mdX.3 (f778764443157b925d5c04050d2627cf0279606a) mdX.3 (a5941fc2aae12cb42e24117b2979147c9c7c5571)
1.\"
2.\" ----------------------------------------------------------------------------
3.\" "THE BEER-WARE LICENSE" (Revision 42):
4.\" <phk@login.dkuug.dk> wrote this file. As long as you retain this notice you
5.\" can do whatever you want with this stuff. If we meet some day, and you think
6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
7.\" ----------------------------------------------------------------------------
8.\"
1.\"
2.\" ----------------------------------------------------------------------------
3.\" "THE BEER-WARE LICENSE" (Revision 42):
4.\" <phk@login.dkuug.dk> wrote this file. As long as you retain this notice you
5.\" can do whatever you want with this stuff. If we meet some day, and you think
6.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
7.\" ----------------------------------------------------------------------------
8.\"
9.\" $Id: mdX.3,v 1.10 1997/03/19 00:52:58 bde Exp $
9.\" $Id: mdX.3,v 1.11 1997/08/25 05:24:25 joerg Exp $
10.\"
11.Dd October 9, 1996
12.Dt MDX 3
13.Os FreeBSD 2
14.Sh NAME
15.Nm MDXInit ,
16.Nm MDXUpdate ,
17.Nm MDXFinal ,

--- 93 unchanged lines hidden (view full) ---

111.%A R. Rivest
112.%T The MD5 Message-Digest Algorithm
113.%O RFC 1321
114.Re
115.Rs
116.%A RSA Laboratories
117.%T Frequently Asked Questions About today's Cryptography
118.Re
10.\"
11.Dd October 9, 1996
12.Dt MDX 3
13.Os FreeBSD 2
14.Sh NAME
15.Nm MDXInit ,
16.Nm MDXUpdate ,
17.Nm MDXFinal ,

--- 93 unchanged lines hidden (view full) ---

111.%A R. Rivest
112.%T The MD5 Message-Digest Algorithm
113.%O RFC 1321
114.Re
115.Rs
116.%A RSA Laboratories
117.%T Frequently Asked Questions About today's Cryptography
118.Re
119.Sh AUTHOR
119.Sh AUTHORS
120The original MDX routines were developed by
121.Tn RSA
122Data Security, Inc., and published in the above references.
120The original MDX routines were developed by
121.Tn RSA
122Data Security, Inc., and published in the above references.
123This code is derived directly from these implementations by Poul-Henning Kamp
124.Aq Li phk@login.dkuug.dk
123This code is derived directly from these implementations by
124.An Poul-Henning Kamp Aq phk@login.dkuug.dk
125.Pp
126Phk ristede runen.
127.Sh HISTORY
128These functions appeared in
129.Fx 2.0 .
130.Sh BUGS
131No method is known to exist which finds two files having the same hash value,
132nor to find a file with a specific hash value.
133There is on the other hand no guarantee that such a method doesn't exist.
134.Pp
135MD2 has only been licensed for use in Privacy Enhanced Mail.
136Use MD4 or MD5 if that isn't what you're doing.
137.Sh COPYRIGHT
125.Pp
126Phk ristede runen.
127.Sh HISTORY
128These functions appeared in
129.Fx 2.0 .
130.Sh BUGS
131No method is known to exist which finds two files having the same hash value,
132nor to find a file with a specific hash value.
133There is on the other hand no guarantee that such a method doesn't exist.
134.Pp
135MD2 has only been licensed for use in Privacy Enhanced Mail.
136Use MD4 or MD5 if that isn't what you're doing.
137.Sh COPYRIGHT