# HG changeset patch # User Claus Gittinger # Date 1552840896 -3600 # Node ID 16758cdac0c1302305b2610de636e24eb1390cf6 # Parent 76632065b7200fe76858b24410a18522f4c38fc8 #DOCUMENTATION by cg class: MD5Stream class comment/format in: #documentation diff -r 76632065b720 -r 16758cdac0c1 MD5Stream.st --- a/MD5Stream.st Sun Mar 17 17:40:42 2019 +0100 +++ b/MD5Stream.st Sun Mar 17 17:41:36 2019 +0100 @@ -1,3 +1,5 @@ +"{ Encoding: utf8 }" + " COPYRIGHT (c) 1999 by eXept Software AG All Rights Reserved @@ -54,14 +56,13 @@ documentation " Generate a MD5 hash value as defined in RFC 1321. - This may be used as checksum or for generating cryptographic signatures. Note: in August 2004, some researchers have found a way to generate full collisions for MD5. Therefore, for new applications, it may be wise to choose another hash function for security stuff. See a hash-collision example in the examples method. - So, the MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding + The MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding the same hash (collision attack). The use of this algorithm is only justified for non-cryptographic application.