implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349.
See Source File