Compare commits

...

2 Commits

Author SHA1 Message Date
487432c399 Version v0.2.5 - Automatic version increment 2025-08-10 08:56:56 -04:00
f521349cc0 remove all external crypto libraries 2025-08-10 08:47:17 -04:00
5 changed files with 179 additions and 171 deletions

View File

@@ -1,7 +1,7 @@
CC = gcc CC = gcc
CFLAGS = -Wall -Wextra -std=c99 CFLAGS = -Wall -Wextra -std=c99
LIBS = -lssl -lcrypto LIBS =
LIBS_STATIC = -static -lssl -lcrypto -ldl -lpthread LIBS_STATIC = -static
TARGET = otp TARGET = otp
SOURCE = otp.c SOURCE = otp.c
VERSION_SOURCE = src/version.c VERSION_SOURCE = src/version.c

View File

@@ -1,4 +1,4 @@
# OTP Cipher - One Time Pad Implementation r# OTP Cipher - One Time Pad Implementation
A secure one-time pad (OTP) cipher implementation in C with automatic versioning system. A secure one-time pad (OTP) cipher implementation in C with automatic versioning system.
@@ -25,10 +25,11 @@ Current version can be viewed with: `./otp --help` or by running the interactive
### Prerequisites ### Prerequisites
- GCC compiler - GCC compiler
- OpenSSL development libraries (`libssl-dev` on Ubuntu/Debian)
- Git (for version tracking) - Git (for version tracking)
- Make - Make
**Note: OpenSSL is no longer required! This implementation is now completely self-contained.**
### Build Commands ### Build Commands
Use the included build script for automatic versioning: Use the included build script for automatic versioning:
@@ -125,10 +126,11 @@ These files are excluded from git (.gitignore) and regenerated on each build.
## Security Features ## Security Features
- Uses `/dev/urandom` for cryptographically secure random number generation - Uses `/dev/urandom` for cryptographically secure random number generation
- Optional keyboard entropy mixing using HKDF (Hash-based Key Derivation Function) - Optional keyboard entropy mixing using simple XOR operations
- SHA-256 pad integrity verification - Custom 256-bit XOR checksum for pad identification (encrypted with pad data)
- Read-only pad files to prevent accidental modification - Read-only pad files to prevent accidental modification
- State tracking to prevent pad reuse - State tracking to prevent pad reuse
- **Zero external crypto dependencies** - completely self-contained implementation
## File Structure ## File Structure

View File

@@ -50,6 +50,20 @@ increment_version() {
print_status "Current version: $LATEST_TAG" print_status "Current version: $LATEST_TAG"
print_status "New version: $NEW_VERSION" print_status "New version: $NEW_VERSION"
# Stage all changes
if git add . 2>/dev/null; then
print_success "Staged all changes"
else
print_warning "Failed to stage changes (maybe not a git repository)"
fi
# Commit changes with version message
if git commit -m "Version $NEW_VERSION - Automatic version increment" 2>/dev/null; then
print_success "Committed changes for version $NEW_VERSION"
else
print_warning "Failed to commit changes (maybe no changes to commit or not a git repository)"
fi
# Create new git tag # Create new git tag
if git tag "$NEW_VERSION" 2>/dev/null; then if git tag "$NEW_VERSION" 2>/dev/null; then
print_success "Created new version tag: $NEW_VERSION" print_success "Created new version tag: $NEW_VERSION"

BIN
otp

Binary file not shown.

322
otp.c
View File

@@ -12,14 +12,29 @@
#include <ctype.h> #include <ctype.h>
#include <termios.h> #include <termios.h>
#include <fcntl.h> #include <fcntl.h>
#include <openssl/sha.h>
#include <openssl/evp.h>
#include <openssl/bio.h>
#include <openssl/buffer.h>
#include <openssl/kdf.h>
#include <openssl/hmac.h>
#include "src/version.h" #include "src/version.h"
// Custom base64 character set
static const char base64_chars[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
static const int base64_decode_table[256] = {
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,62,-1,-1,-1,63,
52,53,54,55,56,57,58,59,60,61,-1,-1,-1,-2,-1,-1,
-1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,
15,16,17,18,19,20,21,22,23,24,25,-1,-1,-1,-1,-1,
-1,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,
41,42,43,44,45,46,47,48,49,50,51,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,
-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1
};
#define MAX_INPUT_SIZE 4096 #define MAX_INPUT_SIZE 4096
#define MAX_LINE_LENGTH 1024 #define MAX_LINE_LENGTH 1024
#define MAX_HASH_LENGTH 65 #define MAX_HASH_LENGTH 65
@@ -42,9 +57,8 @@ int decrypt_text(const char* pad_identifier);
int setup_raw_terminal(struct termios* original_termios); int setup_raw_terminal(struct termios* original_termios);
void restore_terminal(struct termios* original_termios); void restore_terminal(struct termios* original_termios);
int collect_keyboard_entropy(unsigned char* entropy_buffer, size_t max_size, size_t* collected); int collect_keyboard_entropy(unsigned char* entropy_buffer, size_t max_size, size_t* collected);
int hkdf_expand(const unsigned char* prk, size_t prk_len, void simple_entropy_mix(unsigned char* urandom_buffer, size_t buffer_size,
const unsigned char* info, size_t info_len, const unsigned char* entropy_data, size_t entropy_size);
unsigned char* okm, size_t okm_len);
// Directory management // Directory management
int ensure_pads_directory(void); int ensure_pads_directory(void);
@@ -61,9 +75,10 @@ void show_progress(uint64_t current, uint64_t total, time_t start_time);
// File operations // File operations
int read_state_offset(const char* pad_hash, uint64_t* offset); int read_state_offset(const char* pad_hash, uint64_t* offset);
int write_state_offset(const char* pad_hash, uint64_t offset); int write_state_offset(const char* pad_hash, uint64_t offset);
int calculate_sha256(const char* filename, char* hash_hex); int calculate_checksum(const char* filename, char* checksum_hex);
char* base64_encode(const unsigned char* input, int length); void xor_checksum_256(const unsigned char* data, size_t len, unsigned char checksum[32]);
unsigned char* base64_decode(const char* input, int* output_length); char* custom_base64_encode(const unsigned char* input, int length);
unsigned char* custom_base64_decode(const char* input, int* output_length);
// Menu functions // Menu functions
void show_main_menu(void); void show_main_menu(void);
@@ -102,7 +117,7 @@ int interactive_mode(void) {
list_available_pads(); list_available_pads();
break; break;
case 5: { case 5: {
printf("Enter pad hash (or prefix): "); printf("Enter pad checksum (or prefix): ");
char input[MAX_HASH_LENGTH]; char input[MAX_HASH_LENGTH];
if (fgets(input, sizeof(input), stdin)) { if (fgets(input, sizeof(input), stdin)) {
input[strcspn(input, "\n")] = 0; input[strcspn(input, "\n")] = 0;
@@ -544,9 +559,9 @@ int generate_pad(uint64_t size_bytes, int display_progress) {
fclose(urandom); fclose(urandom);
fclose(pad_file); fclose(pad_file);
// Calculate SHA-256 of the pad file // Calculate XOR checksum of the pad file
if (calculate_sha256(temp_filename, hash_hex) != 0) { if (calculate_checksum(temp_filename, hash_hex) != 0) {
printf("Error: Cannot calculate pad hash\n"); printf("Error: Cannot calculate pad checksum\n");
unlink(temp_filename); unlink(temp_filename);
return 1; return 1;
} }
@@ -671,35 +686,12 @@ int generate_pad_with_entropy(uint64_t size_bytes, int display_progress, int use
MAX_ENTROPY_BUFFER - entropy_collected, &chunk_entropy); MAX_ENTROPY_BUFFER - entropy_collected, &chunk_entropy);
entropy_collected += chunk_entropy; entropy_collected += chunk_entropy;
if (entropy_collected > 1024) { // Have enough entropy to mix if (entropy_collected > 512) { // Have enough entropy to mix
// Create HKDF PRK (extract phase) // Copy urandom data to output buffer
unsigned char prk[32]; memcpy(output_buffer, urandom_buffer, chunk_size);
EVP_MD_CTX* hmac_ctx = EVP_MD_CTX_new();
EVP_PKEY* hmac_key = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, NULL,
entropy_buffer, entropy_collected);
if (hmac_ctx && hmac_key) { // Simple XOR mixing with keyboard entropy
EVP_DigestSignInit(hmac_ctx, NULL, EVP_sha256(), NULL, hmac_key); simple_entropy_mix(output_buffer, chunk_size, entropy_buffer, entropy_collected);
EVP_DigestSignUpdate(hmac_ctx, urandom_buffer, chunk_size);
size_t prk_len = sizeof(prk);
EVP_DigestSignFinal(hmac_ctx, prk, &prk_len);
// HKDF Expand phase
const char* info = "OTP-PAD-CHUNK";
if (hkdf_expand(prk, prk_len, (const unsigned char*)info, strlen(info),
output_buffer, chunk_size) == 0) {
// Successfully mixed entropy
} else {
// Fallback to urandom only
memcpy(output_buffer, urandom_buffer, chunk_size);
}
EVP_PKEY_free(hmac_key);
EVP_MD_CTX_free(hmac_ctx);
} else {
// Fallback to urandom only
memcpy(output_buffer, urandom_buffer, chunk_size);
}
// Reset entropy buffer for next chunk // Reset entropy buffer for next chunk
entropy_collected = 0; entropy_collected = 0;
@@ -751,9 +743,9 @@ int generate_pad_with_entropy(uint64_t size_bytes, int display_progress, int use
fclose(urandom); fclose(urandom);
fclose(pad_file); fclose(pad_file);
// Calculate SHA-256 of the pad file // Calculate XOR checksum of the pad file
if (calculate_sha256(temp_filename, hash_hex) != 0) { if (calculate_checksum(temp_filename, hash_hex) != 0) {
printf("Error: Cannot calculate pad hash\n"); printf("Error: Cannot calculate pad checksum\n");
unlink(temp_filename); unlink(temp_filename);
return 1; return 1;
} }
@@ -786,7 +778,7 @@ int generate_pad_with_entropy(uint64_t size_bytes, int display_progress, int use
double size_gb = (double)size_bytes / (1024.0 * 1024.0 * 1024.0); double size_gb = (double)size_bytes / (1024.0 * 1024.0 * 1024.0);
printf("Generated pad: %s (%.2f GB)\n", pad_path, size_gb); printf("Generated pad: %s (%.2f GB)\n", pad_path, size_gb);
printf("Pad hash: %s\n", hash_hex); printf("Pad checksum: %s\n", hash_hex);
printf("State file: %s\n", state_path); printf("State file: %s\n", state_path);
if (use_keyboard_entropy) { if (use_keyboard_entropy) {
printf("Enhanced with keyboard entropy!\n"); printf("Enhanced with keyboard entropy!\n");
@@ -824,9 +816,9 @@ int encrypt_text(const char* pad_identifier) {
return 1; return 1;
} }
// Calculate SHA-256 of pad file // Calculate XOR checksum of pad file
if (calculate_sha256(pad_path, hash_hex) != 0) { if (calculate_checksum(pad_path, hash_hex) != 0) {
printf("Error: Cannot calculate pad hash\n"); printf("Error: Cannot calculate pad checksum\n");
free(pad_hash); free(pad_hash);
return 1; return 1;
} }
@@ -902,7 +894,7 @@ int encrypt_text(const char* pad_identifier) {
} }
// Encode as base64 // Encode as base64
char* base64_cipher = base64_encode(ciphertext, input_len); char* base64_cipher = custom_base64_encode(ciphertext, input_len);
// Update state offset // Update state offset
if (write_state_offset(pad_hash, current_offset + input_len) != 0) { if (write_state_offset(pad_hash, current_offset + input_len) != 0) {
@@ -996,8 +988,8 @@ int decrypt_text(const char* pad_identifier) {
} }
// Verify pad integrity // Verify pad integrity
if (calculate_sha256(pad_path, current_hash) != 0) { if (calculate_checksum(pad_path, current_hash) != 0) {
printf("Error: Cannot calculate current pad hash\n"); printf("Error: Cannot calculate current pad checksum\n");
return 1; return 1;
} }
@@ -1020,7 +1012,7 @@ int decrypt_text(const char* pad_identifier) {
// Decode base64 // Decode base64
int ciphertext_len; int ciphertext_len;
unsigned char* ciphertext = base64_decode(base64_data, &ciphertext_len); unsigned char* ciphertext = custom_base64_decode(base64_data, &ciphertext_len);
if (!ciphertext) { if (!ciphertext) {
printf("Error: Invalid base64 data\n"); printf("Error: Invalid base64 data\n");
return 1; return 1;
@@ -1106,52 +1098,53 @@ int write_state_offset(const char* pad_hash, uint64_t offset) {
return 0; return 0;
} }
int calculate_sha256(const char* filename, char* hash_hex) { int calculate_checksum(const char* filename, char* checksum_hex) {
FILE* file = fopen(filename, "rb"); FILE* file = fopen(filename, "rb");
if (!file) { if (!file) {
return 1; return 1;
} }
EVP_MD_CTX* mdctx = EVP_MD_CTX_new(); unsigned char checksum[32];
if (!mdctx) {
fclose(file);
return 1;
}
if (EVP_DigestInit_ex(mdctx, EVP_sha256(), NULL) != 1) {
EVP_MD_CTX_free(mdctx);
fclose(file);
return 1;
}
unsigned char buffer[64 * 1024]; // 64KB buffer for large files unsigned char buffer[64 * 1024]; // 64KB buffer for large files
size_t bytes_read; size_t bytes_read;
// Initialize checksum
memset(checksum, 0, 32);
size_t total_bytes = 0;
// Calculate XOR checksum of entire file
while ((bytes_read = fread(buffer, 1, sizeof(buffer), file)) > 0) { while ((bytes_read = fread(buffer, 1, sizeof(buffer), file)) > 0) {
if (EVP_DigestUpdate(mdctx, buffer, bytes_read) != 1) { // Process this chunk with XOR checksum
EVP_MD_CTX_free(mdctx); for (size_t i = 0; i < bytes_read; i++) {
fclose(file); unsigned char bucket = (total_bytes + i) % 32;
return 1; checksum[bucket] ^= buffer[i] ^ (((total_bytes + i) >> 8) & 0xFF) ^
(((total_bytes + i) >> 16) & 0xFF) ^ (((total_bytes + i) >> 24) & 0xFF);
} }
total_bytes += bytes_read;
} }
unsigned char hash[EVP_MAX_MD_SIZE]; fclose(file);
unsigned int hash_len;
if (EVP_DigestFinal_ex(mdctx, hash, &hash_len) != 1) { // Now encrypt the checksum with the first 32 bytes of the pad
EVP_MD_CTX_free(mdctx); fseek(file = fopen(filename, "rb"), 0, SEEK_SET);
unsigned char pad_key[32];
if (fread(pad_key, 1, 32, file) != 32) {
fclose(file); fclose(file);
return 1; return 1;
} }
EVP_MD_CTX_free(mdctx);
fclose(file); fclose(file);
// Convert to hex string // XOR encrypt the checksum with pad data to create unique identifier
for (unsigned int i = 0; i < hash_len; i++) { unsigned char encrypted_checksum[32];
sprintf(hash_hex + (i * 2), "%02x", hash[i]); for (int i = 0; i < 32; i++) {
encrypted_checksum[i] = checksum[i] ^ pad_key[i];
} }
hash_hex[hash_len * 2] = '\0';
// Convert to hex string (64 characters)
for (int i = 0; i < 32; i++) {
sprintf(checksum_hex + (i * 2), "%02x", encrypted_checksum[i]);
}
checksum_hex[64] = '\0';
return 0; return 0;
} }
@@ -1226,49 +1219,6 @@ int collect_keyboard_entropy(unsigned char* entropy_buffer, size_t max_size, siz
return 0; return 0;
} }
int hkdf_expand(const unsigned char* prk, size_t prk_len,
const unsigned char* info, size_t info_len,
unsigned char* okm, size_t okm_len) {
EVP_MD_CTX* ctx = EVP_MD_CTX_new();
if (!ctx) return 1;
unsigned char t[32]; // SHA-256 output size
unsigned char counter = 1;
size_t t_len = 32;
size_t pos = 0;
while (pos < okm_len) {
if (EVP_DigestInit_ex(ctx, EVP_sha256(), NULL) != 1) {
EVP_MD_CTX_free(ctx);
return 1;
}
if (pos > 0) {
EVP_DigestUpdate(ctx, t, t_len);
}
EVP_DigestUpdate(ctx, prk, prk_len);
if (info && info_len > 0) {
EVP_DigestUpdate(ctx, info, info_len);
}
EVP_DigestUpdate(ctx, &counter, 1);
unsigned int hash_len;
if (EVP_DigestFinal_ex(ctx, t, &hash_len) != 1) {
EVP_MD_CTX_free(ctx);
return 1;
}
size_t copy_len = (okm_len - pos < hash_len) ? okm_len - pos : hash_len;
memcpy(okm + pos, t, copy_len);
pos += copy_len;
counter++;
}
EVP_MD_CTX_free(ctx);
return 0;
}
// Directory management functions // Directory management functions
int ensure_pads_directory(void) { int ensure_pads_directory(void) {
@@ -1286,49 +1236,91 @@ void get_pad_path(const char* hash, char* pad_path, char* state_path) {
snprintf(state_path, MAX_HASH_LENGTH + 20, "%s/%s.state", PADS_DIR, hash); snprintf(state_path, MAX_HASH_LENGTH + 20, "%s/%s.state", PADS_DIR, hash);
} }
char* base64_encode(const unsigned char* input, int length) {
BIO *bio, *b64; // Custom XOR checksum function
BUF_MEM *buffer_ptr; void xor_checksum_256(const unsigned char* data, size_t len, unsigned char checksum[32]) {
memset(checksum, 0, 32);
b64 = BIO_new(BIO_f_base64()); for (size_t i = 0; i < len; i++) {
bio = BIO_new(BIO_s_mem()); unsigned char bucket = i % 32;
bio = BIO_push(b64, bio); checksum[bucket] ^= data[i] ^ ((i >> 8) & 0xFF) ^ ((i >> 16) & 0xFF) ^ ((i >> 24) & 0xFF);
}
BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL);
BIO_write(bio, input, length);
BIO_flush(bio);
BIO_get_mem_ptr(bio, &buffer_ptr);
char* result = malloc(buffer_ptr->length + 1);
memcpy(result, buffer_ptr->data, buffer_ptr->length);
result[buffer_ptr->length] = '\0';
BIO_free_all(bio);
return result;
} }
unsigned char* base64_decode(const char* input, int* output_length) { // Custom base64 encode function
BIO *bio, *b64; char* custom_base64_encode(const unsigned char* input, int length) {
int decode_len = strlen(input); int output_length = 4 * ((length + 2) / 3);
char* encoded = malloc(output_length + 1);
if (!encoded) return NULL;
unsigned char* buffer = malloc(decode_len); int i, j;
for (i = 0, j = 0; i < length;) {
bio = BIO_new_mem_buf(input, -1); uint32_t octet_a = i < length ? input[i++] : 0;
b64 = BIO_new(BIO_f_base64()); uint32_t octet_b = i < length ? input[i++] : 0;
bio = BIO_push(b64, bio); uint32_t octet_c = i < length ? input[i++] : 0;
BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL); uint32_t triple = (octet_a << 16) + (octet_b << 8) + octet_c;
*output_length = BIO_read(bio, buffer, decode_len);
encoded[j++] = base64_chars[(triple >> 18) & 63];
BIO_free_all(bio); encoded[j++] = base64_chars[(triple >> 12) & 63];
encoded[j++] = base64_chars[(triple >> 6) & 63];
if (*output_length <= 0) { encoded[j++] = base64_chars[triple & 63];
free(buffer);
return NULL;
} }
return buffer; // Add padding
for (int pad = 0; pad < (3 - length % 3) % 3; pad++) {
encoded[output_length - 1 - pad] = '=';
}
encoded[output_length] = '\0';
return encoded;
}
// Custom base64 decode function
unsigned char* custom_base64_decode(const char* input, int* output_length) {
int input_length = strlen(input);
if (input_length % 4 != 0) return NULL;
*output_length = input_length / 4 * 3;
if (input[input_length - 1] == '=') (*output_length)--;
if (input[input_length - 2] == '=') (*output_length)--;
unsigned char* decoded = malloc(*output_length);
if (!decoded) return NULL;
int i, j;
for (i = 0, j = 0; i < input_length;) {
int sextet_a = input[i] == '=' ? 0 & i++ : base64_decode_table[(unsigned char)input[i++]];
int sextet_b = input[i] == '=' ? 0 & i++ : base64_decode_table[(unsigned char)input[i++]];
int sextet_c = input[i] == '=' ? 0 & i++ : base64_decode_table[(unsigned char)input[i++]];
int sextet_d = input[i] == '=' ? 0 & i++ : base64_decode_table[(unsigned char)input[i++]];
if (sextet_a == -1 || sextet_b == -1 || sextet_c == -1 || sextet_d == -1) {
free(decoded);
return NULL;
}
uint32_t triple = (sextet_a << 18) + (sextet_b << 12) + (sextet_c << 6) + sextet_d;
if (j < *output_length) decoded[j++] = (triple >> 16) & 255;
if (j < *output_length) decoded[j++] = (triple >> 8) & 255;
if (j < *output_length) decoded[j++] = triple & 255;
}
return decoded;
}
// Simple keyboard entropy mixing function
void simple_entropy_mix(unsigned char* urandom_buffer, size_t buffer_size,
const unsigned char* entropy_data, size_t entropy_size) {
if (!entropy_data || entropy_size == 0) return;
for (size_t i = 0; i < buffer_size; i++) {
// XOR with entropy data in a rotating pattern
unsigned char entropy_byte = entropy_data[i % entropy_size];
// Mix position information
entropy_byte ^= (i & 0xFF) ^ ((i >> 8) & 0xFF);
urandom_buffer[i] ^= entropy_byte;
}
} }
void print_usage(const char* program_name) { void print_usage(const char* program_name) {
@@ -1337,8 +1329,8 @@ void print_usage(const char* program_name) {
printf("Usage:\n"); printf("Usage:\n");
printf(" %s - Interactive mode\n", program_name); printf(" %s - Interactive mode\n", program_name);
printf(" %s generate <size> - Generate new pad\n", program_name); printf(" %s generate <size> - Generate new pad\n", program_name);
printf(" %s encrypt <pad_hash_prefix> - Encrypt text\n", program_name); printf(" %s encrypt <pad_checksum_prefix> - Encrypt text\n", program_name);
printf(" %s decrypt <pad_hash_prefix> - Decrypt message\n", program_name); printf(" %s decrypt <pad_checksum_prefix> - Decrypt message\n", program_name);
printf(" %s list - List available pads\n", program_name); printf(" %s list - List available pads\n", program_name);
printf("\nSize examples: 1GB, 5TB, 512MB, 2048 (bytes)\n"); printf("\nSize examples: 1GB, 5TB, 512MB, 2048 (bytes)\n");
printf("Pad selection: Full hash, prefix, or number from list\n"); printf("Pad selection: Full hash, prefix, or number from list\n");