]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* ssl/s2_lib.c */ |
58964a49 | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
3 | * All rights reserved. |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
40720ce3 | 8 | * |
d02b48c6 RE |
9 | * This library is free for commercial and non-commercial use as long as |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
40720ce3 | 15 | * |
d02b48c6 RE |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
40720ce3 | 22 | * |
d02b48c6 RE |
23 | * Redistribution and use in source and binary forms, with or without |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
40720ce3 | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
d02b48c6 RE |
38 | * the apps directory (application code) you must include an acknowledgement: |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40720ce3 | 40 | * |
d02b48c6 RE |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
40720ce3 | 52 | * |
d02b48c6 RE |
53 | * The licence and distribution terms for any publically available version or |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
58 | ||
aa82db4f | 59 | #include "ssl_locl.h" |
bc36ee62 | 60 | #ifndef OPENSSL_NO_SSL2 |
40720ce3 MC |
61 | # include <stdio.h> |
62 | # include <openssl/objects.h> | |
63 | # include <openssl/evp.h> | |
64 | # include <openssl/md5.h> | |
d02b48c6 | 65 | |
40720ce3 | 66 | const char ssl2_version_str[] = "SSLv2" OPENSSL_VERSION_PTEXT; |
d02b48c6 | 67 | |
40720ce3 | 68 | # define SSL2_NUM_CIPHERS (sizeof(ssl2_ciphers)/sizeof(SSL_CIPHER)) |
d02b48c6 | 69 | |
3c0e39c5 | 70 | /* list of available SSLv2 ciphers (sorted by id) */ |
40720ce3 | 71 | OPENSSL_GLOBAL SSL_CIPHER ssl2_ciphers[] = { |
d02b48c6 | 72 | /* NULL_WITH_MD5 v3 */ |
40720ce3 MC |
73 | # if 0 |
74 | { | |
75 | 1, | |
76 | SSL2_TXT_NULL_WITH_MD5, | |
77 | SSL2_CK_NULL_WITH_MD5, | |
78 | SSL_kRSA | SSL_aRSA | SSL_eNULL | SSL_MD5 | SSL_SSLV2, | |
79 | SSL_EXPORT | SSL_EXP40 | SSL_STRONG_NONE, | |
80 | 0, | |
81 | 0, | |
82 | 0, | |
83 | SSL_ALL_CIPHERS, | |
84 | SSL_ALL_STRENGTHS, | |
85 | }, | |
86 | # endif | |
d02b48c6 | 87 | /* RC4_128_WITH_MD5 */ |
40720ce3 MC |
88 | { |
89 | 1, | |
90 | SSL2_TXT_RC4_128_WITH_MD5, | |
91 | SSL2_CK_RC4_128_WITH_MD5, | |
92 | SSL_kRSA | SSL_aRSA | SSL_RC4 | SSL_MD5 | SSL_SSLV2, | |
93 | SSL_NOT_EXP | SSL_MEDIUM, | |
94 | 0, | |
95 | 128, | |
96 | 128, | |
97 | SSL_ALL_CIPHERS, | |
98 | SSL_ALL_STRENGTHS, | |
99 | }, | |
3c0e39c5 | 100 | /* RC4_128_EXPORT40_WITH_MD5 */ |
40720ce3 MC |
101 | { |
102 | 1, | |
103 | SSL2_TXT_RC4_128_EXPORT40_WITH_MD5, | |
104 | SSL2_CK_RC4_128_EXPORT40_WITH_MD5, | |
105 | SSL_kRSA | SSL_aRSA | SSL_RC4 | SSL_MD5 | SSL_SSLV2, | |
106 | SSL_EXPORT | SSL_EXP40, | |
107 | SSL2_CF_5_BYTE_ENC, | |
108 | 40, | |
109 | 128, | |
110 | SSL_ALL_CIPHERS, | |
111 | SSL_ALL_STRENGTHS, | |
112 | }, | |
d02b48c6 | 113 | /* RC2_128_CBC_WITH_MD5 */ |
40720ce3 MC |
114 | { |
115 | 1, | |
116 | SSL2_TXT_RC2_128_CBC_WITH_MD5, | |
117 | SSL2_CK_RC2_128_CBC_WITH_MD5, | |
118 | SSL_kRSA | SSL_aRSA | SSL_RC2 | SSL_MD5 | SSL_SSLV2, | |
119 | SSL_NOT_EXP | SSL_MEDIUM, | |
120 | 0, | |
121 | 128, | |
122 | 128, | |
123 | SSL_ALL_CIPHERS, | |
124 | SSL_ALL_STRENGTHS, | |
125 | }, | |
3c0e39c5 | 126 | /* RC2_128_CBC_EXPORT40_WITH_MD5 */ |
40720ce3 MC |
127 | { |
128 | 1, | |
129 | SSL2_TXT_RC2_128_CBC_EXPORT40_WITH_MD5, | |
130 | SSL2_CK_RC2_128_CBC_EXPORT40_WITH_MD5, | |
131 | SSL_kRSA | SSL_aRSA | SSL_RC2 | SSL_MD5 | SSL_SSLV2, | |
132 | SSL_EXPORT | SSL_EXP40, | |
133 | SSL2_CF_5_BYTE_ENC, | |
134 | 40, | |
135 | 128, | |
136 | SSL_ALL_CIPHERS, | |
137 | SSL_ALL_STRENGTHS, | |
138 | }, | |
d02b48c6 | 139 | /* IDEA_128_CBC_WITH_MD5 */ |
40720ce3 MC |
140 | # ifndef OPENSSL_NO_IDEA |
141 | { | |
142 | 1, | |
143 | SSL2_TXT_IDEA_128_CBC_WITH_MD5, | |
144 | SSL2_CK_IDEA_128_CBC_WITH_MD5, | |
145 | SSL_kRSA | SSL_aRSA | SSL_IDEA | SSL_MD5 | SSL_SSLV2, | |
146 | SSL_NOT_EXP | SSL_MEDIUM, | |
147 | 0, | |
148 | 128, | |
149 | 128, | |
150 | SSL_ALL_CIPHERS, | |
151 | SSL_ALL_STRENGTHS, | |
152 | }, | |
153 | # endif | |
d02b48c6 | 154 | /* DES_64_CBC_WITH_MD5 */ |
40720ce3 MC |
155 | { |
156 | 1, | |
157 | SSL2_TXT_DES_64_CBC_WITH_MD5, | |
158 | SSL2_CK_DES_64_CBC_WITH_MD5, | |
159 | SSL_kRSA | SSL_aRSA | SSL_DES | SSL_MD5 | SSL_SSLV2, | |
160 | SSL_NOT_EXP | SSL_LOW, | |
161 | 0, | |
162 | 56, | |
163 | 56, | |
164 | SSL_ALL_CIPHERS, | |
165 | SSL_ALL_STRENGTHS, | |
166 | }, | |
d02b48c6 | 167 | /* DES_192_EDE3_CBC_WITH_MD5 */ |
40720ce3 MC |
168 | { |
169 | 1, | |
170 | SSL2_TXT_DES_192_EDE3_CBC_WITH_MD5, | |
171 | SSL2_CK_DES_192_EDE3_CBC_WITH_MD5, | |
172 | SSL_kRSA | SSL_aRSA | SSL_3DES | SSL_MD5 | SSL_SSLV2, | |
173 | SSL_NOT_EXP | SSL_HIGH, | |
174 | 0, | |
175 | 168, | |
176 | 168, | |
177 | SSL_ALL_CIPHERS, | |
178 | SSL_ALL_STRENGTHS, | |
179 | }, | |
d02b48c6 | 180 | /* RC4_64_WITH_MD5 */ |
40720ce3 MC |
181 | # if 0 |
182 | { | |
183 | 1, | |
184 | SSL2_TXT_RC4_64_WITH_MD5, | |
185 | SSL2_CK_RC4_64_WITH_MD5, | |
186 | SSL_kRSA | SSL_aRSA | SSL_RC4 | SSL_MD5 | SSL_SSLV2, | |
187 | SSL_NOT_EXP | SSL_LOW, | |
188 | SSL2_CF_8_BYTE_ENC, | |
189 | 64, | |
190 | 64, | |
191 | SSL_ALL_CIPHERS, | |
192 | SSL_ALL_STRENGTHS, | |
193 | }, | |
194 | # endif | |
d02b48c6 | 195 | /* NULL SSLeay (testing) */ |
40720ce3 MC |
196 | # if 0 |
197 | { | |
198 | 0, | |
199 | SSL2_TXT_NULL, | |
200 | SSL2_CK_NULL, | |
201 | 0, | |
202 | SSL_STRONG_NONE, | |
203 | 0, | |
204 | 0, | |
205 | 0, | |
206 | SSL_ALL_CIPHERS, | |
207 | SSL_ALL_STRENGTHS, | |
208 | }, | |
209 | # endif | |
d02b48c6 RE |
210 | |
211 | /* end of list :-) */ | |
40720ce3 | 212 | }; |
d02b48c6 | 213 | |
222f2246 | 214 | long ssl2_default_timeout(void) |
40720ce3 MC |
215 | { |
216 | return (300); | |
217 | } | |
d02b48c6 | 218 | |
222f2246 | 219 | IMPLEMENT_ssl2_meth_func(sslv2_base_method, |
40720ce3 MC |
220 | ssl_undefined_function, |
221 | ssl_undefined_function, ssl_bad_method) | |
d02b48c6 | 222 | |
6b691a5c | 223 | int ssl2_num_ciphers(void) |
40720ce3 MC |
224 | { |
225 | return (SSL2_NUM_CIPHERS); | |
226 | } | |
d02b48c6 | 227 | |
6b691a5c | 228 | SSL_CIPHER *ssl2_get_cipher(unsigned int u) |
40720ce3 MC |
229 | { |
230 | if (u < SSL2_NUM_CIPHERS) | |
231 | return (&(ssl2_ciphers[SSL2_NUM_CIPHERS - 1 - u])); | |
232 | else | |
233 | return (NULL); | |
234 | } | |
d02b48c6 | 235 | |
0821bcd4 | 236 | int ssl2_pending(const SSL *s) |
40720ce3 MC |
237 | { |
238 | return SSL_in_init(s) ? 0 : s->s2->ract_data_length; | |
239 | } | |
d02b48c6 | 240 | |
6b691a5c | 241 | int ssl2_new(SSL *s) |
40720ce3 MC |
242 | { |
243 | SSL2_STATE *s2; | |
d02b48c6 | 244 | |
40720ce3 MC |
245 | if ((s2 = OPENSSL_malloc(sizeof *s2)) == NULL) |
246 | goto err; | |
247 | memset(s2, 0, sizeof *s2); | |
d02b48c6 | 248 | |
40720ce3 | 249 | # if SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER + 3 > SSL2_MAX_RECORD_LENGTH_2_BYTE_HEADER + 2 |
3880cd35 | 250 | # error "assertion failed" |
40720ce3 | 251 | # endif |
3880cd35 | 252 | |
40720ce3 MC |
253 | if ((s2->rbuf = |
254 | OPENSSL_malloc(SSL2_MAX_RECORD_LENGTH_2_BYTE_HEADER + 2)) == NULL) | |
255 | goto err; | |
256 | /* | |
257 | * wbuf needs one byte more because when using two-byte headers, we leave | |
258 | * the first byte unused in do_ssl_write (s2_pkt.c) | |
259 | */ | |
260 | if ((s2->wbuf = | |
261 | OPENSSL_malloc(SSL2_MAX_RECORD_LENGTH_2_BYTE_HEADER + 3)) == NULL) | |
262 | goto err; | |
263 | s->s2 = s2; | |
264 | ||
265 | ssl2_clear(s); | |
266 | return (1); | |
267 | err: | |
268 | if (s2 != NULL) { | |
269 | if (s2->wbuf != NULL) | |
270 | OPENSSL_free(s2->wbuf); | |
271 | if (s2->rbuf != NULL) | |
272 | OPENSSL_free(s2->rbuf); | |
273 | OPENSSL_free(s2); | |
274 | } | |
275 | return (0); | |
276 | } | |
d02b48c6 | 277 | |
6b691a5c | 278 | void ssl2_free(SSL *s) |
40720ce3 MC |
279 | { |
280 | SSL2_STATE *s2; | |
281 | ||
282 | if (s == NULL) | |
283 | return; | |
284 | ||
285 | s2 = s->s2; | |
286 | if (s2->rbuf != NULL) | |
287 | OPENSSL_free(s2->rbuf); | |
288 | if (s2->wbuf != NULL) | |
289 | OPENSSL_free(s2->wbuf); | |
290 | OPENSSL_cleanse(s2, sizeof *s2); | |
291 | OPENSSL_free(s2); | |
292 | s->s2 = NULL; | |
293 | } | |
d02b48c6 | 294 | |
6b691a5c | 295 | void ssl2_clear(SSL *s) |
40720ce3 MC |
296 | { |
297 | SSL2_STATE *s2; | |
298 | unsigned char *rbuf, *wbuf; | |
d02b48c6 | 299 | |
40720ce3 | 300 | s2 = s->s2; |
d02b48c6 | 301 | |
40720ce3 MC |
302 | rbuf = s2->rbuf; |
303 | wbuf = s2->wbuf; | |
d02b48c6 | 304 | |
40720ce3 | 305 | memset(s2, 0, sizeof *s2); |
d02b48c6 | 306 | |
40720ce3 MC |
307 | s2->rbuf = rbuf; |
308 | s2->wbuf = wbuf; | |
309 | s2->clear_text = 1; | |
310 | s->packet = s2->rbuf; | |
311 | s->version = SSL2_VERSION; | |
312 | s->packet_length = 0; | |
313 | } | |
d02b48c6 | 314 | |
a661b653 | 315 | long ssl2_ctrl(SSL *s, int cmd, long larg, void *parg) |
40720ce3 MC |
316 | { |
317 | int ret = 0; | |
318 | ||
319 | switch (cmd) { | |
320 | case SSL_CTRL_GET_SESSION_REUSED: | |
321 | ret = s->hit; | |
322 | break; | |
323 | case SSL_CTRL_CHECK_PROTO_VERSION: | |
324 | return ssl3_ctrl(s, SSL_CTRL_CHECK_PROTO_VERSION, larg, parg); | |
325 | default: | |
326 | break; | |
327 | } | |
328 | return (ret); | |
329 | } | |
330 | ||
331 | long ssl2_callback_ctrl(SSL *s, int cmd, void (*fp) (void)) | |
332 | { | |
333 | return (0); | |
334 | } | |
d3442bc7 | 335 | |
a661b653 | 336 | long ssl2_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) |
40720ce3 MC |
337 | { |
338 | return (0); | |
339 | } | |
340 | ||
341 | long ssl2_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void)) | |
342 | { | |
343 | return (0); | |
344 | } | |
345 | ||
346 | /* | |
347 | * This function needs to check if the ciphers required are actually | |
348 | * available | |
349 | */ | |
6b691a5c | 350 | SSL_CIPHER *ssl2_get_cipher_by_char(const unsigned char *p) |
40720ce3 MC |
351 | { |
352 | SSL_CIPHER c, *cp; | |
353 | unsigned long id; | |
354 | ||
355 | id = 0x02000000L | ((unsigned long)p[0] << 16L) | | |
356 | ((unsigned long)p[1] << 8L) | (unsigned long)p[2]; | |
357 | c.id = id; | |
358 | cp = (SSL_CIPHER *)OBJ_bsearch((char *)&c, | |
359 | (char *)ssl2_ciphers, | |
360 | SSL2_NUM_CIPHERS, sizeof(SSL_CIPHER), | |
361 | FP_ICC ssl_cipher_id_cmp); | |
362 | if ((cp == NULL) || (cp->valid == 0)) | |
363 | return NULL; | |
364 | else | |
365 | return cp; | |
366 | } | |
d02b48c6 | 367 | |
6b691a5c | 368 | int ssl2_put_cipher_by_char(const SSL_CIPHER *c, unsigned char *p) |
40720ce3 MC |
369 | { |
370 | long l; | |
371 | ||
372 | if (p != NULL) { | |
373 | l = c->id; | |
374 | if ((l & 0xff000000) != 0x02000000 && l != SSL3_CK_FALLBACK_SCSV) | |
375 | return (0); | |
376 | p[0] = ((unsigned char)(l >> 16L)) & 0xFF; | |
377 | p[1] = ((unsigned char)(l >> 8L)) & 0xFF; | |
378 | p[2] = ((unsigned char)(l)) & 0xFF; | |
379 | } | |
380 | return (3); | |
381 | } | |
d02b48c6 | 382 | |
5574e0ed | 383 | int ssl2_generate_key_material(SSL *s) |
40720ce3 MC |
384 | { |
385 | unsigned int i; | |
386 | EVP_MD_CTX ctx; | |
387 | unsigned char *km; | |
388 | unsigned char c = '0'; | |
389 | const EVP_MD *md5; | |
390 | ||
391 | md5 = EVP_md5(); | |
392 | ||
393 | # ifdef CHARSET_EBCDIC | |
394 | c = os_toascii['0']; /* Must be an ASCII '0', not EBCDIC '0', see | |
395 | * SSLv2 docu */ | |
396 | # endif | |
397 | EVP_MD_CTX_init(&ctx); | |
398 | km = s->s2->key_material; | |
399 | ||
400 | if (s->session->master_key_length < 0 || | |
401 | s->session->master_key_length > (int)sizeof(s->session->master_key)) { | |
402 | SSLerr(SSL_F_SSL2_GENERATE_KEY_MATERIAL, ERR_R_INTERNAL_ERROR); | |
403 | return 0; | |
404 | } | |
405 | ||
406 | for (i = 0; i < s->s2->key_material_length; i += EVP_MD_size(md5)) { | |
407 | if (((km - s->s2->key_material) + EVP_MD_size(md5)) > | |
408 | (int)sizeof(s->s2->key_material)) { | |
409 | /* | |
410 | * EVP_DigestFinal_ex() below would write beyond buffer | |
411 | */ | |
412 | SSLerr(SSL_F_SSL2_GENERATE_KEY_MATERIAL, ERR_R_INTERNAL_ERROR); | |
413 | return 0; | |
414 | } | |
415 | ||
416 | EVP_DigestInit_ex(&ctx, md5, NULL); | |
417 | ||
418 | OPENSSL_assert(s->session->master_key_length >= 0 | |
419 | && s->session->master_key_length | |
420 | < (int)sizeof(s->session->master_key)); | |
421 | EVP_DigestUpdate(&ctx, s->session->master_key, | |
422 | s->session->master_key_length); | |
423 | EVP_DigestUpdate(&ctx, &c, 1); | |
424 | c++; | |
425 | EVP_DigestUpdate(&ctx, s->s2->challenge, s->s2->challenge_length); | |
426 | EVP_DigestUpdate(&ctx, s->s2->conn_id, s->s2->conn_id_length); | |
427 | EVP_DigestFinal_ex(&ctx, km, NULL); | |
428 | km += EVP_MD_size(md5); | |
429 | } | |
430 | ||
431 | EVP_MD_CTX_cleanup(&ctx); | |
432 | return 1; | |
433 | } | |
d02b48c6 | 434 | |
6b691a5c | 435 | void ssl2_return_error(SSL *s, int err) |
40720ce3 MC |
436 | { |
437 | if (!s->error) { | |
438 | s->error = 3; | |
439 | s->error_code = err; | |
d02b48c6 | 440 | |
40720ce3 MC |
441 | ssl2_write_error(s); |
442 | } | |
443 | } | |
d02b48c6 | 444 | |
6b691a5c | 445 | void ssl2_write_error(SSL *s) |
40720ce3 MC |
446 | { |
447 | unsigned char buf[3]; | |
448 | int i, error; | |
449 | ||
450 | buf[0] = SSL2_MT_ERROR; | |
451 | buf[1] = (s->error_code >> 8) & 0xff; | |
452 | buf[2] = (s->error_code) & 0xff; | |
453 | ||
454 | /* state=s->rwstate;*/ | |
455 | ||
456 | error = s->error; /* number of bytes left to write */ | |
457 | s->error = 0; | |
458 | OPENSSL_assert(error >= 0 && error <= (int)sizeof(buf)); | |
459 | i = ssl2_write(s, &(buf[3 - error]), error); | |
460 | ||
461 | /* if (i == error) s->rwstate=state; */ | |
462 | ||
463 | if (i < 0) | |
464 | s->error = error; | |
465 | else { | |
466 | s->error = error - i; | |
467 | ||
468 | if (s->error == 0) | |
469 | if (s->msg_callback) { | |
470 | /* ERROR */ | |
471 | s->msg_callback(1, s->version, 0, buf, 3, s, | |
472 | s->msg_callback_arg); | |
473 | } | |
474 | } | |
475 | } | |
d02b48c6 | 476 | |
6b691a5c | 477 | int ssl2_shutdown(SSL *s) |
40720ce3 MC |
478 | { |
479 | s->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN); | |
480 | return (1); | |
481 | } | |
482 | #else /* !OPENSSL_NO_SSL2 */ | |
752d706a BL |
483 | |
484 | # if PEDANTIC | |
40720ce3 | 485 | static void *dummy = &dummy; |
752d706a BL |
486 | # endif |
487 | ||
79df9d62 | 488 | #endif |