.\"WORD: encryption °Å¹æ²½
.\"WORD: key ¸°
.\" "
-.TH CRYPT 3 2008-08-25 "" "Linux Programmer's Manual"
+.TH CRYPT 3 2010-06-20 "" "Linux Programmer's Manual"
.\"O .SH NAME
.SH ̾Á°
.\"O crypt, crypt_r \- password and data encryption
"\fIsalt\fP" ¤È "\fIencrypted\fP" ¤Îʸ»ú¤Ï
[\fBa\fP\(en\fBzA\fP\(en\fBZ0\fP\(en\fB9./\fP] ¤Î½¸¹ç¤«¤é
Áª¤Ð¤ì¤ë¡£
-.\"O In the SHA implementation the entire
+.\"O In the MD5 and SHA implementations the entire
.\"O .I key
.\"O is significant (instead of only the first
-.\"O 8 bytes).
-SHA ¼ÂÁõ¤Ç¤Ï¡¢(ºÇ½é¤Î 8 ʸ»ú¤Ç¤Ï¤Ê¤¯)
-.I ¥¡¼
-Á´ÂΤ¬°ÕÌ£¤¬¤¢¤ë¡£
+.\"O 8 bytes in DES).
+MD5 ¤È SHA ¤Î¼ÂÁõ¤Ç¤Ï¡¢
+.I key
+Á´ÂΤ¬°ÕÌ£¤¬¤¢¤ë
+(DES ¤Î¾ì¹ç¤Ë¤ÏºÇ½é¤Î 8 ʸ»ú¤À¤±¤Ë°ÕÌ£¤¬¤¢¤ë)¡£
.\"O .SH "SEE ALSO"
.SH ´ØÏ¢¹àÌÜ
.BR login (1),