You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@qpid.apache.org by cl...@apache.org on 2013/02/15 08:08:48 UTC

svn commit: r1446466 [2/2] - in /qpid/proton/trunk/proton-c/include/proton: buffer.h codec.h cproton.i driver.h driver_extras.h engine.h error.h framing.h import_export.h message.h messenger.h parser.h sasl.h scanner.h ssl.h types.h util.h

Modified: qpid/proton/trunk/proton-c/include/proton/ssl.h
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/proton-c/include/proton/ssl.h?rev=1446466&r1=1446465&r2=1446466&view=diff
==============================================================================
--- qpid/proton/trunk/proton-c/include/proton/ssl.h (original)
+++ qpid/proton/trunk/proton-c/include/proton/ssl.h Fri Feb 15 07:08:48 2013
@@ -22,6 +22,7 @@
  *
  */
 
+#include <proton/import_export.h>
 #include <sys/types.h>
 #ifndef __cplusplus
 #include <stdbool.h>
@@ -101,14 +102,14 @@ typedef enum {
  * with this domain.
  * @return a pointer to the SSL domain, if SSL support is present.
  */
-pn_ssl_domain_t *pn_ssl_domain( pn_ssl_mode_t mode);
+PN_EXTERN pn_ssl_domain_t *pn_ssl_domain( pn_ssl_mode_t mode);
 
 /** Release an SSL configuration domain
  *
  * This method frees an SSL domain object allocated by ::pn_ssl_domain.
  * @param[in] domain the domain to destroy.
  */
-void pn_ssl_domain_free( pn_ssl_domain_t *domain );
+PN_EXTERN void pn_ssl_domain_free( pn_ssl_domain_t *domain );
 
 /** Set the certificate that identifies the local node to the remote.
  *
@@ -130,7 +131,7 @@ void pn_ssl_domain_free( pn_ssl_domain_t
  * protected.
  * @return 0 on success
  */
-int pn_ssl_domain_set_credentials( pn_ssl_domain_t *domain,
+PN_EXTERN int pn_ssl_domain_set_credentials( pn_ssl_domain_t *domain,
                                const char *certificate_file,
                                const char *private_key_file,
                                const char *password);
@@ -149,7 +150,7 @@ int pn_ssl_domain_set_credentials( pn_ss
  * @param[in] certificate_db database of trusted CAs, used to authenticate the peer.
  * @return 0 on success
  */
-int pn_ssl_domain_set_trusted_ca_db(pn_ssl_domain_t *domain,
+PN_EXTERN int pn_ssl_domain_set_trusted_ca_db(pn_ssl_domain_t *domain,
                                 const char *certificate_db);
 
 /** Determines the level of peer validation.
@@ -194,7 +195,7 @@ typedef enum {
  * to the peer client if the server has been configured to verify its peer.
  * @return 0 on success
  */
-int pn_ssl_domain_set_peer_authentication(pn_ssl_domain_t *domain,
+PN_EXTERN int pn_ssl_domain_set_peer_authentication(pn_ssl_domain_t *domain,
                                           const pn_ssl_verify_mode_t mode,
                                           const char *trusted_CAs);
 
@@ -207,7 +208,7 @@ int pn_ssl_domain_set_peer_authenticatio
  * @param[in] domain the domain (server) that will accept the client connections.
  * @return 0 on success
  */
-int pn_ssl_domain_allow_unsecured_client(pn_ssl_domain_t *domain);
+PN_EXTERN int pn_ssl_domain_allow_unsecured_client(pn_ssl_domain_t *domain);
 
 /** Create a new SSL session object associated with a transport.
  *
@@ -218,7 +219,7 @@ int pn_ssl_domain_allow_unsecured_client
  * @return a pointer to the SSL object configured for this transport.  Returns NULL if
  * no SSL session is associated with the transport.
  */
-pn_ssl_t *pn_ssl(pn_transport_t *transport);
+PN_EXTERN pn_ssl_t *pn_ssl(pn_transport_t *transport);
 
 /** Initialize an SSL session.
  *
@@ -232,7 +233,7 @@ pn_ssl_t *pn_ssl(pn_transport_t *transpo
  * and stored for future session restore.
  * @return 0 on success, else an error code.
  */
-int pn_ssl_init( pn_ssl_t *ssl,
+PN_EXTERN int pn_ssl_init( pn_ssl_t *ssl,
                  pn_ssl_domain_t *domain,
                  const char *session_id);
 
@@ -247,7 +248,7 @@ int pn_ssl_init( pn_ssl_t *ssl,
  * @param[in] size maximum number of bytes in buffer.
  * @return True if cipher name written to buffer, False if no cipher in use.
  */
-bool pn_ssl_get_cipher_name(pn_ssl_t *ssl, char *buffer, size_t size);
+PN_EXTERN bool pn_ssl_get_cipher_name(pn_ssl_t *ssl, char *buffer, size_t size);
 
 /** Get the name of the SSL protocol that is currently in use.
  *
@@ -260,7 +261,7 @@ bool pn_ssl_get_cipher_name(pn_ssl_t *ss
  * @return True if the version information was written to buffer, False if SSL connection
  * not ready.
  */
-bool pn_ssl_get_protocol_name(pn_ssl_t *ssl, char *buffer, size_t size);
+PN_EXTERN bool pn_ssl_get_protocol_name(pn_ssl_t *ssl, char *buffer, size_t size);
 
 /** Check whether the state has been resumed.
  *
@@ -274,7 +275,7 @@ bool pn_ssl_get_protocol_name(pn_ssl_t *
  * @param[in] ssl the ssl session to check
  * @return status code indicating whether or not the session has been resumed.
  */
-pn_ssl_resume_status_t pn_ssl_resume_status( pn_ssl_t *ssl );
+PN_EXTERN pn_ssl_resume_status_t pn_ssl_resume_status( pn_ssl_t *ssl );
 
 /** Set the expected identity of the remote peer.
  *
@@ -293,7 +294,7 @@ pn_ssl_resume_status_t pn_ssl_resume_sta
  * given in RFC1034, Section 3.5.
  * @return 0 on success.
  */
-int pn_ssl_set_peer_hostname( pn_ssl_t *ssl, const char *hostname);
+PN_EXTERN int pn_ssl_set_peer_hostname( pn_ssl_t *ssl, const char *hostname);
 
 
 /** Access the configured peer identity.
@@ -308,7 +309,7 @@ int pn_ssl_set_peer_hostname( pn_ssl_t *
  * no hostname set.
  * @return 0 on success.
  */
-int pn_ssl_get_peer_hostname( pn_ssl_t *ssl, char *hostname, size_t *bufsize );
+PN_EXTERN int pn_ssl_get_peer_hostname( pn_ssl_t *ssl, char *hostname, size_t *bufsize );
 
 #ifdef __cplusplus
 }

Modified: qpid/proton/trunk/proton-c/include/proton/types.h
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/proton-c/include/proton/types.h?rev=1446466&r1=1446465&r2=1446466&view=diff
==============================================================================
--- qpid/proton/trunk/proton-c/include/proton/types.h (original)
+++ qpid/proton/trunk/proton-c/include/proton/types.h Fri Feb 15 07:08:48 2013
@@ -22,6 +22,7 @@
  *
  */
 
+#include <proton/import_export.h>
 #include <sys/types.h>
 #ifndef __cplusplus
 #include <stdint.h>
@@ -53,8 +54,8 @@ typedef struct {
   char *start;
 } pn_bytes_t;
 
-pn_bytes_t pn_bytes(size_t size, char *start);
-pn_bytes_t pn_bytes_dup(size_t size, const char *start);
+PN_EXTERN pn_bytes_t pn_bytes(size_t size, char *start);
+PN_EXTERN pn_bytes_t pn_bytes_dup(size_t size, const char *start);
 
 #ifdef __cplusplus
 }

Modified: qpid/proton/trunk/proton-c/include/proton/util.h
URL: http://svn.apache.org/viewvc/qpid/proton/trunk/proton-c/include/proton/util.h?rev=1446466&r1=1446465&r2=1446466&view=diff
==============================================================================
--- qpid/proton/trunk/proton-c/include/proton/util.h (original)
+++ qpid/proton/trunk/proton-c/include/proton/util.h Fri Feb 15 07:08:48 2013
@@ -22,15 +22,16 @@
  *
  */
 
+#include <proton/import_export.h>
 #include <stdarg.h>
 
 #ifdef __cplusplus
 extern "C" {
 #endif
 
-void parse_url(char *url, char **scheme, char **user, char **pass, char **host, char **port, char **path);
-void pn_fatal(const char *fmt, ...);
-void pn_vfatal(const char *fmt, va_list ap);
+PN_EXTERN void parse_url(char *url, char **scheme, char **user, char **pass, char **host, char **port, char **path);
+PN_EXTERN void pn_fatal(const char *fmt, ...);
+PN_EXTERN void pn_vfatal(const char *fmt, va_list ap);
 
 #ifdef __cplusplus
 }



---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@qpid.apache.org
For additional commands, e-mail: commits-help@qpid.apache.org