1.\" $OpenBSD: md5.9,v 1.11 2011/01/09 00:06:50 deraadt Exp $ 2.\" 3.\" Copyright (c) 1996 Michael Shalayeff 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 15.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 16.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 17.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 18.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 19.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 20.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 21.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 22.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 23.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 24.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 25.\" 26.Dd $Mdocdate: January 9 2011 $ 27.Dt MD5 9 28.Os 29.Sh NAME 30.Nm md5 31.Nd message digest routines 32.Sh SYNOPSIS 33.Fd #include <sys/kernel.h> 34.Ft void 35.Fn MD5Init "u_int32_t buf[4]" 36.Ft void 37.Fn MD5Transform "u_int32_t buf[4]" "u_int32_t const in[16]" 38.Sh DESCRIPTION 39The 40.Nm 41module implements the RSA Data Security, Inc. 42MD5 Message-Digest Algorithm (MD5). 43It produces 128-bit MD5 Digest of data. 44.Bl -hang -width MD5Transform 45.It Pa MD5Init 46must be called just before 47.Fn MD5Transform 48will be used to produce a digest. 49The 50.Fa buf 51argument is the storage for the digest being produced on subsequent 52calls to the 53.Fn MD5Transform 54routine. 55.It Pa MD5Transform 56is the core of the MD5 algorithm, this alters an existing MD5 hash 57kept in 58.Fa buf 59to reflect the addition of 16 longwords 60of new data passed in 61.Fa in 62argument. 63.El 64.Sh COPYRIGHTS 65The code for MD5 transform was taken from Colin Plumb's 66implementation, which has been placed in the public domain. 67The MD5 cryptographic checksum was devised by Ronald Rivest, and is 68documented in RFC 1321, "The MD5 Message Digest Algorithm". 69.Sh SEE ALSO 70.Xr random 4 , 71.Xr arc4random 9 72