Difference between revisions of "Md5deep and hashdeep"

From COPTR
Jump to navigation Jump to search
m
 
(12 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{Infobox_tool
+
{{Infobox tool
|purpose=md5deep is a set of programs to compute MD5,  SHA-1,  SHA-256,  Tiger,  or Whirlpool message digests on an arbitrary number of files.
+
|purpose=md5deep is a set of programs to compute MD5,  SHA-1,  SHA-256,  Tiger,  or Whirlpool message digests on an arbitrary number of files. hashdeep is a program to compute, match, and <em>audit</em> hashsets.
|image=
 
 
|homepage=http://md5deep.sourceforge.net/
 
|homepage=http://md5deep.sourceforge.net/
|license=
+
|license=Public domain
 
|platforms=Cross platform
 
|platforms=Cross platform
 +
|function=Fixity
 
}}
 
}}
 +
{{Infobox tool details
 +
|ohloh_id=hashdeep
 +
}}
 +
= Description =
 +
md5deep is a set of cross-platform tools for computing hashes on any number of files. The tools can recursively process directory structures.  MD5, SHA-1, SHA-256, Tiger, and Whirlpool hashes are supported. Each of the hash types has a corresponding tool with a name formed by combining the type with the word "deep."
 +
 +
The hashdeep utility has an audit feature that can take a list of known hashes and display the names of input files whose hashes do or do not match. Audit mode can identify new, changed, missing, or moved files. Moving files is considered a modification by md5deep and impacts the date of last modification for a file. File paths include the full path from root.
 +
 +
The md5deep command has a mode to break up big files (like audio and video) into pieces before running the hashes. The md5deep command also allows for a file size threshold so that you can ignore large files.
  
<!-- Delete the Categories that do not apply -->
+
The program is a work of the US Government and is considered public domain. The code for Tiger comes from the libgcrypt project and is licensed under the General Public License (GPL). Because the vast majority of the program is public domain, the license of the project as a whole remains public domain. The Tiger code itself is still licensed under the GPL.
[[Category:Fixity]]
 
  
 +
===Platform===
  
= Description =
+
Binaries are provided for Microsoft Windows (7, Vista, XP, 2003, and 2000). The source code can be compiled on Linux, UNIX variants, and Mac OS X.
md5deep is a set of programs to compute MD5,  SHA-1,  SHA-256,  Tiger,  or Whirlpool message digests on an arbitrary number of files. md5deep is similar to the md5sum program found in the GNU Coreutils package. hashdeep is a program to compute,  match,  and audit hashsets.  
+
 
 +
===Documentation and user support===
 +
 
 +
Man pages are available. Adding the -h flag to the path displays information about command use and available options.
 +
 
 +
* Manual pages for md5deep [http://md5deep.sourceforge.net/md5deep.html http://md5deep.sourceforge.net/md5deep.html]
 +
* Manual pages for hashdeep [http://md5deep.sourceforge.net/hashdeep.html http://md5deep.sourceforge.net/hashdeep.html]
 +
* Getting Started with md5deep [http://md5deep.sourceforge.net/start-md5deep.html http://md5deep.sourceforge.net/start-md5deep.html]
 +
* Getting Started with hashdeep [http://md5deep.sourceforge.net/start-hashdeep.html http://md5deep.sourceforge.net/start-hashdeep.html]
  
 
= User Experiences =
 
= User Experiences =
* Ask Ubuntu. Check the Correctness of Copied Files. [http://askubuntu.com/questions/37483/check-the-correctness-of-copied-files]
+
* Ask Ubuntu. Check the Correctness of Copied Files. [http://askubuntu.com/questions/37483/check-the-correctness-of-copied-files http://askubuntu.com/questions/37483/check-the-correctness-of-copied-files]
* TaoSecurity. 2005-08-08. Using md5deep. [http://taosecurity.blogspot.com/2005/08/using-md5deep-thank-you-to-harlan.html]
+
* TaoSecurity. 2005-08-08. Using md5deep. [http://taosecurity.blogspot.com/2005/08/using-md5deep-thank-you-to-harlan.html http://taosecurity.blogspot.com/2005/08/using-md5deep-thank-you-to-harlan.html]
* Ventura, Luis.  2010-05-31. Using hashdeep to Ensure Data Integrity.
+
* Ventura, Luis.  2010-05-31. Using hashdeep to Ensure Data Integrity. [http://linhost.info/2010/05/using-hashdeep-to-ensure-data-integrity/ http://linhost.info/2010/05/using-hashdeep-to-ensure-data-integrity/]
[http://linhost.info/2010/05/using-hashdeep-to-ensure-data-integrity/]
 
 
 
  
 
= Development Activity =
 
= Development Activity =
 
+
<rss max=5>https://github.com/jessek/hashdeep/commits/master.atom</rss>
{{Infobox_tool_details
 
|ohloh_id=md5deep and hashdeep
 
}}
 

Latest revision as of 19:41, 11 May 2021



md5deep is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary number of files. hashdeep is a program to compute, match, and audit hashsets.
Homepage:http://md5deep.sourceforge.net/
License:Public domain
Platforms:Cross platform
Function:Fixity


Error in widget Ohloh Project: unable to write file /var/www/html/extensions/Widgets/compiled_templates/wrt673fb21152d440_07642769


Description[edit]

md5deep is a set of cross-platform tools for computing hashes on any number of files. The tools can recursively process directory structures. MD5, SHA-1, SHA-256, Tiger, and Whirlpool hashes are supported. Each of the hash types has a corresponding tool with a name formed by combining the type with the word "deep."

The hashdeep utility has an audit feature that can take a list of known hashes and display the names of input files whose hashes do or do not match. Audit mode can identify new, changed, missing, or moved files. Moving files is considered a modification by md5deep and impacts the date of last modification for a file. File paths include the full path from root.

The md5deep command has a mode to break up big files (like audio and video) into pieces before running the hashes. The md5deep command also allows for a file size threshold so that you can ignore large files.

The program is a work of the US Government and is considered public domain. The code for Tiger comes from the libgcrypt project and is licensed under the General Public License (GPL). Because the vast majority of the program is public domain, the license of the project as a whole remains public domain. The Tiger code itself is still licensed under the GPL.

Platform[edit]

Binaries are provided for Microsoft Windows (7, Vista, XP, 2003, and 2000). The source code can be compiled on Linux, UNIX variants, and Mac OS X.

Documentation and user support[edit]

Man pages are available. Adding the -h flag to the path displays information about command use and available options.

User Experiences[edit]

Development Activity[edit]

2017-08-24 15:51:32
[tag:github.com,2008:Grit::Commit/877613493ff44807888ce1928129574be393cbb0 Merge pull request #361 from kraj/master]
by jessek https://github.com/jessek
2017-06-21 13:04:06
[tag:github.com,2008:Grit::Commit/36350d46186dafc773acf7d3e4f4da7d6356a4b6 Merge pull request #373 from Makishima/patch-1]
by jessek https://github.com/jessek
2017-06-21 10:06:33
[tag:github.com,2008:Grit::Commit/6767fdb22c293f4020d62683b7c1fbaafead521d Update README.md]
by Makishima https://github.com/Makishima
2016-11-15 02:48:39
[tag:github.com,2008:Grit::Commit/6ef69a26126ee4e69a25392fd456b8a66c51dffd Fix errors found by clang]
by kraj https://github.com/kraj
2016-07-11 23:25:25
[tag:github.com,2008:Grit::Commit/72e41af057017e30a3014cf7e60dbe37ca482720 Add release hashes]
by jessek https://github.com/jessek