spacedatastandards-org 1.73.12

Space data standards framework based on CCSDS standards and Google FlatBuffers.
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
// automatically generated by the FlatBuffers compiler, do not modify


// @generated

use core::mem;
use core::cmp::Ordering;

extern crate flatbuffers;
use self::flatbuffers::{EndianScalar, Follow};

pub enum EMEOffset {}
#[derive(Copy, Clone, PartialEq)]

/// Encrypted Message Envelope
pub struct EME<'a> {
  pub _tab: flatbuffers::Table<'a>,
}

impl<'a> flatbuffers::Follow<'a> for EME<'a> {
  type Inner = EME<'a>;
  #[inline]
  unsafe fn follow(buf: &'a [u8], loc: usize) -> Self::Inner {
    Self { _tab: flatbuffers::Table::new(buf, loc) }
  }
}

impl<'a> EME<'a> {
  pub const VT_ENCRYPTED_BLOB: flatbuffers::VOffsetT = 4;
  pub const VT_EPHEMERAL_PUBLIC_KEY: flatbuffers::VOffsetT = 6;
  pub const VT_MAC: flatbuffers::VOffsetT = 8;
  pub const VT_NONCE_START: flatbuffers::VOffsetT = 10;
  pub const VT_TAG: flatbuffers::VOffsetT = 12;
  pub const VT_IV: flatbuffers::VOffsetT = 14;
  pub const VT_SALT: flatbuffers::VOffsetT = 16;
  pub const VT_PUBLIC_KEY_IDENTIFIER: flatbuffers::VOffsetT = 18;
  pub const VT_CIPHER_SUITE: flatbuffers::VOffsetT = 20;
  pub const VT_KDF_PARAMETERS: flatbuffers::VOffsetT = 22;
  pub const VT_ENCRYPTION_ALGORITHM_PARAMETERS: flatbuffers::VOffsetT = 24;

  #[inline]
  pub unsafe fn init_from_table(table: flatbuffers::Table<'a>) -> Self {
    EME { _tab: table }
  }
  #[allow(unused_mut)]
  pub fn create<'bldr: 'args, 'args: 'mut_bldr, 'mut_bldr, A: flatbuffers::Allocator + 'bldr>(
    _fbb: &'mut_bldr mut flatbuffers::FlatBufferBuilder<'bldr, A>,
    args: &'args EMEArgs<'args>
  ) -> flatbuffers::WIPOffset<EME<'bldr>> {
    let mut builder = EMEBuilder::new(_fbb);
    if let Some(x) = args.ENCRYPTION_ALGORITHM_PARAMETERS { builder.add_ENCRYPTION_ALGORITHM_PARAMETERS(x); }
    if let Some(x) = args.KDF_PARAMETERS { builder.add_KDF_PARAMETERS(x); }
    if let Some(x) = args.CIPHER_SUITE { builder.add_CIPHER_SUITE(x); }
    if let Some(x) = args.PUBLIC_KEY_IDENTIFIER { builder.add_PUBLIC_KEY_IDENTIFIER(x); }
    if let Some(x) = args.SALT { builder.add_SALT(x); }
    if let Some(x) = args.IV { builder.add_IV(x); }
    if let Some(x) = args.TAG { builder.add_TAG(x); }
    if let Some(x) = args.NONCE_START { builder.add_NONCE_START(x); }
    if let Some(x) = args.MAC { builder.add_MAC(x); }
    if let Some(x) = args.EPHEMERAL_PUBLIC_KEY { builder.add_EPHEMERAL_PUBLIC_KEY(x); }
    if let Some(x) = args.ENCRYPTED_BLOB { builder.add_ENCRYPTED_BLOB(x); }
    builder.finish()
  }

  pub fn unpack(&self) -> EMET {
    let ENCRYPTED_BLOB = self.ENCRYPTED_BLOB().map(|x| {
      x.into_iter().collect()
    });
    let EPHEMERAL_PUBLIC_KEY = self.EPHEMERAL_PUBLIC_KEY().map(|x| {
      x.to_string()
    });
    let MAC = self.MAC().map(|x| {
      x.to_string()
    });
    let NONCE_START = self.NONCE_START().map(|x| {
      x.into_iter().collect()
    });
    let TAG = self.TAG().map(|x| {
      x.to_string()
    });
    let IV = self.IV().map(|x| {
      x.to_string()
    });
    let SALT = self.SALT().map(|x| {
      x.to_string()
    });
    let PUBLIC_KEY_IDENTIFIER = self.PUBLIC_KEY_IDENTIFIER().map(|x| {
      x.to_string()
    });
    let CIPHER_SUITE = self.CIPHER_SUITE().map(|x| {
      x.to_string()
    });
    let KDF_PARAMETERS = self.KDF_PARAMETERS().map(|x| {
      x.to_string()
    });
    let ENCRYPTION_ALGORITHM_PARAMETERS = self.ENCRYPTION_ALGORITHM_PARAMETERS().map(|x| {
      x.to_string()
    });
    EMET {
      ENCRYPTED_BLOB,
      EPHEMERAL_PUBLIC_KEY,
      MAC,
      NONCE_START,
      TAG,
      IV,
      SALT,
      PUBLIC_KEY_IDENTIFIER,
      CIPHER_SUITE,
      KDF_PARAMETERS,
      ENCRYPTION_ALGORITHM_PARAMETERS,
    }
  }

  /// Encrypted data blob, containing the ciphertext of the original plaintext message.
  #[inline]
  pub fn ENCRYPTED_BLOB(&self) -> Option<flatbuffers::Vector<'a, u8>> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<flatbuffers::Vector<'a, u8>>>(EME::VT_ENCRYPTED_BLOB, None)}
  }
  /// Temporary public key used for the encryption session, contributing to the derivation of the shared secret.
  #[inline]
  pub fn EPHEMERAL_PUBLIC_KEY(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_EPHEMERAL_PUBLIC_KEY, None)}
  }
  /// Message Authentication Code to verify the integrity and authenticity of the encrypted message.
  #[inline]
  pub fn MAC(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_MAC, None)}
  }
  /// Random 12-byte nonce starting value. Incremented for each record in the stream to ensure unique nonces.
  #[inline]
  pub fn NONCE_START(&self) -> Option<flatbuffers::Vector<'a, u8>> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<flatbuffers::Vector<'a, u8>>>(EME::VT_NONCE_START, None)}
  }
  /// Additional authentication tag used in some encryption schemes for integrity and authenticity verification.
  #[inline]
  pub fn TAG(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_TAG, None)}
  }
  /// Initialization vector used to introduce randomness in the encryption process, enhancing security.
  #[inline]
  pub fn IV(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_IV, None)}
  }
  /// Cryptographic salt used in key derivation (e.g. HKDF) to ensure unique key material per session.
  #[inline]
  pub fn SALT(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_SALT, None)}
  }
  /// Identifier for the public key used, aiding in recipient key management and message decryption.
  #[inline]
  pub fn PUBLIC_KEY_IDENTIFIER(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_PUBLIC_KEY_IDENTIFIER, None)}
  }
  /// Specifies the set of cryptographic algorithms used in the encryption process.
  #[inline]
  pub fn CIPHER_SUITE(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_CIPHER_SUITE, None)}
  }
  /// Parameters for the Key Derivation Function, guiding the process of deriving keys from the shared secret.
  #[inline]
  pub fn KDF_PARAMETERS(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_KDF_PARAMETERS, None)}
  }
  /// Parameters defining specific settings for the encryption algorithm, such as block size or operation mode.
  #[inline]
  pub fn ENCRYPTION_ALGORITHM_PARAMETERS(&self) -> Option<&'a str> {
    // Safety:
    // Created from valid Table for this object
    // which contains a valid value in this slot
    unsafe { self._tab.get::<flatbuffers::ForwardsUOffset<&str>>(EME::VT_ENCRYPTION_ALGORITHM_PARAMETERS, None)}
  }
}

impl flatbuffers::Verifiable for EME<'_> {
  #[inline]
  fn run_verifier(
    v: &mut flatbuffers::Verifier, pos: usize
  ) -> Result<(), flatbuffers::InvalidFlatbuffer> {
    use self::flatbuffers::Verifiable;
    v.visit_table(pos)?
     .visit_field::<flatbuffers::ForwardsUOffset<flatbuffers::Vector<'_, u8>>>("ENCRYPTED_BLOB", Self::VT_ENCRYPTED_BLOB, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("EPHEMERAL_PUBLIC_KEY", Self::VT_EPHEMERAL_PUBLIC_KEY, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("MAC", Self::VT_MAC, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<flatbuffers::Vector<'_, u8>>>("NONCE_START", Self::VT_NONCE_START, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("TAG", Self::VT_TAG, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("IV", Self::VT_IV, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("SALT", Self::VT_SALT, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("PUBLIC_KEY_IDENTIFIER", Self::VT_PUBLIC_KEY_IDENTIFIER, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("CIPHER_SUITE", Self::VT_CIPHER_SUITE, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("KDF_PARAMETERS", Self::VT_KDF_PARAMETERS, false)?
     .visit_field::<flatbuffers::ForwardsUOffset<&str>>("ENCRYPTION_ALGORITHM_PARAMETERS", Self::VT_ENCRYPTION_ALGORITHM_PARAMETERS, false)?
     .finish();
    Ok(())
  }
}
pub struct EMEArgs<'a> {
    pub ENCRYPTED_BLOB: Option<flatbuffers::WIPOffset<flatbuffers::Vector<'a, u8>>>,
    pub EPHEMERAL_PUBLIC_KEY: Option<flatbuffers::WIPOffset<&'a str>>,
    pub MAC: Option<flatbuffers::WIPOffset<&'a str>>,
    pub NONCE_START: Option<flatbuffers::WIPOffset<flatbuffers::Vector<'a, u8>>>,
    pub TAG: Option<flatbuffers::WIPOffset<&'a str>>,
    pub IV: Option<flatbuffers::WIPOffset<&'a str>>,
    pub SALT: Option<flatbuffers::WIPOffset<&'a str>>,
    pub PUBLIC_KEY_IDENTIFIER: Option<flatbuffers::WIPOffset<&'a str>>,
    pub CIPHER_SUITE: Option<flatbuffers::WIPOffset<&'a str>>,
    pub KDF_PARAMETERS: Option<flatbuffers::WIPOffset<&'a str>>,
    pub ENCRYPTION_ALGORITHM_PARAMETERS: Option<flatbuffers::WIPOffset<&'a str>>,
}
impl<'a> Default for EMEArgs<'a> {
  #[inline]
  fn default() -> Self {
    EMEArgs {
      ENCRYPTED_BLOB: None,
      EPHEMERAL_PUBLIC_KEY: None,
      MAC: None,
      NONCE_START: None,
      TAG: None,
      IV: None,
      SALT: None,
      PUBLIC_KEY_IDENTIFIER: None,
      CIPHER_SUITE: None,
      KDF_PARAMETERS: None,
      ENCRYPTION_ALGORITHM_PARAMETERS: None,
    }
  }
}

pub struct EMEBuilder<'a: 'b, 'b, A: flatbuffers::Allocator + 'a> {
  fbb_: &'b mut flatbuffers::FlatBufferBuilder<'a, A>,
  start_: flatbuffers::WIPOffset<flatbuffers::TableUnfinishedWIPOffset>,
}
impl<'a: 'b, 'b, A: flatbuffers::Allocator + 'a> EMEBuilder<'a, 'b, A> {
  #[inline]
  pub fn add_ENCRYPTED_BLOB(&mut self, ENCRYPTED_BLOB: flatbuffers::WIPOffset<flatbuffers::Vector<'b , u8>>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_ENCRYPTED_BLOB, ENCRYPTED_BLOB);
  }
  #[inline]
  pub fn add_EPHEMERAL_PUBLIC_KEY(&mut self, EPHEMERAL_PUBLIC_KEY: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_EPHEMERAL_PUBLIC_KEY, EPHEMERAL_PUBLIC_KEY);
  }
  #[inline]
  pub fn add_MAC(&mut self, MAC: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_MAC, MAC);
  }
  #[inline]
  pub fn add_NONCE_START(&mut self, NONCE_START: flatbuffers::WIPOffset<flatbuffers::Vector<'b , u8>>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_NONCE_START, NONCE_START);
  }
  #[inline]
  pub fn add_TAG(&mut self, TAG: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_TAG, TAG);
  }
  #[inline]
  pub fn add_IV(&mut self, IV: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_IV, IV);
  }
  #[inline]
  pub fn add_SALT(&mut self, SALT: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_SALT, SALT);
  }
  #[inline]
  pub fn add_PUBLIC_KEY_IDENTIFIER(&mut self, PUBLIC_KEY_IDENTIFIER: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_PUBLIC_KEY_IDENTIFIER, PUBLIC_KEY_IDENTIFIER);
  }
  #[inline]
  pub fn add_CIPHER_SUITE(&mut self, CIPHER_SUITE: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_CIPHER_SUITE, CIPHER_SUITE);
  }
  #[inline]
  pub fn add_KDF_PARAMETERS(&mut self, KDF_PARAMETERS: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_KDF_PARAMETERS, KDF_PARAMETERS);
  }
  #[inline]
  pub fn add_ENCRYPTION_ALGORITHM_PARAMETERS(&mut self, ENCRYPTION_ALGORITHM_PARAMETERS: flatbuffers::WIPOffset<&'b  str>) {
    self.fbb_.push_slot_always::<flatbuffers::WIPOffset<_>>(EME::VT_ENCRYPTION_ALGORITHM_PARAMETERS, ENCRYPTION_ALGORITHM_PARAMETERS);
  }
  #[inline]
  pub fn new(_fbb: &'b mut flatbuffers::FlatBufferBuilder<'a, A>) -> EMEBuilder<'a, 'b, A> {
    let start = _fbb.start_table();
    EMEBuilder {
      fbb_: _fbb,
      start_: start,
    }
  }
  #[inline]
  pub fn finish(self) -> flatbuffers::WIPOffset<EME<'a>> {
    let o = self.fbb_.end_table(self.start_);
    flatbuffers::WIPOffset::new(o.value())
  }
}

impl core::fmt::Debug for EME<'_> {
  fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
    let mut ds = f.debug_struct("EME");
      ds.field("ENCRYPTED_BLOB", &self.ENCRYPTED_BLOB());
      ds.field("EPHEMERAL_PUBLIC_KEY", &self.EPHEMERAL_PUBLIC_KEY());
      ds.field("MAC", &self.MAC());
      ds.field("NONCE_START", &self.NONCE_START());
      ds.field("TAG", &self.TAG());
      ds.field("IV", &self.IV());
      ds.field("SALT", &self.SALT());
      ds.field("PUBLIC_KEY_IDENTIFIER", &self.PUBLIC_KEY_IDENTIFIER());
      ds.field("CIPHER_SUITE", &self.CIPHER_SUITE());
      ds.field("KDF_PARAMETERS", &self.KDF_PARAMETERS());
      ds.field("ENCRYPTION_ALGORITHM_PARAMETERS", &self.ENCRYPTION_ALGORITHM_PARAMETERS());
      ds.finish()
  }
}
#[non_exhaustive]
#[derive(Debug, Clone, PartialEq)]
pub struct EMET {
  pub ENCRYPTED_BLOB: Option<Vec<u8>>,
  pub EPHEMERAL_PUBLIC_KEY: Option<String>,
  pub MAC: Option<String>,
  pub NONCE_START: Option<Vec<u8>>,
  pub TAG: Option<String>,
  pub IV: Option<String>,
  pub SALT: Option<String>,
  pub PUBLIC_KEY_IDENTIFIER: Option<String>,
  pub CIPHER_SUITE: Option<String>,
  pub KDF_PARAMETERS: Option<String>,
  pub ENCRYPTION_ALGORITHM_PARAMETERS: Option<String>,
}
impl Default for EMET {
  fn default() -> Self {
    Self {
      ENCRYPTED_BLOB: None,
      EPHEMERAL_PUBLIC_KEY: None,
      MAC: None,
      NONCE_START: None,
      TAG: None,
      IV: None,
      SALT: None,
      PUBLIC_KEY_IDENTIFIER: None,
      CIPHER_SUITE: None,
      KDF_PARAMETERS: None,
      ENCRYPTION_ALGORITHM_PARAMETERS: None,
    }
  }
}
impl EMET {
  pub fn pack<'b, A: flatbuffers::Allocator + 'b>(
    &self,
    _fbb: &mut flatbuffers::FlatBufferBuilder<'b, A>
  ) -> flatbuffers::WIPOffset<EME<'b>> {
    let ENCRYPTED_BLOB = self.ENCRYPTED_BLOB.as_ref().map(|x|{
      _fbb.create_vector(x)
    });
    let EPHEMERAL_PUBLIC_KEY = self.EPHEMERAL_PUBLIC_KEY.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let MAC = self.MAC.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let NONCE_START = self.NONCE_START.as_ref().map(|x|{
      _fbb.create_vector(x)
    });
    let TAG = self.TAG.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let IV = self.IV.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let SALT = self.SALT.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let PUBLIC_KEY_IDENTIFIER = self.PUBLIC_KEY_IDENTIFIER.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let CIPHER_SUITE = self.CIPHER_SUITE.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let KDF_PARAMETERS = self.KDF_PARAMETERS.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    let ENCRYPTION_ALGORITHM_PARAMETERS = self.ENCRYPTION_ALGORITHM_PARAMETERS.as_ref().map(|x|{
      _fbb.create_string(x)
    });
    EME::create(_fbb, &EMEArgs{
      ENCRYPTED_BLOB,
      EPHEMERAL_PUBLIC_KEY,
      MAC,
      NONCE_START,
      TAG,
      IV,
      SALT,
      PUBLIC_KEY_IDENTIFIER,
      CIPHER_SUITE,
      KDF_PARAMETERS,
      ENCRYPTION_ALGORITHM_PARAMETERS,
    })
  }
}
#[inline]
/// Verifies that a buffer of bytes contains a `EME`
/// and returns it.
/// Note that verification is still experimental and may not
/// catch every error, or be maximally performant. For the
/// previous, unchecked, behavior use
/// `root_as_EME_unchecked`.
pub fn root_as_EME(buf: &[u8]) -> Result<EME, flatbuffers::InvalidFlatbuffer> {
  flatbuffers::root::<EME>(buf)
}
#[inline]
/// Verifies that a buffer of bytes contains a size prefixed
/// `EME` and returns it.
/// Note that verification is still experimental and may not
/// catch every error, or be maximally performant. For the
/// previous, unchecked, behavior use
/// `size_prefixed_root_as_EME_unchecked`.
pub fn size_prefixed_root_as_EME(buf: &[u8]) -> Result<EME, flatbuffers::InvalidFlatbuffer> {
  flatbuffers::size_prefixed_root::<EME>(buf)
}
#[inline]
/// Verifies, with the given options, that a buffer of bytes
/// contains a `EME` and returns it.
/// Note that verification is still experimental and may not
/// catch every error, or be maximally performant. For the
/// previous, unchecked, behavior use
/// `root_as_EME_unchecked`.
pub fn root_as_EME_with_opts<'b, 'o>(
  opts: &'o flatbuffers::VerifierOptions,
  buf: &'b [u8],
) -> Result<EME<'b>, flatbuffers::InvalidFlatbuffer> {
  flatbuffers::root_with_opts::<EME<'b>>(opts, buf)
}
#[inline]
/// Verifies, with the given verifier options, that a buffer of
/// bytes contains a size prefixed `EME` and returns
/// it. Note that verification is still experimental and may not
/// catch every error, or be maximally performant. For the
/// previous, unchecked, behavior use
/// `root_as_EME_unchecked`.
pub fn size_prefixed_root_as_EME_with_opts<'b, 'o>(
  opts: &'o flatbuffers::VerifierOptions,
  buf: &'b [u8],
) -> Result<EME<'b>, flatbuffers::InvalidFlatbuffer> {
  flatbuffers::size_prefixed_root_with_opts::<EME<'b>>(opts, buf)
}
#[inline]
/// Assumes, without verification, that a buffer of bytes contains a EME and returns it.
/// # Safety
/// Callers must trust the given bytes do indeed contain a valid `EME`.
pub unsafe fn root_as_EME_unchecked(buf: &[u8]) -> EME {
  flatbuffers::root_unchecked::<EME>(buf)
}
#[inline]
/// Assumes, without verification, that a buffer of bytes contains a size prefixed EME and returns it.
/// # Safety
/// Callers must trust the given bytes do indeed contain a valid size prefixed `EME`.
pub unsafe fn size_prefixed_root_as_EME_unchecked(buf: &[u8]) -> EME {
  flatbuffers::size_prefixed_root_unchecked::<EME>(buf)
}
pub const EME_IDENTIFIER: &str = "$EME";

#[inline]
pub fn EME_buffer_has_identifier(buf: &[u8]) -> bool {
  flatbuffers::buffer_has_identifier(buf, EME_IDENTIFIER, false)
}

#[inline]
pub fn EME_size_prefixed_buffer_has_identifier(buf: &[u8]) -> bool {
  flatbuffers::buffer_has_identifier(buf, EME_IDENTIFIER, true)
}

#[inline]
pub fn finish_EME_buffer<'a, 'b, A: flatbuffers::Allocator + 'a>(
    fbb: &'b mut flatbuffers::FlatBufferBuilder<'a, A>,
    root: flatbuffers::WIPOffset<EME<'a>>) {
  fbb.finish(root, Some(EME_IDENTIFIER));
}

#[inline]
pub fn finish_size_prefixed_EME_buffer<'a, 'b, A: flatbuffers::Allocator + 'a>(fbb: &'b mut flatbuffers::FlatBufferBuilder<'a, A>, root: flatbuffers::WIPOffset<EME<'a>>) {
  fbb.finish_size_prefixed(root, Some(EME_IDENTIFIER));
}