SHA1

implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349.

It is interesting to ponder why the, apart from the extra IV, the other difference here from MD5 is the "endianness" of the word processing!

@safe
struct SHA1 {
enum name;
enum digestLength;
enum blockSize;
}

Members

Functions

finish
ubyte[digestLength] finish()
start
void start()

Reset SHA1.

Meta