fidl_fuchsia_wlan_common_security_common/
fidl_fuchsia_wlan_common_security_common.rs

1// WARNING: This file is machine generated by fidlgen.
2
3#![warn(clippy::all)]
4#![allow(unused_parens, unused_mut, unused_imports, nonstandard_style)]
5
6use bitflags::bitflags;
7use fidl::encoding::{MessageBufFor, ProxyChannelBox, ResourceDialect};
8use futures::future::{self, MaybeDone, TryFutureExt};
9use zx_status;
10
11/// WLAN security protocols.
12///
13/// WPA protocols are additionally enumerated by their authentication suite
14/// (i.e., Personal vs. Enterprise).
15#[derive(Copy, Clone, Debug, Eq, PartialEq, Ord, PartialOrd, Hash)]
16pub enum Protocol {
17    /// Open network security.
18    ///
19    /// This indicates that no security protocol or suite is used by a WLAN; it
20    /// is not to be confused with "open authentication".
21    Open,
22    Wep,
23    Wpa1,
24    Wpa2Personal,
25    Wpa2Enterprise,
26    Wpa3Personal,
27    Wpa3Enterprise,
28    #[doc(hidden)]
29    __SourceBreaking {
30        unknown_ordinal: u32,
31    },
32}
33
34/// Pattern that matches an unknown `Protocol` member.
35#[macro_export]
36macro_rules! ProtocolUnknown {
37    () => {
38        _
39    };
40}
41
42impl Protocol {
43    #[inline]
44    pub fn from_primitive(prim: u32) -> Option<Self> {
45        match prim {
46            1 => Some(Self::Open),
47            2 => Some(Self::Wep),
48            3 => Some(Self::Wpa1),
49            4 => Some(Self::Wpa2Personal),
50            5 => Some(Self::Wpa2Enterprise),
51            6 => Some(Self::Wpa3Personal),
52            7 => Some(Self::Wpa3Enterprise),
53            _ => None,
54        }
55    }
56
57    #[inline]
58    pub fn from_primitive_allow_unknown(prim: u32) -> Self {
59        match prim {
60            1 => Self::Open,
61            2 => Self::Wep,
62            3 => Self::Wpa1,
63            4 => Self::Wpa2Personal,
64            5 => Self::Wpa2Enterprise,
65            6 => Self::Wpa3Personal,
66            7 => Self::Wpa3Enterprise,
67            unknown_ordinal => Self::__SourceBreaking { unknown_ordinal },
68        }
69    }
70
71    #[inline]
72    pub fn unknown() -> Self {
73        Self::__SourceBreaking { unknown_ordinal: 0xffffffff }
74    }
75
76    #[inline]
77    pub const fn into_primitive(self) -> u32 {
78        match self {
79            Self::Open => 1,
80            Self::Wep => 2,
81            Self::Wpa1 => 3,
82            Self::Wpa2Personal => 4,
83            Self::Wpa2Enterprise => 5,
84            Self::Wpa3Personal => 6,
85            Self::Wpa3Enterprise => 7,
86            Self::__SourceBreaking { unknown_ordinal } => unknown_ordinal,
87        }
88    }
89
90    #[inline]
91    pub fn is_unknown(&self) -> bool {
92        match self {
93            Self::__SourceBreaking { unknown_ordinal: _ } => true,
94            _ => false,
95        }
96    }
97}
98
99/// Pairs credentials with a particular security protocol. This type requires
100/// validation, as `Protocol` and `Credentials` may disagree. FIDL APIs that use
101/// this type generally restrict authentication to `protocol`.
102#[derive(Clone, Debug, PartialEq)]
103pub struct Authentication {
104    pub protocol: Protocol,
105    pub credentials: Option<Box<Credentials>>,
106}
107
108impl fidl::Persistable for Authentication {}
109
110/// WEP credentials.
111#[derive(Clone, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)]
112pub struct WepCredentials {
113    /// Unencoded WEP key.
114    ///
115    /// This field is always a binary key; ASCII hexadecimal encoding should not
116    /// be used here.
117    pub key: Vec<u8>,
118}
119
120impl fidl::Persistable for WepCredentials {}
121
122/// Credentials used to authenticate with a WLAN.
123///
124/// The variants of this union describe the credentials supported by a protocol
125/// or protocol suite (i.e., WEP and WPA).
126#[derive(Clone, Debug)]
127pub enum Credentials {
128    Wep(WepCredentials),
129    Wpa(WpaCredentials),
130    #[doc(hidden)]
131    __SourceBreaking {
132        unknown_ordinal: u64,
133    },
134}
135
136/// Pattern that matches an unknown `Credentials` member.
137#[macro_export]
138macro_rules! CredentialsUnknown {
139    () => {
140        _
141    };
142}
143
144// Custom PartialEq so that unknown variants are not equal to themselves.
145impl PartialEq for Credentials {
146    fn eq(&self, other: &Self) -> bool {
147        match (self, other) {
148            (Self::Wep(x), Self::Wep(y)) => *x == *y,
149            (Self::Wpa(x), Self::Wpa(y)) => *x == *y,
150            _ => false,
151        }
152    }
153}
154
155impl Credentials {
156    #[inline]
157    pub fn ordinal(&self) -> u64 {
158        match *self {
159            Self::Wep(_) => 1,
160            Self::Wpa(_) => 2,
161            Self::__SourceBreaking { unknown_ordinal } => unknown_ordinal,
162        }
163    }
164
165    #[inline]
166    pub fn unknown_variant_for_testing() -> Self {
167        Self::__SourceBreaking { unknown_ordinal: 0 }
168    }
169
170    #[inline]
171    pub fn is_unknown(&self) -> bool {
172        match self {
173            Self::__SourceBreaking { .. } => true,
174            _ => false,
175        }
176    }
177}
178
179impl fidl::Persistable for Credentials {}
180
181/// WPA credentials.
182#[derive(Clone, Debug)]
183pub enum WpaCredentials {
184    /// Unencoded pre-shared key (PSK).
185    ///
186    /// This field is always a binary PSK; ASCII hexadecimal encoding should not
187    /// be used here.
188    Psk([u8; 32]),
189    /// UTF-8 encoded passphrase.
190    ///
191    /// This field is expected to use UTF-8 or compatible encoding. This is more
192    /// permissive than the passphrase to PSK mapping specified in IEEE Std
193    /// 802.11-2016 Appendix J.4, but UTF-8 is typically used in practice.
194    Passphrase(Vec<u8>),
195    #[doc(hidden)]
196    __SourceBreaking { unknown_ordinal: u64 },
197}
198
199/// Pattern that matches an unknown `WpaCredentials` member.
200#[macro_export]
201macro_rules! WpaCredentialsUnknown {
202    () => {
203        _
204    };
205}
206
207// Custom PartialEq so that unknown variants are not equal to themselves.
208impl PartialEq for WpaCredentials {
209    fn eq(&self, other: &Self) -> bool {
210        match (self, other) {
211            (Self::Psk(x), Self::Psk(y)) => *x == *y,
212            (Self::Passphrase(x), Self::Passphrase(y)) => *x == *y,
213            _ => false,
214        }
215    }
216}
217
218impl WpaCredentials {
219    #[inline]
220    pub fn ordinal(&self) -> u64 {
221        match *self {
222            Self::Psk(_) => 1,
223            Self::Passphrase(_) => 2,
224            Self::__SourceBreaking { unknown_ordinal } => unknown_ordinal,
225        }
226    }
227
228    #[inline]
229    pub fn unknown_variant_for_testing() -> Self {
230        Self::__SourceBreaking { unknown_ordinal: 0 }
231    }
232
233    #[inline]
234    pub fn is_unknown(&self) -> bool {
235        match self {
236            Self::__SourceBreaking { .. } => true,
237            _ => false,
238        }
239    }
240}
241
242impl fidl::Persistable for WpaCredentials {}
243
244mod internal {
245    use super::*;
246    unsafe impl fidl::encoding::TypeMarker for Protocol {
247        type Owned = Self;
248
249        #[inline(always)]
250        fn inline_align(_context: fidl::encoding::Context) -> usize {
251            std::mem::align_of::<u32>()
252        }
253
254        #[inline(always)]
255        fn inline_size(_context: fidl::encoding::Context) -> usize {
256            std::mem::size_of::<u32>()
257        }
258
259        #[inline(always)]
260        fn encode_is_copy() -> bool {
261            false
262        }
263
264        #[inline(always)]
265        fn decode_is_copy() -> bool {
266            false
267        }
268    }
269
270    impl fidl::encoding::ValueTypeMarker for Protocol {
271        type Borrowed<'a> = Self;
272        #[inline(always)]
273        fn borrow(value: &<Self as fidl::encoding::TypeMarker>::Owned) -> Self::Borrowed<'_> {
274            *value
275        }
276    }
277
278    unsafe impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Encode<Self, D> for Protocol {
279        #[inline]
280        unsafe fn encode(
281            self,
282            encoder: &mut fidl::encoding::Encoder<'_, D>,
283            offset: usize,
284            _depth: fidl::encoding::Depth,
285        ) -> fidl::Result<()> {
286            encoder.debug_check_bounds::<Self>(offset);
287            encoder.write_num(self.into_primitive(), offset);
288            Ok(())
289        }
290    }
291
292    impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Decode<Self, D> for Protocol {
293        #[inline(always)]
294        fn new_empty() -> Self {
295            Self::unknown()
296        }
297
298        #[inline]
299        unsafe fn decode(
300            &mut self,
301            decoder: &mut fidl::encoding::Decoder<'_, D>,
302            offset: usize,
303            _depth: fidl::encoding::Depth,
304        ) -> fidl::Result<()> {
305            decoder.debug_check_bounds::<Self>(offset);
306            let prim = decoder.read_num::<u32>(offset);
307
308            *self = Self::from_primitive_allow_unknown(prim);
309            Ok(())
310        }
311    }
312
313    impl fidl::encoding::ValueTypeMarker for Authentication {
314        type Borrowed<'a> = &'a Self;
315        fn borrow(value: &<Self as fidl::encoding::TypeMarker>::Owned) -> Self::Borrowed<'_> {
316            value
317        }
318    }
319
320    unsafe impl fidl::encoding::TypeMarker for Authentication {
321        type Owned = Self;
322
323        #[inline(always)]
324        fn inline_align(_context: fidl::encoding::Context) -> usize {
325            8
326        }
327
328        #[inline(always)]
329        fn inline_size(_context: fidl::encoding::Context) -> usize {
330            24
331        }
332    }
333
334    unsafe impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Encode<Authentication, D>
335        for &Authentication
336    {
337        #[inline]
338        unsafe fn encode(
339            self,
340            encoder: &mut fidl::encoding::Encoder<'_, D>,
341            offset: usize,
342            _depth: fidl::encoding::Depth,
343        ) -> fidl::Result<()> {
344            encoder.debug_check_bounds::<Authentication>(offset);
345            // Delegate to tuple encoding.
346            fidl::encoding::Encode::<Authentication, D>::encode(
347                (
348                    <Protocol as fidl::encoding::ValueTypeMarker>::borrow(&self.protocol),
349                    <fidl::encoding::OptionalUnion<Credentials> as fidl::encoding::ValueTypeMarker>::borrow(&self.credentials),
350                ),
351                encoder, offset, _depth
352            )
353        }
354    }
355    unsafe impl<
356            D: fidl::encoding::ResourceDialect,
357            T0: fidl::encoding::Encode<Protocol, D>,
358            T1: fidl::encoding::Encode<fidl::encoding::OptionalUnion<Credentials>, D>,
359        > fidl::encoding::Encode<Authentication, D> for (T0, T1)
360    {
361        #[inline]
362        unsafe fn encode(
363            self,
364            encoder: &mut fidl::encoding::Encoder<'_, D>,
365            offset: usize,
366            depth: fidl::encoding::Depth,
367        ) -> fidl::Result<()> {
368            encoder.debug_check_bounds::<Authentication>(offset);
369            // Zero out padding regions. There's no need to apply masks
370            // because the unmasked parts will be overwritten by fields.
371            unsafe {
372                let ptr = encoder.buf.as_mut_ptr().add(offset).offset(0);
373                (ptr as *mut u64).write_unaligned(0);
374            }
375            // Write the fields.
376            self.0.encode(encoder, offset + 0, depth)?;
377            self.1.encode(encoder, offset + 8, depth)?;
378            Ok(())
379        }
380    }
381
382    impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Decode<Self, D> for Authentication {
383        #[inline(always)]
384        fn new_empty() -> Self {
385            Self {
386                protocol: fidl::new_empty!(Protocol, D),
387                credentials: fidl::new_empty!(fidl::encoding::OptionalUnion<Credentials>, D),
388            }
389        }
390
391        #[inline]
392        unsafe fn decode(
393            &mut self,
394            decoder: &mut fidl::encoding::Decoder<'_, D>,
395            offset: usize,
396            _depth: fidl::encoding::Depth,
397        ) -> fidl::Result<()> {
398            decoder.debug_check_bounds::<Self>(offset);
399            // Verify that padding bytes are zero.
400            let ptr = unsafe { decoder.buf.as_ptr().add(offset).offset(0) };
401            let padval = unsafe { (ptr as *const u64).read_unaligned() };
402            let mask = 0xffffffff00000000u64;
403            let maskedval = padval & mask;
404            if maskedval != 0 {
405                return Err(fidl::Error::NonZeroPadding {
406                    padding_start: offset + 0 + ((mask as u64).trailing_zeros() / 8) as usize,
407                });
408            }
409            fidl::decode!(Protocol, D, &mut self.protocol, decoder, offset + 0, _depth)?;
410            fidl::decode!(
411                fidl::encoding::OptionalUnion<Credentials>,
412                D,
413                &mut self.credentials,
414                decoder,
415                offset + 8,
416                _depth
417            )?;
418            Ok(())
419        }
420    }
421
422    impl fidl::encoding::ValueTypeMarker for WepCredentials {
423        type Borrowed<'a> = &'a Self;
424        fn borrow(value: &<Self as fidl::encoding::TypeMarker>::Owned) -> Self::Borrowed<'_> {
425            value
426        }
427    }
428
429    unsafe impl fidl::encoding::TypeMarker for WepCredentials {
430        type Owned = Self;
431
432        #[inline(always)]
433        fn inline_align(_context: fidl::encoding::Context) -> usize {
434            8
435        }
436
437        #[inline(always)]
438        fn inline_size(_context: fidl::encoding::Context) -> usize {
439            16
440        }
441    }
442
443    unsafe impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Encode<WepCredentials, D>
444        for &WepCredentials
445    {
446        #[inline]
447        unsafe fn encode(
448            self,
449            encoder: &mut fidl::encoding::Encoder<'_, D>,
450            offset: usize,
451            _depth: fidl::encoding::Depth,
452        ) -> fidl::Result<()> {
453            encoder.debug_check_bounds::<WepCredentials>(offset);
454            // Delegate to tuple encoding.
455            fidl::encoding::Encode::<WepCredentials, D>::encode(
456                (<fidl::encoding::UnboundedVector<u8> as fidl::encoding::ValueTypeMarker>::borrow(
457                    &self.key,
458                ),),
459                encoder,
460                offset,
461                _depth,
462            )
463        }
464    }
465    unsafe impl<
466            D: fidl::encoding::ResourceDialect,
467            T0: fidl::encoding::Encode<fidl::encoding::UnboundedVector<u8>, D>,
468        > fidl::encoding::Encode<WepCredentials, D> for (T0,)
469    {
470        #[inline]
471        unsafe fn encode(
472            self,
473            encoder: &mut fidl::encoding::Encoder<'_, D>,
474            offset: usize,
475            depth: fidl::encoding::Depth,
476        ) -> fidl::Result<()> {
477            encoder.debug_check_bounds::<WepCredentials>(offset);
478            // Zero out padding regions. There's no need to apply masks
479            // because the unmasked parts will be overwritten by fields.
480            // Write the fields.
481            self.0.encode(encoder, offset + 0, depth)?;
482            Ok(())
483        }
484    }
485
486    impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Decode<Self, D> for WepCredentials {
487        #[inline(always)]
488        fn new_empty() -> Self {
489            Self { key: fidl::new_empty!(fidl::encoding::UnboundedVector<u8>, D) }
490        }
491
492        #[inline]
493        unsafe fn decode(
494            &mut self,
495            decoder: &mut fidl::encoding::Decoder<'_, D>,
496            offset: usize,
497            _depth: fidl::encoding::Depth,
498        ) -> fidl::Result<()> {
499            decoder.debug_check_bounds::<Self>(offset);
500            // Verify that padding bytes are zero.
501            fidl::decode!(
502                fidl::encoding::UnboundedVector<u8>,
503                D,
504                &mut self.key,
505                decoder,
506                offset + 0,
507                _depth
508            )?;
509            Ok(())
510        }
511    }
512
513    impl fidl::encoding::ValueTypeMarker for Credentials {
514        type Borrowed<'a> = &'a Self;
515        fn borrow(value: &<Self as fidl::encoding::TypeMarker>::Owned) -> Self::Borrowed<'_> {
516            value
517        }
518    }
519
520    unsafe impl fidl::encoding::TypeMarker for Credentials {
521        type Owned = Self;
522
523        #[inline(always)]
524        fn inline_align(_context: fidl::encoding::Context) -> usize {
525            8
526        }
527
528        #[inline(always)]
529        fn inline_size(_context: fidl::encoding::Context) -> usize {
530            16
531        }
532    }
533
534    unsafe impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Encode<Credentials, D>
535        for &Credentials
536    {
537        #[inline]
538        unsafe fn encode(
539            self,
540            encoder: &mut fidl::encoding::Encoder<'_, D>,
541            offset: usize,
542            _depth: fidl::encoding::Depth,
543        ) -> fidl::Result<()> {
544            encoder.debug_check_bounds::<Credentials>(offset);
545            encoder.write_num::<u64>(self.ordinal(), offset);
546            match self {
547                Credentials::Wep(ref val) => {
548                    fidl::encoding::encode_in_envelope::<WepCredentials, D>(
549                        <WepCredentials as fidl::encoding::ValueTypeMarker>::borrow(val),
550                        encoder,
551                        offset + 8,
552                        _depth,
553                    )
554                }
555                Credentials::Wpa(ref val) => {
556                    fidl::encoding::encode_in_envelope::<WpaCredentials, D>(
557                        <WpaCredentials as fidl::encoding::ValueTypeMarker>::borrow(val),
558                        encoder,
559                        offset + 8,
560                        _depth,
561                    )
562                }
563                Credentials::__SourceBreaking { .. } => Err(fidl::Error::UnknownUnionTag),
564            }
565        }
566    }
567
568    impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Decode<Self, D> for Credentials {
569        #[inline(always)]
570        fn new_empty() -> Self {
571            Self::__SourceBreaking { unknown_ordinal: 0 }
572        }
573
574        #[inline]
575        unsafe fn decode(
576            &mut self,
577            decoder: &mut fidl::encoding::Decoder<'_, D>,
578            offset: usize,
579            mut depth: fidl::encoding::Depth,
580        ) -> fidl::Result<()> {
581            decoder.debug_check_bounds::<Self>(offset);
582            #[allow(unused_variables)]
583            let next_out_of_line = decoder.next_out_of_line();
584            let handles_before = decoder.remaining_handles();
585            let (ordinal, inlined, num_bytes, num_handles) =
586                fidl::encoding::decode_union_inline_portion(decoder, offset)?;
587
588            let member_inline_size = match ordinal {
589                1 => <WepCredentials as fidl::encoding::TypeMarker>::inline_size(decoder.context),
590                2 => <WpaCredentials as fidl::encoding::TypeMarker>::inline_size(decoder.context),
591                0 => return Err(fidl::Error::UnknownUnionTag),
592                _ => num_bytes as usize,
593            };
594
595            if inlined != (member_inline_size <= 4) {
596                return Err(fidl::Error::InvalidInlineBitInEnvelope);
597            }
598            let _inner_offset;
599            if inlined {
600                decoder.check_inline_envelope_padding(offset + 8, member_inline_size)?;
601                _inner_offset = offset + 8;
602            } else {
603                depth.increment()?;
604                _inner_offset = decoder.out_of_line_offset(member_inline_size)?;
605            }
606            match ordinal {
607                1 => {
608                    #[allow(irrefutable_let_patterns)]
609                    if let Credentials::Wep(_) = self {
610                        // Do nothing, read the value into the object
611                    } else {
612                        // Initialize `self` to the right variant
613                        *self = Credentials::Wep(fidl::new_empty!(WepCredentials, D));
614                    }
615                    #[allow(irrefutable_let_patterns)]
616                    if let Credentials::Wep(ref mut val) = self {
617                        fidl::decode!(WepCredentials, D, val, decoder, _inner_offset, depth)?;
618                    } else {
619                        unreachable!()
620                    }
621                }
622                2 => {
623                    #[allow(irrefutable_let_patterns)]
624                    if let Credentials::Wpa(_) = self {
625                        // Do nothing, read the value into the object
626                    } else {
627                        // Initialize `self` to the right variant
628                        *self = Credentials::Wpa(fidl::new_empty!(WpaCredentials, D));
629                    }
630                    #[allow(irrefutable_let_patterns)]
631                    if let Credentials::Wpa(ref mut val) = self {
632                        fidl::decode!(WpaCredentials, D, val, decoder, _inner_offset, depth)?;
633                    } else {
634                        unreachable!()
635                    }
636                }
637                #[allow(deprecated)]
638                ordinal => {
639                    for _ in 0..num_handles {
640                        decoder.drop_next_handle()?;
641                    }
642                    *self = Credentials::__SourceBreaking { unknown_ordinal: ordinal };
643                }
644            }
645            if !inlined && decoder.next_out_of_line() != next_out_of_line + (num_bytes as usize) {
646                return Err(fidl::Error::InvalidNumBytesInEnvelope);
647            }
648            if handles_before != decoder.remaining_handles() + (num_handles as usize) {
649                return Err(fidl::Error::InvalidNumHandlesInEnvelope);
650            }
651            Ok(())
652        }
653    }
654
655    impl fidl::encoding::ValueTypeMarker for WpaCredentials {
656        type Borrowed<'a> = &'a Self;
657        fn borrow(value: &<Self as fidl::encoding::TypeMarker>::Owned) -> Self::Borrowed<'_> {
658            value
659        }
660    }
661
662    unsafe impl fidl::encoding::TypeMarker for WpaCredentials {
663        type Owned = Self;
664
665        #[inline(always)]
666        fn inline_align(_context: fidl::encoding::Context) -> usize {
667            8
668        }
669
670        #[inline(always)]
671        fn inline_size(_context: fidl::encoding::Context) -> usize {
672            16
673        }
674    }
675
676    unsafe impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Encode<WpaCredentials, D>
677        for &WpaCredentials
678    {
679        #[inline]
680        unsafe fn encode(
681            self,
682            encoder: &mut fidl::encoding::Encoder<'_, D>,
683            offset: usize,
684            _depth: fidl::encoding::Depth,
685        ) -> fidl::Result<()> {
686            encoder.debug_check_bounds::<WpaCredentials>(offset);
687            encoder.write_num::<u64>(self.ordinal(), offset);
688            match self {
689                WpaCredentials::Psk(ref val) => fidl::encoding::encode_in_envelope::<
690                    fidl::encoding::Array<u8, 32>,
691                    D,
692                >(
693                    <fidl::encoding::Array<u8, 32> as fidl::encoding::ValueTypeMarker>::borrow(val),
694                    encoder,
695                    offset + 8,
696                    _depth,
697                ),
698                WpaCredentials::Passphrase(ref val) => {
699                    fidl::encoding::encode_in_envelope::<fidl::encoding::Vector<u8, 63>, D>(
700                        <fidl::encoding::Vector<u8, 63> as fidl::encoding::ValueTypeMarker>::borrow(
701                            val,
702                        ),
703                        encoder,
704                        offset + 8,
705                        _depth,
706                    )
707                }
708                WpaCredentials::__SourceBreaking { .. } => Err(fidl::Error::UnknownUnionTag),
709            }
710        }
711    }
712
713    impl<D: fidl::encoding::ResourceDialect> fidl::encoding::Decode<Self, D> for WpaCredentials {
714        #[inline(always)]
715        fn new_empty() -> Self {
716            Self::__SourceBreaking { unknown_ordinal: 0 }
717        }
718
719        #[inline]
720        unsafe fn decode(
721            &mut self,
722            decoder: &mut fidl::encoding::Decoder<'_, D>,
723            offset: usize,
724            mut depth: fidl::encoding::Depth,
725        ) -> fidl::Result<()> {
726            decoder.debug_check_bounds::<Self>(offset);
727            #[allow(unused_variables)]
728            let next_out_of_line = decoder.next_out_of_line();
729            let handles_before = decoder.remaining_handles();
730            let (ordinal, inlined, num_bytes, num_handles) =
731                fidl::encoding::decode_union_inline_portion(decoder, offset)?;
732
733            let member_inline_size = match ordinal {
734                1 => <fidl::encoding::Array<u8, 32> as fidl::encoding::TypeMarker>::inline_size(
735                    decoder.context,
736                ),
737                2 => <fidl::encoding::Vector<u8, 63> as fidl::encoding::TypeMarker>::inline_size(
738                    decoder.context,
739                ),
740                0 => return Err(fidl::Error::UnknownUnionTag),
741                _ => num_bytes as usize,
742            };
743
744            if inlined != (member_inline_size <= 4) {
745                return Err(fidl::Error::InvalidInlineBitInEnvelope);
746            }
747            let _inner_offset;
748            if inlined {
749                decoder.check_inline_envelope_padding(offset + 8, member_inline_size)?;
750                _inner_offset = offset + 8;
751            } else {
752                depth.increment()?;
753                _inner_offset = decoder.out_of_line_offset(member_inline_size)?;
754            }
755            match ordinal {
756                1 => {
757                    #[allow(irrefutable_let_patterns)]
758                    if let WpaCredentials::Psk(_) = self {
759                        // Do nothing, read the value into the object
760                    } else {
761                        // Initialize `self` to the right variant
762                        *self =
763                            WpaCredentials::Psk(fidl::new_empty!(fidl::encoding::Array<u8, 32>, D));
764                    }
765                    #[allow(irrefutable_let_patterns)]
766                    if let WpaCredentials::Psk(ref mut val) = self {
767                        fidl::decode!(fidl::encoding::Array<u8, 32>, D, val, decoder, _inner_offset, depth)?;
768                    } else {
769                        unreachable!()
770                    }
771                }
772                2 => {
773                    #[allow(irrefutable_let_patterns)]
774                    if let WpaCredentials::Passphrase(_) = self {
775                        // Do nothing, read the value into the object
776                    } else {
777                        // Initialize `self` to the right variant
778                        *self = WpaCredentials::Passphrase(
779                            fidl::new_empty!(fidl::encoding::Vector<u8, 63>, D),
780                        );
781                    }
782                    #[allow(irrefutable_let_patterns)]
783                    if let WpaCredentials::Passphrase(ref mut val) = self {
784                        fidl::decode!(fidl::encoding::Vector<u8, 63>, D, val, decoder, _inner_offset, depth)?;
785                    } else {
786                        unreachable!()
787                    }
788                }
789                #[allow(deprecated)]
790                ordinal => {
791                    for _ in 0..num_handles {
792                        decoder.drop_next_handle()?;
793                    }
794                    *self = WpaCredentials::__SourceBreaking { unknown_ordinal: ordinal };
795                }
796            }
797            if !inlined && decoder.next_out_of_line() != next_out_of_line + (num_bytes as usize) {
798                return Err(fidl::Error::InvalidNumBytesInEnvelope);
799            }
800            if handles_before != decoder.remaining_handles() + (num_handles as usize) {
801                return Err(fidl::Error::InvalidNumHandlesInEnvelope);
802            }
803            Ok(())
804        }
805    }
806}