2003-07-23 12:12:24 -04:00
|
|
|
/*
|
|
|
|
* $Id$
|
|
|
|
* 'OpenSSL for Ruby' project
|
|
|
|
* Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
|
|
|
|
* All rights reserved.
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* This program is licenced under the same licence as Ruby.
|
|
|
|
* (See the file 'LICENCE'.)
|
|
|
|
*/
|
|
|
|
#include "ossl.h"
|
|
|
|
#include <stdarg.h> /* for ossl_raise */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* String to HEXString conversion
|
|
|
|
*/
|
|
|
|
int
|
2008-07-22 11:34:23 -04:00
|
|
|
string2hex(const unsigned char *buf, int buf_len, char **hexbuf, int *hexbuf_len)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
static const char hex[]="0123456789abcdef";
|
|
|
|
int i, len = 2 * buf_len;
|
|
|
|
|
|
|
|
if (buf_len < 0 || len < buf_len) { /* PARANOIA? */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!hexbuf) { /* if no buf, return calculated len */
|
|
|
|
if (hexbuf_len) {
|
|
|
|
*hexbuf_len = len;
|
|
|
|
}
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
if (!(*hexbuf = OPENSSL_malloc(len + 1))) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
for (i = 0; i < buf_len; i++) {
|
|
|
|
(*hexbuf)[2 * i] = hex[((unsigned char)buf[i]) >> 4];
|
|
|
|
(*hexbuf)[2 * i + 1] = hex[buf[i] & 0x0f];
|
|
|
|
}
|
|
|
|
(*hexbuf)[2 * i] = '\0';
|
|
|
|
|
|
|
|
if (hexbuf_len) {
|
|
|
|
*hexbuf_len = len;
|
|
|
|
}
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Data Conversion
|
|
|
|
*/
|
|
|
|
STACK_OF(X509) *
|
2003-09-17 05:05:02 -04:00
|
|
|
ossl_x509_ary2sk0(VALUE ary)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
STACK_OF(X509) *sk;
|
|
|
|
VALUE val;
|
|
|
|
X509 *x509;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
Check_Type(ary, T_ARRAY);
|
|
|
|
sk = sk_X509_new_null();
|
|
|
|
if (!sk) ossl_raise(eOSSLError, NULL);
|
|
|
|
|
2006-09-02 10:42:08 -04:00
|
|
|
for (i = 0; i < RARRAY_LEN(ary); i++) {
|
2003-07-23 12:12:24 -04:00
|
|
|
val = rb_ary_entry(ary, i);
|
|
|
|
if (!rb_obj_is_kind_of(val, cX509Cert)) {
|
|
|
|
sk_X509_pop_free(sk, X509_free);
|
2004-03-29 02:54:38 -05:00
|
|
|
ossl_raise(eOSSLError, "object not X509 cert in array");
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
x509 = DupX509CertPtr(val); /* NEED TO DUP */
|
|
|
|
sk_X509_push(sk, x509);
|
|
|
|
}
|
|
|
|
return sk;
|
|
|
|
}
|
|
|
|
|
|
|
|
STACK_OF(X509) *
|
|
|
|
ossl_protect_x509_ary2sk(VALUE ary, int *status)
|
|
|
|
{
|
2003-09-17 05:05:02 -04:00
|
|
|
return (STACK_OF(X509)*)rb_protect((VALUE(*)_((VALUE)))ossl_x509_ary2sk0,
|
|
|
|
ary, status);
|
|
|
|
}
|
|
|
|
|
|
|
|
STACK_OF(X509) *
|
|
|
|
ossl_x509_ary2sk(VALUE ary)
|
|
|
|
{
|
|
|
|
STACK_OF(X509) *sk;
|
|
|
|
int status = 0;
|
|
|
|
|
|
|
|
sk = ossl_protect_x509_ary2sk(ary, &status);
|
|
|
|
if(status) rb_jump_tag(status);
|
|
|
|
|
|
|
|
return sk;
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
2003-11-11 16:20:20 -05:00
|
|
|
#define OSSL_IMPL_SK2ARY(name, type) \
|
2003-07-23 12:12:24 -04:00
|
|
|
VALUE \
|
|
|
|
ossl_##name##_sk2ary(STACK *sk) \
|
|
|
|
{ \
|
|
|
|
type *t; \
|
|
|
|
int i, num; \
|
|
|
|
VALUE ary; \
|
|
|
|
\
|
|
|
|
if (!sk) { \
|
|
|
|
OSSL_Debug("empty sk!"); \
|
2003-11-11 16:20:20 -05:00
|
|
|
return Qnil; \
|
2003-07-23 12:12:24 -04:00
|
|
|
} \
|
|
|
|
num = sk_num(sk); \
|
|
|
|
if (num < 0) { \
|
|
|
|
OSSL_Debug("items in sk < -1???"); \
|
|
|
|
return rb_ary_new(); \
|
|
|
|
} \
|
|
|
|
ary = rb_ary_new2(num); \
|
|
|
|
\
|
|
|
|
for (i=0; i<num; i++) { \
|
|
|
|
t = (type *)sk_value(sk, i); \
|
|
|
|
rb_ary_push(ary, ossl_##name##_new(t)); \
|
|
|
|
} \
|
|
|
|
return ary; \
|
|
|
|
}
|
2003-11-11 16:20:20 -05:00
|
|
|
OSSL_IMPL_SK2ARY(x509, X509)
|
|
|
|
OSSL_IMPL_SK2ARY(x509crl, X509_CRL)
|
2003-07-23 12:12:24 -04:00
|
|
|
|
2003-09-17 05:05:02 -04:00
|
|
|
static VALUE
|
|
|
|
ossl_str_new(int size)
|
|
|
|
{
|
|
|
|
return rb_str_new(0, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
VALUE
|
|
|
|
ossl_buf2str(char *buf, int len)
|
|
|
|
{
|
|
|
|
VALUE str;
|
|
|
|
int status = 0;
|
|
|
|
|
2003-09-25 04:49:36 -04:00
|
|
|
str = rb_protect((VALUE(*)_((VALUE)))ossl_str_new, len, &status);
|
2006-08-31 06:30:33 -04:00
|
|
|
if(!NIL_P(str)) memcpy(RSTRING_PTR(str), buf, len);
|
2003-09-17 05:05:02 -04:00
|
|
|
OPENSSL_free(buf);
|
|
|
|
if(status) rb_jump_tag(status);
|
|
|
|
|
|
|
|
return str;
|
|
|
|
}
|
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
/*
|
|
|
|
* our default PEM callback
|
|
|
|
*/
|
|
|
|
static VALUE
|
|
|
|
ossl_pem_passwd_cb0(VALUE flag)
|
|
|
|
{
|
|
|
|
VALUE pass;
|
|
|
|
|
|
|
|
pass = rb_yield(flag);
|
|
|
|
SafeStringValue(pass);
|
|
|
|
|
|
|
|
return pass;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
ossl_pem_passwd_cb(char *buf, int max_len, int flag, void *pwd)
|
|
|
|
{
|
|
|
|
int len, status = 0;
|
|
|
|
VALUE rflag, pass;
|
|
|
|
|
|
|
|
if (pwd || !rb_block_given_p())
|
|
|
|
return PEM_def_callback(buf, max_len, flag, pwd);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
/*
|
|
|
|
* when the flag is nonzero, this passphrase
|
|
|
|
* will be used to perform encryption; otherwise it will
|
|
|
|
* be used to perform decryption.
|
|
|
|
*/
|
|
|
|
rflag = flag ? Qtrue : Qfalse;
|
|
|
|
pass = rb_protect(ossl_pem_passwd_cb0, rflag, &status);
|
|
|
|
if (status) return -1; /* exception was raised. */
|
2006-08-31 06:30:33 -04:00
|
|
|
len = RSTRING_LEN(pass);
|
2003-07-23 12:12:24 -04:00
|
|
|
if (len < 4) { /* 4 is OpenSSL hardcoded limit */
|
|
|
|
rb_warning("password must be longer than 4 bytes");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (len > max_len) {
|
|
|
|
rb_warning("password must be shorter then %d bytes", max_len-1);
|
|
|
|
continue;
|
|
|
|
}
|
2006-08-31 06:30:33 -04:00
|
|
|
memcpy(buf, RSTRING_PTR(pass), len);
|
2003-07-23 12:12:24 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Verify callback
|
|
|
|
*/
|
|
|
|
int ossl_verify_cb_idx;
|
|
|
|
|
|
|
|
VALUE
|
|
|
|
ossl_call_verify_cb_proc(struct ossl_verify_cb_args *args)
|
|
|
|
{
|
|
|
|
return rb_funcall(args->proc, rb_intern("call"), 2,
|
|
|
|
args->preverify_ok, args->store_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
ossl_verify_cb(int ok, X509_STORE_CTX *ctx)
|
|
|
|
{
|
|
|
|
VALUE proc, rctx, ret;
|
|
|
|
struct ossl_verify_cb_args args;
|
|
|
|
int state = 0;
|
|
|
|
|
|
|
|
proc = (VALUE)X509_STORE_CTX_get_ex_data(ctx, ossl_verify_cb_idx);
|
|
|
|
if ((void*)proc == 0)
|
|
|
|
proc = (VALUE)X509_STORE_get_ex_data(ctx->ctx, ossl_verify_cb_idx);
|
|
|
|
if ((void*)proc == 0)
|
|
|
|
return ok;
|
|
|
|
if (!NIL_P(proc)) {
|
|
|
|
rctx = rb_protect((VALUE(*)(VALUE))ossl_x509stctx_new,
|
|
|
|
(VALUE)ctx, &state);
|
|
|
|
ret = Qfalse;
|
|
|
|
if (!state) {
|
|
|
|
args.proc = proc;
|
|
|
|
args.preverify_ok = ok ? Qtrue : Qfalse;
|
|
|
|
args.store_ctx = rctx;
|
|
|
|
ret = rb_ensure(ossl_call_verify_cb_proc, (VALUE)&args,
|
|
|
|
ossl_x509stctx_clear_ptr, rctx);
|
|
|
|
}
|
|
|
|
if (ret == Qtrue) {
|
|
|
|
X509_STORE_CTX_set_error(ctx, X509_V_OK);
|
|
|
|
ok = 1;
|
|
|
|
}
|
|
|
|
else{
|
|
|
|
if (X509_STORE_CTX_get_error(ctx) == X509_V_OK) {
|
|
|
|
X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_REJECTED);
|
|
|
|
}
|
|
|
|
ok = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* main module
|
|
|
|
*/
|
|
|
|
VALUE mOSSL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* OpenSSLError < StandardError
|
|
|
|
*/
|
|
|
|
VALUE eOSSLError;
|
|
|
|
|
2003-09-17 05:05:02 -04:00
|
|
|
/*
|
|
|
|
* Convert to DER string
|
|
|
|
*/
|
|
|
|
ID ossl_s_to_der;
|
|
|
|
|
|
|
|
VALUE
|
|
|
|
ossl_to_der(VALUE obj)
|
|
|
|
{
|
|
|
|
VALUE tmp;
|
|
|
|
|
|
|
|
tmp = rb_funcall(obj, ossl_s_to_der, 0);
|
|
|
|
StringValue(tmp);
|
|
|
|
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
|
|
|
|
VALUE
|
|
|
|
ossl_to_der_if_possible(VALUE obj)
|
|
|
|
{
|
|
|
|
if(rb_respond_to(obj, ossl_s_to_der))
|
|
|
|
return ossl_to_der(obj);
|
|
|
|
return obj;
|
|
|
|
}
|
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
/*
|
|
|
|
* Errors
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ossl_raise(VALUE exc, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
const char *msg;
|
2005-10-31 20:52:13 -05:00
|
|
|
long e;
|
2003-07-23 12:12:24 -04:00
|
|
|
int len = 0;
|
|
|
|
|
2005-10-31 20:52:13 -05:00
|
|
|
#ifdef HAVE_ERR_PEEK_LAST_ERROR
|
|
|
|
e = ERR_peek_last_error();
|
|
|
|
#else
|
|
|
|
e = ERR_peek_error();
|
|
|
|
#endif
|
2003-07-23 12:12:24 -04:00
|
|
|
if (fmt) {
|
|
|
|
va_start(args, fmt);
|
|
|
|
len = vsnprintf(buf, BUFSIZ, fmt, args);
|
|
|
|
va_end(args);
|
|
|
|
}
|
2004-12-14 00:05:17 -05:00
|
|
|
if (len < BUFSIZ && e) {
|
2003-07-23 12:12:24 -04:00
|
|
|
if (dOSSL == Qtrue) /* FULL INFO */
|
|
|
|
msg = ERR_error_string(e, NULL);
|
|
|
|
else
|
|
|
|
msg = ERR_reason_error_string(e);
|
2004-12-16 04:39:54 -05:00
|
|
|
fmt = len ? ": %s" : "%s";
|
|
|
|
len += snprintf(buf+len, BUFSIZ-len, fmt, msg);
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
2005-08-07 16:21:40 -04:00
|
|
|
if (dOSSL == Qtrue){ /* show all errors on the stack */
|
|
|
|
while ((e = ERR_get_error()) != 0){
|
|
|
|
rb_warn("error on stack: %s", ERR_error_string(e, NULL));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ERR_clear_error();
|
2003-07-23 12:12:24 -04:00
|
|
|
|
2004-12-14 00:05:17 -05:00
|
|
|
if(len > BUFSIZ) len = strlen(buf);
|
2003-07-23 12:12:24 -04:00
|
|
|
rb_exc_raise(rb_exc_new(exc, buf, len));
|
|
|
|
}
|
|
|
|
|
2007-04-02 15:00:23 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* OpenSSL.errors -> [String...]
|
|
|
|
*
|
|
|
|
* See any remaining errors held in queue.
|
|
|
|
*
|
|
|
|
* Any errors you see here are probably due to a bug in ruby's OpenSSL implementation.
|
|
|
|
*/
|
2005-08-07 16:21:40 -04:00
|
|
|
VALUE
|
|
|
|
ossl_get_errors()
|
|
|
|
{
|
|
|
|
VALUE ary;
|
|
|
|
long e;
|
|
|
|
|
|
|
|
ary = rb_ary_new();
|
|
|
|
while ((e = ERR_get_error()) != 0){
|
|
|
|
rb_ary_push(ary, rb_str_new2(ERR_error_string(e, NULL)));
|
|
|
|
}
|
|
|
|
|
|
|
|
return ary;
|
|
|
|
}
|
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
/*
|
|
|
|
* Debug
|
|
|
|
*/
|
|
|
|
VALUE dOSSL;
|
|
|
|
|
2003-07-25 16:40:57 -04:00
|
|
|
#if !defined(HAVE_VA_ARGS_MACRO)
|
|
|
|
void
|
|
|
|
ossl_debug(const char *fmt, ...)
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
if (dOSSL == Qtrue) {
|
|
|
|
fprintf(stderr, "OSSL_DEBUG: ");
|
|
|
|
va_start(args, fmt);
|
|
|
|
vfprintf(stderr, fmt, args);
|
|
|
|
va_end(args);
|
|
|
|
fprintf(stderr, " [CONTEXT N/A]\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-04-02 15:00:23 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* OpenSSL.debug -> true | false
|
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
|
|
|
ossl_debug_get(VALUE self)
|
|
|
|
{
|
|
|
|
return dOSSL;
|
|
|
|
}
|
|
|
|
|
2007-04-02 15:00:23 -04:00
|
|
|
/*
|
|
|
|
* call-seq:
|
|
|
|
* OpenSSL.debug = boolean -> boolean
|
|
|
|
*
|
|
|
|
* Turns on or off CRYPTO_MEM_CHECK.
|
|
|
|
* Also shows some debugging message on stderr.
|
|
|
|
*/
|
2003-07-23 12:12:24 -04:00
|
|
|
static VALUE
|
|
|
|
ossl_debug_set(VALUE self, VALUE val)
|
|
|
|
{
|
|
|
|
VALUE old = dOSSL;
|
|
|
|
dOSSL = val;
|
|
|
|
|
|
|
|
if (old != dOSSL) {
|
|
|
|
if (dOSSL == Qtrue) {
|
|
|
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
|
|
|
fprintf(stderr, "OSSL_DEBUG: IS NOW ON!\n");
|
|
|
|
} else if (old == Qtrue) {
|
|
|
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_OFF);
|
|
|
|
fprintf(stderr, "OSSL_DEBUG: IS NOW OFF!\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* OSSL library init
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
Init_openssl()
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Init timezone info
|
|
|
|
*/
|
|
|
|
#if 0
|
|
|
|
tzset();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Init all digests, ciphers
|
|
|
|
*/
|
|
|
|
/* CRYPTO_malloc_init(); */
|
|
|
|
/* ENGINE_load_builtin_engines(); */
|
2005-10-11 23:56:04 -04:00
|
|
|
OpenSSL_add_ssl_algorithms();
|
2003-07-23 12:12:24 -04:00
|
|
|
OpenSSL_add_all_algorithms();
|
|
|
|
ERR_load_crypto_strings();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
|
|
|
|
/*
|
|
|
|
* FIXME:
|
|
|
|
* On unload do:
|
|
|
|
*/
|
|
|
|
#if 0
|
|
|
|
CONF_modules_unload(1);
|
|
|
|
destroy_ui_method();
|
|
|
|
EVP_cleanup();
|
|
|
|
ENGINE_cleanup();
|
|
|
|
CRYPTO_cleanup_all_ex_data();
|
|
|
|
ERR_remove_state(0);
|
|
|
|
ERR_free_strings();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Init main module
|
|
|
|
*/
|
|
|
|
mOSSL = rb_define_module("OpenSSL");
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Constants
|
|
|
|
*/
|
|
|
|
rb_define_const(mOSSL, "VERSION", rb_str_new2(OSSL_VERSION));
|
|
|
|
rb_define_const(mOSSL, "OPENSSL_VERSION", rb_str_new2(OPENSSL_VERSION_TEXT));
|
|
|
|
rb_define_const(mOSSL, "OPENSSL_VERSION_NUMBER", INT2NUM(OPENSSL_VERSION_NUMBER));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Generic error,
|
|
|
|
* common for all classes under OpenSSL module
|
|
|
|
*/
|
|
|
|
eOSSLError = rb_define_class_under(mOSSL,"OpenSSLError",rb_eStandardError);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Verify callback Proc index for ext-data
|
|
|
|
*/
|
2008-07-22 11:34:23 -04:00
|
|
|
if ((ossl_verify_cb_idx = X509_STORE_CTX_get_ex_new_index(0, (void *)"ossl_verify_cb_idx", 0, 0, 0)) < 0)
|
2007-04-02 15:00:23 -04:00
|
|
|
ossl_raise(eOSSLError, "X509_STORE_CTX_get_ex_new_index");
|
2003-07-23 12:12:24 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Init debug core
|
|
|
|
*/
|
|
|
|
dOSSL = Qfalse;
|
|
|
|
rb_define_module_function(mOSSL, "debug", ossl_debug_get, 0);
|
|
|
|
rb_define_module_function(mOSSL, "debug=", ossl_debug_set, 1);
|
2005-08-07 16:21:40 -04:00
|
|
|
rb_define_module_function(mOSSL, "errors", ossl_get_errors, 0);
|
2003-07-23 12:12:24 -04:00
|
|
|
|
2003-09-17 05:05:02 -04:00
|
|
|
/*
|
|
|
|
* Get ID of to_der
|
|
|
|
*/
|
|
|
|
ossl_s_to_der = rb_intern("to_der");
|
|
|
|
|
2003-07-23 12:12:24 -04:00
|
|
|
/*
|
|
|
|
* Init components
|
|
|
|
*/
|
|
|
|
Init_ossl_bn();
|
|
|
|
Init_ossl_cipher();
|
|
|
|
Init_ossl_config();
|
|
|
|
Init_ossl_digest();
|
|
|
|
Init_ossl_hmac();
|
|
|
|
Init_ossl_ns_spki();
|
2003-12-11 07:29:08 -05:00
|
|
|
Init_ossl_pkcs12();
|
2003-07-23 12:12:24 -04:00
|
|
|
Init_ossl_pkcs7();
|
2007-04-05 01:59:22 -04:00
|
|
|
Init_ossl_pkcs5();
|
2003-07-23 12:12:24 -04:00
|
|
|
Init_ossl_pkey();
|
|
|
|
Init_ossl_rand();
|
|
|
|
Init_ossl_ssl();
|
|
|
|
Init_ossl_x509();
|
|
|
|
Init_ossl_ocsp();
|
2003-10-02 04:47:11 -04:00
|
|
|
Init_ossl_engine();
|
2003-10-03 04:58:01 -04:00
|
|
|
Init_ossl_asn1();
|
2003-07-23 12:12:24 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(OSSL_DEBUG)
|
|
|
|
/*
|
|
|
|
* Check if all symbols are OK with 'make LDSHARED=gcc all'
|
|
|
|
*/
|
|
|
|
int
|
2008-08-09 19:15:08 -04:00
|
|
|
main(int argc, char *argv[])
|
2003-07-23 12:12:24 -04:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif /* OSSL_DEBUG */
|
|
|
|
|