Help Guide (Web manual)

THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
FIPS pub 180-2: Secure Hash Standard based on:
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
trsha5.c
sha512.c - implementation of SHA256, SHA384 and SHA512
***** BEGIN LICENSE BLOCK *****
Version: MPL 1.1/GPL 2.0/LGPL 2.1
The contents of this file are subject to the Mozilla Public License Version 1.1 (the “License”); you may not use
this file except in compliance with the License. You may obtain a copy of the License at
http://www.mozilla.org/MPL/
Software distributed under the License is distributed on an “AS IS” basis, WITHOUT WARRANTY OF ANY KIND,
either express or implied. See the License for the specific language governing rights and limitations under the
License.
The Original Code is the Netscape security libraries.
The Initial Developer of the Original Code is Netscape Communications Corporation.
Portions created by the Initial Developer are Copyright (C) 2002 the Initial Developer.
All Rights Reserved.
Contributor(s):
Alternatively, the contents of this file may be used under the terms of either the GNU General Public License
Version 2 or later (the “GPL”), or the GNU Lesser General Public License Version 2.1 or later (the “LGPL”), in
which case the provisions of the GPL or the LGPL are applicable instead of those above. If you wish to allow use
of your version of this file only under the terms of either the GPL or the LGPL, and not to allow others to use
your version of this file under the terms of the MPL, indicate your decision by deleting the provisions above and
replace them with the notice and other provisions required by the GPL or the LGPL. If you do not delete the
provisions above, a recipient may use your version of this file under the terms of any one of the MPL, the GPL or
the LGPL.
***** END LICENSE BLOCK ***** */
FIPS pub 180-2: Secure Hash Standard based on:
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
trtwofsh.c
Copyright (c) 2002 by Niels Ferguson.
The author hereby grants a perpetual license to everybody to use this code for any purpose as long as the
copyright message is included in the source code of this or any derived work.
Yes, this means that you, your company, your club, and anyone else can use this code anywhere you want.
You can change it and distribute it under the GPL, include it in your commercial product without releasing the
source code, put it on the web, etc.
The only thing you cannot do is remove my copyright message, or distribute any source code based on this
implementation that does not include my copyright message.
I appreciate a mention in the documentation or credits, but I understand if that is difficult to do.
I also appreciate it if you tell me where and why you used my code.
DISCLAIMER: As I'm giving away my work for free, I'm of course not going to accept any liability of any form.
This code, or the Twofish cipher, might very well be flawed; you have been warned.
This software is provided as-is, without any kind of warrenty or guarantee.
And that is really all you can expect when you download code for free from the Internet.
trqsort.c
Copyright (c) 1992, 1993
The Regents of the University of California.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met: