Hallo, dies ist ein Test.
PWD: /www/data-lst1/unixsoft/unixsoft/kaempfer/.public_html
Running in File Mode
Relative path: ././../../../../../../usr/man/man3lib/libmd.3lib
Real path: /usr/share/man/man3lib/libmd.3lib
Zurück
'\" te .\" Copyright (c) 2008, 2017, Oracle and/or its affiliates. All rights reserved. .TH libmd 3LIB "27 Nov 2017" "Oracle Solaris 11.4" "Interface Libraries" .SH NAME libmd \- Message Digest library .SH SYNOPSIS .LP .nf cc [ \fIflag\fR... ] \fIfile\fR... \fB-lmd\fR [ \fIlibrary\fR... ] #include <\fBmd4.h\fR> #include <\fBmd5.h\fR> #include <\fBsha1.h\fR> #include <\fBsha2.h\fR> #include <\fBsha3.h\fR> .fi .SH DESCRIPTION .sp .LP Functions in this library provide hashing routines for MD4 (RFC1320), MD5 (RFC1321), SHA1 (RFC3174), SHA224 (FIPS 180-2), SHA256 (FIPS 180-2), SHA384 (FIPS 180-2), SHA512 (FIPS 180-2), and SHA512/\fIt\fR (FIPS 180-4) for \fIt\fR = 224 and 256 and the SHA3 (FIPS 202) family of hash functions (224, 256, 384 and 512-bit versions). .SH INTERFACES .sp .LP The shared object \fBlibmd.so.1\fR provides the public interfaces defined below. See \fBintro\fR(3) for additional information on shared object interfaces. .sp .TS tab( ); lw(2.75i) lw(2.75i) . \fBMD4Final\fR \fBMD4Init\fR \fBMD4Update\fR \fBmd5_calc\fR \fBMD5Final\fR \fBMD5Init\fR \fBMD5Update\fR \fBSHA1Final\fR \fBSHA1Init\fR \fBSHA1Update\fR \fBSHA224Final\fR \fBSHA224Init\fR \fBSHA224Update\fR \fBSHA256Final\fR \fBSHA256Init\fR \fBSHA256Update\fR \fBSHA2Final\fR \fBSHA2Init\fR \fBSHA2Update\fR \fBSHA384Final\fR \fBSHA384Init\fR \fBSHA384Update\fR \fBSHA512Final\fR \fBSHA512Init\fR \fBSHA512Update\fR \fBSHA3Init\fR \fBSHA3Update\fR \fBSHA3Final\fR .TE .sp .sp .LP The shared object \fBlibmd.so.1\fR also provides these public interfaces that implement variants of SHA-2 and may perform faster on some 64-bit processors: .sp .TS tab( ); lw(2.75i) lw(2.75i) . \fBSHA512_t_Final\fR \fBSHA512_t_Init\fR \fBSHA512_t_Update\fR .TE .sp .sp .LP The digest values produced by the SHA512/224 and SHA512/256 functions are not the same as those digest values produced by the corresponding SHA2 functions. .SH SECURITY .sp .LP The MD4 and MD5 algorithms are currently considered weak for cryptographic use. The algorithms should be used only for compatibility with legacy systems or protocols. .sp .LP The SHA1 algorithm is also believed to have some weaknesses. Migration to one of the SHA2 algorithms\(emincluding SHA224, SHA256, SHA386 or SHA512\(em or a member of the SHA3 family is highly recommended when compatibility with data formats and on wire protocols permit doing so. .SH FILES .sp .ne 2 .mk .na \fB\fB/lib/libmd.so.1\fR\fR .ad .RS 22n .rt shared object .RE .sp .ne 2 .mk .na \fB\fB/lib/64/libmd.so.1\fR\fR .ad .RS 22n .rt 64-bit shared object .RE .SH ATTRIBUTES .sp .LP See \fBattributes\fR(7) for descriptions of the following attributes: .sp .TS tab( ) box; cw(2.75i) |cw(2.75i) lw(2.75i) |lw(2.75i) . ATTRIBUTE TYPE ATTRIBUTE VALUE _ Availability system/library/security/crypto _ Interface Stability Committed _ MT-Level MT-Safe .TE .sp