This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| \ ANS Forth implementation of Secure Hash Algorithm SHA-1 | |
| \ FIPS 180-4 spec at: http://csrc.nist.gov/publications/PubsFIPS.html | |
| \ Also HMAC for SHA-1 as specified in FIPS PUB 198-1 | |
| \ Code accommodates Big and Little Endian, byte addressable CPUs. | |
| \ | |
| \ ------------ This implementation is for 32-bit systems ------------ | |
| \ | |
| \ DEPENDENCIES: CORE EXT WORDSET ; COMMON USAGE: ?DO CELL- | |
| \ Use of this code is free subject to acknowledgment of copyright. | |
| \ Copyright (c) 2001-2013 Jabari Zakiya - jzakiya@mail.com 2013/1/15 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| =begin | |
| Author: Jabari Zakiya, Original: 2009-12-25 | |
| Revision-2: 2009-12-31 | |
| Revision-3: 2010-6-2 | |
| Revision-4: 2010-12-15 | |
| Revision-5: 2011-5-11 | |
| Revision-6: 2011-5-15 | |
| Module 'Roots' provides two methods 'root' and 'roots' | |
| which will find all the nth roots of real and complex |
NewerOlder