diff -r e863583e6720 -r c23bdf5a328a eapol/eapol_framework/eapol_symbian/am/include/eap_am_crypto_symbian.h --- a/eapol/eapol_framework/eapol_symbian/am/include/eap_am_crypto_symbian.h Fri Sep 17 08:30:11 2010 +0300 +++ b/eapol/eapol_framework/eapol_symbian/am/include/eap_am_crypto_symbian.h Mon Oct 04 00:19:54 2010 +0300 @@ -26,6 +26,27 @@ #include "eap_am_types.h" #include "eap_variable_data.h" #include "eap_am_export.h" +// Start: added by script change_export_macros.sh. +#if defined(EAP_NO_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H) + #define EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_NONSHARABLE + #define EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H + #define EAP_C_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H + #define EAP_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H + #define EAP_C_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H +#elif defined(EAP_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H) + #define EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_EXPORT + #define EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_FUNC_EXPORT + #define EAP_C_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_C_FUNC_EXPORT + #define EAP_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H EAP_FUNC_EXPORT + #define EAP_C_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H EAP_C_FUNC_EXPORT +#else + #define EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_IMPORT + #define EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_FUNC_IMPORT + #define EAP_C_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H EAP_C_FUNC_IMPORT + #define EAP_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H + #define EAP_C_FUNC_EXPORT_EAP_AM_CRYPTO_SYMBIAN_H +#endif +// End: added by script change_export_macros.sh. #include "eap_am_tools.h" #include "eap_array.h" #include "abs_eap_am_crypto.h" @@ -41,7 +62,7 @@ /// Class eap_am_crypto offers services to authenticate data, encrypt data, /// decrypt data, generate keys and generate cryptographically strong random data. -class EAP_EXPORT eap_am_crypto_symbian_c +class EAP_CLASS_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_am_crypto_symbian_c : public abs_eap_am_crypto_c { private: @@ -60,23 +81,23 @@ /** * Destructor does nothing special. */ - EAP_FUNC_IMPORT virtual ~eap_am_crypto_symbian_c(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H virtual ~eap_am_crypto_symbian_c(); /** * Constructor initializes the member attributes. */ - EAP_FUNC_IMPORT eap_am_crypto_symbian_c(abs_eap_am_tools_c * const tools); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_am_crypto_symbian_c(abs_eap_am_tools_c * const tools); - EAP_FUNC_IMPORT eap_status_e configure(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e configure(); /** * The get_is_valid() function returns the status of the eap_core object. * True indicates the object is initialized succesfully. */ - EAP_FUNC_IMPORT bool get_is_valid() const; + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H bool get_is_valid() const; - EAP_FUNC_IMPORT void set_is_valid(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void set_is_valid(); // - - - - - - - - - - - - - - - - - - - - - - - - @@ -84,7 +105,7 @@ * This function activates random generator for test use. * It does generate predictive pseudorandom data. */ - EAP_FUNC_IMPORT void use_test_random( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void use_test_random( const u8_t * const seed, const u32_t seed_length, const bool does_continuous_seeding_when_true); @@ -92,7 +113,7 @@ /** * The get_rand_bytes() function fills count random bytes to buffer. */ - EAP_FUNC_IMPORT eap_status_e get_rand_bytes( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e get_rand_bytes( u8_t * const buffer, const u32_t count); @@ -102,7 +123,7 @@ * For example time stamps of send and received messages, likewise addresses, * cookies and nonces included in messages. */ - EAP_FUNC_IMPORT eap_status_e add_rand_seed( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e add_rand_seed( const u8_t * const buffer, const u32_t count); @@ -111,7 +132,7 @@ * the abs_eap_am_tools::get_hardware_ticks() function. This could be used to * seed the random data pool with time stamps. */ - EAP_FUNC_IMPORT eap_status_e add_rand_seed_hw_ticks(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e add_rand_seed_hw_ticks(); // - - - - - - - - - - - - - - - - - - - - - - - - @@ -121,7 +142,7 @@ * It is used only for sanity checks. Only one well-known group is supported. * @param own_private_dh_key Saves context here. */ - EAP_FUNC_IMPORT eap_status_e generate_diffie_hellman_keys( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e generate_diffie_hellman_keys( eap_variable_data_c * const own_private_dh_key, eap_variable_data_c * const own_public_dh_key, const u8_t * const prime, @@ -135,7 +156,7 @@ * Only one well-known group is supported. * @param own_private_dh_key Is the context. */ - EAP_FUNC_IMPORT eap_status_e generate_g_power_to_xy( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e generate_g_power_to_xy( const eap_variable_data_c * const own_private_dh_key, const eap_variable_data_c * const peer_public_dh_key, eap_variable_data_c * const shared_dh_key, @@ -148,7 +169,7 @@ * This functions cleans up the diffie-hellman context. * This is not used in Symbian. */ - EAP_FUNC_IMPORT eap_status_e dh_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dh_cleanup( const eap_variable_data_c * const dh_context); @@ -157,27 +178,27 @@ /** * This function returns the size of message digest of SHA1-algorithm. */ - EAP_FUNC_IMPORT u32_t get_sha_256_digest_length( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha_256_digest_length( eap_variable_data_c * const sha_256_context); /** * This function returns the block size of SHA1-algorithm. */ - EAP_FUNC_IMPORT u32_t get_sha_256_block_size( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha_256_block_size( eap_variable_data_c * const sha_256_context); /** * The sha_256_init() function initializes SHA1. * Internal context of SHA1 is stored to sha_256_context. */ - EAP_FUNC_IMPORT eap_status_e sha_256_init( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_init( eap_variable_data_c * const sha_256_context); /** * The sha_256_update() function updates the context of * sha_256_context with data_length bytes of data. */ - EAP_FUNC_IMPORT eap_status_e sha_256_update( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_update( eap_variable_data_c * const sha_256_context, const u8_t * const data, const u32_t data_length); @@ -187,7 +208,7 @@ * (MAC) to buffer pointed by message_digest. The length of MAC is stored * to buffer pointed by md_length_or_null, If md_length_or_null is non NULL. */ - EAP_FUNC_IMPORT eap_status_e sha_256_final( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_final( eap_variable_data_c * const sha_256_context, u8_t * const message_digest, u32_t *md_length_or_null); @@ -195,13 +216,13 @@ /** * The hmac_sha_256_cleanup() cleanups the SHA1 context. */ - EAP_FUNC_IMPORT eap_status_e sha_256_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_cleanup( eap_variable_data_c * const sha_256_context); /** * The sha_256_copy_context() copies the SHA1 context. */ - EAP_FUNC_IMPORT eap_status_e sha_256_copy_context( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha_256_copy_context( eap_variable_data_c * const copied_sha_256_context, const eap_variable_data_c * const original_sha_256_context); @@ -210,27 +231,27 @@ /** * This function returns the size of message digest of SHA1-algorithm. */ - EAP_FUNC_IMPORT u32_t get_sha1_digest_length( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha1_digest_length( eap_variable_data_c * const sha1_context); /** * This function returns the block size of SHA1-algorithm. */ - EAP_FUNC_IMPORT u32_t get_sha1_block_size( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_sha1_block_size( eap_variable_data_c * const sha1_context); /** * The sha1_init() function initializes SHA1. * Internal context of SHA1 is stored to sha1_context. */ - EAP_FUNC_IMPORT eap_status_e sha1_init( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_init( eap_variable_data_c * const sha1_context); /** * The sha1_update() function updates the context of * sha1_context with data_length bytes of data. */ - EAP_FUNC_IMPORT eap_status_e sha1_update( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_update( eap_variable_data_c * const sha1_context, const u8_t * const data, const u32_t data_length); @@ -242,7 +263,7 @@ * It must include the length of the message_digest buffer must be set before * function call. */ - EAP_FUNC_IMPORT eap_status_e sha1_final( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_final( eap_variable_data_c * const sha1_context, u8_t * const message_digest, u32_t *md_length_or_null); @@ -250,13 +271,13 @@ /** * The sha1_cleanup() cleanups the SHA1 context. */ - EAP_FUNC_IMPORT eap_status_e sha1_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_cleanup( eap_variable_data_c * const sha1_context); /** * The sha1_copy_context() copies the SHA1 context. */ - EAP_FUNC_IMPORT eap_status_e sha1_copy_context( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e sha1_copy_context( eap_variable_data_c * const copied_sha1_context, const eap_variable_data_c * const original_sha1_context); @@ -267,21 +288,21 @@ * This will be constant 16 bytes (128 bits). Still it is better use function * to help changes if the length of key is changed in future. */ - EAP_FUNC_IMPORT u32_t aes_key_length(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t aes_key_length(); /** * The aes_block_size() function returns the block size of AES-algorithm. * This will be constant 16 bytes (128 bits). Still it is better use function * to help changes if the size is changed in future. */ - EAP_FUNC_IMPORT u32_t aes_block_size(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t aes_block_size(); /** * The aes_set_encryption_key() function initializes the encryption * context of AES-algorithm to the aes_context using key_length bytes from buffer key. */ - EAP_FUNC_IMPORT eap_status_e aes_set_encryption_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_set_encryption_key( eap_variable_data_c * const aes_context, const u8_t * const key, const u32_t key_length); @@ -289,14 +310,14 @@ /** * This function cleans the aes_context. */ - EAP_FUNC_IMPORT eap_status_e aes_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_cleanup( eap_variable_data_c * const aes_context); /** * The aes_set_decryption_key() function initializes the decryption context of * AES-algorithm to the aes_context using key_length bytes from buffer key. */ - EAP_FUNC_IMPORT eap_status_e aes_set_decryption_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_set_decryption_key( eap_variable_data_c * const aes_context, const u8_t * const key, const u32_t key_length); @@ -309,7 +330,7 @@ * Those buffers must be fully separated. Some optimizations are used taking * advance from separate buffers. */ - EAP_FUNC_IMPORT eap_status_e aes_encrypt_block( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_encrypt_block( eap_variable_data_c * const aes_context, const u8_t * const data_in, u8_t * const data_out, @@ -323,7 +344,7 @@ * Those buffers must be fully separated. Some optimizations are used * taking advance from separate buffers. */ - EAP_FUNC_IMPORT eap_status_e aes_decrypt_block( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e aes_decrypt_block( eap_variable_data_c * const aes_context, const u8_t * const data_in, u8_t * const data_out, @@ -336,21 +357,21 @@ * This will be constant 24 bytes (192 bits). Still it is better use function * to help changes if the length of key is changed in future. */ - EAP_FUNC_IMPORT u32_t key_length_3des_ede(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t key_length_3des_ede(); /** * The block_size() function returns the block size of 3DES-EDE-algorithm. * This will be constant 24 bytes (192 bits). Still it is better use function * to help changes if the size is changed in future. */ - EAP_FUNC_IMPORT u32_t block_size_3des_ede(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t block_size_3des_ede(); /** * The cbc_set_encryption_key() function initializes the encryption * context of 3DES-EDE-algorithm to the context using key_length bytes from buffer key. */ - EAP_FUNC_IMPORT eap_status_e set_encryption_key_3des_ede( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e set_encryption_key_3des_ede( eap_variable_data_c * const context, const u8_t * const key, const u32_t key_length); @@ -359,7 +380,7 @@ * The cbc_set_decryption_key() function initializes the decryption context of * 3DES-EDE-algorithm to the context using key_length bytes from buffer key. */ - EAP_FUNC_IMPORT eap_status_e set_decryption_key_3des_ede( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e set_decryption_key_3des_ede( eap_variable_data_c * const context, const u8_t * const key, const u32_t key_length); @@ -367,7 +388,7 @@ /** * This function cleans up context. */ - EAP_FUNC_IMPORT eap_status_e cleanup_3des_ede( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e cleanup_3des_ede( eap_variable_data_c * const context); /** @@ -378,7 +399,7 @@ * Those buffers must be fully separated. Some optimizations are used taking * advance from separate buffers. */ - EAP_FUNC_IMPORT eap_status_e encrypt_block_3des_ede( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e encrypt_block_3des_ede( eap_variable_data_c * const context, const u8_t * const data_in, u8_t * const data_out, @@ -392,7 +413,7 @@ * Those buffers must be fully separated. Some optimizations are used * taking advance from separate buffers. */ - EAP_FUNC_IMPORT eap_status_e decrypt_block_3des_ede( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e decrypt_block_3des_ede( eap_variable_data_c * const context, const u8_t * const data_in, u8_t * const data_out, @@ -426,7 +447,7 @@ * d. XKEY = (1 + XKEY + xj) mod 2^b. * @endcode */ - EAP_FUNC_IMPORT eap_status_e dss_pseudo_random( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dss_pseudo_random( u8_t *out, u32_t out_length, u8_t *xkey, @@ -437,27 +458,27 @@ /** * This function returns the size of message digest of MD5-algorithm. */ - EAP_FUNC_IMPORT u32_t get_md5_digest_length( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md5_digest_length( eap_variable_data_c * const md5_context); /** * This function returns the block size of MD5-algorithm. */ - EAP_FUNC_IMPORT u32_t get_md5_block_size( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md5_block_size( eap_variable_data_c * const md5_context); /** * The sha1_init() function initializes MD5. * Internal context of MD5 is stored to sha1_context. */ - EAP_FUNC_IMPORT eap_status_e md5_init( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_init( eap_variable_data_c * const md5_context); /** * The md5_update() function updates the context of * md5_context with data_length bytes of data. */ - EAP_FUNC_IMPORT eap_status_e md5_update( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_update( eap_variable_data_c * const md5_context, const u8_t * const data, const u32_t data_length); @@ -468,7 +489,7 @@ * to buffer pointed by md_length_or_null, If md_length_or_null is non NULL. * It must include the length of the message_digest buffer before function call. */ - EAP_FUNC_IMPORT eap_status_e md5_final( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_final( eap_variable_data_c * const md5_context, u8_t * const message_digest, u32_t *md_length_or_null); @@ -476,13 +497,13 @@ /** * The hmac_md5_cleanup() cleanups the MD5 context. */ - EAP_FUNC_IMPORT eap_status_e md5_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_cleanup( eap_variable_data_c * const md5_context); /** * The md5_copy_context() copies the MD5 context. */ - EAP_FUNC_IMPORT eap_status_e md5_copy_context( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md5_copy_context( eap_variable_data_c * const copied_md5_context, const eap_variable_data_c * const original_md5_context); @@ -491,27 +512,27 @@ /** * This function returns the size of message digest of MD4-algorithm. */ - EAP_FUNC_IMPORT u32_t get_md4_digest_length( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md4_digest_length( eap_variable_data_c * const md4_context); /** * This function returns the block size of MD4-algorithm. */ - EAP_FUNC_IMPORT u32_t get_md4_block_size( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H u32_t get_md4_block_size( eap_variable_data_c * const md4_context); /** * The md4_init() function initializes MD4. * Internal context of MD4 is stored to sha1_context. */ - EAP_FUNC_IMPORT eap_status_e md4_init( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_init( eap_variable_data_c * const md4_context); /** * The md4_update() function updates the context of * md4_context with data_length bytes of data. */ - EAP_FUNC_IMPORT eap_status_e md4_update( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_update( eap_variable_data_c * const md4_context, const u8_t * const data, const u32_t data_length); @@ -522,7 +543,7 @@ * to buffer pointed by md_length_or_null, If md_length_or_null is non NULL. * It must include the length of the message_digest buffer before function call. */ - EAP_FUNC_IMPORT eap_status_e md4_final( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_final( eap_variable_data_c * const md4_context, u8_t * const message_digest, u32_t *md_length_or_null); @@ -530,13 +551,13 @@ /** * The hmac_md4_cleanup() cleanups the MD4 context. */ - EAP_FUNC_IMPORT eap_status_e md4_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_cleanup( eap_variable_data_c * const md4_context); /** * The md4_copy_context() copies the MD4 context. */ - EAP_FUNC_IMPORT eap_status_e md4_copy_context( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e md4_copy_context( eap_variable_data_c * const copied_md4_context, const eap_variable_data_c * const original_md4_context); @@ -545,21 +566,21 @@ /** * Used to set the RC4 key. */ - EAP_FUNC_IMPORT eap_status_e rc4_set_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_set_key( eap_variable_data_c * const rc4_context, const eap_variable_data_c * const key); /** * Used to clean up the RC4 context. */ - EAP_FUNC_IMPORT eap_status_e rc4_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_cleanup( eap_variable_data_c * const rc4_context); /** * Encrypts RC4 data. * Input and output buffers must be non overlapping. */ - EAP_FUNC_IMPORT eap_status_e rc4_encrypt( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_encrypt( const eap_variable_data_c * const rc4_context, const void * const data_in, void * const data_out, @@ -569,7 +590,7 @@ * Encrypts RC4 data. * The same buffer is used for input and output. */ - EAP_FUNC_IMPORT eap_status_e rc4_encrypt( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_encrypt( const eap_variable_data_c * const rc4_context, void * const data_in_out, const u32_t data_length); @@ -578,7 +599,7 @@ * Decrypts RC4 data. * The same buffer is used for input and output. */ - EAP_FUNC_IMPORT eap_status_e rc4_decrypt( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_decrypt( const eap_variable_data_c * const rc4_context, void * const data_in_out, const u32_t data_length); @@ -587,7 +608,7 @@ * Decrypts RC4 data. * Input and output buffers must be non overlapping. */ - EAP_FUNC_IMPORT eap_status_e rc4_decrypt( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rc4_decrypt( const eap_variable_data_c * const rc4_context, const void * const data_in, void * const data_out, @@ -600,13 +621,13 @@ * The rsa_init() function initializes context of RSA. * Internal context of RSA is stored to rsa_context. */ - EAP_FUNC_IMPORT eap_status_e rsa_init( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_init( eap_variable_data_c * const rsa_context); /** * Function encrypts input data to output data using RSA algorithm with public RSA key. */ - EAP_FUNC_IMPORT eap_status_e rsa_encrypt_with_public_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_encrypt_with_public_key( eap_variable_data_c * const rsa_context, const eap_variable_data_c * const public_rsa_key, const eap_variable_data_c * const input_data, @@ -615,7 +636,7 @@ /** * Function decrypts input data to output data using RSA algorithm with public RSA key. */ - EAP_FUNC_IMPORT eap_status_e rsa_decrypt_with_public_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_decrypt_with_public_key( eap_variable_data_c * const rsa_context, const eap_variable_data_c * const public_rsa_key, const eap_variable_data_c * const input_data, @@ -624,7 +645,7 @@ /** * Function encrypts input data to output data using RSA algorithm with private RSA key. */ - EAP_FUNC_IMPORT eap_status_e rsa_encrypt_with_private_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_encrypt_with_private_key( eap_variable_data_c * const rsa_context, const eap_variable_data_c * const private_rsa_key, const eap_variable_data_c * const input_data, @@ -633,7 +654,7 @@ /** * Function decrypts input data to output data using RSA algorithm with private RSA key. */ - EAP_FUNC_IMPORT eap_status_e rsa_decrypt_with_private_key( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_decrypt_with_private_key( eap_variable_data_c * const rsa_context, const eap_variable_data_c * const private_rsa_key, const eap_variable_data_c * const input_data, @@ -642,7 +663,7 @@ /** * Function signs hash to signed hash using RSA algorithm with private RSA key. */ - EAP_FUNC_IMPORT eap_status_e rsa_sign( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_sign( eap_variable_data_c * const rsa_context, const eap_variable_data_c * const private_rsa_key, const eap_variable_data_c * const hash, @@ -651,13 +672,13 @@ /** * Function verifies hash and signed hash using RSA algorithm with public RSA key. */ - EAP_FUNC_IMPORT eap_status_e rsa_verify( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_verify( eap_variable_data_c * const rsa_context, const eap_variable_data_c * const public_rsa_key, const eap_variable_data_c * const hash, const eap_variable_data_c * const signed_hash); - EAP_FUNC_IMPORT eap_status_e rsa_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e rsa_cleanup( eap_variable_data_c * const rsa_context); // - - - - - - - - - - - - - - - - - - - - - - - - @@ -666,13 +687,13 @@ * The dsa_init() function initializes context of DSA. * Internal context of DSA is stored to dsa_context. */ - EAP_FUNC_IMPORT eap_status_e dsa_init( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_init( eap_variable_data_c * const dsa_context); /** * Function signs hash to signed hash using DSA algorithm with private RSA key. */ - EAP_FUNC_IMPORT eap_status_e dsa_sign( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_sign( eap_variable_data_c * const dsa_context, const eap_variable_data_c * const private_dsa_key, const eap_variable_data_c * const hash, @@ -681,7 +702,7 @@ /** * Function verifies hash and signed hash using DSA algorithm with public RSA key and DSA parameters. */ - EAP_FUNC_IMPORT eap_status_e dsa_verify( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_verify( eap_variable_data_c * const dsa_context, const eap_variable_data_c * const public_dsa_key, const eap_variable_data_c * const dsa_param_p, @@ -693,7 +714,7 @@ /** * This function cleans up dsa_context. */ - EAP_FUNC_IMPORT eap_status_e dsa_cleanup( + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H eap_status_e dsa_cleanup( eap_variable_data_c * const dsa_context); // - - - - - - - - - - - - - - - - - - - - - - - - @@ -703,13 +724,13 @@ * This function initializes crypto memory leak detection. * In Symbian this is not used. */ - EAP_FUNC_IMPORT void open_crypto_memory_leaks(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void open_crypto_memory_leaks(); /** * This function ends crypto memory leak detection. * In Symbian this is not used. */ - EAP_FUNC_IMPORT void close_crypto_memory_leaks(); + EAP_FUNC_VISIBILITY_EAP_AM_CRYPTO_SYMBIAN_H void close_crypto_memory_leaks(); // - - - - - - - - - - - - - - - - - - - - - - - - private: