1 // Generated by the protocol buffer compiler. DO NOT EDIT!
2 // source: frameworks/proto_logging/stats/atoms/conscrypt/conscrypt_extension_atoms.proto
3
4 #include "frameworks/proto_logging/stats/atoms/conscrypt/conscrypt_extension_atoms.pb.h"
5
6 #include <algorithm>
7 #include <cstdint>
8
9 #include <google/protobuf/io/coded_stream.h>
10 #include <google/protobuf/extension_set.h>
11 #include <google/protobuf/wire_format_lite.h>
12 #include <google/protobuf/descriptor.h>
13 #include <google/protobuf/generated_message_reflection.h>
14 #include <google/protobuf/reflection_ops.h>
15 #include <google/protobuf/wire_format.h>
16 // @@protoc_insertion_point(includes)
17 #include <google/protobuf/port_def.inc>
18
19 PROTOBUF_PRAGMA_INIT_SEG
20
21 namespace _pb = ::PROTOBUF_NAMESPACE_ID;
22 namespace _pbi = _pb::internal;
23
24 namespace android {
25 namespace os {
26 namespace statsd {
27 namespace conscrypt {
CertificateTransparencyLogListStateChanged(::_pbi::ConstantInitialized)28 PROTOBUF_CONSTEXPR CertificateTransparencyLogListStateChanged::CertificateTransparencyLogListStateChanged(
29 ::_pbi::ConstantInitialized): _impl_{
30 /*decltype(_impl_._has_bits_)*/{}
31 , /*decltype(_impl_._cached_size_)*/{}
32 , /*decltype(_impl_.status_)*/0
33 , /*decltype(_impl_.loaded_compat_version_)*/0
34 , /*decltype(_impl_.min_compat_version_)*/0
35 , /*decltype(_impl_.major_version_)*/0
36 , /*decltype(_impl_.minor_version_)*/0} {}
37 struct CertificateTransparencyLogListStateChangedDefaultTypeInternal {
CertificateTransparencyLogListStateChangedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyLogListStateChangedDefaultTypeInternal38 PROTOBUF_CONSTEXPR CertificateTransparencyLogListStateChangedDefaultTypeInternal()
39 : _instance(::_pbi::ConstantInitialized{}) {}
~CertificateTransparencyLogListStateChangedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyLogListStateChangedDefaultTypeInternal40 ~CertificateTransparencyLogListStateChangedDefaultTypeInternal() {}
41 union { // NOLINT(misc-non-private-member-variables-in-classes)
42 CertificateTransparencyLogListStateChanged _instance;
43 };
44 };
45 PROTOBUF_ATTRIBUTE_NO_DESTROY PROTOBUF_CONSTINIT PROTOBUF_ATTRIBUTE_INIT_PRIORITY1 CertificateTransparencyLogListStateChangedDefaultTypeInternal _CertificateTransparencyLogListStateChanged_default_instance_;
CertificateTransparencyVerificationReported(::_pbi::ConstantInitialized)46 PROTOBUF_CONSTEXPR CertificateTransparencyVerificationReported::CertificateTransparencyVerificationReported(
47 ::_pbi::ConstantInitialized): _impl_{
48 /*decltype(_impl_._has_bits_)*/{}
49 , /*decltype(_impl_._cached_size_)*/{}
50 , /*decltype(_impl_.result_)*/0
51 , /*decltype(_impl_.reason_)*/0
52 , /*decltype(_impl_.policy_compatibility_version_)*/0
53 , /*decltype(_impl_.major_version_)*/0
54 , /*decltype(_impl_.minor_version_)*/0
55 , /*decltype(_impl_.num_cert_scts_)*/0
56 , /*decltype(_impl_.num_ocsp_scts_)*/0
57 , /*decltype(_impl_.num_tls_scts_)*/0} {}
58 struct CertificateTransparencyVerificationReportedDefaultTypeInternal {
CertificateTransparencyVerificationReportedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyVerificationReportedDefaultTypeInternal59 PROTOBUF_CONSTEXPR CertificateTransparencyVerificationReportedDefaultTypeInternal()
60 : _instance(::_pbi::ConstantInitialized{}) {}
~CertificateTransparencyVerificationReportedDefaultTypeInternalandroid::os::statsd::conscrypt::CertificateTransparencyVerificationReportedDefaultTypeInternal61 ~CertificateTransparencyVerificationReportedDefaultTypeInternal() {}
62 union { // NOLINT(misc-non-private-member-variables-in-classes)
63 CertificateTransparencyVerificationReported _instance;
64 };
65 };
66 PROTOBUF_ATTRIBUTE_NO_DESTROY PROTOBUF_CONSTINIT PROTOBUF_ATTRIBUTE_INIT_PRIORITY1 CertificateTransparencyVerificationReportedDefaultTypeInternal _CertificateTransparencyVerificationReported_default_instance_;
ConscryptServiceUsed(::_pbi::ConstantInitialized)67 PROTOBUF_CONSTEXPR ConscryptServiceUsed::ConscryptServiceUsed(
68 ::_pbi::ConstantInitialized): _impl_{
69 /*decltype(_impl_._has_bits_)*/{}
70 , /*decltype(_impl_._cached_size_)*/{}
71 , /*decltype(_impl_.algorithm_)*/0
72 , /*decltype(_impl_.cipher_)*/0
73 , /*decltype(_impl_.mode_)*/0
74 , /*decltype(_impl_.padding_)*/0} {}
75 struct ConscryptServiceUsedDefaultTypeInternal {
ConscryptServiceUsedDefaultTypeInternalandroid::os::statsd::conscrypt::ConscryptServiceUsedDefaultTypeInternal76 PROTOBUF_CONSTEXPR ConscryptServiceUsedDefaultTypeInternal()
77 : _instance(::_pbi::ConstantInitialized{}) {}
~ConscryptServiceUsedDefaultTypeInternalandroid::os::statsd::conscrypt::ConscryptServiceUsedDefaultTypeInternal78 ~ConscryptServiceUsedDefaultTypeInternal() {}
79 union { // NOLINT(misc-non-private-member-variables-in-classes)
80 ConscryptServiceUsed _instance;
81 };
82 };
83 PROTOBUF_ATTRIBUTE_NO_DESTROY PROTOBUF_CONSTINIT PROTOBUF_ATTRIBUTE_INIT_PRIORITY1 ConscryptServiceUsedDefaultTypeInternal _ConscryptServiceUsed_default_instance_;
84 } // namespace conscrypt
85 } // namespace statsd
86 } // namespace os
87 } // namespace android
88 static ::_pb::Metadata file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[3];
89 static const ::_pb::EnumDescriptor* file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[4];
90 static constexpr ::_pb::ServiceDescriptor const** file_level_service_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto = nullptr;
91
92 const ::uint32_t TableStruct_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto::offsets[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) = {
93 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_._has_bits_),
94 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _internal_metadata_),
95 ~0u, // no _extensions_
96 ~0u, // no _oneof_case_
97 ~0u, // no _weak_field_map_
98 ~0u, // no _inlined_string_donated_
99 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.status_),
100 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.loaded_compat_version_),
101 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.min_compat_version_),
102 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.major_version_),
103 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged, _impl_.minor_version_),
104 0,
105 1,
106 2,
107 3,
108 4,
109 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_._has_bits_),
110 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _internal_metadata_),
111 ~0u, // no _extensions_
112 ~0u, // no _oneof_case_
113 ~0u, // no _weak_field_map_
114 ~0u, // no _inlined_string_donated_
115 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.result_),
116 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.reason_),
117 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.policy_compatibility_version_),
118 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.major_version_),
119 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.minor_version_),
120 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.num_cert_scts_),
121 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.num_ocsp_scts_),
122 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported, _impl_.num_tls_scts_),
123 0,
124 1,
125 2,
126 3,
127 4,
128 5,
129 6,
130 7,
131 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_._has_bits_),
132 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _internal_metadata_),
133 ~0u, // no _extensions_
134 ~0u, // no _oneof_case_
135 ~0u, // no _weak_field_map_
136 ~0u, // no _inlined_string_donated_
137 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.algorithm_),
138 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.cipher_),
139 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.mode_),
140 PROTOBUF_FIELD_OFFSET(::android::os::statsd::conscrypt::ConscryptServiceUsed, _impl_.padding_),
141 0,
142 1,
143 2,
144 3,
145 };
146 static const ::_pbi::MigrationSchema schemas[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) = {
147 { 0, 11, -1, sizeof(::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged)},
148 { 16, 30, -1, sizeof(::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported)},
149 { 38, 48, -1, sizeof(::android::os::statsd::conscrypt::ConscryptServiceUsed)},
150 };
151
152 static const ::_pb::Message* const file_default_instances[] = {
153 &::android::os::statsd::conscrypt::_CertificateTransparencyLogListStateChanged_default_instance_._instance,
154 &::android::os::statsd::conscrypt::_CertificateTransparencyVerificationReported_default_instance_._instance,
155 &::android::os::statsd::conscrypt::_ConscryptServiceUsed_default_instance_._instance,
156 };
157
158 const char descriptor_table_protodef_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[] PROTOBUF_SECTION_VARIABLE(protodesc_cold) =
159 "\nNframeworks/proto_logging/stats/atoms/c"
160 "onscrypt/conscrypt_extension_atoms.proto"
161 "\022\033android.os.statsd.conscrypt\032*framework"
162 "s/proto_logging/stats/atoms.proto\0327frame"
163 "works/proto_logging/stats/atom_field_opt"
164 "ions.proto\032=frameworks/proto_logging/sta"
165 "ts/enums/conscrypt/ct/enums.proto\"\305\002\n*Ce"
166 "rtificateTransparencyLogListStateChanged"
167 "\022:\n\006status\030\001 \001(\0162*.android.os.statsd.con"
168 "scrypt.LogListStatus\022W\n\025loaded_compat_ve"
169 "rsion\030\002 \001(\01628.android.os.statsd.conscryp"
170 "t.LogListCompatibilityVersion\022T\n\022min_com"
171 "pat_version\030\003 \001(\01628.android.os.statsd.co"
172 "nscrypt.LogListCompatibilityVersion\022\025\n\rm"
173 "ajor_version\030\004 \001(\005\022\025\n\rminor_version\030\005 \001("
174 "\005\"\201\003\n+CertificateTransparencyVerificatio"
175 "nReported\022\?\n\006result\030\001 \001(\0162/.android.os.s"
176 "tatsd.conscrypt.VerificationResult\022\?\n\006re"
177 "ason\030\002 \001(\0162/.android.os.statsd.conscrypt"
178 ".VerificationReason\022^\n\034policy_compatibil"
179 "ity_version\030\003 \001(\01628.android.os.statsd.co"
180 "nscrypt.LogListCompatibilityVersion\022\025\n\rm"
181 "ajor_version\030\004 \001(\005\022\025\n\rminor_version\030\005 \001("
182 "\005\022\025\n\rnum_cert_scts\030\006 \001(\005\022\025\n\rnum_ocsp_sct"
183 "s\030\007 \001(\005\022\024\n\014num_tls_scts\030\010 \001(\005\"\356\001\n\024Conscr"
184 "yptServiceUsed\0229\n\talgorithm\030\001 \001(\0162&.andr"
185 "oid.os.statsd.conscrypt.Algorithm\0223\n\006cip"
186 "her\030\002 \001(\0162#.android.os.statsd.conscrypt."
187 "Cipher\022/\n\004mode\030\003 \001(\0162!.android.os.statsd"
188 ".conscrypt.Mode\0225\n\007padding\030\004 \001(\0162$.andro"
189 "id.os.statsd.conscrypt.Padding*=\n\tAlgori"
190 "thm\022\025\n\021UNKNOWN_ALGORITHM\020\000\022\n\n\006CIPHER\020\001\022\r"
191 "\n\tSIGNATURE\020\002*r\n\006Cipher\022\022\n\016UNKNOWN_CIPHE"
192 "R\020\000\022\007\n\003AES\020\001\022\007\n\003DES\020\002\022\n\n\006DESEDE\020\003\022\007\n\003DSA"
193 "\020\004\022\014\n\010BLOWFISH\020\005\022\014\n\010CHACHA20\020\006\022\007\n\003RSA\020\007\022"
194 "\010\n\004ARC4\020\010*m\n\004Mode\022\013\n\007NO_MODE\020\000\022\007\n\003CBC\020\001\022"
195 "\007\n\003CTR\020\002\022\007\n\003ECB\020\003\022\007\n\003CFB\020\004\022\007\n\003CTS\020\005\022\007\n\003G"
196 "CM\020\006\022\013\n\007GCM_SIV\020\007\022\007\n\003OFB\020\010\022\014\n\010POLY1305\020\t"
197 "*\220\001\n\007Padding\022\016\n\nNO_PADDING\020\000\022\017\n\013OAEP_SHA"
198 "512\020\001\022\017\n\013OAEP_SHA384\020\002\022\017\n\013OAEP_SHA256\020\003\022"
199 "\017\n\013OAEP_SHA224\020\004\022\r\n\tOAEP_SHA1\020\005\022\t\n\005PKCS1"
200 "\020\006\022\t\n\005PKCS5\020\007\022\014\n\010ISO10126\020\010:\251\001\n/certific"
201 "ate_transparency_log_list_state_changed\022"
202 "\027.android.os.statsd.Atom\030\246\007 \001(\0132G.androi"
203 "d.os.statsd.conscrypt.CertificateTranspa"
204 "rencyLogListStateChangedB\r\242\265\030\tconscrypt:"
205 "z\n\026conscrypt_service_used\022\027.android.os.s"
206 "tatsd.Atom\030\305\007 \001(\01321.android.os.statsd.co"
207 "nscrypt.ConscryptServiceUsedB\r\242\265\030\tconscr"
208 "ypt:\251\001\n.certificate_transparency_verific"
209 "ation_reported\022\027.android.os.statsd.Atom\030"
210 "\335\007 \001(\0132H.android.os.statsd.conscrypt.Cer"
211 "tificateTransparencyVerificationReported"
212 "B\r\242\265\030\tconscryptB\032\n\030com.android.os.conscr"
213 "ypt"
214 ;
215 static const ::_pbi::DescriptorTable* const descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_deps[3] = {
216 &::descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatom_5ffield_5foptions_2eproto,
217 &::descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2eproto,
218 &::descriptor_table_frameworks_2fproto_5flogging_2fstats_2fenums_2fconscrypt_2fct_2fenums_2eproto,
219 };
220 static ::_pbi::once_flag descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once;
221 const ::_pbi::DescriptorTable descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto = {
222 false, false, 2163, descriptor_table_protodef_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto,
223 "frameworks/proto_logging/stats/atoms/conscrypt/conscrypt_extension_atoms.proto",
224 &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once, descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_deps, 3, 3,
225 schemas, file_default_instances, TableStruct_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto::offsets,
226 file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto, file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto,
227 file_level_service_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto,
228 };
descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter()229 PROTOBUF_ATTRIBUTE_WEAK const ::_pbi::DescriptorTable* descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter() {
230 return &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto;
231 }
232
233 // Force running AddDescriptors() at dynamic initialization time.
234 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 static ::_pbi::AddDescriptorsRunner dynamic_init_dummy_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
235 namespace android {
236 namespace os {
237 namespace statsd {
238 namespace conscrypt {
Algorithm_descriptor()239 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Algorithm_descriptor() {
240 ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
241 return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[0];
242 }
Algorithm_IsValid(int value)243 bool Algorithm_IsValid(int value) {
244 switch (value) {
245 case 0:
246 case 1:
247 case 2:
248 return true;
249 default:
250 return false;
251 }
252 }
253
Cipher_descriptor()254 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Cipher_descriptor() {
255 ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
256 return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[1];
257 }
Cipher_IsValid(int value)258 bool Cipher_IsValid(int value) {
259 switch (value) {
260 case 0:
261 case 1:
262 case 2:
263 case 3:
264 case 4:
265 case 5:
266 case 6:
267 case 7:
268 case 8:
269 return true;
270 default:
271 return false;
272 }
273 }
274
Mode_descriptor()275 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Mode_descriptor() {
276 ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
277 return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[2];
278 }
Mode_IsValid(int value)279 bool Mode_IsValid(int value) {
280 switch (value) {
281 case 0:
282 case 1:
283 case 2:
284 case 3:
285 case 4:
286 case 5:
287 case 6:
288 case 7:
289 case 8:
290 case 9:
291 return true;
292 default:
293 return false;
294 }
295 }
296
Padding_descriptor()297 const ::PROTOBUF_NAMESPACE_ID::EnumDescriptor* Padding_descriptor() {
298 ::PROTOBUF_NAMESPACE_ID::internal::AssignDescriptors(&descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto);
299 return file_level_enum_descriptors_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[3];
300 }
Padding_IsValid(int value)301 bool Padding_IsValid(int value) {
302 switch (value) {
303 case 0:
304 case 1:
305 case 2:
306 case 3:
307 case 4:
308 case 5:
309 case 6:
310 case 7:
311 case 8:
312 return true;
313 default:
314 return false;
315 }
316 }
317
318
319 // ===================================================================
320
321 class CertificateTransparencyLogListStateChanged::_Internal {
322 public:
323 using HasBits = decltype(std::declval<CertificateTransparencyLogListStateChanged>()._impl_._has_bits_);
set_has_status(HasBits * has_bits)324 static void set_has_status(HasBits* has_bits) {
325 (*has_bits)[0] |= 1u;
326 }
set_has_loaded_compat_version(HasBits * has_bits)327 static void set_has_loaded_compat_version(HasBits* has_bits) {
328 (*has_bits)[0] |= 2u;
329 }
set_has_min_compat_version(HasBits * has_bits)330 static void set_has_min_compat_version(HasBits* has_bits) {
331 (*has_bits)[0] |= 4u;
332 }
set_has_major_version(HasBits * has_bits)333 static void set_has_major_version(HasBits* has_bits) {
334 (*has_bits)[0] |= 8u;
335 }
set_has_minor_version(HasBits * has_bits)336 static void set_has_minor_version(HasBits* has_bits) {
337 (*has_bits)[0] |= 16u;
338 }
339 };
340
CertificateTransparencyLogListStateChanged(::PROTOBUF_NAMESPACE_ID::Arena * arena,bool is_message_owned)341 CertificateTransparencyLogListStateChanged::CertificateTransparencyLogListStateChanged(::PROTOBUF_NAMESPACE_ID::Arena* arena,
342 bool is_message_owned)
343 : ::PROTOBUF_NAMESPACE_ID::Message(arena, is_message_owned) {
344 SharedCtor(arena, is_message_owned);
345 // @@protoc_insertion_point(arena_constructor:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
346 }
CertificateTransparencyLogListStateChanged(const CertificateTransparencyLogListStateChanged & from)347 CertificateTransparencyLogListStateChanged::CertificateTransparencyLogListStateChanged(const CertificateTransparencyLogListStateChanged& from)
348 : ::PROTOBUF_NAMESPACE_ID::Message() {
349 CertificateTransparencyLogListStateChanged* const _this = this; (void)_this;
350 new (&_impl_) Impl_{
351 decltype(_impl_._has_bits_){from._impl_._has_bits_}
352 , /*decltype(_impl_._cached_size_)*/{}
353 , decltype(_impl_.status_){}
354 , decltype(_impl_.loaded_compat_version_){}
355 , decltype(_impl_.min_compat_version_){}
356 , decltype(_impl_.major_version_){}
357 , decltype(_impl_.minor_version_){}};
358
359 _internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
360 ::memcpy(&_impl_.status_, &from._impl_.status_,
361 static_cast<size_t>(reinterpret_cast<char*>(&_impl_.minor_version_) -
362 reinterpret_cast<char*>(&_impl_.status_)) + sizeof(_impl_.minor_version_));
363 // @@protoc_insertion_point(copy_constructor:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
364 }
365
SharedCtor(::_pb::Arena * arena,bool is_message_owned)366 inline void CertificateTransparencyLogListStateChanged::SharedCtor(
367 ::_pb::Arena* arena, bool is_message_owned) {
368 (void)arena;
369 (void)is_message_owned;
370 new (&_impl_) Impl_{
371 decltype(_impl_._has_bits_){}
372 , /*decltype(_impl_._cached_size_)*/{}
373 , decltype(_impl_.status_){0}
374 , decltype(_impl_.loaded_compat_version_){0}
375 , decltype(_impl_.min_compat_version_){0}
376 , decltype(_impl_.major_version_){0}
377 , decltype(_impl_.minor_version_){0}
378 };
379 }
380
~CertificateTransparencyLogListStateChanged()381 CertificateTransparencyLogListStateChanged::~CertificateTransparencyLogListStateChanged() {
382 // @@protoc_insertion_point(destructor:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
383 if (auto *arena = _internal_metadata_.DeleteReturnArena<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>()) {
384 (void)arena;
385 return;
386 }
387 SharedDtor();
388 }
389
SharedDtor()390 inline void CertificateTransparencyLogListStateChanged::SharedDtor() {
391 GOOGLE_DCHECK(GetArenaForAllocation() == nullptr);
392 }
393
SetCachedSize(int size) const394 void CertificateTransparencyLogListStateChanged::SetCachedSize(int size) const {
395 _impl_._cached_size_.Set(size);
396 }
397
Clear()398 void CertificateTransparencyLogListStateChanged::Clear() {
399 // @@protoc_insertion_point(message_clear_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
400 ::uint32_t cached_has_bits = 0;
401 // Prevent compiler warnings about cached_has_bits being unused
402 (void) cached_has_bits;
403
404 cached_has_bits = _impl_._has_bits_[0];
405 if (cached_has_bits & 0x0000001fu) {
406 ::memset(&_impl_.status_, 0, static_cast<size_t>(
407 reinterpret_cast<char*>(&_impl_.minor_version_) -
408 reinterpret_cast<char*>(&_impl_.status_)) + sizeof(_impl_.minor_version_));
409 }
410 _impl_._has_bits_.Clear();
411 _internal_metadata_.Clear<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>();
412 }
413
_InternalParse(const char * ptr,::_pbi::ParseContext * ctx)414 const char* CertificateTransparencyLogListStateChanged::_InternalParse(const char* ptr, ::_pbi::ParseContext* ctx) {
415 #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
416 _Internal::HasBits has_bits{};
417 while (!ctx->Done(&ptr)) {
418 ::uint32_t tag;
419 ptr = ::_pbi::ReadTag(ptr, &tag);
420 switch (tag >> 3) {
421 // optional .android.os.statsd.conscrypt.LogListStatus status = 1;
422 case 1:
423 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 8)) {
424 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
425 CHK_(ptr);
426 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListStatus_IsValid(val))) {
427 _internal_set_status(static_cast<::android::os::statsd::conscrypt::LogListStatus>(val));
428 } else {
429 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(1, val, mutable_unknown_fields());
430 }
431 } else {
432 goto handle_unusual;
433 }
434 continue;
435 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion loaded_compat_version = 2;
436 case 2:
437 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 16)) {
438 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
439 CHK_(ptr);
440 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListCompatibilityVersion_IsValid(val))) {
441 _internal_set_loaded_compat_version(static_cast<::android::os::statsd::conscrypt::LogListCompatibilityVersion>(val));
442 } else {
443 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(2, val, mutable_unknown_fields());
444 }
445 } else {
446 goto handle_unusual;
447 }
448 continue;
449 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion min_compat_version = 3;
450 case 3:
451 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 24)) {
452 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
453 CHK_(ptr);
454 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListCompatibilityVersion_IsValid(val))) {
455 _internal_set_min_compat_version(static_cast<::android::os::statsd::conscrypt::LogListCompatibilityVersion>(val));
456 } else {
457 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(3, val, mutable_unknown_fields());
458 }
459 } else {
460 goto handle_unusual;
461 }
462 continue;
463 // optional int32 major_version = 4;
464 case 4:
465 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 32)) {
466 _Internal::set_has_major_version(&has_bits);
467 _impl_.major_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
468 CHK_(ptr);
469 } else {
470 goto handle_unusual;
471 }
472 continue;
473 // optional int32 minor_version = 5;
474 case 5:
475 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 40)) {
476 _Internal::set_has_minor_version(&has_bits);
477 _impl_.minor_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
478 CHK_(ptr);
479 } else {
480 goto handle_unusual;
481 }
482 continue;
483 default:
484 goto handle_unusual;
485 } // switch
486 handle_unusual:
487 if ((tag == 0) || ((tag & 7) == 4)) {
488 CHK_(ptr);
489 ctx->SetLastTag(tag);
490 goto message_done;
491 }
492 ptr = UnknownFieldParse(
493 tag,
494 _internal_metadata_.mutable_unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(),
495 ptr, ctx);
496 CHK_(ptr != nullptr);
497 } // while
498 message_done:
499 _impl_._has_bits_.Or(has_bits);
500 return ptr;
501 failure:
502 ptr = nullptr;
503 goto message_done;
504 #undef CHK_
505 }
506
_InternalSerialize(::uint8_t * target,::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream * stream) const507 ::uint8_t* CertificateTransparencyLogListStateChanged::_InternalSerialize(
508 ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
509 // @@protoc_insertion_point(serialize_to_array_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
510 ::uint32_t cached_has_bits = 0;
511 (void) cached_has_bits;
512
513 cached_has_bits = _impl_._has_bits_[0];
514 // optional .android.os.statsd.conscrypt.LogListStatus status = 1;
515 if (cached_has_bits & 0x00000001u) {
516 target = stream->EnsureSpace(target);
517 target = ::_pbi::WireFormatLite::WriteEnumToArray(
518 1, this->_internal_status(), target);
519 }
520
521 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion loaded_compat_version = 2;
522 if (cached_has_bits & 0x00000002u) {
523 target = stream->EnsureSpace(target);
524 target = ::_pbi::WireFormatLite::WriteEnumToArray(
525 2, this->_internal_loaded_compat_version(), target);
526 }
527
528 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion min_compat_version = 3;
529 if (cached_has_bits & 0x00000004u) {
530 target = stream->EnsureSpace(target);
531 target = ::_pbi::WireFormatLite::WriteEnumToArray(
532 3, this->_internal_min_compat_version(), target);
533 }
534
535 // optional int32 major_version = 4;
536 if (cached_has_bits & 0x00000008u) {
537 target = stream->EnsureSpace(target);
538 target = ::_pbi::WireFormatLite::WriteInt32ToArray(4, this->_internal_major_version(), target);
539 }
540
541 // optional int32 minor_version = 5;
542 if (cached_has_bits & 0x00000010u) {
543 target = stream->EnsureSpace(target);
544 target = ::_pbi::WireFormatLite::WriteInt32ToArray(5, this->_internal_minor_version(), target);
545 }
546
547 if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
548 target = ::_pbi::WireFormat::InternalSerializeUnknownFieldsToArray(
549 _internal_metadata_.unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(::PROTOBUF_NAMESPACE_ID::UnknownFieldSet::default_instance), target, stream);
550 }
551 // @@protoc_insertion_point(serialize_to_array_end:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
552 return target;
553 }
554
ByteSizeLong() const555 size_t CertificateTransparencyLogListStateChanged::ByteSizeLong() const {
556 // @@protoc_insertion_point(message_byte_size_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
557 size_t total_size = 0;
558
559 ::uint32_t cached_has_bits = 0;
560 // Prevent compiler warnings about cached_has_bits being unused
561 (void) cached_has_bits;
562
563 cached_has_bits = _impl_._has_bits_[0];
564 if (cached_has_bits & 0x0000001fu) {
565 // optional .android.os.statsd.conscrypt.LogListStatus status = 1;
566 if (cached_has_bits & 0x00000001u) {
567 total_size += 1 +
568 ::_pbi::WireFormatLite::EnumSize(this->_internal_status());
569 }
570
571 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion loaded_compat_version = 2;
572 if (cached_has_bits & 0x00000002u) {
573 total_size += 1 +
574 ::_pbi::WireFormatLite::EnumSize(this->_internal_loaded_compat_version());
575 }
576
577 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion min_compat_version = 3;
578 if (cached_has_bits & 0x00000004u) {
579 total_size += 1 +
580 ::_pbi::WireFormatLite::EnumSize(this->_internal_min_compat_version());
581 }
582
583 // optional int32 major_version = 4;
584 if (cached_has_bits & 0x00000008u) {
585 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_major_version());
586 }
587
588 // optional int32 minor_version = 5;
589 if (cached_has_bits & 0x00000010u) {
590 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_minor_version());
591 }
592
593 }
594 return MaybeComputeUnknownFieldsSize(total_size, &_impl_._cached_size_);
595 }
596
597 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData CertificateTransparencyLogListStateChanged::_class_data_ = {
598 ::PROTOBUF_NAMESPACE_ID::Message::CopyWithSourceCheck,
599 CertificateTransparencyLogListStateChanged::MergeImpl
600 };
GetClassData() const601 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData*CertificateTransparencyLogListStateChanged::GetClassData() const { return &_class_data_; }
602
603
MergeImpl(::PROTOBUF_NAMESPACE_ID::Message & to_msg,const::PROTOBUF_NAMESPACE_ID::Message & from_msg)604 void CertificateTransparencyLogListStateChanged::MergeImpl(::PROTOBUF_NAMESPACE_ID::Message& to_msg, const ::PROTOBUF_NAMESPACE_ID::Message& from_msg) {
605 auto* const _this = static_cast<CertificateTransparencyLogListStateChanged*>(&to_msg);
606 auto& from = static_cast<const CertificateTransparencyLogListStateChanged&>(from_msg);
607 // @@protoc_insertion_point(class_specific_merge_from_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
608 GOOGLE_DCHECK_NE(&from, _this);
609 ::uint32_t cached_has_bits = 0;
610 (void) cached_has_bits;
611
612 cached_has_bits = from._impl_._has_bits_[0];
613 if (cached_has_bits & 0x0000001fu) {
614 if (cached_has_bits & 0x00000001u) {
615 _this->_impl_.status_ = from._impl_.status_;
616 }
617 if (cached_has_bits & 0x00000002u) {
618 _this->_impl_.loaded_compat_version_ = from._impl_.loaded_compat_version_;
619 }
620 if (cached_has_bits & 0x00000004u) {
621 _this->_impl_.min_compat_version_ = from._impl_.min_compat_version_;
622 }
623 if (cached_has_bits & 0x00000008u) {
624 _this->_impl_.major_version_ = from._impl_.major_version_;
625 }
626 if (cached_has_bits & 0x00000010u) {
627 _this->_impl_.minor_version_ = from._impl_.minor_version_;
628 }
629 _this->_impl_._has_bits_[0] |= cached_has_bits;
630 }
631 _this->_internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
632 }
633
CopyFrom(const CertificateTransparencyLogListStateChanged & from)634 void CertificateTransparencyLogListStateChanged::CopyFrom(const CertificateTransparencyLogListStateChanged& from) {
635 // @@protoc_insertion_point(class_specific_copy_from_start:android.os.statsd.conscrypt.CertificateTransparencyLogListStateChanged)
636 if (&from == this) return;
637 Clear();
638 MergeFrom(from);
639 }
640
IsInitialized() const641 bool CertificateTransparencyLogListStateChanged::IsInitialized() const {
642 return true;
643 }
644
InternalSwap(CertificateTransparencyLogListStateChanged * other)645 void CertificateTransparencyLogListStateChanged::InternalSwap(CertificateTransparencyLogListStateChanged* other) {
646 using std::swap;
647 _internal_metadata_.InternalSwap(&other->_internal_metadata_);
648 swap(_impl_._has_bits_[0], other->_impl_._has_bits_[0]);
649 ::PROTOBUF_NAMESPACE_ID::internal::memswap<
650 PROTOBUF_FIELD_OFFSET(CertificateTransparencyLogListStateChanged, _impl_.minor_version_)
651 + sizeof(CertificateTransparencyLogListStateChanged::_impl_.minor_version_) // NOLINT
652 - PROTOBUF_FIELD_OFFSET(CertificateTransparencyLogListStateChanged, _impl_.status_)>(
653 reinterpret_cast<char*>(&_impl_.status_),
654 reinterpret_cast<char*>(&other->_impl_.status_));
655 }
656
GetMetadata() const657 ::PROTOBUF_NAMESPACE_ID::Metadata CertificateTransparencyLogListStateChanged::GetMetadata() const {
658 return ::_pbi::AssignDescriptors(
659 &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter, &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once,
660 file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[0]);
661 }
662
663 // ===================================================================
664
665 class CertificateTransparencyVerificationReported::_Internal {
666 public:
667 using HasBits = decltype(std::declval<CertificateTransparencyVerificationReported>()._impl_._has_bits_);
set_has_result(HasBits * has_bits)668 static void set_has_result(HasBits* has_bits) {
669 (*has_bits)[0] |= 1u;
670 }
set_has_reason(HasBits * has_bits)671 static void set_has_reason(HasBits* has_bits) {
672 (*has_bits)[0] |= 2u;
673 }
set_has_policy_compatibility_version(HasBits * has_bits)674 static void set_has_policy_compatibility_version(HasBits* has_bits) {
675 (*has_bits)[0] |= 4u;
676 }
set_has_major_version(HasBits * has_bits)677 static void set_has_major_version(HasBits* has_bits) {
678 (*has_bits)[0] |= 8u;
679 }
set_has_minor_version(HasBits * has_bits)680 static void set_has_minor_version(HasBits* has_bits) {
681 (*has_bits)[0] |= 16u;
682 }
set_has_num_cert_scts(HasBits * has_bits)683 static void set_has_num_cert_scts(HasBits* has_bits) {
684 (*has_bits)[0] |= 32u;
685 }
set_has_num_ocsp_scts(HasBits * has_bits)686 static void set_has_num_ocsp_scts(HasBits* has_bits) {
687 (*has_bits)[0] |= 64u;
688 }
set_has_num_tls_scts(HasBits * has_bits)689 static void set_has_num_tls_scts(HasBits* has_bits) {
690 (*has_bits)[0] |= 128u;
691 }
692 };
693
CertificateTransparencyVerificationReported(::PROTOBUF_NAMESPACE_ID::Arena * arena,bool is_message_owned)694 CertificateTransparencyVerificationReported::CertificateTransparencyVerificationReported(::PROTOBUF_NAMESPACE_ID::Arena* arena,
695 bool is_message_owned)
696 : ::PROTOBUF_NAMESPACE_ID::Message(arena, is_message_owned) {
697 SharedCtor(arena, is_message_owned);
698 // @@protoc_insertion_point(arena_constructor:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
699 }
CertificateTransparencyVerificationReported(const CertificateTransparencyVerificationReported & from)700 CertificateTransparencyVerificationReported::CertificateTransparencyVerificationReported(const CertificateTransparencyVerificationReported& from)
701 : ::PROTOBUF_NAMESPACE_ID::Message() {
702 CertificateTransparencyVerificationReported* const _this = this; (void)_this;
703 new (&_impl_) Impl_{
704 decltype(_impl_._has_bits_){from._impl_._has_bits_}
705 , /*decltype(_impl_._cached_size_)*/{}
706 , decltype(_impl_.result_){}
707 , decltype(_impl_.reason_){}
708 , decltype(_impl_.policy_compatibility_version_){}
709 , decltype(_impl_.major_version_){}
710 , decltype(_impl_.minor_version_){}
711 , decltype(_impl_.num_cert_scts_){}
712 , decltype(_impl_.num_ocsp_scts_){}
713 , decltype(_impl_.num_tls_scts_){}};
714
715 _internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
716 ::memcpy(&_impl_.result_, &from._impl_.result_,
717 static_cast<size_t>(reinterpret_cast<char*>(&_impl_.num_tls_scts_) -
718 reinterpret_cast<char*>(&_impl_.result_)) + sizeof(_impl_.num_tls_scts_));
719 // @@protoc_insertion_point(copy_constructor:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
720 }
721
SharedCtor(::_pb::Arena * arena,bool is_message_owned)722 inline void CertificateTransparencyVerificationReported::SharedCtor(
723 ::_pb::Arena* arena, bool is_message_owned) {
724 (void)arena;
725 (void)is_message_owned;
726 new (&_impl_) Impl_{
727 decltype(_impl_._has_bits_){}
728 , /*decltype(_impl_._cached_size_)*/{}
729 , decltype(_impl_.result_){0}
730 , decltype(_impl_.reason_){0}
731 , decltype(_impl_.policy_compatibility_version_){0}
732 , decltype(_impl_.major_version_){0}
733 , decltype(_impl_.minor_version_){0}
734 , decltype(_impl_.num_cert_scts_){0}
735 , decltype(_impl_.num_ocsp_scts_){0}
736 , decltype(_impl_.num_tls_scts_){0}
737 };
738 }
739
~CertificateTransparencyVerificationReported()740 CertificateTransparencyVerificationReported::~CertificateTransparencyVerificationReported() {
741 // @@protoc_insertion_point(destructor:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
742 if (auto *arena = _internal_metadata_.DeleteReturnArena<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>()) {
743 (void)arena;
744 return;
745 }
746 SharedDtor();
747 }
748
SharedDtor()749 inline void CertificateTransparencyVerificationReported::SharedDtor() {
750 GOOGLE_DCHECK(GetArenaForAllocation() == nullptr);
751 }
752
SetCachedSize(int size) const753 void CertificateTransparencyVerificationReported::SetCachedSize(int size) const {
754 _impl_._cached_size_.Set(size);
755 }
756
Clear()757 void CertificateTransparencyVerificationReported::Clear() {
758 // @@protoc_insertion_point(message_clear_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
759 ::uint32_t cached_has_bits = 0;
760 // Prevent compiler warnings about cached_has_bits being unused
761 (void) cached_has_bits;
762
763 cached_has_bits = _impl_._has_bits_[0];
764 if (cached_has_bits & 0x000000ffu) {
765 ::memset(&_impl_.result_, 0, static_cast<size_t>(
766 reinterpret_cast<char*>(&_impl_.num_tls_scts_) -
767 reinterpret_cast<char*>(&_impl_.result_)) + sizeof(_impl_.num_tls_scts_));
768 }
769 _impl_._has_bits_.Clear();
770 _internal_metadata_.Clear<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>();
771 }
772
_InternalParse(const char * ptr,::_pbi::ParseContext * ctx)773 const char* CertificateTransparencyVerificationReported::_InternalParse(const char* ptr, ::_pbi::ParseContext* ctx) {
774 #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
775 _Internal::HasBits has_bits{};
776 while (!ctx->Done(&ptr)) {
777 ::uint32_t tag;
778 ptr = ::_pbi::ReadTag(ptr, &tag);
779 switch (tag >> 3) {
780 // optional .android.os.statsd.conscrypt.VerificationResult result = 1;
781 case 1:
782 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 8)) {
783 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
784 CHK_(ptr);
785 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::VerificationResult_IsValid(val))) {
786 _internal_set_result(static_cast<::android::os::statsd::conscrypt::VerificationResult>(val));
787 } else {
788 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(1, val, mutable_unknown_fields());
789 }
790 } else {
791 goto handle_unusual;
792 }
793 continue;
794 // optional .android.os.statsd.conscrypt.VerificationReason reason = 2;
795 case 2:
796 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 16)) {
797 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
798 CHK_(ptr);
799 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::VerificationReason_IsValid(val))) {
800 _internal_set_reason(static_cast<::android::os::statsd::conscrypt::VerificationReason>(val));
801 } else {
802 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(2, val, mutable_unknown_fields());
803 }
804 } else {
805 goto handle_unusual;
806 }
807 continue;
808 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion policy_compatibility_version = 3;
809 case 3:
810 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 24)) {
811 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
812 CHK_(ptr);
813 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::LogListCompatibilityVersion_IsValid(val))) {
814 _internal_set_policy_compatibility_version(static_cast<::android::os::statsd::conscrypt::LogListCompatibilityVersion>(val));
815 } else {
816 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(3, val, mutable_unknown_fields());
817 }
818 } else {
819 goto handle_unusual;
820 }
821 continue;
822 // optional int32 major_version = 4;
823 case 4:
824 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 32)) {
825 _Internal::set_has_major_version(&has_bits);
826 _impl_.major_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
827 CHK_(ptr);
828 } else {
829 goto handle_unusual;
830 }
831 continue;
832 // optional int32 minor_version = 5;
833 case 5:
834 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 40)) {
835 _Internal::set_has_minor_version(&has_bits);
836 _impl_.minor_version_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
837 CHK_(ptr);
838 } else {
839 goto handle_unusual;
840 }
841 continue;
842 // optional int32 num_cert_scts = 6;
843 case 6:
844 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 48)) {
845 _Internal::set_has_num_cert_scts(&has_bits);
846 _impl_.num_cert_scts_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
847 CHK_(ptr);
848 } else {
849 goto handle_unusual;
850 }
851 continue;
852 // optional int32 num_ocsp_scts = 7;
853 case 7:
854 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 56)) {
855 _Internal::set_has_num_ocsp_scts(&has_bits);
856 _impl_.num_ocsp_scts_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
857 CHK_(ptr);
858 } else {
859 goto handle_unusual;
860 }
861 continue;
862 // optional int32 num_tls_scts = 8;
863 case 8:
864 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 64)) {
865 _Internal::set_has_num_tls_scts(&has_bits);
866 _impl_.num_tls_scts_ = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint32(&ptr);
867 CHK_(ptr);
868 } else {
869 goto handle_unusual;
870 }
871 continue;
872 default:
873 goto handle_unusual;
874 } // switch
875 handle_unusual:
876 if ((tag == 0) || ((tag & 7) == 4)) {
877 CHK_(ptr);
878 ctx->SetLastTag(tag);
879 goto message_done;
880 }
881 ptr = UnknownFieldParse(
882 tag,
883 _internal_metadata_.mutable_unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(),
884 ptr, ctx);
885 CHK_(ptr != nullptr);
886 } // while
887 message_done:
888 _impl_._has_bits_.Or(has_bits);
889 return ptr;
890 failure:
891 ptr = nullptr;
892 goto message_done;
893 #undef CHK_
894 }
895
_InternalSerialize(::uint8_t * target,::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream * stream) const896 ::uint8_t* CertificateTransparencyVerificationReported::_InternalSerialize(
897 ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
898 // @@protoc_insertion_point(serialize_to_array_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
899 ::uint32_t cached_has_bits = 0;
900 (void) cached_has_bits;
901
902 cached_has_bits = _impl_._has_bits_[0];
903 // optional .android.os.statsd.conscrypt.VerificationResult result = 1;
904 if (cached_has_bits & 0x00000001u) {
905 target = stream->EnsureSpace(target);
906 target = ::_pbi::WireFormatLite::WriteEnumToArray(
907 1, this->_internal_result(), target);
908 }
909
910 // optional .android.os.statsd.conscrypt.VerificationReason reason = 2;
911 if (cached_has_bits & 0x00000002u) {
912 target = stream->EnsureSpace(target);
913 target = ::_pbi::WireFormatLite::WriteEnumToArray(
914 2, this->_internal_reason(), target);
915 }
916
917 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion policy_compatibility_version = 3;
918 if (cached_has_bits & 0x00000004u) {
919 target = stream->EnsureSpace(target);
920 target = ::_pbi::WireFormatLite::WriteEnumToArray(
921 3, this->_internal_policy_compatibility_version(), target);
922 }
923
924 // optional int32 major_version = 4;
925 if (cached_has_bits & 0x00000008u) {
926 target = stream->EnsureSpace(target);
927 target = ::_pbi::WireFormatLite::WriteInt32ToArray(4, this->_internal_major_version(), target);
928 }
929
930 // optional int32 minor_version = 5;
931 if (cached_has_bits & 0x00000010u) {
932 target = stream->EnsureSpace(target);
933 target = ::_pbi::WireFormatLite::WriteInt32ToArray(5, this->_internal_minor_version(), target);
934 }
935
936 // optional int32 num_cert_scts = 6;
937 if (cached_has_bits & 0x00000020u) {
938 target = stream->EnsureSpace(target);
939 target = ::_pbi::WireFormatLite::WriteInt32ToArray(6, this->_internal_num_cert_scts(), target);
940 }
941
942 // optional int32 num_ocsp_scts = 7;
943 if (cached_has_bits & 0x00000040u) {
944 target = stream->EnsureSpace(target);
945 target = ::_pbi::WireFormatLite::WriteInt32ToArray(7, this->_internal_num_ocsp_scts(), target);
946 }
947
948 // optional int32 num_tls_scts = 8;
949 if (cached_has_bits & 0x00000080u) {
950 target = stream->EnsureSpace(target);
951 target = ::_pbi::WireFormatLite::WriteInt32ToArray(8, this->_internal_num_tls_scts(), target);
952 }
953
954 if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
955 target = ::_pbi::WireFormat::InternalSerializeUnknownFieldsToArray(
956 _internal_metadata_.unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(::PROTOBUF_NAMESPACE_ID::UnknownFieldSet::default_instance), target, stream);
957 }
958 // @@protoc_insertion_point(serialize_to_array_end:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
959 return target;
960 }
961
ByteSizeLong() const962 size_t CertificateTransparencyVerificationReported::ByteSizeLong() const {
963 // @@protoc_insertion_point(message_byte_size_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
964 size_t total_size = 0;
965
966 ::uint32_t cached_has_bits = 0;
967 // Prevent compiler warnings about cached_has_bits being unused
968 (void) cached_has_bits;
969
970 cached_has_bits = _impl_._has_bits_[0];
971 if (cached_has_bits & 0x000000ffu) {
972 // optional .android.os.statsd.conscrypt.VerificationResult result = 1;
973 if (cached_has_bits & 0x00000001u) {
974 total_size += 1 +
975 ::_pbi::WireFormatLite::EnumSize(this->_internal_result());
976 }
977
978 // optional .android.os.statsd.conscrypt.VerificationReason reason = 2;
979 if (cached_has_bits & 0x00000002u) {
980 total_size += 1 +
981 ::_pbi::WireFormatLite::EnumSize(this->_internal_reason());
982 }
983
984 // optional .android.os.statsd.conscrypt.LogListCompatibilityVersion policy_compatibility_version = 3;
985 if (cached_has_bits & 0x00000004u) {
986 total_size += 1 +
987 ::_pbi::WireFormatLite::EnumSize(this->_internal_policy_compatibility_version());
988 }
989
990 // optional int32 major_version = 4;
991 if (cached_has_bits & 0x00000008u) {
992 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_major_version());
993 }
994
995 // optional int32 minor_version = 5;
996 if (cached_has_bits & 0x00000010u) {
997 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_minor_version());
998 }
999
1000 // optional int32 num_cert_scts = 6;
1001 if (cached_has_bits & 0x00000020u) {
1002 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_num_cert_scts());
1003 }
1004
1005 // optional int32 num_ocsp_scts = 7;
1006 if (cached_has_bits & 0x00000040u) {
1007 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_num_ocsp_scts());
1008 }
1009
1010 // optional int32 num_tls_scts = 8;
1011 if (cached_has_bits & 0x00000080u) {
1012 total_size += ::_pbi::WireFormatLite::Int32SizePlusOne(this->_internal_num_tls_scts());
1013 }
1014
1015 }
1016 return MaybeComputeUnknownFieldsSize(total_size, &_impl_._cached_size_);
1017 }
1018
1019 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData CertificateTransparencyVerificationReported::_class_data_ = {
1020 ::PROTOBUF_NAMESPACE_ID::Message::CopyWithSourceCheck,
1021 CertificateTransparencyVerificationReported::MergeImpl
1022 };
GetClassData() const1023 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData*CertificateTransparencyVerificationReported::GetClassData() const { return &_class_data_; }
1024
1025
MergeImpl(::PROTOBUF_NAMESPACE_ID::Message & to_msg,const::PROTOBUF_NAMESPACE_ID::Message & from_msg)1026 void CertificateTransparencyVerificationReported::MergeImpl(::PROTOBUF_NAMESPACE_ID::Message& to_msg, const ::PROTOBUF_NAMESPACE_ID::Message& from_msg) {
1027 auto* const _this = static_cast<CertificateTransparencyVerificationReported*>(&to_msg);
1028 auto& from = static_cast<const CertificateTransparencyVerificationReported&>(from_msg);
1029 // @@protoc_insertion_point(class_specific_merge_from_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
1030 GOOGLE_DCHECK_NE(&from, _this);
1031 ::uint32_t cached_has_bits = 0;
1032 (void) cached_has_bits;
1033
1034 cached_has_bits = from._impl_._has_bits_[0];
1035 if (cached_has_bits & 0x000000ffu) {
1036 if (cached_has_bits & 0x00000001u) {
1037 _this->_impl_.result_ = from._impl_.result_;
1038 }
1039 if (cached_has_bits & 0x00000002u) {
1040 _this->_impl_.reason_ = from._impl_.reason_;
1041 }
1042 if (cached_has_bits & 0x00000004u) {
1043 _this->_impl_.policy_compatibility_version_ = from._impl_.policy_compatibility_version_;
1044 }
1045 if (cached_has_bits & 0x00000008u) {
1046 _this->_impl_.major_version_ = from._impl_.major_version_;
1047 }
1048 if (cached_has_bits & 0x00000010u) {
1049 _this->_impl_.minor_version_ = from._impl_.minor_version_;
1050 }
1051 if (cached_has_bits & 0x00000020u) {
1052 _this->_impl_.num_cert_scts_ = from._impl_.num_cert_scts_;
1053 }
1054 if (cached_has_bits & 0x00000040u) {
1055 _this->_impl_.num_ocsp_scts_ = from._impl_.num_ocsp_scts_;
1056 }
1057 if (cached_has_bits & 0x00000080u) {
1058 _this->_impl_.num_tls_scts_ = from._impl_.num_tls_scts_;
1059 }
1060 _this->_impl_._has_bits_[0] |= cached_has_bits;
1061 }
1062 _this->_internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
1063 }
1064
CopyFrom(const CertificateTransparencyVerificationReported & from)1065 void CertificateTransparencyVerificationReported::CopyFrom(const CertificateTransparencyVerificationReported& from) {
1066 // @@protoc_insertion_point(class_specific_copy_from_start:android.os.statsd.conscrypt.CertificateTransparencyVerificationReported)
1067 if (&from == this) return;
1068 Clear();
1069 MergeFrom(from);
1070 }
1071
IsInitialized() const1072 bool CertificateTransparencyVerificationReported::IsInitialized() const {
1073 return true;
1074 }
1075
InternalSwap(CertificateTransparencyVerificationReported * other)1076 void CertificateTransparencyVerificationReported::InternalSwap(CertificateTransparencyVerificationReported* other) {
1077 using std::swap;
1078 _internal_metadata_.InternalSwap(&other->_internal_metadata_);
1079 swap(_impl_._has_bits_[0], other->_impl_._has_bits_[0]);
1080 ::PROTOBUF_NAMESPACE_ID::internal::memswap<
1081 PROTOBUF_FIELD_OFFSET(CertificateTransparencyVerificationReported, _impl_.num_tls_scts_)
1082 + sizeof(CertificateTransparencyVerificationReported::_impl_.num_tls_scts_) // NOLINT
1083 - PROTOBUF_FIELD_OFFSET(CertificateTransparencyVerificationReported, _impl_.result_)>(
1084 reinterpret_cast<char*>(&_impl_.result_),
1085 reinterpret_cast<char*>(&other->_impl_.result_));
1086 }
1087
GetMetadata() const1088 ::PROTOBUF_NAMESPACE_ID::Metadata CertificateTransparencyVerificationReported::GetMetadata() const {
1089 return ::_pbi::AssignDescriptors(
1090 &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter, &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once,
1091 file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[1]);
1092 }
1093
1094 // ===================================================================
1095
1096 class ConscryptServiceUsed::_Internal {
1097 public:
1098 using HasBits = decltype(std::declval<ConscryptServiceUsed>()._impl_._has_bits_);
set_has_algorithm(HasBits * has_bits)1099 static void set_has_algorithm(HasBits* has_bits) {
1100 (*has_bits)[0] |= 1u;
1101 }
set_has_cipher(HasBits * has_bits)1102 static void set_has_cipher(HasBits* has_bits) {
1103 (*has_bits)[0] |= 2u;
1104 }
set_has_mode(HasBits * has_bits)1105 static void set_has_mode(HasBits* has_bits) {
1106 (*has_bits)[0] |= 4u;
1107 }
set_has_padding(HasBits * has_bits)1108 static void set_has_padding(HasBits* has_bits) {
1109 (*has_bits)[0] |= 8u;
1110 }
1111 };
1112
ConscryptServiceUsed(::PROTOBUF_NAMESPACE_ID::Arena * arena,bool is_message_owned)1113 ConscryptServiceUsed::ConscryptServiceUsed(::PROTOBUF_NAMESPACE_ID::Arena* arena,
1114 bool is_message_owned)
1115 : ::PROTOBUF_NAMESPACE_ID::Message(arena, is_message_owned) {
1116 SharedCtor(arena, is_message_owned);
1117 // @@protoc_insertion_point(arena_constructor:android.os.statsd.conscrypt.ConscryptServiceUsed)
1118 }
ConscryptServiceUsed(const ConscryptServiceUsed & from)1119 ConscryptServiceUsed::ConscryptServiceUsed(const ConscryptServiceUsed& from)
1120 : ::PROTOBUF_NAMESPACE_ID::Message() {
1121 ConscryptServiceUsed* const _this = this; (void)_this;
1122 new (&_impl_) Impl_{
1123 decltype(_impl_._has_bits_){from._impl_._has_bits_}
1124 , /*decltype(_impl_._cached_size_)*/{}
1125 , decltype(_impl_.algorithm_){}
1126 , decltype(_impl_.cipher_){}
1127 , decltype(_impl_.mode_){}
1128 , decltype(_impl_.padding_){}};
1129
1130 _internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
1131 ::memcpy(&_impl_.algorithm_, &from._impl_.algorithm_,
1132 static_cast<size_t>(reinterpret_cast<char*>(&_impl_.padding_) -
1133 reinterpret_cast<char*>(&_impl_.algorithm_)) + sizeof(_impl_.padding_));
1134 // @@protoc_insertion_point(copy_constructor:android.os.statsd.conscrypt.ConscryptServiceUsed)
1135 }
1136
SharedCtor(::_pb::Arena * arena,bool is_message_owned)1137 inline void ConscryptServiceUsed::SharedCtor(
1138 ::_pb::Arena* arena, bool is_message_owned) {
1139 (void)arena;
1140 (void)is_message_owned;
1141 new (&_impl_) Impl_{
1142 decltype(_impl_._has_bits_){}
1143 , /*decltype(_impl_._cached_size_)*/{}
1144 , decltype(_impl_.algorithm_){0}
1145 , decltype(_impl_.cipher_){0}
1146 , decltype(_impl_.mode_){0}
1147 , decltype(_impl_.padding_){0}
1148 };
1149 }
1150
~ConscryptServiceUsed()1151 ConscryptServiceUsed::~ConscryptServiceUsed() {
1152 // @@protoc_insertion_point(destructor:android.os.statsd.conscrypt.ConscryptServiceUsed)
1153 if (auto *arena = _internal_metadata_.DeleteReturnArena<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>()) {
1154 (void)arena;
1155 return;
1156 }
1157 SharedDtor();
1158 }
1159
SharedDtor()1160 inline void ConscryptServiceUsed::SharedDtor() {
1161 GOOGLE_DCHECK(GetArenaForAllocation() == nullptr);
1162 }
1163
SetCachedSize(int size) const1164 void ConscryptServiceUsed::SetCachedSize(int size) const {
1165 _impl_._cached_size_.Set(size);
1166 }
1167
Clear()1168 void ConscryptServiceUsed::Clear() {
1169 // @@protoc_insertion_point(message_clear_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1170 ::uint32_t cached_has_bits = 0;
1171 // Prevent compiler warnings about cached_has_bits being unused
1172 (void) cached_has_bits;
1173
1174 cached_has_bits = _impl_._has_bits_[0];
1175 if (cached_has_bits & 0x0000000fu) {
1176 ::memset(&_impl_.algorithm_, 0, static_cast<size_t>(
1177 reinterpret_cast<char*>(&_impl_.padding_) -
1178 reinterpret_cast<char*>(&_impl_.algorithm_)) + sizeof(_impl_.padding_));
1179 }
1180 _impl_._has_bits_.Clear();
1181 _internal_metadata_.Clear<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>();
1182 }
1183
_InternalParse(const char * ptr,::_pbi::ParseContext * ctx)1184 const char* ConscryptServiceUsed::_InternalParse(const char* ptr, ::_pbi::ParseContext* ctx) {
1185 #define CHK_(x) if (PROTOBUF_PREDICT_FALSE(!(x))) goto failure
1186 _Internal::HasBits has_bits{};
1187 while (!ctx->Done(&ptr)) {
1188 ::uint32_t tag;
1189 ptr = ::_pbi::ReadTag(ptr, &tag);
1190 switch (tag >> 3) {
1191 // optional .android.os.statsd.conscrypt.Algorithm algorithm = 1;
1192 case 1:
1193 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 8)) {
1194 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1195 CHK_(ptr);
1196 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Algorithm_IsValid(val))) {
1197 _internal_set_algorithm(static_cast<::android::os::statsd::conscrypt::Algorithm>(val));
1198 } else {
1199 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(1, val, mutable_unknown_fields());
1200 }
1201 } else {
1202 goto handle_unusual;
1203 }
1204 continue;
1205 // optional .android.os.statsd.conscrypt.Cipher cipher = 2;
1206 case 2:
1207 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 16)) {
1208 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1209 CHK_(ptr);
1210 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Cipher_IsValid(val))) {
1211 _internal_set_cipher(static_cast<::android::os::statsd::conscrypt::Cipher>(val));
1212 } else {
1213 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(2, val, mutable_unknown_fields());
1214 }
1215 } else {
1216 goto handle_unusual;
1217 }
1218 continue;
1219 // optional .android.os.statsd.conscrypt.Mode mode = 3;
1220 case 3:
1221 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 24)) {
1222 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1223 CHK_(ptr);
1224 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Mode_IsValid(val))) {
1225 _internal_set_mode(static_cast<::android::os::statsd::conscrypt::Mode>(val));
1226 } else {
1227 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(3, val, mutable_unknown_fields());
1228 }
1229 } else {
1230 goto handle_unusual;
1231 }
1232 continue;
1233 // optional .android.os.statsd.conscrypt.Padding padding = 4;
1234 case 4:
1235 if (PROTOBUF_PREDICT_TRUE(static_cast<::uint8_t>(tag) == 32)) {
1236 ::uint64_t val = ::PROTOBUF_NAMESPACE_ID::internal::ReadVarint64(&ptr);
1237 CHK_(ptr);
1238 if (PROTOBUF_PREDICT_TRUE(::android::os::statsd::conscrypt::Padding_IsValid(val))) {
1239 _internal_set_padding(static_cast<::android::os::statsd::conscrypt::Padding>(val));
1240 } else {
1241 ::PROTOBUF_NAMESPACE_ID::internal::WriteVarint(4, val, mutable_unknown_fields());
1242 }
1243 } else {
1244 goto handle_unusual;
1245 }
1246 continue;
1247 default:
1248 goto handle_unusual;
1249 } // switch
1250 handle_unusual:
1251 if ((tag == 0) || ((tag & 7) == 4)) {
1252 CHK_(ptr);
1253 ctx->SetLastTag(tag);
1254 goto message_done;
1255 }
1256 ptr = UnknownFieldParse(
1257 tag,
1258 _internal_metadata_.mutable_unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(),
1259 ptr, ctx);
1260 CHK_(ptr != nullptr);
1261 } // while
1262 message_done:
1263 _impl_._has_bits_.Or(has_bits);
1264 return ptr;
1265 failure:
1266 ptr = nullptr;
1267 goto message_done;
1268 #undef CHK_
1269 }
1270
_InternalSerialize(::uint8_t * target,::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream * stream) const1271 ::uint8_t* ConscryptServiceUsed::_InternalSerialize(
1272 ::uint8_t* target, ::PROTOBUF_NAMESPACE_ID::io::EpsCopyOutputStream* stream) const {
1273 // @@protoc_insertion_point(serialize_to_array_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1274 ::uint32_t cached_has_bits = 0;
1275 (void) cached_has_bits;
1276
1277 cached_has_bits = _impl_._has_bits_[0];
1278 // optional .android.os.statsd.conscrypt.Algorithm algorithm = 1;
1279 if (cached_has_bits & 0x00000001u) {
1280 target = stream->EnsureSpace(target);
1281 target = ::_pbi::WireFormatLite::WriteEnumToArray(
1282 1, this->_internal_algorithm(), target);
1283 }
1284
1285 // optional .android.os.statsd.conscrypt.Cipher cipher = 2;
1286 if (cached_has_bits & 0x00000002u) {
1287 target = stream->EnsureSpace(target);
1288 target = ::_pbi::WireFormatLite::WriteEnumToArray(
1289 2, this->_internal_cipher(), target);
1290 }
1291
1292 // optional .android.os.statsd.conscrypt.Mode mode = 3;
1293 if (cached_has_bits & 0x00000004u) {
1294 target = stream->EnsureSpace(target);
1295 target = ::_pbi::WireFormatLite::WriteEnumToArray(
1296 3, this->_internal_mode(), target);
1297 }
1298
1299 // optional .android.os.statsd.conscrypt.Padding padding = 4;
1300 if (cached_has_bits & 0x00000008u) {
1301 target = stream->EnsureSpace(target);
1302 target = ::_pbi::WireFormatLite::WriteEnumToArray(
1303 4, this->_internal_padding(), target);
1304 }
1305
1306 if (PROTOBUF_PREDICT_FALSE(_internal_metadata_.have_unknown_fields())) {
1307 target = ::_pbi::WireFormat::InternalSerializeUnknownFieldsToArray(
1308 _internal_metadata_.unknown_fields<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(::PROTOBUF_NAMESPACE_ID::UnknownFieldSet::default_instance), target, stream);
1309 }
1310 // @@protoc_insertion_point(serialize_to_array_end:android.os.statsd.conscrypt.ConscryptServiceUsed)
1311 return target;
1312 }
1313
ByteSizeLong() const1314 size_t ConscryptServiceUsed::ByteSizeLong() const {
1315 // @@protoc_insertion_point(message_byte_size_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1316 size_t total_size = 0;
1317
1318 ::uint32_t cached_has_bits = 0;
1319 // Prevent compiler warnings about cached_has_bits being unused
1320 (void) cached_has_bits;
1321
1322 cached_has_bits = _impl_._has_bits_[0];
1323 if (cached_has_bits & 0x0000000fu) {
1324 // optional .android.os.statsd.conscrypt.Algorithm algorithm = 1;
1325 if (cached_has_bits & 0x00000001u) {
1326 total_size += 1 +
1327 ::_pbi::WireFormatLite::EnumSize(this->_internal_algorithm());
1328 }
1329
1330 // optional .android.os.statsd.conscrypt.Cipher cipher = 2;
1331 if (cached_has_bits & 0x00000002u) {
1332 total_size += 1 +
1333 ::_pbi::WireFormatLite::EnumSize(this->_internal_cipher());
1334 }
1335
1336 // optional .android.os.statsd.conscrypt.Mode mode = 3;
1337 if (cached_has_bits & 0x00000004u) {
1338 total_size += 1 +
1339 ::_pbi::WireFormatLite::EnumSize(this->_internal_mode());
1340 }
1341
1342 // optional .android.os.statsd.conscrypt.Padding padding = 4;
1343 if (cached_has_bits & 0x00000008u) {
1344 total_size += 1 +
1345 ::_pbi::WireFormatLite::EnumSize(this->_internal_padding());
1346 }
1347
1348 }
1349 return MaybeComputeUnknownFieldsSize(total_size, &_impl_._cached_size_);
1350 }
1351
1352 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData ConscryptServiceUsed::_class_data_ = {
1353 ::PROTOBUF_NAMESPACE_ID::Message::CopyWithSourceCheck,
1354 ConscryptServiceUsed::MergeImpl
1355 };
GetClassData() const1356 const ::PROTOBUF_NAMESPACE_ID::Message::ClassData*ConscryptServiceUsed::GetClassData() const { return &_class_data_; }
1357
1358
MergeImpl(::PROTOBUF_NAMESPACE_ID::Message & to_msg,const::PROTOBUF_NAMESPACE_ID::Message & from_msg)1359 void ConscryptServiceUsed::MergeImpl(::PROTOBUF_NAMESPACE_ID::Message& to_msg, const ::PROTOBUF_NAMESPACE_ID::Message& from_msg) {
1360 auto* const _this = static_cast<ConscryptServiceUsed*>(&to_msg);
1361 auto& from = static_cast<const ConscryptServiceUsed&>(from_msg);
1362 // @@protoc_insertion_point(class_specific_merge_from_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1363 GOOGLE_DCHECK_NE(&from, _this);
1364 ::uint32_t cached_has_bits = 0;
1365 (void) cached_has_bits;
1366
1367 cached_has_bits = from._impl_._has_bits_[0];
1368 if (cached_has_bits & 0x0000000fu) {
1369 if (cached_has_bits & 0x00000001u) {
1370 _this->_impl_.algorithm_ = from._impl_.algorithm_;
1371 }
1372 if (cached_has_bits & 0x00000002u) {
1373 _this->_impl_.cipher_ = from._impl_.cipher_;
1374 }
1375 if (cached_has_bits & 0x00000004u) {
1376 _this->_impl_.mode_ = from._impl_.mode_;
1377 }
1378 if (cached_has_bits & 0x00000008u) {
1379 _this->_impl_.padding_ = from._impl_.padding_;
1380 }
1381 _this->_impl_._has_bits_[0] |= cached_has_bits;
1382 }
1383 _this->_internal_metadata_.MergeFrom<::PROTOBUF_NAMESPACE_ID::UnknownFieldSet>(from._internal_metadata_);
1384 }
1385
CopyFrom(const ConscryptServiceUsed & from)1386 void ConscryptServiceUsed::CopyFrom(const ConscryptServiceUsed& from) {
1387 // @@protoc_insertion_point(class_specific_copy_from_start:android.os.statsd.conscrypt.ConscryptServiceUsed)
1388 if (&from == this) return;
1389 Clear();
1390 MergeFrom(from);
1391 }
1392
IsInitialized() const1393 bool ConscryptServiceUsed::IsInitialized() const {
1394 return true;
1395 }
1396
InternalSwap(ConscryptServiceUsed * other)1397 void ConscryptServiceUsed::InternalSwap(ConscryptServiceUsed* other) {
1398 using std::swap;
1399 _internal_metadata_.InternalSwap(&other->_internal_metadata_);
1400 swap(_impl_._has_bits_[0], other->_impl_._has_bits_[0]);
1401 ::PROTOBUF_NAMESPACE_ID::internal::memswap<
1402 PROTOBUF_FIELD_OFFSET(ConscryptServiceUsed, _impl_.padding_)
1403 + sizeof(ConscryptServiceUsed::_impl_.padding_) // NOLINT
1404 - PROTOBUF_FIELD_OFFSET(ConscryptServiceUsed, _impl_.algorithm_)>(
1405 reinterpret_cast<char*>(&_impl_.algorithm_),
1406 reinterpret_cast<char*>(&other->_impl_.algorithm_));
1407 }
1408
GetMetadata() const1409 ::PROTOBUF_NAMESPACE_ID::Metadata ConscryptServiceUsed::GetMetadata() const {
1410 return ::_pbi::AssignDescriptors(
1411 &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_getter, &descriptor_table_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto_once,
1412 file_level_metadata_frameworks_2fproto_5flogging_2fstats_2fatoms_2fconscrypt_2fconscrypt_5fextension_5fatoms_2eproto[2]);
1413 }
1414 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 ::PROTOBUF_NAMESPACE_ID::internal::ExtensionIdentifier< ::android::os::statsd::Atom,
1415 ::PROTOBUF_NAMESPACE_ID::internal::MessageTypeTraits< ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged >, 11, false>
1416 certificate_transparency_log_list_state_changed(kCertificateTransparencyLogListStateChangedFieldNumber, ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged::default_instance(), nullptr);
1417 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 ::PROTOBUF_NAMESPACE_ID::internal::ExtensionIdentifier< ::android::os::statsd::Atom,
1418 ::PROTOBUF_NAMESPACE_ID::internal::MessageTypeTraits< ::android::os::statsd::conscrypt::ConscryptServiceUsed >, 11, false>
1419 conscrypt_service_used(kConscryptServiceUsedFieldNumber, ::android::os::statsd::conscrypt::ConscryptServiceUsed::default_instance(), nullptr);
1420 PROTOBUF_ATTRIBUTE_INIT_PRIORITY2 ::PROTOBUF_NAMESPACE_ID::internal::ExtensionIdentifier< ::android::os::statsd::Atom,
1421 ::PROTOBUF_NAMESPACE_ID::internal::MessageTypeTraits< ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported >, 11, false>
1422 certificate_transparency_verification_reported(kCertificateTransparencyVerificationReportedFieldNumber, ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported::default_instance(), nullptr);
1423
1424 // @@protoc_insertion_point(namespace_scope)
1425 } // namespace conscrypt
1426 } // namespace statsd
1427 } // namespace os
1428 } // namespace android
1429 PROTOBUF_NAMESPACE_OPEN
1430 template<> PROTOBUF_NOINLINE ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged*
CreateMaybeMessage(Arena * arena)1431 Arena::CreateMaybeMessage< ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged >(Arena* arena) {
1432 return Arena::CreateMessageInternal< ::android::os::statsd::conscrypt::CertificateTransparencyLogListStateChanged >(arena);
1433 }
1434 template<> PROTOBUF_NOINLINE ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported*
CreateMaybeMessage(Arena * arena)1435 Arena::CreateMaybeMessage< ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported >(Arena* arena) {
1436 return Arena::CreateMessageInternal< ::android::os::statsd::conscrypt::CertificateTransparencyVerificationReported >(arena);
1437 }
1438 template<> PROTOBUF_NOINLINE ::android::os::statsd::conscrypt::ConscryptServiceUsed*
CreateMaybeMessage(Arena * arena)1439 Arena::CreateMaybeMessage< ::android::os::statsd::conscrypt::ConscryptServiceUsed >(Arena* arena) {
1440 return Arena::CreateMessageInternal< ::android::os::statsd::conscrypt::ConscryptServiceUsed >(arena);
1441 }
1442 PROTOBUF_NAMESPACE_CLOSE
1443
1444 // @@protoc_insertion_point(global_scope)
1445 #include <google/protobuf/port_undef.inc>
1446