eapol/eapol_framework/eapol_symbian/am/include/eap_am_crypto_symbian.h
changeset 49 43351a4f2da3
parent 26 9abfd4f00d37
--- a/eapol/eapol_framework/eapol_symbian/am/include/eap_am_crypto_symbian.h	Fri Sep 03 09:22:44 2010 +0300
+++ b/eapol/eapol_framework/eapol_symbian/am/include/eap_am_crypto_symbian.h	Thu Sep 16 13:07:04 2010 +0300
@@ -26,6 +26,27 @@
 #include "eap_am_types.h"
 #include "eap_variable_data.h"
 #include "eap_am_export.h"
+// Start: added by script change_export_macros.sh.
+#if defined(EAP_NO_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H)
+	#define EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_NONSHARABLE 
+	#define EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H 
+	#define EAP_C_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H 
+	#define EAP_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H 
+	#define EAP_C_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H 
+#elif defined(EAP_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H)
+	#define EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_EXPORT 
+	#define EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_FUNC_EXPORT 
+	#define EAP_C_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_C_FUNC_EXPORT 
+	#define EAP_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H EAP_FUNC_EXPORT 
+	#define EAP_C_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H EAP_C_FUNC_EXPORT 
+#else
+	#define EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_IMPORT 
+	#define EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_FUNC_IMPORT 
+	#define EAP_C_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_C_FUNC_IMPORT 
+	#define EAP_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H 
+	#define EAP_C_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H 
+#endif
+// End: added by script change_export_macros.sh.
 #include "eap_am_tools.h"
 #include "eap_array.h"
 #include "abs_eap_am_crypto.h"
@@ -41,7 +62,7 @@
 
 /// Class eap_am_crypto offers services to authenticate data, encrypt data,
 /// decrypt data, generate keys and generate cryptographically strong random data.
-class EAP_EXPORT eap_am_crypto_symbian_c 
+class EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_am_crypto_symbian_c 
 : public abs_eap_am_crypto_c
 {
 private:
@@ -60,23 +81,23 @@
 	/**
 	 * Destructor does nothing special.
 	 */
-	EAP_FUNC_IMPORT virtual ~eap_am_crypto_symbian_c();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H virtual ~eap_am_crypto_symbian_c();
 
 	/**
 	 * Constructor initializes the member attributes.
 	 */
-	EAP_FUNC_IMPORT eap_am_crypto_symbian_c(abs_eap_am_tools_c * const tools);
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_am_crypto_symbian_c(abs_eap_am_tools_c * const tools);
 
-	EAP_FUNC_IMPORT eap_status_e configure();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e configure();
 
 
 	/**
 	 * The get_is_valid() function returns the status of the eap_core object.
 	 * True indicates the object is initialized succesfully.
 	 */	
-	EAP_FUNC_IMPORT bool get_is_valid() const;
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H bool get_is_valid() const;
 
-	EAP_FUNC_IMPORT void set_is_valid();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void set_is_valid();
 	
 	// - - - - - - - - - - - - - - - - - - - - - - - -
 
@@ -84,7 +105,7 @@
 	 * This function activates random generator for test use.
 	 * It does generate predictive pseudorandom data.
 	 */
-	EAP_FUNC_IMPORT void use_test_random(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void use_test_random(
 		const u8_t * const seed,
 		const u32_t seed_length,
 		const bool does_continuous_seeding_when_true);
@@ -92,7 +113,7 @@
 	/**
 	 * The get_rand_bytes() function fills count random bytes to buffer.
 	 */
-	EAP_FUNC_IMPORT eap_status_e get_rand_bytes(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e get_rand_bytes(
 		u8_t * const buffer,
 		const u32_t count);
 
@@ -102,7 +123,7 @@
 	 * For example time stamps of send and received messages, likewise addresses, 
 	 * cookies and nonces included in messages.
 	 */
-	EAP_FUNC_IMPORT eap_status_e add_rand_seed(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e add_rand_seed(
 		const u8_t * const buffer,
 		const u32_t count);
 
@@ -111,7 +132,7 @@
 	 * the abs_eap_am_tools::get_hardware_ticks()  function. This could be used to 
 	 * seed the random data pool with time stamps.
 	 */
-	EAP_FUNC_IMPORT eap_status_e add_rand_seed_hw_ticks();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e add_rand_seed_hw_ticks();
 
 	// - - - - - - - - - - - - - - - - - - - - - - - -
 
@@ -121,7 +142,7 @@
 	 * It is used only for sanity checks. Only one well-known group is supported.
 	 * @param own_private_dh_key Saves context here.
 	 */
-	EAP_FUNC_IMPORT eap_status_e generate_diffie_hellman_keys(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e generate_diffie_hellman_keys(
 		eap_variable_data_c * const own_private_dh_key,
 		eap_variable_data_c * const own_public_dh_key,
 		const u8_t * const prime,
@@ -135,7 +156,7 @@
 	 * Only one well-known group is supported.
 	 * @param own_private_dh_key Is the context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e generate_g_power_to_xy(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e generate_g_power_to_xy(
 		const eap_variable_data_c * const own_private_dh_key,
 		const eap_variable_data_c * const peer_public_dh_key,
 		eap_variable_data_c * const shared_dh_key,
@@ -148,7 +169,7 @@
 	 * This functions cleans up the diffie-hellman context.
 	 * This is not used in Symbian.
 	 */
-	EAP_FUNC_IMPORT eap_status_e dh_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dh_cleanup(
 		const eap_variable_data_c * const dh_context);
 
 
@@ -157,27 +178,27 @@
 	/**
 	 * This function returns the size of message digest of SHA1-algorithm.
 	 */
-	 EAP_FUNC_IMPORT u32_t get_sha_256_digest_length(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha_256_digest_length(
 		eap_variable_data_c * const sha_256_context);
 
 	/**
 	 * This function returns the block size of SHA1-algorithm.
 	 */
-	 EAP_FUNC_IMPORT u32_t get_sha_256_block_size(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha_256_block_size(
 		eap_variable_data_c * const sha_256_context);
 
 	/**
 	 * The sha_256_init() function initializes SHA1.
 	 * Internal context of SHA1 is stored to sha_256_context.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e sha_256_init(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_init(
 		eap_variable_data_c * const sha_256_context);
 
 	/**
 	 * The sha_256_update() function updates the context of 
 	 * sha_256_context with data_length bytes of data.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e sha_256_update(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_update(
 		eap_variable_data_c * const sha_256_context,
 		const u8_t * const data,
 		const u32_t data_length);
@@ -187,7 +208,7 @@
 	 * (MAC) to buffer pointed by message_digest. The length of MAC is stored 
 	 * to buffer pointed by md_length_or_null, If md_length_or_null is non NULL.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e sha_256_final(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_final(
 		eap_variable_data_c * const sha_256_context,
 		u8_t * const message_digest,
 		u32_t *md_length_or_null);
@@ -195,13 +216,13 @@
 	/**
 	 * The hmac_sha_256_cleanup() cleanups the SHA1 context.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e sha_256_cleanup(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_cleanup(
 		eap_variable_data_c * const sha_256_context);
 
 	/**
 	 * The sha_256_copy_context() copies the SHA1 context.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e sha_256_copy_context(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_copy_context(
 		eap_variable_data_c * const copied_sha_256_context,
 		const eap_variable_data_c * const original_sha_256_context);
 
@@ -210,27 +231,27 @@
 	/**
 	 * This function returns the size of message digest of SHA1-algorithm.
 	 */
-	EAP_FUNC_IMPORT u32_t get_sha1_digest_length(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha1_digest_length(
 		eap_variable_data_c * const sha1_context);
 
 	/**
 	 * This function returns the block size of SHA1-algorithm.
 	 */
-	EAP_FUNC_IMPORT u32_t get_sha1_block_size(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha1_block_size(
 		eap_variable_data_c * const sha1_context);
 
 	/**
 	 * The sha1_init() function initializes SHA1.
 	 * Internal context of SHA1 is stored to sha1_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e sha1_init(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_init(
 		eap_variable_data_c * const sha1_context);
 
 	/**
 	 * The sha1_update() function updates the context of 
 	 * sha1_context with data_length bytes of data.
 	 */
-	EAP_FUNC_IMPORT eap_status_e sha1_update(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_update(
 		eap_variable_data_c * const sha1_context,
 		const u8_t * const data,
 		const u32_t data_length);
@@ -242,7 +263,7 @@
 	 * It must include the length of the message_digest buffer must be set before
 	 * function call.
 	 */
-	EAP_FUNC_IMPORT eap_status_e sha1_final(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_final(
 		eap_variable_data_c * const sha1_context,
 		u8_t * const message_digest,
 		u32_t *md_length_or_null);
@@ -250,13 +271,13 @@
 	/**
 	 * The sha1_cleanup() cleanups the SHA1 context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e sha1_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_cleanup(
 		eap_variable_data_c * const sha1_context);
 
 	/**
 	 * The sha1_copy_context() copies the SHA1 context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e sha1_copy_context(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_copy_context(
 		eap_variable_data_c * const copied_sha1_context,
 		const eap_variable_data_c * const original_sha1_context);
 
@@ -267,21 +288,21 @@
 	 * This will be constant 16 bytes (128 bits). Still it is better use function 
 	 * to help changes if the length of key is changed in future. 
 	 */
-	EAP_FUNC_IMPORT u32_t aes_key_length();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t aes_key_length();
 
 	/**
 	 * The aes_block_size() function returns the block size of AES-algorithm. 
 	 * This will be constant 16 bytes (128 bits). Still it is better use function 
 	 * to help changes if the size is changed in future.
 	 */
-	EAP_FUNC_IMPORT u32_t aes_block_size();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t aes_block_size();
 
 
 	/**
 	 * The aes_set_encryption_key() function initializes the encryption 
 	 * context of AES-algorithm to the aes_context using key_length bytes from buffer key. 
 	 */
-	EAP_FUNC_IMPORT eap_status_e aes_set_encryption_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_set_encryption_key(
 		eap_variable_data_c * const aes_context,
 		const u8_t * const key,
 		const u32_t key_length);
@@ -289,14 +310,14 @@
 	/**
 	 * This function cleans the aes_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e aes_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_cleanup(
 		eap_variable_data_c * const aes_context);
 
 	/**
 	 * The aes_set_decryption_key() function initializes the decryption context of 
 	 * AES-algorithm to the aes_context using key_length bytes from buffer key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e aes_set_decryption_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_set_decryption_key(
 		eap_variable_data_c * const aes_context,
 		const u8_t * const key,
 		const u32_t key_length);
@@ -309,7 +330,7 @@
 	 * Those buffers must be fully separated. Some optimizations are used taking 
 	 * advance from separate buffers. 
 	 */
-	EAP_FUNC_IMPORT eap_status_e aes_encrypt_block(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_encrypt_block(
 		eap_variable_data_c * const aes_context,
 		const u8_t * const data_in,
 		u8_t * const data_out,
@@ -323,7 +344,7 @@
 	 * Those buffers must be fully separated. Some optimizations are used 
 	 * taking advance from separate buffers.
 	 */
-	EAP_FUNC_IMPORT eap_status_e aes_decrypt_block(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_decrypt_block(
 		eap_variable_data_c * const aes_context,
 		const u8_t * const data_in,
 		u8_t * const data_out,
@@ -336,21 +357,21 @@
 	 * This will be constant 24 bytes (192 bits). Still it is better use function 
 	 * to help changes if the length of key is changed in future. 
 	 */
-	EAP_FUNC_IMPORT u32_t key_length_3des_ede();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t key_length_3des_ede();
 
 	/**
 	 * The block_size() function returns the block size of 3DES-EDE-algorithm. 
 	 * This will be constant 24 bytes (192 bits). Still it is better use function 
 	 * to help changes if the size is changed in future.
 	 */
-	EAP_FUNC_IMPORT u32_t block_size_3des_ede();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t block_size_3des_ede();
 
 
 	/**
 	 * The cbc_set_encryption_key() function initializes the encryption 
 	 * context of 3DES-EDE-algorithm to the context using key_length bytes from buffer key. 
 	 */
-	EAP_FUNC_IMPORT eap_status_e set_encryption_key_3des_ede(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e set_encryption_key_3des_ede(
 		eap_variable_data_c * const context,
 		const u8_t * const key,
 		const u32_t key_length);
@@ -359,7 +380,7 @@
 	 * The cbc_set_decryption_key() function initializes the decryption context of 
 	 * 3DES-EDE-algorithm to the context using key_length bytes from buffer key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e set_decryption_key_3des_ede(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e set_decryption_key_3des_ede(
 		eap_variable_data_c * const context,
 		const u8_t * const key,
 		const u32_t key_length);
@@ -367,7 +388,7 @@
 	/**
 	 * This function cleans up context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e cleanup_3des_ede(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e cleanup_3des_ede(
 		eap_variable_data_c * const context);
 
 	/**
@@ -378,7 +399,7 @@
 	 * Those buffers must be fully separated. Some optimizations are used taking 
 	 * advance from separate buffers. 
 	 */
-	EAP_FUNC_IMPORT eap_status_e encrypt_block_3des_ede(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e encrypt_block_3des_ede(
 		eap_variable_data_c * const context,
 		const u8_t * const data_in,
 		u8_t * const data_out,
@@ -392,7 +413,7 @@
 	 * Those buffers must be fully separated. Some optimizations are used 
 	 * taking advance from separate buffers.
 	 */
-	EAP_FUNC_IMPORT eap_status_e decrypt_block_3des_ede(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e decrypt_block_3des_ede(
 		eap_variable_data_c * const context,
 		const u8_t * const data_in,
 		u8_t * const data_out,
@@ -426,7 +447,7 @@
 	 *             d. XKEY = (1 + XKEY + xj) mod 2^b.
 	 * @endcode
 	 */
-	EAP_FUNC_IMPORT eap_status_e dss_pseudo_random(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dss_pseudo_random(
 		u8_t *out,
 		u32_t out_length,
 		u8_t *xkey,
@@ -437,27 +458,27 @@
 	/**
 	 * This function returns the size of message digest of MD5-algorithm.
 	 */
-	EAP_FUNC_IMPORT u32_t get_md5_digest_length(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md5_digest_length(
 		eap_variable_data_c * const md5_context);
 
 	/**
 	 * This function returns the block size of MD5-algorithm.
 	 */
-	EAP_FUNC_IMPORT u32_t get_md5_block_size(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md5_block_size(
 		eap_variable_data_c * const md5_context);
 
 	/**
 	 * The sha1_init() function initializes MD5.
 	 * Internal context of MD5 is stored to sha1_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md5_init(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_init(
 		eap_variable_data_c * const md5_context);
 
 	/**
 	 * The md5_update() function updates the context of 
 	 * md5_context with data_length bytes of data.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md5_update(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_update(
 		eap_variable_data_c * const md5_context,
 		const u8_t * const data,
 		const u32_t data_length);
@@ -468,7 +489,7 @@
 	 * to buffer pointed by md_length_or_null, If md_length_or_null is non NULL.
 	 * It must include the length of the message_digest buffer before function call.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md5_final(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_final(
 		eap_variable_data_c * const md5_context,
 		u8_t * const message_digest,
 		u32_t *md_length_or_null);
@@ -476,13 +497,13 @@
 	/**
 	 * The hmac_md5_cleanup() cleanups the MD5 context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md5_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_cleanup(
 		eap_variable_data_c * const md5_context);
 
 	/**
 	 * The md5_copy_context() copies the MD5 context.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e md5_copy_context(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_copy_context(
 		eap_variable_data_c * const copied_md5_context,
 		const eap_variable_data_c * const original_md5_context);
 
@@ -491,27 +512,27 @@
 	/**
 	 * This function returns the size of message digest of MD4-algorithm.
 	 */
-	EAP_FUNC_IMPORT u32_t get_md4_digest_length(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md4_digest_length(
 		eap_variable_data_c * const md4_context);
 
 	/**
 	 * This function returns the block size of MD4-algorithm.
 	 */
-	EAP_FUNC_IMPORT u32_t get_md4_block_size(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md4_block_size(
 		eap_variable_data_c * const md4_context);
 
 	/**
 	 * The md4_init() function initializes MD4.
 	 * Internal context of MD4 is stored to sha1_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md4_init(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_init(
 		eap_variable_data_c * const md4_context);
 
 	/**
 	 * The md4_update() function updates the context of 
 	 * md4_context with data_length bytes of data.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md4_update(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_update(
 		eap_variable_data_c * const md4_context,
 		const u8_t * const data,
 		const u32_t data_length);
@@ -522,7 +543,7 @@
 	 * to buffer pointed by md_length_or_null, If md_length_or_null is non NULL.
 	 * It must include the length of the message_digest buffer before function call.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md4_final(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_final(
 		eap_variable_data_c * const md4_context,
 		u8_t * const message_digest,
 		u32_t *md_length_or_null);
@@ -530,13 +551,13 @@
 	/**
 	 * The hmac_md4_cleanup() cleanups the MD4 context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e md4_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_cleanup(
 		eap_variable_data_c * const md4_context);
 
 	/**
 	 * The md4_copy_context() copies the MD4 context.
 	 */
-	 EAP_FUNC_IMPORT eap_status_e md4_copy_context(
+	 EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_copy_context(
 		eap_variable_data_c * const copied_md4_context,
 		const eap_variable_data_c * const original_md4_context);
 
@@ -545,21 +566,21 @@
 	/**
 	* Used to set the RC4 key.
 	*/
-	EAP_FUNC_IMPORT eap_status_e rc4_set_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_set_key(
 		eap_variable_data_c * const rc4_context, 
 		const eap_variable_data_c * const key);
 
 	/**
 	* Used to clean up the RC4 context.
 	*/
-	EAP_FUNC_IMPORT eap_status_e rc4_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_cleanup(
 		eap_variable_data_c * const rc4_context);
 
 	/**
 	 * Encrypts RC4 data.
 	 * Input and output buffers must be non overlapping.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rc4_encrypt(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_encrypt(
 		const eap_variable_data_c * const rc4_context, 
 		const void * const data_in, 
 		void * const data_out,
@@ -569,7 +590,7 @@
 	 * Encrypts RC4 data.
 	 * The same buffer is used for input and output.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rc4_encrypt(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_encrypt(
 		const eap_variable_data_c * const rc4_context, 
 		void * const data_in_out,
 		const u32_t data_length);
@@ -578,7 +599,7 @@
 	 * Decrypts RC4 data.
 	 * The same buffer is used for input and output.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rc4_decrypt(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_decrypt(
 		const eap_variable_data_c * const rc4_context, 
 		void * const data_in_out,
 		const u32_t data_length);
@@ -587,7 +608,7 @@
 	 * Decrypts RC4 data.
 	 * Input and output buffers must be non overlapping.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rc4_decrypt(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_decrypt(
 		const eap_variable_data_c * const rc4_context, 
 		const void * const data_in, 
 		void * const data_out,
@@ -600,13 +621,13 @@
 	 * The rsa_init() function initializes context of RSA.
 	 * Internal context of RSA is stored to rsa_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_init(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_init(
 		eap_variable_data_c * const rsa_context);
 
 	/**
 	 * Function encrypts input data to output data using RSA algorithm with public RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_encrypt_with_public_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_encrypt_with_public_key(
 		eap_variable_data_c * const rsa_context,
 		const eap_variable_data_c * const public_rsa_key,
 		const eap_variable_data_c * const input_data,
@@ -615,7 +636,7 @@
 	/**
 	 * Function decrypts input data to output data using RSA algorithm with public RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_decrypt_with_public_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_decrypt_with_public_key(
 		eap_variable_data_c * const rsa_context,
 		const eap_variable_data_c * const public_rsa_key,
 		const eap_variable_data_c * const input_data,
@@ -624,7 +645,7 @@
 	/**
 	 * Function encrypts input data to output data using RSA algorithm with private RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_encrypt_with_private_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_encrypt_with_private_key(
 		eap_variable_data_c * const rsa_context,
 		const eap_variable_data_c * const private_rsa_key,
 		const eap_variable_data_c * const input_data,
@@ -633,7 +654,7 @@
 	/**
 	 * Function decrypts input data to output data using RSA algorithm with private RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_decrypt_with_private_key(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_decrypt_with_private_key(
 		eap_variable_data_c * const rsa_context,
 		const eap_variable_data_c * const private_rsa_key,
 		const eap_variable_data_c * const input_data,
@@ -642,7 +663,7 @@
 	/**
 	 * Function signs hash to signed hash using RSA algorithm with private RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_sign(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_sign(
 		eap_variable_data_c * const rsa_context,
 		const eap_variable_data_c * const private_rsa_key,
 		const eap_variable_data_c * const hash,
@@ -651,13 +672,13 @@
 	/**
 	 * Function verifies hash and signed hash using RSA algorithm with public RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e rsa_verify(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_verify(
 		eap_variable_data_c * const rsa_context,
 		const eap_variable_data_c * const public_rsa_key,
 		const eap_variable_data_c * const hash,
 		const eap_variable_data_c * const signed_hash);
 
-	EAP_FUNC_IMPORT eap_status_e rsa_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_cleanup(
 		eap_variable_data_c * const rsa_context);
 
 	// - - - - - - - - - - - - - - - - - - - - - - - -
@@ -666,13 +687,13 @@
 	 * The dsa_init() function initializes context of DSA.
 	 * Internal context of DSA is stored to dsa_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e dsa_init(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_init(
 		eap_variable_data_c * const dsa_context);
 
 	/**
 	 * Function signs hash to signed hash using DSA algorithm with private RSA key.
 	 */
-	EAP_FUNC_IMPORT eap_status_e dsa_sign(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_sign(
 		eap_variable_data_c * const dsa_context,
 		const eap_variable_data_c * const private_dsa_key,
 		const eap_variable_data_c * const hash,
@@ -681,7 +702,7 @@
 	/**
 	 * Function verifies hash and signed hash using DSA algorithm with public RSA key and DSA parameters.
 	 */
-	EAP_FUNC_IMPORT eap_status_e dsa_verify(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_verify(
 		eap_variable_data_c * const dsa_context,		
 		const eap_variable_data_c * const public_dsa_key,
 		const eap_variable_data_c * const dsa_param_p,
@@ -693,7 +714,7 @@
 	/**
 	 * This function cleans up dsa_context.
 	 */
-	EAP_FUNC_IMPORT eap_status_e dsa_cleanup(
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_cleanup(
 		eap_variable_data_c * const dsa_context);
 
 	// - - - - - - - - - - - - - - - - - - - - - - - -
@@ -703,13 +724,13 @@
 	 * This function initializes crypto memory leak detection.
 	 * In Symbian this is not used.
 	 */
-	EAP_FUNC_IMPORT void open_crypto_memory_leaks();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void open_crypto_memory_leaks();
 
 	/**
 	 * This function ends crypto memory leak detection.
 	 * In Symbian this is not used.
 	 */
-	EAP_FUNC_IMPORT void close_crypto_memory_leaks();
+	EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void close_crypto_memory_leaks();
 
 	// - - - - - - - - - - - - - - - - - - - - - - - -
 private: