mdX.3 (f778764443157b925d5c04050d2627cf0279606a) | mdX.3 (a5941fc2aae12cb42e24117b2979147c9c7c5571) |
---|---|
1.\" 2.\" ---------------------------------------------------------------------------- 3.\" "THE BEER-WARE LICENSE" (Revision 42): 4.\" <phk@login.dkuug.dk> wrote this file. As long as you retain this notice you 5.\" can do whatever you want with this stuff. If we meet some day, and you think 6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp 7.\" ---------------------------------------------------------------------------- 8.\" | 1.\" 2.\" ---------------------------------------------------------------------------- 3.\" "THE BEER-WARE LICENSE" (Revision 42): 4.\" <phk@login.dkuug.dk> wrote this file. As long as you retain this notice you 5.\" can do whatever you want with this stuff. If we meet some day, and you think 6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp 7.\" ---------------------------------------------------------------------------- 8.\" |
9.\" $Id: mdX.3,v 1.10 1997/03/19 00:52:58 bde Exp $ | 9.\" $Id: mdX.3,v 1.11 1997/08/25 05:24:25 joerg Exp $ |
10.\" 11.Dd October 9, 1996 12.Dt MDX 3 13.Os FreeBSD 2 14.Sh NAME 15.Nm MDXInit , 16.Nm MDXUpdate , 17.Nm MDXFinal , --- 93 unchanged lines hidden (view full) --- 111.%A R. Rivest 112.%T The MD5 Message-Digest Algorithm 113.%O RFC 1321 114.Re 115.Rs 116.%A RSA Laboratories 117.%T Frequently Asked Questions About today's Cryptography 118.Re | 10.\" 11.Dd October 9, 1996 12.Dt MDX 3 13.Os FreeBSD 2 14.Sh NAME 15.Nm MDXInit , 16.Nm MDXUpdate , 17.Nm MDXFinal , --- 93 unchanged lines hidden (view full) --- 111.%A R. Rivest 112.%T The MD5 Message-Digest Algorithm 113.%O RFC 1321 114.Re 115.Rs 116.%A RSA Laboratories 117.%T Frequently Asked Questions About today's Cryptography 118.Re |
119.Sh AUTHOR | 119.Sh AUTHORS |
120The original MDX routines were developed by 121.Tn RSA 122Data Security, Inc., and published in the above references. | 120The original MDX routines were developed by 121.Tn RSA 122Data Security, Inc., and published in the above references. |
123This code is derived directly from these implementations by Poul-Henning Kamp 124.Aq Li phk@login.dkuug.dk | 123This code is derived directly from these implementations by 124.An Poul-Henning Kamp Aq phk@login.dkuug.dk |
125.Pp 126Phk ristede runen. 127.Sh HISTORY 128These functions appeared in 129.Fx 2.0 . 130.Sh BUGS 131No method is known to exist which finds two files having the same hash value, 132nor to find a file with a specific hash value. 133There is on the other hand no guarantee that such a method doesn't exist. 134.Pp 135MD2 has only been licensed for use in Privacy Enhanced Mail. 136Use MD4 or MD5 if that isn't what you're doing. 137.Sh COPYRIGHT | 125.Pp 126Phk ristede runen. 127.Sh HISTORY 128These functions appeared in 129.Fx 2.0 . 130.Sh BUGS 131No method is known to exist which finds two files having the same hash value, 132nor to find a file with a specific hash value. 133There is on the other hand no guarantee that such a method doesn't exist. 134.Pp 135MD2 has only been licensed for use in Privacy Enhanced Mail. 136Use MD4 or MD5 if that isn't what you're doing. 137.Sh COPYRIGHT |