This repository was archived by the owner on Apr 17, 2024. It is now read-only.
File tree 11 files changed +16
-16
lines changed
11 files changed +16
-16
lines changed Original file line number Diff line number Diff line change @@ -172,7 +172,7 @@ util::StatusOr<AesEaxKey> ParseKey(
172
172
" SecretKeyAccess is required" );
173
173
}
174
174
SecretProto<google::crypto::tink::AesEaxKey> proto_key;
175
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
175
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
176
176
if (!proto_key->ParseFromString (restricted_data.GetSecret (*token))) {
177
177
return util::Status (absl::StatusCode::kInvalidArgument ,
178
178
" Failed to parse AesEaxKey proto" );
Original file line number Diff line number Diff line change @@ -172,7 +172,7 @@ util::StatusOr<AesGcmKey> ParseKey(
172
172
" SecretKeyAccess is required" );
173
173
}
174
174
SecretProto<google::crypto::tink::AesGcmKey> proto_key;
175
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
175
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
176
176
if (!proto_key->ParseFromString (restricted_data.GetSecret (*token))) {
177
177
return util::Status (absl::StatusCode::kInvalidArgument ,
178
178
" Failed to parse AesGcmKey proto" );
Original file line number Diff line number Diff line change @@ -147,7 +147,7 @@ util::StatusOr<AesGcmSivKey> ParseKey(
147
147
" Wrong type URL when parsing AesGcmSivKey." );
148
148
}
149
149
google::crypto::tink::AesGcmSivKey proto_key;
150
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
150
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
151
151
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
152
152
return util::Status (absl::StatusCode::kInvalidArgument ,
153
153
" Failed to parse AesGcmSivKey proto" );
Original file line number Diff line number Diff line change @@ -138,7 +138,7 @@ util::StatusOr<ChaCha20Poly1305Key> ParseKey(
138
138
" SecretKeyAccess is required" );
139
139
}
140
140
google::crypto::tink::ChaCha20Poly1305Key proto_key;
141
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
141
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
142
142
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
143
143
return util::Status (absl::StatusCode::kInvalidArgument ,
144
144
" Failed to parse ChaCha20Poly1305Key proto" );
Original file line number Diff line number Diff line change @@ -146,7 +146,7 @@ util::StatusOr<XChaCha20Poly1305Key> ParseKey(
146
146
" SecretKeyAccess is required" );
147
147
}
148
148
google::crypto::tink::XChaCha20Poly1305Key proto_key;
149
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
149
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
150
150
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
151
151
return util::Status (absl::StatusCode::kInvalidArgument ,
152
152
" Failed to parse XChaCha20Poly1305Key proto" );
Original file line number Diff line number Diff line change @@ -142,7 +142,7 @@ util::StatusOr<AesSivKey> ParseKey(
142
142
" SecretKeyAccess is required" );
143
143
}
144
144
google::crypto::tink::AesSivKey proto_key;
145
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
145
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
146
146
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
147
147
return util::Status (absl::StatusCode::kInvalidArgument ,
148
148
" Failed to parse AesSivKey proto" );
Original file line number Diff line number Diff line change @@ -613,7 +613,7 @@ util::StatusOr<EciesPublicKey> ParsePublicKey(
613
613
}
614
614
615
615
EciesAeadHkdfPublicKey proto_key;
616
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
616
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
617
617
if (!proto_key.ParseFromString (
618
618
restricted_data.GetSecret (InsecureSecretKeyAccess::Get ()))) {
619
619
return util::Status (absl::StatusCode::kInvalidArgument ,
@@ -646,7 +646,7 @@ util::StatusOr<EciesPrivateKey> ParsePrivateKey(
646
646
" Wrong type URL when parsing EciesAeadHkdfPrivateKey." );
647
647
}
648
648
EciesAeadHkdfPrivateKey proto_key;
649
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
649
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
650
650
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
651
651
return util::Status (absl::StatusCode::kInvalidArgument ,
652
652
" Failed to parse EciesAeadHkdfPrivateKey proto." );
Original file line number Diff line number Diff line change @@ -280,7 +280,7 @@ util::StatusOr<HpkePublicKey> ParsePublicKey(
280
280
}
281
281
282
282
google::crypto::tink::HpkePublicKey proto_key;
283
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
283
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
284
284
if (!proto_key.ParseFromString (
285
285
restricted_data.GetSecret (InsecureSecretKeyAccess::Get ()))) {
286
286
return util::Status (absl::StatusCode::kInvalidArgument ,
@@ -314,7 +314,7 @@ util::StatusOr<HpkePrivateKey> ParsePrivateKey(
314
314
" SecretKeyAccess is required" );
315
315
}
316
316
google::crypto::tink::HpkePrivateKey proto_key;
317
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
317
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
318
318
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
319
319
return util::Status (absl::StatusCode::kInvalidArgument ,
320
320
" Failed to parse HpkePrivateKey proto" );
Original file line number Diff line number Diff line change @@ -309,7 +309,7 @@ util::StatusOr<EcdsaPublicKey> ParsePublicKey(
309
309
}
310
310
311
311
google::crypto::tink::EcdsaPublicKey proto_key;
312
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
312
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
313
313
if (!proto_key.ParseFromString (
314
314
restricted_data.GetSecret (InsecureSecretKeyAccess::Get ()))) {
315
315
return util::Status (absl::StatusCode::kInvalidArgument ,
@@ -344,7 +344,7 @@ util::StatusOr<EcdsaPrivateKey> ParsePrivateKey(
344
344
" SecretKeyAccess is required" );
345
345
}
346
346
google::crypto::tink::EcdsaPrivateKey proto_key;
347
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
347
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
348
348
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
349
349
return util::Status (absl::StatusCode::kInvalidArgument ,
350
350
" Failed to parse EcdsaPrivateKey proto" );
Original file line number Diff line number Diff line change @@ -140,7 +140,7 @@ util::StatusOr<Ed25519PublicKey> ParsePublicKey(
140
140
}
141
141
142
142
google::crypto::tink::Ed25519PublicKey proto_key;
143
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
143
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
144
144
if (!proto_key.ParseFromString (
145
145
restricted_data.GetSecret (InsecureSecretKeyAccess::Get ()))) {
146
146
return util::Status (absl::StatusCode::kInvalidArgument ,
@@ -180,7 +180,7 @@ util::StatusOr<Ed25519PrivateKey> ParsePrivateKey(
180
180
" SecretKeyAccess is required" );
181
181
}
182
182
google::crypto::tink::Ed25519PrivateKey proto_key;
183
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
183
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
184
184
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
185
185
return util::Status (absl::StatusCode::kInvalidArgument ,
186
186
" Failed to parse Ed25519PrivateKey proto" );
Original file line number Diff line number Diff line change @@ -227,7 +227,7 @@ util::StatusOr<RsaSsaPssPublicKey> ParsePublicKey(
227
227
}
228
228
229
229
google::crypto::tink::RsaSsaPssPublicKey proto_key;
230
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
230
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
231
231
if (!proto_key.ParseFromString (
232
232
restricted_data.GetSecret (InsecureSecretKeyAccess::Get ()))) {
233
233
return util::Status (absl::StatusCode::kInvalidArgument ,
@@ -264,7 +264,7 @@ util::StatusOr<RsaSsaPssPrivateKey> ParsePrivateKey(
264
264
" SecretKeyAccess is required" );
265
265
}
266
266
google::crypto::tink::RsaSsaPssPrivateKey proto_key;
267
- RestrictedData restricted_data = serialization.SerializedKeyProto ();
267
+ const RestrictedData& restricted_data = serialization.SerializedKeyProto ();
268
268
if (!proto_key.ParseFromString (restricted_data.GetSecret (*token))) {
269
269
return util::Status (absl::StatusCode::kInvalidArgument ,
270
270
" Failed to parse RsaSsaPssPrivateKey proto" );
You can’t perform that action at this time.
0 commit comments