1 .\" $OpenBSD: sha256.1,v 1.5 2012/07/08 15:58:23 naddy Exp $
3 .\" Copyright (c) 2003, 2004, 2006 Todd C. Miller <Todd.Miller@courtesan.com>
5 .\" Permission to use, copy, modify, and distribute this software for any
6 .\" purpose with or without fee is hereby granted, provided that the above
7 .\" copyright notice and this permission notice appear in all copies.
9 .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 .\" Sponsored in part by the Defense Advanced Research Projects
18 .\" Agency (DARPA) and Air Force Research Laboratory, Air Force
19 .\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
21 .Dd $Mdocdate: July 8 2012 $
26 .Nd calculate a message-digest fingerprint (checksum) for a file
30 .Op Fl c Op Ar checklist ...
35 takes as input a message of arbitrary length and produces
36 as output a 256-bit "fingerprint" or "message digest" of the input.
37 It is conjectured that it is computationally infeasible to produce
38 two messages having the same message digest, or to produce any
39 message having a given prespecified target message digest.
43 algorithm is intended for digital signature applications, where a
44 large file must be "compressed" in a secure manner before being
45 encrypted with a private (secret) key under a public-key cryptosystem
49 The options are as follows:
52 Output checksums in base64 notation, not hexadecimal.
57 Compares all checksums contained in the file
59 with newly computed checksums for the corresponding files.
60 Output consists of the digest used, the file name,
61 and an OK or FAILED for the result of the comparison.
62 This will validate any of the supported checksums (see
64 If no file is given, stdin is used.
66 Echoes stdin to stdout and appends the
70 Only print the checksum (quiet mode).
72 Reverse the format of the hash algorithm output, making
73 it match the output format used by
76 Prints a checksum of the given
79 Runs a built-in time trial.
82 multiple times results in the number of rounds being multiplied
83 by 10 for each additional flag.
85 Runs a built-in test script.
89 sum of each file listed on the command line is printed after the options
94 command is shorthand for
95 .Bd -literal -offset indent
107 .%T Secure Hash Standard