From owner-man-jp-reviewer@jp.FreeBSD.org Sun May  5 11:35:17 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id g452ZHa95712;
	Sun, 5 May 2002 11:35:17 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from soda.bekkoame.ne.jp (soda.bekkoame.ne.jp [202.231.192.80])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id g452ZHf95707
	for <man-jp-reviewer@jp.FreeBSD.org>; Sun, 5 May 2002 11:35:17 +0900 (JST)
	(envelope-from haffner@sag.bekkoame.ne.jp)
Received: from 3W1G31S (M119001.ppp.dion.ne.jp [61.117.119.1])
	by soda.bekkoame.ne.jp (Postfix) with SMTP id BC6B610EB
	for <man-jp-reviewer@jp.FreeBSD.org>; Sun,  5 May 2002 11:34:46 +0900 (JST)
Message-ID: <00aa01c1f3dd$abda0a80$0300a8c0@3W1G31S>
From: "Toshiro Kamei" <haffner@sag.bekkoame.ne.jp>
To: <man-jp-reviewer@jp.FreeBSD.org>
Date: Sun, 5 May 2002 11:36:15 +0900
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-2022-jp"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+020417
X-Sequence: man-jp-reviewer 4110
Subject: [man-jp-reviewer 4110] Form md5.3 R3.1 to R4.5
Errors-To: owner-man-jp-reviewer@jp.FreeBSD.org
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: haffner@sag.bekkoame.ne.jp

$B$*$O$h$&$4$6$$$^$9!#(B
$B550f(B@$B?@8M$G$9!#(B
$B5W$7$V$j$KF/$-$^$9!#(B
md5.3jpman$B$N(BR3.1$B$+$i(BR4.5$B$X$N86J8$H?75lF|K\8lJ8$N$=$l$>$l$N:9J,$G$9!#(B
$B%A%'%C%/$NDx$h$m$7$/$*4j$$$7$^$9!#(B


***$B?75lF|K\8lJ,$N:9J,(B***
--- md5R31JP.txt Sun May  5 04:53:37 2002
+++ md5newJP.3.txt Sun May  5 11:22:20 2002
@@ -6,11 +6,11 @@
 .\" this stuff is worth it, you can buy me a beer in return.   Poul-Henning Kamp
 .\" ----------------------------------------------------------------------------
 .\"
-.\"  %Id: md5.3,v 1.13 1998/03/27 10:22:07 phk Exp %
+.\" $FreeBSD: src/lib/libmd/md5.3,v 1.16.2.5 2001/12/17 10:08:31 ru Exp $
 .\"
-.Dd October 9, 1996
+.Dd February 11, 1999
 .Dt MD5 3
-.Os FreeBSD 2
+.Os
 .Sh $BL>>N(B
 .Nm MD5Init ,
 .Nm MD5Update ,
@@ -20,9 +20,11 @@
 .Nm MD5File ,
 .Nm MD5Data
 .Nd RSA Data Security $B<R$N(B ``MD5'' $B%a%C%;!<%8%@%$%8%'%9%H$r7W;;$9$k(B
+.Sh $B%i%$%V%i%j(B
+.Lb libmd
 .Sh $B=q<0(B
-.Fd #include <sys/types.h>
-.Fd #include <md5.h>
+.In sys/types.h
+.In md5.h
 .Ft void
 .Fn MD5Init "MD5_CTX *context"
 .Ft void
@@ -47,9 +49,12 @@
 .Pp
 MD2 $B$O:G$bCY$/!"(B MD4 $B$O:G$b9bB.$G!"(B MD5 $B$O$=$NCf4V$G$9!#(B
 MD2 $B$O!"%W%i%$%P%7$,=EMW$J%a!<%k$N$_$G;HMQ$G$-$^$9!#(B
-MD4 $B$O<e$9$.$k$H9sI>$5$l$?$?$a!"(B
-$B!V0BA4%Y%k%H$rIU$1$?(B MD4$B!W$H$7$F(B MD5 $B$,3+H/$5$l$^$7$?!#(B
-$B5?$o$7$$$H$-$O(B MD5 $B$r;HMQ$7$F$/$@$5$$!#(B
+$B8=;~E@$G(B MD4 $B$OGK$i$l$F$$$^$9!#0JA0$H$N8_49@-$,I,MW$J>l9g$K$N$_;HMQ$9$k$h$&$K$7$F$/$@$5$$!#(B
+MD5 $B$O8=;~E@(B (1999-02-11) $B$G$^$@GK$i$l$F$O$$$^$;$s$,!"==J,$J967b$N7k2L!"(B
+$B$=$N0BA4@-$K>/$75?$$$,=P$F$$$^$9!#(BMD4 $B$H(B MD5 $B$NN><T$KBP$9$k967b$GBPN)E*$J(B
+$BN>J}$N8+2r$,$"$j$^$9!#$D$^$j!"J#?t$NF~NOCM$GF10l$N%O%C%7%eCM$r=PNO$9$k;v!#(B
+$B$^$?$O!"967b<T$,%O%C%7%eCM$KBP$9$k@53N$JF~NOCM$rFCDj$9$k$N$O(B
+$B$^$@$"$j$=$&$bL5$$$H$$$&;v$G$9!#(B
 .Pp
 .Fn MD5Init ,
 .Fn MD5Update ,
@@ -91,20 +96,21 @@
 .Fn MD5File ,
 .Fn MD5Data
 $B$N;HMQ$K$"$?$C$F$O(B
-.Ar buf
+.Fa buf
 $B$r(B NULL $B%]%$%s%?$H$9$k$3$H$,$G$-$^$9!#(B
 $B$3$N>l9g$O(B
 .Xr malloc 3
 $B$G3d$jEv$F$i$l$?J8;zNs$,JV$5$l$k$N$G!";HMQ8e$O(B
 .Xr free 3
 $B$G3d$jEv$F$r2r=|$7$J$1$l$P$J$j$^$;$s!#(B
-.Ar buf
+.Fa buf
 $B$,(B NULL $B$G$J$$;~$O!">/$J$/$H$b(B 33 $BJ8;zJ,$N%P%C%U%!$r(B
 $B;X$7$F$$$J$1$l$P$J$j$^$;$s!#(B
 .Sh $B4XO"9`L\(B
 .Xr md2 3 ,
 .Xr md4 3 ,
-.Xr md5 3
+.Xr md5 3 ,
+.Xr sha 3
 .Rs
 .%A B. Kaliski
 .%T The MD2 Message-Digest Algorithm
@@ -121,8 +127,23 @@
 .%O RFC 1321
 .Re
 .Rs
-.%A RSA Laboratories 
+.%A RSA Laboratories
 .%T Frequently Asked Questions About today's Cryptography
+.%O \&<http://www.rsa.com/rsalabs/faq/>
+.Re
+.Rs
+.%A H. Dobbertin
+.%T Alf Swindles Ann
+.%J CryptoBytes
+.%N 1(3):5
+.%D 1995
+.Re
+.Rs
+.%A MJ. B. Robshaw
+.%T On Recent Results for MD2, MD4 and MD5
+.%J RSA Laboratories Bulletin
+.%N 4
+.%D November 12, 1996
 .Re
 .Sh $B:n<T(B
 $B%*%j%8%J%k$N(B MD5 $B%k!<%A%s$O!"(B
@@ -136,8 +157,7 @@
 Phk ristede runen.
 .Sh $BNr;K(B
 $B$3$N4X?t$O!"(B
-.Fx 2.0
-$B$G8=$l$^$7$?!#(B
+.Fx 2.0 .
 .Sh $B%P%0(B
 $BF1$8%O%C%7%eCM$r;}$D$h$&$J(B 2 $B$D$N%U%!%$%k$r8+$D$1$kJ}K!!"(B
 $B$^$?$OFCDj$N%O%C%7%eCM$r;}$D$h$&$J%U%!%$%k$r8+$D$1$kJ}K!$O(B
@@ -146,8 +166,7 @@
 .Pp
 MD2 $B$O!"%W%i%$%P%7$,=EMW$J%a!<%k$K;HMQ$9$k>l9g$N$_%i%$%;%s%96!M?$5$l$^$9!#(B
 $B$=$NB>$N>l9g$O(B MD4 $B$+(B MD5 $B$r;HMQ$7$F$/$@$5$$!#(B
-.Pp
-.Sh COPYRIGHT
+.\" $FreeBSD: src/lib/libmd/md5.copyright,v 1.5 1999/08/28 00:05:06 peter Exp $
 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
 rights reserved.
 .Pp
***$B0J>e(B***




***$B1Q8l86J8$H$N:9J,(B***
--- md5.3 Sun May  5 04:53:20 2002
+++ md5newJP.3.txt Sun May  5 11:22:20 2002
@@ -11,7 +11,7 @@
 .Dd February 11, 1999
 .Dt MD5 3
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm MD5Init ,
 .Nm MD5Update ,
 .Nm MD5Pad ,
@@ -19,10 +19,10 @@
 .Nm MD5End ,
 .Nm MD5File ,
 .Nm MD5Data
-.Nd calculate the RSA Data Security, Inc., ``MD5'' message digest
-.Sh LIBRARY
+.Nd RSA Data Security $B<R$N(B ``MD5'' $B%a%C%;!<%8%@%$%8%'%9%H$r7W;;$9$k(B
+.Sh $B%i%$%V%i%j(B
 .Lb libmd
-.Sh SYNOPSIS
+.Sh $B=q<0(B
 .In sys/types.h
 .In md5.h
 .Ft void
@@ -39,77 +39,74 @@
 .Fn MD5File "const char *filename" "char *buf"
 .Ft "char *"
 .Fn MD5Data "const unsigned char *data" "unsigned int len" "char *buf"
-.Sh DESCRIPTION
-The MD5 functions calculate a 128-bit cryptographic checksum (digest)
-for any number of input bytes.  A cryptographic checksum is a one-way
-hash-function, that is, you cannot find (except by exhaustive search)
-the input corresponding to a particular output.  This net result is
-a ``fingerprint'' of the input-data, which doesn't disclose the actual
-input.
-.Pp
-MD2 is the slowest, MD4 is the fastest and MD5 is somewhere in the middle.
-MD2 can only be used for Privacy-Enhanced Mail.
-MD4 has now been broken; it should only be used where necessary for
-backward compatibility.
-MD5 has not yet (1999-02-11) been broken, but sufficient attacks have been
-made that its security is in some doubt.  The attacks on both MD4 and MD5
-are both in the nature of finding ``collisions'' \- that is, multiple
-inputs which hash to the same value; it is still unlikely for an attacker
-to be able to determine the exact original input given a hash value.
+.Sh $B2r@b(B
+MD5 $B4X?t72$O!"G$0U$N?t$NF~NO%P%$%H$K$D$$$F(B
+128 $B%S%C%H0E9f%A%'%C%/%5%`(B ( $B%@%$%8%'%9%H(B ) $B$r7W;;$7$^$9!#(B
+$B0E9f%A%'%C%/%5%`$O0lJ}8~%O%C%7%e4X?t$J$N$G(B
+$BFCDj=PNO$KBP1~$9$kF~NO$r(B ( $BE0DlE*$J8!:w$r=|$$$F(B) $B8+$D$1$k$3$H$O$G$-$^$;$s!#(B
+$B7k2LE*$K$OF~NO%G!<%?$N!V;XLf!W$7$+8+$D$+$i$:!"(B
+$B<B:]$NF~NO$,L@$i$+$K$J$k$3$H$O$"$j$^$;$s!#(B
+.Pp
+MD2 $B$O:G$bCY$/!"(B MD4 $B$O:G$b9bB.$G!"(B MD5 $B$O$=$NCf4V$G$9!#(B
+MD2 $B$O!"%W%i%$%P%7$,=EMW$J%a!<%k$N$_$G;HMQ$G$-$^$9!#(B
+$B8=;~E@$G(B MD4 $B$OGK$i$l$F$$$^$9!#0JA0$H$N8_49@-$,I,MW$J>l9g$K$N$_;HMQ$9$k$h$&$K$7$F$/$@$5$$!#(B
+MD5 $B$O8=;~E@(B (1999-02-11) $B$G$^$@GK$i$l$F$O$$$^$;$s$,!"==J,$J967b$N7k2L!"(B
+$B$=$N0BA4@-$K>/$75?$$$,=P$F$$$^$9!#(BMD4 $B$H(B MD5 $B$NN><T$KBP$9$k967b$GBPN)E*$J(B
+$BN>J}$N8+2r$,$"$j$^$9!#$D$^$j!"J#?t$NF~NOCM$GF10l$N%O%C%7%eCM$r=PNO$9$k;v!#(B
+$B$^$?$O!"967b<T$,%O%C%7%eCM$KBP$9$k@53N$JF~NOCM$rFCDj$9$k$N$O(B
+$B$^$@$"$j$=$&$bL5$$$H$$$&;v$G$9!#(B
 .Pp
-The
 .Fn MD5Init ,
 .Fn MD5Update ,
-and
 .Fn MD5Final
-functions are the core functions.  Allocate an MD5_CTX, initialize it with
-.Fn MD5Init ,
-run over the data with
-.Fn MD5Update ,
-and finally extract the result using
-.Fn MD5Final .
+$B4X?t$OCf?4E*$J4X?t72$G$9!#(B
+MD5_CTX $B$r3d$jEv$F!"(B
+.Fn MD5Init
+$B$G=i4|2=$7!"(B
+.Fn MD5Update
+$B$G%G!<%?$r=hM}$7!":G8e$K(B
+.Fn MD5Final
+$B$G7k2L$r<h$j=P$7$F$/$@$5$$!#(B
 .Pp
 .Fn MD5Pad
-can be used to pad message data in same way
-as done by
+$B$O!"7W;;$r=*N;$7$J$$$G(B
 .Fn MD5Final
-without terminating calculation.
+$B$HF1$8J}K!$G%a%C%;!<%8%G!<%?$r$D$a$k$3$H$,$G$-$^$9!#(B
 .Pp
 .Fn MD5End
-is a wrapper for
+$B$O(B
 .Fn MD5Final
-which converts the return value to a 33-character
-(including the terminating '\e0')
+$B$N%i%C%Q$G!"(B
+16 $B?J(B 128 $B%S%C%H$rI=8=$9$k(B
+33 $BJ8;z(B ( $B:G8e$N!V(B \e0 $B!W$r4^$`(B ) $B$N(B
 .Tn ASCII
-string which represents the 128 bits in hexadecimal.
+$BJ8;zNs$KLa$jCM$rJQ49$7$^$9!#(B
 .Pp
 .Fn MD5File
-calculates the digest of a file, and uses
+$B$O%U%!%$%k$N%@%$%8%'%9%H$r7W;;$7!"(B
 .Fn MD5End
-to return the result.
-If the file cannot be opened, a null pointer is returned.
+$B$r;HMQ$7$F7k2L$rJV$7$^$9!#(B
+$B%U%!%$%k$r3+$1$J$$>l9g$O%L%k%]%$%s%?$rJV$7$^$9!#(B
 .Fn MD5Data
-calculates the digest of a chunk of data in memory, and uses
+$B$O%a%b%j$KB8:_$9$k%G!<%?$N%@%$%8%'%9%H$r7W;;$7!"(B
 .Fn MD5End
-to return the result.
+$B$r;HMQ$7$F7k2L$rJV$7$^$9!#(B
 .Pp
-When using
 .Fn MD5End ,
 .Fn MD5File ,
-or
-.Fn MD5Data ,
-the
+.Fn MD5Data
+$B$N;HMQ$K$"$?$C$F$O(B
 .Fa buf
-argument can be a null pointer, in which case the returned string
-is allocated with
+$B$r(B NULL $B%]%$%s%?$H$9$k$3$H$,$G$-$^$9!#(B
+$B$3$N>l9g$O(B
 .Xr malloc 3
-and subsequently must be explicitly deallocated using
+$B$G3d$jEv$F$i$l$?J8;zNs$,JV$5$l$k$N$G!";HMQ8e$O(B
 .Xr free 3
-after use.
-If the
+$B$G3d$jEv$F$r2r=|$7$J$1$l$P$J$j$^$;$s!#(B
 .Fa buf
-argument is non-null it must point to at least 33 characters of buffer space.
-.Sh SEE ALSO
+$B$,(B NULL $B$G$J$$;~$O!">/$J$/$H$b(B 33 $BJ8;zJ,$N%P%C%U%!$r(B
+$B;X$7$F$$$J$1$l$P$J$j$^$;$s!#(B
+.Sh $B4XO"9`L\(B
 .Xr md2 3 ,
 .Xr md4 3 ,
 .Xr md5 3 ,
@@ -148,42 +145,42 @@
 .%N 4
 .%D November 12, 1996
 .Re
-.Sh AUTHORS
-The original MD5 routines were developed by
+.Sh $B:n<T(B
+$B%*%j%8%J%k$N(B MD5 $B%k!<%A%s$O!"(B
 .Tn RSA
-Data Security, Inc., and published in the above references.
-This code is derived directly from these implementations by
+Data Security $B<R$K$h$C$F3+H/$5$l!"(B
+$B>e5-$N%j%U%!%l%s%9$G8x3+$5$l$^$7$?!#(B
+$B$3$N%3!<%I$O!"(B
 .An Poul-Henning Kamp Aq phk@login.dkuug.dk
+$B$K$h$j!"$3$N<BAu$+$iD>@\0z$-=P$5$l$F$$$^$9!#(B
 .Pp
 Phk ristede runen.
-.Sh HISTORY
-These functions appeared in
+.Sh $BNr;K(B
+$B$3$N4X?t$O!"(B
 .Fx 2.0 .
-.Sh BUGS
-No method is known to exist which finds two files having the same hash value,
-nor to find a file with a specific hash value.
-There is on the other hand no guarantee that such a method doesn't exist.
+.Sh $B%P%0(B
+$BF1$8%O%C%7%eCM$r;}$D$h$&$J(B 2 $B$D$N%U%!%$%k$r8+$D$1$kJ}K!!"(B
+$B$^$?$OFCDj$N%O%C%7%eCM$r;}$D$h$&$J%U%!%$%k$r8+$D$1$kJ}K!$O(B
+$BCN$i$l$F$$$^$;$s!#(B
+$B0lJ}!"$=$N$h$&$JJ}K!$,B8:_$7$J$$$H$$$&J]>Z$b$"$j$^$;$s!#(B
 .Pp
-MD2 has only been licensed for use in Privacy Enhanced Mail.
-Use MD4 or MD5 if that isn't what you're doing.
+MD2 $B$O!"%W%i%$%P%7$,=EMW$J%a!<%k$K;HMQ$9$k>l9g$N$_%i%$%;%s%96!M?$5$l$^$9!#(B
+$B$=$NB>$N>l9g$O(B MD4 $B$+(B MD5 $B$r;HMQ$7$F$/$@$5$$!#(B
 .\" $FreeBSD: src/lib/libmd/md5.copyright,v 1.5 1999/08/28 00:05:06 peter Exp $
 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
 rights reserved.
 .Pp
-License to copy and use this software is granted provided that it
-is identified as the "RSA Data Security, Inc. MD5 Message-Digest
-Algorithm" in all material mentioning or referencing this software
-or this function.
-.Pp
-License is also granted to make and use derivative works provided
-that such works are identified as "derived from the RSA Data
-Security, Inc. MD5 Message-Digest Algorithm" in all material
-mentioning or referencing the derived work.
-.Pp
-RSA Data Security, Inc. makes no representations concerning either
-the merchantability of this software or the suitability of this
-software for any particular purpose. It is provided "as is"
-without express or implied warranty of any kind.
+$B$3$N%=%U%H%&%'%"$NJ#@=$d;HMQ$N$?$a$N%i%$%;%s%9$O!"(B
+$B$3$N%=%U%H%&%'%"$d$3$N4X?t$K$D$$$F8@5Z$7$?$j;2>H$7$?$j$9$k(B
+$B$9$Y$F$N;qNA$G(B
+$B!V(B RSA Data Security $B<R$N(B MD2 $B%a%C%;!<%8%@%$%8%'%9%H%"%k%4%j%:%`!W(B
+$B$G$"$k$3$H$,L@<($5$l$F$$$l$P!"(B
+$B%W%i%$%P%7$,=EMW$H$J$kHs1DMx%$%s%?!<%M%C%H%a!<%k$K6!M?$5$l$^$9!#(B
+.Pp
+RSA Data Security $B<R$O!"$3$N%=%U%H%&%'%"$N>&6H@-!"$^$?$O$3$N(B
+$BFCDj$NL\E*$KBP$9$k$3$N%=%U%H%&%'%"$NE,9g@-$K$D$$$FI=L@$7$^$;$s!#(B
+$B$3$N%=%U%H%&%'%"$O!"$$$+$J$k<oN`$N!"L@<(E*$^$?$O0EL[E*$JJ]>Z$b$J$/!"(B
+$B!V8=>u$N$^$^!W$GDs6!$5$l$^$9!#(B
 .Pp
-These notices must be retained in any copies of any part of this
-documentation and/or software.
+$B$3$N7Y9p$O!"$3$NJ8=q$+%=%U%H%&%'%"!"$^$?$O$=$NN>J}$N$9$Y$F$N%3%T!<$K(B
+$B7G:\$7$J$1$l$P$J$j$^$;$s!#(B
***$B0J>e(B***

