// Code generated by protoc-gen-gogo. DO NOT EDIT. // source: service/verify.proto package service import ( fmt "fmt" _ "github.com/gogo/protobuf/gogoproto" proto "github.com/golang/protobuf/proto" io "io" math "math" math_bits "math/bits" ) // Reference imports to suppress errors if they are not otherwise used. var _ = proto.Marshal var _ = fmt.Errorf var _ = math.Inf // This is a compile-time assertion to ensure that this generated file // is compatible with the proto package it is being compiled against. // A compilation error at this line likely means your copy of the // proto package needs to be updated. const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package // RequestVerificationHeader is a set of signatures of every NeoFS Node that processed request // (should be embedded into message). type RequestVerificationHeader struct { // Signatures is a set of signatures of every passed NeoFS Node Signatures []*RequestVerificationHeader_Signature `protobuf:"bytes,1,rep,name=Signatures,proto3" json:"Signatures,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` } func (m *RequestVerificationHeader) Reset() { *m = RequestVerificationHeader{} } func (m *RequestVerificationHeader) String() string { return proto.CompactTextString(m) } func (*RequestVerificationHeader) ProtoMessage() {} func (*RequestVerificationHeader) Descriptor() ([]byte, []int) { return fileDescriptor_4bdd5bc50ec96238, []int{0} } func (m *RequestVerificationHeader) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RequestVerificationHeader) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)] n, err := m.MarshalToSizedBuffer(b) if err != nil { return nil, err } return b[:n], nil } func (m *RequestVerificationHeader) XXX_Merge(src proto.Message) { xxx_messageInfo_RequestVerificationHeader.Merge(m, src) } func (m *RequestVerificationHeader) XXX_Size() int { return m.Size() } func (m *RequestVerificationHeader) XXX_DiscardUnknown() { xxx_messageInfo_RequestVerificationHeader.DiscardUnknown(m) } var xxx_messageInfo_RequestVerificationHeader proto.InternalMessageInfo func (m *RequestVerificationHeader) GetSignatures() []*RequestVerificationHeader_Signature { if m != nil { return m.Signatures } return nil } type RequestVerificationHeader_Sign struct { // Sign is signature of the request or session key. Sign []byte `protobuf:"bytes,1,opt,name=Sign,proto3" json:"Sign,omitempty"` // Peer is compressed public key used for signature. Peer []byte `protobuf:"bytes,2,opt,name=Peer,proto3" json:"Peer,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` } func (m *RequestVerificationHeader_Sign) Reset() { *m = RequestVerificationHeader_Sign{} } func (m *RequestVerificationHeader_Sign) String() string { return proto.CompactTextString(m) } func (*RequestVerificationHeader_Sign) ProtoMessage() {} func (*RequestVerificationHeader_Sign) Descriptor() ([]byte, []int) { return fileDescriptor_4bdd5bc50ec96238, []int{0, 0} } func (m *RequestVerificationHeader_Sign) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RequestVerificationHeader_Sign) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)] n, err := m.MarshalToSizedBuffer(b) if err != nil { return nil, err } return b[:n], nil } func (m *RequestVerificationHeader_Sign) XXX_Merge(src proto.Message) { xxx_messageInfo_RequestVerificationHeader_Sign.Merge(m, src) } func (m *RequestVerificationHeader_Sign) XXX_Size() int { return m.Size() } func (m *RequestVerificationHeader_Sign) XXX_DiscardUnknown() { xxx_messageInfo_RequestVerificationHeader_Sign.DiscardUnknown(m) } var xxx_messageInfo_RequestVerificationHeader_Sign proto.InternalMessageInfo func (m *RequestVerificationHeader_Sign) GetSign() []byte { if m != nil { return m.Sign } return nil } func (m *RequestVerificationHeader_Sign) GetPeer() []byte { if m != nil { return m.Peer } return nil } type RequestVerificationHeader_Signature struct { // Sign is a signature and public key of the request. RequestVerificationHeader_Sign `protobuf:"bytes,1,opt,name=Sign,proto3,embedded=Sign" json:"Sign"` // Origin used for requests, when trusted node changes it and re-sign with session key. // If session key used for signature request, then Origin should contain // public key of user and signed session key. Origin *RequestVerificationHeader_Sign `protobuf:"bytes,2,opt,name=Origin,proto3" json:"Origin,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` } func (m *RequestVerificationHeader_Signature) Reset() { *m = RequestVerificationHeader_Signature{} } func (m *RequestVerificationHeader_Signature) String() string { return proto.CompactTextString(m) } func (*RequestVerificationHeader_Signature) ProtoMessage() {} func (*RequestVerificationHeader_Signature) Descriptor() ([]byte, []int) { return fileDescriptor_4bdd5bc50ec96238, []int{0, 1} } func (m *RequestVerificationHeader_Signature) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RequestVerificationHeader_Signature) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)] n, err := m.MarshalToSizedBuffer(b) if err != nil { return nil, err } return b[:n], nil } func (m *RequestVerificationHeader_Signature) XXX_Merge(src proto.Message) { xxx_messageInfo_RequestVerificationHeader_Signature.Merge(m, src) } func (m *RequestVerificationHeader_Signature) XXX_Size() int { return m.Size() } func (m *RequestVerificationHeader_Signature) XXX_DiscardUnknown() { xxx_messageInfo_RequestVerificationHeader_Signature.DiscardUnknown(m) } var xxx_messageInfo_RequestVerificationHeader_Signature proto.InternalMessageInfo func (m *RequestVerificationHeader_Signature) GetOrigin() *RequestVerificationHeader_Sign { if m != nil { return m.Origin } return nil } func init() { proto.RegisterType((*RequestVerificationHeader)(nil), "service.RequestVerificationHeader") proto.RegisterType((*RequestVerificationHeader_Sign)(nil), "service.RequestVerificationHeader.Sign") proto.RegisterType((*RequestVerificationHeader_Signature)(nil), "service.RequestVerificationHeader.Signature") } func init() { proto.RegisterFile("service/verify.proto", fileDescriptor_4bdd5bc50ec96238) } var fileDescriptor_4bdd5bc50ec96238 = []byte{ // 288 bytes of a gzipped FileDescriptorProto 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xe2, 0x12, 0x29, 0x4e, 0x2d, 0x2a, 0xcb, 0x4c, 0x4e, 0xd5, 0x2f, 0x4b, 0x2d, 0xca, 0x4c, 0xab, 0xd4, 0x2b, 0x28, 0xca, 0x2f, 0xc9, 0x17, 0x62, 0x87, 0x8a, 0x4a, 0xe9, 0xa6, 0x67, 0x96, 0x64, 0x94, 0x26, 0xe9, 0x25, 0xe7, 0xe7, 0xea, 0xa7, 0xe7, 0xa7, 0xe7, 0xeb, 0x83, 0xe5, 0x93, 0x4a, 0xd3, 0xc0, 0x3c, 0x30, 0x07, 0xcc, 0x82, 0xe8, 0x53, 0x5a, 0xcf, 0xc4, 0x25, 0x19, 0x94, 0x5a, 0x58, 0x9a, 0x5a, 0x5c, 0x12, 0x06, 0x32, 0x2f, 0x33, 0x39, 0xb1, 0x24, 0x33, 0x3f, 0xcf, 0x23, 0x35, 0x31, 0x25, 0xb5, 0x48, 0xc8, 0x87, 0x8b, 0x2b, 0x38, 0x33, 0x3d, 0x2f, 0xb1, 0xa4, 0xb4, 0x28, 0xb5, 0x58, 0x82, 0x51, 0x81, 0x59, 0x83, 0xdb, 0x48, 0x47, 0x0f, 0x6a, 0x95, 0x1e, 0x4e, 0x7d, 0x7a, 0x70, 0x4d, 0x41, 0x48, 0xfa, 0xa5, 0xf4, 0xb8, 0x58, 0x40, 0x3c, 0x21, 0x21, 0x08, 0x2d, 0xc1, 0xa8, 0xc0, 0xa8, 0xc1, 0x13, 0x04, 0x17, 0x0b, 0x48, 0x4d, 0x2d, 0x92, 0x60, 0x82, 0x88, 0x81, 0xd8, 0x52, 0x93, 0x19, 0xb9, 0x38, 0xe1, 0xda, 0x85, 0x5c, 0x91, 0x74, 0x71, 0x1b, 0xa9, 0x13, 0xe9, 0x0a, 0x27, 0x8e, 0x13, 0xf7, 0xe4, 0x19, 0x2e, 0xdc, 0x93, 0x67, 0x84, 0x5a, 0x64, 0xcf, 0xc5, 0xe6, 0x5f, 0x94, 0x99, 0x9e, 0x99, 0x07, 0xb6, 0x8a, 0x78, 0x83, 0x82, 0xa0, 0xda, 0x9c, 0x02, 0x4e, 0x3c, 0x92, 0x63, 0xbc, 0xf0, 0x48, 0x8e, 0xf1, 0xc6, 0x23, 0x39, 0xc6, 0x07, 0x8f, 0xe4, 0x18, 0x67, 0x3c, 0x96, 0x63, 0x88, 0x52, 0x43, 0x0a, 0xf6, 0xbc, 0xe2, 0x82, 0xe4, 0x64, 0xdd, 0x94, 0xd4, 0x32, 0xfd, 0xbc, 0xd4, 0xfc, 0xb4, 0x62, 0xdd, 0xc4, 0x82, 0x4c, 0x7d, 0xa8, 0x25, 0xab, 0x98, 0x04, 0xfd, 0x52, 0xf3, 0xdd, 0x82, 0xf5, 0x1c, 0x03, 0x3c, 0xf5, 0x82, 0x21, 0x62, 0x49, 0x6c, 0xe0, 0xa8, 0x30, 0x06, 0x04, 0x00, 0x00, 0xff, 0xff, 0x94, 0x02, 0xe4, 0x3c, 0xda, 0x01, 0x00, 0x00, } func (m *RequestVerificationHeader) Marshal() (dAtA []byte, err error) { size := m.Size() dAtA = make([]byte, size) n, err := m.MarshalToSizedBuffer(dAtA[:size]) if err != nil { return nil, err } return dAtA[:n], nil } func (m *RequestVerificationHeader) MarshalTo(dAtA []byte) (int, error) { size := m.Size() return m.MarshalToSizedBuffer(dAtA[:size]) } func (m *RequestVerificationHeader) MarshalToSizedBuffer(dAtA []byte) (int, error) { i := len(dAtA) _ = i var l int _ = l if m.XXX_unrecognized != nil { i -= len(m.XXX_unrecognized) copy(dAtA[i:], m.XXX_unrecognized) } if len(m.Signatures) > 0 { for iNdEx := len(m.Signatures) - 1; iNdEx >= 0; iNdEx-- { { size, err := m.Signatures[iNdEx].MarshalToSizedBuffer(dAtA[:i]) if err != nil { return 0, err } i -= size i = encodeVarintVerify(dAtA, i, uint64(size)) } i-- dAtA[i] = 0xa } } return len(dAtA) - i, nil } func (m *RequestVerificationHeader_Sign) Marshal() (dAtA []byte, err error) { size := m.Size() dAtA = make([]byte, size) n, err := m.MarshalToSizedBuffer(dAtA[:size]) if err != nil { return nil, err } return dAtA[:n], nil } func (m *RequestVerificationHeader_Sign) MarshalTo(dAtA []byte) (int, error) { size := m.Size() return m.MarshalToSizedBuffer(dAtA[:size]) } func (m *RequestVerificationHeader_Sign) MarshalToSizedBuffer(dAtA []byte) (int, error) { i := len(dAtA) _ = i var l int _ = l if m.XXX_unrecognized != nil { i -= len(m.XXX_unrecognized) copy(dAtA[i:], m.XXX_unrecognized) } if len(m.Peer) > 0 { i -= len(m.Peer) copy(dAtA[i:], m.Peer) i = encodeVarintVerify(dAtA, i, uint64(len(m.Peer))) i-- dAtA[i] = 0x12 } if len(m.Sign) > 0 { i -= len(m.Sign) copy(dAtA[i:], m.Sign) i = encodeVarintVerify(dAtA, i, uint64(len(m.Sign))) i-- dAtA[i] = 0xa } return len(dAtA) - i, nil } func (m *RequestVerificationHeader_Signature) Marshal() (dAtA []byte, err error) { size := m.Size() dAtA = make([]byte, size) n, err := m.MarshalToSizedBuffer(dAtA[:size]) if err != nil { return nil, err } return dAtA[:n], nil } func (m *RequestVerificationHeader_Signature) MarshalTo(dAtA []byte) (int, error) { size := m.Size() return m.MarshalToSizedBuffer(dAtA[:size]) } func (m *RequestVerificationHeader_Signature) MarshalToSizedBuffer(dAtA []byte) (int, error) { i := len(dAtA) _ = i var l int _ = l if m.XXX_unrecognized != nil { i -= len(m.XXX_unrecognized) copy(dAtA[i:], m.XXX_unrecognized) } if m.Origin != nil { { size, err := m.Origin.MarshalToSizedBuffer(dAtA[:i]) if err != nil { return 0, err } i -= size i = encodeVarintVerify(dAtA, i, uint64(size)) } i-- dAtA[i] = 0x12 } { size, err := m.RequestVerificationHeader_Sign.MarshalToSizedBuffer(dAtA[:i]) if err != nil { return 0, err } i -= size i = encodeVarintVerify(dAtA, i, uint64(size)) } i-- dAtA[i] = 0xa return len(dAtA) - i, nil } func encodeVarintVerify(dAtA []byte, offset int, v uint64) int { offset -= sovVerify(v) base := offset for v >= 1<<7 { dAtA[offset] = uint8(v&0x7f | 0x80) v >>= 7 offset++ } dAtA[offset] = uint8(v) return base } func (m *RequestVerificationHeader) Size() (n int) { if m == nil { return 0 } var l int _ = l if len(m.Signatures) > 0 { for _, e := range m.Signatures { l = e.Size() n += 1 + l + sovVerify(uint64(l)) } } if m.XXX_unrecognized != nil { n += len(m.XXX_unrecognized) } return n } func (m *RequestVerificationHeader_Sign) Size() (n int) { if m == nil { return 0 } var l int _ = l l = len(m.Sign) if l > 0 { n += 1 + l + sovVerify(uint64(l)) } l = len(m.Peer) if l > 0 { n += 1 + l + sovVerify(uint64(l)) } if m.XXX_unrecognized != nil { n += len(m.XXX_unrecognized) } return n } func (m *RequestVerificationHeader_Signature) Size() (n int) { if m == nil { return 0 } var l int _ = l l = m.RequestVerificationHeader_Sign.Size() n += 1 + l + sovVerify(uint64(l)) if m.Origin != nil { l = m.Origin.Size() n += 1 + l + sovVerify(uint64(l)) } if m.XXX_unrecognized != nil { n += len(m.XXX_unrecognized) } return n } func sovVerify(x uint64) (n int) { return (math_bits.Len64(x|1) + 6) / 7 } func sozVerify(x uint64) (n int) { return sovVerify(uint64((x << 1) ^ uint64((int64(x) >> 63)))) } func (m *RequestVerificationHeader) Unmarshal(dAtA []byte) error { l := len(dAtA) iNdEx := 0 for iNdEx < l { preIndex := iNdEx var wire uint64 for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ wire |= uint64(b&0x7F) << shift if b < 0x80 { break } } fieldNum := int32(wire >> 3) wireType := int(wire & 0x7) if wireType == 4 { return fmt.Errorf("proto: RequestVerificationHeader: wiretype end group for non-group") } if fieldNum <= 0 { return fmt.Errorf("proto: RequestVerificationHeader: illegal tag %d (wire type %d)", fieldNum, wire) } switch fieldNum { case 1: if wireType != 2 { return fmt.Errorf("proto: wrong wireType = %d for field Signatures", wireType) } var msglen int for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ msglen |= int(b&0x7F) << shift if b < 0x80 { break } } if msglen < 0 { return ErrInvalidLengthVerify } postIndex := iNdEx + msglen if postIndex < 0 { return ErrInvalidLengthVerify } if postIndex > l { return io.ErrUnexpectedEOF } m.Signatures = append(m.Signatures, &RequestVerificationHeader_Signature{}) if err := m.Signatures[len(m.Signatures)-1].Unmarshal(dAtA[iNdEx:postIndex]); err != nil { return err } iNdEx = postIndex default: iNdEx = preIndex skippy, err := skipVerify(dAtA[iNdEx:]) if err != nil { return err } if skippy < 0 { return ErrInvalidLengthVerify } if (iNdEx + skippy) < 0 { return ErrInvalidLengthVerify } if (iNdEx + skippy) > l { return io.ErrUnexpectedEOF } m.XXX_unrecognized = append(m.XXX_unrecognized, dAtA[iNdEx:iNdEx+skippy]...) iNdEx += skippy } } if iNdEx > l { return io.ErrUnexpectedEOF } return nil } func (m *RequestVerificationHeader_Sign) Unmarshal(dAtA []byte) error { l := len(dAtA) iNdEx := 0 for iNdEx < l { preIndex := iNdEx var wire uint64 for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ wire |= uint64(b&0x7F) << shift if b < 0x80 { break } } fieldNum := int32(wire >> 3) wireType := int(wire & 0x7) if wireType == 4 { return fmt.Errorf("proto: Sign: wiretype end group for non-group") } if fieldNum <= 0 { return fmt.Errorf("proto: Sign: illegal tag %d (wire type %d)", fieldNum, wire) } switch fieldNum { case 1: if wireType != 2 { return fmt.Errorf("proto: wrong wireType = %d for field Sign", wireType) } var byteLen int for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ byteLen |= int(b&0x7F) << shift if b < 0x80 { break } } if byteLen < 0 { return ErrInvalidLengthVerify } postIndex := iNdEx + byteLen if postIndex < 0 { return ErrInvalidLengthVerify } if postIndex > l { return io.ErrUnexpectedEOF } m.Sign = append(m.Sign[:0], dAtA[iNdEx:postIndex]...) if m.Sign == nil { m.Sign = []byte{} } iNdEx = postIndex case 2: if wireType != 2 { return fmt.Errorf("proto: wrong wireType = %d for field Peer", wireType) } var byteLen int for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ byteLen |= int(b&0x7F) << shift if b < 0x80 { break } } if byteLen < 0 { return ErrInvalidLengthVerify } postIndex := iNdEx + byteLen if postIndex < 0 { return ErrInvalidLengthVerify } if postIndex > l { return io.ErrUnexpectedEOF } m.Peer = append(m.Peer[:0], dAtA[iNdEx:postIndex]...) if m.Peer == nil { m.Peer = []byte{} } iNdEx = postIndex default: iNdEx = preIndex skippy, err := skipVerify(dAtA[iNdEx:]) if err != nil { return err } if skippy < 0 { return ErrInvalidLengthVerify } if (iNdEx + skippy) < 0 { return ErrInvalidLengthVerify } if (iNdEx + skippy) > l { return io.ErrUnexpectedEOF } m.XXX_unrecognized = append(m.XXX_unrecognized, dAtA[iNdEx:iNdEx+skippy]...) iNdEx += skippy } } if iNdEx > l { return io.ErrUnexpectedEOF } return nil } func (m *RequestVerificationHeader_Signature) Unmarshal(dAtA []byte) error { l := len(dAtA) iNdEx := 0 for iNdEx < l { preIndex := iNdEx var wire uint64 for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ wire |= uint64(b&0x7F) << shift if b < 0x80 { break } } fieldNum := int32(wire >> 3) wireType := int(wire & 0x7) if wireType == 4 { return fmt.Errorf("proto: Signature: wiretype end group for non-group") } if fieldNum <= 0 { return fmt.Errorf("proto: Signature: illegal tag %d (wire type %d)", fieldNum, wire) } switch fieldNum { case 1: if wireType != 2 { return fmt.Errorf("proto: wrong wireType = %d for field RequestVerificationHeader_Sign", wireType) } var msglen int for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ msglen |= int(b&0x7F) << shift if b < 0x80 { break } } if msglen < 0 { return ErrInvalidLengthVerify } postIndex := iNdEx + msglen if postIndex < 0 { return ErrInvalidLengthVerify } if postIndex > l { return io.ErrUnexpectedEOF } if err := m.RequestVerificationHeader_Sign.Unmarshal(dAtA[iNdEx:postIndex]); err != nil { return err } iNdEx = postIndex case 2: if wireType != 2 { return fmt.Errorf("proto: wrong wireType = %d for field Origin", wireType) } var msglen int for shift := uint(0); ; shift += 7 { if shift >= 64 { return ErrIntOverflowVerify } if iNdEx >= l { return io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ msglen |= int(b&0x7F) << shift if b < 0x80 { break } } if msglen < 0 { return ErrInvalidLengthVerify } postIndex := iNdEx + msglen if postIndex < 0 { return ErrInvalidLengthVerify } if postIndex > l { return io.ErrUnexpectedEOF } if m.Origin == nil { m.Origin = &RequestVerificationHeader_Sign{} } if err := m.Origin.Unmarshal(dAtA[iNdEx:postIndex]); err != nil { return err } iNdEx = postIndex default: iNdEx = preIndex skippy, err := skipVerify(dAtA[iNdEx:]) if err != nil { return err } if skippy < 0 { return ErrInvalidLengthVerify } if (iNdEx + skippy) < 0 { return ErrInvalidLengthVerify } if (iNdEx + skippy) > l { return io.ErrUnexpectedEOF } m.XXX_unrecognized = append(m.XXX_unrecognized, dAtA[iNdEx:iNdEx+skippy]...) iNdEx += skippy } } if iNdEx > l { return io.ErrUnexpectedEOF } return nil } func skipVerify(dAtA []byte) (n int, err error) { l := len(dAtA) iNdEx := 0 depth := 0 for iNdEx < l { var wire uint64 for shift := uint(0); ; shift += 7 { if shift >= 64 { return 0, ErrIntOverflowVerify } if iNdEx >= l { return 0, io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ wire |= (uint64(b) & 0x7F) << shift if b < 0x80 { break } } wireType := int(wire & 0x7) switch wireType { case 0: for shift := uint(0); ; shift += 7 { if shift >= 64 { return 0, ErrIntOverflowVerify } if iNdEx >= l { return 0, io.ErrUnexpectedEOF } iNdEx++ if dAtA[iNdEx-1] < 0x80 { break } } case 1: iNdEx += 8 case 2: var length int for shift := uint(0); ; shift += 7 { if shift >= 64 { return 0, ErrIntOverflowVerify } if iNdEx >= l { return 0, io.ErrUnexpectedEOF } b := dAtA[iNdEx] iNdEx++ length |= (int(b) & 0x7F) << shift if b < 0x80 { break } } if length < 0 { return 0, ErrInvalidLengthVerify } iNdEx += length case 3: depth++ case 4: if depth == 0 { return 0, ErrUnexpectedEndOfGroupVerify } depth-- case 5: iNdEx += 4 default: return 0, fmt.Errorf("proto: illegal wireType %d", wireType) } if iNdEx < 0 { return 0, ErrInvalidLengthVerify } if depth == 0 { return iNdEx, nil } } return 0, io.ErrUnexpectedEOF } var ( ErrInvalidLengthVerify = fmt.Errorf("proto: negative length found during unmarshaling") ErrIntOverflowVerify = fmt.Errorf("proto: integer overflow") ErrUnexpectedEndOfGroupVerify = fmt.Errorf("proto: unexpected end of group") )