6fbf66fa |
/*
* Copyright (c) 2004 Peter 'Luna' Runestig <peter@runestig.com>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without modifi-
* cation, are permitted provided that the following conditions are met:
*
* o Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* o Redistributions in binary form must reproduce the above copyright no-
* tice, this list of conditions and the following disclaimer in the do-
* cumentation and/or other materials provided with the distribution.
*
* o The names of the contributors may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LI-
* ABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUEN-
* TIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
* ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABI-
* LITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
* THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/ |
1bda73a7 |
|
c110b289 |
#ifdef HAVE_CONFIG_H
#include "config.h"
#elif defined(_MSC_VER)
#include "config-msvc.h"
#endif
|
1bda73a7 |
#include "syshead.h"
|
93c22ecc |
#ifdef ENABLE_CRYPTOAPI |
1bda73a7 |
#include <openssl/ssl.h>
#include <openssl/err.h> |
6fbf66fa |
#include <windows.h>
#include <wincrypt.h>
#include <stdio.h>
#include <ctype.h>
#include <assert.h>
|
ddc7692d |
#include "buffer.h" |
862cbe53 |
#include "openssl_compat.h" |
ddc7692d |
|
14a382a3 |
/* MinGW w32api 3.17 is still incomplete when it comes to CryptoAPI while
* MinGW32-w64 defines all macros used. This is a hack around that problem.
*/
#ifndef CERT_SYSTEM_STORE_LOCATION_SHIFT |
6fbf66fa |
#define CERT_SYSTEM_STORE_LOCATION_SHIFT 16 |
14a382a3 |
#endif
#ifndef CERT_SYSTEM_STORE_CURRENT_USER_ID |
6fbf66fa |
#define CERT_SYSTEM_STORE_CURRENT_USER_ID 1 |
14a382a3 |
#endif
#ifndef CERT_SYSTEM_STORE_CURRENT_USER |
6fbf66fa |
#define CERT_SYSTEM_STORE_CURRENT_USER (CERT_SYSTEM_STORE_CURRENT_USER_ID << CERT_SYSTEM_STORE_LOCATION_SHIFT) |
14a382a3 |
#endif
#ifndef CERT_STORE_READONLY_FLAG |
6fbf66fa |
#define CERT_STORE_READONLY_FLAG 0x00008000 |
14a382a3 |
#endif
#ifndef CERT_STORE_OPEN_EXISTING_FLAG |
6fbf66fa |
#define CERT_STORE_OPEN_EXISTING_FLAG 0x00004000
#endif
/* Size of an SSL signature: MD5+SHA1 */ |
81d882d5 |
#define SSL_SIG_LENGTH 36 |
6fbf66fa |
/* try to funnel any Windows/CryptoAPI error messages to OpenSSL ERR_... */ |
81d882d5 |
#define ERR_LIB_CRYPTOAPI (ERR_LIB_USER + 69) /* 69 is just a number... */ |
6fbf66fa |
#define CRYPTOAPIerr(f) err_put_ms_error(GetLastError(), (f), __FILE__, __LINE__) |
81d882d5 |
#define CRYPTOAPI_F_CERT_OPEN_SYSTEM_STORE 100
#define CRYPTOAPI_F_CERT_FIND_CERTIFICATE_IN_STORE 101 |
6fbf66fa |
#define CRYPTOAPI_F_CRYPT_ACQUIRE_CERTIFICATE_PRIVATE_KEY 102 |
81d882d5 |
#define CRYPTOAPI_F_CRYPT_CREATE_HASH 103
#define CRYPTOAPI_F_CRYPT_GET_HASH_PARAM 104
#define CRYPTOAPI_F_CRYPT_SET_HASH_PARAM 105
#define CRYPTOAPI_F_CRYPT_SIGN_HASH 106
#define CRYPTOAPI_F_LOAD_LIBRARY 107
#define CRYPTOAPI_F_GET_PROC_ADDRESS 108
static ERR_STRING_DATA CRYPTOAPI_str_functs[] = {
{ ERR_PACK(ERR_LIB_CRYPTOAPI, 0, 0), "microsoft cryptoapi"},
{ ERR_PACK(0, CRYPTOAPI_F_CERT_OPEN_SYSTEM_STORE, 0), "CertOpenSystemStore" },
{ ERR_PACK(0, CRYPTOAPI_F_CERT_FIND_CERTIFICATE_IN_STORE, 0), "CertFindCertificateInStore" }, |
6aa7fb8d |
{ ERR_PACK(0, CRYPTOAPI_F_CRYPT_ACQUIRE_CERTIFICATE_PRIVATE_KEY, 0), "CryptAcquireCertificatePrivateKey" }, |
81d882d5 |
{ ERR_PACK(0, CRYPTOAPI_F_CRYPT_CREATE_HASH, 0), "CryptCreateHash" },
{ ERR_PACK(0, CRYPTOAPI_F_CRYPT_GET_HASH_PARAM, 0), "CryptGetHashParam" },
{ ERR_PACK(0, CRYPTOAPI_F_CRYPT_SET_HASH_PARAM, 0), "CryptSetHashParam" },
{ ERR_PACK(0, CRYPTOAPI_F_CRYPT_SIGN_HASH, 0), "CryptSignHash" },
{ ERR_PACK(0, CRYPTOAPI_F_LOAD_LIBRARY, 0), "LoadLibrary" },
{ ERR_PACK(0, CRYPTOAPI_F_GET_PROC_ADDRESS, 0), "GetProcAddress" }, |
6fbf66fa |
{ 0, NULL }
};
typedef struct _CAPI_DATA {
const CERT_CONTEXT *cert_context;
HCRYPTPROV crypt_prov;
DWORD key_spec;
BOOL free_crypt_prov;
} CAPI_DATA;
|
81d882d5 |
static char *
ms_error_text(DWORD ms_err) |
6fbf66fa |
{
LPVOID lpMsgBuf = NULL;
char *rv = NULL;
FormatMessage( |
81d882d5 |
FORMAT_MESSAGE_ALLOCATE_BUFFER
|FORMAT_MESSAGE_FROM_SYSTEM
|FORMAT_MESSAGE_IGNORE_INSERTS,
NULL, ms_err,
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), /* Default language */
(LPTSTR) &lpMsgBuf, 0, NULL);
if (lpMsgBuf)
{
char *p;
rv = string_alloc(lpMsgBuf, NULL);
LocalFree(lpMsgBuf);
/* trim to the left */
if (rv)
{
for (p = rv + strlen(rv) - 1; p >= rv; p--) {
if (isspace(*p))
{
*p = '\0';
}
else
{
break;
}
}
} |
6fbf66fa |
}
return rv;
}
|
81d882d5 |
static void
err_put_ms_error(DWORD ms_err, int func, const char *file, int line) |
6fbf66fa |
{
static int init = 0; |
81d882d5 |
#define ERR_MAP_SZ 16 |
6fbf66fa |
static struct { |
81d882d5 |
int err;
DWORD ms_err; /* I don't think we get more than 16 *different* errors */ |
6fbf66fa |
} err_map[ERR_MAP_SZ]; /* in here, before we give up the whole thing... */
int i;
if (ms_err == 0) |
81d882d5 |
{
/* 0 is not an error */
return;
}
if (!init)
{
ERR_load_strings(ERR_LIB_CRYPTOAPI, CRYPTOAPI_str_functs);
memset(&err_map, 0, sizeof(err_map));
init++; |
6fbf66fa |
}
/* since MS error codes are 32 bit, and the ones in the ERR_... system is
* only 12, we must have a mapping table between them. */
for (i = 0; i < ERR_MAP_SZ; i++) { |
81d882d5 |
if (err_map[i].ms_err == ms_err)
{
ERR_PUT_error(ERR_LIB_CRYPTOAPI, func, err_map[i].err, file, line);
break;
}
else if (err_map[i].ms_err == 0)
{
/* end of table, add new entry */
ERR_STRING_DATA *esd = calloc(2, sizeof(*esd));
if (esd == NULL)
{
break;
}
err_map[i].ms_err = ms_err;
err_map[i].err = esd->error = i + 100;
esd->string = ms_error_text(ms_err);
check_malloc_return(esd->string);
ERR_load_strings(ERR_LIB_CRYPTOAPI, esd);
ERR_PUT_error(ERR_LIB_CRYPTOAPI, func, err_map[i].err, file, line);
break;
} |
6fbf66fa |
}
}
/* encrypt */ |
81d882d5 |
static int
rsa_pub_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) |
6fbf66fa |
{
/* I haven't been able to trigger this one, but I want to know if it happens... */
assert(0);
return 0;
}
/* verify arbitrary data */ |
81d882d5 |
static int
rsa_pub_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) |
6fbf66fa |
{
/* I haven't been able to trigger this one, but I want to know if it happens... */
assert(0);
return 0;
}
/* sign arbitrary data */ |
81d882d5 |
static int
rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) |
6fbf66fa |
{ |
862cbe53 |
CAPI_DATA *cd = (CAPI_DATA *) RSA_meth_get0_app_data(RSA_get_method(rsa)); |
6fbf66fa |
HCRYPTHASH hash;
DWORD hash_size, len, i;
unsigned char *buf;
|
81d882d5 |
if (cd == NULL)
{ |
862cbe53 |
RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, ERR_R_PASSED_NULL_PARAMETER); |
81d882d5 |
return 0; |
6fbf66fa |
} |
81d882d5 |
if (padding != RSA_PKCS1_PADDING)
{
/* AFAICS, CryptSignHash() *always* uses PKCS1 padding. */ |
862cbe53 |
RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE); |
81d882d5 |
return 0; |
6fbf66fa |
}
/* Unfortunately, there is no "CryptSign()" function in CryptoAPI, that would
* be way to straightforward for M$, I guess... So we have to do it this
* tricky way instead, by creating a "Hash", and load the already-made hash
* from 'from' into it. */
/* For now, we only support NID_md5_sha1 */ |
81d882d5 |
if (flen != SSL_SIG_LENGTH)
{ |
862cbe53 |
RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, RSA_R_INVALID_MESSAGE_LENGTH); |
81d882d5 |
return 0; |
6fbf66fa |
} |
81d882d5 |
if (!CryptCreateHash(cd->crypt_prov, CALG_SSL3_SHAMD5, 0, 0, &hash))
{
CRYPTOAPIerr(CRYPTOAPI_F_CRYPT_CREATE_HASH);
return 0; |
6fbf66fa |
}
len = sizeof(hash_size); |
81d882d5 |
if (!CryptGetHashParam(hash, HP_HASHSIZE, (BYTE *) &hash_size, &len, 0))
{
CRYPTOAPIerr(CRYPTOAPI_F_CRYPT_GET_HASH_PARAM); |
6fbf66fa |
CryptDestroyHash(hash); |
81d882d5 |
return 0; |
6fbf66fa |
} |
81d882d5 |
if ((int) hash_size != flen)
{ |
862cbe53 |
RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, RSA_R_INVALID_MESSAGE_LENGTH); |
6fbf66fa |
CryptDestroyHash(hash); |
81d882d5 |
return 0; |
6fbf66fa |
} |
81d882d5 |
if (!CryptSetHashParam(hash, HP_HASHVAL, (BYTE * ) from, 0))
{
CRYPTOAPIerr(CRYPTOAPI_F_CRYPT_SET_HASH_PARAM); |
6fbf66fa |
CryptDestroyHash(hash); |
81d882d5 |
return 0; |
6fbf66fa |
}
len = RSA_size(rsa);
buf = malloc(len); |
81d882d5 |
if (buf == NULL)
{ |
862cbe53 |
RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, ERR_R_MALLOC_FAILURE); |
6fbf66fa |
CryptDestroyHash(hash); |
81d882d5 |
return 0; |
6fbf66fa |
} |
81d882d5 |
if (!CryptSignHash(hash, cd->key_spec, NULL, 0, buf, &len))
{
CRYPTOAPIerr(CRYPTOAPI_F_CRYPT_SIGN_HASH); |
6fbf66fa |
CryptDestroyHash(hash);
free(buf); |
81d882d5 |
return 0; |
6fbf66fa |
}
/* and now, we have to reverse the byte-order in the result from CryptSignHash()... */
for (i = 0; i < len; i++) |
4cd4899e |
{ |
81d882d5 |
to[i] = buf[len - i - 1]; |
4cd4899e |
} |
6fbf66fa |
free(buf);
CryptDestroyHash(hash);
return len;
}
/* decrypt */ |
81d882d5 |
static int
rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) |
6fbf66fa |
{
/* I haven't been able to trigger this one, but I want to know if it happens... */
assert(0);
return 0;
}
/* called at RSA_new */ |
81d882d5 |
static int
init(RSA *rsa) |
6fbf66fa |
{
return 0;
}
/* called at RSA_free */ |
81d882d5 |
static int
finish(RSA *rsa) |
6fbf66fa |
{ |
862cbe53 |
const RSA_METHOD *rsa_meth = RSA_get_method(rsa);
CAPI_DATA *cd = (CAPI_DATA *) RSA_meth_get0_app_data(rsa_meth); |
6fbf66fa |
if (cd == NULL) |
81d882d5 |
{
return 0;
} |
6fbf66fa |
if (cd->crypt_prov && cd->free_crypt_prov) |
81d882d5 |
{
CryptReleaseContext(cd->crypt_prov, 0);
} |
6fbf66fa |
if (cd->cert_context) |
81d882d5 |
{
CertFreeCertificateContext(cd->cert_context);
} |
862cbe53 |
free(cd);
RSA_meth_free((RSA_METHOD*) rsa_meth); |
6fbf66fa |
return 1;
}
|
81d882d5 |
static const CERT_CONTEXT *
find_certificate_in_store(const char *cert_prop, HCERTSTORE cert_store) |
6fbf66fa |
{
/* Find, and use, the desired certificate from the store. The
* 'cert_prop' certificate search string can look like this:
* SUBJ:<certificate substring to match>
* THUMB:<certificate thumbprint hex value>, e.g.
* THUMB:f6 49 24 41 01 b4 fb 44 0c ce f4 36 ae d0 c4 c9 df 7a b6 28
*/
const CERT_CONTEXT *rv = NULL;
|
81d882d5 |
if (!strncmp(cert_prop, "SUBJ:", 5))
{
/* skip the tag */
cert_prop += 5;
rv = CertFindCertificateInStore(cert_store, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
0, CERT_FIND_SUBJECT_STR_A, cert_prop, NULL);
}
else if (!strncmp(cert_prop, "THUMB:", 6))
{
unsigned char hash[255];
char *p;
int i, x = 0;
CRYPT_HASH_BLOB blob;
/* skip the tag */
cert_prop += 6;
for (p = (char *) cert_prop, i = 0; *p && i < sizeof(hash); i++) {
if (*p >= '0' && *p <= '9')
{
x = (*p - '0') << 4;
}
else if (*p >= 'A' && *p <= 'F')
{
x = (*p - 'A' + 10) << 4;
}
else if (*p >= 'a' && *p <= 'f')
{
x = (*p - 'a' + 10) << 4;
}
if (!*++p) /* unexpected end of string */
{
break;
}
if (*p >= '0' && *p <= '9')
{
x += *p - '0';
}
else if (*p >= 'A' && *p <= 'F')
{
x += *p - 'A' + 10;
}
else if (*p >= 'a' && *p <= 'f')
{
x += *p - 'a' + 10;
}
hash[i] = x;
/* skip any space(s) between hex numbers */ |
4cd4899e |
for (p++; *p && *p == ' '; p++)
{
} |
81d882d5 |
}
blob.cbData = i;
blob.pbData = (unsigned char *) &hash;
rv = CertFindCertificateInStore(cert_store, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
0, CERT_FIND_HASH, &blob, NULL); |
6fbf66fa |
}
return rv;
}
|
81d882d5 |
int
SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const char *cert_prop) |
6fbf66fa |
{
HCERTSTORE cs;
X509 *cert = NULL;
RSA *rsa = NULL, *pub_rsa;
CAPI_DATA *cd = calloc(1, sizeof(*cd)); |
862cbe53 |
RSA_METHOD *my_rsa_method = NULL; |
6fbf66fa |
|
862cbe53 |
if (cd == NULL) |
81d882d5 |
{
SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE, ERR_R_MALLOC_FAILURE);
goto err; |
6fbf66fa |
}
/* search CURRENT_USER first, then LOCAL_MACHINE */ |
81d882d5 |
cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, CERT_SYSTEM_STORE_CURRENT_USER
|CERT_STORE_OPEN_EXISTING_FLAG | CERT_STORE_READONLY_FLAG, L"MY");
if (cs == NULL)
{
CRYPTOAPIerr(CRYPTOAPI_F_CERT_OPEN_SYSTEM_STORE);
goto err; |
6fbf66fa |
}
cd->cert_context = find_certificate_in_store(cert_prop, cs);
CertCloseStore(cs, 0); |
81d882d5 |
if (!cd->cert_context)
{
cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0, CERT_SYSTEM_STORE_LOCAL_MACHINE
|CERT_STORE_OPEN_EXISTING_FLAG | CERT_STORE_READONLY_FLAG, L"MY");
if (cs == NULL)
{
CRYPTOAPIerr(CRYPTOAPI_F_CERT_OPEN_SYSTEM_STORE);
goto err;
}
cd->cert_context = find_certificate_in_store(cert_prop, cs);
CertCloseStore(cs, 0);
if (cd->cert_context == NULL)
{
CRYPTOAPIerr(CRYPTOAPI_F_CERT_FIND_CERTIFICATE_IN_STORE);
goto err;
} |
6fbf66fa |
}
/* cert_context->pbCertEncoded is the cert X509 DER encoded. */ |
c373382c |
cert = d2i_X509(NULL, (const unsigned char **) &cd->cert_context->pbCertEncoded, |
81d882d5 |
cd->cert_context->cbCertEncoded);
if (cert == NULL)
{
SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE, ERR_R_ASN1_LIB);
goto err; |
6fbf66fa |
}
/* set up stuff to use the private key */ |
14a382a3 |
if (!CryptAcquireCertificatePrivateKey(cd->cert_context, CRYPT_ACQUIRE_COMPARE_KEY_FLAG, |
81d882d5 |
NULL, &cd->crypt_prov, &cd->key_spec, &cd->free_crypt_prov))
{
/* if we don't have a smart card reader here, and we try to access a
* smart card certificate, we get:
* "Error 1223: The operation was canceled by the user." */
CRYPTOAPIerr(CRYPTOAPI_F_CRYPT_ACQUIRE_CERTIFICATE_PRIVATE_KEY);
goto err; |
6fbf66fa |
}
/* here we don't need to do CryptGetUserKey() or anything; all necessary key
* info is in cd->cert_context, and then, in cd->crypt_prov. */
|
862cbe53 |
my_rsa_method = RSA_meth_new("Microsoft Cryptography API RSA Method",
RSA_METHOD_FLAG_NO_CHECK);
check_malloc_return(my_rsa_method);
RSA_meth_set_pub_enc(my_rsa_method, rsa_pub_enc);
RSA_meth_set_pub_dec(my_rsa_method, rsa_pub_dec);
RSA_meth_set_priv_enc(my_rsa_method, rsa_priv_enc);
RSA_meth_set_priv_dec(my_rsa_method, rsa_priv_dec);
RSA_meth_set_init(my_rsa_method, NULL);
RSA_meth_set_finish(my_rsa_method, finish);
RSA_meth_set0_app_data(my_rsa_method, cd); |
6fbf66fa |
rsa = RSA_new(); |
81d882d5 |
if (rsa == NULL)
{
SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE, ERR_R_MALLOC_FAILURE);
goto err; |
6fbf66fa |
}
|
862cbe53 |
/* Public key in cert is NULL until we call SSL_CTX_use_certificate(), |
6fbf66fa |
* so we do it here then... */
if (!SSL_CTX_use_certificate(ssl_ctx, cert)) |
81d882d5 |
{
goto err;
} |
6fbf66fa |
/* the public key */ |
862cbe53 |
EVP_PKEY *pkey = X509_get0_pubkey(cert);
|
6fbf66fa |
/* SSL_CTX_use_certificate() increased the reference count in 'cert', so
* we decrease it here with X509_free(), or it will never be cleaned up. */
X509_free(cert);
cert = NULL;
|
862cbe53 |
if (!(pub_rsa = EVP_PKEY_get0_RSA(pkey)))
{
msg(M_WARN, "cryptoapicert requires an RSA certificate");
goto err;
}
/* Our private key is external, so we fill in only n and e from the public key */
const BIGNUM *n = NULL;
const BIGNUM *e = NULL;
RSA_get0_key(pub_rsa, &n, &e, NULL);
if (!RSA_set0_key(rsa, BN_dup(n), BN_dup(e), NULL))
{
goto err;
}
RSA_set_flags(rsa, RSA_flags(rsa) | RSA_FLAG_EXT_PKEY); |
6fbf66fa |
if (!RSA_set_method(rsa, my_rsa_method)) |
81d882d5 |
{
goto err;
} |
6fbf66fa |
if (!SSL_CTX_use_RSAPrivateKey(ssl_ctx, rsa)) |
81d882d5 |
{
goto err;
} |
6fbf66fa |
/* SSL_CTX_use_RSAPrivateKey() increased the reference count in 'rsa', so |
81d882d5 |
* we decrease it here with RSA_free(), or it will never be cleaned up. */ |
6fbf66fa |
RSA_free(rsa);
return 1;
|
81d882d5 |
err: |
6fbf66fa |
if (cert) |
81d882d5 |
{
X509_free(cert);
} |
6fbf66fa |
if (rsa) |
81d882d5 |
{
RSA_free(rsa);
}
else
{
if (my_rsa_method)
{
free(my_rsa_method);
}
if (cd)
{
if (cd->free_crypt_prov && cd->crypt_prov)
{
CryptReleaseContext(cd->crypt_prov, 0);
}
if (cd->cert_context)
{
CertFreeCertificateContext(cd->cert_context);
}
free(cd);
} |
6fbf66fa |
}
return 0;
} |
1bda73a7 |
|
81d882d5 |
#else /* ifdef ENABLE_CRYPTOAPI */ |
eabb8eed |
#ifdef _MSC_VER /* Dummy function needed to avoid empty file compiler warning in Microsoft VC */ |
81d882d5 |
static void |
4cd4899e |
dummy(void)
{ |
81d882d5 |
} |
eabb8eed |
#endif |
81d882d5 |
#endif /* _WIN32 */ |