Changeset View
Changeset View
Standalone View
Standalone View
head/sbin/md5/md5.1
.\" $FreeBSD$ | .\" $FreeBSD$ | ||||
.Dd May 17, 2014 | .Dd October 17, 2015 | ||||
.Dt MD5 1 | .Dt MD5 1 | ||||
.Os | .Os | ||||
.Sh NAME | .Sh NAME | ||||
.Nm md5 , sha1 , sha256 , sha512, rmd160 | .Nm md5 , sha1 , sha256 , sha384 , sha512, rmd160 | ||||
.Nd calculate a message-digest fingerprint (checksum) for a file | .Nd calculate a message-digest fingerprint (checksum) for a file | ||||
.Sh SYNOPSIS | .Sh SYNOPSIS | ||||
.Nm md5 | .Nm md5 | ||||
.Op Fl pqrtx | .Op Fl pqrtx | ||||
.Op Fl c Ar string | .Op Fl c Ar string | ||||
.Op Fl s Ar string | .Op Fl s Ar string | ||||
.Op Ar | .Op Ar | ||||
.Nm sha1 | .Nm sha1 | ||||
.Op Fl pqrtx | .Op Fl pqrtx | ||||
.Op Fl c Ar string | .Op Fl c Ar string | ||||
.Op Fl s Ar string | .Op Fl s Ar string | ||||
.Op Ar | .Op Ar | ||||
.Nm sha256 | .Nm sha256 | ||||
.Op Fl pqrtx | .Op Fl pqrtx | ||||
.Op Fl c Ar string | .Op Fl c Ar string | ||||
.Op Fl s Ar string | .Op Fl s Ar string | ||||
.Op Ar | .Op Ar | ||||
.Nm sha384 | |||||
.Op Fl pqrtx | |||||
.Op Fl c Ar string | |||||
.Op Fl s Ar string | |||||
.Op Ar | |||||
.Nm sha512 | .Nm sha512 | ||||
.Op Fl pqrtx | .Op Fl pqrtx | ||||
.Op Fl c Ar string | .Op Fl c Ar string | ||||
.Op Fl s Ar string | .Op Fl s Ar string | ||||
.Op Ar | .Op Ar | ||||
.Nm rmd160 | .Nm rmd160 | ||||
.Op Fl pqrtx | .Op Fl pqrtx | ||||
.Op Fl c Ar string | .Op Fl c Ar string | ||||
.Op Fl s Ar string | .Op Fl s Ar string | ||||
.Op Ar | .Op Ar | ||||
.Sh DESCRIPTION | .Sh DESCRIPTION | ||||
The | The | ||||
.Nm md5 , sha1 , sha256 , sha512 | .Nm md5 , sha1 , sha256 , sha384 , sha512 | ||||
and | and | ||||
.Nm rmd160 | .Nm rmd160 | ||||
utilities take as input a message of arbitrary length and produce as | utilities take as input a message of arbitrary length and produce as | ||||
output a | output a | ||||
.Dq fingerprint | .Dq fingerprint | ||||
or | or | ||||
.Dq message digest | .Dq message digest | ||||
of the input. | of the input. | ||||
It is conjectured that it is computationally infeasible to | It is conjectured that it is computationally infeasible to | ||||
produce two messages having the same message digest, or to produce any | produce two messages having the same message digest, or to produce any | ||||
message having a given prespecified target message digest. | message having a given prespecified target message digest. | ||||
The | The | ||||
.Tn MD5 , SHA-1 , SHA-256 , SHA-512 | .Tn MD5 , SHA-1 , SHA-256 , SHA-384 , SHA-512 | ||||
and | and | ||||
.Tn RIPEMD-160 | .Tn RIPEMD-160 | ||||
algorithms are intended for digital signature applications, where a | algorithms are intended for digital signature applications, where a | ||||
large file must be | large file must be | ||||
.Dq compressed | .Dq compressed | ||||
in a secure manner before being encrypted with a private | in a secure manner before being encrypted with a private | ||||
(secret) | (secret) | ||||
key under a public-key cryptosystem such as | key under a public-key cryptosystem such as | ||||
▲ Show 20 Lines • Show All 60 Lines • ▼ Show 20 Lines | |||||
.Fl c | .Fl c | ||||
option. | option. | ||||
.Sh SEE ALSO | .Sh SEE ALSO | ||||
.Xr cksum 1 , | .Xr cksum 1 , | ||||
.Xr md5 3 , | .Xr md5 3 , | ||||
.Xr ripemd 3 , | .Xr ripemd 3 , | ||||
.Xr sha 3 , | .Xr sha 3 , | ||||
.Xr sha256 3 , | .Xr sha256 3 , | ||||
.Xr sha384 3 , | |||||
.Xr sha512 3 | .Xr sha512 3 | ||||
.Rs | .Rs | ||||
.%A R. Rivest | .%A R. Rivest | ||||
.%T The MD5 Message-Digest Algorithm | .%T The MD5 Message-Digest Algorithm | ||||
.%O RFC1321 | .%O RFC1321 | ||||
.Re | .Re | ||||
.Rs | .Rs | ||||
.%A J. Burrows | .%A J. Burrows | ||||
Show All 24 Lines |