@rakurame96 I am making this ticket as we discussed through email. I will provide some examples of demonstration code in this thread. I think it will be good to have examples for the specific usage case of each cryptographic algorithm from a file.
So for instance I would read a file from disk and get the bytes and perform the necessary operation.
Hashers would compare two hashes of different files and show a true / false example. I can some code examples in this thread for a hash and aes_gcm.
@rakurame96 I am making this ticket as we discussed through email. I will provide some examples of demonstration code in this thread. I think it will be good to have examples for the specific usage case of each cryptographic algorithm from a file.
So for instance I would read a file from disk and get the bytes and perform the necessary operation.
Hashers would compare two hashes of different files and show a true / false example. I can some code examples in this thread for a hash and aes_gcm.