Module Name:    src
Committed By:   riastradh
Date:           Mon Jun 25 02:32:12 UTC 2012

Modified Files:
        src/usr.bin/cksum: cksum.1

Log Message:
Omit outdated cryptographic claims as noted in PR 44160.

Interested readers can follow the references or read Wikipedia; this
is the wrong place to explain cryptographic hash functions and give
security advice.


To generate a diff of this commit:
cvs rdiff -u -r1.43 -r1.44 src/usr.bin/cksum/cksum.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/usr.bin/cksum/cksum.1
diff -u src/usr.bin/cksum/cksum.1:1.43 src/usr.bin/cksum/cksum.1:1.44
--- src/usr.bin/cksum/cksum.1:1.43	Fri May 14 01:57:21 2010
+++ src/usr.bin/cksum/cksum.1	Mon Jun 25 02:32:12 2012
@@ -1,4 +1,4 @@
-.\"	$NetBSD: cksum.1,v 1.43 2010/05/14 01:57:21 joerg Exp $
+.\"	$NetBSD: cksum.1,v 1.44 2012/06/25 02:32:12 riastradh Exp $
 .\"
 .\" Copyright (c) 1991, 1993
 .\"	The Regents of the University of California.  All rights reserved.
@@ -32,7 +32,7 @@
 .\"
 .\"	@(#)cksum.1	8.2 (Berkeley) 4/28/95
 .\"
-.Dd January 2, 2009
+.Dd June 24, 2012
 .Dt CKSUM 1
 .Os
 .Sh NAME
@@ -95,38 +95,14 @@ described below.
 It is provided for compatibility only.
 .Pp
 The
-.Nm md5
-utility takes as input a message of arbitrary length and produces
-as output a 128-bit
-.Dq fingerprint
-or
-.Dq message digest
-of the input.
-It is conjectured that it is computationally infeasible
-to product two messages having the same message digest, or to produce
-any message having a given prespecified target message digest.
-The
-MD5 algorithm is intended for digital signature applications, where
-a large file must be
-.Dq compressed
-in a secure manner before being encrypted with a private (secret)
-key under a public-key encryption system such as
-.Pa RSA .
-.Pp
-The
-.Nm md2
+.Nm md2 ,
+.Nm md4 ,
+.Nm md5 ,
+.Nm sha1 ,
 and
-.Nm md4
-utilities behave in exactly the same manner as
-.Nm md5
-but use different algorithms.
-.Pp
-The
 .Nm rmd160
-and
-.Nm sha1
-utilities also produce message digests, however the output from these
-two programs is 160 bits in length, as opposed to 128.
+utilities compute cryptographic hash functions, and write to standard
+output the hexadecimal representation of the hash of their input.
 .Pp
 The options are as follows:
 .Bl -tag -width indent

Reply via email to