Home | History | Annotate | Download | only in lib
      1 /***************************************************************************
      2  *                                  _   _ ____  _
      3  *  Project                     ___| | | |  _ \| |
      4  *                             / __| | | | |_) | |
      5  *                            | (__| |_| |  _ <| |___
      6  *                             \___|\___/|_| \_\_____|
      7  *
      8  * Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel (at) haxx.se>, et al.
      9  *
     10  * This software is licensed as described in the file COPYING, which
     11  * you should have received as part of this distribution. The terms
     12  * are also available at https://curl.haxx.se/docs/copyright.html.
     13  *
     14  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
     15  * copies of the Software, and permit persons to whom the Software is
     16  * furnished to do so, under the terms of the COPYING file.
     17  *
     18  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
     19  * KIND, either express or implied.
     20  *
     21  ***************************************************************************/
     22 
     23 #include "curl_setup.h"
     24 
     25 #ifndef CURL_DISABLE_CRYPTO_AUTH
     26 
     27 #include <curl/curl.h>
     28 
     29 #include "curl_md5.h"
     30 #include "curl_hmac.h"
     31 #include "warnless.h"
     32 
     33 #if defined(USE_GNUTLS_NETTLE)
     34 
     35 #include <nettle/md5.h>
     36 #include "curl_memory.h"
     37 /* The last #include file should be: */
     38 #include "memdebug.h"
     39 
     40 typedef struct md5_ctx MD5_CTX;
     41 
     42 static void MD5_Init(MD5_CTX * ctx)
     43 {
     44   md5_init(ctx);
     45 }
     46 
     47 static void MD5_Update(MD5_CTX * ctx,
     48                        const unsigned char *input,
     49                        unsigned int inputLen)
     50 {
     51   md5_update(ctx, inputLen, input);
     52 }
     53 
     54 static void MD5_Final(unsigned char digest[16], MD5_CTX * ctx)
     55 {
     56   md5_digest(ctx, 16, digest);
     57 }
     58 
     59 #elif defined(USE_GNUTLS)
     60 
     61 #include <gcrypt.h>
     62 #include "curl_memory.h"
     63 /* The last #include file should be: */
     64 #include "memdebug.h"
     65 
     66 typedef gcry_md_hd_t MD5_CTX;
     67 
     68 static void MD5_Init(MD5_CTX * ctx)
     69 {
     70   gcry_md_open(ctx, GCRY_MD_MD5, 0);
     71 }
     72 
     73 static void MD5_Update(MD5_CTX * ctx,
     74                        const unsigned char *input,
     75                        unsigned int inputLen)
     76 {
     77   gcry_md_write(*ctx, input, inputLen);
     78 }
     79 
     80 static void MD5_Final(unsigned char digest[16], MD5_CTX * ctx)
     81 {
     82   memcpy(digest, gcry_md_read(*ctx, 0), 16);
     83   gcry_md_close(*ctx);
     84 }
     85 
     86 #elif defined(USE_OPENSSL)
     87 /* When OpenSSL is available we use the MD5-function from OpenSSL */
     88 #include <openssl/md5.h>
     89 #include "curl_memory.h"
     90 /* The last #include file should be: */
     91 #include "memdebug.h"
     92 
     93 #elif (defined(__MAC_OS_X_VERSION_MAX_ALLOWED) && \
     94               (__MAC_OS_X_VERSION_MAX_ALLOWED >= 1040)) || \
     95       (defined(__IPHONE_OS_VERSION_MAX_ALLOWED) && \
     96               (__IPHONE_OS_VERSION_MAX_ALLOWED >= 20000))
     97 
     98 /* For Apple operating systems: CommonCrypto has the functions we need.
     99    These functions are available on Tiger and later, as well as iOS 2.0
    100    and later. If you're building for an older cat, well, sorry.
    101 
    102    Declaring the functions as static like this seems to be a bit more
    103    reliable than defining COMMON_DIGEST_FOR_OPENSSL on older cats. */
    104 #  include <CommonCrypto/CommonDigest.h>
    105 #  define MD5_CTX CC_MD5_CTX
    106 #include "curl_memory.h"
    107 /* The last #include file should be: */
    108 #include "memdebug.h"
    109 
    110 static void MD5_Init(MD5_CTX *ctx)
    111 {
    112   CC_MD5_Init(ctx);
    113 }
    114 
    115 static void MD5_Update(MD5_CTX *ctx,
    116                        const unsigned char *input,
    117                        unsigned int inputLen)
    118 {
    119   CC_MD5_Update(ctx, input, inputLen);
    120 }
    121 
    122 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx)
    123 {
    124   CC_MD5_Final(digest, ctx);
    125 }
    126 
    127 #elif defined(_WIN32) && !defined(CURL_WINDOWS_APP)
    128 
    129 #include <wincrypt.h>
    130 #include "curl_memory.h"
    131 /* The last #include file should be: */
    132 #include "memdebug.h"
    133 
    134 typedef struct {
    135   HCRYPTPROV hCryptProv;
    136   HCRYPTHASH hHash;
    137 } MD5_CTX;
    138 
    139 static void MD5_Init(MD5_CTX *ctx)
    140 {
    141   if(CryptAcquireContext(&ctx->hCryptProv, NULL, NULL,
    142                          PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) {
    143     CryptCreateHash(ctx->hCryptProv, CALG_MD5, 0, 0, &ctx->hHash);
    144   }
    145 }
    146 
    147 static void MD5_Update(MD5_CTX *ctx,
    148                        const unsigned char *input,
    149                        unsigned int inputLen)
    150 {
    151   CryptHashData(ctx->hHash, (unsigned char *)input, inputLen, 0);
    152 }
    153 
    154 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx)
    155 {
    156   unsigned long length = 0;
    157   CryptGetHashParam(ctx->hHash, HP_HASHVAL, NULL, &length, 0);
    158   if(length == 16)
    159     CryptGetHashParam(ctx->hHash, HP_HASHVAL, digest, &length, 0);
    160   if(ctx->hHash)
    161     CryptDestroyHash(ctx->hHash);
    162   if(ctx->hCryptProv)
    163     CryptReleaseContext(ctx->hCryptProv, 0);
    164 }
    165 
    166 #elif defined(USE_AXTLS)
    167 #include <axTLS/config.h>
    168 #include <axTLS/os_int.h>
    169 #include <axTLS/crypto.h>
    170 #include "curl_memory.h"
    171 /* The last #include file should be: */
    172 #include "memdebug.h"
    173 #else
    174 /* When no other crypto library is available we use this code segment */
    175 /*
    176  * This is an OpenSSL-compatible implementation of the RSA Data Security, Inc.
    177  * MD5 Message-Digest Algorithm (RFC 1321).
    178  *
    179  * Homepage:
    180  http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5
    181  *
    182  * Author:
    183  * Alexander Peslyak, better known as Solar Designer <solar at openwall.com>
    184  *
    185  * This software was written by Alexander Peslyak in 2001.  No copyright is
    186  * claimed, and the software is hereby placed in the public domain.
    187  * In case this attempt to disclaim copyright and place the software in the
    188  * public domain is deemed null and void, then the software is
    189  * Copyright (c) 2001 Alexander Peslyak and it is hereby released to the
    190  * general public under the following terms:
    191  *
    192  * Redistribution and use in source and binary forms, with or without
    193  * modification, are permitted.
    194  *
    195  * There's ABSOLUTELY NO WARRANTY, express or implied.
    196  *
    197  * (This is a heavily cut-down "BSD license".)
    198  *
    199  * This differs from Colin Plumb's older public domain implementation in that
    200  * no exactly 32-bit integer data type is required (any 32-bit or wider
    201  * unsigned integer data type will do), there's no compile-time endianness
    202  * configuration, and the function prototypes match OpenSSL's.  No code from
    203  * Colin Plumb's implementation has been reused; this comment merely compares
    204  * the properties of the two independent implementations.
    205  *
    206  * The primary goals of this implementation are portability and ease of use.
    207  * It is meant to be fast, but not as fast as possible.  Some known
    208  * optimizations are not included to reduce source code size and avoid
    209  * compile-time configuration.
    210  */
    211 
    212 #include <string.h>
    213 
    214 /* The last #include files should be: */
    215 #include "curl_memory.h"
    216 #include "memdebug.h"
    217 
    218 /* Any 32-bit or wider unsigned integer data type will do */
    219 typedef unsigned int MD5_u32plus;
    220 
    221 typedef struct {
    222   MD5_u32plus lo, hi;
    223   MD5_u32plus a, b, c, d;
    224   unsigned char buffer[64];
    225   MD5_u32plus block[16];
    226 } MD5_CTX;
    227 
    228 static void MD5_Init(MD5_CTX *ctx);
    229 static void MD5_Update(MD5_CTX *ctx, const void *data, unsigned long size);
    230 static void MD5_Final(unsigned char *result, MD5_CTX *ctx);
    231 
    232 /*
    233  * The basic MD5 functions.
    234  *
    235  * F and G are optimized compared to their RFC 1321 definitions for
    236  * architectures that lack an AND-NOT instruction, just like in Colin Plumb's
    237  * implementation.
    238  */
    239 #define F(x, y, z)                      ((z) ^ ((x) & ((y) ^ (z))))
    240 #define G(x, y, z)                      ((y) ^ ((z) & ((x) ^ (y))))
    241 #define H(x, y, z)                      (((x) ^ (y)) ^ (z))
    242 #define H2(x, y, z)                     ((x) ^ ((y) ^ (z)))
    243 #define I(x, y, z)                      ((y) ^ ((x) | ~(z)))
    244 
    245 /*
    246  * The MD5 transformation for all four rounds.
    247  */
    248 #define STEP(f, a, b, c, d, x, t, s) \
    249         (a) += f((b), (c), (d)) + (x) + (t); \
    250         (a) = (((a) << (s)) | (((a) & 0xffffffff) >> (32 - (s)))); \
    251         (a) += (b);
    252 
    253 /*
    254  * SET reads 4 input bytes in little-endian byte order and stores them
    255  * in a properly aligned word in host byte order.
    256  *
    257  * The check for little-endian architectures that tolerate unaligned
    258  * memory accesses is just an optimization.  Nothing will break if it
    259  * doesn't work.
    260  */
    261 #if defined(__i386__) || defined(__x86_64__) || defined(__vax__)
    262 #define SET(n) \
    263         (*(MD5_u32plus *)&ptr[(n) * 4])
    264 #define GET(n) \
    265         SET(n)
    266 #else
    267 #define SET(n) \
    268         (ctx->block[(n)] = \
    269         (MD5_u32plus)ptr[(n) * 4] | \
    270         ((MD5_u32plus)ptr[(n) * 4 + 1] << 8) | \
    271         ((MD5_u32plus)ptr[(n) * 4 + 2] << 16) | \
    272         ((MD5_u32plus)ptr[(n) * 4 + 3] << 24))
    273 #define GET(n) \
    274         (ctx->block[(n)])
    275 #endif
    276 
    277 /*
    278  * This processes one or more 64-byte data blocks, but does NOT update
    279  * the bit counters.  There are no alignment requirements.
    280  */
    281 static const void *body(MD5_CTX *ctx, const void *data, unsigned long size)
    282 {
    283   const unsigned char *ptr;
    284   MD5_u32plus a, b, c, d;
    285   MD5_u32plus saved_a, saved_b, saved_c, saved_d;
    286 
    287   ptr = (const unsigned char *)data;
    288 
    289   a = ctx->a;
    290   b = ctx->b;
    291   c = ctx->c;
    292   d = ctx->d;
    293 
    294   do {
    295     saved_a = a;
    296     saved_b = b;
    297     saved_c = c;
    298     saved_d = d;
    299 
    300 /* Round 1 */
    301     STEP(F, a, b, c, d, SET(0), 0xd76aa478, 7)
    302       STEP(F, d, a, b, c, SET(1), 0xe8c7b756, 12)
    303       STEP(F, c, d, a, b, SET(2), 0x242070db, 17)
    304       STEP(F, b, c, d, a, SET(3), 0xc1bdceee, 22)
    305       STEP(F, a, b, c, d, SET(4), 0xf57c0faf, 7)
    306       STEP(F, d, a, b, c, SET(5), 0x4787c62a, 12)
    307       STEP(F, c, d, a, b, SET(6), 0xa8304613, 17)
    308       STEP(F, b, c, d, a, SET(7), 0xfd469501, 22)
    309       STEP(F, a, b, c, d, SET(8), 0x698098d8, 7)
    310       STEP(F, d, a, b, c, SET(9), 0x8b44f7af, 12)
    311       STEP(F, c, d, a, b, SET(10), 0xffff5bb1, 17)
    312       STEP(F, b, c, d, a, SET(11), 0x895cd7be, 22)
    313       STEP(F, a, b, c, d, SET(12), 0x6b901122, 7)
    314       STEP(F, d, a, b, c, SET(13), 0xfd987193, 12)
    315       STEP(F, c, d, a, b, SET(14), 0xa679438e, 17)
    316       STEP(F, b, c, d, a, SET(15), 0x49b40821, 22)
    317 
    318 /* Round 2 */
    319       STEP(G, a, b, c, d, GET(1), 0xf61e2562, 5)
    320       STEP(G, d, a, b, c, GET(6), 0xc040b340, 9)
    321       STEP(G, c, d, a, b, GET(11), 0x265e5a51, 14)
    322       STEP(G, b, c, d, a, GET(0), 0xe9b6c7aa, 20)
    323       STEP(G, a, b, c, d, GET(5), 0xd62f105d, 5)
    324       STEP(G, d, a, b, c, GET(10), 0x02441453, 9)
    325       STEP(G, c, d, a, b, GET(15), 0xd8a1e681, 14)
    326       STEP(G, b, c, d, a, GET(4), 0xe7d3fbc8, 20)
    327       STEP(G, a, b, c, d, GET(9), 0x21e1cde6, 5)
    328       STEP(G, d, a, b, c, GET(14), 0xc33707d6, 9)
    329       STEP(G, c, d, a, b, GET(3), 0xf4d50d87, 14)
    330       STEP(G, b, c, d, a, GET(8), 0x455a14ed, 20)
    331       STEP(G, a, b, c, d, GET(13), 0xa9e3e905, 5)
    332       STEP(G, d, a, b, c, GET(2), 0xfcefa3f8, 9)
    333       STEP(G, c, d, a, b, GET(7), 0x676f02d9, 14)
    334       STEP(G, b, c, d, a, GET(12), 0x8d2a4c8a, 20)
    335 
    336 /* Round 3 */
    337       STEP(H, a, b, c, d, GET(5), 0xfffa3942, 4)
    338       STEP(H2, d, a, b, c, GET(8), 0x8771f681, 11)
    339       STEP(H, c, d, a, b, GET(11), 0x6d9d6122, 16)
    340       STEP(H2, b, c, d, a, GET(14), 0xfde5380c, 23)
    341       STEP(H, a, b, c, d, GET(1), 0xa4beea44, 4)
    342       STEP(H2, d, a, b, c, GET(4), 0x4bdecfa9, 11)
    343       STEP(H, c, d, a, b, GET(7), 0xf6bb4b60, 16)
    344       STEP(H2, b, c, d, a, GET(10), 0xbebfbc70, 23)
    345       STEP(H, a, b, c, d, GET(13), 0x289b7ec6, 4)
    346       STEP(H2, d, a, b, c, GET(0), 0xeaa127fa, 11)
    347       STEP(H, c, d, a, b, GET(3), 0xd4ef3085, 16)
    348       STEP(H2, b, c, d, a, GET(6), 0x04881d05, 23)
    349       STEP(H, a, b, c, d, GET(9), 0xd9d4d039, 4)
    350       STEP(H2, d, a, b, c, GET(12), 0xe6db99e5, 11)
    351       STEP(H, c, d, a, b, GET(15), 0x1fa27cf8, 16)
    352       STEP(H2, b, c, d, a, GET(2), 0xc4ac5665, 23)
    353 
    354 /* Round 4 */
    355       STEP(I, a, b, c, d, GET(0), 0xf4292244, 6)
    356       STEP(I, d, a, b, c, GET(7), 0x432aff97, 10)
    357       STEP(I, c, d, a, b, GET(14), 0xab9423a7, 15)
    358       STEP(I, b, c, d, a, GET(5), 0xfc93a039, 21)
    359       STEP(I, a, b, c, d, GET(12), 0x655b59c3, 6)
    360       STEP(I, d, a, b, c, GET(3), 0x8f0ccc92, 10)
    361       STEP(I, c, d, a, b, GET(10), 0xffeff47d, 15)
    362       STEP(I, b, c, d, a, GET(1), 0x85845dd1, 21)
    363       STEP(I, a, b, c, d, GET(8), 0x6fa87e4f, 6)
    364       STEP(I, d, a, b, c, GET(15), 0xfe2ce6e0, 10)
    365       STEP(I, c, d, a, b, GET(6), 0xa3014314, 15)
    366       STEP(I, b, c, d, a, GET(13), 0x4e0811a1, 21)
    367       STEP(I, a, b, c, d, GET(4), 0xf7537e82, 6)
    368       STEP(I, d, a, b, c, GET(11), 0xbd3af235, 10)
    369       STEP(I, c, d, a, b, GET(2), 0x2ad7d2bb, 15)
    370       STEP(I, b, c, d, a, GET(9), 0xeb86d391, 21)
    371 
    372       a += saved_a;
    373     b += saved_b;
    374     c += saved_c;
    375     d += saved_d;
    376 
    377     ptr += 64;
    378   } while(size -= 64);
    379 
    380   ctx->a = a;
    381   ctx->b = b;
    382   ctx->c = c;
    383   ctx->d = d;
    384 
    385   return ptr;
    386 }
    387 
    388 static void MD5_Init(MD5_CTX *ctx)
    389 {
    390   ctx->a = 0x67452301;
    391   ctx->b = 0xefcdab89;
    392   ctx->c = 0x98badcfe;
    393   ctx->d = 0x10325476;
    394 
    395   ctx->lo = 0;
    396   ctx->hi = 0;
    397 }
    398 
    399 static void MD5_Update(MD5_CTX *ctx, const void *data, unsigned long size)
    400 {
    401   MD5_u32plus saved_lo;
    402   unsigned long used, available;
    403 
    404   saved_lo = ctx->lo;
    405   if((ctx->lo = (saved_lo + size) & 0x1fffffff) < saved_lo)
    406     ctx->hi++;
    407   ctx->hi += (MD5_u32plus)size >> 29;
    408 
    409   used = saved_lo & 0x3f;
    410 
    411   if(used) {
    412     available = 64 - used;
    413 
    414     if(size < available) {
    415       memcpy(&ctx->buffer[used], data, size);
    416       return;
    417     }
    418 
    419     memcpy(&ctx->buffer[used], data, available);
    420     data = (const unsigned char *)data + available;
    421     size -= available;
    422     body(ctx, ctx->buffer, 64);
    423   }
    424 
    425   if(size >= 64) {
    426     data = body(ctx, data, size & ~(unsigned long)0x3f);
    427     size &= 0x3f;
    428   }
    429 
    430   memcpy(ctx->buffer, data, size);
    431 }
    432 
    433 static void MD5_Final(unsigned char *result, MD5_CTX *ctx)
    434 {
    435   unsigned long used, available;
    436 
    437   used = ctx->lo & 0x3f;
    438 
    439   ctx->buffer[used++] = 0x80;
    440 
    441   available = 64 - used;
    442 
    443   if(available < 8) {
    444     memset(&ctx->buffer[used], 0, available);
    445     body(ctx, ctx->buffer, 64);
    446     used = 0;
    447     available = 64;
    448   }
    449 
    450   memset(&ctx->buffer[used], 0, available - 8);
    451 
    452   ctx->lo <<= 3;
    453   ctx->buffer[56] = curlx_ultouc((ctx->lo)&0xff);
    454   ctx->buffer[57] = curlx_ultouc((ctx->lo >> 8)&0xff);
    455   ctx->buffer[58] = curlx_ultouc((ctx->lo >> 16)&0xff);
    456   ctx->buffer[59] = curlx_ultouc(ctx->lo >> 24);
    457   ctx->buffer[60] = curlx_ultouc((ctx->hi)&0xff);
    458   ctx->buffer[61] = curlx_ultouc((ctx->hi >> 8)&0xff);
    459   ctx->buffer[62] = curlx_ultouc((ctx->hi >> 16)&0xff);
    460   ctx->buffer[63] = curlx_ultouc(ctx->hi >> 24);
    461 
    462   body(ctx, ctx->buffer, 64);
    463 
    464   result[0] = curlx_ultouc((ctx->a)&0xff);
    465   result[1] = curlx_ultouc((ctx->a >> 8)&0xff);
    466   result[2] = curlx_ultouc((ctx->a >> 16)&0xff);
    467   result[3] = curlx_ultouc(ctx->a >> 24);
    468   result[4] = curlx_ultouc((ctx->b)&0xff);
    469   result[5] = curlx_ultouc((ctx->b >> 8)&0xff);
    470   result[6] = curlx_ultouc((ctx->b >> 16)&0xff);
    471   result[7] = curlx_ultouc(ctx->b >> 24);
    472   result[8] = curlx_ultouc((ctx->c)&0xff);
    473   result[9] = curlx_ultouc((ctx->c >> 8)&0xff);
    474   result[10] = curlx_ultouc((ctx->c >> 16)&0xff);
    475   result[11] = curlx_ultouc(ctx->c >> 24);
    476   result[12] = curlx_ultouc((ctx->d)&0xff);
    477   result[13] = curlx_ultouc((ctx->d >> 8)&0xff);
    478   result[14] = curlx_ultouc((ctx->d >> 16)&0xff);
    479   result[15] = curlx_ultouc(ctx->d >> 24);
    480 
    481   memset(ctx, 0, sizeof(*ctx));
    482 }
    483 
    484 #endif /* CRYPTO LIBS */
    485 
    486 const HMAC_params Curl_HMAC_MD5[] = {
    487   {
    488     (HMAC_hinit_func) MD5_Init,           /* Hash initialization function. */
    489     (HMAC_hupdate_func) MD5_Update,       /* Hash update function. */
    490     (HMAC_hfinal_func) MD5_Final,         /* Hash computation end function. */
    491     sizeof(MD5_CTX),                      /* Size of hash context structure. */
    492     64,                                   /* Maximum key length. */
    493     16                                    /* Result size. */
    494   }
    495 };
    496 
    497 const MD5_params Curl_DIGEST_MD5[] = {
    498   {
    499     (Curl_MD5_init_func) MD5_Init,      /* Digest initialization function */
    500     (Curl_MD5_update_func) MD5_Update,  /* Digest update function */
    501     (Curl_MD5_final_func) MD5_Final,    /* Digest computation end function */
    502     sizeof(MD5_CTX),                    /* Size of digest context struct */
    503     16                                  /* Result size */
    504   }
    505 };
    506 
    507 /*
    508  * @unittest: 1601
    509  */
    510 void Curl_md5it(unsigned char *outbuffer, /* 16 bytes */
    511                 const unsigned char *input)
    512 {
    513   MD5_CTX ctx;
    514   MD5_Init(&ctx);
    515   MD5_Update(&ctx, input, curlx_uztoui(strlen((char *)input)));
    516   MD5_Final(outbuffer, &ctx);
    517 }
    518 
    519 MD5_context *Curl_MD5_init(const MD5_params *md5params)
    520 {
    521   MD5_context *ctxt;
    522 
    523   /* Create MD5 context */
    524   ctxt = malloc(sizeof *ctxt);
    525 
    526   if(!ctxt)
    527     return ctxt;
    528 
    529   ctxt->md5_hashctx = malloc(md5params->md5_ctxtsize);
    530 
    531   if(!ctxt->md5_hashctx) {
    532     free(ctxt);
    533     return NULL;
    534   }
    535 
    536   ctxt->md5_hash = md5params;
    537 
    538   (*md5params->md5_init_func)(ctxt->md5_hashctx);
    539 
    540   return ctxt;
    541 }
    542 
    543 int Curl_MD5_update(MD5_context *context,
    544                     const unsigned char *data,
    545                     unsigned int len)
    546 {
    547   (*context->md5_hash->md5_update_func)(context->md5_hashctx, data, len);
    548 
    549   return 0;
    550 }
    551 
    552 int Curl_MD5_final(MD5_context *context, unsigned char *result)
    553 {
    554   (*context->md5_hash->md5_final_func)(result, context->md5_hashctx);
    555 
    556   free(context->md5_hashctx);
    557   free(context);
    558 
    559   return 0;
    560 }
    561 
    562 #endif /* CURL_DISABLE_CRYPTO_AUTH */
    563