summaryrefslogtreecommitdiff
path: root/random/unix/apr_random.c
diff options
context:
space:
mode:
Diffstat (limited to 'random/unix/apr_random.c')
-rw-r--r--random/unix/apr_random.c34
1 files changed, 20 insertions, 14 deletions
diff --git a/random/unix/apr_random.c b/random/unix/apr_random.c
index 64cd455e9..fc254fb1d 100644
--- a/random/unix/apr_random.c
+++ b/random/unix/apr_random.c
@@ -61,6 +61,9 @@
#include "apr_thread_proc.h"
#include <assert.h>
+#ifdef min
+#undef min
+#endif
#define min(a,b) ((a) < (b) ? (a) : (b))
#define APR_RANDOM_DEFAULT_POOLS 32
@@ -118,9 +121,10 @@ struct apr_random_t {
static apr_random_t *all_random;
-void apr_random_init(apr_random_t *g,apr_pool_t *p,
- apr_crypto_hash_t *pool_hash,apr_crypto_hash_t *key_hash,
- apr_crypto_hash_t *prng_hash)
+APR_DECLARE(void) apr_random_init(apr_random_t *g,apr_pool_t *p,
+ apr_crypto_hash_t *pool_hash,
+ apr_crypto_hash_t *key_hash,
+ apr_crypto_hash_t *prng_hash)
{
int n;
@@ -185,7 +189,7 @@ static void mixer(apr_random_t *g,pid_t pid)
g->random_bytes = 0;
}
-void apr_random_after_fork(apr_proc_t *proc)
+APR_DECLARE(void) apr_random_after_fork(apr_proc_t *proc)
{
apr_random_t *r;
@@ -193,7 +197,7 @@ void apr_random_after_fork(apr_proc_t *proc)
mixer(r,proc->pid);
}
-apr_random_t *apr_random_standard_new(apr_pool_t *p)
+APR_DECLARE(apr_random_t *) apr_random_standard_new(apr_pool_t *p)
{
apr_random_t *r = apr_palloc(p,sizeof *r);
@@ -231,8 +235,8 @@ static void rekey(apr_random_t *g)
}
}
-void apr_random_add_entropy(apr_random_t *g,const void *entropy_,
- apr_size_t bytes)
+APR_DECLARE(void) apr_random_add_entropy(apr_random_t *g,const void *entropy_,
+ apr_size_t bytes)
{
int n;
const unsigned char *entropy = entropy_;
@@ -293,8 +297,9 @@ static void apr_random_bytes(apr_random_t *g,unsigned char *random,
}
}
-apr_status_t apr_random_secure_bytes(apr_random_t *g,void *random,
- apr_size_t bytes)
+APR_DECLARE(apr_status_t) apr_random_secure_bytes(apr_random_t *g,
+ void *random,
+ apr_size_t bytes)
{
if (!g->secure_started)
return APR_ENOTENOUGHENTROPY;
@@ -302,8 +307,9 @@ apr_status_t apr_random_secure_bytes(apr_random_t *g,void *random,
return APR_SUCCESS;
}
-apr_status_t apr_random_insecure_bytes(apr_random_t *g,void *random,
- apr_size_t bytes)
+APR_DECLARE(apr_status_t) apr_random_insecure_bytes(apr_random_t *g,
+ void *random,
+ apr_size_t bytes)
{
if (!g->insecure_started)
return APR_ENOTENOUGHENTROPY;
@@ -311,20 +317,20 @@ apr_status_t apr_random_insecure_bytes(apr_random_t *g,void *random,
return APR_SUCCESS;
}
-void apr_random_barrier(apr_random_t *g)
+APR_DECLARE(void) apr_random_barrier(apr_random_t *g)
{
g->secure_started = 0;
g->secure_base = g->generation;
}
-apr_status_t apr_random_secure_ready(apr_random_t *r)
+APR_DECLARE(apr_status_t) apr_random_secure_ready(apr_random_t *r)
{
if (!r->secure_started)
return APR_ENOTENOUGHENTROPY;
return APR_SUCCESS;
}
-apr_status_t apr_random_insecure_ready(apr_random_t *r)
+APR_DECLARE(apr_status_t) apr_random_insecure_ready(apr_random_t *r)
{
if (!r->insecure_started)
return APR_ENOTENOUGHENTROPY;