01e115 | 2003-03-12 | Niels Möller | | /* nettle.cmod -*- c -*- */
#include "global.h"
#include "interpret.h"
#include "svalue.h"
/* For this_object() */
#include "object.h"
|
7d54f4 | 2004-01-23 | Martin Nilsson | | #include "operators.h"
|
01e115 | 2003-03-12 | Niels Möller | | #include "module_support.h"
|
d7f88a | 2004-02-14 | Martin Nilsson | | #include "threads.h"
|
0a146b | 2013-03-12 | Arne Goedeke | | #include "pike_memory.h"
|
01e115 | 2003-03-12 | Niels Möller | |
|
4e1f62 | 2003-03-13 | Niels Möller | | #include "nettle_config.h"
|
770fee | 2003-03-12 | Henrik Grubbström (Grubba) | | #ifdef HAVE_LIBNETTLE
|
0733e4 | 2015-03-20 | Henrik Grubbström (Grubba) | | #include "nettle.h"
|
318417 | 2003-08-06 | Henrik Grubbström (Grubba) | | #include <nettle/yarrow.h>
|
01e115 | 2003-03-12 | Niels Möller | | #include <stdio.h>
#include <stdarg.h>
DECLARATIONS
/*! @module Nettle
|
d74599 | 2003-08-05 | Martin Nilsson | | *! Low level crypto functions used by the @[Crypto] module. Unless
*! you are doing something very special, you would want to use the
*! Crypto module instead.
*/
|
b5aab5 | 2016-12-05 | Martin Nilsson | | /*! @decl string version()
*! Returns the version of the Nettle library, e.g. "3.1". 0 is
*! returned when runtime version is unknown.
*/
PIKEFUN string version()
{
#ifdef HAVE_NETTLE_VERSION_H
push_constant_text("%d.%d");
#ifdef HAVE_NETTLE_VERSION_MAJOR
push_int( nettle_version_major() );
push_int( nettle_version_minor() );
#else
/* Probably Nettle 3.1.1. */
push_int( NETTLE_VERSION_MAJOR );
push_int( NETTLE_VERSION_MINOR );
#endif
f_sprintf(3);
#else
push_int(0);
#endif
}
|
d74599 | 2003-08-05 | Martin Nilsson | | /*! @class Yarrow
*!
*! Yarrow is a family of pseudo-randomness generators, designed for
*! cryptographic use, by John Kelsey, Bruce Schneier and Niels Ferguson.
*! Yarrow-160 is described in a paper at
|
1e4bd3 | 2013-10-05 | Henrik Grubbström (Grubba) | | *! @url{http://www.schneier.com/paper-yarrow.html@}, and it uses SHA1 and
|
d74599 | 2003-08-05 | Martin Nilsson | | *! triple-DES, and has a 160-bit internal state. Nettle implements
*! Yarrow-256, which is similar, but uses SHA256 and AES to get an
*! internal state of 256 bits.
*/
PIKECLASS Yarrow
|
9e336b | 2014-06-19 | Henrik Grubbström (Grubba) | | program_flags PROGRAM_CLEAR_STORAGE;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
|
49acab | 2003-11-09 | Niels Möller | | CVAR struct yarrow256_ctx ctx;
|
25f543 | 2003-08-06 | Martin Nilsson | | CVAR struct yarrow_source *sources;
|
d31127 | 2009-07-05 | Henrik Grubbström (Grubba) | |
|
0ec141 | 2009-07-05 | Henrik Grubbström (Grubba) | | DECLARE_STORAGE;
|
d31127 | 2009-07-05 | Henrik Grubbström (Grubba) | |
|
910947 | 2003-08-07 | Martin Nilsson | | /*! @decl void create(void|int sources)
*! The number of entropy sources that will feed entropy to the
*! random number generator is given as an argument to Yarrow
*! during instantiation.
*! @seealso
*! @[update]
*/
|
d7f88a | 2004-02-14 | Martin Nilsson | | PIKEFUN void create(void|int arg)
|
ecc938 | 2008-06-29 | Martin Nilsson | | flags ID_PROTECTED;
|
d7f88a | 2004-02-14 | Martin Nilsson | | {
|
25f543 | 2003-08-06 | Martin Nilsson | | INT32 num = 0;
if(arg) {
|
017b57 | 2011-10-28 | Henrik Grubbström (Grubba) | | if (TYPEOF(*arg) != PIKE_T_INT)
|
25f543 | 2003-08-06 | Martin Nilsson | | Pike_error("Bad argument type.\n");
num = arg->u.integer;
if(num < 0)
Pike_error("Invalid number of sources.\n");
|
49acab | 2003-11-09 | Niels Möller | | free (THIS->sources);
|
25f543 | 2003-08-06 | Martin Nilsson | | THIS->sources = xalloc(sizeof(struct yarrow_source)*num);
}
|
49acab | 2003-11-09 | Niels Möller | | else
{
free (THIS->sources);
THIS->sources = NULL;
}
yarrow256_init(&THIS->ctx, num, THIS->sources);
|
d74599 | 2003-08-05 | Martin Nilsson | | }
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | /*! @decl Yarrow seed(string(0..255) data)
|
658003 | 2013-08-15 | Martin Nilsson | | *!
*! The random generator needs to be seeded before it can be used.
*! The seed must be at least 32 characters long. The seed could be
*! stored from a previous run by inserting the value returned from
|
2308f2 | 2014-06-16 | Martin Nilsson | | *! previous @[random_string] call.
|
658003 | 2013-08-15 | Martin Nilsson | | *!
|
d74599 | 2003-08-05 | Martin Nilsson | | *! @returns
*! Returns the called object.
|
910947 | 2003-08-07 | Martin Nilsson | | *! @seealso
|
2308f2 | 2014-06-16 | Martin Nilsson | | *! @[min_seed_size], @[is_seeded]
|
d74599 | 2003-08-05 | Martin Nilsson | | */
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | PIKEFUN object seed(string(0..255) data)
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_SIDE_EFFECT;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
if(data->len < YARROW256_SEED_FILE_SIZE)
|
c9edeb | 2009-07-01 | Henrik Grubbström (Grubba) | | Pike_error("Seed must be at least %d characters.\n",
YARROW256_SEED_FILE_SIZE);
|
d74599 | 2003-08-05 | Martin Nilsson | |
NO_WIDE_STRING(data);
|
c9edeb | 2009-07-01 | Henrik Grubbström (Grubba) | | yarrow256_seed(&THIS->ctx, data->len, STR0(data));
|
d74599 | 2003-08-05 | Martin Nilsson | | RETURN this_object();
}
|
910947 | 2003-08-07 | Martin Nilsson | | /*! @decl int(0..) min_seed_size()
*! Returns the minimal number of characters that the @[seed]
*! needs to properly seed the random number generator.
*! @seealso
*! @[seed]
*/
PIKEFUN int(0..) min_seed_size()
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_TRY_OPTIMIZE;
|
910947 | 2003-08-07 | Martin Nilsson | | {
RETURN YARROW256_SEED_FILE_SIZE;
}
|
d74599 | 2003-08-05 | Martin Nilsson | | /*! @decl int(0..1) is_seeded()
*! Returns 1 if the random generator is seeded and ready
*! to generator output. 0 otherwise.
|
910947 | 2003-08-07 | Martin Nilsson | | *! @seealso
*! @[seed]
|
d74599 | 2003-08-05 | Martin Nilsson | | */
PIKEFUN int(0..1) is_seeded()
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_EXTERNAL_DEPEND;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
|
49acab | 2003-11-09 | Niels Möller | | RETURN yarrow256_is_seeded(&THIS->ctx);
|
d74599 | 2003-08-05 | Martin Nilsson | | }
|
910947 | 2003-08-07 | Martin Nilsson | | /*! @decl void force_reseed()
*! By calling this function entropy is moved from the slow
*! pool to the fast pool. Read more about Yarrow before using
*! this.
*/
|
d74599 | 2003-08-05 | Martin Nilsson | | PIKEFUN void force_reseed()
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_SIDE_EFFECT;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
|
c9edeb | 2009-07-01 | Henrik Grubbström (Grubba) | | #ifdef HAVE_NETTLE_YARROW256_SLOW_RESEED
/* From change notes for Nettle 2.0:
*
* * Changes to the yarrow256 interface. The function
* yarrow256_force_reseed has been replaced by the two
* functions yarrow256_fast_reseed and yarrow256_slow_reseed,
* which were previously static.
*/
yarrow256_slow_reseed(&THIS->ctx);
#else
|
49acab | 2003-11-09 | Niels Möller | | yarrow256_force_reseed(&THIS->ctx);
|
c9edeb | 2009-07-01 | Henrik Grubbström (Grubba) | | #endif
|
d74599 | 2003-08-05 | Martin Nilsson | | }
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | /*! @decl int(0..1) update(string(0..255) data, int source, int entropy)
|
910947 | 2003-08-07 | Martin Nilsson | | *! Inject additional entropy into the random number generator.
*!
*! @seealso
*! @[create]
*/
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | PIKEFUN int(0..1) update(string(0..255) data, int source, int entropy)
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_SIDE_EFFECT;
|
f1d891 | 2003-08-06 | Martin Nilsson | | {
|
d31127 | 2009-07-05 | Henrik Grubbström (Grubba) | | int ret;
|
49acab | 2003-11-09 | Niels Möller | | /* FIXME: Wide strings could actually be supported here */
|
f1d891 | 2003-08-06 | Martin Nilsson | | NO_WIDE_STRING(data);
|
49acab | 2003-11-09 | Niels Möller | | if( !THIS->sources )
|
f1d891 | 2003-08-06 | Martin Nilsson | | Pike_error("This random generator has no sources.\n");
|
61e14b | 2004-01-23 | Martin Nilsson | | if( source<0 || (unsigned)source>=THIS->ctx.nsources )
|
f1d891 | 2003-08-06 | Martin Nilsson | | Pike_error("Invalid random source.\n");
if( entropy<0 )
Pike_error("Entropy must be positive.\n");
|
910947 | 2003-08-07 | Martin Nilsson | | if( entropy>(data->len*8) )
Pike_error("Impossibly large entropy value.\n");
|
d31127 | 2009-07-05 | Henrik Grubbström (Grubba) | | ret = yarrow256_update(&THIS->ctx, source, entropy, data->len,
(const uint8_t *)data->str);
RETURN ret;
|
f1d891 | 2003-08-06 | Martin Nilsson | | }
|
01a1ba | 2003-12-14 | Martin Nilsson | | /*! @decl int(0..) needed_sources()
*! The number of sources that must reach the threshold before a
*! slow reseed will happen.
*/
|
d74599 | 2003-08-05 | Martin Nilsson | | PIKEFUN int(0..) needed_sources()
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_EXTERNAL_DEPEND;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
|
49acab | 2003-11-09 | Niels Möller | | RETURN yarrow256_needed_sources(&THIS->ctx);
|
d74599 | 2003-08-05 | Martin Nilsson | | }
|
5345c9 | 2013-05-19 | Martin Nilsson | | /*! @decl string(0..255) random_string(int length)
|
d74599 | 2003-08-05 | Martin Nilsson | | *! Returns a pseudo-random string of the requested @[length].
*/
|
5345c9 | 2013-05-19 | Martin Nilsson | | PIKEFUN string(0..255) random_string(int length)
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_EXTERNAL_DEPEND|OPT_SIDE_EFFECT;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
struct pike_string *rnd;
if(length < 0)
Pike_error("Invalid length, must be positive.\n");
|
49acab | 2003-11-09 | Niels Möller | | if( !yarrow256_is_seeded(&THIS->ctx) )
|
d74599 | 2003-08-05 | Martin Nilsson | | Pike_error("Random generator not seeded.\n");
rnd = begin_shared_string(length);
|
baac7d | 2006-01-07 | Martin Nilsson | | yarrow256_random(&THIS->ctx, length, (uint8_t *)rnd->str);
|
658003 | 2013-08-15 | Martin Nilsson | | RETURN end_shared_string(rnd);
|
d74599 | 2003-08-05 | Martin Nilsson | | }
|
e6196e | 2014-06-16 | Martin Nilsson | | /*! @decl string(0..255) get_seed()
*! Returns part of the internal state so that it can be saved for
*! later seeding. This method is deprecated. Instead read the
*! @[min_seed_size] number of bytes from the @[random_string]
*! method.
*!
*! @seealso
*! @[seed()], @[random_string()]
*/
PIKEFUN string(0..255) get_seed()
optflags OPT_EXTERNAL_DEPEND;
rawtype tDeprecated(tFunc(tNone, tStr8));
{
push_int(YARROW256_SEED_FILE_SIZE);
f_Nettle_Yarrow_random_string(1);
}
|
d74599 | 2003-08-05 | Martin Nilsson | | INIT
{
|
49acab | 2003-11-09 | Niels Möller | | THIS->sources = NULL;
yarrow256_init(&THIS->ctx, 0, NULL);
|
d74599 | 2003-08-05 | Martin Nilsson | | }
|
22038d | 2008-05-30 | Martin Nilsson | |
|
d74599 | 2003-08-05 | Martin Nilsson | | EXIT
|
d3df7c | 2008-05-30 | Martin Nilsson | | gc_trivial;
|
d74599 | 2003-08-05 | Martin Nilsson | | {
|
22038d | 2008-05-30 | Martin Nilsson | | if( THIS->sources )
{
free(THIS->sources);
}
|
d74599 | 2003-08-05 | Martin Nilsson | | }
}
|
453a2b | 2014-04-05 | Martin Nilsson | | /*! @endclass
*/
#define INCREMENT(size, ctr) \
do { \
unsigned increment_i = (size) - 1; \
if (++(ctr)[increment_i] == 0) \
while (increment_i > 0 \
&& ++(ctr)[--increment_i] == 0 ) \
; \
} while (0)
/*! @class Fortuna
*!
*! Implements the Fortuna PRNG generator, designed by Niels Ferguson and
*! Bruce Schneier and described in Practical Cryptography. Web
*! published exerpt at https://www.schneier.com:443/fortuna.pdf
*!
*! This implementation uses AES256 to generate output and SHA256 to
*! generate keys.
*!
*! To use this class an entropy accumulator needs to be implemented
*! and supply the @[reseed()] method with new entopy.
*/
PIKECLASS Fortuna
|
9e336b | 2014-06-19 | Henrik Grubbström (Grubba) | | program_flags PROGRAM_CLEAR_STORAGE;
|
453a2b | 2014-04-05 | Martin Nilsson | | {
CVAR struct aes_ctx aes_ctx;
CVAR struct sha256_ctx sha_ctx;
CVAR uint8_t *key;
CVAR uint8_t *ctr;
CVAR uint8_t *data;
DECLARE_STORAGE;
|
402cc5 | 2014-04-06 | Henrik Grubbström (Grubba) | | #ifndef AES256_KEY_SIZE
#define AES256_KEY_SIZE (256>>3)
#endif
|
c9eefb | 2014-08-21 | Martin Nilsson | | static void fortuna_generate(void)
|
453a2b | 2014-04-05 | Martin Nilsson | | {
aes_encrypt(&THIS->aes_ctx, 16, THIS->data, THIS->ctr);
INCREMENT(16, THIS->ctr);
}
|
c9eefb | 2014-08-21 | Martin Nilsson | | static void fortuna_rekey(void)
|
453a2b | 2014-04-05 | Martin Nilsson | | {
fortuna_generate();
|
59fc9e | 2014-09-03 | Martin Nilsson | | memcpy(THIS->key, THIS->data, 16);
|
453a2b | 2014-04-05 | Martin Nilsson | | fortuna_generate();
|
59fc9e | 2014-09-03 | Martin Nilsson | | memcpy(THIS->key+16, THIS->data, 16);
|
453a2b | 2014-04-05 | Martin Nilsson | | aes_set_encrypt_key(&THIS->aes_ctx, AES256_KEY_SIZE, THIS->key);
}
/*! @decl void reseed(string(8bit) data)
*! Generates new a new key based on the provided additional
*! entropy.
*/
PIKEFUN void reseed(string(8bit) data)
{
sha256_update(&THIS->sha_ctx, 32, THIS->key);
sha256_update(&THIS->sha_ctx, data->len, (const uint8_t *)data->str);
sha256_digest(&THIS->sha_ctx, 32, THIS->key);
aes_set_encrypt_key(&THIS->aes_ctx, AES256_KEY_SIZE, THIS->key);
INCREMENT(16, THIS->ctr);
}
/*! @decl string(8bit) random_string(int(0..) len)
*!
*! Generates @[len] amount of pseudo random data. In contrast with
*! the Fortuna PseudoRandomData function, which only allows 2^20
*! bytes of random data per call, the necessary rekey operations
*! are here performed internally, so no such restrictions apply.
*/
|
b4fdca | 2014-05-08 | Martin Nilsson | | PIKEFUN string(8bit) random_string(int len)
|
453a2b | 2014-04-05 | Martin Nilsson | | {
|
6ddd9d | 2014-11-05 | Martin Nilsson | | int stored = 0;
|
453a2b | 2014-04-05 | Martin Nilsson | | struct string_builder s;
|
b4fdca | 2014-05-08 | Martin Nilsson | |
if(len<0) Pike_error("Length has to be positive.\n");
|
453a2b | 2014-04-05 | Martin Nilsson | | init_string_builder_alloc(&s, len+16, 0);
while( stored < len )
{
fortuna_generate();
string_builder_binary_strcat(&s, (const char *)THIS->data,
|
ad102c | 2014-04-11 | Henrik Grubbström (Grubba) | | MINIMUM(16, (len-stored)));
|
677429 | 2014-04-18 | Martin Nilsson | |
/* This should really be MINIMUM(16, (len-stored)) instead of
16, but it is only less than 16 in the last round, so it
doesn't matter if we rekey here or not. */
|
453a2b | 2014-04-05 | Martin Nilsson | | stored += 16;
|
677429 | 2014-04-18 | Martin Nilsson | |
|
453a2b | 2014-04-05 | Martin Nilsson | | if( !(stored % (1<<20)) )
fortuna_rekey();
}
|
677429 | 2014-04-18 | Martin Nilsson | |
/* Inverse of the above conditional, to avoid having fortuna_rekey
applied twice in the rare condition that the string length is a
multiple of 1<<20. */
if( (stored % (1<<20)) )
fortuna_rekey();
|
453a2b | 2014-04-05 | Martin Nilsson | |
RETURN finish_string_builder(&s);
}
INIT
{
|
66589a | 2014-04-27 | Martin Nilsson | | THIS->ctr = xcalloc(1,16);
THIS->key = xcalloc(1,32);
|
453a2b | 2014-04-05 | Martin Nilsson | | aes_set_encrypt_key(&THIS->aes_ctx, AES256_KEY_SIZE, THIS->key);
sha256_init(&THIS->sha_ctx);
THIS->data = xalloc(16);
}
EXIT
gc_trivial;
{
free(THIS->ctr);
free(THIS->key);
free(THIS->data);
}
}
|
d74599 | 2003-08-05 | Martin Nilsson | | /*! @endclass
|
01e115 | 2003-03-12 | Niels Möller | | */
|
e93806 | 2014-09-12 | Arne Goedeke | | /*! @decl int(0..) rsa_unpad(string(0..255) data, int type)
*!
*! Unpads a message that has been padded according to
*! RSAES-PKCS1-V1_5-ENCODE(message) in PKCS#1 v2.2. The padding
*! method used on the original message must be provided in the
*! @[type] parameter. All content dependent processing is done in
*! constant time for the same padding type and @[data] length.
*/
PIKEFUN int rsa_unpad(string(0..255) data, int type)
{
int i, pad=0, nonpad=0, pos=0;
unsigned char *str;
NO_WIDE_STRING(data);
/* Indata is smaller than minimum size, so we can exit immediately
without timing issue. 1 type + 8 padding + 1 delimiter + 1 value
= 11 bytes. */
if(data->len < 11 ) RETURN 0;
str = (unsigned char*)data->str + data->len - 1;
for(i=data->len-1; i>0; i--,str--)
{
switch(*str)
{
case 0: pos=i; break;
case 0xff: pad=i; break;
default: nonpad=i; break;
}
}
if( type==2 )
{
nonpad=pos+1;
pad=1;
}
if( (pad==1) + (nonpad>pos) + (*str==type) + (pos>8) == 4 )
RETURN pos+1;
RETURN 0;
}
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | /*! @decl string(0..127) crypt_md5(string(0..255) password, @
*! string(0..255) salt,@
*! void|string(0..255) magic)
|
658003 | 2013-08-15 | Martin Nilsson | | *! Does the crypt_md5 abrakadabra (MD5 + snakeoil). It is assumed
*! that @[salt] does not contain "$".
*!
*! The @[password] memory will be cleared before released.
|
3955a9 | 2003-08-24 | Martin Nilsson | | */
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | PIKEFUN string(0..127) crypt_md5(string(0..255) pw, string(0..255) salt,
void|string(0..255) magic)
|
d7f88a | 2004-02-14 | Martin Nilsson | | optflags OPT_TRY_OPTIMIZE;
|
3955a9 | 2003-08-24 | Martin Nilsson | | {
|
329a6f | 2004-02-21 | Martin Nilsson | | char *hash;
|
3955a9 | 2003-08-24 | Martin Nilsson | | NO_WIDE_STRING(pw);
NO_WIDE_STRING(salt);
|
bb6493 | 2013-08-09 | Arne Goedeke | |
pw->flags |= STRING_CLEAR_ON_EXIT;
|
395c4a | 2012-07-25 | Martin Nilsson | | if(!magic)
{
hash = pike_crypt_md5(pw->len, pw->str, salt->len, salt->str,
3, "$1$");
}
else
{
|
f6a6ad | 2013-12-08 | Henrik Grubbström (Grubba) | | NO_WIDE_STRING(magic);
|
395c4a | 2012-07-25 | Martin Nilsson | | hash = pike_crypt_md5(pw->len, pw->str, salt->len, salt->str,
magic->len, magic->str);
}
|
329a6f | 2004-02-21 | Martin Nilsson | | push_text(hash);
|
3955a9 | 2003-08-24 | Martin Nilsson | | }
|
1ab4b1 | 2003-03-18 | Niels Möller | | /*! @endmodule
*/
|
770fee | 2003-03-12 | Henrik Grubbström (Grubba) | |
|
654f15 | 2003-03-14 | Marcus Comstedt | | #endif /* HAVE_LIBNETTLE */
|
4e1f62 | 2003-03-13 | Niels Möller | | PIKE_MODULE_INIT
{
|
099d68 | 2004-01-30 | Martin Nilsson | | #ifdef __NT__
struct program *nt_program = NULL;
struct object *nt_object = NULL;
#endif /* __NT__ */
|
4e1f62 | 2003-03-13 | Niels Möller | | INIT;
|
654f15 | 2003-03-14 | Marcus Comstedt | | #ifdef HAVE_LIBNETTLE
|
4e1f62 | 2003-03-13 | Niels Möller | | hash_init();
|
024d80 | 2014-04-21 | Henrik Grubbström (Grubba) | | mac_init();
|
636c42 | 2003-03-18 | Niels Möller | | cipher_init();
|
89dce2 | 2014-04-23 | Henrik Grubbström (Grubba) | | aead_init();
|
654f15 | 2003-03-14 | Marcus Comstedt | | #endif /* HAVE_LIBNETTLE */
|
099d68 | 2004-01-30 | Martin Nilsson | | #ifdef __NT__
start_new_program();
nt_init();
nt_program = end_program();
add_object_constant("NT", nt_object=clone_object(nt_program,0), 0);
free_object(nt_object);
free_program(nt_program);
#endif /* __NT__ */
|
d5f689 | 2013-11-24 | Martin Nilsson | | #ifdef HAVE_LIBHOGWEED
hogweed_init();
#endif
|
4e1f62 | 2003-03-13 | Niels Möller | | }
PIKE_MODULE_EXIT
{
|
654f15 | 2003-03-14 | Marcus Comstedt | | #ifdef HAVE_LIBNETTLE
|
89dce2 | 2014-04-23 | Henrik Grubbström (Grubba) | | aead_exit();
|
636c42 | 2003-03-18 | Niels Möller | | cipher_exit();
|
024d80 | 2014-04-21 | Henrik Grubbström (Grubba) | | mac_exit();
|
4e1f62 | 2003-03-13 | Niels Möller | | hash_exit();
|
654f15 | 2003-03-14 | Marcus Comstedt | | #endif /* HAVE_LIBNETTLE */
|
099d68 | 2004-01-30 | Martin Nilsson | | #ifdef __NT__
nt_exit();
#endif /* __NT__ */
|
d5f689 | 2013-11-24 | Martin Nilsson | | #ifdef HAVE_LIBHOGWEED
hogweed_exit();
#endif
|
4e1f62 | 2003-03-13 | Niels Möller | | EXIT;
}
|