ffi-bindings 1.0.1 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -15,11 +15,13 @@ function _setPrototypeOf(t, e) { return _setPrototypeOf = Object.setPrototypeOf
15
15
  function _typeof(o) { "@babel/helpers - typeof"; return _typeof = "function" == typeof Symbol && "symbol" == typeof Symbol.iterator ? function (o) { return typeof o; } : function (o) { return o && "function" == typeof Symbol && o.constructor === Symbol && o !== Symbol.prototype ? "symbol" : typeof o; }, _typeof(o); }
16
16
  // This file was autogenerated by some hot garbage in the `uniffi-bindgen-react-native` crate.
17
17
  // Trust me, you don't want to mess with it!
18
+
18
19
  /* tslint:disable */
19
20
  /* eslint-disable */
20
21
  // @ts-nocheck
21
22
  import * as wasmBundle from "./wasm-bindgen/index.js";
22
- import { AbstractFfiConverterByteArray, FfiConverterInt32, UniffiError, UniffiInternalError, UniffiRustCaller, uniffiCreateFfiConverterString, uniffiCreateRecord, uniffiTypeNameSymbol, variantOrdinalSymbol } from "uniffi-bindgen-react-native";
23
+ import { AbstractFfiConverterByteArray, FfiConverterInt32, FfiConverterObject, UniffiAbstractObject, UniffiError, UniffiInternalError, UniffiRustCaller, destructorGuardSymbol, pointerLiteralSymbol, uniffiCreateFfiConverterString, uniffiCreateRecord, uniffiTypeNameSymbol, variantOrdinalSymbol } from "uniffi-bindgen-react-native";
24
+
23
25
  // Get converters from the other files, if any.
24
26
  var nativeModule = function nativeModule() {
25
27
  return wasmBundle;
@@ -32,6 +34,12 @@ var uniffiIsDebug =
32
34
  (typeof process === "undefined" ? "undefined" : _typeof(process)) !== "object" ||
33
35
  // @ts-ignore -- The process global might not be defined
34
36
  ((_process = process) === null || _process === void 0 || (_process = _process.env) === null || _process === void 0 ? void 0 : _process.NODE_ENV) !== "production" || false;
37
+ // Public interface members begin here.
38
+
39
+ /**
40
+ * Settings for decrypting messages
41
+ */
42
+
35
43
  /**
36
44
  * Generated factory for {@link DecryptionSettings} record objects.
37
45
  */
@@ -43,19 +51,8 @@ export var DecryptionSettings = function () {
43
51
  return uniffiCreateRecord(_defaults);
44
52
  }();
45
53
  return Object.freeze({
46
- /**
47
- * Create a frozen instance of {@link DecryptionSettings}, with defaults specified
48
- * in Rust, in the {@link matrix_sdk_crypto} crate.
49
- */
50
54
  create: create,
51
- /**
52
- * Create a frozen instance of {@link DecryptionSettings}, with defaults specified
53
- * in Rust, in the {@link matrix_sdk_crypto} crate.
54
- */
55
55
  "new": create,
56
- /**
57
- * Defaults specified in the {@link matrix_sdk_crypto} crate.
58
- */
59
56
  defaults: function defaults() {
60
57
  return Object.freeze(_defaults());
61
58
  }
@@ -106,14 +103,21 @@ var stringConverter = function () {
106
103
  };
107
104
  }();
108
105
  var FfiConverterString = uniffiCreateFfiConverterString(stringConverter);
106
+
109
107
  /**
110
108
  * Strategy to collect the devices that should receive room keys for the
111
109
  * current discussion.
112
110
  */
113
- export var CollectStrategy;
114
- (function (CollectStrategy) {
111
+ export var CollectStrategy = /*#__PURE__*/function (CollectStrategy) {
115
112
  /**
116
113
  * Share with all (unblacklisted) devices.
114
+ *
115
+ * Not recommended, per the guidance of [MSC4153].
116
+ *
117
+ * (Used by Element X and Element Web in the legacy, non-"exclude insecure
118
+ * devices" mode.)
119
+ *
120
+ * [MSC4153]: https://github.com/matrix-org/matrix-doc/pull/4153
117
121
  */
118
122
  CollectStrategy[CollectStrategy["AllDevices"] = 0] = "AllDevices";
119
123
  /**
@@ -131,12 +135,24 @@ export var CollectStrategy;
131
135
  *
132
136
  * Once the problematic devices are blacklisted or whitelisted the
133
137
  * caller can retry to share a second time.
138
+ *
139
+ * Not recommended, per the guidance of [MSC4153].
140
+ *
141
+ * [MSC4153]: https://github.com/matrix-org/matrix-doc/pull/4153
134
142
  */
135
143
  CollectStrategy[CollectStrategy["ErrorOnVerifiedUserProblem"] = 1] = "ErrorOnVerifiedUserProblem";
136
144
  /**
137
145
  * Share based on identity. Only distribute to devices signed by their
138
146
  * owner. If a user has no published identity he will not receive
139
147
  * any room keys.
148
+ *
149
+ * This is the recommended strategy: it is compliant with the guidance of
150
+ * [MSC4153].
151
+ *
152
+ * (Used by Element Web and Element X in the "exclude insecure devices"
153
+ * mode.)
154
+ *
155
+ * [MSC4153]: https://github.com/matrix-org/matrix-doc/pull/4153
140
156
  */
141
157
  CollectStrategy[CollectStrategy["IdentityBasedStrategy"] = 2] = "IdentityBasedStrategy";
142
158
  /**
@@ -147,9 +163,18 @@ export var CollectStrategy;
147
163
  * - It is signed by its owner identity, and this identity has been
148
164
  * trusted via interactive verification.
149
165
  * - It is the current own device of the user.
166
+ *
167
+ * This strategy is compliant with [MSC4153], but is probably too strict
168
+ * for normal use.
169
+ *
170
+ * (Used by Element Web when "only send messages to verified users" is
171
+ * enabled.)
172
+ *
173
+ * [MSC4153]: https://github.com/matrix-org/matrix-doc/pull/4153
150
174
  */
151
175
  CollectStrategy[CollectStrategy["OnlyTrustedDevices"] = 3] = "OnlyTrustedDevices";
152
- })(CollectStrategy || (CollectStrategy = {}));
176
+ return CollectStrategy;
177
+ }({});
153
178
  var FfiConverterTypeCollectStrategy = function () {
154
179
  var ordinalConverter = FfiConverterInt32;
155
180
  var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter2) {
@@ -197,11 +222,11 @@ var FfiConverterTypeCollectStrategy = function () {
197
222
  }(AbstractFfiConverterByteArray);
198
223
  return new FFIConverter();
199
224
  }();
225
+
200
226
  /**
201
227
  * The state of an identity - verified, pinned etc.
202
228
  */
203
- export var IdentityState;
204
- (function (IdentityState) {
229
+ export var IdentityState = /*#__PURE__*/function (IdentityState) {
205
230
  /**
206
231
  * The user is verified with us
207
232
  */
@@ -227,7 +252,8 @@ export var IdentityState;
227
252
  * [`UserIdentity::withdraw_verification`] to make it pinned.
228
253
  */
229
254
  IdentityState[IdentityState["VerificationViolation"] = 3] = "VerificationViolation";
230
- })(IdentityState || (IdentityState = {}));
255
+ return IdentityState;
256
+ }({});
231
257
  var FfiConverterTypeIdentityState = function () {
232
258
  var ordinalConverter = FfiConverterInt32;
233
259
  var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter3) {
@@ -275,11 +301,11 @@ var FfiConverterTypeIdentityState = function () {
275
301
  }(AbstractFfiConverterByteArray);
276
302
  return new FFIConverter();
277
303
  }();
304
+
278
305
  /**
279
306
  * The local trust state of a device.
280
307
  */
281
- export var LocalTrust;
282
- (function (LocalTrust) {
308
+ export var LocalTrust = /*#__PURE__*/function (LocalTrust) {
283
309
  /**
284
310
  * The device has been verified and is trusted.
285
311
  */
@@ -296,7 +322,8 @@ export var LocalTrust;
296
322
  * The trust state is unset.
297
323
  */
298
324
  LocalTrust[LocalTrust["Unset"] = 3] = "Unset";
299
- })(LocalTrust || (LocalTrust = {}));
325
+ return LocalTrust;
326
+ }({});
300
327
  var FfiConverterTypeLocalTrust = function () {
301
328
  var ordinalConverter = FfiConverterInt32;
302
329
  var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter4) {
@@ -344,17 +371,18 @@ var FfiConverterTypeLocalTrust = function () {
344
371
  }(AbstractFfiConverterByteArray);
345
372
  return new FFIConverter();
346
373
  }();
374
+
347
375
  // Flat error type: LoginQrCodeDecodeError
348
- export var LoginQrCodeDecodeError_Tags;
349
- (function (LoginQrCodeDecodeError_Tags) {
376
+ export var LoginQrCodeDecodeError_Tags = /*#__PURE__*/function (LoginQrCodeDecodeError_Tags) {
350
377
  LoginQrCodeDecodeError_Tags["NotEnoughData"] = "NotEnoughData";
351
378
  LoginQrCodeDecodeError_Tags["NotUtf8"] = "NotUtf8";
352
379
  LoginQrCodeDecodeError_Tags["UrlParse"] = "UrlParse";
353
- LoginQrCodeDecodeError_Tags["InvalidMode"] = "InvalidMode";
354
- LoginQrCodeDecodeError_Tags["InvalidVersion"] = "InvalidVersion";
380
+ LoginQrCodeDecodeError_Tags["InvalidIntent"] = "InvalidIntent";
381
+ LoginQrCodeDecodeError_Tags["InvalidType"] = "InvalidType";
355
382
  LoginQrCodeDecodeError_Tags["Base64"] = "Base64";
356
383
  LoginQrCodeDecodeError_Tags["InvalidPrefix"] = "InvalidPrefix";
357
- })(LoginQrCodeDecodeError_Tags || (LoginQrCodeDecodeError_Tags = {}));
384
+ return LoginQrCodeDecodeError_Tags;
385
+ }({});
358
386
  /**
359
387
  * Error type for the decoding of the [`QrCodeData`].
360
388
  */
@@ -447,14 +475,14 @@ export var LoginQrCodeDecodeError = function () {
447
475
  }]);
448
476
  }(UniffiError);
449
477
  /**
450
- * The QR code data contains an invalid mode, we expect the login (0x03)
451
- * mode or the reciprocate mode (0x04).
478
+ * The QR code data contains an invalid intent, we expect the login
479
+ * intent or the reciprocate intent.
452
480
  */
453
- var InvalidMode = /*#__PURE__*/function (_UniffiError4) {
454
- function InvalidMode(message) {
481
+ var InvalidIntent = /*#__PURE__*/function (_UniffiError4) {
482
+ function InvalidIntent(message) {
455
483
  var _this4;
456
- _classCallCheck(this, InvalidMode);
457
- _this4 = _callSuper(this, InvalidMode, ["LoginQrCodeDecodeError", "InvalidMode", message]);
484
+ _classCallCheck(this, InvalidIntent);
485
+ _this4 = _callSuper(this, InvalidIntent, ["LoginQrCodeDecodeError", "InvalidIntent", message]);
458
486
  /**
459
487
  * @private
460
488
  * This field is private and should not be used.
@@ -465,11 +493,11 @@ export var LoginQrCodeDecodeError = function () {
465
493
  * This field is private and should not be used.
466
494
  */
467
495
  _defineProperty(_this4, variantOrdinalSymbol, 4);
468
- _defineProperty(_this4, "tag", LoginQrCodeDecodeError_Tags.InvalidMode);
496
+ _defineProperty(_this4, "tag", LoginQrCodeDecodeError_Tags.InvalidIntent);
469
497
  return _this4;
470
498
  }
471
- _inherits(InvalidMode, _UniffiError4);
472
- return _createClass(InvalidMode, null, [{
499
+ _inherits(InvalidIntent, _UniffiError4);
500
+ return _createClass(InvalidIntent, null, [{
473
501
  key: "instanceOf",
474
502
  value: function instanceOf(e) {
475
503
  return _instanceOf(e) && e[variantOrdinalSymbol] === 4;
@@ -477,13 +505,13 @@ export var LoginQrCodeDecodeError = function () {
477
505
  }]);
478
506
  }(UniffiError);
479
507
  /**
480
- * The QR code data contains an unsupported version.
508
+ * The QR code data contains an unsupported type.
481
509
  */
482
- var InvalidVersion = /*#__PURE__*/function (_UniffiError5) {
483
- function InvalidVersion(message) {
510
+ var InvalidType = /*#__PURE__*/function (_UniffiError5) {
511
+ function InvalidType(message) {
484
512
  var _this5;
485
- _classCallCheck(this, InvalidVersion);
486
- _this5 = _callSuper(this, InvalidVersion, ["LoginQrCodeDecodeError", "InvalidVersion", message]);
513
+ _classCallCheck(this, InvalidType);
514
+ _this5 = _callSuper(this, InvalidType, ["LoginQrCodeDecodeError", "InvalidType", message]);
487
515
  /**
488
516
  * @private
489
517
  * This field is private and should not be used.
@@ -494,11 +522,11 @@ export var LoginQrCodeDecodeError = function () {
494
522
  * This field is private and should not be used.
495
523
  */
496
524
  _defineProperty(_this5, variantOrdinalSymbol, 5);
497
- _defineProperty(_this5, "tag", LoginQrCodeDecodeError_Tags.InvalidVersion);
525
+ _defineProperty(_this5, "tag", LoginQrCodeDecodeError_Tags.InvalidType);
498
526
  return _this5;
499
527
  }
500
- _inherits(InvalidVersion, _UniffiError5);
501
- return _createClass(InvalidVersion, null, [{
528
+ _inherits(InvalidType, _UniffiError5);
529
+ return _createClass(InvalidType, null, [{
502
530
  key: "instanceOf",
503
531
  value: function instanceOf(e) {
504
532
  return _instanceOf(e) && e[variantOrdinalSymbol] === 5;
@@ -571,13 +599,20 @@ export var LoginQrCodeDecodeError = function () {
571
599
  NotEnoughData: NotEnoughData,
572
600
  NotUtf8: NotUtf8,
573
601
  UrlParse: UrlParse,
574
- InvalidMode: InvalidMode,
575
- InvalidVersion: InvalidVersion,
602
+ InvalidIntent: InvalidIntent,
603
+ InvalidType: InvalidType,
576
604
  Base64: Base64,
577
605
  InvalidPrefix: InvalidPrefix,
578
606
  instanceOf: _instanceOf
579
607
  };
580
608
  }();
609
+
610
+ // Union type for LoginQrCodeDecodeError error type.
611
+
612
+ /**
613
+ * Error type for the decoding of the [`QrCodeData`].
614
+ */
615
+
581
616
  var FfiConverterTypeLoginQrCodeDecodeError = function () {
582
617
  var intConverter = FfiConverterInt32;
583
618
  var FfiConverter = /*#__PURE__*/function (_AbstractFfiConverter5) {
@@ -597,9 +632,9 @@ var FfiConverterTypeLoginQrCodeDecodeError = function () {
597
632
  case 3:
598
633
  return new LoginQrCodeDecodeError.UrlParse(FfiConverterString.read(from));
599
634
  case 4:
600
- return new LoginQrCodeDecodeError.InvalidMode(FfiConverterString.read(from));
635
+ return new LoginQrCodeDecodeError.InvalidIntent(FfiConverterString.read(from));
601
636
  case 5:
602
- return new LoginQrCodeDecodeError.InvalidVersion(FfiConverterString.read(from));
637
+ return new LoginQrCodeDecodeError.InvalidType(FfiConverterString.read(from));
603
638
  case 6:
604
639
  return new LoginQrCodeDecodeError.Base64(FfiConverterString.read(from));
605
640
  case 7:
@@ -624,11 +659,73 @@ var FfiConverterTypeLoginQrCodeDecodeError = function () {
624
659
  }(AbstractFfiConverterByteArray);
625
660
  return new FfiConverter();
626
661
  }();
662
+
663
+ /**
664
+ * The intent of the device that generated/displayed the QR code.
665
+ *
666
+ * The QR code login mechanism supports both, the new device, as well as the
667
+ * existing device to display the QR code.
668
+ *
669
+ * The different intents have an explicit one-byte identifier which gets added
670
+ * to the QR code data.
671
+ */
672
+ export var QrCodeIntent = /*#__PURE__*/function (QrCodeIntent) {
673
+ /**
674
+ * Enum variant for the case where the new device is displaying the QR
675
+ * code.
676
+ */
677
+ QrCodeIntent[QrCodeIntent["Login"] = 0] = "Login";
678
+ /**
679
+ * Enum variant for the case where the existing device is displaying the QR
680
+ * code.
681
+ */
682
+ QrCodeIntent[QrCodeIntent["Reciprocate"] = 1] = "Reciprocate";
683
+ return QrCodeIntent;
684
+ }({});
685
+ var FfiConverterTypeQrCodeIntent = function () {
686
+ var ordinalConverter = FfiConverterInt32;
687
+ var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter6) {
688
+ function FFIConverter() {
689
+ _classCallCheck(this, FFIConverter);
690
+ return _callSuper(this, FFIConverter, arguments);
691
+ }
692
+ _inherits(FFIConverter, _AbstractFfiConverter6);
693
+ return _createClass(FFIConverter, [{
694
+ key: "read",
695
+ value: function read(from) {
696
+ switch (ordinalConverter.read(from)) {
697
+ case 1:
698
+ return QrCodeIntent.Login;
699
+ case 2:
700
+ return QrCodeIntent.Reciprocate;
701
+ default:
702
+ throw new UniffiInternalError.UnexpectedEnumCase();
703
+ }
704
+ }
705
+ }, {
706
+ key: "write",
707
+ value: function write(value, into) {
708
+ switch (value) {
709
+ case QrCodeIntent.Login:
710
+ return ordinalConverter.write(1, into);
711
+ case QrCodeIntent.Reciprocate:
712
+ return ordinalConverter.write(2, into);
713
+ }
714
+ }
715
+ }, {
716
+ key: "allocationSize",
717
+ value: function allocationSize(value) {
718
+ return ordinalConverter.allocationSize(0);
719
+ }
720
+ }]);
721
+ }(AbstractFfiConverterByteArray);
722
+ return new FFIConverter();
723
+ }();
724
+
627
725
  /**
628
726
  * The result of a signature check.
629
727
  */
630
- export var SignatureState;
631
- (function (SignatureState) {
728
+ export var SignatureState = /*#__PURE__*/function (SignatureState) {
632
729
  /**
633
730
  * The signature is missing.
634
731
  */
@@ -647,15 +744,16 @@ export var SignatureState;
647
744
  * signature is trusted.
648
745
  */
649
746
  SignatureState[SignatureState["ValidAndTrusted"] = 3] = "ValidAndTrusted";
650
- })(SignatureState || (SignatureState = {}));
747
+ return SignatureState;
748
+ }({});
651
749
  var FfiConverterTypeSignatureState = function () {
652
750
  var ordinalConverter = FfiConverterInt32;
653
- var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter6) {
751
+ var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter7) {
654
752
  function FFIConverter() {
655
753
  _classCallCheck(this, FFIConverter);
656
754
  return _callSuper(this, FFIConverter, arguments);
657
755
  }
658
- _inherits(FFIConverter, _AbstractFfiConverter6);
756
+ _inherits(FFIConverter, _AbstractFfiConverter7);
659
757
  return _createClass(FFIConverter, [{
660
758
  key: "read",
661
759
  value: function read(from) {
@@ -695,14 +793,18 @@ var FfiConverterTypeSignatureState = function () {
695
793
  }(AbstractFfiConverterByteArray);
696
794
  return new FFIConverter();
697
795
  }();
796
+
698
797
  /**
699
798
  * The trust level in the sender's device that is required to decrypt an
700
799
  * event.
701
800
  */
702
- export var TrustRequirement;
703
- (function (TrustRequirement) {
801
+ export var TrustRequirement = /*#__PURE__*/function (TrustRequirement) {
704
802
  /**
705
803
  * Decrypt events from everyone regardless of trust.
804
+ *
805
+ * Not recommended, per the guidance of [MSC4153].
806
+ *
807
+ * [MSC4153]: https://github.com/matrix-org/matrix-doc/pull/4153
706
808
  */
707
809
  TrustRequirement[TrustRequirement["Untrusted"] = 0] = "Untrusted";
708
810
  /**
@@ -714,15 +816,16 @@ export var TrustRequirement;
714
816
  * Only decrypt events from cross-signed devices.
715
817
  */
716
818
  TrustRequirement[TrustRequirement["CrossSigned"] = 2] = "CrossSigned";
717
- })(TrustRequirement || (TrustRequirement = {}));
819
+ return TrustRequirement;
820
+ }({});
718
821
  var FfiConverterTypeTrustRequirement = function () {
719
822
  var ordinalConverter = FfiConverterInt32;
720
- var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter7) {
823
+ var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter8) {
721
824
  function FFIConverter() {
722
825
  _classCallCheck(this, FFIConverter);
723
826
  return _callSuper(this, FFIConverter, arguments);
724
827
  }
725
- _inherits(FFIConverter, _AbstractFfiConverter7);
828
+ _inherits(FFIConverter, _AbstractFfiConverter8);
726
829
  return _createClass(FFIConverter, [{
727
830
  key: "read",
728
831
  value: function read(from) {
@@ -758,11 +861,11 @@ var FfiConverterTypeTrustRequirement = function () {
758
861
  }(AbstractFfiConverterByteArray);
759
862
  return new FFIConverter();
760
863
  }();
864
+
761
865
  /**
762
866
  * Our best guess at the reason why an event can't be decrypted.
763
867
  */
764
- export var UtdCause;
765
- (function (UtdCause) {
868
+ export var UtdCause = /*#__PURE__*/function (UtdCause) {
766
869
  /**
767
870
  * We don't have an explanation for why this UTD happened - it is probably
768
871
  * a bug, or a network split between the two homeservers.
@@ -845,15 +948,16 @@ export var UtdCause;
845
948
  * Expected message to user: "You need to verify this device".
846
949
  */
847
950
  UtdCause[UtdCause["HistoricalMessageAndDeviceIsUnverified"] = 8] = "HistoricalMessageAndDeviceIsUnverified";
848
- })(UtdCause || (UtdCause = {}));
951
+ return UtdCause;
952
+ }({});
849
953
  var FfiConverterTypeUtdCause = function () {
850
954
  var ordinalConverter = FfiConverterInt32;
851
- var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter8) {
955
+ var FFIConverter = /*#__PURE__*/function (_AbstractFfiConverter9) {
852
956
  function FFIConverter() {
853
957
  _classCallCheck(this, FFIConverter);
854
958
  return _callSuper(this, FFIConverter, arguments);
855
959
  }
856
- _inherits(FFIConverter, _AbstractFfiConverter8);
960
+ _inherits(FFIConverter, _AbstractFfiConverter9);
857
961
  return _createClass(FFIConverter, [{
858
962
  key: "read",
859
963
  value: function read(from) {
@@ -913,6 +1017,318 @@ var FfiConverterTypeUtdCause = function () {
913
1017
  }(AbstractFfiConverterByteArray);
914
1018
  return new FFIConverter();
915
1019
  }();
1020
+
1021
+ /**
1022
+ * Enum for the algorithm-specific secrets for the room key backup.
1023
+ */
1024
+
1025
+ /**
1026
+ * @deprecated Use `BackupSecretsLike` instead.
1027
+ */
1028
+
1029
+ /**
1030
+ * Enum for the algorithm-specific secrets for the room key backup.
1031
+ */
1032
+ export var BackupSecrets = /*#__PURE__*/function (_UniffiAbstractObject) {
1033
+ // No primary constructor declared for this class.
1034
+ function BackupSecrets(pointer) {
1035
+ var _this8;
1036
+ _classCallCheck(this, BackupSecrets);
1037
+ _this8 = _callSuper(this, BackupSecrets);
1038
+ _defineProperty(_this8, uniffiTypeNameSymbol, "BackupSecrets");
1039
+ _defineProperty(_this8, destructorGuardSymbol, void 0);
1040
+ _defineProperty(_this8, pointerLiteralSymbol, void 0);
1041
+ _this8[pointerLiteralSymbol] = pointer;
1042
+ _this8[destructorGuardSymbol] = uniffiTypeBackupSecretsObjectFactory.bless(pointer);
1043
+ return _this8;
1044
+ }
1045
+
1046
+ /**
1047
+ * {@inheritDoc uniffi-bindgen-react-native#UniffiAbstractObject.uniffiDestroy}
1048
+ */
1049
+ _inherits(BackupSecrets, _UniffiAbstractObject);
1050
+ return _createClass(BackupSecrets, [{
1051
+ key: "uniffiDestroy",
1052
+ value: function uniffiDestroy() {
1053
+ var ptr = this[destructorGuardSymbol];
1054
+ if (ptr !== undefined) {
1055
+ var pointer = uniffiTypeBackupSecretsObjectFactory.pointer(this);
1056
+ uniffiTypeBackupSecretsObjectFactory.freePointer(pointer);
1057
+ uniffiTypeBackupSecretsObjectFactory.unbless(ptr);
1058
+ delete this[destructorGuardSymbol];
1059
+ }
1060
+ }
1061
+ }], [{
1062
+ key: "instanceOf",
1063
+ value: function instanceOf(obj) {
1064
+ return uniffiTypeBackupSecretsObjectFactory.isConcreteType(obj);
1065
+ }
1066
+ }]);
1067
+ }(UniffiAbstractObject);
1068
+ var uniffiTypeBackupSecretsObjectFactory = function () {
1069
+ /// <reference lib="es2021" />
1070
+ var registry = typeof FinalizationRegistry !== 'undefined' ? new FinalizationRegistry(function (heldValue) {
1071
+ uniffiTypeBackupSecretsObjectFactory.freePointer(heldValue);
1072
+ }) : null;
1073
+ return {
1074
+ create: function create(pointer) {
1075
+ var instance = Object.create(BackupSecrets.prototype);
1076
+ instance[pointerLiteralSymbol] = pointer;
1077
+ instance[destructorGuardSymbol] = this.bless(pointer);
1078
+ instance[uniffiTypeNameSymbol] = "BackupSecrets";
1079
+ return instance;
1080
+ },
1081
+ bless: function bless(p) {
1082
+ var ptr = {
1083
+ p: p,
1084
+ // make sure this object doesn't get optimized away.
1085
+ markDestroyed: function markDestroyed() {
1086
+ return undefined;
1087
+ }
1088
+ };
1089
+ if (registry) {
1090
+ registry.register(ptr, p, ptr);
1091
+ }
1092
+ return ptr;
1093
+ },
1094
+ unbless: function unbless(ptr) {
1095
+ if (registry) {
1096
+ registry.unregister(ptr);
1097
+ }
1098
+ },
1099
+ pointer: function pointer(obj) {
1100
+ if (obj[destructorGuardSymbol] === undefined) {
1101
+ throw new UniffiInternalError.UnexpectedNullPointer();
1102
+ }
1103
+ return obj[pointerLiteralSymbol];
1104
+ },
1105
+ clonePointer: function clonePointer(obj) {
1106
+ var pointer = this.pointer(obj);
1107
+ return uniffiCaller.rustCall(/*caller:*/function (callStatus) {
1108
+ return nativeModule().ubrn_uniffi_matrix_sdk_crypto_fn_clone_backupsecrets(pointer, callStatus);
1109
+ }, /*liftString:*/FfiConverterString.lift);
1110
+ },
1111
+ freePointer: function freePointer(pointer) {
1112
+ uniffiCaller.rustCall(/*caller:*/function (callStatus) {
1113
+ return nativeModule().ubrn_uniffi_matrix_sdk_crypto_fn_free_backupsecrets(pointer, callStatus);
1114
+ }, /*liftString:*/FfiConverterString.lift);
1115
+ },
1116
+ isConcreteType: function isConcreteType(obj) {
1117
+ return obj[destructorGuardSymbol] && obj[uniffiTypeNameSymbol] === "BackupSecrets";
1118
+ }
1119
+ };
1120
+ }();
1121
+ // FfiConverter for BackupSecretsLike
1122
+ var FfiConverterTypeBackupSecrets = new FfiConverterObject(uniffiTypeBackupSecretsObjectFactory);
1123
+
1124
+ /**
1125
+ * Data for the secrets bundle containing the cross-signing keys.
1126
+ */
1127
+
1128
+ /**
1129
+ * @deprecated Use `CrossSigningSecretsLike` instead.
1130
+ */
1131
+
1132
+ /**
1133
+ * Data for the secrets bundle containing the cross-signing keys.
1134
+ */
1135
+ export var CrossSigningSecrets = /*#__PURE__*/function (_UniffiAbstractObject2) {
1136
+ // No primary constructor declared for this class.
1137
+ function CrossSigningSecrets(pointer) {
1138
+ var _this9;
1139
+ _classCallCheck(this, CrossSigningSecrets);
1140
+ _this9 = _callSuper(this, CrossSigningSecrets);
1141
+ _defineProperty(_this9, uniffiTypeNameSymbol, "CrossSigningSecrets");
1142
+ _defineProperty(_this9, destructorGuardSymbol, void 0);
1143
+ _defineProperty(_this9, pointerLiteralSymbol, void 0);
1144
+ _this9[pointerLiteralSymbol] = pointer;
1145
+ _this9[destructorGuardSymbol] = uniffiTypeCrossSigningSecretsObjectFactory.bless(pointer);
1146
+ return _this9;
1147
+ }
1148
+
1149
+ /**
1150
+ * {@inheritDoc uniffi-bindgen-react-native#UniffiAbstractObject.uniffiDestroy}
1151
+ */
1152
+ _inherits(CrossSigningSecrets, _UniffiAbstractObject2);
1153
+ return _createClass(CrossSigningSecrets, [{
1154
+ key: "uniffiDestroy",
1155
+ value: function uniffiDestroy() {
1156
+ var ptr = this[destructorGuardSymbol];
1157
+ if (ptr !== undefined) {
1158
+ var pointer = uniffiTypeCrossSigningSecretsObjectFactory.pointer(this);
1159
+ uniffiTypeCrossSigningSecretsObjectFactory.freePointer(pointer);
1160
+ uniffiTypeCrossSigningSecretsObjectFactory.unbless(ptr);
1161
+ delete this[destructorGuardSymbol];
1162
+ }
1163
+ }
1164
+ }], [{
1165
+ key: "instanceOf",
1166
+ value: function instanceOf(obj) {
1167
+ return uniffiTypeCrossSigningSecretsObjectFactory.isConcreteType(obj);
1168
+ }
1169
+ }]);
1170
+ }(UniffiAbstractObject);
1171
+ var uniffiTypeCrossSigningSecretsObjectFactory = function () {
1172
+ /// <reference lib="es2021" />
1173
+ var registry = typeof FinalizationRegistry !== 'undefined' ? new FinalizationRegistry(function (heldValue) {
1174
+ uniffiTypeCrossSigningSecretsObjectFactory.freePointer(heldValue);
1175
+ }) : null;
1176
+ return {
1177
+ create: function create(pointer) {
1178
+ var instance = Object.create(CrossSigningSecrets.prototype);
1179
+ instance[pointerLiteralSymbol] = pointer;
1180
+ instance[destructorGuardSymbol] = this.bless(pointer);
1181
+ instance[uniffiTypeNameSymbol] = "CrossSigningSecrets";
1182
+ return instance;
1183
+ },
1184
+ bless: function bless(p) {
1185
+ var ptr = {
1186
+ p: p,
1187
+ // make sure this object doesn't get optimized away.
1188
+ markDestroyed: function markDestroyed() {
1189
+ return undefined;
1190
+ }
1191
+ };
1192
+ if (registry) {
1193
+ registry.register(ptr, p, ptr);
1194
+ }
1195
+ return ptr;
1196
+ },
1197
+ unbless: function unbless(ptr) {
1198
+ if (registry) {
1199
+ registry.unregister(ptr);
1200
+ }
1201
+ },
1202
+ pointer: function pointer(obj) {
1203
+ if (obj[destructorGuardSymbol] === undefined) {
1204
+ throw new UniffiInternalError.UnexpectedNullPointer();
1205
+ }
1206
+ return obj[pointerLiteralSymbol];
1207
+ },
1208
+ clonePointer: function clonePointer(obj) {
1209
+ var pointer = this.pointer(obj);
1210
+ return uniffiCaller.rustCall(/*caller:*/function (callStatus) {
1211
+ return nativeModule().ubrn_uniffi_matrix_sdk_crypto_fn_clone_crosssigningsecrets(pointer, callStatus);
1212
+ }, /*liftString:*/FfiConverterString.lift);
1213
+ },
1214
+ freePointer: function freePointer(pointer) {
1215
+ uniffiCaller.rustCall(/*caller:*/function (callStatus) {
1216
+ return nativeModule().ubrn_uniffi_matrix_sdk_crypto_fn_free_crosssigningsecrets(pointer, callStatus);
1217
+ }, /*liftString:*/FfiConverterString.lift);
1218
+ },
1219
+ isConcreteType: function isConcreteType(obj) {
1220
+ return obj[destructorGuardSymbol] && obj[uniffiTypeNameSymbol] === "CrossSigningSecrets";
1221
+ }
1222
+ };
1223
+ }();
1224
+ // FfiConverter for CrossSigningSecretsLike
1225
+ var FfiConverterTypeCrossSigningSecrets = new FfiConverterObject(uniffiTypeCrossSigningSecretsObjectFactory);
1226
+
1227
+ /**
1228
+ * Struct containing the bundle of secrets to fully activate a new devices for
1229
+ * end-to-end encryption.
1230
+ */
1231
+
1232
+ /**
1233
+ * @deprecated Use `SecretsBundleLike` instead.
1234
+ */
1235
+
1236
+ /**
1237
+ * Struct containing the bundle of secrets to fully activate a new devices for
1238
+ * end-to-end encryption.
1239
+ */
1240
+ export var SecretsBundle = /*#__PURE__*/function (_UniffiAbstractObject3) {
1241
+ // No primary constructor declared for this class.
1242
+ function SecretsBundle(pointer) {
1243
+ var _this0;
1244
+ _classCallCheck(this, SecretsBundle);
1245
+ _this0 = _callSuper(this, SecretsBundle);
1246
+ _defineProperty(_this0, uniffiTypeNameSymbol, "SecretsBundle");
1247
+ _defineProperty(_this0, destructorGuardSymbol, void 0);
1248
+ _defineProperty(_this0, pointerLiteralSymbol, void 0);
1249
+ _this0[pointerLiteralSymbol] = pointer;
1250
+ _this0[destructorGuardSymbol] = uniffiTypeSecretsBundleObjectFactory.bless(pointer);
1251
+ return _this0;
1252
+ }
1253
+
1254
+ /**
1255
+ * {@inheritDoc uniffi-bindgen-react-native#UniffiAbstractObject.uniffiDestroy}
1256
+ */
1257
+ _inherits(SecretsBundle, _UniffiAbstractObject3);
1258
+ return _createClass(SecretsBundle, [{
1259
+ key: "uniffiDestroy",
1260
+ value: function uniffiDestroy() {
1261
+ var ptr = this[destructorGuardSymbol];
1262
+ if (ptr !== undefined) {
1263
+ var pointer = uniffiTypeSecretsBundleObjectFactory.pointer(this);
1264
+ uniffiTypeSecretsBundleObjectFactory.freePointer(pointer);
1265
+ uniffiTypeSecretsBundleObjectFactory.unbless(ptr);
1266
+ delete this[destructorGuardSymbol];
1267
+ }
1268
+ }
1269
+ }], [{
1270
+ key: "instanceOf",
1271
+ value: function instanceOf(obj) {
1272
+ return uniffiTypeSecretsBundleObjectFactory.isConcreteType(obj);
1273
+ }
1274
+ }]);
1275
+ }(UniffiAbstractObject);
1276
+ var uniffiTypeSecretsBundleObjectFactory = function () {
1277
+ /// <reference lib="es2021" />
1278
+ var registry = typeof FinalizationRegistry !== 'undefined' ? new FinalizationRegistry(function (heldValue) {
1279
+ uniffiTypeSecretsBundleObjectFactory.freePointer(heldValue);
1280
+ }) : null;
1281
+ return {
1282
+ create: function create(pointer) {
1283
+ var instance = Object.create(SecretsBundle.prototype);
1284
+ instance[pointerLiteralSymbol] = pointer;
1285
+ instance[destructorGuardSymbol] = this.bless(pointer);
1286
+ instance[uniffiTypeNameSymbol] = "SecretsBundle";
1287
+ return instance;
1288
+ },
1289
+ bless: function bless(p) {
1290
+ var ptr = {
1291
+ p: p,
1292
+ // make sure this object doesn't get optimized away.
1293
+ markDestroyed: function markDestroyed() {
1294
+ return undefined;
1295
+ }
1296
+ };
1297
+ if (registry) {
1298
+ registry.register(ptr, p, ptr);
1299
+ }
1300
+ return ptr;
1301
+ },
1302
+ unbless: function unbless(ptr) {
1303
+ if (registry) {
1304
+ registry.unregister(ptr);
1305
+ }
1306
+ },
1307
+ pointer: function pointer(obj) {
1308
+ if (obj[destructorGuardSymbol] === undefined) {
1309
+ throw new UniffiInternalError.UnexpectedNullPointer();
1310
+ }
1311
+ return obj[pointerLiteralSymbol];
1312
+ },
1313
+ clonePointer: function clonePointer(obj) {
1314
+ var pointer = this.pointer(obj);
1315
+ return uniffiCaller.rustCall(/*caller:*/function (callStatus) {
1316
+ return nativeModule().ubrn_uniffi_matrix_sdk_crypto_fn_clone_secretsbundle(pointer, callStatus);
1317
+ }, /*liftString:*/FfiConverterString.lift);
1318
+ },
1319
+ freePointer: function freePointer(pointer) {
1320
+ uniffiCaller.rustCall(/*caller:*/function (callStatus) {
1321
+ return nativeModule().ubrn_uniffi_matrix_sdk_crypto_fn_free_secretsbundle(pointer, callStatus);
1322
+ }, /*liftString:*/FfiConverterString.lift);
1323
+ },
1324
+ isConcreteType: function isConcreteType(obj) {
1325
+ return obj[destructorGuardSymbol] && obj[uniffiTypeNameSymbol] === "SecretsBundle";
1326
+ }
1327
+ };
1328
+ }();
1329
+ // FfiConverter for SecretsBundleLike
1330
+ var FfiConverterTypeSecretsBundle = new FfiConverterObject(uniffiTypeSecretsBundleObjectFactory);
1331
+
916
1332
  /**
917
1333
  * This should be called before anything else.
918
1334
  *
@@ -925,7 +1341,7 @@ var FfiConverterTypeUtdCause = function () {
925
1341
  */
926
1342
  function uniffiEnsureInitialized() {
927
1343
  // Get the bindings contract version from our ComponentInterface
928
- var bindingsContractVersion = 29;
1344
+ var bindingsContractVersion = 30;
929
1345
  // Get the scaffolding contract version by calling the into the dylib
930
1346
  var scaffoldingContractVersion = nativeModule().ubrn_ffi_matrix_sdk_crypto_uniffi_contract_version();
931
1347
  if (bindingsContractVersion !== scaffoldingContractVersion) {
@@ -935,11 +1351,15 @@ function uniffiEnsureInitialized() {
935
1351
  export default Object.freeze({
936
1352
  initialize: uniffiEnsureInitialized,
937
1353
  converters: {
1354
+ FfiConverterTypeBackupSecrets: FfiConverterTypeBackupSecrets,
938
1355
  FfiConverterTypeCollectStrategy: FfiConverterTypeCollectStrategy,
1356
+ FfiConverterTypeCrossSigningSecrets: FfiConverterTypeCrossSigningSecrets,
939
1357
  FfiConverterTypeDecryptionSettings: FfiConverterTypeDecryptionSettings,
940
1358
  FfiConverterTypeIdentityState: FfiConverterTypeIdentityState,
941
1359
  FfiConverterTypeLocalTrust: FfiConverterTypeLocalTrust,
942
1360
  FfiConverterTypeLoginQrCodeDecodeError: FfiConverterTypeLoginQrCodeDecodeError,
1361
+ FfiConverterTypeQrCodeIntent: FfiConverterTypeQrCodeIntent,
1362
+ FfiConverterTypeSecretsBundle: FfiConverterTypeSecretsBundle,
943
1363
  FfiConverterTypeSignatureState: FfiConverterTypeSignatureState,
944
1364
  FfiConverterTypeTrustRequirement: FfiConverterTypeTrustRequirement,
945
1365
  FfiConverterTypeUtdCause: FfiConverterTypeUtdCause