Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

sha384hmac(8) [centos man page]

sha512hmac(8)						   System Administrator's Manual					     sha512hmac(8)

NAME
sha512hmac - compute and check HMAC values SYNOPSIS
sha512hmac [OPTIONS] [-u | -k keyfile | -K key] [-c file [-q] | file [...] ] DESCRIPTION
The sha512hmac command can compute and/or verify HMAC and unkeyed checksum values for the contents of files. Variations such as sha384hmac, sha256hmac, and sha1hmac all operate similarly except that they use different digest algorithms. SELF-TEST As a safety measure, the tool will always attempt to verify a previously- computed HMAC over itself with the contents of a second file (sha512hmac.hmac for sha512hmac, and a similarly-named file for each variation) before processing any other files, and will exit with an error if the second file either cannot be read or does not match the computed value. OPTIONS
-c Check that the HMAC values and names listed in the specified file(s) are correct for the files which are available. The format of the files should match the output which the tool produces when computing the values: a hex-encoded HMAC value and then a filename, separated by whitespace. -q Suppress any output when checking values. -d cfgdir Specify the configuration directory to be used by the NSS library. The default location is /etc/pki/nssdb. -h algorithm Generate the HMAC value using a non-default hashing algorithm. The default is determined by the name used to invoke the tool (sha1hmac, sha256hmac, etc.). If no default can be derived this way, the default setting will be sha512. Specify help or another invalid value to obtain a list of recognized algorithms. -u Generate an unkeyed checksum instead of an HMAC. The output produced by the tool should then be comparable to that of sha1sum and related tools. -k filename Use the contents of the specified file as the secret key used in computing the HMAC values. If no key file or text is specified, a hard-coded default value is used. This option should always be used. -K text Use the text of the argument as the secret key used in computing the HMAC values. If no key file or text is specified, a hard-coded default value is used. -b Process file contents in binary mode, marking output as such by prefixing filenames with *. This option is not expected to have any other meaningful effect. -t bits Truncate HMAC values to a given length when computing or verifying them. -S Generate an HMAC over the tool itself and output it on standard out. This is a bootstrapping option which is not expected to be used. -P Attempt to pass all input files through prelink -y before processing their contents. The tool always attempts to do so when comput- ing or performing a self-check. EXAMPLES
Example output from sha1hmac, for files on the developer's system: e64db5e8a9b8a40091e5302fa4de0bfc6c5d19d0 /etc/passwd e7d93a2c70ec4d7720c6f2b033c1e5ea19f2d677 /etc/group d732d6df77114ea6b81a43d64655f86b1e5ee925 /etc/services ad92162bef979054a75d1f3510e6b05902bec641 /etc/hosts SEE ALSO
fipshmac(1), fipscheck(1), prelink(8) BUGS
Probably, but let's hope not. If you find any, please either report them in the bug database at http://bugzilla.redhat.com/ against the "hmaccalc" component, or in the trac instance at https://fedorahosted.org/hmaccalc/. AUTHOR
Nalin Dahyabhai <nalin@redhat.com> hmaccalc 0.9.13 2009/03/19 sha512hmac(8)

Check Out this Related Man Page

wanboot_keygen(1M)					  System Administration Commands					wanboot_keygen(1M)

NAME
wanboot_keygen - create and display client and server keys for WAN booting SYNOPSIS
/usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=3des /usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=aes /usr/lib/inet/wanboot/keygen -m /usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=sha1 /usr/lib/inet/wanboot/keygen -d -m /usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=keytype DESCRIPTION
The keygen utility has three purposes: o Using the -c flag, to generate and store per-client 3DES/AES encryption keys, avoiding any DES weak keys. o Using the -m flag, to generate and store a "master" HMAC SHA-1 key for WAN install, and to derive from the master key per-client HMAC SHA-1 hashing keys, in a manner described in RFC 3118, Appendix A. o Using the -d flag along with either the -c or -m flag to indicate the key repository, to display a key of type specified by key- type, which must be one of 3des, aes, or sha1. The net and cid arguments are used to identify a specific client. Both arguments are optional. If the cid option is not provided, the key being created or displayed will have a per-network scope. If the net option is not provided, then the key will have a global scope. Default net and code values are used to derive an HMAC SHA-1 key if the values are not provided by the user. OPTIONS
The following options are supported: -c Generate and store per-client 3DES/AES encryption keys, avoiding any DES weak keys. Also generates and stores per-client HMAC SHA-1 keys. Used in conjunction with -o. -d Display a key of type specified by keytype, which must be one of 3des, aes, or sha1. Use -d with -m or with -c and -o. -m Generate and store a "master" HMAC SHA-1 key for WAN install. -o Specifies the WANboot client and/or keytype. EXAMPLES
Example 1 Generate a Master HMAC SHA-1 Key # keygen -m Example 2 Generate and Then Display a Client-Specific Master HMAC SHA-1 Key # keygen -c -o net=172.16.174.0,cid=010003BA0E6A36,type=sha1 # keygen -d -c -o net=172.16.174.0,cid=010003BA0E6A36,type=sha1 Example 3 Generate and Display a 3DES Key with a Per-Network Scope # keygen -c -o net=172.16.174.0,type=3des # keygen -d -o net=172.16.174.0,type=3des EXIT STATUS
0 Successful operation. >0 An error occurred. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWwbsup | +-----------------------------+-----------------------------+ |Interface Stability |Obsolete | +-----------------------------+-----------------------------+ SEE ALSO
attributes(5) SunOS 5.11 18 Apr 2003 wanboot_keygen(1M)
Man Page