Module Name:    src
Committed By:   bouyer
Date:           Wed Aug 22 20:36:40 UTC 2012

Modified Files:
        src/usr.bin/cksum [netbsd-5]: cksum.1

Log Message:
Pull up following revision(s) (requested by dholland in ticket #1778):
        usr.bin/cksum/cksum.1: revision 1.44 via patch
Omit outdated cryptographic claims as noted in PR 44160.
Interested readers can follow the references or read Wikipedia; this
is the wrong place to explain cryptographic hash functions and give
security advice.


To generate a diff of this commit:
cvs rdiff -u -r1.40 -r1.40.24.1 src/usr.bin/cksum/cksum.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/usr.bin/cksum/cksum.1
diff -u src/usr.bin/cksum/cksum.1:1.40 src/usr.bin/cksum/cksum.1:1.40.24.1
--- src/usr.bin/cksum/cksum.1:1.40	Sat Sep  2 23:27:45 2006
+++ src/usr.bin/cksum/cksum.1	Wed Aug 22 20:36:40 2012
@@ -1,4 +1,4 @@
-.\"	$NetBSD: cksum.1,v 1.40 2006/09/02 23:27:45 wiz Exp $
+.\"	$NetBSD: cksum.1,v 1.40.24.1 2012/08/22 20:36:40 bouyer Exp $
 .\"
 .\" Copyright (c) 1991, 1993
 .\"	The Regents of the University of California.  All rights reserved.
@@ -32,7 +32,7 @@
 .\"
 .\"	@(#)cksum.1	8.2 (Berkeley) 4/28/95
 .\"
-.Dd August 25, 2006
+.Dd June 24, 2012
 .Dt CKSUM 1
 .Os
 .Sh NAME
@@ -127,38 +127,14 @@ described below.
 It is provided for compatibility only.
 .Pp
 The
-.Nm md5
-utility takes as input a message of arbitrary length and produces
-as output a 128-bit
-.Dq fingerprint
-or
-.Dq message digest
-of the input.
-It is conjectured that it is computationally infeasible
-to product two messages having the same message digest, or to produce
-any message having a given prespecified target message digest.
-The
-MD5 algorithm is intended for digital signature applications, where
-a large file must be
-.Dq compressed
-in a secure manner before being encrypted with a private (secret)
-key under a public-key encryption system such as
-.Pa RSA .
-.Pp
-The
-.Nm md2
-and
-.Nm md4
-utilities behave in exactly the same manner as
-.Nm md5
-but use different algorithms.
-.Pp
-The
-.Nm sha1
+.Nm md2 ,
+.Nm md4 ,
+.Nm md5 ,
+.Nm sha1 ,
 and
 .Nm rmd160
-utilities also produce message digests, however the output from these
-two programs is 160 bits in length, as opposed to 128.
+utilities compute cryptographic hash functions, and write to standard
+output the hexadecimal representation of the hash of their input.
 .Pp
 The options are as follows:
 .Bl -tag -width indent

Reply via email to