Introduction - If you have any usage issues, please Google them yourself
The contents of the txt file for the hash value, the specific algorithm for the sha_1 algorithm source for the principle and practice of "Feng" cryptography shown
Student original, executable