DESCRIPTION
The sha256 utility takes as input a message of arbitrary length and pro-
duces as output a ``fingerprint'' or ``message digest'' of the input. It
is conjectured that it is computationally infeasible to produce two mes-
sages having the same message digest, or to produce any message having a
given prespecified target message digest. The algorithm is intended for
digital signature applications, where a large file must be ``compressed''
in a secure manner before being encrypted with a private (secret) key
under a public-key cryptosystem such as RSA.
The following options may be used in any combination and must precede any
files named on the command line. The hexadecimal checksum of each file
listed on the command line is printed after the options are processed.
-s string
Print a checksum of the given string.
-p Echo stdin to stdout and append the checksum to stdout.
-q Quiet mode - only the checksum is printed out. Overrides the -r
option.
-r Reverses the format of the output. This helps with visual diffs.
Does nothing when combined with the -ptx options.
-t Run a built-in time trial.
-x Run a built-in test script.
DIAGNOSTICS
The sha256 utility exits 0 on success, and 1 if at least one of the input
files could not be read.
SEE ALSO
cksum(1), md5(1)
J. Burrows, The Secure Hash Standard, FIPS PUB 180-2.
D. Eastlake and P. Jones, US Secure Hash Algorithm 1, RFC 3174.
Secure Hash Standard (SHS): http://csrc.nist.gov/cryptval/shs.html.
ACKNOWLEDGMENTS
This program is placed in the public domain for free general use by RSA
Data Security.
BSD June 6, 2004 BSD
Man(1) output converted with
man2html