return SUCCESS;
}
-static int php_openssl_write_rand_file(const char * file, int egdsocket, int seeded)
+static int php_openssl_write_rand_file(const char * file, int egdsocket, int seeded TSRMLS_DC)
{
char buffer[MAXPATHLEN];
- TSRMLS_FETCH();
-
if (egdsocket || !seeded) {
/* if we did not manage to read the seed file, we should not write
* a low-entropy seed file back */
}
}
- php_openssl_write_rand_file(randfile, egdsocket, seeded);
+ php_openssl_write_rand_file(randfile, egdsocket, seeded TSRMLS_CC);
if (return_val == NULL) {
EVP_PKEY_free(req->priv_key);
}
-PHP_OPENSSL_API int php_openssl_apply_verification_policy(SSL *ssl, X509 *peer, php_stream *stream TSRMLS_DC)
+int php_openssl_apply_verification_policy(SSL *ssl, X509 *peer, php_stream *stream TSRMLS_DC)
{
zval **val = NULL;
char *cnmatch = NULL;
return 0;
}
-PHP_OPENSSL_API SSL *php_SSL_new_from_context(SSL_CTX *ctx, php_stream *stream TSRMLS_DC)
+SSL *php_SSL_new_from_context(SSL_CTX *ctx, php_stream *stream TSRMLS_DC)
{
zval **val = NULL;
char *cafile = NULL;
PHP_FUNCTION(openssl_csr_sign);
#include <openssl/ssl.h>
-PHP_OPENSSL_API int php_openssl_apply_verification_policy(SSL *ssl, X509 *peer, php_stream *stream TSRMLS_DC);
-PHP_OPENSSL_API SSL *php_SSL_new_from_context(SSL_CTX *ctx, php_stream *stream TSRMLS_DC);
+int php_openssl_apply_verification_policy(SSL *ssl, X509 *peer, php_stream *stream TSRMLS_DC);
+SSL *php_SSL_new_from_context(SSL_CTX *ctx, php_stream *stream TSRMLS_DC);
#else