From 6faa44c454264e68a7b93ca8616211e33b988064 Mon Sep 17 00:00:00 2001
From: Thai Duong <thaidn@google.com>
Date: Thu, 18 May 2017 16:52:02 +0000
Subject: [PATCH] Merge "Use unsigned integers when possible, including in
 protobufs."

ORIGINAL_AUTHOR=Thai Duong <thaidn@google.com>
GitOrigin-RevId: bd54a12ce77ec6f535eac8a4660b365828854356
---
 cc/aead/aes_gcm_key_manager.cc                  | 4 ++--
 cc/aead/aes_gcm_key_manager.h                   | 2 +-
 cc/core/crypto_format.cc                        | 4 ++--
 cc/core/registry_test.cc                        | 2 +-
 cc/key_manager.h                                | 2 +-
 cc/mac/hmac_key_manager.cc                      | 2 +-
 cc/mac/hmac_key_manager.h                       | 2 +-
 cc/subtle/aes_gcm_boringssl.cc                  | 2 +-
 cc/subtle/ecies_hkdf_recipient_kem_boringssl.cc | 2 +-
 cc/subtle/ecies_hkdf_recipient_kem_boringssl.h  | 2 +-
 cc/subtle/ecies_hkdf_sender_kem_boringssl.cc    | 2 +-
 cc/subtle/ecies_hkdf_sender_kem_boringssl.h     | 2 +-
 cc/subtle/hmac_boringssl.cc                     | 8 ++++----
 cc/subtle/hmac_boringssl.h                      | 6 +++---
 cc/subtle/hmac_boringssl_test.cc                | 2 +-
 cc/subtle/random.cc                             | 2 +-
 cc/subtle/random.h                              | 2 +-
 cc/subtle/subtle_util_boringssl.cc              | 8 ++++----
 cc/util/validation.h                            | 4 ++--
 proto/aes_ctr.proto                             | 6 +++---
 proto/aes_ctr_hmac_aead.proto                   | 2 +-
 proto/aes_eax.proto                             | 6 +++---
 proto/aes_gcm.proto                             | 4 ++--
 proto/ecdsa.proto                               | 4 ++--
 proto/ecies_aead_hkdf.proto                     | 4 ++--
 proto/ed25519.proto                             | 4 ++--
 proto/gcp_kms.proto                             | 2 +-
 proto/hmac.proto                                | 6 +++---
 proto/kms_envelope.proto                        | 2 +-
 proto/tink.proto                                | 8 ++++----
 30 files changed, 54 insertions(+), 54 deletions(-)

diff --git a/cc/aead/aes_gcm_key_manager.cc b/cc/aead/aes_gcm_key_manager.cc
index bb86486d4..999e16bb8 100644
--- a/cc/aead/aes_gcm_key_manager.cc
+++ b/cc/aead/aes_gcm_key_manager.cc
@@ -52,7 +52,7 @@ const std::string& AesGcmKeyManager::get_key_type() const {
   return key_type_;
 }
 
-int AesGcmKeyManager::get_version() const {
+uint32_t AesGcmKeyManager::get_version() const {
   return 0;
 }
 
@@ -128,7 +128,7 @@ Status AesGcmKeyManager::Validate(const AesGcmParams& params) const {
 Status AesGcmKeyManager::Validate(const AesGcmKey& key) const {
   Status status = ValidateVersion(key.version(), get_version());
   if (!status.ok()) return status;
-  int key_size = key.key_value().size();
+  uint32_t key_size = key.key_value().size();
   if (key_size < kMinKeySizeInBytes) {
       return ToStatusF(util::error::INVALID_ARGUMENT,
                        "Invalid AesGcmKey: key_value is too short.");
diff --git a/cc/aead/aes_gcm_key_manager.h b/cc/aead/aes_gcm_key_manager.h
index 64b04d9de..f64531004 100644
--- a/cc/aead/aes_gcm_key_manager.h
+++ b/cc/aead/aes_gcm_key_manager.h
@@ -54,7 +54,7 @@ class AesGcmKeyManager : public KeyManager<Aead> {
   const std::string& get_key_type() const override;
 
   // Returns the version of this key manager.
-  int get_version() const override;
+  uint32_t get_version() const override;
 
   virtual ~AesGcmKeyManager() {}
 
diff --git a/cc/core/crypto_format.cc b/cc/core/crypto_format.cc
index bd1d16ac0..d0db2e654 100644
--- a/cc/core/crypto_format.cc
+++ b/cc/core/crypto_format.cc
@@ -43,14 +43,14 @@ util::StatusOr<std::string> CryptoFormat::get_output_prefix(
     case OutputPrefixType::TINK: {
       std::string prefix;
       prefix.assign(reinterpret_cast<const char*>(&kTinkStartByte), 1);
-      int32_t key_id = key.key_id();
+      uint32_t key_id = key.key_id();
       prefix.append(reinterpret_cast<char*>(&key_id), 4);
       return prefix;
     }
     case OutputPrefixType::LEGACY: {
       std::string prefix;
       prefix.assign(reinterpret_cast<const char*>(&kLegacyStartByte), 1);
-      int32_t key_id = key.key_id();
+      uint32_t key_id = key.key_id();
       prefix.append(reinterpret_cast<char*>(&key_id), 4);
       return prefix;
     }
diff --git a/cc/core/registry_test.cc b/cc/core/registry_test.cc
index 1eb146bb3..f86c9c69d 100644
--- a/cc/core/registry_test.cc
+++ b/cc/core/registry_test.cc
@@ -78,7 +78,7 @@ class TestAeadKeyManager : public KeyManager<Aead> {
     return util::Status::UNKNOWN;
   }
 
-  int get_version() const override {
+  uint32_t get_version() const override {
     return 0;
   }
 
diff --git a/cc/key_manager.h b/cc/key_manager.h
index b5b72ee5b..8ea34b0d4 100644
--- a/cc/key_manager.h
+++ b/cc/key_manager.h
@@ -59,7 +59,7 @@ class KeyManager {
   virtual const std::string& get_key_type() const = 0;
 
   // Returns the version of this key manager.
-  virtual int get_version() const = 0;
+  virtual uint32_t get_version() const = 0;
 
   bool DoesSupport(google::protobuf::StringPiece key_type) const {
     return (key_type == get_key_type());
diff --git a/cc/mac/hmac_key_manager.cc b/cc/mac/hmac_key_manager.cc
index 7bd3cb4f5..1f6517508 100644
--- a/cc/mac/hmac_key_manager.cc
+++ b/cc/mac/hmac_key_manager.cc
@@ -55,7 +55,7 @@ const std::string& HmacKeyManager::get_key_type() const {
   return key_type_;
 }
 
-int HmacKeyManager::get_version() const {
+uint32_t HmacKeyManager::get_version() const {
   return 0;
 }
 
diff --git a/cc/mac/hmac_key_manager.h b/cc/mac/hmac_key_manager.h
index e3e312077..59e09b05b 100644
--- a/cc/mac/hmac_key_manager.h
+++ b/cc/mac/hmac_key_manager.h
@@ -54,7 +54,7 @@ class HmacKeyManager : public KeyManager<Mac> {
   const std::string& get_key_type() const override;
 
   // Returns the version of this key manager.
-  int get_version() const override;
+  uint32_t get_version() const override;
 
   virtual ~HmacKeyManager() {}
 
diff --git a/cc/subtle/aes_gcm_boringssl.cc b/cc/subtle/aes_gcm_boringssl.cc
index e09468fd2..028ec687d 100644
--- a/cc/subtle/aes_gcm_boringssl.cc
+++ b/cc/subtle/aes_gcm_boringssl.cc
@@ -32,7 +32,7 @@ namespace cloud {
 namespace crypto {
 namespace tink {
 
-static const EVP_CIPHER* GetCipherForKeySize(int size_in_bytes) {
+static const EVP_CIPHER* GetCipherForKeySize(uint32_t size_in_bytes) {
   switch (size_in_bytes) {
     case 16:
       return EVP_aes_128_gcm();
diff --git a/cc/subtle/ecies_hkdf_recipient_kem_boringssl.cc b/cc/subtle/ecies_hkdf_recipient_kem_boringssl.cc
index 8c8321eb5..a663ce859 100644
--- a/cc/subtle/ecies_hkdf_recipient_kem_boringssl.cc
+++ b/cc/subtle/ecies_hkdf_recipient_kem_boringssl.cc
@@ -31,7 +31,7 @@ EciesHkdfRecipientKemBoringSsl::EciesHkdfRecipientKemBoringSsl(
 
 util::StatusOr<std::string> EciesHkdfRecipientKemBoringSsl::GenerateKey(
     StringPiece kem_bytes, HashType hash, StringPiece hkdf_salt,
-    StringPiece hkdf_info, int key_size_in_bytes,
+    StringPiece hkdf_info, uint32_t key_size_in_bytes,
     EcPointFormat point_format) const {
   auto status_or_ec_point =
       SubtleUtilBoringSSL::EcPointDecode(curve_, point_format, kem_bytes);
diff --git a/cc/subtle/ecies_hkdf_recipient_kem_boringssl.h b/cc/subtle/ecies_hkdf_recipient_kem_boringssl.h
index c0623bb8e..1f34f487a 100644
--- a/cc/subtle/ecies_hkdf_recipient_kem_boringssl.h
+++ b/cc/subtle/ecies_hkdf_recipient_kem_boringssl.h
@@ -43,7 +43,7 @@ class EciesHkdfRecipientKemBoringSsl {
   util::StatusOr<std::string> GenerateKey(StringPiece kem_bytes, HashType hash,
                                           StringPiece hkdf_salt,
                                           StringPiece hkdf_info,
-                                          int key_size_in_bytes,
+                                          uint32_t key_size_in_bytes,
                                           EcPointFormat point_format) const;
 
  private:
diff --git a/cc/subtle/ecies_hkdf_sender_kem_boringssl.cc b/cc/subtle/ecies_hkdf_sender_kem_boringssl.cc
index f1b0a9f8c..f82c780de 100644
--- a/cc/subtle/ecies_hkdf_sender_kem_boringssl.cc
+++ b/cc/subtle/ecies_hkdf_sender_kem_boringssl.cc
@@ -48,7 +48,7 @@ EciesHkdfSenderKemBoringSsl::EciesHkdfSenderKemBoringSsl(
 util::StatusOr<EciesHkdfSenderKemBoringSsl::KemKey>
 EciesHkdfSenderKemBoringSsl::GenerateKey(HashType hash, StringPiece hkdf_salt,
                                          StringPiece hkdf_info,
-                                         int key_size_in_bytes,
+                                         uint32_t key_size_in_bytes,
                                          EcPointFormat point_format) const {
   if (peer_pub_key_.get() == nullptr) {
     return util::Status(util::error::INTERNAL,
diff --git a/cc/subtle/ecies_hkdf_sender_kem_boringssl.h b/cc/subtle/ecies_hkdf_sender_kem_boringssl.h
index 3fa259d1d..e6efd7bb3 100644
--- a/cc/subtle/ecies_hkdf_sender_kem_boringssl.h
+++ b/cc/subtle/ecies_hkdf_sender_kem_boringssl.h
@@ -59,7 +59,7 @@ class EciesHkdfSenderKemBoringSsl {
   // symmetric key from the shared secret, hkdf info and hkdf salt.
   util::StatusOr<KemKey> GenerateKey(HashType hash, StringPiece hkdf_salt,
                                      StringPiece hkdf_info,
-                                     int key_size_in_bytes,
+                                     uint32_t key_size_in_bytes,
                                      EcPointFormat point_format) const;
 
  private:
diff --git a/cc/subtle/hmac_boringssl.cc b/cc/subtle/hmac_boringssl.cc
index a1f6e7c72..23388ee18 100644
--- a/cc/subtle/hmac_boringssl.cc
+++ b/cc/subtle/hmac_boringssl.cc
@@ -37,13 +37,13 @@ namespace tink {
 
 // static
 util::StatusOr<std::unique_ptr<Mac>> HmacBoringSsl::New(
-    HashType hash_type, int tag_size, const std::string& key_value) {
+    HashType hash_type, uint32_t tag_size, const std::string& key_value) {
   util::StatusOr<const EVP_MD*> res = SubtleUtilBoringSSL::EvpHash(hash_type);
   if (!res.ok()) {
     return res.status();
   }
   const EVP_MD* md = res.ValueOrDie();
-  if (static_cast<int>(EVP_MD_size(md)) < tag_size || tag_size <= 0) {
+  if (EVP_MD_size(md) < tag_size) {
     // The key manager is responsible to security policies.
     // The checks here just ensure the preconditions of the primitive.
     // If this fails then something is wrong with the key manager.
@@ -53,7 +53,7 @@ util::StatusOr<std::unique_ptr<Mac>> HmacBoringSsl::New(
   return std::move(hmac);
 }
 
-HmacBoringSsl::HmacBoringSsl(const EVP_MD* md, int tag_size,
+HmacBoringSsl::HmacBoringSsl(const EVP_MD* md, uint32_t tag_size,
                              const std::string& key_value)
     : md_(md), tag_size_(tag_size), key_value_(key_value) {}
 
@@ -90,7 +90,7 @@ util::Status HmacBoringSsl::VerifyMac(
                         "BoringSSL failed to compute HMAC");
   }
   uint8_t diff = 0;
-  for (int i = 0; i < tag_size_; i++) {
+  for (uint32_t i = 0; i < tag_size_; i++) {
     diff |= buf[i] ^ static_cast<uint8_t>(mac[i]);
   }
   if (diff == 0) {
diff --git a/cc/subtle/hmac_boringssl.h b/cc/subtle/hmac_boringssl.h
index c91236eba..654c1af4d 100644
--- a/cc/subtle/hmac_boringssl.h
+++ b/cc/subtle/hmac_boringssl.h
@@ -34,7 +34,7 @@ class HmacBoringSsl : public Mac {
  public:
   static util::StatusOr<std::unique_ptr<Mac>> New(
       google::cloud::crypto::tink::HashType hash_type,
-      int tag_size, const std::string& key_value);
+      uint32_t tag_size, const std::string& key_value);
 
   // Computes and returns the HMAC for 'data'.
   util::StatusOr<std::string> ComputeMac(
@@ -50,11 +50,11 @@ class HmacBoringSsl : public Mac {
 
  private:
   HmacBoringSsl() {}
-  HmacBoringSsl(const EVP_MD* md, int tag_size, const std::string& key_value);
+  HmacBoringSsl(const EVP_MD* md, uint32_t tag_size, const std::string& key_value);
 
   // HmacBoringSsl is not owner of md (it is owned by BoringSSL).
   const EVP_MD* md_;
-  int tag_size_;
+  uint32_t tag_size_;
   std::string key_value_;
 };
 
diff --git a/cc/subtle/hmac_boringssl_test.cc b/cc/subtle/hmac_boringssl_test.cc
index 367eea1d8..890c4feca 100644
--- a/cc/subtle/hmac_boringssl_test.cc
+++ b/cc/subtle/hmac_boringssl_test.cc
@@ -36,7 +36,7 @@ class HmacBoringSslTest : public ::testing::Test {
  public:
   // Utility to simplify testing with test vectors.
   // Arguments and result are hexadecimal.
-  bool HmacVerifyHex(HashType hash, int tag_size, const std::string &key_hex,
+  bool HmacVerifyHex(HashType hash, uint32_t tag_size, const std::string &key_hex,
                      const std::string &tag_hex, const std::string &data_hex) {
     std::string key = test::HexDecodeOrDie(key_hex);
     std::string tag = test::HexDecodeOrDie(tag_hex);
diff --git a/cc/subtle/random.cc b/cc/subtle/random.cc
index a386f2c16..0a9047bb0 100644
--- a/cc/subtle/random.cc
+++ b/cc/subtle/random.cc
@@ -23,7 +23,7 @@ namespace crypto {
 namespace tink {
 
 // static
-std::string Random::GetRandomBytes(int length) {
+std::string Random::GetRandomBytes(size_t length) {
   std::unique_ptr<uint8_t[]> buf(new uint8_t[length]);
   // BoringSSL documentation says that it always returns 1; while
   // OpenSSL documentation says that it returns 1 on success, 0 otherwise. We
diff --git a/cc/subtle/random.h b/cc/subtle/random.h
index 751142cde..6c489ac67 100644
--- a/cc/subtle/random.h
+++ b/cc/subtle/random.h
@@ -26,7 +26,7 @@ namespace tink {
 class Random {
  public:
   // Returns a random string of desired length.
-  static std::string GetRandomBytes(int length);
+  static std::string GetRandomBytes(size_t length);
 };
 
 }  // namespace tink
diff --git a/cc/subtle/subtle_util_boringssl.cc b/cc/subtle/subtle_util_boringssl.cc
index 5dcda8efe..35998154f 100644
--- a/cc/subtle/subtle_util_boringssl.cc
+++ b/cc/subtle/subtle_util_boringssl.cc
@@ -119,7 +119,7 @@ util::StatusOr<std::string> SubtleUtilBoringSSL::ComputeEcdhSharedSecret(
   // Get shared point's x coordinate.
   unsigned curve_size_in_bits = EC_GROUP_get_degree(priv_group.get());
   unsigned curve_size_in_bytes = (curve_size_in_bits + 7) / 8;
-  size_t x_size_in_bytes = BN_num_bytes(shared_x.get());
+  unsigned x_size_in_bytes = BN_num_bytes(shared_x.get());
   std::unique_ptr<uint8_t[]> shared_secret_bytes(
       new uint8_t[curve_size_in_bytes]);
   memset(shared_secret_bytes.get(), 0, curve_size_in_bytes);
@@ -128,9 +128,9 @@ util::StatusOr<std::string> SubtleUtilBoringSSL::ComputeEcdhSharedSecret(
                         "The x-coordinate of the shared point is larger than "
                         "the size of the curve");
   }
-  int zeros = static_cast<int>(curve_size_in_bytes - x_size_in_bytes);
-  int written = BN_bn2bin(shared_x.get(), &shared_secret_bytes.get()[zeros]);
-  if (written != static_cast<int>(x_size_in_bytes)) {
+  unsigned zeros = curve_size_in_bytes - x_size_in_bytes;
+  size_t written = BN_bn2bin(shared_x.get(), &shared_secret_bytes.get()[zeros]);
+  if (written != x_size_in_bytes) {
     return util::Status(util::error::INTERNAL, "BN_bn_2bin failed");
   }
   return std::string(reinterpret_cast<char *>(shared_secret_bytes.get()),
diff --git a/cc/util/validation.h b/cc/util/validation.h
index 3849c0b4d..6e793fa67 100644
--- a/cc/util/validation.h
+++ b/cc/util/validation.h
@@ -32,8 +32,8 @@ util::Status ValidateKeyset(const google::cloud::crypto::tink::Keyset& keyset) {
   return util::Status::OK;
 }
 
-util::Status ValidateVersion(int candidate, int max_expected) {
-  if (candidate < 0 || candidate > max_expected) {
+util::Status ValidateVersion(uint32_t candidate, uint32_t max_expected) {
+  if (candidate > max_expected) {
     return ToStatusF(util::error::INVALID_ARGUMENT,
                      "Key has version '%d'; "
                      "only keys with version in range [0..%d] are supported.",
diff --git a/proto/aes_ctr.proto b/proto/aes_ctr.proto
index 9d850cad8..2d52ef506 100644
--- a/proto/aes_ctr.proto
+++ b/proto/aes_ctr.proto
@@ -22,17 +22,17 @@ option java_package = "com.google.cloud.crypto.tink";
 option java_outer_classname = "AesCtrProto";
 
 message AesCtrParams {
-  int32 iv_size = 1;
+  uint32 iv_size = 1;
 }
 
 message AesCtrKeyFormat {
   AesCtrParams params = 1;
-  int32 key_size = 2;
+  uint32 key_size = 2;
 }
 
 // key_type: type.googleapis.com/google.cloud.crypto.tink.AesCtrKey
 message AesCtrKey {
-  int32 version = 1;
+  uint32 version = 1;
   AesCtrParams params = 2;
   bytes key_value = 3;
 }
\ No newline at end of file
diff --git a/proto/aes_ctr_hmac_aead.proto b/proto/aes_ctr_hmac_aead.proto
index c13dd2834..303cfc461 100644
--- a/proto/aes_ctr_hmac_aead.proto
+++ b/proto/aes_ctr_hmac_aead.proto
@@ -36,7 +36,7 @@ message AesCtrHmacAeadKeyFormat {
 
 // key_type: type.googleapis.com/google.cloud.crypto.tink.AesCtrKey
 message AesCtrHmacAeadKey {
-  int32 version = 1;
+  uint32 version = 1;
   AesCtrKey aes_ctr_key = 2;
   HmacKey hmac_key = 3;
 }
diff --git a/proto/aes_eax.proto b/proto/aes_eax.proto
index e10525417..92385ad42 100644
--- a/proto/aes_eax.proto
+++ b/proto/aes_eax.proto
@@ -24,17 +24,17 @@ option java_outer_classname = "AesEaxProto";
 // only allowing tag size in bytes = 16
 message AesEaxParams {
   // possible value is 12 or 16 bytes.
-  int32 iv_size = 1;
+  uint32 iv_size = 1;
 }
 
 message AesEaxKeyFormat {
   AesEaxParams params = 1;
-  int32 key_size = 2;
+  uint32 key_size = 2;
 }
 
 // key_type: type.googleapis.com/google.cloud.crypto.tink.AesEaxKey
 message AesEaxKey {
-  int32 version = 1;
+  uint32 version = 1;
   AesEaxParams params = 2;
   bytes key_value = 3;
 }
diff --git a/proto/aes_gcm.proto b/proto/aes_gcm.proto
index dd190e5a9..412e25baf 100644
--- a/proto/aes_gcm.proto
+++ b/proto/aes_gcm.proto
@@ -28,12 +28,12 @@ message AesGcmParams {
 
 message AesGcmKeyFormat {
   AesGcmParams params = 1;
-  int32 key_size = 2;
+  uint32 key_size = 2;
 }
 
 // key_type: type.googleapis.com/google.cloud.crypto.tink.AesGcmKey
 message AesGcmKey {
-  int32 version = 1;
+  uint32 version = 1;
   AesGcmParams params = 2;
   bytes key_value = 3;
 }
diff --git a/proto/ecdsa.proto b/proto/ecdsa.proto
index d43472b97..ed87b392b 100644
--- a/proto/ecdsa.proto
+++ b/proto/ecdsa.proto
@@ -51,7 +51,7 @@ message EcdsaParams {
 // key_type: type.googleapis.com/google.cloud.crypto.tink.EcdsaPublicKey
 message EcdsaPublicKey {
   // Required.
-  int32 version = 1;
+  uint32 version = 1;
   // Required.
   EcdsaParams params = 2;
   // Affine coordinates of the public key in bigendian representation. The
@@ -67,7 +67,7 @@ message EcdsaPublicKey {
 // key_type: type.googleapis.com/google.cloud.crypto.tink.EcdsaPrivateKey
 message EcdsaPrivateKey {
   // Required.
-  int32 version = 1;
+  uint32 version = 1;
   // Required.
   EcdsaPublicKey public_key = 2;
   // Unsigned big integer in bigendian representation.
diff --git a/proto/ecies_aead_hkdf.proto b/proto/ecies_aead_hkdf.proto
index 41c7fe184..bd2a7e852 100644
--- a/proto/ecies_aead_hkdf.proto
+++ b/proto/ecies_aead_hkdf.proto
@@ -74,7 +74,7 @@ message EciesAeadHkdfParams {
 // key_type: type.googleapis.com/google.cloud.crypto.tink.EciesAeadHkdfPublicKey
 message EciesAeadHkdfPublicKey {
   // Required.
-  int32 version = 1;
+  uint32 version = 1;
   // Required.
   EciesAeadHkdfParams params = 2;
 
@@ -90,7 +90,7 @@ message EciesAeadHkdfPublicKey {
 // key_type: type.googleapis.com/google.cloud.crypto.tink.EciesAeadHkdfPrivateKey
 message EciesAeadHkdfPrivateKey {
   // Required.
-  int32 version = 1;
+  uint32 version = 1;
 
   // Required.
   EciesAeadHkdfPublicKey public_key = 2;
diff --git a/proto/ed25519.proto b/proto/ed25519.proto
index ef77a721a..464cabeb7 100644
--- a/proto/ed25519.proto
+++ b/proto/ed25519.proto
@@ -31,7 +31,7 @@ message Ed25519Params {
 // key_type: type.googleapis.com/google.cloud.crypto.tink.Ed25519PublicKey
 message Ed25519PublicKey {
   // Required.
-  int32 version = 1;
+  uint32 version = 1;
   // Required.
   Ed25519Params params = 2;
   // The public key is 32 bytes, encoded according to
@@ -43,7 +43,7 @@ message Ed25519PublicKey {
 // key_type: type.googleapis.com/google.cloud.crypto.tink.Ed25519PrivateKey
 message Ed25519PrivateKey {
   // Required.
-  int32 version = 1;
+  uint32 version = 1;
   // Required.
   Ed25519PublicKey public_key = 2;
   // The private key is 32 bytes, interpreted as a little-endian integer.
diff --git a/proto/gcp_kms.proto b/proto/gcp_kms.proto
index 8c8016683..04e1c67c9 100644
--- a/proto/gcp_kms.proto
+++ b/proto/gcp_kms.proto
@@ -26,7 +26,7 @@ message GcpKmsAeadParams {
 
 // key_type: type.googleapis.com/google.cloud.crypto.tink.GcpKmsAeadKey
 message GcpKmsAeadKey {
-  int32 version = 1;
+  uint32 version = 1;
   GcpKmsAeadParams params = 2;
   // Required.
   // The location of a CryptoKey in Google Cloud KMS.
diff --git a/proto/hmac.proto b/proto/hmac.proto
index a96ac9490..4e484c799 100644
--- a/proto/hmac.proto
+++ b/proto/hmac.proto
@@ -25,17 +25,17 @@ option java_outer_classname = "HmacProto";
 
 message HmacParams {
   HashType hash = 1;    // HashType is an enum.
-  int32 tag_size = 2;
+  uint32 tag_size = 2;
 }
 
 // key_type: type.googleapis.com/google.cloud.crypto.tink.HmacKey
 message HmacKey {
-  int32 version = 1;
+  uint32 version = 1;
   HmacParams params = 2;
   bytes key_value = 3;
 }
 
 message HmacKeyFormat {
   HmacParams params = 1;
-  int32 key_size = 2;
+  uint32 key_size = 2;
 }
diff --git a/proto/kms_envelope.proto b/proto/kms_envelope.proto
index f5d4dc5dd..ac76fa2e6 100644
--- a/proto/kms_envelope.proto
+++ b/proto/kms_envelope.proto
@@ -38,6 +38,6 @@ message KmsEnvelopeAeadKeyFormat {
 
 // There is no actual key material in the key.
 message KmsEnvelopeAeadKey {
-  int32 version = 1;
+  uint32 version = 1;
   KmsEnvelopeAeadParams params = 2;
 }
diff --git a/proto/tink.proto b/proto/tink.proto
index 23f0fa1b9..20e7da37c 100644
--- a/proto/tink.proto
+++ b/proto/tink.proto
@@ -125,14 +125,14 @@ message Keyset {
 
     // Identifies a key within a keyset, is a part of metadata
     // of a ciphertext/signature.
-    int32 key_id = 3;
+    uint32 key_id = 3;
 
     OutputPrefixType output_prefix_type = 4;
   }
 
   // Identifies key used to generate new crypto data (encrypt, sign).
   // Required.
-  int32 primary_key_id = 1;
+  uint32 primary_key_id = 1;
 
   // Actual keys in the Keyset.
   // Required.
@@ -152,14 +152,14 @@ message KeysetInfo {
     KeyStatusType status = 2;
 
     // See Keyset.Key.key_id.
-    int32 key_id = 3;
+    uint32 key_id = 3;
 
     // See Keyset.Key.output_prefix_type.
     OutputPrefixType output_prefix_type = 4;
   }
 
   // See Keyset.primary_key_id.
-  int32 primary_key_id = 1;
+  uint32 primary_key_id = 1;
 
   // KeyInfos in the KeysetInfo.
   // Each KeyInfo is corresponding to a Key in the corresponding Keyset.
-- 
GitLab