SHA1

implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349.

It is interesting to ponder why the, apart from the extra IV, the other difference here from MD5 is the "endianness" of the word processing!

Members

Functions

finish
ubyte[digestLength] finish()
put
void put(ubyte[] input)
Undocumented in source. Be warned that the author may not have intended to support it.
start
void start()

Reset SHA1.

Manifest constants

blockSize
enum blockSize;
Undocumented in source.
digestLength
enum digestLength;
Undocumented in source.
name
enum name;
Undocumented in source.

Meta