#DOCUMENTATION by cg
authorClaus Gittinger <cg@exept.de>
Sun, 17 Mar 2019 17:41:36 +0100
changeset 23938 16758cdac0c1
parent 23937 76632065b720
child 23939 3ec50a9816fd
#DOCUMENTATION by cg class: MD5Stream class comment/format in: #documentation
MD5Stream.st
--- a/MD5Stream.st	Sun Mar 17 17:40:42 2019 +0100
+++ b/MD5Stream.st	Sun Mar 17 17:41:36 2019 +0100
@@ -1,3 +1,5 @@
+"{ Encoding: utf8 }"
+
 "
  COPYRIGHT (c) 1999 by eXept Software AG
 	      All Rights Reserved
@@ -54,14 +56,13 @@
 documentation
 "
     Generate a MD5 hash value as defined in RFC 1321.
-    This may be used as checksum or for generating cryptographic signatures.
 
     Note:
         in August 2004, some researchers have found a way to generate full collisions for MD5.
         Therefore, for new applications, it may be wise to choose another hash function for security stuff.
         See a hash-collision example in the examples method.
 
-        So, the MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
+        The MD5 algorithm has severe weaknesses, for example it is easy to compute two messages yielding
         the same hash (collision attack).
         The use of this algorithm is only justified for non-cryptographic application.