sha512.c - implementation of SHA256, SHA384 and SHA512
***** BEGIN LICENSE BLOCK *****
Version: MPL 1.1/GPL 2.0/LGPL 2.1
The contents of this file are subject to the Mozilla Public License Version 1.1 (the "License");
you may not use this file except in compliance with the License. You may obtain a copy of
the License at http://www.mozilla.org/MPL/
Software distributed under the License is distributed on an "AS IS" basis, WITHOUT
WARRANTY OF ANY KIND, either express or implied. See the License for the specific
language governing rights and limitations under the License.
The Original Code is the Netscape security libraries.
The Initial Developer of the Original Code is Netscape Communications Corporation.
Portions created by the Initial Developer are Copyright (C) 2002 the Initial Developer.
All Rights Reserved.
Contributor(s):
Alternatively, the contents of this file may be used under the terms of either the GNU
General Public License Version 2 or later (the "GPL"), or the GNU Lesser General Public
License Version 2.1 or later (the "LGPL"), in which case the provisions of the GPL or the
LGPL are applicable instead of those above. If you wish to allow use of your version of this
file only under the terms of either the GPL or the LGPL, and not to allow others to use your
version of this file under the terms of the MPL, indicate your decision by deleting the
provisions above and replace them with the notice and other provisions required by the GPL
or the LGPL. If you do not delete the provisions above, a recipient may use your version of
this file under the terms of any one of the MPL, the GPL or the LGPL.
***** END LICENSE BLOCK ***** */
FIPS pub 180-2: Secure Hash Standard based on:
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
trtwofsh.c
Copyright (c) 2002 by Niels Ferguson.
The author hereby grants a perpetual license to everybody to use this code for any purpose
as long as the copyright message is included in the source code of this or any derived work.
Yes, this means that you, your company, your club, and anyone else can use this code
anywhere you want.
You can change it and distribute it under the GPL, include it in your commercial product
without releasing the source code, put it on the web, etc.
The only thing you cannot do is remove my copyright message, or distribute any source
code based on this implementation that does not include my copyright message.
I appreciate a mention in the documentation or credits, but I understand if that is difficult to
do.
I also appreciate it if you tell me where and why you used my code.
DISCLAIMER: As I'm giving away my work for free, I'm of course not going to accept any
liability of any form.
This code, or the Twofish cipher, might very well be flawed; you have been warned.