mirror of
https://github.com/slsdetectorgroup/slsDetectorPackage.git
synced 2025-04-26 16:20:03 +02:00
515 lines
20 KiB
C
515 lines
20 KiB
C
/*
|
|
Apache License
|
|
Version 2.0, January 2004
|
|
http://www.apache.org/licenses/
|
|
|
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
|
|
|
1. Definitions.
|
|
|
|
"License" shall mean the terms and conditions for use, reproduction,
|
|
and distribution as defined by Sections 1 through 9 of this document.
|
|
|
|
"Licensor" shall mean the copyright owner or entity authorized by
|
|
the copyright owner that is granting the License.
|
|
|
|
"Legal Entity" shall mean the union of the acting entity and all
|
|
other entities that control, are controlled by, or are under common
|
|
control with that entity. For the purposes of this definition,
|
|
"control" means (i) the power, direct or indirect, to cause the
|
|
direction or management of such entity, whether by contract or
|
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
|
|
|
"You" (or "Your") shall mean an individual or Legal Entity
|
|
exercising permissions granted by this License.
|
|
|
|
"Source" form shall mean the preferred form for making modifications,
|
|
including but not limited to software source code, documentation
|
|
source, and configuration files.
|
|
|
|
"Object" form shall mean any form resulting from mechanical
|
|
transformation or translation of a Source form, including but
|
|
not limited to compiled object code, generated documentation,
|
|
and conversions to other media types.
|
|
|
|
"Work" shall mean the work of authorship, whether in Source or
|
|
Object form, made available under the License, as indicated by a
|
|
copyright notice that is included in or attached to the work
|
|
(an example is provided in the Appendix below).
|
|
|
|
"Derivative Works" shall mean any work, whether in Source or Object
|
|
form, that is based on (or derived from) the Work and for which the
|
|
editorial revisions, annotations, elaborations, or other modifications
|
|
represent, as a whole, an original work of authorship. For the purposes
|
|
of this License, Derivative Works shall not include works that remain
|
|
separable from, or merely link (or bind by name) to the interfaces of,
|
|
the Work and Derivative Works thereof.
|
|
|
|
"Contribution" shall mean any work of authorship, including
|
|
the original version of the Work and any modifications or additions
|
|
to that Work or Derivative Works thereof, that is intentionally
|
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
|
or by an individual or Legal Entity authorized to submit on behalf of
|
|
the copyright owner. For the purposes of this definition, "submitted"
|
|
means any form of electronic, verbal, or written communication sent
|
|
to the Licensor or its representatives, including but not limited to
|
|
communication on electronic mailing lists, source code control systems,
|
|
and issue tracking systems that are managed by, or on behalf of, the
|
|
Licensor for the purpose of discussing and improving the Work, but
|
|
excluding communication that is conspicuously marked or otherwise
|
|
designated in writing by the copyright owner as "Not a Contribution."
|
|
|
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
|
on behalf of whom a Contribution has been received by Licensor and
|
|
subsequently incorporated within the Work.
|
|
|
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
|
this License, each Contributor hereby grants to You a perpetual,
|
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
|
copyright license to reproduce, prepare Derivative Works of,
|
|
publicly display, publicly perform, sublicense, and distribute the
|
|
Work and such Derivative Works in Source or Object form.
|
|
|
|
3. Grant of Patent License. Subject to the terms and conditions of
|
|
this License, each Contributor hereby grants to You a perpetual,
|
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
|
(except as stated in this section) patent license to make, have made,
|
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
|
where such license applies only to those patent claims licensable
|
|
by such Contributor that are necessarily infringed by their
|
|
Contribution(s) alone or by combination of their Contribution(s)
|
|
with the Work to which such Contribution(s) was submitted. If You
|
|
institute patent litigation against any entity (including a
|
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
|
or a Contribution incorporated within the Work constitutes direct
|
|
or contributory patent infringement, then any patent licenses
|
|
granted to You under this License for that Work shall terminate
|
|
as of the date such litigation is filed.
|
|
|
|
4. Redistribution. You may reproduce and distribute copies of the
|
|
Work or Derivative Works thereof in any medium, with or without
|
|
modifications, and in Source or Object form, provided that You
|
|
meet the following conditions:
|
|
|
|
(a) You must give any other recipients of the Work or
|
|
Derivative Works a copy of this License; and
|
|
|
|
(b) You must cause any modified files to carry prominent notices
|
|
stating that You changed the files; and
|
|
|
|
(c) You must retain, in the Source form of any Derivative Works
|
|
that You distribute, all copyright, patent, trademark, and
|
|
attribution notices from the Source form of the Work,
|
|
excluding those notices that do not pertain to any part of
|
|
the Derivative Works; and
|
|
|
|
(d) If the Work includes a "NOTICE" text file as part of its
|
|
distribution, then any Derivative Works that You distribute must
|
|
include a readable copy of the attribution notices contained
|
|
within such NOTICE file, excluding those notices that do not
|
|
pertain to any part of the Derivative Works, in at least one
|
|
of the following places: within a NOTICE text file distributed
|
|
as part of the Derivative Works; within the Source form or
|
|
documentation, if provided along with the Derivative Works; or,
|
|
within a display generated by the Derivative Works, if and
|
|
wherever such third-party notices normally appear. The contents
|
|
of the NOTICE file are for informational purposes only and
|
|
do not modify the License. You may add Your own attribution
|
|
notices within Derivative Works that You distribute, alongside
|
|
or as an addendum to the NOTICE text from the Work, provided
|
|
that such additional attribution notices cannot be construed
|
|
as modifying the License.
|
|
|
|
You may add Your own copyright statement to Your modifications and
|
|
may provide additional or different license terms and conditions
|
|
for use, reproduction, or distribution of Your modifications, or
|
|
for any such Derivative Works as a whole, provided Your use,
|
|
reproduction, and distribution of the Work otherwise complies with
|
|
the conditions stated in this License.
|
|
|
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
|
any Contribution intentionally submitted for inclusion in the Work
|
|
by You to the Licensor shall be under the terms and conditions of
|
|
this License, without any additional terms or conditions.
|
|
Notwithstanding the above, nothing herein shall supersede or modify
|
|
the terms of any separate license agreement you may have executed
|
|
with Licensor regarding such Contributions.
|
|
|
|
6. Trademarks. This License does not grant permission to use the trade
|
|
names, trademarks, service marks, or product names of the Licensor,
|
|
except as required for reasonable and customary use in describing the
|
|
origin of the Work and reproducing the content of the NOTICE file.
|
|
|
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
|
agreed to in writing, Licensor provides the Work (and each
|
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
implied, including, without limitation, any warranties or conditions
|
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
|
appropriateness of using or redistributing the Work and assume any
|
|
risks associated with Your exercise of permissions under this License.
|
|
|
|
8. Limitation of Liability. In no event and under no legal theory,
|
|
whether in tort (including negligence), contract, or otherwise,
|
|
unless required by applicable law (such as deliberate and grossly
|
|
negligent acts) or agreed to in writing, shall any Contributor be
|
|
liable to You for damages, including any direct, indirect, special,
|
|
incidental, or consequential damages of any character arising as a
|
|
result of this License or out of the use or inability to use the
|
|
Work (including but not limited to damages for loss of goodwill,
|
|
work stoppage, computer failure or malfunction, or any and all
|
|
other commercial damages or losses), even if such Contributor
|
|
has been advised of the possibility of such damages.
|
|
|
|
9. Accepting Warranty or Additional Liability. While redistributing
|
|
the Work or Derivative Works thereof, You may choose to offer,
|
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
|
or other liability obligations and/or rights consistent with this
|
|
License. However, in accepting such obligations, You may act only
|
|
on Your own behalf and on Your sole responsibility, not on behalf
|
|
of any other Contributor, and only if You agree to indemnify,
|
|
defend, and hold each Contributor harmless for any liability
|
|
incurred by, or claims asserted against, such Contributor by reason
|
|
of your accepting any such warranty or additional liability.
|
|
|
|
END OF TERMS AND CONDITIONS
|
|
|
|
APPENDIX: How to apply the Apache License to your work.
|
|
|
|
To apply the Apache License to your work, attach the following
|
|
boilerplate notice, with the fields enclosed by brackets "[]"
|
|
replaced with your own identifying information. (Don't include
|
|
the brackets!) The text should be enclosed in the appropriate
|
|
comment syntax for the file format. We also recommend that a
|
|
file or class name and description of purpose be included on the
|
|
same "printed page" as the copyright notice for easier
|
|
identification within third-party archives.
|
|
|
|
Copyright [yyyy] [name of copyright owner]
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
/*
|
|
* Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/*
|
|
* MD5 low level APIs are deprecated for public use, but still ok for
|
|
* internal use.
|
|
*/
|
|
|
|
/*
|
|
* Modifications 2021 Paul Scherrer Institut
|
|
* Removed most of the code that is not relevant for our scope
|
|
* from md5_dgst.c and renamed to md5.c
|
|
* from md32_common.h and replaced their macros with their defines
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
/**
|
|
* Modification 2021 Paul Scherrer Institut
|
|
* Header included was md5_local.h
|
|
* and string.h header was included
|
|
* sls namespace added
|
|
*/
|
|
#include "sls/md5.h"
|
|
#include <string.h>
|
|
#ifdef __cplusplus
|
|
namespace sls {
|
|
#endif
|
|
|
|
/**
|
|
* Modification 2021 Paul Scherrer Institut
|
|
* Macros exported from md5_local.h
|
|
*/
|
|
#define F(b,c,d) ((((c) ^ (d)) & (b)) ^ (d))
|
|
#define G(b,c,d) ((((b) ^ (c)) & (d)) ^ (c))
|
|
#define H(b,c,d) ((b) ^ (c) ^ (d))
|
|
#define I(b,c,d) (((~(d)) | (b)) ^ (c))
|
|
|
|
#define R0(a,b,c,d,k,s,t) { \
|
|
a+=((k)+(t)+F((b),(c),(d))); \
|
|
a=ROTATE(a,s); \
|
|
a+=b; };
|
|
|
|
#define R1(a,b,c,d,k,s,t) { \
|
|
a+=((k)+(t)+G((b),(c),(d))); \
|
|
a=ROTATE(a,s); \
|
|
a+=b; };
|
|
|
|
#define R2(a,b,c,d,k,s,t) { \
|
|
a+=((k)+(t)+H((b),(c),(d))); \
|
|
a=ROTATE(a,s); \
|
|
a+=b; };
|
|
|
|
#define R3(a,b,c,d,k,s,t) { \
|
|
a+=((k)+(t)+I((b),(c),(d))); \
|
|
a=ROTATE(a,s); \
|
|
a+=b; };
|
|
|
|
|
|
|
|
/*
|
|
* Implemented from RFC1321 The MD5 Message-Digest Algorithm
|
|
*/
|
|
|
|
#define INIT_DATA_A (unsigned long)0x67452301L
|
|
#define INIT_DATA_B (unsigned long)0xefcdab89L
|
|
#define INIT_DATA_C (unsigned long)0x98badcfeL
|
|
#define INIT_DATA_D (unsigned long)0x10325476L
|
|
|
|
int MD5_Init_SLS(MD5_CTX *c)
|
|
{
|
|
memset(c, 0, sizeof(*c));
|
|
c->A = INIT_DATA_A;
|
|
c->B = INIT_DATA_B;
|
|
c->C = INIT_DATA_C;
|
|
c->D = INIT_DATA_D;
|
|
return 1;
|
|
}
|
|
|
|
void md5_block_data_order(MD5_CTX *c, const void *data_, size_t num)
|
|
{
|
|
const unsigned char *data = data_;
|
|
register unsigned MD32_REG_T A, B, C, D, l;
|
|
/* See comment in crypto/sha/sha_local.h for details. */
|
|
unsigned MD32_REG_T XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7,
|
|
XX8, XX9, XX10, XX11, XX12, XX13, XX14, XX15;
|
|
# define X(i) XX##i
|
|
|
|
A = c->A;
|
|
B = c->B;
|
|
C = c->C;
|
|
D = c->D;
|
|
|
|
for (; num--;) {
|
|
(void)HOST_c2l(data, l);
|
|
X(0) = l;
|
|
(void)HOST_c2l(data, l);
|
|
X(1) = l;
|
|
/* Round 0 */
|
|
R0(A, B, C, D, X(0), 7, 0xd76aa478L);
|
|
(void)HOST_c2l(data, l);
|
|
X(2) = l;
|
|
R0(D, A, B, C, X(1), 12, 0xe8c7b756L);
|
|
(void)HOST_c2l(data, l);
|
|
X(3) = l;
|
|
R0(C, D, A, B, X(2), 17, 0x242070dbL);
|
|
(void)HOST_c2l(data, l);
|
|
X(4) = l;
|
|
R0(B, C, D, A, X(3), 22, 0xc1bdceeeL);
|
|
(void)HOST_c2l(data, l);
|
|
X(5) = l;
|
|
R0(A, B, C, D, X(4), 7, 0xf57c0fafL);
|
|
(void)HOST_c2l(data, l);
|
|
X(6) = l;
|
|
R0(D, A, B, C, X(5), 12, 0x4787c62aL);
|
|
(void)HOST_c2l(data, l);
|
|
X(7) = l;
|
|
R0(C, D, A, B, X(6), 17, 0xa8304613L);
|
|
(void)HOST_c2l(data, l);
|
|
X(8) = l;
|
|
R0(B, C, D, A, X(7), 22, 0xfd469501L);
|
|
(void)HOST_c2l(data, l);
|
|
X(9) = l;
|
|
R0(A, B, C, D, X(8), 7, 0x698098d8L);
|
|
(void)HOST_c2l(data, l);
|
|
X(10) = l;
|
|
R0(D, A, B, C, X(9), 12, 0x8b44f7afL);
|
|
(void)HOST_c2l(data, l);
|
|
X(11) = l;
|
|
R0(C, D, A, B, X(10), 17, 0xffff5bb1L);
|
|
(void)HOST_c2l(data, l);
|
|
X(12) = l;
|
|
R0(B, C, D, A, X(11), 22, 0x895cd7beL);
|
|
(void)HOST_c2l(data, l);
|
|
X(13) = l;
|
|
R0(A, B, C, D, X(12), 7, 0x6b901122L);
|
|
(void)HOST_c2l(data, l);
|
|
X(14) = l;
|
|
R0(D, A, B, C, X(13), 12, 0xfd987193L);
|
|
(void)HOST_c2l(data, l);
|
|
X(15) = l;
|
|
R0(C, D, A, B, X(14), 17, 0xa679438eL);
|
|
R0(B, C, D, A, X(15), 22, 0x49b40821L);
|
|
/* Round 1 */
|
|
R1(A, B, C, D, X(1), 5, 0xf61e2562L);
|
|
R1(D, A, B, C, X(6), 9, 0xc040b340L);
|
|
R1(C, D, A, B, X(11), 14, 0x265e5a51L);
|
|
R1(B, C, D, A, X(0), 20, 0xe9b6c7aaL);
|
|
R1(A, B, C, D, X(5), 5, 0xd62f105dL);
|
|
R1(D, A, B, C, X(10), 9, 0x02441453L);
|
|
R1(C, D, A, B, X(15), 14, 0xd8a1e681L);
|
|
R1(B, C, D, A, X(4), 20, 0xe7d3fbc8L);
|
|
R1(A, B, C, D, X(9), 5, 0x21e1cde6L);
|
|
R1(D, A, B, C, X(14), 9, 0xc33707d6L);
|
|
R1(C, D, A, B, X(3), 14, 0xf4d50d87L);
|
|
R1(B, C, D, A, X(8), 20, 0x455a14edL);
|
|
R1(A, B, C, D, X(13), 5, 0xa9e3e905L);
|
|
R1(D, A, B, C, X(2), 9, 0xfcefa3f8L);
|
|
R1(C, D, A, B, X(7), 14, 0x676f02d9L);
|
|
R1(B, C, D, A, X(12), 20, 0x8d2a4c8aL);
|
|
/* Round 2 */
|
|
R2(A, B, C, D, X(5), 4, 0xfffa3942L);
|
|
R2(D, A, B, C, X(8), 11, 0x8771f681L);
|
|
R2(C, D, A, B, X(11), 16, 0x6d9d6122L);
|
|
R2(B, C, D, A, X(14), 23, 0xfde5380cL);
|
|
R2(A, B, C, D, X(1), 4, 0xa4beea44L);
|
|
R2(D, A, B, C, X(4), 11, 0x4bdecfa9L);
|
|
R2(C, D, A, B, X(7), 16, 0xf6bb4b60L);
|
|
R2(B, C, D, A, X(10), 23, 0xbebfbc70L);
|
|
R2(A, B, C, D, X(13), 4, 0x289b7ec6L);
|
|
R2(D, A, B, C, X(0), 11, 0xeaa127faL);
|
|
R2(C, D, A, B, X(3), 16, 0xd4ef3085L);
|
|
R2(B, C, D, A, X(6), 23, 0x04881d05L);
|
|
R2(A, B, C, D, X(9), 4, 0xd9d4d039L);
|
|
R2(D, A, B, C, X(12), 11, 0xe6db99e5L);
|
|
R2(C, D, A, B, X(15), 16, 0x1fa27cf8L);
|
|
R2(B, C, D, A, X(2), 23, 0xc4ac5665L);
|
|
/* Round 3 */
|
|
R3(A, B, C, D, X(0), 6, 0xf4292244L);
|
|
R3(D, A, B, C, X(7), 10, 0x432aff97L);
|
|
R3(C, D, A, B, X(14), 15, 0xab9423a7L);
|
|
R3(B, C, D, A, X(5), 21, 0xfc93a039L);
|
|
R3(A, B, C, D, X(12), 6, 0x655b59c3L);
|
|
R3(D, A, B, C, X(3), 10, 0x8f0ccc92L);
|
|
R3(C, D, A, B, X(10), 15, 0xffeff47dL);
|
|
R3(B, C, D, A, X(1), 21, 0x85845dd1L);
|
|
R3(A, B, C, D, X(8), 6, 0x6fa87e4fL);
|
|
R3(D, A, B, C, X(15), 10, 0xfe2ce6e0L);
|
|
R3(C, D, A, B, X(6), 15, 0xa3014314L);
|
|
R3(B, C, D, A, X(13), 21, 0x4e0811a1L);
|
|
R3(A, B, C, D, X(4), 6, 0xf7537e82L);
|
|
R3(D, A, B, C, X(11), 10, 0xbd3af235L);
|
|
R3(C, D, A, B, X(2), 15, 0x2ad7d2bbL);
|
|
R3(B, C, D, A, X(9), 21, 0xeb86d391L);
|
|
|
|
A = c->A += A;
|
|
B = c->B += B;
|
|
C = c->C += C;
|
|
D = c->D += D;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Modification 2021 Paul Scherrer Institut
|
|
* from md32_common.h
|
|
*/
|
|
int HASH_UPDATE(HASH_CTX *c, const void *data_, size_t len)
|
|
{
|
|
const unsigned char *data = data_;
|
|
unsigned char *p;
|
|
HASH_LONG l;
|
|
size_t n;
|
|
|
|
if (len == 0)
|
|
return 1;
|
|
|
|
l = (c->Nl + (((HASH_LONG) len) << 3)) & 0xffffffffUL;
|
|
if (l < c->Nl) /* overflow */
|
|
c->Nh++;
|
|
c->Nh += (HASH_LONG) (len >> 29); /* might cause compiler warning on
|
|
* 16-bit */
|
|
c->Nl = l;
|
|
|
|
n = c->num;
|
|
if (n != 0) {
|
|
p = (unsigned char *)c->data;
|
|
|
|
if (len >= HASH_CBLOCK || len + n >= HASH_CBLOCK) {
|
|
memcpy(p + n, data, HASH_CBLOCK - n);
|
|
HASH_BLOCK_DATA_ORDER(c, p, 1);
|
|
n = HASH_CBLOCK - n;
|
|
data += n;
|
|
len -= n;
|
|
c->num = 0;
|
|
/*
|
|
* We use memset rather than OPENSSL_cleanse() here deliberately.
|
|
* Using OPENSSL_cleanse() here could be a performance issue. It
|
|
* will get properly cleansed on finalisation so this isn't a
|
|
* security problem.
|
|
*/
|
|
memset(p, 0, HASH_CBLOCK); /* keep it zeroed */
|
|
} else {
|
|
memcpy(p + n, data, len);
|
|
c->num += (unsigned int)len;
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
n = len / HASH_CBLOCK;
|
|
if (n > 0) {
|
|
HASH_BLOCK_DATA_ORDER(c, data, n);
|
|
n *= HASH_CBLOCK;
|
|
data += n;
|
|
len -= n;
|
|
}
|
|
|
|
if (len != 0) {
|
|
p = (unsigned char *)c->data;
|
|
c->num = (unsigned int)len;
|
|
memcpy(p, data, len);
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
/**
|
|
* Modification 2021 Paul Scherrer Institut
|
|
* from md32_common.h
|
|
*/
|
|
int HASH_FINAL(unsigned char *md, HASH_CTX *c)
|
|
{
|
|
unsigned char *p = (unsigned char *)c->data;
|
|
size_t n = c->num;
|
|
|
|
p[n] = 0x80; /* there is always room for one */
|
|
n++;
|
|
|
|
if (n > (HASH_CBLOCK - 8)) {
|
|
memset(p + n, 0, HASH_CBLOCK - n);
|
|
n = 0;
|
|
HASH_BLOCK_DATA_ORDER(c, p, 1);
|
|
}
|
|
memset(p + n, 0, HASH_CBLOCK - 8 - n);
|
|
|
|
p += HASH_CBLOCK - 8;
|
|
#if defined(DATA_ORDER_IS_BIG_ENDIAN)
|
|
(void)HOST_l2c(c->Nh, p);
|
|
(void)HOST_l2c(c->Nl, p);
|
|
#elif defined(DATA_ORDER_IS_LITTLE_ENDIAN)
|
|
(void)HOST_l2c(c->Nl, p);
|
|
(void)HOST_l2c(c->Nh, p);
|
|
#endif
|
|
p -= HASH_CBLOCK;
|
|
HASH_BLOCK_DATA_ORDER(c, p, 1);
|
|
c->num = 0;
|
|
// OPENSSL_cleanse(p, HASH_CBLOCK);
|
|
//Erik: Since we don't do encryption secure cleaning is not needed
|
|
memset(p, 0, HASH_CBLOCK);
|
|
|
|
HASH_MAKE_STRING(c, md);
|
|
|
|
return 1;
|
|
}
|
|
|
|
#ifdef __cplusplus
|
|
} // namespace sls
|
|
#endif |