File hashing utility for AmigaOS
Go to file
Carsten Larsen 19f758cedb Fixed missing includeds 2015-06-13 19:46:03 +02:00
.gitignore Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
COPYRIGHT Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
ChangeLog Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
Makefile Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
README Removed deprecated sections 2015-03-09 15:01:29 +01:00
README.SHA Update README.SHA 2015-06-13 19:44:56 +02:00
README.md Update README.md 2015-06-13 19:38:25 +02:00
builddist Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
compiler.h Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
configure Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
platform.h Fixed missing includeds 2015-06-13 19:46:03 +02:00
sha.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha.guide Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha1.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha1.h Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha1_amiga.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha256.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha256.h Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha256_amiga.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha384.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha384.h Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha384_amiga.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha512.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha512.h Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha512_amiga.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha_amiga.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
sha_io.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00
shatest.c Version 1.0.5 changes 2015-06-11 22:02:16 +02:00

README.md

Introduction

sha is a simple program that hashes files. It uses the National Institute of Standards and Technology's Secure Hash Algorithm. It can use SHA-1, SHA-256, SHA-384, or SHA-512, which generate respectively, hashes of 160, 256, 384, or 512 bits. sha can be used in scripts to do, for example, file integrity checking.

Using sha is simple. Just pass the names of one or more files on the command line.

You may want to perform a sanity check on sha before relying on it. A program called "shatest" is built along with sha. If you run shatest, it will display the results of running the various SHA algorithms on a set of known test vectors. If the resultant hash matches what is expected, "PASS" will be displayed. Otherwise it will display "FAIL."