1*0a6a1f1dSLionel Sambuc /* $NetBSD: crypto-arcfour.c,v 1.1.1.2 2014/04/24 12:45:49 pettai Exp $ */
2ebfedea0SLionel Sambuc
3ebfedea0SLionel Sambuc /*
4ebfedea0SLionel Sambuc * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
5ebfedea0SLionel Sambuc * (Royal Institute of Technology, Stockholm, Sweden).
6ebfedea0SLionel Sambuc * All rights reserved.
7ebfedea0SLionel Sambuc *
8ebfedea0SLionel Sambuc * Redistribution and use in source and binary forms, with or without
9ebfedea0SLionel Sambuc * modification, are permitted provided that the following conditions
10ebfedea0SLionel Sambuc * are met:
11ebfedea0SLionel Sambuc *
12ebfedea0SLionel Sambuc * 1. Redistributions of source code must retain the above copyright
13ebfedea0SLionel Sambuc * notice, this list of conditions and the following disclaimer.
14ebfedea0SLionel Sambuc *
15ebfedea0SLionel Sambuc * 2. Redistributions in binary form must reproduce the above copyright
16ebfedea0SLionel Sambuc * notice, this list of conditions and the following disclaimer in the
17ebfedea0SLionel Sambuc * documentation and/or other materials provided with the distribution.
18ebfedea0SLionel Sambuc *
19ebfedea0SLionel Sambuc * 3. Neither the name of the Institute nor the names of its contributors
20ebfedea0SLionel Sambuc * may be used to endorse or promote products derived from this software
21ebfedea0SLionel Sambuc * without specific prior written permission.
22ebfedea0SLionel Sambuc *
23ebfedea0SLionel Sambuc * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ebfedea0SLionel Sambuc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ebfedea0SLionel Sambuc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ebfedea0SLionel Sambuc * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ebfedea0SLionel Sambuc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ebfedea0SLionel Sambuc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ebfedea0SLionel Sambuc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ebfedea0SLionel Sambuc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ebfedea0SLionel Sambuc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ebfedea0SLionel Sambuc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ebfedea0SLionel Sambuc * SUCH DAMAGE.
34ebfedea0SLionel Sambuc */
35ebfedea0SLionel Sambuc
36ebfedea0SLionel Sambuc /*
37ebfedea0SLionel Sambuc * ARCFOUR
38ebfedea0SLionel Sambuc */
39ebfedea0SLionel Sambuc
40ebfedea0SLionel Sambuc #include "krb5_locl.h"
41ebfedea0SLionel Sambuc
42ebfedea0SLionel Sambuc static struct _krb5_key_type keytype_arcfour = {
43*0a6a1f1dSLionel Sambuc ENCTYPE_ARCFOUR_HMAC_MD5,
44ebfedea0SLionel Sambuc "arcfour",
45ebfedea0SLionel Sambuc 128,
46ebfedea0SLionel Sambuc 16,
47ebfedea0SLionel Sambuc sizeof(struct _krb5_evp_schedule),
48ebfedea0SLionel Sambuc NULL,
49ebfedea0SLionel Sambuc _krb5_evp_schedule,
50ebfedea0SLionel Sambuc _krb5_arcfour_salt,
51ebfedea0SLionel Sambuc NULL,
52ebfedea0SLionel Sambuc _krb5_evp_cleanup,
53ebfedea0SLionel Sambuc EVP_rc4
54ebfedea0SLionel Sambuc };
55ebfedea0SLionel Sambuc
56ebfedea0SLionel Sambuc /*
57ebfedea0SLionel Sambuc * checksum according to section 5. of draft-brezak-win2k-krb-rc4-hmac-03.txt
58ebfedea0SLionel Sambuc */
59ebfedea0SLionel Sambuc
60ebfedea0SLionel Sambuc krb5_error_code
_krb5_HMAC_MD5_checksum(krb5_context context,struct _krb5_key_data * key,const void * data,size_t len,unsigned usage,Checksum * result)61ebfedea0SLionel Sambuc _krb5_HMAC_MD5_checksum(krb5_context context,
62ebfedea0SLionel Sambuc struct _krb5_key_data *key,
63ebfedea0SLionel Sambuc const void *data,
64ebfedea0SLionel Sambuc size_t len,
65ebfedea0SLionel Sambuc unsigned usage,
66ebfedea0SLionel Sambuc Checksum *result)
67ebfedea0SLionel Sambuc {
68ebfedea0SLionel Sambuc EVP_MD_CTX *m;
69ebfedea0SLionel Sambuc struct _krb5_checksum_type *c = _krb5_find_checksum (CKSUMTYPE_RSA_MD5);
70ebfedea0SLionel Sambuc const char signature[] = "signaturekey";
71ebfedea0SLionel Sambuc Checksum ksign_c;
72ebfedea0SLionel Sambuc struct _krb5_key_data ksign;
73ebfedea0SLionel Sambuc krb5_keyblock kb;
74ebfedea0SLionel Sambuc unsigned char t[4];
75ebfedea0SLionel Sambuc unsigned char tmp[16];
76ebfedea0SLionel Sambuc unsigned char ksign_c_data[16];
77ebfedea0SLionel Sambuc krb5_error_code ret;
78ebfedea0SLionel Sambuc
79ebfedea0SLionel Sambuc m = EVP_MD_CTX_create();
80ebfedea0SLionel Sambuc if (m == NULL) {
81ebfedea0SLionel Sambuc krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
82ebfedea0SLionel Sambuc return ENOMEM;
83ebfedea0SLionel Sambuc }
84ebfedea0SLionel Sambuc ksign_c.checksum.length = sizeof(ksign_c_data);
85ebfedea0SLionel Sambuc ksign_c.checksum.data = ksign_c_data;
86ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(context, c, signature, sizeof(signature),
87ebfedea0SLionel Sambuc 0, key, &ksign_c);
88ebfedea0SLionel Sambuc if (ret) {
89ebfedea0SLionel Sambuc EVP_MD_CTX_destroy(m);
90ebfedea0SLionel Sambuc return ret;
91ebfedea0SLionel Sambuc }
92ebfedea0SLionel Sambuc ksign.key = &kb;
93ebfedea0SLionel Sambuc kb.keyvalue = ksign_c.checksum;
94ebfedea0SLionel Sambuc EVP_DigestInit_ex(m, EVP_md5(), NULL);
95ebfedea0SLionel Sambuc t[0] = (usage >> 0) & 0xFF;
96ebfedea0SLionel Sambuc t[1] = (usage >> 8) & 0xFF;
97ebfedea0SLionel Sambuc t[2] = (usage >> 16) & 0xFF;
98ebfedea0SLionel Sambuc t[3] = (usage >> 24) & 0xFF;
99ebfedea0SLionel Sambuc EVP_DigestUpdate(m, t, 4);
100ebfedea0SLionel Sambuc EVP_DigestUpdate(m, data, len);
101ebfedea0SLionel Sambuc EVP_DigestFinal_ex (m, tmp, NULL);
102ebfedea0SLionel Sambuc EVP_MD_CTX_destroy(m);
103ebfedea0SLionel Sambuc
104ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(context, c, tmp, sizeof(tmp), 0, &ksign, result);
105ebfedea0SLionel Sambuc if (ret)
106ebfedea0SLionel Sambuc return ret;
107ebfedea0SLionel Sambuc return 0;
108ebfedea0SLionel Sambuc }
109ebfedea0SLionel Sambuc
110ebfedea0SLionel Sambuc struct _krb5_checksum_type _krb5_checksum_hmac_md5 = {
111ebfedea0SLionel Sambuc CKSUMTYPE_HMAC_MD5,
112ebfedea0SLionel Sambuc "hmac-md5",
113ebfedea0SLionel Sambuc 64,
114ebfedea0SLionel Sambuc 16,
115ebfedea0SLionel Sambuc F_KEYED | F_CPROOF,
116ebfedea0SLionel Sambuc _krb5_HMAC_MD5_checksum,
117ebfedea0SLionel Sambuc NULL
118ebfedea0SLionel Sambuc };
119ebfedea0SLionel Sambuc
120ebfedea0SLionel Sambuc /*
121ebfedea0SLionel Sambuc * section 6 of draft-brezak-win2k-krb-rc4-hmac-03
122ebfedea0SLionel Sambuc *
123ebfedea0SLionel Sambuc * warning: not for small children
124ebfedea0SLionel Sambuc */
125ebfedea0SLionel Sambuc
126ebfedea0SLionel Sambuc static krb5_error_code
ARCFOUR_subencrypt(krb5_context context,struct _krb5_key_data * key,void * data,size_t len,unsigned usage,void * ivec)127ebfedea0SLionel Sambuc ARCFOUR_subencrypt(krb5_context context,
128ebfedea0SLionel Sambuc struct _krb5_key_data *key,
129ebfedea0SLionel Sambuc void *data,
130ebfedea0SLionel Sambuc size_t len,
131ebfedea0SLionel Sambuc unsigned usage,
132ebfedea0SLionel Sambuc void *ivec)
133ebfedea0SLionel Sambuc {
134ebfedea0SLionel Sambuc EVP_CIPHER_CTX ctx;
135ebfedea0SLionel Sambuc struct _krb5_checksum_type *c = _krb5_find_checksum (CKSUMTYPE_RSA_MD5);
136ebfedea0SLionel Sambuc Checksum k1_c, k2_c, k3_c, cksum;
137ebfedea0SLionel Sambuc struct _krb5_key_data ke;
138ebfedea0SLionel Sambuc krb5_keyblock kb;
139ebfedea0SLionel Sambuc unsigned char t[4];
140ebfedea0SLionel Sambuc unsigned char *cdata = data;
141ebfedea0SLionel Sambuc unsigned char k1_c_data[16], k2_c_data[16], k3_c_data[16];
142ebfedea0SLionel Sambuc krb5_error_code ret;
143ebfedea0SLionel Sambuc
144ebfedea0SLionel Sambuc t[0] = (usage >> 0) & 0xFF;
145ebfedea0SLionel Sambuc t[1] = (usage >> 8) & 0xFF;
146ebfedea0SLionel Sambuc t[2] = (usage >> 16) & 0xFF;
147ebfedea0SLionel Sambuc t[3] = (usage >> 24) & 0xFF;
148ebfedea0SLionel Sambuc
149ebfedea0SLionel Sambuc k1_c.checksum.length = sizeof(k1_c_data);
150ebfedea0SLionel Sambuc k1_c.checksum.data = k1_c_data;
151ebfedea0SLionel Sambuc
152ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(NULL, c, t, sizeof(t), 0, key, &k1_c);
153ebfedea0SLionel Sambuc if (ret)
154ebfedea0SLionel Sambuc krb5_abortx(context, "hmac failed");
155ebfedea0SLionel Sambuc
156ebfedea0SLionel Sambuc memcpy (k2_c_data, k1_c_data, sizeof(k1_c_data));
157ebfedea0SLionel Sambuc
158ebfedea0SLionel Sambuc k2_c.checksum.length = sizeof(k2_c_data);
159ebfedea0SLionel Sambuc k2_c.checksum.data = k2_c_data;
160ebfedea0SLionel Sambuc
161ebfedea0SLionel Sambuc ke.key = &kb;
162ebfedea0SLionel Sambuc kb.keyvalue = k2_c.checksum;
163ebfedea0SLionel Sambuc
164ebfedea0SLionel Sambuc cksum.checksum.length = 16;
165ebfedea0SLionel Sambuc cksum.checksum.data = data;
166ebfedea0SLionel Sambuc
167ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(NULL, c, cdata + 16, len - 16, 0, &ke, &cksum);
168ebfedea0SLionel Sambuc if (ret)
169ebfedea0SLionel Sambuc krb5_abortx(context, "hmac failed");
170ebfedea0SLionel Sambuc
171ebfedea0SLionel Sambuc ke.key = &kb;
172ebfedea0SLionel Sambuc kb.keyvalue = k1_c.checksum;
173ebfedea0SLionel Sambuc
174ebfedea0SLionel Sambuc k3_c.checksum.length = sizeof(k3_c_data);
175ebfedea0SLionel Sambuc k3_c.checksum.data = k3_c_data;
176ebfedea0SLionel Sambuc
177ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(NULL, c, data, 16, 0, &ke, &k3_c);
178ebfedea0SLionel Sambuc if (ret)
179ebfedea0SLionel Sambuc krb5_abortx(context, "hmac failed");
180ebfedea0SLionel Sambuc
181ebfedea0SLionel Sambuc EVP_CIPHER_CTX_init(&ctx);
182ebfedea0SLionel Sambuc
183ebfedea0SLionel Sambuc EVP_CipherInit_ex(&ctx, EVP_rc4(), NULL, k3_c.checksum.data, NULL, 1);
184ebfedea0SLionel Sambuc EVP_Cipher(&ctx, cdata + 16, cdata + 16, len - 16);
185ebfedea0SLionel Sambuc EVP_CIPHER_CTX_cleanup(&ctx);
186ebfedea0SLionel Sambuc
187ebfedea0SLionel Sambuc memset (k1_c_data, 0, sizeof(k1_c_data));
188ebfedea0SLionel Sambuc memset (k2_c_data, 0, sizeof(k2_c_data));
189ebfedea0SLionel Sambuc memset (k3_c_data, 0, sizeof(k3_c_data));
190ebfedea0SLionel Sambuc return 0;
191ebfedea0SLionel Sambuc }
192ebfedea0SLionel Sambuc
193ebfedea0SLionel Sambuc static krb5_error_code
ARCFOUR_subdecrypt(krb5_context context,struct _krb5_key_data * key,void * data,size_t len,unsigned usage,void * ivec)194ebfedea0SLionel Sambuc ARCFOUR_subdecrypt(krb5_context context,
195ebfedea0SLionel Sambuc struct _krb5_key_data *key,
196ebfedea0SLionel Sambuc void *data,
197ebfedea0SLionel Sambuc size_t len,
198ebfedea0SLionel Sambuc unsigned usage,
199ebfedea0SLionel Sambuc void *ivec)
200ebfedea0SLionel Sambuc {
201ebfedea0SLionel Sambuc EVP_CIPHER_CTX ctx;
202ebfedea0SLionel Sambuc struct _krb5_checksum_type *c = _krb5_find_checksum (CKSUMTYPE_RSA_MD5);
203ebfedea0SLionel Sambuc Checksum k1_c, k2_c, k3_c, cksum;
204ebfedea0SLionel Sambuc struct _krb5_key_data ke;
205ebfedea0SLionel Sambuc krb5_keyblock kb;
206ebfedea0SLionel Sambuc unsigned char t[4];
207ebfedea0SLionel Sambuc unsigned char *cdata = data;
208ebfedea0SLionel Sambuc unsigned char k1_c_data[16], k2_c_data[16], k3_c_data[16];
209ebfedea0SLionel Sambuc unsigned char cksum_data[16];
210ebfedea0SLionel Sambuc krb5_error_code ret;
211ebfedea0SLionel Sambuc
212ebfedea0SLionel Sambuc t[0] = (usage >> 0) & 0xFF;
213ebfedea0SLionel Sambuc t[1] = (usage >> 8) & 0xFF;
214ebfedea0SLionel Sambuc t[2] = (usage >> 16) & 0xFF;
215ebfedea0SLionel Sambuc t[3] = (usage >> 24) & 0xFF;
216ebfedea0SLionel Sambuc
217ebfedea0SLionel Sambuc k1_c.checksum.length = sizeof(k1_c_data);
218ebfedea0SLionel Sambuc k1_c.checksum.data = k1_c_data;
219ebfedea0SLionel Sambuc
220ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(NULL, c, t, sizeof(t), 0, key, &k1_c);
221ebfedea0SLionel Sambuc if (ret)
222ebfedea0SLionel Sambuc krb5_abortx(context, "hmac failed");
223ebfedea0SLionel Sambuc
224ebfedea0SLionel Sambuc memcpy (k2_c_data, k1_c_data, sizeof(k1_c_data));
225ebfedea0SLionel Sambuc
226ebfedea0SLionel Sambuc k2_c.checksum.length = sizeof(k2_c_data);
227ebfedea0SLionel Sambuc k2_c.checksum.data = k2_c_data;
228ebfedea0SLionel Sambuc
229ebfedea0SLionel Sambuc ke.key = &kb;
230ebfedea0SLionel Sambuc kb.keyvalue = k1_c.checksum;
231ebfedea0SLionel Sambuc
232ebfedea0SLionel Sambuc k3_c.checksum.length = sizeof(k3_c_data);
233ebfedea0SLionel Sambuc k3_c.checksum.data = k3_c_data;
234ebfedea0SLionel Sambuc
235ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(NULL, c, cdata, 16, 0, &ke, &k3_c);
236ebfedea0SLionel Sambuc if (ret)
237ebfedea0SLionel Sambuc krb5_abortx(context, "hmac failed");
238ebfedea0SLionel Sambuc
239ebfedea0SLionel Sambuc EVP_CIPHER_CTX_init(&ctx);
240ebfedea0SLionel Sambuc EVP_CipherInit_ex(&ctx, EVP_rc4(), NULL, k3_c.checksum.data, NULL, 0);
241ebfedea0SLionel Sambuc EVP_Cipher(&ctx, cdata + 16, cdata + 16, len - 16);
242ebfedea0SLionel Sambuc EVP_CIPHER_CTX_cleanup(&ctx);
243ebfedea0SLionel Sambuc
244ebfedea0SLionel Sambuc ke.key = &kb;
245ebfedea0SLionel Sambuc kb.keyvalue = k2_c.checksum;
246ebfedea0SLionel Sambuc
247ebfedea0SLionel Sambuc cksum.checksum.length = 16;
248ebfedea0SLionel Sambuc cksum.checksum.data = cksum_data;
249ebfedea0SLionel Sambuc
250ebfedea0SLionel Sambuc ret = _krb5_internal_hmac(NULL, c, cdata + 16, len - 16, 0, &ke, &cksum);
251ebfedea0SLionel Sambuc if (ret)
252ebfedea0SLionel Sambuc krb5_abortx(context, "hmac failed");
253ebfedea0SLionel Sambuc
254ebfedea0SLionel Sambuc memset (k1_c_data, 0, sizeof(k1_c_data));
255ebfedea0SLionel Sambuc memset (k2_c_data, 0, sizeof(k2_c_data));
256ebfedea0SLionel Sambuc memset (k3_c_data, 0, sizeof(k3_c_data));
257ebfedea0SLionel Sambuc
258ebfedea0SLionel Sambuc if (ct_memcmp (cksum.checksum.data, data, 16) != 0) {
259ebfedea0SLionel Sambuc krb5_clear_error_message (context);
260ebfedea0SLionel Sambuc return KRB5KRB_AP_ERR_BAD_INTEGRITY;
261ebfedea0SLionel Sambuc } else {
262ebfedea0SLionel Sambuc return 0;
263ebfedea0SLionel Sambuc }
264ebfedea0SLionel Sambuc }
265ebfedea0SLionel Sambuc
266ebfedea0SLionel Sambuc /*
267ebfedea0SLionel Sambuc * convert the usage numbers used in
268ebfedea0SLionel Sambuc * draft-ietf-cat-kerb-key-derivation-00.txt to the ones in
269ebfedea0SLionel Sambuc * draft-brezak-win2k-krb-rc4-hmac-04.txt
270ebfedea0SLionel Sambuc */
271ebfedea0SLionel Sambuc
272ebfedea0SLionel Sambuc krb5_error_code
_krb5_usage2arcfour(krb5_context context,unsigned * usage)273ebfedea0SLionel Sambuc _krb5_usage2arcfour(krb5_context context, unsigned *usage)
274ebfedea0SLionel Sambuc {
275ebfedea0SLionel Sambuc switch (*usage) {
276ebfedea0SLionel Sambuc case KRB5_KU_AS_REP_ENC_PART : /* 3 */
277ebfedea0SLionel Sambuc *usage = 8;
278ebfedea0SLionel Sambuc return 0;
279ebfedea0SLionel Sambuc case KRB5_KU_USAGE_SEAL : /* 22 */
280ebfedea0SLionel Sambuc *usage = 13;
281ebfedea0SLionel Sambuc return 0;
282ebfedea0SLionel Sambuc case KRB5_KU_USAGE_SIGN : /* 23 */
283ebfedea0SLionel Sambuc *usage = 15;
284ebfedea0SLionel Sambuc return 0;
285ebfedea0SLionel Sambuc case KRB5_KU_USAGE_SEQ: /* 24 */
286ebfedea0SLionel Sambuc *usage = 0;
287ebfedea0SLionel Sambuc return 0;
288ebfedea0SLionel Sambuc default :
289ebfedea0SLionel Sambuc return 0;
290ebfedea0SLionel Sambuc }
291ebfedea0SLionel Sambuc }
292ebfedea0SLionel Sambuc
293ebfedea0SLionel Sambuc static krb5_error_code
ARCFOUR_encrypt(krb5_context context,struct _krb5_key_data * key,void * data,size_t len,krb5_boolean encryptp,int usage,void * ivec)294ebfedea0SLionel Sambuc ARCFOUR_encrypt(krb5_context context,
295ebfedea0SLionel Sambuc struct _krb5_key_data *key,
296ebfedea0SLionel Sambuc void *data,
297ebfedea0SLionel Sambuc size_t len,
298ebfedea0SLionel Sambuc krb5_boolean encryptp,
299ebfedea0SLionel Sambuc int usage,
300ebfedea0SLionel Sambuc void *ivec)
301ebfedea0SLionel Sambuc {
302ebfedea0SLionel Sambuc krb5_error_code ret;
303ebfedea0SLionel Sambuc unsigned keyusage = usage;
304ebfedea0SLionel Sambuc
305ebfedea0SLionel Sambuc if((ret = _krb5_usage2arcfour (context, &keyusage)) != 0)
306ebfedea0SLionel Sambuc return ret;
307ebfedea0SLionel Sambuc
308ebfedea0SLionel Sambuc if (encryptp)
309ebfedea0SLionel Sambuc return ARCFOUR_subencrypt (context, key, data, len, keyusage, ivec);
310ebfedea0SLionel Sambuc else
311ebfedea0SLionel Sambuc return ARCFOUR_subdecrypt (context, key, data, len, keyusage, ivec);
312ebfedea0SLionel Sambuc }
313ebfedea0SLionel Sambuc
314ebfedea0SLionel Sambuc struct _krb5_encryption_type _krb5_enctype_arcfour_hmac_md5 = {
315ebfedea0SLionel Sambuc ETYPE_ARCFOUR_HMAC_MD5,
316ebfedea0SLionel Sambuc "arcfour-hmac-md5",
317ebfedea0SLionel Sambuc 1,
318ebfedea0SLionel Sambuc 1,
319ebfedea0SLionel Sambuc 8,
320ebfedea0SLionel Sambuc &keytype_arcfour,
321ebfedea0SLionel Sambuc &_krb5_checksum_hmac_md5,
322*0a6a1f1dSLionel Sambuc &_krb5_checksum_hmac_md5,
323ebfedea0SLionel Sambuc F_SPECIAL,
324ebfedea0SLionel Sambuc ARCFOUR_encrypt,
325ebfedea0SLionel Sambuc 0,
326ebfedea0SLionel Sambuc NULL
327ebfedea0SLionel Sambuc };
328