summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--bin/md5/cksum.14
1 files changed, 2 insertions, 2 deletions
diff --git a/bin/md5/cksum.1 b/bin/md5/cksum.1
index 594136ff6e1..dea323540c2 100644
--- a/bin/md5/cksum.1
+++ b/bin/md5/cksum.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: cksum.1,v 1.3 2004/12/29 17:32:44 millert Exp $
+.\" $OpenBSD: cksum.1,v 1.4 2005/02/25 10:32:06 jmc Exp $
.\"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@@ -278,4 +278,4 @@ or
algorithms to detect hostile binary modifications.
An attacker can trivially produce backdoored daemons which have the same
checksum as the standard versions.
-Use a cryptographic-strength checksum (such as MD5) instead.
+Use a cryptographic checksum instead.