1 // Generated by the protocol buffer compiler.  DO NOT EDIT!
2 // source: frameworks/proto_logging/stats/atoms/conscrypt/conscrypt_extension_atoms.proto
3 
4 #include "frameworks/proto_logging/stats/atoms/conscrypt/conscrypt_extension_atoms.pb.h"
5 
6 #include <algorithm>
7 #include <cstdint>
8 
9 #include <google/protobuf/io/coded_stream.h>
10 #include <google/protobuf/extension_set.h>
11 #include <google/protobuf/wire_format_lite.h>
12 #include <google/protobuf/descriptor.h>
13 #include <google/protobuf/generated_message_reflection.h>
14 #include <google/protobuf/reflection_ops.h>
15 #include <google/protobuf/wire_format.h>
16 // @@protoc_insertion_point(includes)
17 #include <google/protobuf/port_def.inc>
18 
19 PROTOBUF_PRAGMA_INIT_SEG
20 
21 namespace _pb = ::PROTOBUF_NAMESPACE_ID;
22 namespace _pbi = _pb::internal;
23 
24 namespace android {
25 namespace os {
26 namespace statsd {
27 namespace conscrypt {
CertificateTransparencyLogListStateChanged(::_pbi::ConstantInitialized)28 PROTOBUF_CONSTEXPR CertificateTransparencyLogListStateChanged::CertificateTransparencyLogListStateChanged(
29     ::_pbi::ConstantInitialized): _impl_{
30     /*decltype(_impl_._has_bits_)*/{}
31   , /*decltype(_impl_._cached_size_)*/{}
32   , /*decltype(_impl_.status_)*/0
33   , /*decltype(_impl_.loaded_compat_version_)*/0
34   , /*decltype(_impl_.min_compat_version_)*/0
35   , /*decltype(_impl_.major_version_)*/0
36   , /*decltype(_impl_.minor_version_)*/0} {}
37 struct CertificateTransparencyLogListStateChangedDefaultTypeInternal {
CertificateTransparencyLogListStateChangedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyLogListStateChangedDefaultTypeInternal38   PROTOBUF_CONSTEXPR CertificateTransparencyLogListStateChangedDefaultTypeInternal()
39       : _instance(::_pbi::ConstantInitialized{}) {}
~CertificateTransparencyLogListStateChangedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyLogListStateChangedDefaultTypeInternal40   ~CertificateTransparencyLogListStateChangedDefaultTypeInternal() {}
41   union {  // NOLINT(misc-non-private-member-variables-in-classes)
42     CertificateTransparencyLogListStateChanged _instance;
43   };
44 };
45 PROTOBUF_ATTRIBUTE_NO_DESTROY PROTOBUF_CONSTINIT PROTOBUF_ATTRIBUTE_INIT_PRIORITY1 CertificateTransparencyLogListStateChangedDefaultTypeInternal _CertificateTransparencyLogListStateChanged_default_instance_;
CertificateTransparencyVerificationReported(::_pbi::ConstantInitialized)46 PROTOBUF_CONSTEXPR CertificateTransparencyVerificationReported::CertificateTransparencyVerificationReported(
47     ::_pbi::ConstantInitialized): _impl_{
48     /*decltype(_impl_._has_bits_)*/{}
49   , /*decltype(_impl_._cached_size_)*/{}
50   , /*decltype(_impl_.result_)*/0
51   , /*decltype(_impl_.reason_)*/0
52   , /*decltype(_impl_.policy_compatibility_version_)*/0
53   , /*decltype(_impl_.major_version_)*/0
54   , /*decltype(_impl_.minor_version_)*/0
55   , /*decltype(_impl_.num_cert_scts_)*/0
56   , /*decltype(_impl_.num_ocsp_scts_)*/0
57   , /*decltype(_impl_.num_tls_scts_)*/0} {}
58 struct CertificateTransparencyVerificationReportedDefaultTypeInternal {
CertificateTransparencyVerificationReportedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyVerificationReportedDefaultTypeInternal59   PROTOBUF_CONSTEXPR CertificateTransparencyVerificationReportedDefaultTypeInternal()
60       : _instance(::_pbi::ConstantInitialized{}) {}
~CertificateTransparencyVerificationReportedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyVerificationReportedDefaultTypeInternal61   ~CertificateTransparencyVerificationReportedDefaultTypeInternal() {}
62   union {  // NOLINT(misc-non-private-member-variables-in-classes)
63     CertificateTransparencyVerificationReported _instance;
64   };
65 };
66 PROTOBUF_ATTRIBUTE_NO_DESTROY PROTOBUF_CONSTINIT PROTOBUF_ATTRIBUTE_INIT_PRIORITY1 CertificateTransparencyVerificationReportedDefaultTypeInternal _CertificateTransparencyVerificationReported_default_instance_;
ConscryptServiceUsed(::_pbi::ConstantInitialized)67 PROTOBUF_CONSTEXPR ConscryptServiceUsed::ConscryptServiceUsed(
68     ::_pbi::ConstantInitialized): _impl_{
69     /*decltype(_impl_._has_bits_)*/{}
70   , /*decltype(_impl_._cached_size_)*/{}
71   , /*decltype(_impl_.algorithm_)*/0
72   , /*decltype(_impl_.cipher_)*/0
73   , /*decltype(_impl_.mode_)*/0
74   , /*decltype(_impl_.padding_)*/0} {}
75 struct ConscryptServiceUsedDefaultTypeInternal {
ConscryptServiceUsedDefaultTypeInternalandroid::os::statsd::conscrypt::ConscryptServiceUsedDefaultTypeInternal76   PROTOBUF_CONSTEXPR ConscryptServiceUsedDefaultTypeInternal()
77       : _instance(::_pbi::ConstantInitialized{}) {}
~ConscryptServiceUsedDefaultTypeInternalandroid::os::statsd::conscrypt::ConscryptServiceUsedDefaultTypeInternal78   ~ConscryptServiceUsedDefaultTypeInternal() {}
79   union {  // NOLINT(misc-non-private-member-variables-in-classes)
80     ConscryptServiceUsed _instance;
81   };
82 };
83 PROTOBUF_ATTRIBUTE_NO_DESTROY PROTOBUF_CONSTINIT PROTOBUF_ATTRIBUTE_INIT_PRIORITY1 ConscryptServiceUsedDefaultTypeInternal _ConscryptServiceUsed_default_instance_;
84 }  // namespace conscrypt
85 }  // namespace statsd
86 }  // namespace os
87 }  // namespace android
88 static ::_pb::Metadata file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[3];
89 static const ::_pb::EnumDescriptor* file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[4];
90 static constexpr ::_pb::ServiceDescriptor const** file_level_service_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto = nullptr;
91 
92 const ::uint32_t TableStruct_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto::offsets[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) = {
93   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_._has_bits_),
94   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _internal_metadata_),
95   ~0u,  // no _extensions_
96   ~0u,  // no _oneof_case_
97   ~0u,  // no _weak_field_map_
98   ~0u,  // no _inlined_string_donated_
99   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.status_),
100   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.loaded_compat_version_),
101   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.min_compat_version_),
102   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.major_version_),
103   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.minor_version_),
104   0,
105   1,
106   2,
107   3,
108   4,
109   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_._has_bits_),
110   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _internal_metadata_),
111   ~0u,  // no _extensions_
112   ~0u,  // no _oneof_case_
113   ~0u,  // no _weak_field_map_
114   ~0u,  // no _inlined_string_donated_
115   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.result_),
116   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.reason_),
117   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.policy_compatibility_version_),
118   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.major_version_),
119   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.minor_version_),
120   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.num_cert_scts_),
121   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.num_ocsp_scts_),
122   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.num_tls_scts_),
123   0,
124   1,
125   2,
126   3,
127   4,
128   5,
129   6,
130   7,
131   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_._has_bits_),
132   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _internal_metadata_),
133   ~0u,  // no _extensions_
134   ~0u,  // no _oneof_case_
135   ~0u,  // no _weak_field_map_
136   ~0u,  // no _inlined_string_donated_
137   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.algorithm_),
138   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.cipher_),
139   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.mode_),
140   PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.padding_),
141   0,
142   1,
143   2,
144   3,
145 };
146 static const ::_pbi::MigrationSchema schemas[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) = {
147   { 0, 11, -1, sizeof(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged)},
148   { 16, 30, -1, sizeof(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported)},
149   { 38, 48, -1, sizeof(::android::os::statsd::conscrypt::ConscryptServiceUsed)},
150 };
151 
152 static const ::_pb::Message* const file_default_instances[] = {
153   &::android::os::statsd::conscrypt::_CertificateTransparencyLogListStateChanged_default_instance_._instance,
154   &::android::os::statsd::conscrypt::_CertificateTransparencyVerificationReported_default_instance_._instance,
155   &::android::os::statsd::conscrypt::_ConscryptServiceUsed_default_instance_._instance,
156 };
157 
158 const char descriptor_table_protodef_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) =
159   "\nNframeworks/proto_logging/stats/atoms/c"
160   "onscrypt/conscrypt_extension_atoms.proto"
161   "\022\033android.os.statsd.conscrypt\032*framework"
162   "s/proto_logging/stats/atoms.proto\0327frame"
163   "works/proto_logging/stats/atom_field_opt"
164   "ions.proto\032=frameworks/proto_logging/sta"
165   "ts/enums/conscrypt/ct/enums.proto\"\305\002\n*Ce"
166   "rtificateTransparencyLogListStateChanged"
167   "\022:\n\006status\030\001 \001(\0162*.android.os.statsd.con"
168   "scrypt.LogListStatus\022W\n\025loaded_compat_ve"
169   "rsion\030\002 \001(\01628.android.os.statsd.conscryp"
170   "t.LogListCompatibilityVersion\022T\n\022min_com"
171   "pat_version\030\003 \001(\01628.android.os.statsd.co"
172   "nscrypt.LogListCompatibilityVersion\022\025\n\rm"
173   "ajor_version\030\004 \001(\005\022\025\n\rminor_version\030\005 \001("
174   "\005\"\201\003\n+CertificateTransparencyVerificatio"
175   "nReported\022\?\n\006result\030\001 \001(\0162/.android.os.s"
176   "tatsd.conscrypt.VerificationResult\022\?\n\006re"
177   "ason\030\002 \001(\0162/.android.os.statsd.conscrypt"
178   ".VerificationReason\022^\n\034policy_compatibil"
179   "ity_version\030\003 \001(\01628.android.os.statsd.co"
180   "nscrypt.LogListCompatibilityVersion\022\025\n\rm"
181   "ajor_version\030\004 \001(\005\022\025\n\rminor_version\030\005 \001("
182   "\005\022\025\n\rnum_cert_scts\030\006 \001(\005\022\025\n\rnum_ocsp_sct"
183   "s\030\007 \001(\005\022\024\n\014num_tls_scts\030\010 \001(\005\"\356\001\n\024Conscr"
184   "yptServiceUsed\0229\n\talgorithm\030\001 \001(\0162&.andr"
185   "oid.os.statsd.conscrypt.Algorithm\0223\n\006cip"
186   "her\030\002 \001(\0162#.android.os.statsd.conscrypt."
187   "Cipher\022/\n\004mode\030\003 \001(\0162!.android.os.statsd"
188   ".conscrypt.Mode\0225\n\007padding\030\004 \001(\0162$.andro"
189   "id.os.statsd.conscrypt.Padding*=\n\tAlgori"
190   "thm\022\025\n\021UNKNOWN_ALGORITHM\020\000\022\n\n\006CIPHER\020\001\022\r"
191   "\n\tSIGNATURE\020\002*r\n\006Cipher\022\022\n\016UNKNOWN_CIPHE"
192   "R\020\000\022\007\n\003AES\020\001\022\007\n\003DES\020\002\022\n\n\006DESEDE\020\003\022\007\n\003DSA"
193   "\020\004\022\014\n\010BLOWFISH\020\005\022\014\n\010CHACHA20\020\006\022\007\n\003RSA\020\007\022"
194   "\010\n\004ARC4\020\010*m\n\004Mode\022\013\n\007NO_MODE\020\000\022\007\n\003CBC\020\001\022"
195   "\007\n\003CTR\020\002\022\007\n\003ECB\020\003\022\007\n\003CFB\020\004\022\007\n\003CTS\020\005\022\007\n\003G"
196   "CM\020\006\022\013\n\007GCM_SIV\020\007\022\007\n\003OFB\020\010\022\014\n\010POLY1305\020\t"
197   "*\220\001\n\007Padding\022\016\n\nNO_PADDING\020\000\022\017\n\013OAEP_SHA"
198   "512\020\001\022\017\n\013OAEP_SHA384\020\002\022\017\n\013OAEP_SHA256\020\003\022"
199   "\017\n\013OAEP_SHA224\020\004\022\r\n\tOAEP_SHA1\020\005\022\t\n\005PKCS1"
200   "\020\006\022\t\n\005PKCS5\020\007\022\014\n\010ISO10126\020\010:\251\001\n/certific"
201   "ate_transparency_log_list_state_changed\022"
202   "\027.android.os.statsd.Atom\030\246\007 \001(\0132G.androi"
203   "d.os.statsd.conscrypt.CertificateTranspa"
204   "rencyLogListStateChangedB\r\242\265\030\tconscrypt:"
205   "z\n\026conscrypt_service_used\022\027.android.os.s"
206   "tatsd.Atom\030\305\007 \001(\01321.android.os.statsd.co"
207   "nscrypt.ConscryptServiceUsedB\r\242\265\030\tconscr"
208   "ypt:\251\001\n.certificate_transparency_verific"
209   "ation_reported\022\027.android.os.statsd.Atom\030"
210   "\335\007 \001(\0132H.android.os.statsd.conscrypt.Cer"
211   "tificateTransparencyVerificationReported"
212   "B\r\242\265\030\tconscryptB\032\n\030com.android.os.conscr"
213   "ypt"
214   ;
215 static const ::_pbi::DescriptorTable* const descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_deps[3] = {
216   &::descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatom_5ffield_5foptions_2eproto,
217   &::descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2eproto,
218   &::descriptor_table_frameworks_2fproto_5flogging_2fstats_2fenums_2fconscrypt_2fct_2fenums_2eproto,
219 };
220 static ::_pbi::once_flag descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once;
221 const ::_pbi::DescriptorTable descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto = {
222     false, false, 2163, descriptor_table_protodef_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto,
223     "frameworks/proto_logging/stats/atoms/conscrypt/conscrypt_extension_atoms.proto",
224     &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once, descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_deps, 3, 3,
225     schemas, file_default_instances, TableStruct_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto::offsets,
226     file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto, file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto,
227     file_level_service_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto,
228 };
descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter()229 PROTOBUF_ATTRIBUTE_WEAK const ::_pbi::DescriptorTable* descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter() {
230   return &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto;
231 }
232 
233 // Force running AddDescriptors() at dynamic initialization time.
234 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 static ::_pbi::AddDescriptorsRunner dynamic_init_dummy_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
235 namespace android {
236 namespace os {
237 namespace statsd {
238 namespace conscrypt {
Algorithm_descriptor()239 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Algorithm_descriptor() {
240   ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
241   return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[0];
242 }
Algorithm_IsValid(int value)243 bool Algorithm_IsValid(int value) {
244   switch (value) {
245     case 0:
246     case 1:
247     case 2:
248       return true;
249     default:
250       return false;
251   }
252 }
253 
Cipher_descriptor()254 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Cipher_descriptor() {
255   ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
256   return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[1];
257 }
Cipher_IsValid(int value)258 bool Cipher_IsValid(int value) {
259   switch (value) {
260     case 0:
261     case 1:
262     case 2:
263     case 3:
264     case 4:
265     case 5:
266     case 6:
267     case 7:
268     case 8:
269       return true;
270     default:
271       return false;
272   }
273 }
274 
Mode_descriptor()275 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Mode_descriptor() {
276   ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
277   return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[2];
278 }
Mode_IsValid(int value)279 bool Mode_IsValid(int value) {
280   switch (value) {
281     case 0:
282     case 1:
283     case 2:
284     case 3:
285     case 4:
286     case 5:
287     case 6:
288     case 7:
289     case 8:
290     case 9:
291       return true;
292     default:
293       return false;
294   }
295 }
296 
Padding_descriptor()297 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Padding_descriptor() {
298   ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
299   return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[3];
300 }
Padding_IsValid(int value)301 bool Padding_IsValid(int value) {
302   switch (value) {
303     case 0:
304     case 1:
305     case 2:
306     case 3:
307     case 4:
308     case 5:
309     case 6:
310     case 7:
311     case 8:
312       return true;
313     default:
314       return false;
315   }
316 }
317 
318 
319 // ===================================================================
320 
321 class CertificateTransparencyLogListStateChanged::_Internal {
322  public:
323   using HasBits = decltype(std::declval<CertificateTransparencyLogListStateChanged>()._impl_._has_bits_);
set_has_status(HasBits * has_bits)324   static void set_has_status(HasBits* has_bits) {
325     (*has_bits)[0] |= 1u;
326   }
set_has_loaded_compat_version(HasBits * has_bits)327   static void set_has_loaded_compat_version(HasBits* has_bits) {
328     (*has_bits)[0] |= 2u;
329   }
set_has_min_compat_version(HasBits * has_bits)330   static void set_has_min_compat_version(HasBits* has_bits) {
331     (*has_bits)[0] |= 4u;
332   }
set_has_major_version(HasBits * has_bits)333   static void set_has_major_version(HasBits* has_bits) {
334     (*has_bits)[0] |= 8u;
335   }
set_has_minor_version(HasBits * has_bits)336   static void set_has_minor_version(HasBits* has_bits) {
337     (*has_bits)[0] |= 16u;
338   }
339 };
340 
CertificateTransparencyLogListStateChanged(::PROTOBUF_NAMESPACE_ID::Arena * arena,bool is_message_owned)341 CertificateTransparencyLogListStateChanged::CertificateTransparencyLogListStateChanged(::PROTOBUF_NAMESPACE_ID::Arena* arena,
342                          bool is_message_owned)
343   : ::PROTOBUF_NAMESPACE_ID::Message(arena, is_message_owned) {
344   SharedCtor(arena, is_message_owned);
345   // @@protoc_insertion_point(arena_constructor:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
346 }
CertificateTransparencyLogListStateChanged(const CertificateTransparencyLogListStateChanged & from)347 CertificateTransparencyLogListStateChanged::CertificateTransparencyLogListStateChanged(const CertificateTransparencyLogListStateChanged& from)
348   : ::PROTOBUF_NAMESPACE_ID::Message() {
349   CertificateTransparencyLogListStateChanged* const _this = this; (void)_this;
350   new (&_impl_) Impl_{
351       decltype(_impl_._has_bits_){from._impl_._has_bits_}
352     , /*decltype(_impl_._cached_size_)*/{}
353     , decltype(_impl_.status_){}
354     , decltype(_impl_.loaded_compat_version_){}
355     , decltype(_impl_.min_compat_version_){}
356     , decltype(_impl_.major_version_){}
357     , decltype(_impl_.minor_version_){}};
358 
359   _internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
360   ::memcpy(&_impl_.status_, &from._impl_.status_,
361     static_cast<size_t>(reinterpret_cast<char*>(&_impl_.minor_version_) -
362     reinterpret_cast<char*>(&_impl_.status_)) + sizeof(_impl_.minor_version_));
363   // @@protoc_insertion_point(copy_constructor:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
364 }
365 
SharedCtor(::_pb::Arena * arena,bool is_message_owned)366 inline void CertificateTransparencyLogListStateChanged::SharedCtor(
367     ::_pb::Arena* arena, bool is_message_owned) {
368   (void)arena;
369   (void)is_message_owned;
370   new (&_impl_) Impl_{
371       decltype(_impl_._has_bits_){}
372     , /*decltype(_impl_._cached_size_)*/{}
373     , decltype(_impl_.status_){0}
374     , decltype(_impl_.loaded_compat_version_){0}
375     , decltype(_impl_.min_compat_version_){0}
376     , decltype(_impl_.major_version_){0}
377     , decltype(_impl_.minor_version_){0}
378   };
379 }
380 
~CertificateTransparencyLogListStateChanged()381 CertificateTransparencyLogListStateChanged::~CertificateTransparencyLogListStateChanged() {
382   // @@protoc_insertion_point(destructor:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
383   if (auto *arena = _internal_metadata_.DeleteReturnArena<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>()) {
384   (void)arena;
385     return;
386   }
387   SharedDtor();
388 }
389 
SharedDtor()390 inline void CertificateTransparencyLogListStateChanged::SharedDtor() {
391   GOOGLE_DCHECK(GetArenaForAllocation() == nullptr);
392 }
393 
SetCachedSize(int size) const394 void CertificateTransparencyLogListStateChanged::SetCachedSize(int size) const {
395   _impl_._cached_size_.Set(size);
396 }
397 
Clear()398 void CertificateTransparencyLogListStateChanged::Clear() {
399 // @@protoc_insertion_point(message_clear_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
400   ::uint32_t cached_has_bits = 0;
401   // Prevent compiler warnings about cached_has_bits being unused
402   (void) cached_has_bits;
403 
404   cached_has_bits = _impl_._has_bits_[0];
405   if (cached_has_bits & 0x0000001fu) {
406     ::memset(&_impl_.status_, 0, static_cast<size_t>(
407         reinterpret_cast<char*>(&_impl_.minor_version_) -
408         reinterpret_cast<char*>(&_impl_.status_)) + sizeof(_impl_.minor_version_));
409   }
410   _impl_._has_bits_.Clear();
411   _internal_metadata_.Clear<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>();
412 }
413 
_InternalParse(const char * ptr,::_pbi::ParseContext * ctx)414 const char* CertificateTransparencyLogListStateChanged::_InternalParse(const char* ptr, ::_pbi::ParseContext* ctx) {
415 #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
416   _Internal::HasBits has_bits{};
417   while (!ctx->Done(&ptr)) {
418     ::uint32_t tag;
419     ptr = ::_pbi::ReadTag(ptr, &tag);
420     switch (tag >> 3) {
421       // optional .android.os.statsd.conscrypt.LogListStatus status = 1;
422       case 1:
423         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 8)) {
424           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
425           CHK_(ptr);
426           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListStatus_IsValid(val))) {
427             _internal_set_status(static_cast<::android::os::statsd::conscrypt::LogListStatus>(val));
428           } else {
429             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(1, val, mutable_unknown_fields());
430           }
431         } else {
432           goto handle_unusual;
433         }
434         continue;
435       // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion loaded_compat_version = 2;
436       case 2:
437         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 16)) {
438           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
439           CHK_(ptr);
440           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListCompatibilityVersion_IsValid(val))) {
441             _internal_set_loaded_compat_version(static_cast<::android::os::statsd::conscrypt::LogListCompatibilityVersion>(val));
442           } else {
443             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(2, val, mutable_unknown_fields());
444           }
445         } else {
446           goto handle_unusual;
447         }
448         continue;
449       // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion min_compat_version = 3;
450       case 3:
451         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 24)) {
452           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
453           CHK_(ptr);
454           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListCompatibilityVersion_IsValid(val))) {
455             _internal_set_min_compat_version(static_cast<::android::os::statsd::conscrypt::LogListCompatibilityVersion>(val));
456           } else {
457             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(3, val, mutable_unknown_fields());
458           }
459         } else {
460           goto handle_unusual;
461         }
462         continue;
463       // optional int32 major_version = 4;
464       case 4:
465         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 32)) {
466           _Internal::set_has_major_version(&has_bits);
467           _impl_.major_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
468           CHK_(ptr);
469         } else {
470           goto handle_unusual;
471         }
472         continue;
473       // optional int32 minor_version = 5;
474       case 5:
475         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 40)) {
476           _Internal::set_has_minor_version(&has_bits);
477           _impl_.minor_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
478           CHK_(ptr);
479         } else {
480           goto handle_unusual;
481         }
482         continue;
483       default:
484         goto handle_unusual;
485     }  // switch
486   handle_unusual:
487     if ((tag == 0) || ((tag & 7) == 4)) {
488       CHK_(ptr);
489       ctx->SetLastTag(tag);
490       goto message_done;
491     }
492     ptr = UnknownFieldParse(
493         tag,
494         _internal_metadata_.mutable_unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(),
495         ptr, ctx);
496     CHK_(ptr != nullptr);
497   }  // while
498 message_done:
499   _impl_._has_bits_.Or(has_bits);
500   return ptr;
501 failure:
502   ptr = nullptr;
503   goto message_done;
504 #undef CHK_
505 }
506 
_InternalSerialize(::uint8_t * target,::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream * stream) const507 ::uint8_t* CertificateTransparencyLogListStateChanged::_InternalSerialize(
508     ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
509   // @@protoc_insertion_point(serialize_to_array_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
510   ::uint32_t cached_has_bits = 0;
511   (void) cached_has_bits;
512 
513   cached_has_bits = _impl_._has_bits_[0];
514   // optional .android.os.statsd.conscrypt.LogListStatus status = 1;
515   if (cached_has_bits & 0x00000001u) {
516     target = stream->EnsureSpace(target);
517     target = ::_pbi::WireFormatLite::WriteEnumToArray(
518       1, this->_internal_status(), target);
519   }
520 
521   // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion loaded_compat_version = 2;
522   if (cached_has_bits & 0x00000002u) {
523     target = stream->EnsureSpace(target);
524     target = ::_pbi::WireFormatLite::WriteEnumToArray(
525       2, this->_internal_loaded_compat_version(), target);
526   }
527 
528   // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion min_compat_version = 3;
529   if (cached_has_bits & 0x00000004u) {
530     target = stream->EnsureSpace(target);
531     target = ::_pbi::WireFormatLite::WriteEnumToArray(
532       3, this->_internal_min_compat_version(), target);
533   }
534 
535   // optional int32 major_version = 4;
536   if (cached_has_bits & 0x00000008u) {
537     target = stream->EnsureSpace(target);
538     target = ::_pbi::WireFormatLite::WriteInt32ToArray(4, this->_internal_major_version(), target);
539   }
540 
541   // optional int32 minor_version = 5;
542   if (cached_has_bits & 0x00000010u) {
543     target = stream->EnsureSpace(target);
544     target = ::_pbi::WireFormatLite::WriteInt32ToArray(5, this->_internal_minor_version(), target);
545   }
546 
547   if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
548     target = ::_pbi::WireFormat::InternalSerializeUnknownFieldsToArray(
549         _internal_metadata_.unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(::PROTOBUF_NAMESPACE_ID::UnknownFieldSet::default_instance), target, stream);
550   }
551   // @@protoc_insertion_point(serialize_to_array_end:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
552   return target;
553 }
554 
ByteSizeLong() const555 size_t CertificateTransparencyLogListStateChanged::ByteSizeLong() const {
556 // @@protoc_insertion_point(message_byte_size_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
557   size_t total_size = 0;
558 
559   ::uint32_t cached_has_bits = 0;
560   // Prevent compiler warnings about cached_has_bits being unused
561   (void) cached_has_bits;
562 
563   cached_has_bits = _impl_._has_bits_[0];
564   if (cached_has_bits & 0x0000001fu) {
565     // optional .android.os.statsd.conscrypt.LogListStatus status = 1;
566     if (cached_has_bits & 0x00000001u) {
567       total_size += 1 +
568         ::_pbi::WireFormatLite::EnumSize(this->_internal_status());
569     }
570 
571     // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion loaded_compat_version = 2;
572     if (cached_has_bits & 0x00000002u) {
573       total_size += 1 +
574         ::_pbi::WireFormatLite::EnumSize(this->_internal_loaded_compat_version());
575     }
576 
577     // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion min_compat_version = 3;
578     if (cached_has_bits & 0x00000004u) {
579       total_size += 1 +
580         ::_pbi::WireFormatLite::EnumSize(this->_internal_min_compat_version());
581     }
582 
583     // optional int32 major_version = 4;
584     if (cached_has_bits & 0x00000008u) {
585       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_major_version());
586     }
587 
588     // optional int32 minor_version = 5;
589     if (cached_has_bits & 0x00000010u) {
590       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_minor_version());
591     }
592 
593   }
594   return MaybeComputeUnknownFieldsSize(total_size, &_impl_._cached_size_);
595 }
596 
597 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData CertificateTransparencyLogListStateChanged::_class_data_ = {
598     ::PROTOBUF_NAMESPACE_ID::Message::CopyWithSourceCheck,
599     CertificateTransparencyLogListStateChanged::MergeImpl
600 };
GetClassData() const601 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData*CertificateTransparencyLogListStateChanged::GetClassData() const { return &_class_data_; }
602 
603 
MergeImpl(::PROTOBUF_NAMESPACE_ID::Message & to_msg,const::PROTOBUF_NAMESPACE_ID::Message & from_msg)604 void CertificateTransparencyLogListStateChanged::MergeImpl(::PROTOBUF_NAMESPACE_ID::Message& to_msg, const ::PROTOBUF_NAMESPACE_ID::Message& from_msg) {
605   auto* const _this = static_cast<CertificateTransparencyLogListStateChanged*>(&to_msg);
606   auto& from = static_cast<const CertificateTransparencyLogListStateChanged&>(from_msg);
607   // @@protoc_insertion_point(class_specific_merge_from_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
608   GOOGLE_DCHECK_NE(&from, _this);
609   ::uint32_t cached_has_bits = 0;
610   (void) cached_has_bits;
611 
612   cached_has_bits = from._impl_._has_bits_[0];
613   if (cached_has_bits & 0x0000001fu) {
614     if (cached_has_bits & 0x00000001u) {
615       _this->_impl_.status_ = from._impl_.status_;
616     }
617     if (cached_has_bits & 0x00000002u) {
618       _this->_impl_.loaded_compat_version_ = from._impl_.loaded_compat_version_;
619     }
620     if (cached_has_bits & 0x00000004u) {
621       _this->_impl_.min_compat_version_ = from._impl_.min_compat_version_;
622     }
623     if (cached_has_bits & 0x00000008u) {
624       _this->_impl_.major_version_ = from._impl_.major_version_;
625     }
626     if (cached_has_bits & 0x00000010u) {
627       _this->_impl_.minor_version_ = from._impl_.minor_version_;
628     }
629     _this->_impl_._has_bits_[0] |= cached_has_bits;
630   }
631   _this->_internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
632 }
633 
CopyFrom(const CertificateTransparencyLogListStateChanged & from)634 void CertificateTransparencyLogListStateChanged::CopyFrom(const CertificateTransparencyLogListStateChanged& from) {
635 // @@protoc_insertion_point(class_specific_copy_from_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
636   if (&from == this) return;
637   Clear();
638   MergeFrom(from);
639 }
640 
IsInitialized() const641 bool CertificateTransparencyLogListStateChanged::IsInitialized() const {
642   return true;
643 }
644 
InternalSwap(CertificateTransparencyLogListStateChanged * other)645 void CertificateTransparencyLogListStateChanged::InternalSwap(CertificateTransparencyLogListStateChanged* other) {
646   using std::swap;
647   _internal_metadata_.InternalSwap(&other->_internal_metadata_);
648   swap(_impl_._has_bits_[0], other->_impl_._has_bits_[0]);
649   ::PROTOBUF_NAMESPACE_ID::internal::memswap<
650       PROTOBUF_FIELD_OFFSET(CertificateTransparencyLogListStateChanged, _impl_.minor_version_)
651       + sizeof(CertificateTransparencyLogListStateChanged::_impl_.minor_version_)  // NOLINT
652       - PROTOBUF_FIELD_OFFSET(CertificateTransparencyLogListStateChanged, _impl_.status_)>(
653           reinterpret_cast<char*>(&_impl_.status_),
654           reinterpret_cast<char*>(&other->_impl_.status_));
655 }
656 
GetMetadata() const657 ::PROTOBUF_NAMESPACE_ID::Metadata CertificateTransparencyLogListStateChanged::GetMetadata() const {
658   return ::_pbi::AssignDescriptors(
659       &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter, &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once,
660       file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[0]);
661 }
662 
663 // ===================================================================
664 
665 class CertificateTransparencyVerificationReported::_Internal {
666  public:
667   using HasBits = decltype(std::declval<CertificateTransparencyVerificationReported>()._impl_._has_bits_);
set_has_result(HasBits * has_bits)668   static void set_has_result(HasBits* has_bits) {
669     (*has_bits)[0] |= 1u;
670   }
set_has_reason(HasBits * has_bits)671   static void set_has_reason(HasBits* has_bits) {
672     (*has_bits)[0] |= 2u;
673   }
set_has_policy_compatibility_version(HasBits * has_bits)674   static void set_has_policy_compatibility_version(HasBits* has_bits) {
675     (*has_bits)[0] |= 4u;
676   }
set_has_major_version(HasBits * has_bits)677   static void set_has_major_version(HasBits* has_bits) {
678     (*has_bits)[0] |= 8u;
679   }
set_has_minor_version(HasBits * has_bits)680   static void set_has_minor_version(HasBits* has_bits) {
681     (*has_bits)[0] |= 16u;
682   }
set_has_num_cert_scts(HasBits * has_bits)683   static void set_has_num_cert_scts(HasBits* has_bits) {
684     (*has_bits)[0] |= 32u;
685   }
set_has_num_ocsp_scts(HasBits * has_bits)686   static void set_has_num_ocsp_scts(HasBits* has_bits) {
687     (*has_bits)[0] |= 64u;
688   }
set_has_num_tls_scts(HasBits * has_bits)689   static void set_has_num_tls_scts(HasBits* has_bits) {
690     (*has_bits)[0] |= 128u;
691   }
692 };
693 
CertificateTransparencyVerificationReported(::PROTOBUF_NAMESPACE_ID::Arena * arena,bool is_message_owned)694 CertificateTransparencyVerificationReported::CertificateTransparencyVerificationReported(::PROTOBUF_NAMESPACE_ID::Arena* arena,
695                          bool is_message_owned)
696   : ::PROTOBUF_NAMESPACE_ID::Message(arena, is_message_owned) {
697   SharedCtor(arena, is_message_owned);
698   // @@protoc_insertion_point(arena_constructor:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
699 }
CertificateTransparencyVerificationReported(const CertificateTransparencyVerificationReported & from)700 CertificateTransparencyVerificationReported::CertificateTransparencyVerificationReported(const CertificateTransparencyVerificationReported& from)
701   : ::PROTOBUF_NAMESPACE_ID::Message() {
702   CertificateTransparencyVerificationReported* const _this = this; (void)_this;
703   new (&_impl_) Impl_{
704       decltype(_impl_._has_bits_){from._impl_._has_bits_}
705     , /*decltype(_impl_._cached_size_)*/{}
706     , decltype(_impl_.result_){}
707     , decltype(_impl_.reason_){}
708     , decltype(_impl_.policy_compatibility_version_){}
709     , decltype(_impl_.major_version_){}
710     , decltype(_impl_.minor_version_){}
711     , decltype(_impl_.num_cert_scts_){}
712     , decltype(_impl_.num_ocsp_scts_){}
713     , decltype(_impl_.num_tls_scts_){}};
714 
715   _internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
716   ::memcpy(&_impl_.result_, &from._impl_.result_,
717     static_cast<size_t>(reinterpret_cast<char*>(&_impl_.num_tls_scts_) -
718     reinterpret_cast<char*>(&_impl_.result_)) + sizeof(_impl_.num_tls_scts_));
719   // @@protoc_insertion_point(copy_constructor:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
720 }
721 
SharedCtor(::_pb::Arena * arena,bool is_message_owned)722 inline void CertificateTransparencyVerificationReported::SharedCtor(
723     ::_pb::Arena* arena, bool is_message_owned) {
724   (void)arena;
725   (void)is_message_owned;
726   new (&_impl_) Impl_{
727       decltype(_impl_._has_bits_){}
728     , /*decltype(_impl_._cached_size_)*/{}
729     , decltype(_impl_.result_){0}
730     , decltype(_impl_.reason_){0}
731     , decltype(_impl_.policy_compatibility_version_){0}
732     , decltype(_impl_.major_version_){0}
733     , decltype(_impl_.minor_version_){0}
734     , decltype(_impl_.num_cert_scts_){0}
735     , decltype(_impl_.num_ocsp_scts_){0}
736     , decltype(_impl_.num_tls_scts_){0}
737   };
738 }
739 
~CertificateTransparencyVerificationReported()740 CertificateTransparencyVerificationReported::~CertificateTransparencyVerificationReported() {
741   // @@protoc_insertion_point(destructor:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
742   if (auto *arena = _internal_metadata_.DeleteReturnArena<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>()) {
743   (void)arena;
744     return;
745   }
746   SharedDtor();
747 }
748 
SharedDtor()749 inline void CertificateTransparencyVerificationReported::SharedDtor() {
750   GOOGLE_DCHECK(GetArenaForAllocation() == nullptr);
751 }
752 
SetCachedSize(int size) const753 void CertificateTransparencyVerificationReported::SetCachedSize(int size) const {
754   _impl_._cached_size_.Set(size);
755 }
756 
Clear()757 void CertificateTransparencyVerificationReported::Clear() {
758 // @@protoc_insertion_point(message_clear_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
759   ::uint32_t cached_has_bits = 0;
760   // Prevent compiler warnings about cached_has_bits being unused
761   (void) cached_has_bits;
762 
763   cached_has_bits = _impl_._has_bits_[0];
764   if (cached_has_bits & 0x000000ffu) {
765     ::memset(&_impl_.result_, 0, static_cast<size_t>(
766         reinterpret_cast<char*>(&_impl_.num_tls_scts_) -
767         reinterpret_cast<char*>(&_impl_.result_)) + sizeof(_impl_.num_tls_scts_));
768   }
769   _impl_._has_bits_.Clear();
770   _internal_metadata_.Clear<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>();
771 }
772 
_InternalParse(const char * ptr,::_pbi::ParseContext * ctx)773 const char* CertificateTransparencyVerificationReported::_InternalParse(const char* ptr, ::_pbi::ParseContext* ctx) {
774 #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
775   _Internal::HasBits has_bits{};
776   while (!ctx->Done(&ptr)) {
777     ::uint32_t tag;
778     ptr = ::_pbi::ReadTag(ptr, &tag);
779     switch (tag >> 3) {
780       // optional .android.os.statsd.conscrypt.VerificationResult result = 1;
781       case 1:
782         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 8)) {
783           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
784           CHK_(ptr);
785           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::VerificationResult_IsValid(val))) {
786             _internal_set_result(static_cast<::android::os::statsd::conscrypt::VerificationResult>(val));
787           } else {
788             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(1, val, mutable_unknown_fields());
789           }
790         } else {
791           goto handle_unusual;
792         }
793         continue;
794       // optional .android.os.statsd.conscrypt.VerificationReason reason = 2;
795       case 2:
796         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 16)) {
797           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
798           CHK_(ptr);
799           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::VerificationReason_IsValid(val))) {
800             _internal_set_reason(static_cast<::android::os::statsd::conscrypt::VerificationReason>(val));
801           } else {
802             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(2, val, mutable_unknown_fields());
803           }
804         } else {
805           goto handle_unusual;
806         }
807         continue;
808       // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion policy_compatibility_version = 3;
809       case 3:
810         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 24)) {
811           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
812           CHK_(ptr);
813           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListCompatibilityVersion_IsValid(val))) {
814             _internal_set_policy_compatibility_version(static_cast<::android::os::statsd::conscrypt::LogListCompatibilityVersion>(val));
815           } else {
816             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(3, val, mutable_unknown_fields());
817           }
818         } else {
819           goto handle_unusual;
820         }
821         continue;
822       // optional int32 major_version = 4;
823       case 4:
824         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 32)) {
825           _Internal::set_has_major_version(&has_bits);
826           _impl_.major_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
827           CHK_(ptr);
828         } else {
829           goto handle_unusual;
830         }
831         continue;
832       // optional int32 minor_version = 5;
833       case 5:
834         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 40)) {
835           _Internal::set_has_minor_version(&has_bits);
836           _impl_.minor_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
837           CHK_(ptr);
838         } else {
839           goto handle_unusual;
840         }
841         continue;
842       // optional int32 num_cert_scts = 6;
843       case 6:
844         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 48)) {
845           _Internal::set_has_num_cert_scts(&has_bits);
846           _impl_.num_cert_scts_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
847           CHK_(ptr);
848         } else {
849           goto handle_unusual;
850         }
851         continue;
852       // optional int32 num_ocsp_scts = 7;
853       case 7:
854         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 56)) {
855           _Internal::set_has_num_ocsp_scts(&has_bits);
856           _impl_.num_ocsp_scts_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
857           CHK_(ptr);
858         } else {
859           goto handle_unusual;
860         }
861         continue;
862       // optional int32 num_tls_scts = 8;
863       case 8:
864         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 64)) {
865           _Internal::set_has_num_tls_scts(&has_bits);
866           _impl_.num_tls_scts_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
867           CHK_(ptr);
868         } else {
869           goto handle_unusual;
870         }
871         continue;
872       default:
873         goto handle_unusual;
874     }  // switch
875   handle_unusual:
876     if ((tag == 0) || ((tag & 7) == 4)) {
877       CHK_(ptr);
878       ctx->SetLastTag(tag);
879       goto message_done;
880     }
881     ptr = UnknownFieldParse(
882         tag,
883         _internal_metadata_.mutable_unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(),
884         ptr, ctx);
885     CHK_(ptr != nullptr);
886   }  // while
887 message_done:
888   _impl_._has_bits_.Or(has_bits);
889   return ptr;
890 failure:
891   ptr = nullptr;
892   goto message_done;
893 #undef CHK_
894 }
895 
_InternalSerialize(::uint8_t * target,::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream * stream) const896 ::uint8_t* CertificateTransparencyVerificationReported::_InternalSerialize(
897     ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
898   // @@protoc_insertion_point(serialize_to_array_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
899   ::uint32_t cached_has_bits = 0;
900   (void) cached_has_bits;
901 
902   cached_has_bits = _impl_._has_bits_[0];
903   // optional .android.os.statsd.conscrypt.VerificationResult result = 1;
904   if (cached_has_bits & 0x00000001u) {
905     target = stream->EnsureSpace(target);
906     target = ::_pbi::WireFormatLite::WriteEnumToArray(
907       1, this->_internal_result(), target);
908   }
909 
910   // optional .android.os.statsd.conscrypt.VerificationReason reason = 2;
911   if (cached_has_bits & 0x00000002u) {
912     target = stream->EnsureSpace(target);
913     target = ::_pbi::WireFormatLite::WriteEnumToArray(
914       2, this->_internal_reason(), target);
915   }
916 
917   // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion policy_compatibility_version = 3;
918   if (cached_has_bits & 0x00000004u) {
919     target = stream->EnsureSpace(target);
920     target = ::_pbi::WireFormatLite::WriteEnumToArray(
921       3, this->_internal_policy_compatibility_version(), target);
922   }
923 
924   // optional int32 major_version = 4;
925   if (cached_has_bits & 0x00000008u) {
926     target = stream->EnsureSpace(target);
927     target = ::_pbi::WireFormatLite::WriteInt32ToArray(4, this->_internal_major_version(), target);
928   }
929 
930   // optional int32 minor_version = 5;
931   if (cached_has_bits & 0x00000010u) {
932     target = stream->EnsureSpace(target);
933     target = ::_pbi::WireFormatLite::WriteInt32ToArray(5, this->_internal_minor_version(), target);
934   }
935 
936   // optional int32 num_cert_scts = 6;
937   if (cached_has_bits & 0x00000020u) {
938     target = stream->EnsureSpace(target);
939     target = ::_pbi::WireFormatLite::WriteInt32ToArray(6, this->_internal_num_cert_scts(), target);
940   }
941 
942   // optional int32 num_ocsp_scts = 7;
943   if (cached_has_bits & 0x00000040u) {
944     target = stream->EnsureSpace(target);
945     target = ::_pbi::WireFormatLite::WriteInt32ToArray(7, this->_internal_num_ocsp_scts(), target);
946   }
947 
948   // optional int32 num_tls_scts = 8;
949   if (cached_has_bits & 0x00000080u) {
950     target = stream->EnsureSpace(target);
951     target = ::_pbi::WireFormatLite::WriteInt32ToArray(8, this->_internal_num_tls_scts(), target);
952   }
953 
954   if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
955     target = ::_pbi::WireFormat::InternalSerializeUnknownFieldsToArray(
956         _internal_metadata_.unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(::PROTOBUF_NAMESPACE_ID::UnknownFieldSet::default_instance), target, stream);
957   }
958   // @@protoc_insertion_point(serialize_to_array_end:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
959   return target;
960 }
961 
ByteSizeLong() const962 size_t CertificateTransparencyVerificationReported::ByteSizeLong() const {
963 // @@protoc_insertion_point(message_byte_size_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
964   size_t total_size = 0;
965 
966   ::uint32_t cached_has_bits = 0;
967   // Prevent compiler warnings about cached_has_bits being unused
968   (void) cached_has_bits;
969 
970   cached_has_bits = _impl_._has_bits_[0];
971   if (cached_has_bits & 0x000000ffu) {
972     // optional .android.os.statsd.conscrypt.VerificationResult result = 1;
973     if (cached_has_bits & 0x00000001u) {
974       total_size += 1 +
975         ::_pbi::WireFormatLite::EnumSize(this->_internal_result());
976     }
977 
978     // optional .android.os.statsd.conscrypt.VerificationReason reason = 2;
979     if (cached_has_bits & 0x00000002u) {
980       total_size += 1 +
981         ::_pbi::WireFormatLite::EnumSize(this->_internal_reason());
982     }
983 
984     // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion policy_compatibility_version = 3;
985     if (cached_has_bits & 0x00000004u) {
986       total_size += 1 +
987         ::_pbi::WireFormatLite::EnumSize(this->_internal_policy_compatibility_version());
988     }
989 
990     // optional int32 major_version = 4;
991     if (cached_has_bits & 0x00000008u) {
992       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_major_version());
993     }
994 
995     // optional int32 minor_version = 5;
996     if (cached_has_bits & 0x00000010u) {
997       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_minor_version());
998     }
999 
1000     // optional int32 num_cert_scts = 6;
1001     if (cached_has_bits & 0x00000020u) {
1002       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_num_cert_scts());
1003     }
1004 
1005     // optional int32 num_ocsp_scts = 7;
1006     if (cached_has_bits & 0x00000040u) {
1007       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_num_ocsp_scts());
1008     }
1009 
1010     // optional int32 num_tls_scts = 8;
1011     if (cached_has_bits & 0x00000080u) {
1012       total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_num_tls_scts());
1013     }
1014 
1015   }
1016   return MaybeComputeUnknownFieldsSize(total_size, &_impl_._cached_size_);
1017 }
1018 
1019 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData CertificateTransparencyVerificationReported::_class_data_ = {
1020     ::PROTOBUF_NAMESPACE_ID::Message::CopyWithSourceCheck,
1021     CertificateTransparencyVerificationReported::MergeImpl
1022 };
GetClassData() const1023 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData*CertificateTransparencyVerificationReported::GetClassData() const { return &_class_data_; }
1024 
1025 
MergeImpl(::PROTOBUF_NAMESPACE_ID::Message & to_msg,const::PROTOBUF_NAMESPACE_ID::Message & from_msg)1026 void CertificateTransparencyVerificationReported::MergeImpl(::PROTOBUF_NAMESPACE_ID::Message& to_msg, const ::PROTOBUF_NAMESPACE_ID::Message& from_msg) {
1027   auto* const _this = static_cast<CertificateTransparencyVerificationReported*>(&to_msg);
1028   auto& from = static_cast<const CertificateTransparencyVerificationReported&>(from_msg);
1029   // @@protoc_insertion_point(class_specific_merge_from_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
1030   GOOGLE_DCHECK_NE(&from, _this);
1031   ::uint32_t cached_has_bits = 0;
1032   (void) cached_has_bits;
1033 
1034   cached_has_bits = from._impl_._has_bits_[0];
1035   if (cached_has_bits & 0x000000ffu) {
1036     if (cached_has_bits & 0x00000001u) {
1037       _this->_impl_.result_ = from._impl_.result_;
1038     }
1039     if (cached_has_bits & 0x00000002u) {
1040       _this->_impl_.reason_ = from._impl_.reason_;
1041     }
1042     if (cached_has_bits & 0x00000004u) {
1043       _this->_impl_.policy_compatibility_version_ = from._impl_.policy_compatibility_version_;
1044     }
1045     if (cached_has_bits & 0x00000008u) {
1046       _this->_impl_.major_version_ = from._impl_.major_version_;
1047     }
1048     if (cached_has_bits & 0x00000010u) {
1049       _this->_impl_.minor_version_ = from._impl_.minor_version_;
1050     }
1051     if (cached_has_bits & 0x00000020u) {
1052       _this->_impl_.num_cert_scts_ = from._impl_.num_cert_scts_;
1053     }
1054     if (cached_has_bits & 0x00000040u) {
1055       _this->_impl_.num_ocsp_scts_ = from._impl_.num_ocsp_scts_;
1056     }
1057     if (cached_has_bits & 0x00000080u) {
1058       _this->_impl_.num_tls_scts_ = from._impl_.num_tls_scts_;
1059     }
1060     _this->_impl_._has_bits_[0] |= cached_has_bits;
1061   }
1062   _this->_internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
1063 }
1064 
CopyFrom(const CertificateTransparencyVerificationReported & from)1065 void CertificateTransparencyVerificationReported::CopyFrom(const CertificateTransparencyVerificationReported& from) {
1066 // @@protoc_insertion_point(class_specific_copy_from_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
1067   if (&from == this) return;
1068   Clear();
1069   MergeFrom(from);
1070 }
1071 
IsInitialized() const1072 bool CertificateTransparencyVerificationReported::IsInitialized() const {
1073   return true;
1074 }
1075 
InternalSwap(CertificateTransparencyVerificationReported * other)1076 void CertificateTransparencyVerificationReported::InternalSwap(CertificateTransparencyVerificationReported* other) {
1077   using std::swap;
1078   _internal_metadata_.InternalSwap(&other->_internal_metadata_);
1079   swap(_impl_._has_bits_[0], other->_impl_._has_bits_[0]);
1080   ::PROTOBUF_NAMESPACE_ID::internal::memswap<
1081       PROTOBUF_FIELD_OFFSET(CertificateTransparencyVerificationReported, _impl_.num_tls_scts_)
1082       + sizeof(CertificateTransparencyVerificationReported::_impl_.num_tls_scts_)  // NOLINT
1083       - PROTOBUF_FIELD_OFFSET(CertificateTransparencyVerificationReported, _impl_.result_)>(
1084           reinterpret_cast<char*>(&_impl_.result_),
1085           reinterpret_cast<char*>(&other->_impl_.result_));
1086 }
1087 
GetMetadata() const1088 ::PROTOBUF_NAMESPACE_ID::Metadata CertificateTransparencyVerificationReported::GetMetadata() const {
1089   return ::_pbi::AssignDescriptors(
1090       &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter, &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once,
1091       file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[1]);
1092 }
1093 
1094 // ===================================================================
1095 
1096 class ConscryptServiceUsed::_Internal {
1097  public:
1098   using HasBits = decltype(std::declval<ConscryptServiceUsed>()._impl_._has_bits_);
set_has_algorithm(HasBits * has_bits)1099   static void set_has_algorithm(HasBits* has_bits) {
1100     (*has_bits)[0] |= 1u;
1101   }
set_has_cipher(HasBits * has_bits)1102   static void set_has_cipher(HasBits* has_bits) {
1103     (*has_bits)[0] |= 2u;
1104   }
set_has_mode(HasBits * has_bits)1105   static void set_has_mode(HasBits* has_bits) {
1106     (*has_bits)[0] |= 4u;
1107   }
set_has_padding(HasBits * has_bits)1108   static void set_has_padding(HasBits* has_bits) {
1109     (*has_bits)[0] |= 8u;
1110   }
1111 };
1112 
ConscryptServiceUsed(::PROTOBUF_NAMESPACE_ID::Arena * arena,bool is_message_owned)1113 ConscryptServiceUsed::ConscryptServiceUsed(::PROTOBUF_NAMESPACE_ID::Arena* arena,
1114                          bool is_message_owned)
1115   : ::PROTOBUF_NAMESPACE_ID::Message(arena, is_message_owned) {
1116   SharedCtor(arena, is_message_owned);
1117   // @@protoc_insertion_point(arena_constructor:android.os.statsd.conscrypt.ConscryptServiceUsed)
1118 }
ConscryptServiceUsed(const ConscryptServiceUsed & from)1119 ConscryptServiceUsed::ConscryptServiceUsed(const ConscryptServiceUsed& from)
1120   : ::PROTOBUF_NAMESPACE_ID::Message() {
1121   ConscryptServiceUsed* const _this = this; (void)_this;
1122   new (&_impl_) Impl_{
1123       decltype(_impl_._has_bits_){from._impl_._has_bits_}
1124     , /*decltype(_impl_._cached_size_)*/{}
1125     , decltype(_impl_.algorithm_){}
1126     , decltype(_impl_.cipher_){}
1127     , decltype(_impl_.mode_){}
1128     , decltype(_impl_.padding_){}};
1129 
1130   _internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
1131   ::memcpy(&_impl_.algorithm_, &from._impl_.algorithm_,
1132     static_cast<size_t>(reinterpret_cast<char*>(&_impl_.padding_) -
1133     reinterpret_cast<char*>(&_impl_.algorithm_)) + sizeof(_impl_.padding_));
1134   // @@protoc_insertion_point(copy_constructor:android.os.statsd.conscrypt.ConscryptServiceUsed)
1135 }
1136 
SharedCtor(::_pb::Arena * arena,bool is_message_owned)1137 inline void ConscryptServiceUsed::SharedCtor(
1138     ::_pb::Arena* arena, bool is_message_owned) {
1139   (void)arena;
1140   (void)is_message_owned;
1141   new (&_impl_) Impl_{
1142       decltype(_impl_._has_bits_){}
1143     , /*decltype(_impl_._cached_size_)*/{}
1144     , decltype(_impl_.algorithm_){0}
1145     , decltype(_impl_.cipher_){0}
1146     , decltype(_impl_.mode_){0}
1147     , decltype(_impl_.padding_){0}
1148   };
1149 }
1150 
~ConscryptServiceUsed()1151 ConscryptServiceUsed::~ConscryptServiceUsed() {
1152   // @@protoc_insertion_point(destructor:android.os.statsd.conscrypt.ConscryptServiceUsed)
1153   if (auto *arena = _internal_metadata_.DeleteReturnArena<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>()) {
1154   (void)arena;
1155     return;
1156   }
1157   SharedDtor();
1158 }
1159 
SharedDtor()1160 inline void ConscryptServiceUsed::SharedDtor() {
1161   GOOGLE_DCHECK(GetArenaForAllocation() == nullptr);
1162 }
1163 
SetCachedSize(int size) const1164 void ConscryptServiceUsed::SetCachedSize(int size) const {
1165   _impl_._cached_size_.Set(size);
1166 }
1167 
Clear()1168 void ConscryptServiceUsed::Clear() {
1169 // @@protoc_insertion_point(message_clear_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1170   ::uint32_t cached_has_bits = 0;
1171   // Prevent compiler warnings about cached_has_bits being unused
1172   (void) cached_has_bits;
1173 
1174   cached_has_bits = _impl_._has_bits_[0];
1175   if (cached_has_bits & 0x0000000fu) {
1176     ::memset(&_impl_.algorithm_, 0, static_cast<size_t>(
1177         reinterpret_cast<char*>(&_impl_.padding_) -
1178         reinterpret_cast<char*>(&_impl_.algorithm_)) + sizeof(_impl_.padding_));
1179   }
1180   _impl_._has_bits_.Clear();
1181   _internal_metadata_.Clear<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>();
1182 }
1183 
_InternalParse(const char * ptr,::_pbi::ParseContext * ctx)1184 const char* ConscryptServiceUsed::_InternalParse(const char* ptr, ::_pbi::ParseContext* ctx) {
1185 #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
1186   _Internal::HasBits has_bits{};
1187   while (!ctx->Done(&ptr)) {
1188     ::uint32_t tag;
1189     ptr = ::_pbi::ReadTag(ptr, &tag);
1190     switch (tag >> 3) {
1191       // optional .android.os.statsd.conscrypt.Algorithm algorithm = 1;
1192       case 1:
1193         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 8)) {
1194           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1195           CHK_(ptr);
1196           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Algorithm_IsValid(val))) {
1197             _internal_set_algorithm(static_cast<::android::os::statsd::conscrypt::Algorithm>(val));
1198           } else {
1199             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(1, val, mutable_unknown_fields());
1200           }
1201         } else {
1202           goto handle_unusual;
1203         }
1204         continue;
1205       // optional .android.os.statsd.conscrypt.Cipher cipher = 2;
1206       case 2:
1207         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 16)) {
1208           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1209           CHK_(ptr);
1210           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Cipher_IsValid(val))) {
1211             _internal_set_cipher(static_cast<::android::os::statsd::conscrypt::Cipher>(val));
1212           } else {
1213             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(2, val, mutable_unknown_fields());
1214           }
1215         } else {
1216           goto handle_unusual;
1217         }
1218         continue;
1219       // optional .android.os.statsd.conscrypt.Mode mode = 3;
1220       case 3:
1221         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 24)) {
1222           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1223           CHK_(ptr);
1224           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Mode_IsValid(val))) {
1225             _internal_set_mode(static_cast<::android::os::statsd::conscrypt::Mode>(val));
1226           } else {
1227             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(3, val, mutable_unknown_fields());
1228           }
1229         } else {
1230           goto handle_unusual;
1231         }
1232         continue;
1233       // optional .android.os.statsd.conscrypt.Padding padding = 4;
1234       case 4:
1235         if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 32)) {
1236           ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1237           CHK_(ptr);
1238           if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Padding_IsValid(val))) {
1239             _internal_set_padding(static_cast<::android::os::statsd::conscrypt::Padding>(val));
1240           } else {
1241             ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(4, val, mutable_unknown_fields());
1242           }
1243         } else {
1244           goto handle_unusual;
1245         }
1246         continue;
1247       default:
1248         goto handle_unusual;
1249     }  // switch
1250   handle_unusual:
1251     if ((tag == 0) || ((tag & 7) == 4)) {
1252       CHK_(ptr);
1253       ctx->SetLastTag(tag);
1254       goto message_done;
1255     }
1256     ptr = UnknownFieldParse(
1257         tag,
1258         _internal_metadata_.mutable_unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(),
1259         ptr, ctx);
1260     CHK_(ptr != nullptr);
1261   }  // while
1262 message_done:
1263   _impl_._has_bits_.Or(has_bits);
1264   return ptr;
1265 failure:
1266   ptr = nullptr;
1267   goto message_done;
1268 #undef CHK_
1269 }
1270 
_InternalSerialize(::uint8_t * target,::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream * stream) const1271 ::uint8_t* ConscryptServiceUsed::_InternalSerialize(
1272     ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
1273   // @@protoc_insertion_point(serialize_to_array_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1274   ::uint32_t cached_has_bits = 0;
1275   (void) cached_has_bits;
1276 
1277   cached_has_bits = _impl_._has_bits_[0];
1278   // optional .android.os.statsd.conscrypt.Algorithm algorithm = 1;
1279   if (cached_has_bits & 0x00000001u) {
1280     target = stream->EnsureSpace(target);
1281     target = ::_pbi::WireFormatLite::WriteEnumToArray(
1282       1, this->_internal_algorithm(), target);
1283   }
1284 
1285   // optional .android.os.statsd.conscrypt.Cipher cipher = 2;
1286   if (cached_has_bits & 0x00000002u) {
1287     target = stream->EnsureSpace(target);
1288     target = ::_pbi::WireFormatLite::WriteEnumToArray(
1289       2, this->_internal_cipher(), target);
1290   }
1291 
1292   // optional .android.os.statsd.conscrypt.Mode mode = 3;
1293   if (cached_has_bits & 0x00000004u) {
1294     target = stream->EnsureSpace(target);
1295     target = ::_pbi::WireFormatLite::WriteEnumToArray(
1296       3, this->_internal_mode(), target);
1297   }
1298 
1299   // optional .android.os.statsd.conscrypt.Padding padding = 4;
1300   if (cached_has_bits & 0x00000008u) {
1301     target = stream->EnsureSpace(target);
1302     target = ::_pbi::WireFormatLite::WriteEnumToArray(
1303       4, this->_internal_padding(), target);
1304   }
1305 
1306   if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
1307     target = ::_pbi::WireFormat::InternalSerializeUnknownFieldsToArray(
1308         _internal_metadata_.unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(::PROTOBUF_NAMESPACE_ID::UnknownFieldSet::default_instance), target, stream);
1309   }
1310   // @@protoc_insertion_point(serialize_to_array_end:android.os.statsd.conscrypt.ConscryptServiceUsed)
1311   return target;
1312 }
1313 
ByteSizeLong() const1314 size_t ConscryptServiceUsed::ByteSizeLong() const {
1315 // @@protoc_insertion_point(message_byte_size_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1316   size_t total_size = 0;
1317 
1318   ::uint32_t cached_has_bits = 0;
1319   // Prevent compiler warnings about cached_has_bits being unused
1320   (void) cached_has_bits;
1321 
1322   cached_has_bits = _impl_._has_bits_[0];
1323   if (cached_has_bits & 0x0000000fu) {
1324     // optional .android.os.statsd.conscrypt.Algorithm algorithm = 1;
1325     if (cached_has_bits & 0x00000001u) {
1326       total_size += 1 +
1327         ::_pbi::WireFormatLite::EnumSize(this->_internal_algorithm());
1328     }
1329 
1330     // optional .android.os.statsd.conscrypt.Cipher cipher = 2;
1331     if (cached_has_bits & 0x00000002u) {
1332       total_size += 1 +
1333         ::_pbi::WireFormatLite::EnumSize(this->_internal_cipher());
1334     }
1335 
1336     // optional .android.os.statsd.conscrypt.Mode mode = 3;
1337     if (cached_has_bits & 0x00000004u) {
1338       total_size += 1 +
1339         ::_pbi::WireFormatLite::EnumSize(this->_internal_mode());
1340     }
1341 
1342     // optional .android.os.statsd.conscrypt.Padding padding = 4;
1343     if (cached_has_bits & 0x00000008u) {
1344       total_size += 1 +
1345         ::_pbi::WireFormatLite::EnumSize(this->_internal_padding());
1346     }
1347 
1348   }
1349   return MaybeComputeUnknownFieldsSize(total_size, &_impl_._cached_size_);
1350 }
1351 
1352 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData ConscryptServiceUsed::_class_data_ = {
1353     ::PROTOBUF_NAMESPACE_ID::Message::CopyWithSourceCheck,
1354     ConscryptServiceUsed::MergeImpl
1355 };
GetClassData() const1356 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData*ConscryptServiceUsed::GetClassData() const { return &_class_data_; }
1357 
1358 
MergeImpl(::PROTOBUF_NAMESPACE_ID::Message & to_msg,const::PROTOBUF_NAMESPACE_ID::Message & from_msg)1359 void ConscryptServiceUsed::MergeImpl(::PROTOBUF_NAMESPACE_ID::Message& to_msg, const ::PROTOBUF_NAMESPACE_ID::Message& from_msg) {
1360   auto* const _this = static_cast<ConscryptServiceUsed*>(&to_msg);
1361   auto& from = static_cast<const ConscryptServiceUsed&>(from_msg);
1362   // @@protoc_insertion_point(class_specific_merge_from_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1363   GOOGLE_DCHECK_NE(&from, _this);
1364   ::uint32_t cached_has_bits = 0;
1365   (void) cached_has_bits;
1366 
1367   cached_has_bits = from._impl_._has_bits_[0];
1368   if (cached_has_bits & 0x0000000fu) {
1369     if (cached_has_bits & 0x00000001u) {
1370       _this->_impl_.algorithm_ = from._impl_.algorithm_;
1371     }
1372     if (cached_has_bits & 0x00000002u) {
1373       _this->_impl_.cipher_ = from._impl_.cipher_;
1374     }
1375     if (cached_has_bits & 0x00000004u) {
1376       _this->_impl_.mode_ = from._impl_.mode_;
1377     }
1378     if (cached_has_bits & 0x00000008u) {
1379       _this->_impl_.padding_ = from._impl_.padding_;
1380     }
1381     _this->_impl_._has_bits_[0] |= cached_has_bits;
1382   }
1383   _this->_internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
1384 }
1385 
CopyFrom(const ConscryptServiceUsed & from)1386 void ConscryptServiceUsed::CopyFrom(const ConscryptServiceUsed& from) {
1387 // @@protoc_insertion_point(class_specific_copy_from_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1388   if (&from == this) return;
1389   Clear();
1390   MergeFrom(from);
1391 }
1392 
IsInitialized() const1393 bool ConscryptServiceUsed::IsInitialized() const {
1394   return true;
1395 }
1396 
InternalSwap(ConscryptServiceUsed * other)1397 void ConscryptServiceUsed::InternalSwap(ConscryptServiceUsed* other) {
1398   using std::swap;
1399   _internal_metadata_.InternalSwap(&other->_internal_metadata_);
1400   swap(_impl_._has_bits_[0], other->_impl_._has_bits_[0]);
1401   ::PROTOBUF_NAMESPACE_ID::internal::memswap<
1402       PROTOBUF_FIELD_OFFSET(ConscryptServiceUsed, _impl_.padding_)
1403       + sizeof(ConscryptServiceUsed::_impl_.padding_)  // NOLINT
1404       - PROTOBUF_FIELD_OFFSET(ConscryptServiceUsed, _impl_.algorithm_)>(
1405           reinterpret_cast<char*>(&_impl_.algorithm_),
1406           reinterpret_cast<char*>(&other->_impl_.algorithm_));
1407 }
1408 
GetMetadata() const1409 ::PROTOBUF_NAMESPACE_ID::Metadata ConscryptServiceUsed::GetMetadata() const {
1410   return ::_pbi::AssignDescriptors(
1411       &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter, &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once,
1412       file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[2]);
1413 }
1414 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 ::PROTOBUF_NAMESPACE_ID::internal::ExtensionIdentifier< ::android::os::statsd::Atom,
1415     ::PROTOBUF_NAMESPACE_ID::internal::MessageTypeTraits< ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged >, 11, false>
1416   certificate_transparency_log_list_state_changed(kCertificateTransparencyLogListStateChangedFieldNumber, ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged::default_instance(), nullptr);
1417 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 ::PROTOBUF_NAMESPACE_ID::internal::ExtensionIdentifier< ::android::os::statsd::Atom,
1418     ::PROTOBUF_NAMESPACE_ID::internal::MessageTypeTraits< ::android::os::statsd::conscrypt::ConscryptServiceUsed >, 11, false>
1419   conscrypt_service_used(kConscryptServiceUsedFieldNumber, ::android::os::statsd::conscrypt::ConscryptServiceUsed::default_instance(), nullptr);
1420 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 ::PROTOBUF_NAMESPACE_ID::internal::ExtensionIdentifier< ::android::os::statsd::Atom,
1421     ::PROTOBUF_NAMESPACE_ID::internal::MessageTypeTraits< ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported >, 11, false>
1422   certificate_transparency_verification_reported(kCertificateTransparencyVerificationReportedFieldNumber, ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported::default_instance(), nullptr);
1423 
1424 // @@protoc_insertion_point(namespace_scope)
1425 }  // namespace conscrypt
1426 }  // namespace statsd
1427 }  // namespace os
1428 }  // namespace android
1429 PROTOBUF_NAMESPACE_OPEN
1430 template<> PROTOBUF_NOINLINE ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged*
CreateMaybeMessage(Arena * arena)1431 Arena::CreateMaybeMessage< ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged >(Arena* arena) {
1432   return Arena::CreateMessageInternal< ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged >(arena);
1433 }
1434 template<> PROTOBUF_NOINLINE ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported*
CreateMaybeMessage(Arena * arena)1435 Arena::CreateMaybeMessage< ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported >(Arena* arena) {
1436   return Arena::CreateMessageInternal< ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported >(arena);
1437 }
1438 template<> PROTOBUF_NOINLINE ::android::os::statsd::conscrypt::ConscryptServiceUsed*
CreateMaybeMessage(Arena * arena)1439 Arena::CreateMaybeMessage< ::android::os::statsd::conscrypt::ConscryptServiceUsed >(Arena* arena) {
1440   return Arena::CreateMessageInternal< ::android::os::statsd::conscrypt::ConscryptServiceUsed >(arena);
1441 }
1442 PROTOBUF_NAMESPACE_CLOSE
1443 
1444 // @@protoc_insertion_point(global_scope)
1445 #include <google/protobuf/port_undef.inc>
1446