Use -mdoc macros properly.
Translate from Danglish into English. Refer to the alogrithms as ``RSA Data Security MDX message digest'' as required by the license.
This commit is contained in:
parent
435b1efd18
commit
04422105e3
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=18845
@ -1,17 +1,17 @@
|
||||
.\" $FreeBSD$
|
||||
.\" $Id$
|
||||
Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All
|
||||
rights reserved.
|
||||
|
||||
.Pp
|
||||
License to copy and use this software is granted for
|
||||
non-commercial Internet Privacy-Enhanced Mail provided that it is
|
||||
identified as the "RSA Data Security, Inc. MD2 Message Digest
|
||||
Algorithm" in all material mentioning or referencing this software
|
||||
or this function.
|
||||
|
||||
.Pp
|
||||
RSA Data Security, Inc. makes no representations concerning either
|
||||
the merchantability of this software or the suitability of this
|
||||
software for any particular purpose. It is provided "as is"
|
||||
without express or implied warranty of any kind.
|
||||
|
||||
.Pp
|
||||
These notices must be retained in any copies of any part of this
|
||||
documentation and/or software.
|
||||
|
@ -1,7 +1,7 @@
|
||||
.\" $FreeBSD$
|
||||
.\" $Id$
|
||||
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
|
||||
rights reserved.
|
||||
|
||||
.Pp
|
||||
License to copy and use this software is granted provided that it
|
||||
is identified as the "RSA Data Security, Inc. MD4 Message-Digest
|
||||
Algorithm" in all material mentioning or referencing this software
|
||||
@ -10,11 +10,11 @@ License is also granted to make and use derivative works provided
|
||||
that such works are identified as "derived from the RSA Data
|
||||
Security, Inc. MD4 Message-Digest Algorithm" in all material
|
||||
mentioning or referencing the derived work.
|
||||
|
||||
.Pp
|
||||
RSA Data Security, Inc. makes no representations concerning either
|
||||
the merchantability of this software or the suitability of this
|
||||
software for any particular purpose. It is provided "as is"
|
||||
without express or implied warranty of any kind.
|
||||
|
||||
.Pp
|
||||
These notices must be retained in any copies of any part of this
|
||||
documentation and/or software.
|
||||
|
@ -1,21 +1,21 @@
|
||||
.\" $FreeBSD$
|
||||
.\" $Id$
|
||||
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
|
||||
rights reserved.
|
||||
|
||||
.Pp
|
||||
License to copy and use this software is granted provided that it
|
||||
is identified as the "RSA Data Security, Inc. MD5 Message-Digest
|
||||
Algorithm" in all material mentioning or referencing this software
|
||||
or this function.
|
||||
|
||||
.Pp
|
||||
License is also granted to make and use derivative works provided
|
||||
that such works are identified as "derived from the RSA Data
|
||||
Security, Inc. MD5 Message-Digest Algorithm" in all material
|
||||
mentioning or referencing the derived work.
|
||||
|
||||
.Pp
|
||||
RSA Data Security, Inc. makes no representations concerning either
|
||||
the merchantability of this software or the suitability of this
|
||||
software for any particular purpose. It is provided "as is"
|
||||
without express or implied warranty of any kind.
|
||||
|
||||
.Pp
|
||||
These notices must be retained in any copies of any part of this
|
||||
documentation and/or software.
|
||||
|
@ -6,9 +6,9 @@
|
||||
.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
||||
.\" ----------------------------------------------------------------------------
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\" $Id$
|
||||
.\"
|
||||
.Dd July 14, 1994
|
||||
.Dd October 9, 1996
|
||||
.Dt MDX 3
|
||||
.Os FreeBSD 2
|
||||
.Sh NAME
|
||||
@ -18,7 +18,7 @@
|
||||
.Nm MDXEnd ,
|
||||
.Nm MDXFile ,
|
||||
.Nm MDXData
|
||||
.Nd calculate ``MDX'' cryptographic checksum
|
||||
.Nd calculate the RSA Data Security, Inc., ``MDX'' message digest
|
||||
.Sh SYNOPSIS
|
||||
.Fd #include <mdX.h>
|
||||
.Ft void
|
||||
@ -40,77 +40,88 @@ hash-function, that is, you cannot find (except by exhaustive search)
|
||||
the input corresponding to a particular output. This net result is
|
||||
a ``fingerprint'' of the input-data, which doesn't disclose the actual
|
||||
input.
|
||||
|
||||
.Pp
|
||||
MD2 is the slowest, MD4 is the fastest and MD5 is somewhere in the middle.
|
||||
MD2 can only be used for Privacy-Enhanced Mail.
|
||||
MD4 has been critizised for being to weak, and MD5 was developed as a
|
||||
response to this as ``MD4 with safety-belts''. If in doubt, use MD5.
|
||||
|
||||
MD4 has been criticized for being too weak, so MD5 was developed in
|
||||
response as ``MD4 with safety-belts''. When in doubt, use MD5.
|
||||
.Pp
|
||||
The
|
||||
.Fn MDXInit ,
|
||||
.Fn MDXUpdate
|
||||
.Fn MDXUpdate ,
|
||||
and
|
||||
.Fn MDXFinal
|
||||
functions are the core functions. Allocate a MDX_CTX, initialize it with
|
||||
.Fn MDXInit
|
||||
functions are the core functions. Allocate an MDX_CTX, initialize it with
|
||||
.Fn MDXInit ,
|
||||
run over the data with
|
||||
.Fn MDXUpdate
|
||||
.Fn MDXUpdate ,
|
||||
and finally extract the result using
|
||||
.Fn MDXFinal .
|
||||
|
||||
.Pp
|
||||
.Fn MDXEnd
|
||||
is a wrapper for
|
||||
.Fn MDXFinal ,
|
||||
which converts the return value to a 33 character (incl terminating NULL)
|
||||
ascii string which represents the 128 bits in hexadecimal.
|
||||
|
||||
.Fn MDXFinal
|
||||
which converts the return value to a 33-character
|
||||
(including the terminating '\e0')
|
||||
.Tn ASCII
|
||||
string which represents the 128 bits in hexadecimal.
|
||||
.Pp
|
||||
.Fn MDXFile
|
||||
calculates the digest of a file, and uses
|
||||
.Fn MDXEnd
|
||||
to return the result.
|
||||
In case the file cannot be opened, NULL is returned.
|
||||
|
||||
If the file cannot be opened, a null pointer is returned.
|
||||
.Fn MDXData
|
||||
calculates the digest of a chunk of data in memory, and uses
|
||||
.Fn MDXEnd
|
||||
to return the result.
|
||||
|
||||
.Pp
|
||||
When using
|
||||
.Fn MDXEnd ,
|
||||
.Fn MDXFile
|
||||
.Fn MDXFile ,
|
||||
or
|
||||
.Fn MDXData ,
|
||||
the
|
||||
.Ar buf
|
||||
argument can be NULL, in which case the returned string is allocated with
|
||||
argument can be a null pointer, in which case the returned string
|
||||
is allocated with
|
||||
.Xr malloc 3
|
||||
and subsequently must be explicitly deallocated using
|
||||
.Xr free 3
|
||||
after use.
|
||||
If the
|
||||
.Ar buf
|
||||
argument isn't NULL it must point to at least 33 characters of buffer space.
|
||||
argument is non-null it must point to at least 33 characters of buffer space.
|
||||
.Sh SEE ALSO
|
||||
.Xr md2 3 ,
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3
|
||||
.Pp
|
||||
ISOC
|
||||
Internet Request For Comments
|
||||
.%T RFC1319 ,
|
||||
.%T RFC1320
|
||||
and
|
||||
.%T RFC1321 .
|
||||
.Pp
|
||||
RSA Laboratories
|
||||
.%T Frequently Asked Questions About today's Cryptography .
|
||||
.Rs
|
||||
.%A B. Kaliski
|
||||
.%T The MD2 Message-Digest Algorithm
|
||||
.%O RFC 1319
|
||||
.Re
|
||||
.Rs
|
||||
.%A R. Rivest
|
||||
.%T The MD4 Message-Digest Algorithm
|
||||
.%O RFC 1186
|
||||
.Re
|
||||
.Rs
|
||||
.%A R. Rivest
|
||||
.%T The MD5 Message-Digest Algorithm
|
||||
.%O RFC 1321
|
||||
.Re
|
||||
.Rs
|
||||
.%A RSA Laboratories
|
||||
.%T Frequently Asked Questions About today's Cryptography
|
||||
.Re
|
||||
.Sh AUTHOR
|
||||
The MD2, MD4 and MD5 is designed and written by Ron Rivest and published in
|
||||
the above RFC's, including a reference implementation of each algorithm.
|
||||
|
||||
The original MDX routines were developed by
|
||||
.Tn RSA
|
||||
Data Security, Inc., and published in the above references.
|
||||
This code is derived directly from these implementations by Poul-Henning Kamp
|
||||
<phk@login.dkuug.dk>
|
||||
|
||||
.Aq Li phk@login.dkuug.dk
|
||||
.Pp
|
||||
Phk ristede runen.
|
||||
.Sh HISTORY
|
||||
These functions appeared in
|
||||
@ -119,7 +130,7 @@ These functions appeared in
|
||||
No method is known to exist which finds two files having the same hash value,
|
||||
nor to find a file with a specific hash value.
|
||||
There is on the other hand no guarantee that such a method doesn't exist.
|
||||
|
||||
MD2 has only been released for use in Privacy Enhanced eMail.
|
||||
.Pp
|
||||
MD2 has only been licensed for use in Privacy Enhanced Mail.
|
||||
Use MD4 or MD5 if that isn't what you're doing.
|
||||
.Sh COPYRIGHT
|
||||
|
Loading…
Reference in New Issue
Block a user