summaryrefslogtreecommitdiff
path: root/wsutil/privileges.h
diff options
context:
space:
mode:
authorBalint Reczey <balint@balintreczey.hu>2013-03-01 23:53:11 +0000
committerBalint Reczey <balint@balintreczey.hu>2013-03-01 23:53:11 +0000
commit1ebdb2e521ca0cbd7aeebd1c89b8a5cf6a4cc322 (patch)
treed6dde0ea7b6e6e15cc2c51a5f478fb85965b9720 /wsutil/privileges.h
parent0b8d70bfb715bc3d89b6dfae86fc79d7c4387f02 (diff)
downloadwireshark-1ebdb2e521ca0cbd7aeebd1c89b8a5cf6a4cc322.tar.gz
Export libwireshark symbols using WS_DLL_PUBLIC define
Also remove old WS_VAR_IMPORT define and related Makefile magic everywhere in the project. svn path=/trunk/; revision=47992
Diffstat (limited to 'wsutil/privileges.h')
-rw-r--r--wsutil/privileges.h21
1 files changed, 7 insertions, 14 deletions
diff --git a/wsutil/privileges.h b/wsutil/privileges.h
index 231f3e34bc..2ce14da109 100644
--- a/wsutil/privileges.h
+++ b/wsutil/privileges.h
@@ -35,8 +35,7 @@ extern "C" {
* Called when the program starts, to enable security features and save
* whatever credential information we'll need later.
*/
-WS_DLL_PUBLIC
-extern void init_process_policies(void);
+WS_DLL_PUBLIC void init_process_policies(void);
/**
* Was this program started with special privileges? get_credential_info()
@@ -44,8 +43,7 @@ extern void init_process_policies(void);
* @return TRUE if the program was started with special privileges,
* FALSE otherwise.
*/
-WS_DLL_PUBLIC
-extern gboolean started_with_special_privs(void);
+WS_DLL_PUBLIC gboolean started_with_special_privs(void);
/**
* Is this program running with special privileges? get_credential_info()
@@ -53,31 +51,27 @@ extern gboolean started_with_special_privs(void);
* @return TRUE if the program is running with special privileges,
* FALSE otherwise.
*/
-WS_DLL_PUBLIC
-extern gboolean running_with_special_privs(void);
+WS_DLL_PUBLIC gboolean running_with_special_privs(void);
/**
* Permanently relinquish special privileges. get_credential_info()
* MUST be called before calling this.
*/
-WS_DLL_PUBLIC
-extern void relinquish_special_privs_perm(void);
+WS_DLL_PUBLIC void relinquish_special_privs_perm(void);
/**
* Get the current username. String must be g_free()d after use.
* @return A freshly g_alloc()ed string containing the username,
* or "UNKNOWN" on failure.
*/
-WS_DLL_PUBLIC
-extern gchar *get_cur_username(void);
+WS_DLL_PUBLIC gchar *get_cur_username(void);
/**
* Get the current group. String must be g_free()d after use.
* @return A freshly g_alloc()ed string containing the group,
* or "UNKNOWN" on failure.
*/
-WS_DLL_PUBLIC
-extern gchar *get_cur_groupname(void);
+WS_DLL_PUBLIC gchar *get_cur_groupname(void);
#ifdef _WIN32
/**
@@ -85,8 +79,7 @@ extern gchar *get_cur_groupname(void);
* @return TRUE if npf.sys is running, FALSE if it's not or if there was
* an error checking its status.
*/
-WS_DLL_PUBLIC
-extern gboolean npf_sys_is_running();
+WS_DLL_PUBLIC gboolean npf_sys_is_running();
#endif
#ifdef __cplusplus