diff options
author | bnicholes <bnicholes@13f79535-47bb-0310-9956-ffa450edef68> | 2003-11-11 22:03:00 +0000 |
---|---|---|
committer | bnicholes <bnicholes@13f79535-47bb-0310-9956-ffa450edef68> | 2003-11-11 22:03:00 +0000 |
commit | 5f8f5252d29d2ac5332f82ba4450a6baa98d3806 (patch) | |
tree | 0fc256735ce46a846389cf7ab0c889e5198cd5a2 /include/apr_random.h | |
parent | 25c812bff0b0f1703a1e840d02921f7f4411a168 (diff) | |
download | libapr-5f8f5252d29d2ac5332f82ba4450a6baa98d3806.tar.gz |
Add APR_DECLARE() to the function prototypes so that the will show up in
the NetWare export list.
git-svn-id: http://svn.apache.org/repos/asf/apr/apr/trunk@64738 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'include/apr_random.h')
-rw-r--r-- | include/apr_random.h | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/include/apr_random.h b/include/apr_random.h index 22e900f8a..ab77c5a45 100644 --- a/include/apr_random.h +++ b/include/apr_random.h @@ -74,23 +74,23 @@ struct apr_crypto_hash_t { void *data; }; -apr_crypto_hash_t *apr_crypto_sha256_new(apr_pool_t *p); +APR_DECLARE(apr_crypto_hash_t *) apr_crypto_sha256_new(apr_pool_t *p); typedef struct apr_random_t apr_random_t; -void apr_random_init(apr_random_t *g,apr_pool_t *p, +APR_DECLARE(void) apr_random_init(apr_random_t *g,apr_pool_t *p, apr_crypto_hash_t *pool_hash,apr_crypto_hash_t *key_hash, apr_crypto_hash_t *prng_hash); -apr_random_t *apr_random_standard_new(apr_pool_t *p); -void apr_random_add_entropy(apr_random_t *g,const void *entropy_, +APR_DECLARE(apr_random_t *) apr_random_standard_new(apr_pool_t *p); +APR_DECLARE(void) apr_random_add_entropy(apr_random_t *g,const void *entropy_, apr_size_t bytes); -apr_status_t apr_random_insecure_bytes(apr_random_t *g,void *random, +APR_DECLARE(apr_status_t) apr_random_insecure_bytes(apr_random_t *g,void *random, apr_size_t bytes); -apr_status_t apr_random_secure_bytes(apr_random_t *g,void *random, +APR_DECLARE(apr_status_t) apr_random_secure_bytes(apr_random_t *g,void *random, apr_size_t bytes); -void apr_random_barrier(apr_random_t *g); -apr_status_t apr_random_secure_ready(apr_random_t *r); -apr_status_t apr_random_insecure_ready(apr_random_t *r); +APR_DECLARE(void) apr_random_barrier(apr_random_t *g); +APR_DECLARE(apr_status_t) apr_random_secure_ready(apr_random_t *r); +APR_DECLARE(apr_status_t) apr_random_insecure_ready(apr_random_t *r); /* Call this in the child after forking to mix the randomness pools. Note that its generally a bad idea to fork a process with a @@ -103,6 +103,6 @@ apr_status_t apr_random_insecure_ready(apr_random_t *r); applications need ever call it themselves. */ struct apr_proc_t; -void apr_random_after_fork(struct apr_proc_t *proc); +APR_DECLARE(void) apr_random_after_fork(struct apr_proc_t *proc); #endif /* ndef APR_RANDOM_H */ |