/work/auto_tests/crypto_test.c
Line | Count | Source |
1 | | #include <stdint.h> |
2 | | #include <stdlib.h> |
3 | | #include <string.h> |
4 | | |
5 | | #include "../testing/misc_tools.h" |
6 | | #include "../toxcore/crypto_core.h" |
7 | | #include "../toxcore/net_crypto.h" |
8 | | #include "check_compat.h" |
9 | | |
10 | | static void rand_bytes(const Random *rng, uint8_t *b, size_t blen) |
11 | 206 | { |
12 | 12.5k | for (size_t i = 0; i < blen; i++) { |
13 | 12.3k | b[i] = random_u08(rng); |
14 | 12.3k | } |
15 | 206 | } |
16 | | |
17 | | // These test vectors are from libsodium's test suite |
18 | | |
19 | | static const uint8_t alicesk[32] = { |
20 | | 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, |
21 | | 0x3c, 0x16, 0xc1, 0x72, 0x51, 0xb2, 0x66, 0x45, |
22 | | 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a, |
23 | | 0xb1, 0x77, 0xfb, 0xa5, 0x1d, 0xb9, 0x2c, 0x2a |
24 | | }; |
25 | | |
26 | | static const uint8_t bobpk[32] = { |
27 | | 0xde, 0x9e, 0xdb, 0x7d, 0x7b, 0x7d, 0xc1, 0xb4, |
28 | | 0xd3, 0x5b, 0x61, 0xc2, 0xec, 0xe4, 0x35, 0x37, |
29 | | 0x3f, 0x83, 0x43, 0xc8, 0x5b, 0x78, 0x67, 0x4d, |
30 | | 0xad, 0xfc, 0x7e, 0x14, 0x6f, 0x88, 0x2b, 0x4f |
31 | | }; |
32 | | |
33 | | static const uint8_t test_nonce[24] = { |
34 | | 0x69, 0x69, 0x6e, 0xe9, 0x55, 0xb6, 0x2b, 0x73, |
35 | | 0xcd, 0x62, 0xbd, 0xa8, 0x75, 0xfc, 0x73, 0xd6, |
36 | | 0x82, 0x19, 0xe0, 0x03, 0x6b, 0x7a, 0x0b, 0x37 |
37 | | }; |
38 | | |
39 | | static const uint8_t test_m[131] = { |
40 | | 0xbe, 0x07, 0x5f, 0xc5, 0x3c, 0x81, 0xf2, 0xd5, |
41 | | 0xcf, 0x14, 0x13, 0x16, 0xeb, 0xeb, 0x0c, 0x7b, |
42 | | 0x52, 0x28, 0xc5, 0x2a, 0x4c, 0x62, 0xcb, 0xd4, |
43 | | 0x4b, 0x66, 0x84, 0x9b, 0x64, 0x24, 0x4f, 0xfc, |
44 | | 0xe5, 0xec, 0xba, 0xaf, 0x33, 0xbd, 0x75, 0x1a, |
45 | | 0x1a, 0xc7, 0x28, 0xd4, 0x5e, 0x6c, 0x61, 0x29, |
46 | | 0x6c, 0xdc, 0x3c, 0x01, 0x23, 0x35, 0x61, 0xf4, |
47 | | 0x1d, 0xb6, 0x6c, 0xce, 0x31, 0x4a, 0xdb, 0x31, |
48 | | 0x0e, 0x3b, 0xe8, 0x25, 0x0c, 0x46, 0xf0, 0x6d, |
49 | | 0xce, 0xea, 0x3a, 0x7f, 0xa1, 0x34, 0x80, 0x57, |
50 | | 0xe2, 0xf6, 0x55, 0x6a, 0xd6, 0xb1, 0x31, 0x8a, |
51 | | 0x02, 0x4a, 0x83, 0x8f, 0x21, 0xaf, 0x1f, 0xde, |
52 | | 0x04, 0x89, 0x77, 0xeb, 0x48, 0xf5, 0x9f, 0xfd, |
53 | | 0x49, 0x24, 0xca, 0x1c, 0x60, 0x90, 0x2e, 0x52, |
54 | | 0xf0, 0xa0, 0x89, 0xbc, 0x76, 0x89, 0x70, 0x40, |
55 | | 0xe0, 0x82, 0xf9, 0x37, 0x76, 0x38, 0x48, 0x64, |
56 | | 0x5e, 0x07, 0x05 |
57 | | }; |
58 | | |
59 | | static const uint8_t test_c[147] = { |
60 | | 0xf3, 0xff, 0xc7, 0x70, 0x3f, 0x94, 0x00, 0xe5, |
61 | | 0x2a, 0x7d, 0xfb, 0x4b, 0x3d, 0x33, 0x05, 0xd9, |
62 | | 0x8e, 0x99, 0x3b, 0x9f, 0x48, 0x68, 0x12, 0x73, |
63 | | 0xc2, 0x96, 0x50, 0xba, 0x32, 0xfc, 0x76, 0xce, |
64 | | 0x48, 0x33, 0x2e, 0xa7, 0x16, 0x4d, 0x96, 0xa4, |
65 | | 0x47, 0x6f, 0xb8, 0xc5, 0x31, 0xa1, 0x18, 0x6a, |
66 | | 0xc0, 0xdf, 0xc1, 0x7c, 0x98, 0xdc, 0xe8, 0x7b, |
67 | | 0x4d, 0xa7, 0xf0, 0x11, 0xec, 0x48, 0xc9, 0x72, |
68 | | 0x71, 0xd2, 0xc2, 0x0f, 0x9b, 0x92, 0x8f, 0xe2, |
69 | | 0x27, 0x0d, 0x6f, 0xb8, 0x63, 0xd5, 0x17, 0x38, |
70 | | 0xb4, 0x8e, 0xee, 0xe3, 0x14, 0xa7, 0xcc, 0x8a, |
71 | | 0xb9, 0x32, 0x16, 0x45, 0x48, 0xe5, 0x26, 0xae, |
72 | | 0x90, 0x22, 0x43, 0x68, 0x51, 0x7a, 0xcf, 0xea, |
73 | | 0xbd, 0x6b, 0xb3, 0x73, 0x2b, 0xc0, 0xe9, 0xda, |
74 | | 0x99, 0x83, 0x2b, 0x61, 0xca, 0x01, 0xb6, 0xde, |
75 | | 0x56, 0x24, 0x4a, 0x9e, 0x88, 0xd5, 0xf9, 0xb3, |
76 | | 0x79, 0x73, 0xf6, 0x22, 0xa4, 0x3d, 0x14, 0xa6, |
77 | | 0x59, 0x9b, 0x1f, 0x65, 0x4c, 0xb4, 0x5a, 0x74, |
78 | | 0xe3, 0x55, 0xa5 |
79 | | }; |
80 | | |
81 | | static void test_known(void) |
82 | 1 | { |
83 | 1 | uint8_t c[147]; |
84 | 1 | uint8_t m[131]; |
85 | | |
86 | 1 | ck_assert_msg(sizeof(c) == sizeof(m) + CRYPTO_MAC_SIZE * sizeof(uint8_t), |
87 | 1 | "cyphertext should be CRYPTO_MAC_SIZE bytes longer than plaintext"); |
88 | 1 | ck_assert_msg(sizeof(test_c) == sizeof(c), "sanity check failed"); |
89 | 1 | ck_assert_msg(sizeof(test_m) == sizeof(m), "sanity check failed"); |
90 | | |
91 | 1 | const uint16_t clen = encrypt_data(bobpk, alicesk, test_nonce, test_m, sizeof(test_m) / sizeof(uint8_t), c); |
92 | | |
93 | 1 | ck_assert_msg(memcmp(test_c, c, sizeof(c)) == 0, "cyphertext doesn't match test vector"); |
94 | 1 | ck_assert_msg(clen == sizeof(c) / sizeof(uint8_t), "wrong ciphertext length"); |
95 | | |
96 | 1 | const uint16_t mlen = decrypt_data(bobpk, alicesk, test_nonce, test_c, sizeof(test_c) / sizeof(uint8_t), m); |
97 | | |
98 | 1 | ck_assert_msg(memcmp(test_m, m, sizeof(m)) == 0, "decrypted text doesn't match test vector"); |
99 | 1 | ck_assert_msg(mlen == sizeof(m) / sizeof(uint8_t), "wrong plaintext length"); |
100 | 1 | } |
101 | | |
102 | | static void test_fast_known(void) |
103 | 1 | { |
104 | 1 | uint8_t k[CRYPTO_SHARED_KEY_SIZE]; |
105 | 1 | uint8_t c[147]; |
106 | 1 | uint8_t m[131]; |
107 | | |
108 | 1 | encrypt_precompute(bobpk, alicesk, k); |
109 | | |
110 | 1 | ck_assert_msg(sizeof(c) == sizeof(m) + CRYPTO_MAC_SIZE * sizeof(uint8_t), |
111 | 1 | "cyphertext should be CRYPTO_MAC_SIZE bytes longer than plaintext"); |
112 | 1 | ck_assert_msg(sizeof(test_c) == sizeof(c), "sanity check failed"); |
113 | 1 | ck_assert_msg(sizeof(test_m) == sizeof(m), "sanity check failed"); |
114 | | |
115 | 1 | const uint16_t clen = encrypt_data_symmetric(k, test_nonce, test_m, sizeof(test_m) / sizeof(uint8_t), c); |
116 | | |
117 | 1 | ck_assert_msg(memcmp(test_c, c, sizeof(c)) == 0, "cyphertext doesn't match test vector"); |
118 | 1 | ck_assert_msg(clen == sizeof(c) / sizeof(uint8_t), "wrong ciphertext length"); |
119 | | |
120 | 1 | const uint16_t mlen = decrypt_data_symmetric(k, test_nonce, test_c, sizeof(test_c) / sizeof(uint8_t), m); |
121 | | |
122 | 1 | ck_assert_msg(memcmp(test_m, m, sizeof(m)) == 0, "decrypted text doesn't match test vector"); |
123 | 1 | ck_assert_msg(mlen == sizeof(m) / sizeof(uint8_t), "wrong plaintext length"); |
124 | 1 | } |
125 | | |
126 | | static void test_endtoend(void) |
127 | 1 | { |
128 | 1 | const Random *rng = os_random(); |
129 | 1 | ck_assert(rng != nullptr); |
130 | | |
131 | | // Test 100 random messages and keypairs |
132 | 101 | for (uint8_t testno = 0; testno < 100; testno++) { |
133 | 100 | uint8_t pk1[CRYPTO_PUBLIC_KEY_SIZE]; |
134 | 100 | uint8_t sk1[CRYPTO_SECRET_KEY_SIZE]; |
135 | 100 | uint8_t pk2[CRYPTO_PUBLIC_KEY_SIZE]; |
136 | 100 | uint8_t sk2[CRYPTO_SECRET_KEY_SIZE]; |
137 | 100 | uint8_t k1[CRYPTO_SHARED_KEY_SIZE]; |
138 | 100 | uint8_t k2[CRYPTO_SHARED_KEY_SIZE]; |
139 | | |
140 | 100 | uint8_t n[CRYPTO_NONCE_SIZE]; |
141 | | |
142 | 100 | enum { M_SIZE = 50 }; |
143 | 100 | uint8_t m[M_SIZE]; |
144 | 100 | uint8_t c1[sizeof(m) + CRYPTO_MAC_SIZE]; |
145 | 100 | uint8_t c2[sizeof(m) + CRYPTO_MAC_SIZE]; |
146 | 100 | uint8_t c3[sizeof(m) + CRYPTO_MAC_SIZE]; |
147 | 100 | uint8_t c4[sizeof(m) + CRYPTO_MAC_SIZE]; |
148 | 100 | uint8_t m1[sizeof(m)]; |
149 | 100 | uint8_t m2[sizeof(m)]; |
150 | 100 | uint8_t m3[sizeof(m)]; |
151 | 100 | uint8_t m4[sizeof(m)]; |
152 | | |
153 | | //Generate random message (random length from 10 to 50) |
154 | 100 | const uint16_t mlen = (random_u32(rng) % (M_SIZE - 10)) + 10; |
155 | 100 | rand_bytes(rng, m, mlen); |
156 | 100 | rand_bytes(rng, n, CRYPTO_NONCE_SIZE); |
157 | | |
158 | | //Generate keypairs |
159 | 100 | crypto_new_keypair(rng, pk1, sk1); |
160 | 100 | crypto_new_keypair(rng, pk2, sk2); |
161 | | |
162 | | //Precompute shared keys |
163 | 100 | encrypt_precompute(pk2, sk1, k1); |
164 | 100 | encrypt_precompute(pk1, sk2, k2); |
165 | | |
166 | 100 | ck_assert_msg(memcmp(k1, k2, CRYPTO_SHARED_KEY_SIZE) == 0, "encrypt_precompute: bad"); |
167 | | |
168 | | //Encrypt all four ways |
169 | 100 | const uint16_t c1len = encrypt_data(pk2, sk1, n, m, mlen, c1); |
170 | 100 | const uint16_t c2len = encrypt_data(pk1, sk2, n, m, mlen, c2); |
171 | 100 | const uint16_t c3len = encrypt_data_symmetric(k1, n, m, mlen, c3); |
172 | 100 | const uint16_t c4len = encrypt_data_symmetric(k2, n, m, mlen, c4); |
173 | | |
174 | 100 | ck_assert_msg(c1len == c2len && c1len == c3len && c1len == c4len, "cyphertext lengths differ"); |
175 | 100 | ck_assert_msg(c1len == mlen + (uint16_t)CRYPTO_MAC_SIZE, "wrong cyphertext length"); |
176 | 100 | ck_assert_msg(memcmp(c1, c2, c1len) == 0 && memcmp(c1, c3, c1len) == 0 |
177 | 100 | && memcmp(c1, c4, c1len) == 0, "crypertexts differ"); |
178 | | |
179 | | //Decrypt all four ways |
180 | 100 | const uint16_t m1len = decrypt_data(pk2, sk1, n, c1, c1len, m1); |
181 | 100 | const uint16_t m2len = decrypt_data(pk1, sk2, n, c1, c1len, m2); |
182 | 100 | const uint16_t m3len = decrypt_data_symmetric(k1, n, c1, c1len, m3); |
183 | 100 | const uint16_t m4len = decrypt_data_symmetric(k2, n, c1, c1len, m4); |
184 | | |
185 | 100 | ck_assert_msg(m1len == m2len && m1len == m3len && m1len == m4len, "decrypted text lengths differ"); |
186 | 100 | ck_assert_msg(m1len == mlen, "wrong decrypted text length"); |
187 | 100 | ck_assert_msg(memcmp(m1, m2, mlen) == 0 && memcmp(m1, m3, mlen) == 0 |
188 | 100 | && memcmp(m1, m4, mlen) == 0, "decrypted texts differ"); |
189 | 100 | ck_assert_msg(memcmp(m1, m, mlen) == 0, "wrong decrypted text"); |
190 | 100 | } |
191 | 1 | } |
192 | | |
193 | | static void test_large_data(void) |
194 | 1 | { |
195 | 1 | const Random *rng = os_random(); |
196 | 1 | ck_assert(rng != nullptr); |
197 | 1 | uint8_t k[CRYPTO_SHARED_KEY_SIZE]; |
198 | 1 | uint8_t n[CRYPTO_NONCE_SIZE]; |
199 | | |
200 | 1 | const size_t m1_size = MAX_CRYPTO_PACKET_SIZE - CRYPTO_MAC_SIZE; |
201 | 1 | uint8_t *m1 = (uint8_t *)malloc(m1_size); |
202 | 1 | uint8_t *c1 = (uint8_t *)malloc(m1_size + CRYPTO_MAC_SIZE); |
203 | 1 | uint8_t *m1prime = (uint8_t *)malloc(m1_size); |
204 | | |
205 | 1 | const size_t m2_size = MAX_CRYPTO_PACKET_SIZE - CRYPTO_MAC_SIZE; |
206 | 1 | uint8_t *m2 = (uint8_t *)malloc(m2_size); |
207 | 1 | uint8_t *c2 = (uint8_t *)malloc(m2_size + CRYPTO_MAC_SIZE); |
208 | | |
209 | 1 | ck_assert(m1 != nullptr && c1 != nullptr && m1prime != nullptr && m2 != nullptr && c2 != nullptr); |
210 | | |
211 | | //Generate random messages |
212 | 1 | rand_bytes(rng, m1, m1_size); |
213 | 1 | rand_bytes(rng, m2, m2_size); |
214 | 1 | rand_bytes(rng, n, CRYPTO_NONCE_SIZE); |
215 | | |
216 | | //Generate key |
217 | 1 | rand_bytes(rng, k, CRYPTO_SHARED_KEY_SIZE); |
218 | | |
219 | 1 | const uint16_t c1len = encrypt_data_symmetric(k, n, m1, m1_size, c1); |
220 | 1 | const uint16_t c2len = encrypt_data_symmetric(k, n, m2, m2_size, c2); |
221 | | |
222 | 1 | ck_assert_msg(c1len == m1_size + CRYPTO_MAC_SIZE, "could not encrypt"); |
223 | 1 | ck_assert_msg(c2len == m2_size + CRYPTO_MAC_SIZE, "could not encrypt"); |
224 | | |
225 | 1 | const uint16_t m1plen = decrypt_data_symmetric(k, n, c1, c1len, m1prime); |
226 | | |
227 | 1 | ck_assert_msg(m1plen == m1_size, "decrypted text lengths differ"); |
228 | 1 | ck_assert_msg(memcmp(m1prime, m1, m1_size) == 0, "decrypted texts differ"); |
229 | | |
230 | 1 | free(c2); |
231 | 1 | free(m2); |
232 | 1 | free(m1prime); |
233 | 1 | free(c1); |
234 | 1 | free(m1); |
235 | 1 | } |
236 | | |
237 | | static void test_large_data_symmetric(void) |
238 | 1 | { |
239 | 1 | const Random *rng = os_random(); |
240 | 1 | ck_assert(rng != nullptr); |
241 | 1 | uint8_t k[CRYPTO_SYMMETRIC_KEY_SIZE]; |
242 | | |
243 | 1 | uint8_t n[CRYPTO_NONCE_SIZE]; |
244 | | |
245 | 1 | const size_t m1_size = 16 * 16 * 16; |
246 | 1 | uint8_t *m1 = (uint8_t *)malloc(m1_size); |
247 | 1 | uint8_t *c1 = (uint8_t *)malloc(m1_size + CRYPTO_MAC_SIZE); |
248 | 1 | uint8_t *m1prime = (uint8_t *)malloc(m1_size); |
249 | | |
250 | 1 | ck_assert(m1 != nullptr && c1 != nullptr && m1prime != nullptr); |
251 | | |
252 | | //Generate random messages |
253 | 1 | rand_bytes(rng, m1, m1_size); |
254 | 1 | rand_bytes(rng, n, CRYPTO_NONCE_SIZE); |
255 | | |
256 | | //Generate key |
257 | 1 | new_symmetric_key(rng, k); |
258 | | |
259 | 1 | const uint16_t c1len = encrypt_data_symmetric(k, n, m1, m1_size, c1); |
260 | 1 | ck_assert_msg(c1len == m1_size + CRYPTO_MAC_SIZE, "could not encrypt data"); |
261 | | |
262 | 1 | const uint16_t m1plen = decrypt_data_symmetric(k, n, c1, c1len, m1prime); |
263 | | |
264 | 1 | ck_assert_msg(m1plen == m1_size, "decrypted text lengths differ"); |
265 | 1 | ck_assert_msg(memcmp(m1prime, m1, m1_size) == 0, "decrypted texts differ"); |
266 | | |
267 | 1 | free(m1prime); |
268 | 1 | free(c1); |
269 | 1 | free(m1); |
270 | 1 | } |
271 | | |
272 | | static void test_very_large_data(void) |
273 | 1 | { |
274 | 1 | const Random *rng = os_random(); |
275 | 1 | ck_assert(rng != nullptr); |
276 | | |
277 | 1 | const uint8_t nonce[CRYPTO_NONCE_SIZE] = {0}; |
278 | 1 | uint8_t pk[CRYPTO_PUBLIC_KEY_SIZE]; |
279 | 1 | uint8_t sk[CRYPTO_SECRET_KEY_SIZE]; |
280 | 1 | crypto_new_keypair(rng, pk, sk); |
281 | | |
282 | | // 100 MiB of data (all zeroes, doesn't matter what's inside). |
283 | 1 | const uint32_t plain_size = 100 * 1024 * 1024; |
284 | 1 | uint8_t *plain = (uint8_t *)malloc(plain_size); |
285 | 1 | uint8_t *encrypted = (uint8_t *)malloc(plain_size + CRYPTO_MAC_SIZE); |
286 | | |
287 | 1 | ck_assert(plain != nullptr); |
288 | 1 | ck_assert(encrypted != nullptr); |
289 | | |
290 | 1 | encrypt_data(pk, sk, nonce, plain, plain_size, encrypted); |
291 | | |
292 | 1 | free(encrypted); |
293 | 1 | free(plain); |
294 | 1 | } |
295 | | |
296 | | static void increment_nonce_number_cmp(uint8_t *nonce, uint32_t num) |
297 | 524k | { |
298 | 524k | uint32_t num1 = 0; |
299 | 524k | memcpy(&num1, nonce + (CRYPTO_NONCE_SIZE - sizeof(num1)), sizeof(num1)); |
300 | 524k | num1 = net_ntohl(num1); |
301 | 524k | uint32_t num2 = num + num1; |
302 | | |
303 | 524k | if (num2 < num1) { |
304 | 131k | for (uint16_t i = CRYPTO_NONCE_SIZE - sizeof(num1); i != 0; --i) { |
305 | 131k | ++nonce[i - 1]; |
306 | | |
307 | 131k | if (nonce[i - 1] != 0) { |
308 | 131k | break; |
309 | 131k | } |
310 | 131k | } |
311 | 131k | } |
312 | | |
313 | 524k | num2 = net_htonl(num2); |
314 | 524k | memcpy(nonce + (CRYPTO_NONCE_SIZE - sizeof(num2)), &num2, sizeof(num2)); |
315 | 524k | } |
316 | | |
317 | | static void test_increment_nonce(void) |
318 | 1 | { |
319 | 1 | const Random *rng = os_random(); |
320 | 1 | ck_assert(rng != nullptr); |
321 | | |
322 | 1 | uint8_t n[CRYPTO_NONCE_SIZE]; |
323 | | |
324 | 25 | for (uint32_t i = 0; i < CRYPTO_NONCE_SIZE; ++i) { |
325 | 24 | n[i] = random_u08(rng); |
326 | 24 | } |
327 | | |
328 | 1 | uint8_t n1[CRYPTO_NONCE_SIZE]; |
329 | | |
330 | 1 | memcpy(n1, n, CRYPTO_NONCE_SIZE); |
331 | | |
332 | 262k | for (uint32_t i = 0; i < (1 << 18); ++i) { |
333 | 262k | increment_nonce_number_cmp(n, 1); |
334 | 262k | increment_nonce(n1); |
335 | 262k | ck_assert_msg(memcmp(n, n1, CRYPTO_NONCE_SIZE) == 0, "Bad increment_nonce function"); |
336 | 262k | } |
337 | | |
338 | 262k | for (uint32_t i = 0; i < (1 << 18); ++i) { |
339 | 262k | const uint32_t r = random_u32(rng); |
340 | 262k | increment_nonce_number_cmp(n, r); |
341 | 262k | increment_nonce_number(n1, r); |
342 | 262k | ck_assert_msg(memcmp(n, n1, CRYPTO_NONCE_SIZE) == 0, "Bad increment_nonce_number function"); |
343 | 262k | } |
344 | 1 | } |
345 | | |
346 | | static void test_memzero(void) |
347 | 1 | { |
348 | 1 | uint8_t src[sizeof(test_c)]; |
349 | 1 | memcpy(src, test_c, sizeof(test_c)); |
350 | | |
351 | 1 | crypto_memzero(src, sizeof(src)); |
352 | | |
353 | 148 | for (size_t i = 0; i < sizeof(src); i++) { |
354 | 147 | ck_assert_msg(src[i] == 0, "Memory is not zeroed"); |
355 | 147 | } |
356 | 1 | } |
357 | | |
358 | | int main(void) |
359 | 721 | { |
360 | 721 | setvbuf(stdout, nullptr, _IONBF, 0); |
361 | | |
362 | 721 | test_known(); |
363 | 721 | test_fast_known(); |
364 | 721 | test_endtoend(); /* waiting up to 15 seconds */ |
365 | 721 | test_large_data(); |
366 | 721 | test_large_data_symmetric(); |
367 | 721 | test_very_large_data(); |
368 | 721 | test_increment_nonce(); |
369 | 721 | test_memzero(); |
370 | | |
371 | 721 | return 0; |
372 | 721 | } |