Deleted Added
full compact
md5.1 (28935) md5.1 (32074)
1.Dd February 14, 1994
2.Dt MD5 1
3.Os
4.Sh NAME
5.Nm md5
6.Nd calculate a message-digest fingerprint (checksum) for a file
7.Sh SYNOPSIS
8.Nm
1.Dd February 14, 1994
2.Dt MD5 1
3.Os
4.Sh NAME
5.Nm md5
6.Nd calculate a message-digest fingerprint (checksum) for a file
7.Sh SYNOPSIS
8.Nm
9.Op Fl p
10.Op Fl t
11.Op Fl x
12.Op Fl s Ns Ar string
13.Op Ar filename Ns Pq s
9.Op Fl ptx
10.Op Fl s Ar string
11.Op Ar file ...
14.Sh DESCRIPTION
15.Nm
16takes as input a message of arbitrary length and produces
17as output a 128-bit
18.Dq fingerprint
19or
20.Dq message digest
21of the input. It is conjectured that it is computationally infeasible to
22produce two messages having the same message digest, or to produce any
23message having a given prespecified target message digest.
24The MD5 algorithm is intended for digital signature applications, where a
25large file must be
26.Dq compressed
27in a secure manner before being encrypted with a private
28.Pq secret
29key under a public-key cryptosystem such as
30.Em RSA .
31.Pp
12.Sh DESCRIPTION
13.Nm
14takes as input a message of arbitrary length and produces
15as output a 128-bit
16.Dq fingerprint
17or
18.Dq message digest
19of the input. It is conjectured that it is computationally infeasible to
20produce two messages having the same message digest, or to produce any
21message having a given prespecified target message digest.
22The MD5 algorithm is intended for digital signature applications, where a
23large file must be
24.Dq compressed
25in a secure manner before being encrypted with a private
26.Pq secret
27key under a public-key cryptosystem such as
28.Em RSA .
29.Pp
32The following four options may be used in any combination, except
33that
34.Ar filename Ns Pq s
35must be the last objects on the command line.
30The following four options may be used in any combination and must
31precede any files named on the command line. The MD5
32sum of each file listed on the command line is printed after the options
33are processed.
36.Bl -tag -width Fl
34.Bl -tag -width Fl
37.It Fl s Ns Ar string
35.It Fl s Ar string
38prints a checksum of the given
36prints a checksum of the given
39.Dq string .
37.Ar string .
40.It Fl p
41echos stdin to stdout and appends the MD5 sum to stdout.
42.It Fl t
43runs a built-in time trial.
44.It Fl x
45runs a built-in test script.
38.It Fl p
39echos stdin to stdout and appends the MD5 sum to stdout.
40.It Fl t
41runs a built-in time trial.
42.It Fl x
43runs a built-in test script.
46.It Ar filename Ns Pq s
47prints a checksum
48.Pq s
49for each of the files.
50.El
51.Sh SEE ALSO
52.Xr cksum 1
53.Rs
54.%A R. Rivest
55.%T The MD5 Message-Digest Algorithm
56.%O RFC1321
57.Re
58.Sh ACKNOWLEDGEMENTS
59This program is placed in the public domain for free general use by
60RSA Data Security.
44.El
45.Sh SEE ALSO
46.Xr cksum 1
47.Rs
48.%A R. Rivest
49.%T The MD5 Message-Digest Algorithm
50.%O RFC1321
51.Re
52.Sh ACKNOWLEDGEMENTS
53This program is placed in the public domain for free general use by
54RSA Data Security.