blob: 36ab9bde23cfc8adad40b61c8ca41b9437d02af1 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Valerio Settib4f50762024-01-17 10:24:52 +01002#include "debug_internal.h"
Mohammad Azim Khan67735d52017-04-06 11:55:43 +01003#include "string.h"
Valerio Setti1b08d422023-02-13 11:33:26 +01004#include "mbedtls/pk.h"
Yanray Wang5b60b422023-12-01 17:20:22 +08005#include <test/ssl_helpers.h>
Paul Bakker1f761152010-02-18 18:16:31 +00006
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +01007#if defined(_WIN32)
8# include <stdlib.h>
9# include <crtdbg.h>
10#endif
11
Bence Szépkúti154066d2025-03-02 00:58:11 +010012// Use a macro instead of sizeof(mbedtls_ms_time_t) because the expression store
13// doesn't exclude entries based on depends_on headers, which would cause failures
14// in builds without MBEDTLS_HAVE_TIME
15#if defined(MBEDTLS_PLATFORM_MS_TIME_TYPE_MACRO)
16# define MBEDTLS_MS_TIME_SIZE sizeof(MBEDTLS_PLATFORM_MS_TIME_TYPE_MACRO)
17#else
18# define MBEDTLS_MS_TIME_SIZE sizeof(int64_t)
19#endif
20
Gilles Peskine449bd832023-01-11 14:50:10 +010021struct buffer_data {
Paul Bakker1f761152010-02-18 18:16:31 +000022 char buf[2000];
23 char *ptr;
24};
25
Bence Szépkúti12210522025-02-28 16:22:33 +010026#if defined(MBEDTLS_SSL_TLS_C)
Michael Schuster54300d42024-06-04 02:30:22 +020027static void string_debug(void *data, int level, const char *file, int line, const char *str)
Paul Bakker1f761152010-02-18 18:16:31 +000028{
29 struct buffer_data *buffer = (struct buffer_data *) data;
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020030 char *p = buffer->ptr;
Paul Bakker26b41a82011-07-13 14:53:58 +000031 ((void) level);
Paul Bakker1f761152010-02-18 18:16:31 +000032
Gilles Peskine449bd832023-01-11 14:50:10 +010033 memcpy(p, file, strlen(file));
34 p += strlen(file);
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020035
36 *p++ = '(';
Gilles Peskine449bd832023-01-11 14:50:10 +010037 *p++ = '0' + (line / 1000) % 10;
38 *p++ = '0' + (line / 100) % 10;
39 *p++ = '0' + (line / 10) % 10;
40 *p++ = '0' + (line / 1) % 10;
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020041 *p++ = ')';
42 *p++ = ':';
43 *p++ = ' ';
44
Manuel Pégourié-Gonnard7b23c512015-08-31 16:11:00 +020045#if defined(MBEDTLS_THREADING_C)
46 /* Skip "thread ID" (up to the first space) as it is not predictable */
Gilles Peskine449bd832023-01-11 14:50:10 +010047 while (*str++ != ' ') {
48 ;
49 }
Manuel Pégourié-Gonnard7b23c512015-08-31 16:11:00 +020050#endif
51
Gilles Peskine449bd832023-01-11 14:50:10 +010052 memcpy(p, str, strlen(str));
53 p += strlen(str);
Paul Bakker92478c32014-04-25 15:18:34 +020054
55 /* Detect if debug messages output partial lines and mark them */
Gilles Peskine449bd832023-01-11 14:50:10 +010056 if (p[-1] != '\n') {
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020057 *p++ = '*';
Gilles Peskine449bd832023-01-11 14:50:10 +010058 }
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020059
60 buffer->ptr = p;
Paul Bakker1f761152010-02-18 18:16:31 +000061}
Bence Szépkúti12210522025-02-28 16:22:33 +010062#endif /* MBEDTLS_SSL_TLS_C */
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +010063
64#if defined(_WIN32)
65static void noop_invalid_parameter_handler(
66 const wchar_t *expression,
67 const wchar_t *function,
68 const wchar_t *file,
69 unsigned int line,
70 uintptr_t pReserved)
71{
72 (void) expression;
73 (void) function;
74 (void) file;
75 (void) line;
76 (void) pReserved;
77}
78#endif /* _WIN32 */
79
Paul Bakker33b43f12013-08-20 11:48:36 +020080/* END_HEADER */
Paul Bakker1f761152010-02-18 18:16:31 +000081
Paul Bakker33b43f12013-08-20 11:48:36 +020082/* BEGIN_DEPENDENCIES
Bence Szépkúti12210522025-02-28 16:22:33 +010083 * depends_on:MBEDTLS_DEBUG_C
Paul Bakker33b43f12013-08-20 11:48:36 +020084 * END_DEPENDENCIES
85 */
Paul Bakker5690efc2011-05-26 13:16:06 +000086
Bence Szépkútic6a8bf02025-02-28 22:32:15 +010087/* BEGIN_CASE */
88void printf_int_expr(intmax_t smuggle_format_expr, /* TODO: teach test framework about string expressions */
89 intmax_t sizeof_x, intmax_t x, char *result)
90{
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +010091#if defined(_WIN32)
92 /* Windows treats any invalid format specifiers passsed to the CRT as fatal assertion failures.
93 Disable this behaviour temporarily, so the rest of the test cases can complete. */
94 _invalid_parameter_handler saved_handler =
95 _set_invalid_parameter_handler(noop_invalid_parameter_handler);
96
97 // Disable assertion pop-up window in Debug builds
98 int saved_report_mode = _CrtSetReportMode(_CRT_ASSERT, _CRTDBG_REPORT_MODE);
99 _CrtSetReportMode(_CRT_ASSERT, _CRTDBG_MODE_DEBUG);
100#endif
101
Bence Szépkútic6a8bf02025-02-28 22:32:15 +0100102 const char *format = (char *) ((uintptr_t) smuggle_format_expr);
103 char *output = NULL;
104 const size_t n = strlen(result);
105
106 /* Nominal case: buffer just large enough */
107 TEST_CALLOC(output, n + 1);
108 if ((size_t) sizeof_x <= sizeof(int)) { // Any smaller integers would be promoted to an int due to calling a vararg function
109 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (int) x));
110 } else if (sizeof_x == sizeof(long)) {
111 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long) x));
112 } else if (sizeof_x == sizeof(long long)) {
113 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long long) x));
114 } else {
115 TEST_FAIL(
116 "sizeof_x <= sizeof(int) || sizeof_x == sizeof(long) || sizeof_x == sizeof(long long)");
117 }
118 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1);
119
120exit:
121 mbedtls_free(output);
122 output = NULL;
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +0100123
124#if defined(_WIN32)
125 // Restore default Windows behaviour
126 _set_invalid_parameter_handler(saved_handler);
127 _CrtSetReportMode(_CRT_ASSERT, saved_report_mode);
128 (void) saved_report_mode;
129#endif
Bence Szépkútic6a8bf02025-02-28 22:32:15 +0100130}
131/* END_CASE */
132
Bence Szépkúti12210522025-02-28 16:22:33 +0100133/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100134void debug_print_msg_threshold(int threshold, int level, char *file,
135 int line, char *result_str)
Paul Bakkerc73079a2014-04-25 16:34:30 +0200136{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200137 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200138 mbedtls_ssl_config conf;
Paul Bakkerc73079a2014-04-25 16:34:30 +0200139 struct buffer_data buffer;
140
Gilles Peskine449bd832023-01-11 14:50:10 +0100141 mbedtls_ssl_init(&ssl);
142 mbedtls_ssl_config_init(&conf);
Valerio Setti3a994b72024-07-03 16:58:10 +0200143 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100144 memset(buffer.buf, 0, 2000);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200145 buffer.ptr = buffer.buf;
146
Yanray Wangaad94492023-12-04 10:42:06 +0800147 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
148 MBEDTLS_SSL_IS_CLIENT,
149 MBEDTLS_SSL_TRANSPORT_STREAM,
150 MBEDTLS_SSL_PRESET_DEFAULT),
151 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100152 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100153 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Jerry Yub19ccc32021-08-09 17:44:56 +0800154
Gilles Peskine449bd832023-01-11 14:50:10 +0100155 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200156
Gilles Peskine449bd832023-01-11 14:50:10 +0100157 mbedtls_debug_set_threshold(threshold);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200158
Gilles Peskine449bd832023-01-11 14:50:10 +0100159 mbedtls_debug_print_msg(&ssl, level, file, line,
160 "Text message, 2 == %d", 2);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200161
Gilles Peskine449bd832023-01-11 14:50:10 +0100162 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200163
164exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100165 mbedtls_ssl_free(&ssl);
166 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200167 MD_OR_USE_PSA_DONE();
Paul Bakkerc73079a2014-04-25 16:34:30 +0200168}
169/* END_CASE */
170
Bence Szépkúti12210522025-02-28 16:22:33 +0100171/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100172void mbedtls_debug_print_ret(char *file, int line, char *text, int value,
173 char *result_str)
Paul Bakker57ffa552014-04-25 14:29:10 +0200174{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200175 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200176 mbedtls_ssl_config conf;
Paul Bakker57ffa552014-04-25 14:29:10 +0200177 struct buffer_data buffer;
178
Gilles Peskine449bd832023-01-11 14:50:10 +0100179 mbedtls_ssl_init(&ssl);
180 mbedtls_ssl_config_init(&conf);
Valerio Setti3a994b72024-07-03 16:58:10 +0200181 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100182 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200183 buffer.ptr = buffer.buf;
184
Yanray Wangaad94492023-12-04 10:42:06 +0800185 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
186 MBEDTLS_SSL_IS_CLIENT,
187 MBEDTLS_SSL_TRANSPORT_STREAM,
188 MBEDTLS_SSL_PRESET_DEFAULT),
189 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100190 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100191 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker57ffa552014-04-25 14:29:10 +0200192
Gilles Peskine449bd832023-01-11 14:50:10 +0100193 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800194
Gilles Peskine449bd832023-01-11 14:50:10 +0100195 mbedtls_debug_print_ret(&ssl, 0, file, line, text, value);
Paul Bakker57ffa552014-04-25 14:29:10 +0200196
Gilles Peskine449bd832023-01-11 14:50:10 +0100197 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200198
199exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100200 mbedtls_ssl_free(&ssl);
201 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200202 MD_OR_USE_PSA_DONE();
Paul Bakker57ffa552014-04-25 14:29:10 +0200203}
204/* END_CASE */
205
Bence Szépkúti12210522025-02-28 16:22:33 +0100206/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100207void mbedtls_debug_print_buf(char *file, int line, char *text,
208 data_t *data, char *result_str)
Paul Bakker57ffa552014-04-25 14:29:10 +0200209{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200210 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200211 mbedtls_ssl_config conf;
Paul Bakker57ffa552014-04-25 14:29:10 +0200212 struct buffer_data buffer;
Paul Bakker57ffa552014-04-25 14:29:10 +0200213
Gilles Peskine449bd832023-01-11 14:50:10 +0100214 mbedtls_ssl_init(&ssl);
215 mbedtls_ssl_config_init(&conf);
Valerio Setti3a994b72024-07-03 16:58:10 +0200216 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100217 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200218 buffer.ptr = buffer.buf;
219
Yanray Wangaad94492023-12-04 10:42:06 +0800220 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
221 MBEDTLS_SSL_IS_CLIENT,
222 MBEDTLS_SSL_TRANSPORT_STREAM,
223 MBEDTLS_SSL_PRESET_DEFAULT),
224 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100225 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100226 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker57ffa552014-04-25 14:29:10 +0200227
Gilles Peskine449bd832023-01-11 14:50:10 +0100228 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800229
Gilles Peskine449bd832023-01-11 14:50:10 +0100230 mbedtls_debug_print_buf(&ssl, 0, file, line, text, data->x, data->len);
Paul Bakker57ffa552014-04-25 14:29:10 +0200231
Gilles Peskine449bd832023-01-11 14:50:10 +0100232 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200233
234exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100235 mbedtls_ssl_free(&ssl);
236 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200237 MD_OR_USE_PSA_DONE();
Paul Bakker57ffa552014-04-25 14:29:10 +0200238}
239/* END_CASE */
240
Bence Szépkúti12210522025-02-28 16:22:33 +0100241/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_FS_IO:MBEDTLS_X509_CRT_PARSE_C:!MBEDTLS_X509_REMOVE_INFO */
Gilles Peskine449bd832023-01-11 14:50:10 +0100242void mbedtls_debug_print_crt(char *crt_file, char *file, int line,
243 char *prefix, char *result_str)
Paul Bakker1f761152010-02-18 18:16:31 +0000244{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200245 mbedtls_x509_crt crt;
246 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200247 mbedtls_ssl_config conf;
Paul Bakker1f761152010-02-18 18:16:31 +0000248 struct buffer_data buffer;
249
Gilles Peskine449bd832023-01-11 14:50:10 +0100250 mbedtls_ssl_init(&ssl);
251 mbedtls_ssl_config_init(&conf);
252 mbedtls_x509_crt_init(&crt);
Valerio Setti92c3f362023-05-17 15:36:44 +0200253 MD_OR_USE_PSA_INIT();
254
Gilles Peskine449bd832023-01-11 14:50:10 +0100255 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200256 buffer.ptr = buffer.buf;
Paul Bakker1f761152010-02-18 18:16:31 +0000257
Yanray Wangaad94492023-12-04 10:42:06 +0800258 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
259 MBEDTLS_SSL_IS_CLIENT,
260 MBEDTLS_SSL_TRANSPORT_STREAM,
261 MBEDTLS_SSL_PRESET_DEFAULT),
262 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100263 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100264 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker1f761152010-02-18 18:16:31 +0000265
Gilles Peskine449bd832023-01-11 14:50:10 +0100266 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800267
Gilles Peskine449bd832023-01-11 14:50:10 +0100268 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
269 mbedtls_debug_print_crt(&ssl, 0, file, line, prefix, &crt);
Paul Bakker1f761152010-02-18 18:16:31 +0000270
Gilles Peskine449bd832023-01-11 14:50:10 +0100271 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Paul Bakker58ef6ec2013-01-03 11:33:48 +0100272
Paul Bakkerbd51b262014-07-10 15:26:12 +0200273exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 mbedtls_x509_crt_free(&crt);
275 mbedtls_ssl_free(&ssl);
276 mbedtls_ssl_config_free(&conf);
Valerio Setti92c3f362023-05-17 15:36:44 +0200277 MD_OR_USE_PSA_DONE();
Paul Bakker1f761152010-02-18 18:16:31 +0000278}
Paul Bakker33b43f12013-08-20 11:48:36 +0200279/* END_CASE */
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000280
Bence Szépkúti12210522025-02-28 16:22:33 +0100281/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_BIGNUM_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100282void mbedtls_debug_print_mpi(char *value, char *file, int line,
283 char *prefix, char *result_str)
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000284{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200285 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200286 mbedtls_ssl_config conf;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000287 struct buffer_data buffer;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200288 mbedtls_mpi val;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000289
Gilles Peskine449bd832023-01-11 14:50:10 +0100290 mbedtls_ssl_init(&ssl);
291 mbedtls_ssl_config_init(&conf);
292 mbedtls_mpi_init(&val);
Valerio Setti3a994b72024-07-03 16:58:10 +0200293 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100294 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200295 buffer.ptr = buffer.buf;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000296
Yanray Wangaad94492023-12-04 10:42:06 +0800297 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
298 MBEDTLS_SSL_IS_CLIENT,
299 MBEDTLS_SSL_TRANSPORT_STREAM,
300 MBEDTLS_SSL_PRESET_DEFAULT),
301 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100302 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100303 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Jerry Yub19ccc32021-08-09 17:44:56 +0800304
Gilles Peskine449bd832023-01-11 14:50:10 +0100305 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200306
Gilles Peskine449bd832023-01-11 14:50:10 +0100307 TEST_ASSERT(mbedtls_test_read_mpi(&val, value) == 0);
Paul Bakkereaebbd52014-04-25 15:04:14 +0200308
Gilles Peskine449bd832023-01-11 14:50:10 +0100309 mbedtls_debug_print_mpi(&ssl, 0, file, line, prefix, &val);
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000310
Gilles Peskine449bd832023-01-11 14:50:10 +0100311 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Paul Bakker6c591fa2011-05-05 11:49:20 +0000312
Paul Bakkerbd51b262014-07-10 15:26:12 +0200313exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 mbedtls_mpi_free(&val);
315 mbedtls_ssl_free(&ssl);
316 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200317 MD_OR_USE_PSA_DONE();
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000318}
Paul Bakker33b43f12013-08-20 11:48:36 +0200319/* END_CASE */