Index: chrome/browser/sync/protocol/Debug/obj/global_intermediate/protoc_out/chrome/browser/sync/protocol/encryption.pb.cc |
diff --git a/chrome/browser/sync/protocol/Debug/obj/global_intermediate/protoc_out/chrome/browser/sync/protocol/encryption.pb.cc b/chrome/browser/sync/protocol/Debug/obj/global_intermediate/protoc_out/chrome/browser/sync/protocol/encryption.pb.cc |
new file mode 100755 |
index 0000000000000000000000000000000000000000..3dae44f4072acbf5b20c08a0e69433bb492f74a1 |
--- /dev/null |
+++ b/chrome/browser/sync/protocol/Debug/obj/global_intermediate/protoc_out/chrome/browser/sync/protocol/encryption.pb.cc |
@@ -0,0 +1,261 @@ |
+// Generated by the protocol buffer compiler. DO NOT EDIT! |
+ |
+#define INTERNAL_SUPPRESS_PROTOBUF_FIELD_DEPRECATION |
+#include "encryption.pb.h" |
+ |
+#include <algorithm> |
+ |
+#include <google/protobuf/stubs/once.h> |
+#include <google/protobuf/io/coded_stream.h> |
+#include <google/protobuf/wire_format_lite_inl.h> |
+// @@protoc_insertion_point(includes) |
+ |
+namespace sync_pb { |
+ |
+void protobuf_ShutdownFile_encryption_2eproto() { |
+ delete EncryptedData::default_instance_; |
+} |
+ |
+void protobuf_AddDesc_encryption_2eproto() { |
+ static bool already_here = false; |
+ if (already_here) return; |
+ already_here = true; |
+ GOOGLE_PROTOBUF_VERIFY_VERSION; |
+ |
+ EncryptedData::default_instance_ = new EncryptedData(); |
+ EncryptedData::default_instance_->InitAsDefaultInstance(); |
+ ::google::protobuf::internal::OnShutdown(&protobuf_ShutdownFile_encryption_2eproto); |
+} |
+ |
+// Force AddDescriptors() to be called at static initialization time. |
+struct StaticDescriptorInitializer_encryption_2eproto { |
+ StaticDescriptorInitializer_encryption_2eproto() { |
+ protobuf_AddDesc_encryption_2eproto(); |
+ } |
+} static_descriptor_initializer_encryption_2eproto_; |
+ |
+ |
+// =================================================================== |
+ |
+const ::std::string EncryptedData::_default_key_name_; |
+const ::std::string EncryptedData::_default_blob_; |
+#ifndef _MSC_VER |
+const int EncryptedData::kKeyNameFieldNumber; |
+const int EncryptedData::kBlobFieldNumber; |
+#endif // !_MSC_VER |
+ |
+EncryptedData::EncryptedData() |
+ : ::google::protobuf::MessageLite() { |
+ SharedCtor(); |
+} |
+ |
+void EncryptedData::InitAsDefaultInstance() { |
+} |
+ |
+EncryptedData::EncryptedData(const EncryptedData& from) |
+ : ::google::protobuf::MessageLite() { |
+ SharedCtor(); |
+ MergeFrom(from); |
+} |
+ |
+void EncryptedData::SharedCtor() { |
+ _cached_size_ = 0; |
+ key_name_ = const_cast< ::std::string*>(&_default_key_name_); |
+ blob_ = const_cast< ::std::string*>(&_default_blob_); |
+ ::memset(_has_bits_, 0, sizeof(_has_bits_)); |
+} |
+ |
+EncryptedData::~EncryptedData() { |
+ SharedDtor(); |
+} |
+ |
+void EncryptedData::SharedDtor() { |
+ if (key_name_ != &_default_key_name_) { |
+ delete key_name_; |
+ } |
+ if (blob_ != &_default_blob_) { |
+ delete blob_; |
+ } |
+ if (this != default_instance_) { |
+ } |
+} |
+ |
+void EncryptedData::SetCachedSize(int size) const { |
+ GOOGLE_SAFE_CONCURRENT_WRITES_BEGIN(); |
+ _cached_size_ = size; |
+ GOOGLE_SAFE_CONCURRENT_WRITES_END(); |
+} |
+const EncryptedData& EncryptedData::default_instance() { |
+ if (default_instance_ == NULL) protobuf_AddDesc_encryption_2eproto(); return *default_instance_; |
+} |
+ |
+EncryptedData* EncryptedData::default_instance_ = NULL; |
+ |
+EncryptedData* EncryptedData::New() const { |
+ return new EncryptedData; |
+} |
+ |
+void EncryptedData::Clear() { |
+ if (_has_bits_[0 / 32] & (0xffu << (0 % 32))) { |
+ if (_has_bit(0)) { |
+ if (key_name_ != &_default_key_name_) { |
+ key_name_->clear(); |
+ } |
+ } |
+ if (_has_bit(1)) { |
+ if (blob_ != &_default_blob_) { |
+ blob_->clear(); |
+ } |
+ } |
+ } |
+ ::memset(_has_bits_, 0, sizeof(_has_bits_)); |
+ mutable_unknown_fields()->Clear(); |
+} |
+ |
+bool EncryptedData::MergePartialFromCodedStream( |
+ ::google::protobuf::io::CodedInputStream* input) { |
+#define DO_(EXPRESSION) if (!(EXPRESSION)) return false |
+ ::google::protobuf::uint32 tag; |
+ while ((tag = input->ReadTag()) != 0) { |
+ switch (::google::protobuf::internal::WireFormatLite::GetTagFieldNumber(tag)) { |
+ // optional string key_name = 1; |
+ case 1: { |
+ if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == |
+ ::google::protobuf::internal::WireFormatLite::WIRETYPE_LENGTH_DELIMITED) { |
+ DO_(::google::protobuf::internal::WireFormatLite::ReadString( |
+ input, this->mutable_key_name())); |
+ } else { |
+ goto handle_uninterpreted; |
+ } |
+ if (input->ExpectTag(18)) goto parse_blob; |
+ break; |
+ } |
+ |
+ // optional string blob = 2; |
+ case 2: { |
+ if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == |
+ ::google::protobuf::internal::WireFormatLite::WIRETYPE_LENGTH_DELIMITED) { |
+ parse_blob: |
+ DO_(::google::protobuf::internal::WireFormatLite::ReadString( |
+ input, this->mutable_blob())); |
+ } else { |
+ goto handle_uninterpreted; |
+ } |
+ if (input->ExpectAtEnd()) return true; |
+ break; |
+ } |
+ |
+ default: { |
+ handle_uninterpreted: |
+ if (::google::protobuf::internal::WireFormatLite::GetTagWireType(tag) == |
+ ::google::protobuf::internal::WireFormatLite::WIRETYPE_END_GROUP) { |
+ return true; |
+ } |
+ DO_(::google::protobuf::internal::WireFormatLite::SkipField(input, tag, mutable_unknown_fields())); |
+ break; |
+ } |
+ } |
+ } |
+ return true; |
+#undef DO_ |
+} |
+ |
+void EncryptedData::SerializeWithCachedSizes( |
+ ::google::protobuf::io::CodedOutputStream* output) const { |
+ // optional string key_name = 1; |
+ if (_has_bit(0)) { |
+ ::google::protobuf::internal::WireFormatLite::WriteString( |
+ 1, this->key_name(), output); |
+ } |
+ |
+ // optional string blob = 2; |
+ if (_has_bit(1)) { |
+ ::google::protobuf::internal::WireFormatLite::WriteString( |
+ 2, this->blob(), output); |
+ } |
+ |
+ if (!unknown_fields().empty()) { |
+ ::google::protobuf::internal::WireFormatLite::SerializeUnknownFields( |
+ unknown_fields(), output); |
+ } |
+} |
+ |
+int EncryptedData::ByteSize() const { |
+ int total_size = 0; |
+ |
+ if (_has_bits_[0 / 32] & (0xffu << (0 % 32))) { |
+ // optional string key_name = 1; |
+ if (has_key_name()) { |
+ total_size += 1 + |
+ ::google::protobuf::internal::WireFormatLite::StringSize( |
+ this->key_name()); |
+ } |
+ |
+ // optional string blob = 2; |
+ if (has_blob()) { |
+ total_size += 1 + |
+ ::google::protobuf::internal::WireFormatLite::StringSize( |
+ this->blob()); |
+ } |
+ |
+ } |
+ if (!unknown_fields().empty()) { |
+ total_size += |
+ ::google::protobuf::internal::WireFormatLite::ComputeUnknownFieldsSize( |
+ unknown_fields()); |
+ } |
+ GOOGLE_SAFE_CONCURRENT_WRITES_BEGIN(); |
+ _cached_size_ = total_size; |
+ GOOGLE_SAFE_CONCURRENT_WRITES_END(); |
+ return total_size; |
+} |
+ |
+void EncryptedData::CheckTypeAndMergeFrom( |
+ const ::google::protobuf::MessageLite& from) { |
+ MergeFrom(*::google::protobuf::down_cast<const EncryptedData*>(&from)); |
+} |
+ |
+void EncryptedData::MergeFrom(const EncryptedData& from) { |
+ GOOGLE_CHECK_NE(&from, this); |
+ if (from._has_bits_[0 / 32] & (0xffu << (0 % 32))) { |
+ if (from._has_bit(0)) { |
+ set_key_name(from.key_name()); |
+ } |
+ if (from._has_bit(1)) { |
+ set_blob(from.blob()); |
+ } |
+ } |
+ mutable_unknown_fields()->MergeFrom(from.unknown_fields()); |
+} |
+ |
+void EncryptedData::CopyFrom(const EncryptedData& from) { |
+ if (&from == this) return; |
+ Clear(); |
+ MergeFrom(from); |
+} |
+ |
+bool EncryptedData::IsInitialized() const { |
+ |
+ return true; |
+} |
+ |
+void EncryptedData::Swap(EncryptedData* other) { |
+ if (other != this) { |
+ std::swap(key_name_, other->key_name_); |
+ std::swap(blob_, other->blob_); |
+ std::swap(_has_bits_[0], other->_has_bits_[0]); |
+ _unknown_fields_.Swap(&other->_unknown_fields_); |
+ std::swap(_cached_size_, other->_cached_size_); |
+ } |
+} |
+ |
+::std::string EncryptedData::GetTypeName() const { |
+ return "sync_pb.EncryptedData"; |
+} |
+ |
+ |
+// @@protoc_insertion_point(namespace_scope) |
+ |
+} // namespace sync_pb |
+ |
+// @@protoc_insertion_point(global_scope) |