Coverage Report

Created: 2025-12-31 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl30/crypto/engine/eng_dyn.c
Line
Count
Source
1
/*
2
 * Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/* We need to use some engine deprecated APIs */
11
#define OPENSSL_SUPPRESS_DEPRECATED
12
13
#include "eng_local.h"
14
#include "internal/dso.h"
15
#include <openssl/crypto.h>
16
17
/*
18
 * Shared libraries implementing ENGINEs for use by the "dynamic" ENGINE
19
 * loader should implement the hook-up functions with the following
20
 * prototypes.
21
 */
22
23
/* Our ENGINE handlers */
24
static int dynamic_init(ENGINE *e);
25
static int dynamic_finish(ENGINE *e);
26
static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p,
27
    void (*f)(void));
28
/* Predeclare our context type */
29
typedef struct st_dynamic_data_ctx dynamic_data_ctx;
30
/* The implementation for the important control command */
31
static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx);
32
33
0
#define DYNAMIC_CMD_SO_PATH ENGINE_CMD_BASE
34
0
#define DYNAMIC_CMD_NO_VCHECK (ENGINE_CMD_BASE + 1)
35
0
#define DYNAMIC_CMD_ID (ENGINE_CMD_BASE + 2)
36
0
#define DYNAMIC_CMD_LIST_ADD (ENGINE_CMD_BASE + 3)
37
0
#define DYNAMIC_CMD_DIR_LOAD (ENGINE_CMD_BASE + 4)
38
0
#define DYNAMIC_CMD_DIR_ADD (ENGINE_CMD_BASE + 5)
39
0
#define DYNAMIC_CMD_LOAD (ENGINE_CMD_BASE + 6)
40
41
/* The constants used when creating the ENGINE */
42
static const char *engine_dynamic_id = "dynamic";
43
static const char *engine_dynamic_name = "Dynamic engine loading support";
44
static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = {
45
    { DYNAMIC_CMD_SO_PATH,
46
        "SO_PATH",
47
        "Specifies the path to the new ENGINE shared library",
48
        ENGINE_CMD_FLAG_STRING },
49
    { DYNAMIC_CMD_NO_VCHECK,
50
        "NO_VCHECK",
51
        "Specifies to continue even if version checking fails (boolean)",
52
        ENGINE_CMD_FLAG_NUMERIC },
53
    { DYNAMIC_CMD_ID,
54
        "ID",
55
        "Specifies an ENGINE id name for loading",
56
        ENGINE_CMD_FLAG_STRING },
57
    { DYNAMIC_CMD_LIST_ADD,
58
        "LIST_ADD",
59
        "Whether to add a loaded ENGINE to the internal list (0=no,1=yes,2=mandatory)",
60
        ENGINE_CMD_FLAG_NUMERIC },
61
    { DYNAMIC_CMD_DIR_LOAD,
62
        "DIR_LOAD",
63
        "Specifies whether to load from 'DIR_ADD' directories (0=no,1=yes,2=mandatory)",
64
        ENGINE_CMD_FLAG_NUMERIC },
65
    { DYNAMIC_CMD_DIR_ADD,
66
        "DIR_ADD",
67
        "Adds a directory from which ENGINEs can be loaded",
68
        ENGINE_CMD_FLAG_STRING },
69
    { DYNAMIC_CMD_LOAD,
70
        "LOAD",
71
        "Load up the ENGINE specified by other settings",
72
        ENGINE_CMD_FLAG_NO_INPUT },
73
    { 0, NULL, NULL, 0 }
74
};
75
76
/*
77
 * Loading code stores state inside the ENGINE structure via the "ex_data"
78
 * element. We load all our state into a single structure and use that as a
79
 * single context in the "ex_data" stack.
80
 */
81
struct st_dynamic_data_ctx {
82
    /* The DSO object we load that supplies the ENGINE code */
83
    DSO *dynamic_dso;
84
    /*
85
     * The function pointer to the version checking shared library function
86
     */
87
    dynamic_v_check_fn v_check;
88
    /*
89
     * The function pointer to the engine-binding shared library function
90
     */
91
    dynamic_bind_engine bind_engine;
92
    /* The default name/path for loading the shared library */
93
    char *DYNAMIC_LIBNAME;
94
    /* Whether to continue loading on a version check failure */
95
    int no_vcheck;
96
    /* If non-NULL, stipulates the 'id' of the ENGINE to be loaded */
97
    char *engine_id;
98
    /*
99
     * If non-zero, a successfully loaded ENGINE should be added to the
100
     * internal ENGINE list. If 2, the add must succeed or the entire load
101
     * should fail.
102
     */
103
    int list_add_value;
104
    /* The symbol name for the version checking function */
105
    const char *DYNAMIC_F1;
106
    /* The symbol name for the "initialise ENGINE structure" function */
107
    const char *DYNAMIC_F2;
108
    /*
109
     * Whether to never use 'dirs', use 'dirs' as a fallback, or only use
110
     * 'dirs' for loading. Default is to use 'dirs' as a fallback.
111
     */
112
    int dir_load;
113
    /* A stack of directories from which ENGINEs could be loaded */
114
    STACK_OF(OPENSSL_STRING) *dirs;
115
};
116
117
/*
118
 * This is the "ex_data" index we obtain and reserve for use with our context
119
 * structure.
120
 */
121
static int dynamic_ex_data_idx = -1;
122
123
static void int_free_str(char *s)
124
0
{
125
0
    OPENSSL_free(s);
126
0
}
127
128
/*
129
 * Because our ex_data element may or may not get allocated depending on
130
 * whether a "first-use" occurs before the ENGINE is freed, we have a memory
131
 * leak problem to solve. We can't declare a "new" handler for the ex_data as
132
 * we don't want a dynamic_data_ctx in *all* ENGINE structures of all types
133
 * (this is a bug in the design of CRYPTO_EX_DATA). As such, we just declare
134
 * a "free" handler and that will get called if an ENGINE is being destroyed
135
 * and there was an ex_data element corresponding to our context type.
136
 */
137
static void dynamic_data_ctx_free_func(void *parent, void *ptr,
138
    CRYPTO_EX_DATA *ad, int idx, long argl,
139
    void *argp)
140
0
{
141
0
    if (ptr) {
142
0
        dynamic_data_ctx *ctx = (dynamic_data_ctx *)ptr;
143
0
        DSO_free(ctx->dynamic_dso);
144
0
        OPENSSL_free(ctx->DYNAMIC_LIBNAME);
145
0
        OPENSSL_free(ctx->engine_id);
146
0
        sk_OPENSSL_STRING_pop_free(ctx->dirs, int_free_str);
147
0
        OPENSSL_free(ctx);
148
0
    }
149
0
}
150
151
/*
152
 * Construct the per-ENGINE context. We create it blindly and then use a lock
153
 * to check for a race - if so, all but one of the threads "racing" will have
154
 * wasted their time. The alternative involves creating everything inside the
155
 * lock which is far worse.
156
 */
157
static int dynamic_set_data_ctx(ENGINE *e, dynamic_data_ctx **ctx)
158
0
{
159
0
    dynamic_data_ctx *c = OPENSSL_zalloc(sizeof(*c));
160
0
    int ret = 0;
161
162
0
    if (c == NULL) {
163
0
        ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
164
0
        return 0;
165
0
    }
166
0
    c->dirs = sk_OPENSSL_STRING_new_null();
167
0
    if (c->dirs == NULL) {
168
0
        ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
169
0
        goto end;
170
0
    }
171
0
    c->DYNAMIC_F1 = "v_check";
172
0
    c->DYNAMIC_F2 = "bind_engine";
173
0
    c->dir_load = 1;
174
0
    if (!CRYPTO_THREAD_write_lock(global_engine_lock))
175
0
        goto end;
176
0
    if ((*ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e,
177
0
             dynamic_ex_data_idx))
178
0
        == NULL) {
179
        /* Good, we're the first */
180
0
        ret = ENGINE_set_ex_data(e, dynamic_ex_data_idx, c);
181
0
        if (ret) {
182
0
            *ctx = c;
183
0
            c = NULL;
184
0
        }
185
0
    }
186
0
    CRYPTO_THREAD_unlock(global_engine_lock);
187
0
    ret = 1;
188
    /*
189
     * If we lost the race to set the context, c is non-NULL and *ctx is the
190
     * context of the thread that won.
191
     */
192
0
end:
193
0
    if (c != NULL)
194
0
        sk_OPENSSL_STRING_free(c->dirs);
195
0
    OPENSSL_free(c);
196
0
    return ret;
197
0
}
198
199
/*
200
 * This function retrieves the context structure from an ENGINE's "ex_data",
201
 * or if it doesn't exist yet, sets it up.
202
 */
203
static dynamic_data_ctx *dynamic_get_data_ctx(ENGINE *e)
204
0
{
205
0
    dynamic_data_ctx *ctx;
206
0
    if (dynamic_ex_data_idx < 0) {
207
        /*
208
         * Create and register the ENGINE ex_data, and associate our "free"
209
         * function with it to ensure any allocated contexts get freed when
210
         * an ENGINE goes underground.
211
         */
212
0
        int new_idx = ENGINE_get_ex_new_index(0, NULL, NULL, NULL,
213
0
            dynamic_data_ctx_free_func);
214
0
        if (new_idx == -1) {
215
0
            ERR_raise(ERR_LIB_ENGINE, ENGINE_R_NO_INDEX);
216
0
            return NULL;
217
0
        }
218
0
        if (!CRYPTO_THREAD_write_lock(global_engine_lock))
219
0
            return NULL;
220
        /* Avoid a race by checking again inside this lock */
221
0
        if (dynamic_ex_data_idx < 0) {
222
            /* Good, someone didn't beat us to it */
223
0
            dynamic_ex_data_idx = new_idx;
224
0
            new_idx = -1;
225
0
        }
226
0
        CRYPTO_THREAD_unlock(global_engine_lock);
227
        /*
228
         * In theory we could "give back" the index here if (new_idx>-1), but
229
         * it's not possible and wouldn't gain us much if it were.
230
         */
231
0
    }
232
0
    ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, dynamic_ex_data_idx);
233
    /* Check if the context needs to be created */
234
0
    if ((ctx == NULL) && !dynamic_set_data_ctx(e, &ctx))
235
        /* "set_data" will set errors if necessary */
236
0
        return NULL;
237
0
    return ctx;
238
0
}
239
240
static ENGINE *engine_dynamic(void)
241
0
{
242
0
    ENGINE *ret = ENGINE_new();
243
0
    if (ret == NULL)
244
0
        return NULL;
245
0
    if (!ENGINE_set_id(ret, engine_dynamic_id) || !ENGINE_set_name(ret, engine_dynamic_name) || !ENGINE_set_init_function(ret, dynamic_init) || !ENGINE_set_finish_function(ret, dynamic_finish) || !ENGINE_set_ctrl_function(ret, dynamic_ctrl) || !ENGINE_set_flags(ret, ENGINE_FLAGS_BY_ID_COPY) || !ENGINE_set_cmd_defns(ret, dynamic_cmd_defns)) {
246
0
        ENGINE_free(ret);
247
0
        return NULL;
248
0
    }
249
0
    return ret;
250
0
}
251
252
void engine_load_dynamic_int(void)
253
0
{
254
0
    ENGINE *toadd = engine_dynamic();
255
0
    if (!toadd)
256
0
        return;
257
258
0
    ERR_set_mark();
259
0
    ENGINE_add(toadd);
260
    /*
261
     * If the "add" worked, it gets a structural reference. So either way, we
262
     * release our just-created reference.
263
     */
264
0
    ENGINE_free(toadd);
265
    /*
266
     * If the "add" didn't work, it was probably a conflict because it was
267
     * already added (eg. someone calling ENGINE_load_blah then calling
268
     * ENGINE_load_builtin_engines() perhaps).
269
     */
270
0
    ERR_pop_to_mark();
271
0
}
272
273
static int dynamic_init(ENGINE *e)
274
0
{
275
    /*
276
     * We always return failure - the "dynamic" engine itself can't be used
277
     * for anything.
278
     */
279
0
    return 0;
280
0
}
281
282
static int dynamic_finish(ENGINE *e)
283
0
{
284
    /*
285
     * This should never be called on account of "dynamic_init" always
286
     * failing.
287
     */
288
0
    return 0;
289
0
}
290
291
static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void))
292
0
{
293
0
    dynamic_data_ctx *ctx = dynamic_get_data_ctx(e);
294
0
    int initialised;
295
296
0
    if (!ctx) {
297
0
        ERR_raise(ERR_LIB_ENGINE, ENGINE_R_NOT_LOADED);
298
0
        return 0;
299
0
    }
300
0
    initialised = ((ctx->dynamic_dso == NULL) ? 0 : 1);
301
    /* All our control commands require the ENGINE to be uninitialised */
302
0
    if (initialised) {
303
0
        ERR_raise(ERR_LIB_ENGINE, ENGINE_R_ALREADY_LOADED);
304
0
        return 0;
305
0
    }
306
0
    switch (cmd) {
307
0
    case DYNAMIC_CMD_SO_PATH:
308
        /* a NULL 'p' or a string of zero-length is the same thing */
309
0
        if (p && (strlen((const char *)p) < 1))
310
0
            p = NULL;
311
0
        OPENSSL_free(ctx->DYNAMIC_LIBNAME);
312
0
        if (p)
313
0
            ctx->DYNAMIC_LIBNAME = OPENSSL_strdup(p);
314
0
        else
315
0
            ctx->DYNAMIC_LIBNAME = NULL;
316
0
        return (ctx->DYNAMIC_LIBNAME ? 1 : 0);
317
0
    case DYNAMIC_CMD_NO_VCHECK:
318
0
        ctx->no_vcheck = ((i == 0) ? 0 : 1);
319
0
        return 1;
320
0
    case DYNAMIC_CMD_ID:
321
        /* a NULL 'p' or a string of zero-length is the same thing */
322
0
        if (p && (strlen((const char *)p) < 1))
323
0
            p = NULL;
324
0
        OPENSSL_free(ctx->engine_id);
325
0
        if (p)
326
0
            ctx->engine_id = OPENSSL_strdup(p);
327
0
        else
328
0
            ctx->engine_id = NULL;
329
0
        return (ctx->engine_id ? 1 : 0);
330
0
    case DYNAMIC_CMD_LIST_ADD:
331
0
        if ((i < 0) || (i > 2)) {
332
0
            ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INVALID_ARGUMENT);
333
0
            return 0;
334
0
        }
335
0
        ctx->list_add_value = (int)i;
336
0
        return 1;
337
0
    case DYNAMIC_CMD_LOAD:
338
0
        return dynamic_load(e, ctx);
339
0
    case DYNAMIC_CMD_DIR_LOAD:
340
0
        if ((i < 0) || (i > 2)) {
341
0
            ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INVALID_ARGUMENT);
342
0
            return 0;
343
0
        }
344
0
        ctx->dir_load = (int)i;
345
0
        return 1;
346
0
    case DYNAMIC_CMD_DIR_ADD:
347
        /* a NULL 'p' or a string of zero-length is the same thing */
348
0
        if (p == NULL || (strlen((const char *)p) < 1)) {
349
0
            ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INVALID_ARGUMENT);
350
0
            return 0;
351
0
        }
352
0
        {
353
0
            char *tmp_str = OPENSSL_strdup(p);
354
0
            if (tmp_str == NULL) {
355
0
                ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
356
0
                return 0;
357
0
            }
358
0
            if (!sk_OPENSSL_STRING_push(ctx->dirs, tmp_str)) {
359
0
                OPENSSL_free(tmp_str);
360
0
                ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
361
0
                return 0;
362
0
            }
363
0
        }
364
0
        return 1;
365
0
    default:
366
0
        break;
367
0
    }
368
0
    ERR_raise(ERR_LIB_ENGINE, ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED);
369
0
    return 0;
370
0
}
371
372
static int int_load(dynamic_data_ctx *ctx)
373
0
{
374
0
    int num, loop;
375
    /* Unless told not to, try a direct load */
376
0
    if ((ctx->dir_load != 2) && (DSO_load(ctx->dynamic_dso, ctx->DYNAMIC_LIBNAME, NULL, 0)) != NULL)
377
0
        return 1;
378
    /* If we're not allowed to use 'dirs' or we have none, fail */
379
0
    if (!ctx->dir_load || (num = sk_OPENSSL_STRING_num(ctx->dirs)) < 1)
380
0
        return 0;
381
0
    for (loop = 0; loop < num; loop++) {
382
0
        const char *s = sk_OPENSSL_STRING_value(ctx->dirs, loop);
383
0
        char *merge = DSO_merge(ctx->dynamic_dso, ctx->DYNAMIC_LIBNAME, s);
384
0
        if (!merge)
385
0
            return 0;
386
0
        if (DSO_load(ctx->dynamic_dso, merge, NULL, 0)) {
387
            /* Found what we're looking for */
388
0
            OPENSSL_free(merge);
389
0
            return 1;
390
0
        }
391
0
        OPENSSL_free(merge);
392
0
    }
393
0
    return 0;
394
0
}
395
396
/*
397
 * Unfortunately the version checker does not distinguish between
398
 * engines built for openssl 1.1.x and openssl 3.x, but loading
399
 * an engine that is built for openssl 1.1.x will cause a fatal
400
 * error.  Detect such engines, since EVP_PKEY_base_id is exported
401
 * as a function in openssl 1.1.x, while it is named EVP_PKEY_get_base_id
402
 * in openssl 3.x.  Therefore we take the presence of that symbol
403
 * as an indication that the engine will be incompatible.
404
 */
405
static int using_libcrypto_11(dynamic_data_ctx *ctx)
406
0
{
407
0
    int ret;
408
409
0
    ERR_set_mark();
410
0
    ret = DSO_bind_func(ctx->dynamic_dso, "EVP_PKEY_base_id") != NULL;
411
0
    ERR_pop_to_mark();
412
413
0
    return ret;
414
0
}
415
416
static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx)
417
0
{
418
0
    ENGINE cpy;
419
0
    dynamic_fns fns;
420
421
0
    if (ctx->dynamic_dso == NULL)
422
0
        ctx->dynamic_dso = DSO_new();
423
0
    if (ctx->dynamic_dso == NULL)
424
0
        return 0;
425
0
    if (!ctx->DYNAMIC_LIBNAME) {
426
0
        if (!ctx->engine_id)
427
0
            return 0;
428
0
        DSO_ctrl(ctx->dynamic_dso, DSO_CTRL_SET_FLAGS,
429
0
            DSO_FLAG_NAME_TRANSLATION_EXT_ONLY, NULL);
430
0
        ctx->DYNAMIC_LIBNAME = DSO_convert_filename(ctx->dynamic_dso, ctx->engine_id);
431
0
    }
432
0
    if (!int_load(ctx)) {
433
0
        ERR_raise(ERR_LIB_ENGINE, ENGINE_R_DSO_NOT_FOUND);
434
0
        DSO_free(ctx->dynamic_dso);
435
0
        ctx->dynamic_dso = NULL;
436
0
        return 0;
437
0
    }
438
    /* We have to find a bind function otherwise it'll always end badly */
439
0
    if (!(ctx->bind_engine = (dynamic_bind_engine)DSO_bind_func(ctx->dynamic_dso,
440
0
              ctx->DYNAMIC_F2))) {
441
0
        ctx->bind_engine = NULL;
442
0
        DSO_free(ctx->dynamic_dso);
443
0
        ctx->dynamic_dso = NULL;
444
0
        ERR_raise(ERR_LIB_ENGINE, ENGINE_R_DSO_FAILURE);
445
0
        return 0;
446
0
    }
447
    /* Do we perform version checking? */
448
0
    if (!ctx->no_vcheck) {
449
0
        unsigned long vcheck_res = 0;
450
        /*
451
         * Now we try to find a version checking function and decide how to
452
         * cope with failure if/when it fails.
453
         */
454
0
        ctx->v_check = (dynamic_v_check_fn)DSO_bind_func(ctx->dynamic_dso,
455
0
            ctx->DYNAMIC_F1);
456
0
        if (ctx->v_check)
457
0
            vcheck_res = ctx->v_check(OSSL_DYNAMIC_VERSION);
458
        /*
459
         * We fail if the version checker veto'd the load *or* if it is
460
         * deferring to us (by returning its version) and we think it is too
461
         * old. Also fail if this is engine for openssl 1.1.x.
462
         */
463
0
        if (vcheck_res < OSSL_DYNAMIC_OLDEST || using_libcrypto_11(ctx)) {
464
            /* Fail */
465
0
            ctx->bind_engine = NULL;
466
0
            ctx->v_check = NULL;
467
0
            DSO_free(ctx->dynamic_dso);
468
0
            ctx->dynamic_dso = NULL;
469
0
            ERR_raise(ERR_LIB_ENGINE, ENGINE_R_VERSION_INCOMPATIBILITY);
470
0
            return 0;
471
0
        }
472
0
    }
473
    /*
474
     * First binary copy the ENGINE structure so that we can roll back if the
475
     * hand-over fails
476
     */
477
0
    memcpy(&cpy, e, sizeof(ENGINE));
478
    /*
479
     * Provide the ERR, "ex_data", memory, and locking callbacks so the
480
     * loaded library uses our state rather than its own. FIXME: As noted in
481
     * engine.h, much of this would be simplified if each area of code
482
     * provided its own "summary" structure of all related callbacks. It
483
     * would also increase opaqueness.
484
     */
485
0
    fns.static_state = ENGINE_get_static_state();
486
0
    CRYPTO_get_mem_functions(&fns.mem_fns.malloc_fn, &fns.mem_fns.realloc_fn,
487
0
        &fns.mem_fns.free_fn);
488
    /*
489
     * Now that we've loaded the dynamic engine, make sure no "dynamic"
490
     * ENGINE elements will show through.
491
     */
492
0
    engine_set_all_null(e);
493
494
    /* Try to bind the ENGINE onto our own ENGINE structure */
495
0
    if (!engine_add_dynamic_id(e, (ENGINE_DYNAMIC_ID)ctx->bind_engine, 1)
496
0
        || !ctx->bind_engine(e, ctx->engine_id, &fns)) {
497
0
        engine_remove_dynamic_id(e, 1);
498
0
        ctx->bind_engine = NULL;
499
0
        ctx->v_check = NULL;
500
0
        DSO_free(ctx->dynamic_dso);
501
0
        ctx->dynamic_dso = NULL;
502
0
        ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INIT_FAILED);
503
        /* Copy the original ENGINE structure back */
504
0
        memcpy(e, &cpy, sizeof(ENGINE));
505
0
        return 0;
506
0
    }
507
    /* Do we try to add this ENGINE to the internal list too? */
508
0
    if (ctx->list_add_value > 0) {
509
0
        if (!ENGINE_add(e)) {
510
            /* Do we tolerate this or fail? */
511
0
            if (ctx->list_add_value > 1) {
512
                /*
513
                 * Fail - NB: By this time, it's too late to rollback, and
514
                 * trying to do so allows the bind_engine() code to have
515
                 * created leaks. We just have to fail where we are, after
516
                 * the ENGINE has changed.
517
                 */
518
0
                ERR_raise(ERR_LIB_ENGINE, ENGINE_R_CONFLICTING_ENGINE_ID);
519
0
                return 0;
520
0
            }
521
            /* Tolerate */
522
0
            ERR_clear_error();
523
0
        }
524
0
    }
525
0
    return 1;
526
0
}