2fe8fb192f
There is important information about booting non-ack images in docs/UPDATING. ack/aout-format images can't be built any more, and booting clang/ELF-format ones is a little different. Updating to the new boot monitor is recommended. Changes in this commit: . drop boot monitor -> allowing dropping ack support . facility to copy ELF boot files to /boot so that old boot monitor can still boot fairly easily, see UPDATING . no more ack-format libraries -> single-case libraries . some cleanup of OBJECT_FMT, COMPILER_TYPE, etc cases . drop several ack toolchain commands, but not all support commands (e.g. aal is gone but acksize is not yet). . a few libc files moved to netbsd libc dir . new /bin/date as minix date used code in libc/ . test compile fix . harmonize includes . /usr/lib is no longer special: without ack, /usr/lib plays no kind of special bootstrapping role any more and bootstrapping is done exclusively through packages, so releases depend even less on the state of the machine making them now. . rename nbsd_lib* to lib* . reduce mtree
123 lines
3.2 KiB
Groff
123 lines
3.2 KiB
Groff
.\" $NetBSD: md2.3,v 1.1 2005/09/24 20:51:14 elad Exp $
|
|
.\"
|
|
.\" ----------------------------------------------------------------------------
|
|
.\" "THE BEER-WARE LICENSE" (Revision 42):
|
|
.\" <phk@login.dkuug.dk> wrote this file. As long as you retain this notice you
|
|
.\" can do whatever you want with this stuff. If we meet some day, and you think
|
|
.\" this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
|
.\" ----------------------------------------------------------------------------
|
|
.\"
|
|
.\" from FreeBSD Id: mdX.3,v 1.7 1996/10/22 16:28:56 phk Exp
|
|
.\"
|
|
.Dd September 24, 2005
|
|
.Dt MD2 3
|
|
.Os
|
|
.Sh NAME
|
|
.Nm MD2Init ,
|
|
.Nm MD2Update ,
|
|
.Nm MD2Final ,
|
|
.Nm MD2End ,
|
|
.Nm MD2File ,
|
|
.Nm MD2Data
|
|
.Nd calculate the RSA Data Security, Inc.,
|
|
.Dq MD2
|
|
message digest
|
|
.Sh LIBRARY
|
|
.Lb libc
|
|
.Sh SYNOPSIS
|
|
.In sys/types.h
|
|
.In mdX.h
|
|
.Ft void
|
|
.Fn MD2Init "MD2_CTX *context"
|
|
.Ft void
|
|
.Fn MD2Update "MD2_CTX *context" "const unsigned char *data" "unsigned int len"
|
|
.Ft void
|
|
.Fn MD2Final "unsigned char digest[16]" "MD2_CTX *context"
|
|
.Ft "char *"
|
|
.Fn MD2End "MD2_CTX *context" "char *buf"
|
|
.Ft "char *"
|
|
.Fn MD2File "const char *filename" "char *buf"
|
|
.Ft "char *"
|
|
.Fn MD2Data "const unsigned char *data" "unsigned int len" "char *buf"
|
|
.Sh DESCRIPTION
|
|
The MD2 functions calculate a 128-bit cryptographic checksum (digest)
|
|
for any number of input bytes.
|
|
A cryptographic checksum is a one-way
|
|
hash-function, that is, you cannot find (except by exhaustive search)
|
|
the input corresponding to a particular output.
|
|
This net result is
|
|
a ``fingerprint'' of the input-data, which doesn't disclose the actual
|
|
input.
|
|
.Pp
|
|
The MD2 routines should not be used for any security-related purpose.
|
|
.Pp
|
|
The
|
|
.Fn MD2Init ,
|
|
.Fn MD2Update ,
|
|
and
|
|
.Fn MD2Final
|
|
functions are the core functions.
|
|
Allocate an MD2_CTX, initialize it with
|
|
.Fn MD2Init ,
|
|
run over the data with
|
|
.Fn MD2Update ,
|
|
and finally extract the result using
|
|
.Fn MD2Final .
|
|
.Pp
|
|
.Fn MD2End
|
|
is a wrapper for
|
|
.Fn MD2Final
|
|
which converts the return value to a 33-character
|
|
(including the terminating '\e0')
|
|
.Tn ASCII
|
|
string which represents the 128 bits in hexadecimal.
|
|
.Pp
|
|
.Fn MD2File
|
|
calculates the digest of a file, and uses
|
|
.Fn MD2End
|
|
to return the result.
|
|
If the file cannot be opened, a null pointer is returned.
|
|
.Fn MD2Data
|
|
calculates the digest of a chunk of data in memory, and uses
|
|
.Fn MD2End
|
|
to return the result.
|
|
.Pp
|
|
When using
|
|
.Fn MD2End ,
|
|
.Fn MD2File ,
|
|
or
|
|
.Fn MD2Data ,
|
|
the
|
|
.Ar buf
|
|
argument can be a null pointer, in which case the returned string
|
|
is allocated with
|
|
.Xr malloc 3
|
|
and subsequently must be explicitly deallocated using
|
|
.Xr free 3
|
|
after use.
|
|
If the
|
|
.Ar buf
|
|
argument is non-null it must point to at least 33 characters of buffer space.
|
|
.Sh SEE ALSO
|
|
.Xr md2 3 ,
|
|
.Rs
|
|
.%A B. Kaliski
|
|
.%T The MD2 Message-Digest Algorithm
|
|
.%O RFC 1319
|
|
.Re
|
|
.Rs
|
|
.%A RSA Laboratories
|
|
.%T Frequently Asked Questions About today's Cryptography
|
|
.Re
|
|
.Sh HISTORY
|
|
These functions appeared in
|
|
.Nx 1.3 .
|
|
.Sh AUTHORS
|
|
The original MD2 routines were developed by
|
|
.Tn RSA
|
|
Data Security, Inc., and published in the above references.
|
|
This code is a public domain implementation by Andrew Brown.
|
|
.Sh BUGS
|
|
No method is known to exist which finds two files having the same hash value,
|
|
nor to find a file with a specific hash value.
|
|
There is on the other hand no guarantee that such a method doesn't exist.
|