1fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Protocol Buffers - Google's data interchange format
2fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Copyright 2008 Google Inc.  All rights reserved.
3afb4b72037e3f13db208590fc782c4bc8e27f862Jeff Davidson// https://developers.google.com/protocol-buffers/
4fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
5fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Redistribution and use in source and binary forms, with or without
6fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// modification, are permitted provided that the following conditions are
7fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// met:
8fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
9fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//     * Redistributions of source code must retain the above copyright
10fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// notice, this list of conditions and the following disclaimer.
11fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//     * Redistributions in binary form must reproduce the above
12fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// copyright notice, this list of conditions and the following disclaimer
13fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// in the documentation and/or other materials provided with the
14fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// distribution.
15fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//     * Neither the name of Google Inc. nor the names of its
16fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// contributors may be used to endorse or promote products derived from
17fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// this software without specific prior written permission.
18fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
19fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville
31fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Author: kenton@google.com (Kenton Varda)
32fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//  Based on original Protocol Buffers design by
33fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//  Sanjay Ghemawat, Jeff Dean, and others.
34fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
35fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// This file exists solely to document the google::protobuf namespace.
36fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// It is not compiled into anything, but it may be read by an automated
37fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// documentation generator.
38fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville
39fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Savillenamespace google {
40fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville
41fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Core components of the Protocol Buffers runtime library.
42fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
43fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// The files in this package represent the core of the Protocol Buffer
44fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// system.  All of them are part of the libprotobuf library.
45fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
46fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// A note on thread-safety:
47fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
48fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Thread-safety in the Protocol Buffer library follows a simple rule:
49fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// unless explicitly noted otherwise, it is always safe to use an object
50fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// from multiple threads simultaneously as long as the object is declared
51fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// const in all threads (or, it is only used in ways that would be allowed
52fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// if it were declared const).  However, if an object is accessed in one
53fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// thread in a way that would not be allowed if it were const, then it is
54fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// not safe to access that object in any other thread simultaneously.
55fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
56fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// Put simply, read-only access to an object can happen in multiple threads
57fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// simultaneously, but write access can only happen in a single thread at
58fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// a time.
59fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville//
60fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// The implementation does contain some "const" methods which actually modify
61fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// the object behind the scenes -- e.g., to cache results -- but in these cases
62fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville// mutex locking is used to make the access thread-safe.
63fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Savillenamespace protobuf {}
64fbaaef999ba563838ebd00874ed8a1c01fbf286dWink Saville}  // namespace google
65