2018-10-01 19:57:10 +02:00
|
|
|
// Generated by the protocol buffer compiler. DO NOT EDIT!
|
|
|
|
// source: certificate.proto
|
|
|
|
|
|
|
|
#include "certificate.pb.h"
|
|
|
|
|
|
|
|
#include <algorithm>
|
|
|
|
|
|
|
|
#include <google/protobuf/stubs/common.h>
|
|
|
|
#include <google/protobuf/io/coded_stream.h>
|
2019-03-01 21:06:55 +01:00
|
|
|
#include <google/protobuf/extension_set.h>
|
2018-10-01 19:57:10 +02:00
|
|
|
#include <google/protobuf/wire_format_lite_inl.h>
|
|
|
|
#include <google/protobuf/descriptor.h>
|
|
|
|
#include <google/protobuf/generated_message_reflection.h>
|
|
|
|
#include <google/protobuf/reflection_ops.h>
|
|
|
|
#include <google/protobuf/wire_format.h>
|
|
|
|
// @@protoc_insertion_point(includes)
|
2019-03-01 21:06:55 +01:00
|
|
|
#include <google/protobuf/port_def.inc>
|
2018-10-01 19:57:10 +02:00
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
namespace legacy_pb {
|
2018-10-01 19:57:10 +02:00
|
|
|
class CertificateDefaultTypeInternal {
|
|
|
|
public:
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::ExplicitlyConstructed<Certificate> _instance;
|
2018-10-01 19:57:10 +02:00
|
|
|
} _Certificate_default_instance_;
|
2019-03-01 21:06:55 +01:00
|
|
|
} // namespace legacy_pb
|
|
|
|
static void InitDefaultsCertificate_certificate_2eproto() {
|
2018-10-01 19:57:10 +02:00
|
|
|
GOOGLE_PROTOBUF_VERIFY_VERSION;
|
|
|
|
|
|
|
|
{
|
2019-03-01 21:06:55 +01:00
|
|
|
void* ptr = &::legacy_pb::_Certificate_default_instance_;
|
|
|
|
new (ptr) ::legacy_pb::Certificate();
|
2018-10-01 19:57:10 +02:00
|
|
|
::google::protobuf::internal::OnShutdownDestroyMessage(ptr);
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
::legacy_pb::Certificate::InitAsDefaultInstance();
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::SCCInfo<0> scc_info_Certificate_certificate_2eproto =
|
|
|
|
{{ATOMIC_VAR_INIT(::google::protobuf::internal::SCCInfoBase::kUninitialized), 0, InitDefaultsCertificate_certificate_2eproto}, {}};
|
2018-10-01 19:57:10 +02:00
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
void InitDefaults_certificate_2eproto() {
|
|
|
|
::google::protobuf::internal::InitSCC(&scc_info_Certificate_certificate_2eproto.base);
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::Metadata file_level_metadata_certificate_2eproto[1];
|
|
|
|
const ::google::protobuf::EnumDescriptor* file_level_enum_descriptors_certificate_2eproto[2];
|
|
|
|
constexpr ::google::protobuf::ServiceDescriptor const** file_level_service_descriptors_certificate_2eproto = nullptr;
|
2018-10-01 19:57:10 +02:00
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
const ::google::protobuf::uint32 TableStruct_certificate_2eproto::offsets[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) = {
|
|
|
|
PROTOBUF_FIELD_OFFSET(::legacy_pb::Certificate, _has_bits_),
|
|
|
|
PROTOBUF_FIELD_OFFSET(::legacy_pb::Certificate, _internal_metadata_),
|
2018-10-01 19:57:10 +02:00
|
|
|
~0u, // no _extensions_
|
|
|
|
~0u, // no _oneof_case_
|
|
|
|
~0u, // no _weak_field_map_
|
2019-03-01 21:06:55 +01:00
|
|
|
PROTOBUF_FIELD_OFFSET(::legacy_pb::Certificate, version_),
|
|
|
|
PROTOBUF_FIELD_OFFSET(::legacy_pb::Certificate, keytype_),
|
|
|
|
PROTOBUF_FIELD_OFFSET(::legacy_pb::Certificate, publickey_),
|
2018-10-01 19:57:10 +02:00
|
|
|
1,
|
|
|
|
2,
|
|
|
|
0,
|
|
|
|
};
|
2019-03-01 21:06:55 +01:00
|
|
|
static const ::google::protobuf::internal::MigrationSchema schemas[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) = {
|
|
|
|
{ 0, 8, sizeof(::legacy_pb::Certificate)},
|
2018-10-01 19:57:10 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
static ::google::protobuf::Message const * const file_default_instances[] = {
|
2019-03-01 21:06:55 +01:00
|
|
|
reinterpret_cast<const ::google::protobuf::Message*>(&::legacy_pb::_Certificate_default_instance_),
|
2018-10-01 19:57:10 +02:00
|
|
|
};
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::AssignDescriptorsTable assign_descriptors_table_certificate_2eproto = {
|
|
|
|
{}, AddDescriptors_certificate_2eproto, "certificate.proto", schemas,
|
|
|
|
file_default_instances, TableStruct_certificate_2eproto::offsets,
|
|
|
|
file_level_metadata_certificate_2eproto, 1, file_level_enum_descriptors_certificate_2eproto, file_level_service_descriptors_certificate_2eproto,
|
|
|
|
};
|
2018-10-01 19:57:10 +02:00
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
const char descriptor_table_protodef_certificate_2eproto[] =
|
|
|
|
"\n\021certificate.proto\022\tlegacy_pb\"\242\001\n\013Certi"
|
|
|
|
"ficate\022/\n\007version\030\001 \002(\0162\036.legacy_pb.Cert"
|
|
|
|
"ificate.Version\022#\n\007keyType\030\002 \002(\0162\022.legac"
|
|
|
|
"y_pb.KeyType\022\021\n\tpublicKey\030\004 \002(\014\"*\n\007Versi"
|
|
|
|
"on\022\023\n\017UNKNOWN_VERSION\020\000\022\n\n\006_0_0_1\020\001*Q\n\007K"
|
|
|
|
"eyType\022\033\n\027UNKNOWN_PUBLIC_KEY_TYPE\020\000\022\014\n\010N"
|
|
|
|
"IST256p\020\001\022\014\n\010NIST384p\020\002\022\r\n\tSECP256k1\020\003"
|
|
|
|
;
|
|
|
|
::google::protobuf::internal::DescriptorTable descriptor_table_certificate_2eproto = {
|
|
|
|
false, InitDefaults_certificate_2eproto,
|
|
|
|
descriptor_table_protodef_certificate_2eproto,
|
|
|
|
"certificate.proto", &assign_descriptors_table_certificate_2eproto, 278,
|
|
|
|
};
|
2018-10-01 19:57:10 +02:00
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
void AddDescriptors_certificate_2eproto() {
|
|
|
|
static constexpr ::google::protobuf::internal::InitFunc deps[1] =
|
|
|
|
{
|
2018-10-01 19:57:10 +02:00
|
|
|
};
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::AddDescriptors(&descriptor_table_certificate_2eproto, deps, 0);
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
// Force running AddDescriptors() at dynamic initialization time.
|
|
|
|
static bool dynamic_init_dummy_certificate_2eproto = []() { AddDescriptors_certificate_2eproto(); return true; }();
|
|
|
|
namespace legacy_pb {
|
2018-10-01 19:57:10 +02:00
|
|
|
const ::google::protobuf::EnumDescriptor* Certificate_Version_descriptor() {
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::AssignDescriptors(&assign_descriptors_table_certificate_2eproto);
|
|
|
|
return file_level_enum_descriptors_certificate_2eproto[0];
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
bool Certificate_Version_IsValid(int value) {
|
|
|
|
switch (value) {
|
|
|
|
case 0:
|
|
|
|
case 1:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#if !defined(_MSC_VER) || _MSC_VER >= 1900
|
|
|
|
const Certificate_Version Certificate::UNKNOWN_VERSION;
|
|
|
|
const Certificate_Version Certificate::_0_0_1;
|
|
|
|
const Certificate_Version Certificate::Version_MIN;
|
|
|
|
const Certificate_Version Certificate::Version_MAX;
|
|
|
|
const int Certificate::Version_ARRAYSIZE;
|
|
|
|
#endif // !defined(_MSC_VER) || _MSC_VER >= 1900
|
|
|
|
const ::google::protobuf::EnumDescriptor* KeyType_descriptor() {
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::AssignDescriptors(&assign_descriptors_table_certificate_2eproto);
|
|
|
|
return file_level_enum_descriptors_certificate_2eproto[1];
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
bool KeyType_IsValid(int value) {
|
|
|
|
switch (value) {
|
|
|
|
case 0:
|
|
|
|
case 1:
|
|
|
|
case 2:
|
|
|
|
case 3:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// ===================================================================
|
|
|
|
|
|
|
|
void Certificate::InitAsDefaultInstance() {
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
class Certificate::HasBitSetters {
|
|
|
|
public:
|
|
|
|
static void set_has_version(Certificate* msg) {
|
|
|
|
msg->_has_bits_[0] |= 0x00000002u;
|
|
|
|
}
|
|
|
|
static void set_has_keytype(Certificate* msg) {
|
|
|
|
msg->_has_bits_[0] |= 0x00000004u;
|
|
|
|
}
|
|
|
|
static void set_has_publickey(Certificate* msg) {
|
|
|
|
msg->_has_bits_[0] |= 0x00000001u;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-10-01 19:57:10 +02:00
|
|
|
#if !defined(_MSC_VER) || _MSC_VER >= 1900
|
|
|
|
const int Certificate::kVersionFieldNumber;
|
|
|
|
const int Certificate::kKeyTypeFieldNumber;
|
|
|
|
const int Certificate::kPublicKeyFieldNumber;
|
|
|
|
#endif // !defined(_MSC_VER) || _MSC_VER >= 1900
|
|
|
|
|
|
|
|
Certificate::Certificate()
|
2019-03-01 21:06:55 +01:00
|
|
|
: ::google::protobuf::Message(), _internal_metadata_(nullptr) {
|
2018-10-01 19:57:10 +02:00
|
|
|
SharedCtor();
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(constructor:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
Certificate::Certificate(const Certificate& from)
|
|
|
|
: ::google::protobuf::Message(),
|
2019-03-01 21:06:55 +01:00
|
|
|
_internal_metadata_(nullptr),
|
2018-10-01 19:57:10 +02:00
|
|
|
_has_bits_(from._has_bits_) {
|
|
|
|
_internal_metadata_.MergeFrom(from._internal_metadata_);
|
|
|
|
publickey_.UnsafeSetDefault(&::google::protobuf::internal::GetEmptyStringAlreadyInited());
|
|
|
|
if (from.has_publickey()) {
|
|
|
|
publickey_.AssignWithDefault(&::google::protobuf::internal::GetEmptyStringAlreadyInited(), from.publickey_);
|
|
|
|
}
|
|
|
|
::memcpy(&version_, &from.version_,
|
|
|
|
static_cast<size_t>(reinterpret_cast<char*>(&keytype_) -
|
|
|
|
reinterpret_cast<char*>(&version_)) + sizeof(keytype_));
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(copy_constructor:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::SharedCtor() {
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::InitSCC(
|
|
|
|
&scc_info_Certificate_certificate_2eproto.base);
|
2018-10-01 19:57:10 +02:00
|
|
|
publickey_.UnsafeSetDefault(&::google::protobuf::internal::GetEmptyStringAlreadyInited());
|
|
|
|
::memset(&version_, 0, static_cast<size_t>(
|
|
|
|
reinterpret_cast<char*>(&keytype_) -
|
|
|
|
reinterpret_cast<char*>(&version_)) + sizeof(keytype_));
|
|
|
|
}
|
|
|
|
|
|
|
|
Certificate::~Certificate() {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(destructor:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
SharedDtor();
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::SharedDtor() {
|
|
|
|
publickey_.DestroyNoArena(&::google::protobuf::internal::GetEmptyStringAlreadyInited());
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::SetCachedSize(int size) const {
|
|
|
|
_cached_size_.Set(size);
|
|
|
|
}
|
|
|
|
const Certificate& Certificate::default_instance() {
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::InitSCC(&::scc_info_Certificate_certificate_2eproto.base);
|
2018-10-01 19:57:10 +02:00
|
|
|
return *internal_default_instance();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Certificate::Clear() {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(message_clear_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
::google::protobuf::uint32 cached_has_bits = 0;
|
|
|
|
// Prevent compiler warnings about cached_has_bits being unused
|
|
|
|
(void) cached_has_bits;
|
|
|
|
|
|
|
|
cached_has_bits = _has_bits_[0];
|
|
|
|
if (cached_has_bits & 0x00000001u) {
|
|
|
|
publickey_.ClearNonDefaultToEmptyNoArena();
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
if (cached_has_bits & 0x00000006u) {
|
2018-10-01 19:57:10 +02:00
|
|
|
::memset(&version_, 0, static_cast<size_t>(
|
|
|
|
reinterpret_cast<char*>(&keytype_) -
|
|
|
|
reinterpret_cast<char*>(&version_)) + sizeof(keytype_));
|
|
|
|
}
|
|
|
|
_has_bits_.Clear();
|
|
|
|
_internal_metadata_.Clear();
|
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
#if GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
|
|
|
|
const char* Certificate::_InternalParse(const char* begin, const char* end, void* object,
|
|
|
|
::google::protobuf::internal::ParseContext* ctx) {
|
|
|
|
auto msg = static_cast<Certificate*>(object);
|
|
|
|
::google::protobuf::int32 size; (void)size;
|
|
|
|
int depth; (void)depth;
|
|
|
|
::google::protobuf::uint32 tag;
|
|
|
|
::google::protobuf::internal::ParseFunc parser_till_end; (void)parser_till_end;
|
|
|
|
auto ptr = begin;
|
|
|
|
while (ptr < end) {
|
|
|
|
ptr = ::google::protobuf::io::Parse32(ptr, &tag);
|
|
|
|
GOOGLE_PROTOBUF_PARSER_ASSERT(ptr);
|
|
|
|
switch (tag >> 3) {
|
|
|
|
// required .legacy_pb.Certificate.Version version = 1;
|
|
|
|
case 1: {
|
|
|
|
if (static_cast<::google::protobuf::uint8>(tag) != 8) goto handle_unusual;
|
|
|
|
::google::protobuf::uint64 val = ::google::protobuf::internal::ReadVarint(&ptr);
|
|
|
|
if (!::legacy_pb::Certificate_Version_IsValid(val)) {
|
|
|
|
::google::protobuf::internal::WriteVarint(1, val, msg->mutable_unknown_fields());
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
msg->set_version(static_cast<::legacy_pb::Certificate_Version>(val));
|
|
|
|
GOOGLE_PROTOBUF_PARSER_ASSERT(ptr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
// required .legacy_pb.KeyType keyType = 2;
|
|
|
|
case 2: {
|
|
|
|
if (static_cast<::google::protobuf::uint8>(tag) != 16) goto handle_unusual;
|
|
|
|
::google::protobuf::uint64 val = ::google::protobuf::internal::ReadVarint(&ptr);
|
|
|
|
if (!::legacy_pb::KeyType_IsValid(val)) {
|
|
|
|
::google::protobuf::internal::WriteVarint(2, val, msg->mutable_unknown_fields());
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
msg->set_keytype(static_cast<::legacy_pb::KeyType>(val));
|
|
|
|
GOOGLE_PROTOBUF_PARSER_ASSERT(ptr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
// required bytes publicKey = 4;
|
|
|
|
case 4: {
|
|
|
|
if (static_cast<::google::protobuf::uint8>(tag) != 34) goto handle_unusual;
|
|
|
|
ptr = ::google::protobuf::io::ReadSize(ptr, &size);
|
|
|
|
GOOGLE_PROTOBUF_PARSER_ASSERT(ptr);
|
|
|
|
object = msg->mutable_publickey();
|
|
|
|
if (size > end - ptr + ::google::protobuf::internal::ParseContext::kSlopBytes) {
|
|
|
|
parser_till_end = ::google::protobuf::internal::GreedyStringParser;
|
|
|
|
goto string_till_end;
|
|
|
|
}
|
|
|
|
GOOGLE_PROTOBUF_PARSER_ASSERT(::google::protobuf::internal::StringCheck(ptr, size, ctx));
|
|
|
|
::google::protobuf::internal::InlineGreedyStringParser(object, ptr, size, ctx);
|
|
|
|
ptr += size;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default: {
|
|
|
|
handle_unusual:
|
|
|
|
if ((tag & 7) == 4 || tag == 0) {
|
|
|
|
ctx->EndGroup(tag);
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
auto res = UnknownFieldParse(tag, {_InternalParse, msg},
|
|
|
|
ptr, end, msg->_internal_metadata_.mutable_unknown_fields(), ctx);
|
|
|
|
ptr = res.first;
|
|
|
|
GOOGLE_PROTOBUF_PARSER_ASSERT(ptr != nullptr);
|
|
|
|
if (res.second) return ptr;
|
|
|
|
}
|
|
|
|
} // switch
|
|
|
|
} // while
|
|
|
|
return ptr;
|
|
|
|
string_till_end:
|
|
|
|
static_cast<::std::string*>(object)->clear();
|
|
|
|
static_cast<::std::string*>(object)->reserve(size);
|
|
|
|
goto len_delim_till_end;
|
|
|
|
len_delim_till_end:
|
|
|
|
return ctx->StoreAndTailCall(ptr, end, {_InternalParse, msg},
|
|
|
|
{parser_till_end, object}, size);
|
|
|
|
}
|
|
|
|
#else // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
|
2018-10-01 19:57:10 +02:00
|
|
|
bool Certificate::MergePartialFromCodedStream(
|
|
|
|
::google::protobuf::io::CodedInputStream* input) {
|
2019-03-01 21:06:55 +01:00
|
|
|
#define DO_(EXPRESSION) if (!PROTOBUF_PREDICT_TRUE(EXPRESSION)) goto failure
|
2018-10-01 19:57:10 +02:00
|
|
|
::google::protobuf::uint32 tag;
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(parse_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
for (;;) {
|
|
|
|
::std::pair<::google::protobuf::uint32, bool> p = input->ReadTagWithCutoffNoLastTag(127u);
|
|
|
|
tag = p.first;
|
|
|
|
if (!p.second) goto handle_unusual;
|
|
|
|
switch (::google::protobuf::internal::WireFormatLite::GetTagFieldNumber(tag)) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.Certificate.Version version = 1;
|
2018-10-01 19:57:10 +02:00
|
|
|
case 1: {
|
2019-03-01 21:06:55 +01:00
|
|
|
if (static_cast< ::google::protobuf::uint8>(tag) == (8 & 0xFF)) {
|
|
|
|
int value = 0;
|
2018-10-01 19:57:10 +02:00
|
|
|
DO_((::google::protobuf::internal::WireFormatLite::ReadPrimitive<
|
|
|
|
int, ::google::protobuf::internal::WireFormatLite::TYPE_ENUM>(
|
|
|
|
input, &value)));
|
2019-03-01 21:06:55 +01:00
|
|
|
if (::legacy_pb::Certificate_Version_IsValid(value)) {
|
|
|
|
set_version(static_cast< ::legacy_pb::Certificate_Version >(value));
|
2018-10-01 19:57:10 +02:00
|
|
|
} else {
|
|
|
|
mutable_unknown_fields()->AddVarint(
|
2019-03-01 21:06:55 +01:00
|
|
|
1, static_cast<::google::protobuf::uint64>(value));
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
goto handle_unusual;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.KeyType keyType = 2;
|
2018-10-01 19:57:10 +02:00
|
|
|
case 2: {
|
2019-03-01 21:06:55 +01:00
|
|
|
if (static_cast< ::google::protobuf::uint8>(tag) == (16 & 0xFF)) {
|
|
|
|
int value = 0;
|
2018-10-01 19:57:10 +02:00
|
|
|
DO_((::google::protobuf::internal::WireFormatLite::ReadPrimitive<
|
|
|
|
int, ::google::protobuf::internal::WireFormatLite::TYPE_ENUM>(
|
|
|
|
input, &value)));
|
2019-03-01 21:06:55 +01:00
|
|
|
if (::legacy_pb::KeyType_IsValid(value)) {
|
|
|
|
set_keytype(static_cast< ::legacy_pb::KeyType >(value));
|
2018-10-01 19:57:10 +02:00
|
|
|
} else {
|
|
|
|
mutable_unknown_fields()->AddVarint(
|
2019-03-01 21:06:55 +01:00
|
|
|
2, static_cast<::google::protobuf::uint64>(value));
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
goto handle_unusual;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// required bytes publicKey = 4;
|
|
|
|
case 4: {
|
2019-03-01 21:06:55 +01:00
|
|
|
if (static_cast< ::google::protobuf::uint8>(tag) == (34 & 0xFF)) {
|
2018-10-01 19:57:10 +02:00
|
|
|
DO_(::google::protobuf::internal::WireFormatLite::ReadBytes(
|
|
|
|
input, this->mutable_publickey()));
|
|
|
|
} else {
|
|
|
|
goto handle_unusual;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
default: {
|
|
|
|
handle_unusual:
|
|
|
|
if (tag == 0) {
|
|
|
|
goto success;
|
|
|
|
}
|
|
|
|
DO_(::google::protobuf::internal::WireFormat::SkipField(
|
|
|
|
input, tag, _internal_metadata_.mutable_unknown_fields()));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
success:
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(parse_success:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
return true;
|
|
|
|
failure:
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(parse_failure:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
return false;
|
|
|
|
#undef DO_
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
#endif // GOOGLE_PROTOBUF_ENABLE_EXPERIMENTAL_PARSER
|
2018-10-01 19:57:10 +02:00
|
|
|
|
|
|
|
void Certificate::SerializeWithCachedSizes(
|
|
|
|
::google::protobuf::io::CodedOutputStream* output) const {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(serialize_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
::google::protobuf::uint32 cached_has_bits = 0;
|
|
|
|
(void) cached_has_bits;
|
|
|
|
|
|
|
|
cached_has_bits = _has_bits_[0];
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.Certificate.Version version = 1;
|
2018-10-01 19:57:10 +02:00
|
|
|
if (cached_has_bits & 0x00000002u) {
|
|
|
|
::google::protobuf::internal::WireFormatLite::WriteEnum(
|
|
|
|
1, this->version(), output);
|
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.KeyType keyType = 2;
|
2018-10-01 19:57:10 +02:00
|
|
|
if (cached_has_bits & 0x00000004u) {
|
|
|
|
::google::protobuf::internal::WireFormatLite::WriteEnum(
|
|
|
|
2, this->keytype(), output);
|
|
|
|
}
|
|
|
|
|
|
|
|
// required bytes publicKey = 4;
|
|
|
|
if (cached_has_bits & 0x00000001u) {
|
|
|
|
::google::protobuf::internal::WireFormatLite::WriteBytesMaybeAliased(
|
|
|
|
4, this->publickey(), output);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (_internal_metadata_.have_unknown_fields()) {
|
|
|
|
::google::protobuf::internal::WireFormat::SerializeUnknownFields(
|
|
|
|
_internal_metadata_.unknown_fields(), output);
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(serialize_end:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
::google::protobuf::uint8* Certificate::InternalSerializeWithCachedSizesToArray(
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::uint8* target) const {
|
|
|
|
// @@protoc_insertion_point(serialize_to_array_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
::google::protobuf::uint32 cached_has_bits = 0;
|
|
|
|
(void) cached_has_bits;
|
|
|
|
|
|
|
|
cached_has_bits = _has_bits_[0];
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.Certificate.Version version = 1;
|
2018-10-01 19:57:10 +02:00
|
|
|
if (cached_has_bits & 0x00000002u) {
|
|
|
|
target = ::google::protobuf::internal::WireFormatLite::WriteEnumToArray(
|
|
|
|
1, this->version(), target);
|
|
|
|
}
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.KeyType keyType = 2;
|
2018-10-01 19:57:10 +02:00
|
|
|
if (cached_has_bits & 0x00000004u) {
|
|
|
|
target = ::google::protobuf::internal::WireFormatLite::WriteEnumToArray(
|
|
|
|
2, this->keytype(), target);
|
|
|
|
}
|
|
|
|
|
|
|
|
// required bytes publicKey = 4;
|
|
|
|
if (cached_has_bits & 0x00000001u) {
|
|
|
|
target =
|
|
|
|
::google::protobuf::internal::WireFormatLite::WriteBytesToArray(
|
|
|
|
4, this->publickey(), target);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (_internal_metadata_.have_unknown_fields()) {
|
|
|
|
target = ::google::protobuf::internal::WireFormat::SerializeUnknownFieldsToArray(
|
|
|
|
_internal_metadata_.unknown_fields(), target);
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(serialize_to_array_end:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
return target;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t Certificate::RequiredFieldsByteSizeFallback() const {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(required_fields_byte_size_fallback_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
size_t total_size = 0;
|
|
|
|
|
|
|
|
if (has_publickey()) {
|
|
|
|
// required bytes publicKey = 4;
|
|
|
|
total_size += 1 +
|
|
|
|
::google::protobuf::internal::WireFormatLite::BytesSize(
|
|
|
|
this->publickey());
|
|
|
|
}
|
|
|
|
|
|
|
|
if (has_version()) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.Certificate.Version version = 1;
|
2018-10-01 19:57:10 +02:00
|
|
|
total_size += 1 +
|
|
|
|
::google::protobuf::internal::WireFormatLite::EnumSize(this->version());
|
|
|
|
}
|
|
|
|
|
|
|
|
if (has_keytype()) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.KeyType keyType = 2;
|
2018-10-01 19:57:10 +02:00
|
|
|
total_size += 1 +
|
|
|
|
::google::protobuf::internal::WireFormatLite::EnumSize(this->keytype());
|
|
|
|
}
|
|
|
|
|
|
|
|
return total_size;
|
|
|
|
}
|
|
|
|
size_t Certificate::ByteSizeLong() const {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(message_byte_size_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
size_t total_size = 0;
|
|
|
|
|
|
|
|
if (_internal_metadata_.have_unknown_fields()) {
|
|
|
|
total_size +=
|
|
|
|
::google::protobuf::internal::WireFormat::ComputeUnknownFieldsSize(
|
|
|
|
_internal_metadata_.unknown_fields());
|
|
|
|
}
|
|
|
|
if (((_has_bits_[0] & 0x00000007) ^ 0x00000007) == 0) { // All required fields are present.
|
|
|
|
// required bytes publicKey = 4;
|
|
|
|
total_size += 1 +
|
|
|
|
::google::protobuf::internal::WireFormatLite::BytesSize(
|
|
|
|
this->publickey());
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.Certificate.Version version = 1;
|
2018-10-01 19:57:10 +02:00
|
|
|
total_size += 1 +
|
|
|
|
::google::protobuf::internal::WireFormatLite::EnumSize(this->version());
|
|
|
|
|
2019-03-01 21:06:55 +01:00
|
|
|
// required .legacy_pb.KeyType keyType = 2;
|
2018-10-01 19:57:10 +02:00
|
|
|
total_size += 1 +
|
|
|
|
::google::protobuf::internal::WireFormatLite::EnumSize(this->keytype());
|
|
|
|
|
|
|
|
} else {
|
|
|
|
total_size += RequiredFieldsByteSizeFallback();
|
|
|
|
}
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::uint32 cached_has_bits = 0;
|
|
|
|
// Prevent compiler warnings about cached_has_bits being unused
|
|
|
|
(void) cached_has_bits;
|
|
|
|
|
2018-10-01 19:57:10 +02:00
|
|
|
int cached_size = ::google::protobuf::internal::ToCachedSize(total_size);
|
|
|
|
SetCachedSize(cached_size);
|
|
|
|
return total_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::MergeFrom(const ::google::protobuf::Message& from) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(generalized_merge_from_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
GOOGLE_DCHECK_NE(&from, this);
|
|
|
|
const Certificate* source =
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::DynamicCastToGenerated<Certificate>(
|
2018-10-01 19:57:10 +02:00
|
|
|
&from);
|
2019-03-01 21:06:55 +01:00
|
|
|
if (source == nullptr) {
|
|
|
|
// @@protoc_insertion_point(generalized_merge_from_cast_fail:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
::google::protobuf::internal::ReflectionOps::Merge(from, this);
|
|
|
|
} else {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(generalized_merge_from_cast_success:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
MergeFrom(*source);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::MergeFrom(const Certificate& from) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(class_specific_merge_from_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
GOOGLE_DCHECK_NE(&from, this);
|
|
|
|
_internal_metadata_.MergeFrom(from._internal_metadata_);
|
|
|
|
::google::protobuf::uint32 cached_has_bits = 0;
|
|
|
|
(void) cached_has_bits;
|
|
|
|
|
|
|
|
cached_has_bits = from._has_bits_[0];
|
2019-03-01 21:06:55 +01:00
|
|
|
if (cached_has_bits & 0x00000007u) {
|
2018-10-01 19:57:10 +02:00
|
|
|
if (cached_has_bits & 0x00000001u) {
|
2019-03-01 21:06:55 +01:00
|
|
|
_has_bits_[0] |= 0x00000001u;
|
2018-10-01 19:57:10 +02:00
|
|
|
publickey_.AssignWithDefault(&::google::protobuf::internal::GetEmptyStringAlreadyInited(), from.publickey_);
|
|
|
|
}
|
|
|
|
if (cached_has_bits & 0x00000002u) {
|
|
|
|
version_ = from.version_;
|
|
|
|
}
|
|
|
|
if (cached_has_bits & 0x00000004u) {
|
|
|
|
keytype_ = from.keytype_;
|
|
|
|
}
|
|
|
|
_has_bits_[0] |= cached_has_bits;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::CopyFrom(const ::google::protobuf::Message& from) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(generalized_copy_from_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
if (&from == this) return;
|
|
|
|
Clear();
|
|
|
|
MergeFrom(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::CopyFrom(const Certificate& from) {
|
2019-03-01 21:06:55 +01:00
|
|
|
// @@protoc_insertion_point(class_specific_copy_from_start:legacy_pb.Certificate)
|
2018-10-01 19:57:10 +02:00
|
|
|
if (&from == this) return;
|
|
|
|
Clear();
|
|
|
|
MergeFrom(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Certificate::IsInitialized() const {
|
|
|
|
if ((_has_bits_[0] & 0x00000007) != 0x00000007) return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Certificate::Swap(Certificate* other) {
|
|
|
|
if (other == this) return;
|
|
|
|
InternalSwap(other);
|
|
|
|
}
|
|
|
|
void Certificate::InternalSwap(Certificate* other) {
|
|
|
|
using std::swap;
|
2019-03-01 21:06:55 +01:00
|
|
|
_internal_metadata_.Swap(&other->_internal_metadata_);
|
|
|
|
swap(_has_bits_[0], other->_has_bits_[0]);
|
2018-10-01 19:57:10 +02:00
|
|
|
publickey_.Swap(&other->publickey_, &::google::protobuf::internal::GetEmptyStringAlreadyInited(),
|
|
|
|
GetArenaNoVirtual());
|
|
|
|
swap(version_, other->version_);
|
|
|
|
swap(keytype_, other->keytype_);
|
|
|
|
}
|
|
|
|
|
|
|
|
::google::protobuf::Metadata Certificate::GetMetadata() const {
|
2019-03-01 21:06:55 +01:00
|
|
|
::google::protobuf::internal::AssignDescriptors(&::assign_descriptors_table_certificate_2eproto);
|
|
|
|
return ::file_level_metadata_certificate_2eproto[kIndexInFileMessages];
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// @@protoc_insertion_point(namespace_scope)
|
2019-03-01 21:06:55 +01:00
|
|
|
} // namespace legacy_pb
|
2018-10-01 19:57:10 +02:00
|
|
|
namespace google {
|
|
|
|
namespace protobuf {
|
2019-03-01 21:06:55 +01:00
|
|
|
template<> PROTOBUF_NOINLINE ::legacy_pb::Certificate* Arena::CreateMaybeMessage< ::legacy_pb::Certificate >(Arena* arena) {
|
|
|
|
return Arena::CreateInternal< ::legacy_pb::Certificate >(arena);
|
2018-10-01 19:57:10 +02:00
|
|
|
}
|
|
|
|
} // namespace protobuf
|
|
|
|
} // namespace google
|
|
|
|
|
|
|
|
// @@protoc_insertion_point(global_scope)
|
2019-03-01 21:06:55 +01:00
|
|
|
#include <google/protobuf/port_undef.inc>
|