Sponsored Content
Full Discussion: Info on commands
Operating Systems Solaris Info on commands Post 302796939 by DukeNuke2 on Sunday 21st of April 2013 01:33:49 PM
Old 04-21-2013
you need a xxd which is a hexdump of data... this can be done with the od -x in solaris.
and a sha256 checksum can be created with digest -a sha256 command.
This User Gave Thanks to DukeNuke2 For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

SU info

from the man page of su: EXAMPLES Example 1: Becoming User bin While Retaining Your Previously Exported Environment To become user bin while retaining your previously exported environment, execute: example% su bin Example 2: Becoming User bin and ... (4 Replies)
Discussion started by: afflack
4 Replies

2. Solaris

UFSDUMP info

Hi,,,,, My question is : i have to backup a file system of size 92 GB /dev/dsk/c1t1d0s2 135G 92G 41G 70% /data i use the command : ufsdump 0cfu /backup/c1t1d0s2 /dev/rdsk/c1t1d0s2 ...... the output file of the backup is only 2 GB it's normal ?? or i have do a... (0 Replies)
Discussion started by: tt155
0 Replies

3. Programming

code that reads commands from the standard i/p and executes the commands

Hello all, i've written a small piece of code that will read commands from standard input and executes the commands. Its working fine and is execting the commands well. Accepting arguments too. e.g #mkdir <name of the directory> The problem is that its not letting me change the directory i.e... (4 Replies)
Discussion started by: Phrozen Smoke
4 Replies

4. Shell Programming and Scripting

Telnet and get info

Hello all, probably this is a very stupid question but I'm a beginner in the arts of scripting... :confused: I'm trying to do a script that logs in to several equipments, switchs etc, and make them show their version and save all the output to a file. I managed to do the login,... (6 Replies)
Discussion started by: pmpx
6 Replies

5. Shell Programming and Scripting

Need Info

Hi, I'm a oracle DBA with little knowledge of Unix. I wanted to write some shell scripts which will be helpful for DBA's regular activity. As i'm a new to oracle with unix can any plese tell me what are all the activities can be done throgh Unix Shell Scripts also suggest me how to learn... (1 Reply)
Discussion started by: msgobinathan
1 Replies

6. UNIX for Dummies Questions & Answers

Some Info.

Hiya all ... i am a newbie to UNIX, Just want to knwo what this command does: /sbin/ifconfig eth0 | grep 'inet addr:' | cut -d: -f2 | awk '{ print $1}' I think, 'grep shows the line with 'inet addr' (which is the 2nd line, displaying the IP Address, Broadcast Address and Subnet Mask) ... Is... (8 Replies)
Discussion started by: ad4m88
8 Replies

7. Shell Programming and Scripting

Getting LV Info

I have this working ksh, and it returns like below: LOGICAL VOLUME: prod_2048_005 VOLUME GROUP: prod1vg TYPE: raw WRITE VERIFY: off PHYSICAL VOLUME: hdisk108 VOLUME GROUP: prod1vg TOTAL PPs: 1023 (130944 megabytes) VG DESCRIPTORS: 1 USED PPs: 904 (115712 megabytes) MAX REQUEST: 1 megabyte... (1 Reply)
Discussion started by: Daniel Gate
1 Replies

8. Shell Programming and Scripting

Can BASH execute commands on a remote server when the commands are embedded in shell

I want to log into a remote server transfer over a new config and then backup the existing config, replace with the new config. I am not sure if I can do this with BASH scripting. I have set up password less login by adding my public key to authorized_keys file, it works. I am a little... (1 Reply)
Discussion started by: bash_in_my_head
1 Replies

9. AIX

HACMP: difference between 'cl' commands and 'cli' commands

Hi all, I'm new in this forum. I'm looking for the difference between the HACMP commands with the prefix "cl" and "cli". The first type are under /usr/es/sbin/cluster/sbin directory and the second are under /usr/es/sbin/cluster/cspoc directory. I know that the first are called HACMP for AIX... (0 Replies)
Discussion started by: peppix
0 Replies

10. UNIX for Advanced & Expert Users

vi register info

I found this to be a confusing subject so I wanted to share what I have learned. I finally figured it out from this website. vi editor FAQ (Frequently Asked Question List), Part 1/2 You MUST include the single double quotation in this. Obviously <letter> with any letter you feel like. ... (1 Reply)
Discussion started by: cokedude
1 Replies
MD5(1)							    BSD General Commands Manual 						    MD5(1)

NAME
md5, sha1, sha256, sha512, rmd160 -- calculate a message-digest fingerprint (checksum) for a file SYNOPSIS
md5 [-pqrtx] [-c string] [-s string] [file ...] sha1 [-pqrtx] [-c string] [-s string] [file ...] sha256 [-pqrtx] [-c string] [-s string] [file ...] sha512 [-pqrtx] [-c string] [-s string] [file ...] rmd160 [-pqrtx] [-c string] [-s string] [file ...] DESCRIPTION
The md5, sha1, sha256, sha512 and rmd160 utilities take as input a message of arbitrary length and produce as output a ``fingerprint'' or ``message digest'' of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5, SHA-1, SHA-256, SHA-512 and RIPEMD-160 algo- rithms are intended for digital signature applications, where a large file must be ``compressed'' in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA. MD5 has been completely broken as far as finding collisions is concerned, and should not be relied upon to produce unique outputs. This also means that MD5 should not be used as part of a cryptographic signature scheme. At the current time (2014-05-17) there is no publicly known method to ``reverse'' MD5, i.e., to find an input given a hash value. SHA-1 currently (2014-05-17) has no known collisions, but an attack has been found which is faster than a brute-force search, placing the security of SHA-1 in doubt. It is recommended that all new applications use SHA-256 instead of one of the other hash functions. The following options may be used in any combination and must precede any files named on the command line. The hexadecimal checksum of each file listed on the command line is printed after the options are processed. -c string Compare the digest of the file against this string. (Note that this option is not yet useful if multiple files are specified.) -s string Print a checksum of the given string. -p Echo stdin to stdout and append the checksum to stdout. -q Quiet mode -- only the checksum is printed out. Overrides the -r option. -r Reverses the format of the output. This helps with visual diffs. Does nothing when combined with the -ptx options. -t Run a built-in time trial. -x Run a built-in test script. EXIT STATUS
The md5, sha1, sha256, sha512 and rmd160 utilities exit 0 on success, 1 if at least one of the input files could not be read, and 2 if at least one file does not have the same hash as the -c option. SEE ALSO
cksum(1), md5(3), ripemd(3), sha(3), sha256(3), sha512(3) R. Rivest, The MD5 Message-Digest Algorithm, RFC1321. J. Burrows, The Secure Hash Standard, FIPS PUB 180-2. D. Eastlake and P. Jones, US Secure Hash Algorithm 1, RFC 3174. RIPEMD-160 is part of the ISO draft standard "ISO/IEC DIS 10118-3" on dedicated hash functions. Secure Hash Standard (SHS): http://csrc.nist.gov/cryptval/shs.html. The RIPEMD-160 page: http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html. ACKNOWLEDGMENTS
This program is placed in the public domain for free general use by RSA Data Security. Support for SHA-1 and RIPEMD-160 has been added by Oliver Eikemeier <eik@FreeBSD.org>. BSD
May 17, 2014 BSD
All times are GMT -4. The time now is 02:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy