// DO NOT EDIT. // swift-format-ignore-file // // Generated by the Swift generator plugin for the protocol buffer compiler. // Source: securemessage.proto // // For information on using the generated types, please see the documentation: // https://github.com/apple/swift-protobuf/ // Copyright 2020 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // Proto definitions for SecureMessage format import Foundation import SwiftProtobuf // If the compiler emits an error on this type, it is because this file // was generated by a version of the `protoc` Swift plug-in that is // incompatible with the version of SwiftProtobuf to which you are linking. // Please ensure that you are building against the same version of the API // that was used to generate this file. fileprivate struct _GeneratedWithProtocGenSwiftVersion: SwiftProtobuf.ProtobufAPIVersionCheck { struct _2: SwiftProtobuf.ProtobufAPIVersion_2 {} typealias Version = _2 } /// Supported "signature" schemes (both symmetric key and public key based) enum Securemessage_SigScheme: SwiftProtobuf.Enum { typealias RawValue = Int case hmacSha256 // = 1 case ecdsaP256Sha256 // = 2 /// Not recommended -- use ECDSA_P256_SHA256 instead case rsa2048Sha256 // = 3 init() { self = .hmacSha256 } init?(rawValue: Int) { switch rawValue { case 1: self = .hmacSha256 case 2: self = .ecdsaP256Sha256 case 3: self = .rsa2048Sha256 default: return nil } } var rawValue: Int { switch self { case .hmacSha256: return 1 case .ecdsaP256Sha256: return 2 case .rsa2048Sha256: return 3 } } } #if swift(>=4.2) extension Securemessage_SigScheme: CaseIterable { // Support synthesized by the compiler. } #endif // swift(>=4.2) /// Supported encryption schemes enum Securemessage_EncScheme: SwiftProtobuf.Enum { typealias RawValue = Int /// No encryption case none // = 1 case aes256Cbc // = 2 init() { self = .none } init?(rawValue: Int) { switch rawValue { case 1: self = .none case 2: self = .aes256Cbc default: return nil } } var rawValue: Int { switch self { case .none: return 1 case .aes256Cbc: return 2 } } } #if swift(>=4.2) extension Securemessage_EncScheme: CaseIterable { // Support synthesized by the compiler. } #endif // swift(>=4.2) /// A list of supported public key types enum Securemessage_PublicKeyType: SwiftProtobuf.Enum { typealias RawValue = Int case ecP256 // = 1 case rsa2048 // = 2 /// 2048-bit MODP group 14, from RFC 3526 case dh2048Modp // = 3 init() { self = .ecP256 } init?(rawValue: Int) { switch rawValue { case 1: self = .ecP256 case 2: self = .rsa2048 case 3: self = .dh2048Modp default: return nil } } var rawValue: Int { switch self { case .ecP256: return 1 case .rsa2048: return 2 case .dh2048Modp: return 3 } } } #if swift(>=4.2) extension Securemessage_PublicKeyType: CaseIterable { // Support synthesized by the compiler. } #endif // swift(>=4.2) struct Securemessage_SecureMessage { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. /// Must contain a HeaderAndBody message var headerAndBody: Data { get {return _headerAndBody ?? Data()} set {_headerAndBody = newValue} } /// Returns true if `headerAndBody` has been explicitly set. var hasHeaderAndBody: Bool {return self._headerAndBody != nil} /// Clears the value of `headerAndBody`. Subsequent reads from it will return its default value. mutating func clearHeaderAndBody() {self._headerAndBody = nil} /// Signature of header_and_body var signature: Data { get {return _signature ?? Data()} set {_signature = newValue} } /// Returns true if `signature` has been explicitly set. var hasSignature: Bool {return self._signature != nil} /// Clears the value of `signature`. Subsequent reads from it will return its default value. mutating func clearSignature() {self._signature = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _headerAndBody: Data? = nil fileprivate var _signature: Data? = nil } struct Securemessage_Header { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. var signatureScheme: Securemessage_SigScheme { get {return _signatureScheme ?? .hmacSha256} set {_signatureScheme = newValue} } /// Returns true if `signatureScheme` has been explicitly set. var hasSignatureScheme: Bool {return self._signatureScheme != nil} /// Clears the value of `signatureScheme`. Subsequent reads from it will return its default value. mutating func clearSignatureScheme() {self._signatureScheme = nil} var encryptionScheme: Securemessage_EncScheme { get {return _encryptionScheme ?? .none} set {_encryptionScheme = newValue} } /// Returns true if `encryptionScheme` has been explicitly set. var hasEncryptionScheme: Bool {return self._encryptionScheme != nil} /// Clears the value of `encryptionScheme`. Subsequent reads from it will return its default value. mutating func clearEncryptionScheme() {self._encryptionScheme = nil} /// Identifies the verification key var verificationKeyID: Data { get {return _verificationKeyID ?? Data()} set {_verificationKeyID = newValue} } /// Returns true if `verificationKeyID` has been explicitly set. var hasVerificationKeyID: Bool {return self._verificationKeyID != nil} /// Clears the value of `verificationKeyID`. Subsequent reads from it will return its default value. mutating func clearVerificationKeyID() {self._verificationKeyID = nil} /// Identifies the decryption key var decryptionKeyID: Data { get {return _decryptionKeyID ?? Data()} set {_decryptionKeyID = newValue} } /// Returns true if `decryptionKeyID` has been explicitly set. var hasDecryptionKeyID: Bool {return self._decryptionKeyID != nil} /// Clears the value of `decryptionKeyID`. Subsequent reads from it will return its default value. mutating func clearDecryptionKeyID() {self._decryptionKeyID = nil} /// Encryption may use an IV var iv: Data { get {return _iv ?? Data()} set {_iv = newValue} } /// Returns true if `iv` has been explicitly set. var hasIv: Bool {return self._iv != nil} /// Clears the value of `iv`. Subsequent reads from it will return its default value. mutating func clearIv() {self._iv = nil} /// Arbitrary per-protocol public data, to be sent with the plain-text header var publicMetadata: Data { get {return _publicMetadata ?? Data()} set {_publicMetadata = newValue} } /// Returns true if `publicMetadata` has been explicitly set. var hasPublicMetadata: Bool {return self._publicMetadata != nil} /// Clears the value of `publicMetadata`. Subsequent reads from it will return its default value. mutating func clearPublicMetadata() {self._publicMetadata = nil} /// The length of some associated data this is not sent in this SecureMessage, /// but which will be bound to the signature. var associatedDataLength: UInt32 { get {return _associatedDataLength ?? 0} set {_associatedDataLength = newValue} } /// Returns true if `associatedDataLength` has been explicitly set. var hasAssociatedDataLength: Bool {return self._associatedDataLength != nil} /// Clears the value of `associatedDataLength`. Subsequent reads from it will return its default value. mutating func clearAssociatedDataLength() {self._associatedDataLength = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _signatureScheme: Securemessage_SigScheme? = nil fileprivate var _encryptionScheme: Securemessage_EncScheme? = nil fileprivate var _verificationKeyID: Data? = nil fileprivate var _decryptionKeyID: Data? = nil fileprivate var _iv: Data? = nil fileprivate var _publicMetadata: Data? = nil fileprivate var _associatedDataLength: UInt32? = nil } struct Securemessage_HeaderAndBody { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. /// Public data about this message (to be bound in the signature) var header: Securemessage_Header { get {return _header ?? Securemessage_Header()} set {_header = newValue} } /// Returns true if `header` has been explicitly set. var hasHeader: Bool {return self._header != nil} /// Clears the value of `header`. Subsequent reads from it will return its default value. mutating func clearHeader() {self._header = nil} /// Payload data var body: Data { get {return _body ?? Data()} set {_body = newValue} } /// Returns true if `body` has been explicitly set. var hasBody: Bool {return self._body != nil} /// Clears the value of `body`. Subsequent reads from it will return its default value. mutating func clearBody() {self._body = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _header: Securemessage_Header? = nil fileprivate var _body: Data? = nil } /// Must be kept wire-format compatible with HeaderAndBody. Provides the /// SecureMessage code with a consistent wire-format representation that /// remains stable irrespective of protobuf implementation choices. This /// low-level representation of a HeaderAndBody should not be used by /// any code outside of the SecureMessage library implementation/tests. struct Securemessage_HeaderAndBodyInternal { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. /// A raw (wire-format) byte encoding of a Header, suitable for hashing var header: Data { get {return _header ?? Data()} set {_header = newValue} } /// Returns true if `header` has been explicitly set. var hasHeader: Bool {return self._header != nil} /// Clears the value of `header`. Subsequent reads from it will return its default value. mutating func clearHeader() {self._header = nil} /// Payload data var body: Data { get {return _body ?? Data()} set {_body = newValue} } /// Returns true if `body` has been explicitly set. var hasBody: Bool {return self._body != nil} /// Clears the value of `body`. Subsequent reads from it will return its default value. mutating func clearBody() {self._body = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _header: Data? = nil fileprivate var _body: Data? = nil } /// A convenience proto for encoding NIST P-256 elliptic curve public keys struct Securemessage_EcP256PublicKey { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. /// x and y are encoded in big-endian two's complement (slightly wasteful) /// Client MUST verify (x,y) is a valid point on NIST P256 var x: Data { get {return _x ?? Data()} set {_x = newValue} } /// Returns true if `x` has been explicitly set. var hasX: Bool {return self._x != nil} /// Clears the value of `x`. Subsequent reads from it will return its default value. mutating func clearX() {self._x = nil} var y: Data { get {return _y ?? Data()} set {_y = newValue} } /// Returns true if `y` has been explicitly set. var hasY: Bool {return self._y != nil} /// Clears the value of `y`. Subsequent reads from it will return its default value. mutating func clearY() {self._y = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _x: Data? = nil fileprivate var _y: Data? = nil } /// A convenience proto for encoding RSA public keys with small exponents struct Securemessage_SimpleRsaPublicKey { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. /// Encoded in big-endian two's complement var n: Data { get {return _n ?? Data()} set {_n = newValue} } /// Returns true if `n` has been explicitly set. var hasN: Bool {return self._n != nil} /// Clears the value of `n`. Subsequent reads from it will return its default value. mutating func clearN() {self._n = nil} var e: Int32 { get {return _e ?? 65537} set {_e = newValue} } /// Returns true if `e` has been explicitly set. var hasE: Bool {return self._e != nil} /// Clears the value of `e`. Subsequent reads from it will return its default value. mutating func clearE() {self._e = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _n: Data? = nil fileprivate var _e: Int32? = nil } /// A convenience proto for encoding Diffie-Hellman public keys, /// for use only when Elliptic Curve based key exchanges are not possible. /// (Note that the group parameters must be specified separately) struct Securemessage_DhPublicKey { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. /// Big-endian two's complement encoded group element var y: Data { get {return _y ?? Data()} set {_y = newValue} } /// Returns true if `y` has been explicitly set. var hasY: Bool {return self._y != nil} /// Clears the value of `y`. Subsequent reads from it will return its default value. mutating func clearY() {self._y = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _y: Data? = nil } struct Securemessage_GenericPublicKey { // SwiftProtobuf.Message conformance is added in an extension below. See the // `Message` and `Message+*Additions` files in the SwiftProtobuf library for // methods supported on all messages. var type: Securemessage_PublicKeyType { get {return _type ?? .ecP256} set {_type = newValue} } /// Returns true if `type` has been explicitly set. var hasType: Bool {return self._type != nil} /// Clears the value of `type`. Subsequent reads from it will return its default value. mutating func clearType() {self._type = nil} var ecP256PublicKey: Securemessage_EcP256PublicKey { get {return _ecP256PublicKey ?? Securemessage_EcP256PublicKey()} set {_ecP256PublicKey = newValue} } /// Returns true if `ecP256PublicKey` has been explicitly set. var hasEcP256PublicKey: Bool {return self._ecP256PublicKey != nil} /// Clears the value of `ecP256PublicKey`. Subsequent reads from it will return its default value. mutating func clearEcP256PublicKey() {self._ecP256PublicKey = nil} var rsa2048PublicKey: Securemessage_SimpleRsaPublicKey { get {return _rsa2048PublicKey ?? Securemessage_SimpleRsaPublicKey()} set {_rsa2048PublicKey = newValue} } /// Returns true if `rsa2048PublicKey` has been explicitly set. var hasRsa2048PublicKey: Bool {return self._rsa2048PublicKey != nil} /// Clears the value of `rsa2048PublicKey`. Subsequent reads from it will return its default value. mutating func clearRsa2048PublicKey() {self._rsa2048PublicKey = nil} /// Use only as a last resort var dh2048PublicKey: Securemessage_DhPublicKey { get {return _dh2048PublicKey ?? Securemessage_DhPublicKey()} set {_dh2048PublicKey = newValue} } /// Returns true if `dh2048PublicKey` has been explicitly set. var hasDh2048PublicKey: Bool {return self._dh2048PublicKey != nil} /// Clears the value of `dh2048PublicKey`. Subsequent reads from it will return its default value. mutating func clearDh2048PublicKey() {self._dh2048PublicKey = nil} var unknownFields = SwiftProtobuf.UnknownStorage() init() {} fileprivate var _type: Securemessage_PublicKeyType? = nil fileprivate var _ecP256PublicKey: Securemessage_EcP256PublicKey? = nil fileprivate var _rsa2048PublicKey: Securemessage_SimpleRsaPublicKey? = nil fileprivate var _dh2048PublicKey: Securemessage_DhPublicKey? = nil } #if swift(>=5.5) && canImport(_Concurrency) extension Securemessage_SigScheme: @unchecked Sendable {} extension Securemessage_EncScheme: @unchecked Sendable {} extension Securemessage_PublicKeyType: @unchecked Sendable {} extension Securemessage_SecureMessage: @unchecked Sendable {} extension Securemessage_Header: @unchecked Sendable {} extension Securemessage_HeaderAndBody: @unchecked Sendable {} extension Securemessage_HeaderAndBodyInternal: @unchecked Sendable {} extension Securemessage_EcP256PublicKey: @unchecked Sendable {} extension Securemessage_SimpleRsaPublicKey: @unchecked Sendable {} extension Securemessage_DhPublicKey: @unchecked Sendable {} extension Securemessage_GenericPublicKey: @unchecked Sendable {} #endif // swift(>=5.5) && canImport(_Concurrency) // MARK: - Code below here is support for the SwiftProtobuf runtime. fileprivate let _protobuf_package = "securemessage" extension Securemessage_SigScheme: SwiftProtobuf._ProtoNameProviding { static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "HMAC_SHA256"), 2: .same(proto: "ECDSA_P256_SHA256"), 3: .same(proto: "RSA2048_SHA256"), ] } extension Securemessage_EncScheme: SwiftProtobuf._ProtoNameProviding { static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "NONE"), 2: .same(proto: "AES_256_CBC"), ] } extension Securemessage_PublicKeyType: SwiftProtobuf._ProtoNameProviding { static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "EC_P256"), 2: .same(proto: "RSA2048"), 3: .same(proto: "DH2048_MODP"), ] } extension Securemessage_SecureMessage: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".SecureMessage" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .standard(proto: "header_and_body"), 2: .same(proto: "signature"), ] public var isInitialized: Bool { if self._headerAndBody == nil {return false} if self._signature == nil {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularBytesField(value: &self._headerAndBody) }() case 2: try { try decoder.decodeSingularBytesField(value: &self._signature) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._headerAndBody { try visitor.visitSingularBytesField(value: v, fieldNumber: 1) } }() try { if let v = self._signature { try visitor.visitSingularBytesField(value: v, fieldNumber: 2) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_SecureMessage, rhs: Securemessage_SecureMessage) -> Bool { if lhs._headerAndBody != rhs._headerAndBody {return false} if lhs._signature != rhs._signature {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_Header: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".Header" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .standard(proto: "signature_scheme"), 2: .standard(proto: "encryption_scheme"), 3: .standard(proto: "verification_key_id"), 4: .standard(proto: "decryption_key_id"), 5: .same(proto: "iv"), 6: .standard(proto: "public_metadata"), 7: .standard(proto: "associated_data_length"), ] public var isInitialized: Bool { if self._signatureScheme == nil {return false} if self._encryptionScheme == nil {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularEnumField(value: &self._signatureScheme) }() case 2: try { try decoder.decodeSingularEnumField(value: &self._encryptionScheme) }() case 3: try { try decoder.decodeSingularBytesField(value: &self._verificationKeyID) }() case 4: try { try decoder.decodeSingularBytesField(value: &self._decryptionKeyID) }() case 5: try { try decoder.decodeSingularBytesField(value: &self._iv) }() case 6: try { try decoder.decodeSingularBytesField(value: &self._publicMetadata) }() case 7: try { try decoder.decodeSingularUInt32Field(value: &self._associatedDataLength) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._signatureScheme { try visitor.visitSingularEnumField(value: v, fieldNumber: 1) } }() try { if let v = self._encryptionScheme { try visitor.visitSingularEnumField(value: v, fieldNumber: 2) } }() try { if let v = self._verificationKeyID { try visitor.visitSingularBytesField(value: v, fieldNumber: 3) } }() try { if let v = self._decryptionKeyID { try visitor.visitSingularBytesField(value: v, fieldNumber: 4) } }() try { if let v = self._iv { try visitor.visitSingularBytesField(value: v, fieldNumber: 5) } }() try { if let v = self._publicMetadata { try visitor.visitSingularBytesField(value: v, fieldNumber: 6) } }() try { if let v = self._associatedDataLength { try visitor.visitSingularUInt32Field(value: v, fieldNumber: 7) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_Header, rhs: Securemessage_Header) -> Bool { if lhs._signatureScheme != rhs._signatureScheme {return false} if lhs._encryptionScheme != rhs._encryptionScheme {return false} if lhs._verificationKeyID != rhs._verificationKeyID {return false} if lhs._decryptionKeyID != rhs._decryptionKeyID {return false} if lhs._iv != rhs._iv {return false} if lhs._publicMetadata != rhs._publicMetadata {return false} if lhs._associatedDataLength != rhs._associatedDataLength {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_HeaderAndBody: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".HeaderAndBody" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "header"), 2: .same(proto: "body"), ] public var isInitialized: Bool { if self._header == nil {return false} if self._body == nil {return false} if let v = self._header, !v.isInitialized {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularMessageField(value: &self._header) }() case 2: try { try decoder.decodeSingularBytesField(value: &self._body) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._header { try visitor.visitSingularMessageField(value: v, fieldNumber: 1) } }() try { if let v = self._body { try visitor.visitSingularBytesField(value: v, fieldNumber: 2) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_HeaderAndBody, rhs: Securemessage_HeaderAndBody) -> Bool { if lhs._header != rhs._header {return false} if lhs._body != rhs._body {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_HeaderAndBodyInternal: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".HeaderAndBodyInternal" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "header"), 2: .same(proto: "body"), ] public var isInitialized: Bool { if self._header == nil {return false} if self._body == nil {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularBytesField(value: &self._header) }() case 2: try { try decoder.decodeSingularBytesField(value: &self._body) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._header { try visitor.visitSingularBytesField(value: v, fieldNumber: 1) } }() try { if let v = self._body { try visitor.visitSingularBytesField(value: v, fieldNumber: 2) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_HeaderAndBodyInternal, rhs: Securemessage_HeaderAndBodyInternal) -> Bool { if lhs._header != rhs._header {return false} if lhs._body != rhs._body {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_EcP256PublicKey: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".EcP256PublicKey" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "x"), 2: .same(proto: "y"), ] public var isInitialized: Bool { if self._x == nil {return false} if self._y == nil {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularBytesField(value: &self._x) }() case 2: try { try decoder.decodeSingularBytesField(value: &self._y) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._x { try visitor.visitSingularBytesField(value: v, fieldNumber: 1) } }() try { if let v = self._y { try visitor.visitSingularBytesField(value: v, fieldNumber: 2) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_EcP256PublicKey, rhs: Securemessage_EcP256PublicKey) -> Bool { if lhs._x != rhs._x {return false} if lhs._y != rhs._y {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_SimpleRsaPublicKey: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".SimpleRsaPublicKey" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "n"), 2: .same(proto: "e"), ] public var isInitialized: Bool { if self._n == nil {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularBytesField(value: &self._n) }() case 2: try { try decoder.decodeSingularInt32Field(value: &self._e) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._n { try visitor.visitSingularBytesField(value: v, fieldNumber: 1) } }() try { if let v = self._e { try visitor.visitSingularInt32Field(value: v, fieldNumber: 2) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_SimpleRsaPublicKey, rhs: Securemessage_SimpleRsaPublicKey) -> Bool { if lhs._n != rhs._n {return false} if lhs._e != rhs._e {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_DhPublicKey: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".DhPublicKey" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "y"), ] public var isInitialized: Bool { if self._y == nil {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularBytesField(value: &self._y) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._y { try visitor.visitSingularBytesField(value: v, fieldNumber: 1) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_DhPublicKey, rhs: Securemessage_DhPublicKey) -> Bool { if lhs._y != rhs._y {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } } extension Securemessage_GenericPublicKey: SwiftProtobuf.Message, SwiftProtobuf._MessageImplementationBase, SwiftProtobuf._ProtoNameProviding { static let protoMessageName: String = _protobuf_package + ".GenericPublicKey" static let _protobuf_nameMap: SwiftProtobuf._NameMap = [ 1: .same(proto: "type"), 2: .standard(proto: "ec_p256_public_key"), 3: .standard(proto: "rsa2048_public_key"), 4: .standard(proto: "dh2048_public_key"), ] public var isInitialized: Bool { if self._type == nil {return false} if let v = self._ecP256PublicKey, !v.isInitialized {return false} if let v = self._rsa2048PublicKey, !v.isInitialized {return false} if let v = self._dh2048PublicKey, !v.isInitialized {return false} return true } mutating func decodeMessage(decoder: inout D) throws { while let fieldNumber = try decoder.nextFieldNumber() { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every case branch when no optimizations are // enabled. https://github.com/apple/swift-protobuf/issues/1034 switch fieldNumber { case 1: try { try decoder.decodeSingularEnumField(value: &self._type) }() case 2: try { try decoder.decodeSingularMessageField(value: &self._ecP256PublicKey) }() case 3: try { try decoder.decodeSingularMessageField(value: &self._rsa2048PublicKey) }() case 4: try { try decoder.decodeSingularMessageField(value: &self._dh2048PublicKey) }() default: break } } } func traverse(visitor: inout V) throws { // The use of inline closures is to circumvent an issue where the compiler // allocates stack space for every if/case branch local when no optimizations // are enabled. https://github.com/apple/swift-protobuf/issues/1034 and // https://github.com/apple/swift-protobuf/issues/1182 try { if let v = self._type { try visitor.visitSingularEnumField(value: v, fieldNumber: 1) } }() try { if let v = self._ecP256PublicKey { try visitor.visitSingularMessageField(value: v, fieldNumber: 2) } }() try { if let v = self._rsa2048PublicKey { try visitor.visitSingularMessageField(value: v, fieldNumber: 3) } }() try { if let v = self._dh2048PublicKey { try visitor.visitSingularMessageField(value: v, fieldNumber: 4) } }() try unknownFields.traverse(visitor: &visitor) } static func ==(lhs: Securemessage_GenericPublicKey, rhs: Securemessage_GenericPublicKey) -> Bool { if lhs._type != rhs._type {return false} if lhs._ecP256PublicKey != rhs._ecP256PublicKey {return false} if lhs._rsa2048PublicKey != rhs._rsa2048PublicKey {return false} if lhs._dh2048PublicKey != rhs._dh2048PublicKey {return false} if lhs.unknownFields != rhs.unknownFields {return false} return true } }