OLD | NEW |
| (Empty) |
1 /* crypto/bio/bss_conn.c */ | |
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
3 * All rights reserved. | |
4 * | |
5 * This package is an SSL implementation written | |
6 * by Eric Young (eay@cryptsoft.com). | |
7 * The implementation was written so as to conform with Netscapes SSL. | |
8 * | |
9 * This library is free for commercial and non-commercial use as long as | |
10 * the following conditions are aheared to. The following conditions | |
11 * apply to all code found in this distribution, be it the RC4, RSA, | |
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 * included with this distribution is covered by the same copyright terms | |
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 * | |
16 * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 * the code are not to be removed. | |
18 * If this package is used in a product, Eric Young should be given attribution | |
19 * as the author of the parts of the library used. | |
20 * This can be in the form of a textual message at program startup or | |
21 * in documentation (online or textual) provided with the package. | |
22 * | |
23 * Redistribution and use in source and binary forms, with or without | |
24 * modification, are permitted provided that the following conditions | |
25 * are met: | |
26 * 1. Redistributions of source code must retain the copyright | |
27 * notice, this list of conditions and the following disclaimer. | |
28 * 2. Redistributions in binary form must reproduce the above copyright | |
29 * notice, this list of conditions and the following disclaimer in the | |
30 * documentation and/or other materials provided with the distribution. | |
31 * 3. All advertising materials mentioning features or use of this software | |
32 * must display the following acknowledgement: | |
33 * "This product includes cryptographic software written by | |
34 * Eric Young (eay@cryptsoft.com)" | |
35 * The word 'cryptographic' can be left out if the rouines from the library | |
36 * being used are not cryptographic related :-). | |
37 * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 * the apps directory (application code) you must include an acknowledgement: | |
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 * | |
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 * SUCH DAMAGE. | |
52 * | |
53 * The licence and distribution terms for any publically available version or | |
54 * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 * copied and put under another distribution licence | |
56 * [including the GNU Public Licence.] | |
57 */ | |
58 | |
59 #include <stdio.h> | |
60 #include <errno.h> | |
61 #define USE_SOCKETS | |
62 #include "cryptlib.h" | |
63 #include <openssl/bio.h> | |
64 | |
65 #ifndef OPENSSL_NO_SOCK | |
66 | |
67 #ifdef OPENSSL_SYS_WIN16 | |
68 #define SOCKET_PROTOCOL 0 /* more microsoft stupidity */ | |
69 #else | |
70 #define SOCKET_PROTOCOL IPPROTO_TCP | |
71 #endif | |
72 | |
73 #if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000) | |
74 /* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */ | |
75 #undef FIONBIO | |
76 #endif | |
77 | |
78 | |
79 typedef struct bio_connect_st | |
80 { | |
81 int state; | |
82 | |
83 char *param_hostname; | |
84 char *param_port; | |
85 int nbio; | |
86 | |
87 unsigned char ip[4]; | |
88 unsigned short port; | |
89 | |
90 struct sockaddr_in them; | |
91 | |
92 /* int socket; this will be kept in bio->num so that it is | |
93 * compatible with the bss_sock bio */ | |
94 | |
95 /* called when the connection is initially made | |
96 * callback(BIO,state,ret); The callback should return | |
97 * 'ret'. state is for compatibility with the ssl info_callback */ | |
98 int (*info_callback)(const BIO *bio,int state,int ret); | |
99 } BIO_CONNECT; | |
100 | |
101 static int conn_write(BIO *h, const char *buf, int num); | |
102 static int conn_read(BIO *h, char *buf, int size); | |
103 static int conn_puts(BIO *h, const char *str); | |
104 static long conn_ctrl(BIO *h, int cmd, long arg1, void *arg2); | |
105 static int conn_new(BIO *h); | |
106 static int conn_free(BIO *data); | |
107 static long conn_callback_ctrl(BIO *h, int cmd, bio_info_cb *); | |
108 | |
109 static int conn_state(BIO *b, BIO_CONNECT *c); | |
110 static void conn_close_socket(BIO *data); | |
111 BIO_CONNECT *BIO_CONNECT_new(void ); | |
112 void BIO_CONNECT_free(BIO_CONNECT *a); | |
113 | |
114 static BIO_METHOD methods_connectp= | |
115 { | |
116 BIO_TYPE_CONNECT, | |
117 "socket connect", | |
118 conn_write, | |
119 conn_read, | |
120 conn_puts, | |
121 NULL, /* connect_gets, */ | |
122 conn_ctrl, | |
123 conn_new, | |
124 conn_free, | |
125 conn_callback_ctrl, | |
126 }; | |
127 | |
128 static int conn_state(BIO *b, BIO_CONNECT *c) | |
129 { | |
130 int ret= -1,i; | |
131 unsigned long l; | |
132 char *p,*q; | |
133 int (*cb)(const BIO *,int,int)=NULL; | |
134 | |
135 if (c->info_callback != NULL) | |
136 cb=c->info_callback; | |
137 | |
138 for (;;) | |
139 { | |
140 switch (c->state) | |
141 { | |
142 case BIO_CONN_S_BEFORE: | |
143 p=c->param_hostname; | |
144 if (p == NULL) | |
145 { | |
146 BIOerr(BIO_F_CONN_STATE,BIO_R_NO_HOSTNAME_SPECIF
IED); | |
147 goto exit_loop; | |
148 } | |
149 for ( ; *p != '\0'; p++) | |
150 { | |
151 if ((*p == ':') || (*p == '/')) break; | |
152 } | |
153 | |
154 i= *p; | |
155 if ((i == ':') || (i == '/')) | |
156 { | |
157 | |
158 *(p++)='\0'; | |
159 if (i == ':') | |
160 { | |
161 for (q=p; *q; q++) | |
162 if (*q == '/') | |
163 { | |
164 *q='\0'; | |
165 break; | |
166 } | |
167 if (c->param_port != NULL) | |
168 OPENSSL_free(c->param_port); | |
169 c->param_port=BUF_strdup(p); | |
170 } | |
171 } | |
172 | |
173 if (c->param_port == NULL) | |
174 { | |
175 BIOerr(BIO_F_CONN_STATE,BIO_R_NO_PORT_SPECIFIED)
; | |
176 ERR_add_error_data(2,"host=",c->param_hostname); | |
177 goto exit_loop; | |
178 } | |
179 c->state=BIO_CONN_S_GET_IP; | |
180 break; | |
181 | |
182 case BIO_CONN_S_GET_IP: | |
183 if (BIO_get_host_ip(c->param_hostname,&(c->ip[0])) <= 0) | |
184 goto exit_loop; | |
185 c->state=BIO_CONN_S_GET_PORT; | |
186 break; | |
187 | |
188 case BIO_CONN_S_GET_PORT: | |
189 if (c->param_port == NULL) | |
190 { | |
191 /* abort(); */ | |
192 goto exit_loop; | |
193 } | |
194 else if (BIO_get_port(c->param_port,&c->port) <= 0) | |
195 goto exit_loop; | |
196 c->state=BIO_CONN_S_CREATE_SOCKET; | |
197 break; | |
198 | |
199 case BIO_CONN_S_CREATE_SOCKET: | |
200 /* now setup address */ | |
201 memset((char *)&c->them,0,sizeof(c->them)); | |
202 c->them.sin_family=AF_INET; | |
203 c->them.sin_port=htons((unsigned short)c->port); | |
204 l=(unsigned long) | |
205 ((unsigned long)c->ip[0]<<24L)| | |
206 ((unsigned long)c->ip[1]<<16L)| | |
207 ((unsigned long)c->ip[2]<< 8L)| | |
208 ((unsigned long)c->ip[3]); | |
209 c->them.sin_addr.s_addr=htonl(l); | |
210 c->state=BIO_CONN_S_CREATE_SOCKET; | |
211 | |
212 ret=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL); | |
213 if (ret == INVALID_SOCKET) | |
214 { | |
215 SYSerr(SYS_F_SOCKET,get_last_socket_error()); | |
216 ERR_add_error_data(4,"host=",c->param_hostname, | |
217 ":",c->param_port); | |
218 BIOerr(BIO_F_CONN_STATE,BIO_R_UNABLE_TO_CREATE_S
OCKET); | |
219 goto exit_loop; | |
220 } | |
221 b->num=ret; | |
222 c->state=BIO_CONN_S_NBIO; | |
223 break; | |
224 | |
225 case BIO_CONN_S_NBIO: | |
226 if (c->nbio) | |
227 { | |
228 if (!BIO_socket_nbio(b->num,1)) | |
229 { | |
230 BIOerr(BIO_F_CONN_STATE,BIO_R_ERROR_SETT
ING_NBIO); | |
231 ERR_add_error_data(4,"host=", | |
232 c->param_hostname, | |
233 ":",c->param_port); | |
234 goto exit_loop; | |
235 } | |
236 } | |
237 c->state=BIO_CONN_S_CONNECT; | |
238 | |
239 #if defined(SO_KEEPALIVE) && !defined(OPENSSL_SYS_MPE) | |
240 i=1; | |
241 i=setsockopt(b->num,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,s
izeof(i)); | |
242 if (i < 0) | |
243 { | |
244 SYSerr(SYS_F_SOCKET,get_last_socket_error()); | |
245 ERR_add_error_data(4,"host=",c->param_hostname, | |
246 ":",c->param_port); | |
247 BIOerr(BIO_F_CONN_STATE,BIO_R_KEEPALIVE); | |
248 goto exit_loop; | |
249 } | |
250 #endif | |
251 break; | |
252 | |
253 case BIO_CONN_S_CONNECT: | |
254 BIO_clear_retry_flags(b); | |
255 ret=connect(b->num, | |
256 (struct sockaddr *)&c->them, | |
257 sizeof(c->them)); | |
258 b->retry_reason=0; | |
259 if (ret < 0) | |
260 { | |
261 if (BIO_sock_should_retry(ret)) | |
262 { | |
263 BIO_set_retry_special(b); | |
264 c->state=BIO_CONN_S_BLOCKED_CONNECT; | |
265 b->retry_reason=BIO_RR_CONNECT; | |
266 } | |
267 else | |
268 { | |
269 SYSerr(SYS_F_CONNECT,get_last_socket_err
or()); | |
270 ERR_add_error_data(4,"host=", | |
271 c->param_hostname, | |
272 ":",c->param_port); | |
273 BIOerr(BIO_F_CONN_STATE,BIO_R_CONNECT_ER
ROR); | |
274 } | |
275 goto exit_loop; | |
276 } | |
277 else | |
278 c->state=BIO_CONN_S_OK; | |
279 break; | |
280 | |
281 case BIO_CONN_S_BLOCKED_CONNECT: | |
282 i=BIO_sock_error(b->num); | |
283 if (i) | |
284 { | |
285 BIO_clear_retry_flags(b); | |
286 SYSerr(SYS_F_CONNECT,i); | |
287 ERR_add_error_data(4,"host=", | |
288 c->param_hostname, | |
289 ":",c->param_port); | |
290 BIOerr(BIO_F_CONN_STATE,BIO_R_NBIO_CONNECT_ERROR
); | |
291 ret=0; | |
292 goto exit_loop; | |
293 } | |
294 else | |
295 c->state=BIO_CONN_S_OK; | |
296 break; | |
297 | |
298 case BIO_CONN_S_OK: | |
299 ret=1; | |
300 goto exit_loop; | |
301 default: | |
302 /* abort(); */ | |
303 goto exit_loop; | |
304 } | |
305 | |
306 if (cb != NULL) | |
307 { | |
308 if (!(ret=cb((BIO *)b,c->state,ret))) | |
309 goto end; | |
310 } | |
311 } | |
312 | |
313 /* Loop does not exit */ | |
314 exit_loop: | |
315 if (cb != NULL) | |
316 ret=cb((BIO *)b,c->state,ret); | |
317 end: | |
318 return(ret); | |
319 } | |
320 | |
321 BIO_CONNECT *BIO_CONNECT_new(void) | |
322 { | |
323 BIO_CONNECT *ret; | |
324 | |
325 if ((ret=(BIO_CONNECT *)OPENSSL_malloc(sizeof(BIO_CONNECT))) == NULL) | |
326 return(NULL); | |
327 ret->state=BIO_CONN_S_BEFORE; | |
328 ret->param_hostname=NULL; | |
329 ret->param_port=NULL; | |
330 ret->info_callback=NULL; | |
331 ret->nbio=0; | |
332 ret->ip[0]=0; | |
333 ret->ip[1]=0; | |
334 ret->ip[2]=0; | |
335 ret->ip[3]=0; | |
336 ret->port=0; | |
337 memset((char *)&ret->them,0,sizeof(ret->them)); | |
338 return(ret); | |
339 } | |
340 | |
341 void BIO_CONNECT_free(BIO_CONNECT *a) | |
342 { | |
343 if(a == NULL) | |
344 return; | |
345 | |
346 if (a->param_hostname != NULL) | |
347 OPENSSL_free(a->param_hostname); | |
348 if (a->param_port != NULL) | |
349 OPENSSL_free(a->param_port); | |
350 OPENSSL_free(a); | |
351 } | |
352 | |
353 BIO_METHOD *BIO_s_connect(void) | |
354 { | |
355 return(&methods_connectp); | |
356 } | |
357 | |
358 static int conn_new(BIO *bi) | |
359 { | |
360 bi->init=0; | |
361 bi->num=INVALID_SOCKET; | |
362 bi->flags=0; | |
363 if ((bi->ptr=(char *)BIO_CONNECT_new()) == NULL) | |
364 return(0); | |
365 else | |
366 return(1); | |
367 } | |
368 | |
369 static void conn_close_socket(BIO *bio) | |
370 { | |
371 BIO_CONNECT *c; | |
372 | |
373 c=(BIO_CONNECT *)bio->ptr; | |
374 if (bio->num != INVALID_SOCKET) | |
375 { | |
376 /* Only do a shutdown if things were established */ | |
377 if (c->state == BIO_CONN_S_OK) | |
378 shutdown(bio->num,2); | |
379 closesocket(bio->num); | |
380 bio->num=INVALID_SOCKET; | |
381 } | |
382 } | |
383 | |
384 static int conn_free(BIO *a) | |
385 { | |
386 BIO_CONNECT *data; | |
387 | |
388 if (a == NULL) return(0); | |
389 data=(BIO_CONNECT *)a->ptr; | |
390 | |
391 if (a->shutdown) | |
392 { | |
393 conn_close_socket(a); | |
394 BIO_CONNECT_free(data); | |
395 a->ptr=NULL; | |
396 a->flags=0; | |
397 a->init=0; | |
398 } | |
399 return(1); | |
400 } | |
401 | |
402 static int conn_read(BIO *b, char *out, int outl) | |
403 { | |
404 int ret=0; | |
405 BIO_CONNECT *data; | |
406 | |
407 data=(BIO_CONNECT *)b->ptr; | |
408 if (data->state != BIO_CONN_S_OK) | |
409 { | |
410 ret=conn_state(b,data); | |
411 if (ret <= 0) | |
412 return(ret); | |
413 } | |
414 | |
415 if (out != NULL) | |
416 { | |
417 clear_socket_error(); | |
418 ret=readsocket(b->num,out,outl); | |
419 BIO_clear_retry_flags(b); | |
420 if (ret <= 0) | |
421 { | |
422 if (BIO_sock_should_retry(ret)) | |
423 BIO_set_retry_read(b); | |
424 } | |
425 } | |
426 return(ret); | |
427 } | |
428 | |
429 static int conn_write(BIO *b, const char *in, int inl) | |
430 { | |
431 int ret; | |
432 BIO_CONNECT *data; | |
433 | |
434 data=(BIO_CONNECT *)b->ptr; | |
435 if (data->state != BIO_CONN_S_OK) | |
436 { | |
437 ret=conn_state(b,data); | |
438 if (ret <= 0) return(ret); | |
439 } | |
440 | |
441 clear_socket_error(); | |
442 ret=writesocket(b->num,in,inl); | |
443 BIO_clear_retry_flags(b); | |
444 if (ret <= 0) | |
445 { | |
446 if (BIO_sock_should_retry(ret)) | |
447 BIO_set_retry_write(b); | |
448 } | |
449 return(ret); | |
450 } | |
451 | |
452 static long conn_ctrl(BIO *b, int cmd, long num, void *ptr) | |
453 { | |
454 BIO *dbio; | |
455 int *ip; | |
456 const char **pptr; | |
457 long ret=1; | |
458 BIO_CONNECT *data; | |
459 | |
460 data=(BIO_CONNECT *)b->ptr; | |
461 | |
462 switch (cmd) | |
463 { | |
464 case BIO_CTRL_RESET: | |
465 ret=0; | |
466 data->state=BIO_CONN_S_BEFORE; | |
467 conn_close_socket(b); | |
468 b->flags=0; | |
469 break; | |
470 case BIO_C_DO_STATE_MACHINE: | |
471 /* use this one to start the connection */ | |
472 if (data->state != BIO_CONN_S_OK) | |
473 ret=(long)conn_state(b,data); | |
474 else | |
475 ret=1; | |
476 break; | |
477 case BIO_C_GET_CONNECT: | |
478 if (ptr != NULL) | |
479 { | |
480 pptr=(const char **)ptr; | |
481 if (num == 0) | |
482 { | |
483 *pptr=data->param_hostname; | |
484 | |
485 } | |
486 else if (num == 1) | |
487 { | |
488 *pptr=data->param_port; | |
489 } | |
490 else if (num == 2) | |
491 { | |
492 *pptr= (char *)&(data->ip[0]); | |
493 } | |
494 else if (num == 3) | |
495 { | |
496 *((int *)ptr)=data->port; | |
497 } | |
498 if ((!b->init) || (ptr == NULL)) | |
499 *pptr="not initialized"; | |
500 ret=1; | |
501 } | |
502 break; | |
503 case BIO_C_SET_CONNECT: | |
504 if (ptr != NULL) | |
505 { | |
506 b->init=1; | |
507 if (num == 0) | |
508 { | |
509 if (data->param_hostname != NULL) | |
510 OPENSSL_free(data->param_hostname); | |
511 data->param_hostname=BUF_strdup(ptr); | |
512 } | |
513 else if (num == 1) | |
514 { | |
515 if (data->param_port != NULL) | |
516 OPENSSL_free(data->param_port); | |
517 data->param_port=BUF_strdup(ptr); | |
518 } | |
519 else if (num == 2) | |
520 { | |
521 char buf[16]; | |
522 unsigned char *p = ptr; | |
523 | |
524 BIO_snprintf(buf,sizeof buf,"%d.%d.%d.%d", | |
525 p[0],p[1],p[2],p[3]); | |
526 if (data->param_hostname != NULL) | |
527 OPENSSL_free(data->param_hostname); | |
528 data->param_hostname=BUF_strdup(buf); | |
529 memcpy(&(data->ip[0]),ptr,4); | |
530 } | |
531 else if (num == 3) | |
532 { | |
533 char buf[DECIMAL_SIZE(int)+1]; | |
534 | |
535 BIO_snprintf(buf,sizeof buf,"%d",*(int *)ptr); | |
536 if (data->param_port != NULL) | |
537 OPENSSL_free(data->param_port); | |
538 data->param_port=BUF_strdup(buf); | |
539 data->port= *(int *)ptr; | |
540 } | |
541 } | |
542 break; | |
543 case BIO_C_SET_NBIO: | |
544 data->nbio=(int)num; | |
545 break; | |
546 case BIO_C_GET_FD: | |
547 if (b->init) | |
548 { | |
549 ip=(int *)ptr; | |
550 if (ip != NULL) | |
551 *ip=b->num; | |
552 ret=b->num; | |
553 } | |
554 else | |
555 ret= -1; | |
556 break; | |
557 case BIO_CTRL_GET_CLOSE: | |
558 ret=b->shutdown; | |
559 break; | |
560 case BIO_CTRL_SET_CLOSE: | |
561 b->shutdown=(int)num; | |
562 break; | |
563 case BIO_CTRL_PENDING: | |
564 case BIO_CTRL_WPENDING: | |
565 ret=0; | |
566 break; | |
567 case BIO_CTRL_FLUSH: | |
568 break; | |
569 case BIO_CTRL_DUP: | |
570 { | |
571 dbio=(BIO *)ptr; | |
572 if (data->param_port) | |
573 BIO_set_conn_port(dbio,data->param_port); | |
574 if (data->param_hostname) | |
575 BIO_set_conn_hostname(dbio,data->param_hostname); | |
576 BIO_set_nbio(dbio,data->nbio); | |
577 /* FIXME: the cast of the function seems unlikely to be a good i
dea */ | |
578 (void)BIO_set_info_callback(dbio,(bio_info_cb *)data->info_callb
ack); | |
579 } | |
580 break; | |
581 case BIO_CTRL_SET_CALLBACK: | |
582 { | |
583 #if 0 /* FIXME: Should this be used? -- Richard Levitte */ | |
584 BIOerr(BIO_F_CONN_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | |
585 ret = -1; | |
586 #else | |
587 ret=0; | |
588 #endif | |
589 } | |
590 break; | |
591 case BIO_CTRL_GET_CALLBACK: | |
592 { | |
593 int (**fptr)(const BIO *bio,int state,int xret); | |
594 | |
595 fptr=(int (**)(const BIO *bio,int state,int xret))ptr; | |
596 *fptr=data->info_callback; | |
597 } | |
598 break; | |
599 default: | |
600 ret=0; | |
601 break; | |
602 } | |
603 return(ret); | |
604 } | |
605 | |
606 static long conn_callback_ctrl(BIO *b, int cmd, bio_info_cb *fp) | |
607 { | |
608 long ret=1; | |
609 BIO_CONNECT *data; | |
610 | |
611 data=(BIO_CONNECT *)b->ptr; | |
612 | |
613 switch (cmd) | |
614 { | |
615 case BIO_CTRL_SET_CALLBACK: | |
616 { | |
617 data->info_callback=(int (*)(const struct bio_st *, int, int))fp
; | |
618 } | |
619 break; | |
620 default: | |
621 ret=0; | |
622 break; | |
623 } | |
624 return(ret); | |
625 } | |
626 | |
627 static int conn_puts(BIO *bp, const char *str) | |
628 { | |
629 int n,ret; | |
630 | |
631 n=strlen(str); | |
632 ret=conn_write(bp,str,n); | |
633 return(ret); | |
634 } | |
635 | |
636 BIO *BIO_new_connect(char *str) | |
637 { | |
638 BIO *ret; | |
639 | |
640 ret=BIO_new(BIO_s_connect()); | |
641 if (ret == NULL) return(NULL); | |
642 if (BIO_set_conn_hostname(ret,str)) | |
643 return(ret); | |
644 else | |
645 { | |
646 BIO_free(ret); | |
647 return(NULL); | |
648 } | |
649 } | |
650 | |
651 #endif | |
652 | |
OLD | NEW |