summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--usr.bin/cksum/cksum.16
1 files changed, 4 insertions, 2 deletions
diff --git a/usr.bin/cksum/cksum.1 b/usr.bin/cksum/cksum.1
index 0a5bf499dc5..d697ca58b5b 100644
--- a/usr.bin/cksum/cksum.1
+++ b/usr.bin/cksum/cksum.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: cksum.1,v 1.5 1998/02/16 10:54:58 deraadt Exp $
+.\" $OpenBSD: cksum.1,v 1.6 1998/02/16 10:56:20 deraadt Exp $
.\" $NetBSD: cksum.1,v 1.8 1995/09/02 05:45:15 jtc Exp $
.\"
.\" Copyright (c) 1991, 1993
@@ -166,7 +166,9 @@ to detect hostile binary modifications. An attacker
can trivially produce backdoored daemons which have the same CRC as the
standard versions. Use a cryptographic checksum, such as MD5 instead.
.Sh SEE ALSO
-.Xr md5 1
+.Xr md5 1 ,
+.Xr rmd160 1 ,
+.Xr sha1 1
.Pp
The default calculation is identical to that given in pseudo-code
in the following