libsecret/auto/functions.rs
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55
// This file was generated by gir (https://github.com/gtk-rs/gir)
// from
// from gir-files (https://github.com/gtk-rs/gir-files.git)
// DO NOT EDIT
use crate::ffi;
#[cfg(feature = "v0_19")]
#[cfg_attr(docsrs, doc(cfg(feature = "v0_19")))]
use crate::{Retrievable, Value};
#[cfg(feature = "v0_18_6")]
#[cfg_attr(docsrs, doc(cfg(feature = "v0_18_6")))]
use crate::{Schema, SchemaType};
use glib::{prelude::*, translate::*};
//#[cfg(feature = "v0_21_2")]
//#[cfg_attr(docsrs, doc(cfg(feature = "v0_21_2")))]
//#[doc(alias = "secret_attributes_validate")]
//pub fn attributes_validate(schema: &Schema, attributes: /*Unknown conversion*//*Unimplemented*/HashTable TypeId { ns_id: 0, id: 25 }/TypeId { ns_id: 0, id: 25 }) -> Result<(), glib::Error> {
// unsafe { TODO: call ffi:secret_attributes_validate() }
//}
/// Get a secret storage schema of the given @type_.
///
/// C code may access the schemas (such as `SECRET_SCHEMA_NOTE`) directly, but
/// language bindings cannot, and must use this accessor.
/// ## `type_`
/// type of schema to get
///
/// # Returns
///
/// schema type
#[cfg(feature = "v0_18_6")]
#[cfg_attr(docsrs, doc(cfg(feature = "v0_18_6")))]
#[doc(alias = "secret_get_schema")]
#[doc(alias = "get_schema")]
pub fn schema(type_: SchemaType) -> Schema {
unsafe { from_glib_none(ffi::secret_get_schema(type_.into_glib())) }
}
#[doc(alias = "secret_password_free")]
pub fn password_free(password: Option<&str>) {
unsafe {
ffi::secret_password_free(password.to_glib_none().0);
}
}
/// Clear the memory used by a password.
/// ## `password`
/// password to clear
#[doc(alias = "secret_password_wipe")]
pub fn password_wipe(password: Option<&str>) {
unsafe {
ffi::secret_password_wipe(password.to_glib_none().0);
}
}