Sponsored Content
Operating Systems Solaris Verifying Solaris CD Downloads with md5 Checksum on Ubuntu Post 302344113 by jim mcnamara on Friday 14th of August 2009 03:29:06 PM
Old 08-14-2009
If the md5 output matches what it says it started as - you are good to go.
 

10 More Discussions You Might Find Interesting

1. Linux

mandrake linux 10 fourth cd MD5 checksum

I downloaded ISO file fourth CD of mandrake linux 10. But I don't have MD5 checksum. Anybody can help me! show me the MD5 checksum of it. Thanks (2 Replies)
Discussion started by: littleghost
2 Replies

2. Solaris

md5 encryption on solaris 8

is there patches enable passwords of greater than 8 characters with only md5 encryption (rather than the older crypt) for solaris 8. I am migrating a number of solaris 8 domains to branded zones. (1 Reply)
Discussion started by: frustin
1 Replies

3. Solaris

Solaris 10 openldap authentication with md5 passwords

Hello to everyone, We are trying to enable ldap authentication with pam_ldap and md5 passwords on a Solaris 10 system to an openldap server. If passwords are stored using crypt, everything works correctly. But if the password in openldap is in md5, then authentication fails. We have installed... (0 Replies)
Discussion started by: jfotop
0 Replies

4. Shell Programming and Scripting

Create md5 sums and archive the resulting md5 files

Hello everyone, I am looking to basically creating md5sum files for all iso files in a directory and archive the resulting md5 files into a single archive in that very same directory. I worked out a clumsy solution such as: #find files for which md5sum are to be created and store the... (1 Reply)
Discussion started by: SurfTranquille
1 Replies

5. Ubuntu

Installing md5 package into ubuntu

Hi i want to install md5 package into ubuntu. any idea how? Apparently applying md5sum and md5 on a string (not a file) gives a different value! The one that I need to use is the md5 command, but it says command not found when i type md5 in bash. (2 Replies)
Discussion started by: jremio
2 Replies

6. Solaris

md5 checksum what does it do

Hello good people, I came across md5 checksum. Can anyone please explain to me what it does and if possible an example of how to use it? Thank you very much (1 Reply)
Discussion started by: cjashu
1 Replies

7. IP Networking

Wireshark UDP checksum bad checksum

Hello I am communicating with two devices using my computer over UDP protocol. The application is running fine. When I monitored the UDP traffic using Wireshark software, I found that there were too many Checksum errors. Please find attached the png file showing this error. I am about to... (0 Replies)
Discussion started by: AustinCann
0 Replies

8. Solaris

MD5 checksum

Hi Guys, I have about MD5 checksum so many times but I can't figure out how to use it. Can someone please show me how to perform an MD5 checksum? Thanks a lot guys. (1 Reply)
Discussion started by: cjashu
1 Replies

9. Shell Programming and Scripting

How to reverse the b64 format(encoded b64(b64(md5($pass)))) into md5 hash format?

I have about 1500 rows (encoded b64(b64(md5($pass))) algorythm) in a file. I would like reverse the b64 into md5 hash format. How could I do that from command line? So I need only the correct md5 hash formats. These row format: 4G5qc2WQzGES6QkWAUgl5w P9tKxonBOg3ymr8vOBLnDA... (1 Reply)
Discussion started by: freeroute
1 Replies

10. Solaris

Solaris 8 MD5 encryption support

Hi, I did some NIS migration tests recently. The target is to migrate the NIS server from Solaris 8 to Redhat Linux 6.5. And, I found there are encryption issues while Linux NIS using MD5 hashing password for authentication whereas Solaris 8 clients using DES encryption. It causes issues... (3 Replies)
Discussion started by: bestard
3 Replies
RADCRYPT(8)						      System Manager's Manual						       RADCRYPT(8)

NAME
radcrypt - generate password hash for use with radius, or validates a password hash SYNOPSIS
radcrypt [-d|--des] [-m|--md5] [-c|--check] plaintext_password [hashed_password] DESCRIPTION
radcrypt generates a hashed digest of a plaintext password, or can validate if a password hash matches a plaintext password. DES and MD5 hashes are currently supported. When generating a password hash a random salt is generated and applied. A hashed password can be validated by specifying -c or --check and passing hashed_password after plaintext_password on the command line. In this case hashed_password will be checked to see if it matches plaintext_password. If so "Password OK" will be printed and the exit sta- tus will be 1, otherwise "Password BAD" will be printed and exit status will be 0 (Note this is the opposite of a normal successful shell status). OPTIONS
-d --des Use a DES (Data Encryption Standard) hash (default). Ignored if performing a password check. -m --md5 Use a MD5 (Message Digest 5) hash. Ignored if performing a password check. -c --check Perform a validation check on a password hash to verify if it matches the plantext password. EXAMPLES
$ radcrypt foobar HaX0xn7Qy650Q $ radcrypt -c foobar HaX0xn7Qy650Q Password OK SEE ALSO
radiusd(8), crypt(3) AUTHORS
Miquel van Smoorenburg <miquels@cistron-office.nl> RADCRYPT(8)
All times are GMT -4. The time now is 08:14 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy