Skip to content

A feather light implementation of SHA-256, along with a command-line interface (CLI) wrapper designed to bootstrap stage0 toolchains prior to the availability of more robust cryptographic libraries.

License

Notifications You must be signed in to change notification settings

reactive-firewall/FeatherHash

Repository files navigation

Copyright (C) 2004 by "The United States of America as represented by the National Security Agency" <wtnewbi@tycho.ncsc.mil>

Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

About

A feather light implementation of SHA-256, along with a command-line interface (CLI) wrapper designed to bootstrap stage0 toolchains prior to the availability of more robust cryptographic libraries.

Topics

License

Stars

Watchers

Forks

Releases

No releases published

Packages