10-19-2010
file verification
yes exactly ..we are looking to hash a file and send it to a recipient and he would hash the file again to match the signature...in other words we want to perform file verification using a hash utility...in windows environment we have a utility called "Jacksum" ..i am looking for a alternative in Unix environment
10 More Discussions You Might Find Interesting
1. SCO
how can zip a directory in sco unix and transfer it to any other system using ftp. and finally how can i unzip it
regards,
ajay (1 Reply)
Discussion started by: ajay234
1 Replies
2. Shell Programming and Scripting
Kindly help me to build the script similar to VLOOKUP function of MS Excell. (5 Replies)
Discussion started by: hjoshi
5 Replies
3. UNIX for Dummies Questions & Answers
Hi,
Can anyone explain me the use of age utility and how it works?
Looking forward reply...
Thanks,
Venkatesh. (1 Reply)
Discussion started by: venkatesht
1 Replies
4. UNIX for Dummies Questions & Answers
Hello everyone.
Could you please advise of what would be the best Unix (Debian 4) program for regular (daily or weekly) incremental backups?
I'm not sure whether the backups will be stored on a "backup" drive on the same system or on an external "backup" system, but we would like to have a... (2 Replies)
Discussion started by: nottrobin
2 Replies
5. Shell Programming and Scripting
Hi,
I need to zip/compress a data file and send to a vendor. The vendor does have only unzip utility and can accept only .ZIP files. I do not have zip utility in my server.
How do I zip/compress the file so that it can be deflated using unzip command ? I tried gzip & compress commands, but... (1 Reply)
Discussion started by: Sabari Nath S
1 Replies
6. UNIX for Dummies Questions & Answers
What command should I use to analyze file hashing of fixed flat files.
How much work does it take for multiple flat files. (3 Replies)
Discussion started by: jbjoat
3 Replies
7. Shell Programming and Scripting
Hi,
I am not being able to open txt files with 'cat'. One thing to mention is, the filenames start with #. I guess one can have a unix filename that starts with a special/wildcard character. I have filenames starting with @ and they are opening perfectly with cat. (5 Replies)
Discussion started by: Subhasis
5 Replies
8. Shell Programming and Scripting
I have .zip file, i want to list all the files archived in the zip file. unzip utility is not working for me in unix.
Please help me resolve this issue
Thanks
ganesh. (3 Replies)
Discussion started by: Ganesh L
3 Replies
9. UNIX for Beginners Questions & Answers
Hi,
I work on a Middleware application which is installed on Windows, but its file System is on HP UNIX. I am supposed to change the SMTP host address for my application. But I am not able to find the file where the old SMTP host would have been configured/hardcoded. Can anyone assist me on this... (2 Replies)
Discussion started by: jhilmil
2 Replies
10. UNIX for Beginners Questions & Answers
Hi,
I am trying to find out whether there are any Unix utilities that compares folders, files and contents within the file and provides a comprehensive report. The comparison can be against base version of a folder and file with content. Can you please let me know of such a utility?
Thanks,... (6 Replies)
Discussion started by: Sripathi_ks
6 Replies
LEARN ABOUT MOJAVE
db_verify
db_verify(1) BSD General Commands Manual db_verify(1)
NAME
db_verify
SYNOPSIS
db_verify [-NoqV] [-h home] [-P password] file ...
DESCRIPTION
The db_verify utility verifies the structure of one or more files and the databases they contain.
The options are as follows:
-h
Specify a home directory for the database environment; by default, the current working directory is used.
-o
Skip the database checks for btree and duplicate sort order and for hashing.
If the file being verified contains databases with non-default comparison or hashing configurations, calling the db_verify utility without
the -o flag will usually return failure. The -o flag causes db_verify to ignore database sort or hash ordering and allows db_verify to be
used on these files. To fully verify these files, verify them explicitly using the DB->verify method, after configuring the correct com-
parison or hashing functions.
-N
Do not acquire shared region mutexes while running. Other problems, such as potentially fatal errors in Berkeley DB, will be ignored as
well. This option is intended only for debugging errors, and should not be used under any other circumstances.
-P
Specify an environment password. Although Berkeley DB utilities overwrite password strings as soon as possible, be aware there may be a
window of vulnerability on systems where unprivileged users can see command-line arguments or where utilities are not able to overwrite
the memory containing the command-line arguments.
-q
Suppress the printing of any error descriptions, simply exit success or failure.
-V
Write the library version number to the standard output, and exit.
The db_verify utility does not perform any locking, even in Berkeley DB environments that are configured with a locking subsystem. As such,
it should only be used on files that are not being modified by another thread of control.
The db_verify utility may be used with a Berkeley DB environment (as described for the -h option, the environment variable DB_HOME, or
because the utility was run in a directory containing a Berkeley DB environment). In order to avoid environment corruption when using a
Berkeley DB environment, db_verify should always be given the chance to detach from the environment and exit gracefully. To cause db_verify
to release all environment resources and exit cleanly, send it an interrupt signal (SIGINT).
The db_verify utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT
DB_HOME If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home, as
described in DB_ENV->open.
SEE ALSO
db_archive(1), db_checkpoint(1), db_deadlock(1), db_dump(1), db_load(1), db_printlog(1), db_recover(1), db_stat(1), db_upgrade(1)
Darwin December 3, 2003 Darwin