summaryrefslogtreecommitdiff
path: root/bin/md5/md5.1
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>1996-06-11 10:38:03 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>1996-06-11 10:38:03 +0000
commitc7fc0a605a7314fcaee1546e39bba77d7156c64d (patch)
tree6e2f69b2feac2f4e3b9b07cc2789c714c0170d96 /bin/md5/md5.1
parent0a74115a4ed9a2304bd33da05f3e81de774ef38f (diff)
move to bin/md5 for `greater accessibility'
Diffstat (limited to 'bin/md5/md5.1')
-rw-r--r--bin/md5/md5.148
1 files changed, 48 insertions, 0 deletions
diff --git a/bin/md5/md5.1 b/bin/md5/md5.1
new file mode 100644
index 00000000000..dd3dd3f744b
--- /dev/null
+++ b/bin/md5/md5.1
@@ -0,0 +1,48 @@
+.\" $OpenBSD: md5.1,v 1.1 1996/06/11 10:37:36 deraadt Exp $
+.\"
+.TH MD5 1 "Feb 14, 1994"
+.SH NAME
+md5 \- calculate a message-digest fingerprint (checksum) for a file
+.SH SYNOPSIS
+.B md5
+[ -p | -t | -x | -sstring | filename(s) ]
+.SH DESCRIPTION
+.B md5
+takes as input a message of arbitrary length and produces
+as output a 128-bit "fingerprint" or "message digest" of the input.
+It is conjectured that it is computationally infeasible to produce
+two messages having the same message digest, or to produce any
+message having a given prespecified target message digest.
+The MD5 algorithm is intended for digital signature applications, where a
+large file must be "compressed" in a secure manner before being
+encrypted with a private (secret) key under a public-key cryptosystem
+such as
+.I RSA.
+.SH OPTIONS
+The following four options may be used in any combination, except
+that
+.B "filename(s)"
+must be the last objects on the command line.
+.in +5
+.PP
+.B -sstring
+prints a checksum of the given "string".
+.PP
+.B -p
+echos stdin to stdout and appends the MD5 sum to stdout.
+.PP
+.B -t
+runs a built-in time trial.
+.PP
+.B -x
+runs a built-in test script.
+.PP
+.B filename(s)
+prints a checksum(s) for each of the files.
+.SH "SEE ALSO"
+.BR cksum (1)
+.PP
+RFC 1321 describes in detail the MD2, MD4, and MD5 message-digest algorithms.
+.SH ACKNOWLEDGEMENTS
+This program is placed in the public domain for free general use by
+RSA Data Security.