1;
  839. for (auto it = this->ciphertext_fields().pointer_begin(),
  840. end = this->ciphertext_fields().pointer_end(); it < end; ++it) {
  841. stream->EnsureSpace(&target);
  842. target = ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::
  843. InternalWriteMessageToArray(1, **it, target, stream);
  844. }
  845. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  846. target = stream->WriteRaw(_internal_metadata_.unknown_fields().data(),
  847. static_cast<int>(_internal_metadata_.unknown_fields().size()), target);
  848. }
  849. // @@protoc_insertion_point(serialize_to_array_end:decryptor_to_extension_msg_t)
  850. return target;
  851. }
  852. size_t decryptor_to_extension_msg_t::ByteSizeLong() const {
  853. // @@protoc_insertion_point(message_byte_size_start:decryptor_to_extension_msg_t)
  854. size_t total_size = 0;
  855. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  856. // Prevent compiler warnings about cached_has_bits being unused
  857. (void) cached_has_bits;
  858. // repeated .ciphertext_client_data_field ciphertext_fields = 1;
  859. {
  860. unsigned int count = static_cast<unsigned int>(this->ciphertext_fields_size());
  861. total_size += 1UL * count;
  862. for (unsigned int i = 0; i < count; i++) {
  863. total_size +=
  864. ::PROTOBUF_NAMESPACE_ID::internal::WireFormatLite::MessageSize(
  865. this->ciphertext_fields(static_cast<int>(i)));
  866. }
  867. }
  868. if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
  869. total_size += _internal_metadata_.unknown_fields().size();
  870. }
  871. int cached_size = ::PROTOBUF_NAMESPACE_ID::internal::ToCachedSize(total_size);
  872. SetCachedSize(cached_size);
  873. return total_size;
  874. }
  875. void decryptor_to_extension_msg_t::CheckTypeAndMergeFrom(
  876. const ::PROTOBUF_NAMESPACE_ID::MessageLite& from) {
  877. MergeFrom(*::PROTOBUF_NAMESPACE_ID::internal::DownCast<const decryptor_to_extension_msg_t*>(
  878. &from));
  879. }
  880. void decryptor_to_extension_msg_t::MergeFrom(const decryptor_to_extension_msg_t& from) {
  881. // @@protoc_insertion_point(class_specific_merge_from_start:decryptor_to_extension_msg_t)
  882. GOOGLE_DCHECK_NE(&from, this);
  883. _internal_metadata_.MergeFrom(from._internal_metadata_);
  884. ::PROTOBUF_NAMESPACE_ID::uint32 cached_has_bits = 0;
  885. (void) cached_has_bits;
  886. ciphertext_fields_.MergeFrom(from.ciphertext_fields_);
  887. }
  888. void decryptor_to_extension_msg_t::CopyFrom(const decryptor_to_extension_msg_t& from) {
  889. // @@protoc_insertion_point(class_specific_copy_from_start:decryptor_to_extension_msg_t)
  890. if (&from == this) return;
  891. Clear();
  892. MergeFrom(from);
  893. }
  894. bool decryptor_to_extension_msg_t::IsInitialized() const {
  895. return true;
  896. }
  897. void decryptor_to_extension_msg_t::InternalSwap(decryptor_to_extension_msg_t* other) {
  898. using std::swap;
  899. _internal_metadata_.Swap(&other->_internal_metadata_);
  900. CastToBase(&ciphertext_fields_)->InternalSwap(CastToBase(&other->ciphertext_fields_));
  901. }
  902. std::string decryptor_to_extension_msg_t::GetTypeName() const {
  903. return "decryptor_to_extension_msg_t";
  904. }
  905. // @@protoc_insertion_point(namespace_scope)
  906. PROTOBUF_NAMESPACE_OPEN
  907. template<> PROTOBUF_NOINLINE ::ciphertext_client_data_field* Arena::CreateMaybeMessage< ::ciphertext_client_data_field >(Arena* arena) {
  908. return Arena::CreateInternal< ::ciphertext_client_data_field >(arena);
  909. }
  910. template<> PROTOBUF_NOINLINE ::extension_to_decryptor_enclosed_msg* Arena::CreateMaybeMessage< ::extension_to_decryptor_enclosed_msg >(Arena* arena) {
  911. return Arena::CreateInternal< ::extension_to_decryptor_enclosed_msg >(arena);
  912. }
  913. template<> PROTOBUF_NOINLINE ::extension_to_decryptor_ciphertext_msg* Arena::CreateMaybeMessage< ::extension_to_decryptor_ciphertext_msg >(Arena* arena) {
  914. return Arena::CreateInternal< ::extension_to_decryptor_ciphertext_msg >(arena);
  915. }
  916. template<> PROTOBUF_NOINLINE ::decryptor_to_extension_msg_t* Arena::CreateMaybeMessage< ::decryptor_to_extension_msg_t >(Arena* arena) {
  917. return Arena::CreateInternal< ::decryptor_to_extension_msg_t >(arena);
  918. }
  919. PROTOBUF_NAMESPACE_CLOSE
  920. // @@protoc_insertion_point(global_scope)
  921. #include <google/protobuf/port_undef.inc>