blob: 9ef8146503a91467952eaa066d0bd2a460b9d131 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/**
2 * \file dhm.h
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00003 *
Paul Bakker37ca75d2011-01-06 12:28:03 +00004 * \brief Diffie-Hellman-Merkle key exchange
5 *
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02006 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02007 * SPDX-License-Identifier: Apache-2.0
8 *
9 * Licensed under the Apache License, Version 2.0 (the "License"); you may
10 * not use this file except in compliance with the License.
11 * You may obtain a copy of the License at
12 *
13 * http://www.apache.org/licenses/LICENSE-2.0
14 *
15 * Unless required by applicable law or agreed to in writing, software
16 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
17 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
18 * See the License for the specific language governing permissions and
19 * limitations under the License.
Paul Bakkerb96f1542010-07-18 20:36:00 +000020 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000021 * This file is part of mbed TLS (https://tls.mbed.org)
Hanno Beckera2f6b722017-09-28 10:33:29 +010022 *
23 * \warning The security of the DHM key exchange relies on the proper choice
24 * of prime modulus - optimally, it should be a safe prime. The usage
25 * of non-safe primes both decreases the difficulty of the underlying
26 * discrete logarithm problem and can lead to small subgroup attacks
27 * leaking private exponent bits when invalid public keys are used
Hanno Beckerf9734b32017-10-03 12:09:22 +010028 * and not detected. This is especially relevant if the same DHM
29 * parameters are reused for multiple key exchanges as in static DHM,
30 * while the criticality of small-subgroup attacks is lower for
31 * ephemeral DHM.
Hanno Beckera2f6b722017-09-28 10:33:29 +010032 *
33 * For performance reasons, the code does neither perform primality
34 * nor safe primality tests, nor the expensive checks for invalid
Hanno Beckerf9734b32017-10-03 12:09:22 +010035 * subgroups. Moreover, even if these were performed, non-standardized
36 * primes cannot be trusted because of the possibility of backdoors
37 * that can't be effectively checked for.
Hanno Beckera2f6b722017-09-28 10:33:29 +010038 *
Hanno Beckerf9734b32017-10-03 12:09:22 +010039 * We therefore consider DHE a security risk. If possible, it is
40 * recommended users should consider preferring other methods of
41 * key exchange.
Hanno Beckera2f6b722017-09-28 10:33:29 +010042 *
Paul Bakker5121ce52009-01-03 21:22:43 +000043 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020044#ifndef MBEDTLS_DHM_H
45#define MBEDTLS_DHM_H
Paul Bakker5121ce52009-01-03 21:22:43 +000046
Paul Bakker314052f2011-08-15 09:07:52 +000047#include "bignum.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000048
Paul Bakkerf3b86c12011-01-27 15:24:17 +000049/*
50 * DHM Error codes
51 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020052#define MBEDTLS_ERR_DHM_BAD_INPUT_DATA -0x3080 /**< Bad input parameters to function. */
53#define MBEDTLS_ERR_DHM_READ_PARAMS_FAILED -0x3100 /**< Reading of the DHM parameters failed. */
54#define MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED -0x3180 /**< Making of the DHM parameters failed. */
55#define MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED -0x3200 /**< Reading of the public values failed. */
56#define MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED -0x3280 /**< Making of the public value failed. */
57#define MBEDTLS_ERR_DHM_CALC_SECRET_FAILED -0x3300 /**< Calculation of the DHM secret failed. */
58#define MBEDTLS_ERR_DHM_INVALID_FORMAT -0x3380 /**< The ASN.1 data is not formatted correctly. */
Manuel Pégourié-Gonnard6a8ca332015-05-28 09:33:39 +020059#define MBEDTLS_ERR_DHM_ALLOC_FAILED -0x3400 /**< Allocation of memory failed. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020060#define MBEDTLS_ERR_DHM_FILE_IO_ERROR -0x3480 /**< Read/write of file failed. */
Paul Bakker5121ce52009-01-03 21:22:43 +000061
Hanno Becker0e6dc842017-09-27 11:48:02 +010062#if ! defined(MBEDTLS_DEPRECATED_REMOVED)
63#if defined(MBEDTLS_DEPRECATED_WARNING)
64#define MBEDTLS_DEPRECATED __attribute__((deprecated))
65#else
66#define MBEDTLS_DEPRECATED
67#endif
68#endif
69
Paul Bakkerf3b86c12011-01-27 15:24:17 +000070/**
Hanno Beckerb2bad802017-09-27 11:49:31 +010071 * RFC 3526, RFC 5114 and RFC 7919 standardize a number of
72 * Diffie-Hellman groups, some of which are included here
73 * for use within the SSL/TLS module and the user's convenience
74 * when configuring the Diffie-Hellman parameters by hand
75 * through \c mbedtls_ssl_conf_dh_param.
Paul Bakker29b64762012-09-25 09:36:44 +000076 *
77 * Included are:
Hanno Beckerb2bad802017-09-27 11:49:31 +010078 * RFC 5114 2.2. 2048-bit MODP Group with 224-bit Prime Order Subgroup
Paul Bakkerda7e3f22012-09-28 07:18:17 +000079 * RFC 3526 3. 2048-bit MODP Group
80 * RFC 3526 4. 3072-bit MODP Group
Manuel Pégourié-Gonnard78931032015-07-03 17:06:39 +020081 * RFC 3526 5. 4096-bit MODP Group
Hanno Beckerb2bad802017-09-27 11:49:31 +010082 * RFC 7919 A.1 ffdhe2048
83 * RFC 7919 A.2 ffdhe3072
84 * RFC 7919 A.3 ffdhe4096
85 * RFC 7919 A.4 ffdhe6144
86 * RFC 7919 A.5 ffdhe8192
87 *
Hanno Becker0e6dc842017-09-27 11:48:02 +010088 * The constants with suffix "_p" denote the chosen prime moduli, while
89 * the constants with suffix "_g" denote the chosen generator
90 * of the associated prime field.
91 *
92 * All constants are represented as null-terminated strings containing the
93 * hexadecimal presentation of the respective numbers.
94 *
95 * \warning The origin of the primes in RFC 5114 is not documented and
96 * their use therefore constitutes a security risk!
97 *
98 * \deprecated The primes from RFC 5114 are superseded by the primes
99 * from RFC 3526 and RFC 7919 and should no longer be used.
100 * They will be removed in the next major revision.
Hanno Beckerb1d4d1f2017-09-27 12:42:59 +0100101 *
102 * The primes from RFC 3526 and RFC 7919 have been generating by the following
103 * trust-worthy procedure:
104 * - Fix N in { 2048, 3072, 4096, 6144, 8192 } and consider the N-bit number
105 * the first and last 64 bits are all 1, and the remaining N - 128 bits of
106 * which are 0x7ff...ff.
107 * - Add the smallest multiple of the first N - 129 bits of the binary expansion
108 * of pi (for RFC 5236) or e (for RFC 7919) to this intermediate bit-string
109 * such that the resulting integer is a safe-prime.
110 * - The result is the respective RFC 3526 / 7919 prime, and the corresponding
111 * generator is always chosen to be 2 (which is a square for these prime,
112 * hence the corresponding subgroup has order (p-1)/2 and avoids leaking a
113 * bit in the private exponent).
114 *
115 * The above description can be validated using the
116 * the program programs/util/rfc_3526_7919_verify.
Paul Bakker29b64762012-09-25 09:36:44 +0000117 */
Paul Bakkerda7e3f22012-09-28 07:18:17 +0000118
Hanno Becker4c72b002017-09-27 16:06:22 +0100119const char * const mbedtls_dhm_rfc3526_modp_2048_p;
120const char * const mbedtls_dhm_rfc3526_modp_2048_g;
121const char * const mbedtls_dhm_rfc3526_modp_3072_p;
122const char * const mbedtls_dhm_rfc3526_modp_3072_g;
123const char * const mbedtls_dhm_rfc3526_modp_4096_p;
124const char * const mbedtls_dhm_rfc3526_modp_4096_g;
Paul Bakkerda7e3f22012-09-28 07:18:17 +0000125
Hanno Becker4c72b002017-09-27 16:06:22 +0100126const char * const mbedtls_dhm_rfc7919_ffdhe2048_p;
127const char * const mbedtls_dhm_rfc7919_ffdhe2048_g;
128const char * const mbedtls_dhm_rfc7919_ffdhe3072_p;
129const char * const mbedtls_dhm_rfc7919_ffdhe3072_g;
130const char * const mbedtls_dhm_rfc7919_ffdhe4096_p;
131const char * const mbedtls_dhm_rfc7919_ffdhe4096_g;
132const char * const mbedtls_dhm_rfc7919_ffdhe6144_p;
133const char * const mbedtls_dhm_rfc7919_ffdhe6144_g;
134const char * const mbedtls_dhm_rfc7919_ffdhe8192_p;
135const char * const mbedtls_dhm_rfc7919_ffdhe8192_g;
Paul Bakkerda7e3f22012-09-28 07:18:17 +0000136
Hanno Becker0e6dc842017-09-27 11:48:02 +0100137#if !defined(MBEDTLS_DEPRECATED_REMOVED)
Hanno Becker4c72b002017-09-27 16:06:22 +0100138MBEDTLS_DEPRECATED const char * const mbedtls_dhm_rfc5114_modp_2048_p;
139MBEDTLS_DEPRECATED const char * const mbedtls_dhm_rfc5114_modp_2048_g;
Hanno Becker0e6dc842017-09-27 11:48:02 +0100140#endif
Paul Bakkerda7e3f22012-09-28 07:18:17 +0000141
Hanno Becker0e6dc842017-09-27 11:48:02 +0100142/**
143 * \deprecated These macros are superseded by direct access to the corresponding
144 * global variables and will be removed in the next major revision.
145 */
146#if !defined(MBEDTLS_DEPRECATED_REMOVED)
147#define MBEDTLS_DHM_RFC5114_MODP_2048_P mbedtls_dhm_rfc5114_modp_2048_p
148#define MBEDTLS_DHM_RFC5114_MODP_2048_G mbedtls_dhm_rfc5114_modp_2048_g
149#define MBEDTLS_DHM_RFC3526_MODP_2048_P mbedtls_dhm_rfc3526_modp_2048_p
150#define MBEDTLS_DHM_RFC3526_MODP_2048_G mbedtls_dhm_rfc3526_modp_2048_g
151#define MBEDTLS_DHM_RFC3526_MODP_3072_P mbedtls_dhm_rfc3526_modp_3072_p
152#define MBEDTLS_DHM_RFC3526_MODP_3072_G mbedtls_dhm_rfc3526_modp_3072_g
153#define MBEDTLS_DHM_RFC3526_MODP_4096_P mbedtls_dhm_rfc3526_modp_4096_p
154#define MBEDTLS_DHM_RFC3526_MODP_4096_G mbedtls_dhm_rfc3526_modp_4096_g
155#endif
Paul Bakker29b64762012-09-25 09:36:44 +0000156
Paul Bakker407a0da2013-06-27 14:29:21 +0200157#ifdef __cplusplus
158extern "C" {
159#endif
160
Paul Bakker29b64762012-09-25 09:36:44 +0000161/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000162 * \brief DHM context structure
163 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000164typedef struct
165{
Paul Bakker23986e52011-04-24 08:57:21 +0000166 size_t len; /*!< size(P) in chars */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200167 mbedtls_mpi P; /*!< prime modulus */
168 mbedtls_mpi G; /*!< generator */
169 mbedtls_mpi X; /*!< secret value */
170 mbedtls_mpi GX; /*!< self = G^X mod P */
171 mbedtls_mpi GY; /*!< peer = G^Y mod P */
172 mbedtls_mpi K; /*!< key = GY^X mod P */
173 mbedtls_mpi RP; /*!< cached R^2 mod P */
174 mbedtls_mpi Vi; /*!< blinding value */
175 mbedtls_mpi Vf; /*!< un-blinding value */
176 mbedtls_mpi pX; /*!< previous X */
Paul Bakker5121ce52009-01-03 21:22:43 +0000177}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200178mbedtls_dhm_context;
Paul Bakker5121ce52009-01-03 21:22:43 +0000179
Paul Bakker5121ce52009-01-03 21:22:43 +0000180/**
Paul Bakker8f870b02014-06-20 13:32:38 +0200181 * \brief Initialize DHM context
182 *
183 * \param ctx DHM context to be initialized
184 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200185void mbedtls_dhm_init( mbedtls_dhm_context *ctx );
Paul Bakker8f870b02014-06-20 13:32:38 +0200186
187/**
Paul Bakker5121ce52009-01-03 21:22:43 +0000188 * \brief Parse the ServerKeyExchange parameters
189 *
190 * \param ctx DHM context
Hanno Beckerf240ea02017-10-02 15:09:14 +0100191 * \param p On input, *p must be the start of the input buffer.
192 * On output, *p is updated to point to the end of the data
193 * that has been read. On success, this is the first byte
194 * past the end of the ServerKeyExchange parameters.
195 * On error, this is the point at which an error has been
196 * detected, which is usually not useful except to debug
197 * failures.
Paul Bakker5121ce52009-01-03 21:22:43 +0000198 * \param end end of buffer
199 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200200 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000201 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202int mbedtls_dhm_read_params( mbedtls_dhm_context *ctx,
Paul Bakker5121ce52009-01-03 21:22:43 +0000203 unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000204 const unsigned char *end );
Paul Bakker5121ce52009-01-03 21:22:43 +0000205
206/**
207 * \brief Setup and write the ServerKeyExchange parameters
208 *
209 * \param ctx DHM context
Paul Bakkerff7fe672010-07-18 09:45:05 +0000210 * \param x_size private value size in bytes
Paul Bakker5121ce52009-01-03 21:22:43 +0000211 * \param output destination buffer
212 * \param olen number of chars written
213 * \param f_rng RNG function
214 * \param p_rng RNG parameter
215 *
Hanno Beckere7643242017-09-28 10:33:11 +0100216 * \note The destination buffer must be large enough to hold
Hanno Becker70da2c52017-10-02 15:02:59 +0100217 * the reduced binary presentation of the modulus, the generator
218 * and the public key, each wrapped with a 2-byte length field.
219 * It is the responsibility of the caller to ensure that enough
220 * space is available. Refer to \c mbedtls_mpi_size to computing
221 * the byte-size of an MPI.
Hanno Beckere7643242017-09-28 10:33:11 +0100222 *
Paul Bakker5121ce52009-01-03 21:22:43 +0000223 * \note This function assumes that ctx->P and ctx->G
224 * have already been properly set (for example
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200225 * using mbedtls_mpi_read_string or mbedtls_mpi_read_binary).
Paul Bakker5121ce52009-01-03 21:22:43 +0000226 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200227 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000228 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200229int mbedtls_dhm_make_params( mbedtls_dhm_context *ctx, int x_size,
Paul Bakker23986e52011-04-24 08:57:21 +0000230 unsigned char *output, size_t *olen,
Paul Bakkera3d195c2011-11-27 21:07:34 +0000231 int (*f_rng)(void *, unsigned char *, size_t),
232 void *p_rng );
Paul Bakker5121ce52009-01-03 21:22:43 +0000233
234/**
235 * \brief Import the peer's public value G^Y
236 *
237 * \param ctx DHM context
238 * \param input input buffer
239 * \param ilen size of buffer
240 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000242 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200243int mbedtls_dhm_read_public( mbedtls_dhm_context *ctx,
Paul Bakker23986e52011-04-24 08:57:21 +0000244 const unsigned char *input, size_t ilen );
Paul Bakker5121ce52009-01-03 21:22:43 +0000245
246/**
247 * \brief Create own private value X and export G^X
248 *
249 * \param ctx DHM context
Paul Bakker84bef1d2012-04-20 13:42:02 +0000250 * \param x_size private value size in bytes
Paul Bakker5121ce52009-01-03 21:22:43 +0000251 * \param output destination buffer
Hanno Beckere7643242017-09-28 10:33:11 +0100252 * \param olen size of the destination buffer;
253 * must be at least equal to the size of P, ctx->len
Paul Bakker5121ce52009-01-03 21:22:43 +0000254 * \param f_rng RNG function
255 * \param p_rng RNG parameter
256 *
Hanno Beckere7643242017-09-28 10:33:11 +0100257 * \note The destination buffer will always be fully written
258 * so as to contain a big-endian presentation of G^X mod P.
259 * If it is larger than ctx->len, it will accordingly be
260 * padded with zero-bytes in the beginning.
261 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200262 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000263 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200264int mbedtls_dhm_make_public( mbedtls_dhm_context *ctx, int x_size,
Paul Bakker23986e52011-04-24 08:57:21 +0000265 unsigned char *output, size_t olen,
Paul Bakkera3d195c2011-11-27 21:07:34 +0000266 int (*f_rng)(void *, unsigned char *, size_t),
267 void *p_rng );
Paul Bakker5121ce52009-01-03 21:22:43 +0000268
269/**
270 * \brief Derive and export the shared secret (G^Y)^X mod P
271 *
272 * \param ctx DHM context
273 * \param output destination buffer
Hanno Beckere7643242017-09-28 10:33:11 +0100274 * \param output_size size of the destination buffer, must be at
275 * at least the size of ctx->len
Manuel Pégourié-Gonnard33352052015-06-02 16:17:08 +0100276 * \param olen on exit, holds the actual number of bytes written
Manuel Pégourié-Gonnard2d627642013-09-04 14:22:07 +0200277 * \param f_rng RNG function, for blinding purposes
278 * \param p_rng RNG parameter
Paul Bakker5121ce52009-01-03 21:22:43 +0000279 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200280 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Manuel Pégourié-Gonnard143b5022013-09-04 16:29:59 +0200281 *
Manuel Pégourié-Gonnard15d5de12013-09-17 11:34:11 +0200282 * \note If non-NULL, f_rng is used to blind the input as
283 * countermeasure against timing attacks. Blinding is
284 * automatically used if and only if our secret value X is
285 * re-used and costs nothing otherwise, so it is recommended
286 * to always pass a non-NULL f_rng argument.
Paul Bakker5121ce52009-01-03 21:22:43 +0000287 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200288int mbedtls_dhm_calc_secret( mbedtls_dhm_context *ctx,
Manuel Pégourié-Gonnard33352052015-06-02 16:17:08 +0100289 unsigned char *output, size_t output_size, size_t *olen,
Manuel Pégourié-Gonnard2d627642013-09-04 14:22:07 +0200290 int (*f_rng)(void *, unsigned char *, size_t),
291 void *p_rng );
Paul Bakker5121ce52009-01-03 21:22:43 +0000292
Paul Bakker9a736322012-11-14 12:39:52 +0000293/**
Paul Bakker8f870b02014-06-20 13:32:38 +0200294 * \brief Free and clear the components of a DHM key
295 *
296 * \param ctx DHM context to free and clear
Paul Bakker5121ce52009-01-03 21:22:43 +0000297 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200298void mbedtls_dhm_free( mbedtls_dhm_context *ctx );
Paul Bakker5121ce52009-01-03 21:22:43 +0000299
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200300#if defined(MBEDTLS_ASN1_PARSE_C)
Paul Bakker40ce79f2013-09-15 17:43:54 +0200301/** \ingroup x509_module */
302/**
Manuel Pégourié-Gonnard43b37cb2015-05-12 11:20:10 +0200303 * \brief Parse DHM parameters in PEM or DER format
Paul Bakker40ce79f2013-09-15 17:43:54 +0200304 *
305 * \param dhm DHM context to be initialized
306 * \param dhmin input buffer
307 * \param dhminlen size of the buffer
Manuel Pégourié-Gonnard43b37cb2015-05-12 11:20:10 +0200308 * (including the terminating null byte for PEM data)
Paul Bakker40ce79f2013-09-15 17:43:54 +0200309 *
310 * \return 0 if successful, or a specific DHM or PEM error code
311 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200312int mbedtls_dhm_parse_dhm( mbedtls_dhm_context *dhm, const unsigned char *dhmin,
Paul Bakker40ce79f2013-09-15 17:43:54 +0200313 size_t dhminlen );
314
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200315#if defined(MBEDTLS_FS_IO)
Paul Bakker40ce79f2013-09-15 17:43:54 +0200316/** \ingroup x509_module */
317/**
318 * \brief Load and parse DHM parameters
319 *
320 * \param dhm DHM context to be initialized
321 * \param path filename to read the DHM Parameters from
322 *
323 * \return 0 if successful, or a specific DHM or PEM error code
324 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200325int mbedtls_dhm_parse_dhmfile( mbedtls_dhm_context *dhm, const char *path );
326#endif /* MBEDTLS_FS_IO */
327#endif /* MBEDTLS_ASN1_PARSE_C */
Paul Bakker40ce79f2013-09-15 17:43:54 +0200328
Paul Bakker5121ce52009-01-03 21:22:43 +0000329/**
330 * \brief Checkup routine
331 *
332 * \return 0 if successful, or 1 if the test failed
333 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200334int mbedtls_dhm_self_test( int verbose );
Paul Bakker5121ce52009-01-03 21:22:43 +0000335
336#ifdef __cplusplus
337}
338#endif
339
Paul Bakker9af723c2014-05-01 13:03:14 +0200340#endif /* dhm.h */