The SHA-1 function is now considered cryptographically broken. Namely, it is feasible to find multiple inputs producing the same hash. For a fast-performing, cryptographically secure hash function, see SHA512/256, BLAKE2 or BLAKE3.

Fields

s: [5]u32,
buf: [64]u8 = undefined,
buf_len: u8 = 0,
total_len: u64 = 0,

Namespaces

Functions

fn final(d: *Self, out: *[digest_length]u8) void

No documentation provided.

fn finalResult(d: *Self) [digest_length]u8

No documentation provided.

fn hash(b: []const u8, out: *[digest_length]u8, options: Options) void

No documentation provided.

fn init(options: Options) Self

No documentation provided.

fn peek(d: Self) [digest_length]u8

No documentation provided.

fn update(d: *Self, b: []const u8) void

No documentation provided.

fn writer(self: *Self) Writer

No documentation provided.

Values

Writer
undefined
block_length
comptime_int
digest_length
comptime_int

Error Sets