And if you’re working from a secure compartmentalized environment or are working on a high security project that doesn’t let you pull libraries from outside. Lots of reasons for being able to roll your own. Besides the fact that it takes like two minutes to write it correctly.
You might need a custom one as well. Modify the algorithm.
Good to demonstrate the divide and conquer approach.
And if you’re working from a secure compartmentalized environment or are working on a high security project that doesn’t let you pull libraries from outside. Lots of reasons for being able to roll your own. Besides the fact that it takes like two minutes to write it correctly.