diff --git a/HashSum.c b/HashSum.c new file mode 100644 index 0000000..164daf5 --- /dev/null +++ b/HashSum.c @@ -0,0 +1,1012 @@ +/* Compute and validate checksums of files. + * + * Copyright (C) 2017 Mark Pizzolato. + * All Rights Reserved. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, version 2 of the License. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + * + * Written by Mark Pizzolato + * + * All of the ideas implemented here are derived from the *nix programs: + * md5sum, sha1sum, sha256sum, sha512sum, etc. and are intended to provide + * equivalent funcdtionality to these programs on a Windows platform. + * + */ + +/* Written by Mark Pizzolato . */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#pragma comment(lib, "bcrypt.lib") + +#ifndef STATUS_SUCCESS +#define STATUS_SUCCESS ERROR_SUCCESS +#endif + +#define VERSION "1.0" + +#define FLG_CHECK 1 +#define FLG_QUIET 2 +#define FLG_STATUS 4 +#define FLG_WARN 8 +#define FLG_STRICT 16 +#define FLG_BINARY 32 +#define FLG_BSDTAG 64 +#define FLG_IGNORE 128 + +const char * +GetErrorText(DWORD dwError) + { + static char szMsgBuffer[2048]; + DWORD dwStatus; + + dwStatus = FormatMessageA (FORMAT_MESSAGE_FROM_SYSTEM| + FORMAT_MESSAGE_IGNORE_INSERTS, // __in DWORD dwFlags, + NULL, // __in_opt LPCVOID lpSource, + dwError, // __in DWORD dwMessageId, + 0, // __in DWORD dwLanguageId, + szMsgBuffer, // __out LPTSTR lpBuffer, + sizeof (szMsgBuffer) -1, // __in DWORD nSize, + NULL); // __in_opt va_list *Arguments + if (0 == dwStatus) + { + typedef DWORD (__stdcall *_func)(); + _func func_ptr = (_func)GetProcAddress(GetModuleHandleA("Ntdll.dll"), "RtlNtStatusToDosError"); + + dwStatus = FormatMessageA (FORMAT_MESSAGE_FROM_SYSTEM| + FORMAT_MESSAGE_IGNORE_INSERTS, // __in DWORD dwFlags, + NULL, // __in_opt LPCVOID lpSource, + func_ptr(dwError), // __in DWORD dwMessageId, + 0, // __in DWORD dwLanguageId, + szMsgBuffer, // __out LPTSTR lpBuffer, + sizeof (szMsgBuffer) -1, // __in DWORD nSize, + NULL); // __in_opt va_list *Arguments + if (0 == dwStatus) + _snprintf(szMsgBuffer, sizeof(szMsgBuffer) - 1, "Error Code: 0x%lX", dwError); + } + while (isspace (szMsgBuffer[strlen (szMsgBuffer)-1])) + szMsgBuffer[strlen (szMsgBuffer) - 1] = '\0'; + return szMsgBuffer; + } + +const char * +GetProgramBaseName() + { + char FullName[MAX_PATH + 1]; + static char BaseName[_MAX_FNAME + 1]; + + if (GetModuleFileNameA(NULL, FullName, sizeof(FullName)) >= sizeof(FullName)) + return ""; + if (_splitpath_s(FullName, NULL, 0, NULL, 0, BaseName, sizeof(BaseName), NULL, 0)) + return ""; + return BaseName; + } + +SSIZE_T +GetLine(char **pBuf, size_t *pBufSize, FILE *file) + { + char chunk[1024]; + size_t chunk_size; + size_t buf_used = 0; + + if (pBuf == NULL) + { + errno = EINVAL; + return -1; + } + if (ferror(file) || feof(file)) + return -1; + do { + if (chunk != fgets(chunk, sizeof(chunk), file)) + strcpy(chunk, ""); + chunk_size = strlen(chunk); + if (*pBufSize < chunk_size + 1) + { + char *newbuf = (char *)realloc(*pBuf, *pBufSize + chunk_size + 1); + + if (newbuf == NULL) + return -1; + *pBuf = newbuf; + *pBufSize += chunk_size + 1; + } + memcpy(*pBuf + buf_used, chunk, chunk_size + 1); + buf_used += chunk_size; + } while ((chunk_size != 0) && (chunk[chunk_size - 1] != '\n')); + return buf_used; + } + +void +CloseHashAlgorithmProvider(BCRYPT_ALG_HANDLE hAlg) + { + if (hAlg != INVALID_HANDLE_VALUE) + BCryptCloseAlgorithmProvider(hAlg, 0); + } + +BCRYPT_ALG_HANDLE +OpenHashAlgorithmProvider(const char *Algorithm) + { + BCRYPT_ALG_HANDLE hAlg = INVALID_HANDLE_VALUE; + NTSTATUS result; + wchar_t AlgorithmW[65]; + DWORD cbHash, cbData; + size_t i; + + memset(AlgorithmW, 0, sizeof(AlgorithmW)); + for (i=0; (i<64) && (Algorithm[i] != '\0'); i++) + AlgorithmW[i] = Algorithm[i]; + result = BCryptOpenAlgorithmProvider(&hAlg, // algorithm handle + AlgorithmW,// hashing algorithm ID + NULL, // use default provider + 0); // default flags + if (STATUS_SUCCESS != result) + { + fprintf(stderr, "Can't load '%s' cryptographic algorithm provider: %s\n", Algorithm, GetErrorText(result)); + hAlg = INVALID_HANDLE_VALUE; + } + else + { + result = BCryptGetProperty(hAlg, + BCRYPT_HASH_LENGTH, + (PBYTE)&cbHash, + sizeof(cbHash), + &cbData, + 0); + if (STATUS_SUCCESS != result) + { + fprintf(stderr, "cryptographic algorithm provider '%s' does not provide hash functionality\n", Algorithm, GetErrorText(result)); + CloseHashAlgorithmProvider(hAlg); + hAlg = INVALID_HANDLE_VALUE; + } + } + return hAlg; + } + +#if 0 +/* TexInfo description */ +`-b' +`--binary' + Treat each input file as binary, by reading it in binary mode and + outputting a `*' flag. This is the inverse of `--text'. On + systems like GNU that do not distinguish between binary and text + files, this option merely flags each input mode as binary: the MD5 + checksum is unaffected. This option is the default on Windows + systems since they distinguish between binary and text files, except + for reading standard input when standard input is a terminal. + +`-c' +`--check' + Read file names and checksum information (not data) from each FILE + (or from stdin if no FILE was specified) and report whether the + checksums match the contents of the named files. The input to + this mode of the program is usually the output of a prior, + checksum-generating run of the program. Each valid line of input + consists of an checksum, a binary/text flag, and then a file + name. Binary mode is indicated with `*', text with ` ' (space). + For each such line, the program reads the named file and computes its + checksum. Then, if the computed message digest does not match + the one on the line with the file name, the file is noted as having + failed the test. Otherwise, the file passes the test. By + default, for each valid line, one line is written to standard + output indicating whether the named file passed the test. After + all checks have been performed, if there were any failures, a + warning is issued to standard error. Use the `--status' option to + inhibit that output. If any listed file cannot be opened or read, + if any valid line has a checksum inconsistent with the associated + file, or if no valid line is found, the program exits with + nonzero status. Otherwise, it exits successfully. + +`--quiet' + This option is useful only when verifying checksums. When + verifying checksums, don't generate an 'OK' message per + successfully checked file. Files that fail the verification are + reported in the default one-line-per-file format. If there is any + checksum mismatch, print a warning summarizing the failures to + standard error. + +`--status' + This option is useful only when verifying checksums. When + verifying checksums, don't generate the default one-line-per-file + diagnostic and don't output the warning summarizing any failures. + Failures to open or read a file still evoke individual diagnostics + to standard error. If all listed files are readable and are + consistent with the associated MD5 checksums, exit successfully. + Otherwise exit with a status code indicating there was a failure. + +`--tag' + Output BSD style checksums, which indicate the checksum algorithm + used. As a GNU extension, file names with problematic characters + are escaped as described above, with the same escaping indicator + of `\' at the start of the line, being used. The `--tag' option + implies binary mode, and is disallowed with `--text' mode as + supporting that would unnecessarily complicate the output format, + while providing little benefit. + +`-t' +`--text' + Treat each input file as text, by reading it in text mode and + outputting a ` ' flag. This is the inverse of `--binary'. This + option is the default on systems like GNU that do not distinguish + between binary and text files. On other systems, it is the + default for reading standard input when standard input is a + terminal. This mode is never defaulted to if `--tag' is used. + +`-w' +`--warn' + When verifying checksums, warn about improperly formatted + checksum lines. This option is useful only if all but a few lines + in the checked input are valid. + +`--strict' + When verifying checksums, if one or more input line is invalid, + exit nonzero after all warnings have been issued. + + + An exit status of zero indicates success, and a nonzero value +indicates failure. + +SHA1,SHA256,SHA384,SHA512 "FIPS-180-4" +MD5 "RFC 1321" +MD4 "RFC 1320" +MD2 "RFC 1319" +AES-GMAC "RFC 4543" +AES-CMAC "RFC 4493" +#endif + +void +Usage (const char *AlgorithmName) + { + size_t i; + char CommandString[MAX_PATH+1]; + char *Algorithms = NULL; + DWORD cbHash, cbData, cbAlgCount; + BCRYPT_ALGORITHM_IDENTIFIER *pAlgList = NULL; + NTSTATUS result; + BCRYPT_ALG_HANDLE hAlg = OpenHashAlgorithmProvider(AlgorithmName); + + if (!strcmp("hashsum", GetProgramBaseName())) + _snprintf(CommandString, sizeof(CommandString)-1, "%s -a:%s", GetProgramBaseName(), AlgorithmName); + else + strncpy(CommandString, GetProgramBaseName(), sizeof(CommandString)-1); + if (hAlg != INVALID_HANDLE_VALUE) + { + BCryptGetProperty(hAlg, + BCRYPT_HASH_LENGTH, + (PBYTE)&cbHash, + sizeof(cbHash), + &cbData, + 0); + CloseHashAlgorithmProvider(hAlg); + } + if (hAlg == INVALID_HANDLE_VALUE) + { + result = BCryptEnumAlgorithms(BCRYPT_HASH_OPERATION, + &cbAlgCount, + &pAlgList, + 0); + if (STATUS_SUCCESS == result) + { + for (i=0; i>4)&0xF]; + } + } + +Cleanup: + + if (hHash) + BCryptDestroyHash(hHash); + + if (pbHashObject) + free(pbHashObject); + if (pbHash) + free(pbHash); + return (*hash == NULL) ? EXIT_FAILURE : EXIT_SUCCESS; + } + +int +ParseSumLine(char *line, size_t size, char **hash, char **file, char **open_mode, char **algo) + { + char *c; + size_t file_len; + char *rparen = strstr(line, ") = "); + char *lparen = strstr(line, " ("); + static const char HashChars[] = "0123456789abcdefABCDEF\r\n"; + size_t i; + + if (lparen && rparen && (lparen < rparen)) + { + /* Validate hash data as all hex */ + c = rparen + 4; + for (i=0; i 3) && + (!stricmp("SUM", &file[strlen(file) - 3]))) + file[strlen(file) - 3] = '\0'; + + if (!stricmp("HASH", file)) + { + while (argc > 1) + { + if (!strncmp("-a:", argv[1], 3)) + { + file = (char *)realloc(file, 1+strlen(&argv[1][3])); + strcpy(file, &argv[1][3]); + break; + } + --argc; + ++argv; + } + } + alg = (char *)calloc(1+strlen(file), sizeof(*alg)); + for (i=0; i 1) + { + --argc; + ++argv; + if (!strncmp("-a:", argv[0], 3)) + { + size_t i; + + CloseHashAlgorithmProvider(hAlg); + free(algorithm); + algorithm = (char *)calloc(1+strlen(&argv[0][3]), sizeof(*algorithm)); + for (i=0; i + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..081b3c1 --- /dev/null +++ b/LICENSE @@ -0,0 +1,352 @@ + Note that the GPL below is copyrighted by the Free Software + Foundation, but the instance of code that it refers to is copyrighted + by Mark Pizzolato. + + Also note that the only valid version of the GPL as far as the kernel + is concerned is _this_ particular version of the license (ie v2, not + v2.2 or v3.x or whatever), unless explicitly otherwise stated. + + Mark Pizzolato + +---------------------------------------- + + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc. + 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Library General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA + + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Library General +Public License instead of this License. diff --git a/README.md b/README.md new file mode 100644 index 0000000..230a86c --- /dev/null +++ b/README.md @@ -0,0 +1,149 @@ +# User Commands + +Program(s) for Windows that are equivalent to Linux md5sum, sha1sum, +sha256sum, sha384, sha512sum which generate message digests of files. + +This functionality is provided by leveraging the Cryptography API +Next Generation (CNG) library that ships with Windows versions from +Vista onward. + +# NAME +``` + md2sum - compute and check MD2 message digests + md4sum - compute and check MD4 message digests + md5sum - compute and check MD5 message digests + sha1sum - compute and check SHA1 message digests + sha256sum - compute and check SHA256 message digests + sha384sum - compute and check SHA384 message digests + sha512sum - compute and check SHA512 message digests + aes-cmacsum - compute and check AES-CMAC message digests + aes-gmacsum - compute and check AES-GMAC message digests + HashSum -a:HASH - compute and check message digests with {HASH} +``` +# SYNOPSIS +``` + md2sum [OPTION]... [FILE]... + md4sum [OPTION]... [FILE]... + md5sum [OPTION]... [FILE]... + sha1sum [OPTION]... [FILE]... + sha256sum [OPTION]... [FILE]... + sha384sum [OPTION]... [FILE]... + sha512sum [OPTION]... [FILE]... + aes-cmacsum [OPTION]... [FILE]... + aes-gmacsum [OPTION]... [FILE]... + HashSum -a:HASH [OPTION]... [FILE]... +``` +# DESCRIPTION +``` + Print or check checksums. With no FILE, or when FILE + is -, read standard input. + + -b, --binary + read in binary mode + + -c, --check + read checksums from the FILEs and check them + + --tag create a BSD-style checksum + + -t, --text + read in text mode + + -a:HASH + where HASH is one of these algorithms: + SHA256,SHA384,SHA512,SHA1,MD5,MD4,MD2,AES-GMAC,AES-CMAC + + The following three options are useful only when verifying checksums: + --quiet + don't print OK for each successfully verified file + + --status + don't output anything, status code shows success + + -w, --warn + warn about improperly formatted checksum lines + + --strict + with --check, exit non-zero for any invalid input + + --help display this help and exit + + --version + output version information and exit + + The available checksum algorithms are computed as described in: + SHA1,SHA256,SHA384,SHA512(FIPS-180-4) + MD5(RFC 1321) + MD4(RFC 1320) + MD2(RFC 1319) + AES-GMAC(RFC 4543) + AES-CMAC(RFC 4493) + When checking, the input should be a former output of this program or + one of the *nix programs: md5sum, sha1sum, sha256sum, sha384sum or + sha512sum. The default mode is to print a line with checksum, a + character indicating input mode ('*' for binary, space for text), + and name for each FILE. + +``` +# AUTHOR +``` + Written by Mark Pizzolato. +``` +# REPORTING BUGS +``` + Report bugs to mark@infocomm.com +``` +# COPYRIGHT +``` + Copyright (c) 2017 Mark Pizzolato. All Rights Reserved. + There is NO WARRANTY, to the extent permitted by law. + +``` +# Usage +``` +Usage: md2sum [OPTION]... [FILE]... +Usage: md4sum [OPTION]... [FILE]... +Usage: md5sum [OPTION]... [FILE]... +Usage: sha1sum [OPTION]... [FILE]... +Usage: sha256sum [OPTION]... [FILE]... +Usage: sha384sum [OPTION]... [FILE]... +Usage: sha512sum [OPTION]... [FILE]... +Usage: aes-cmacsum [OPTION]... [FILE]... +Usage: aes-gmacsum [OPTION]... [FILE]... +Usage: hashsum -a:HASH [OPTION]... [FILE]... + +Print or check checksums. +With no FILE, or when FILE is -, read standard input. + + -b, --binary read in binary mode + -c, --check read checksums from the FILEs and check them + --tag create a BSD-style checksum + -t, --text read in text mode + -a:HASH where HASH is one of these algorithms: + SHA256,SHA384,SHA512,SHA1,MD5,MD4,MD2,AES-GMAC,AES-CMAC + +The following five options are useful only when verifying checksums: + --ignore-missing don't fail or report status for missing files + --quiet don't print OK for each successfully verified file + --status don't output anything, status code shows success + --strict with --check, exit non-zero for any invalid input + -w, --warn warn about improperly formatted checksum lines + + --help display this help and exit + --version output version information and exit + +When checking, the input should be a former output of this program or one +of the *nix programs: md5sum, sha1sum, sha256sum, sha384sum, sha512sum. + +The available checksum algorithms are computed as described in: + SHA1,SHA256,SHA384,SHA512(FIPS-180-4) + MD5(RFC 1321) + MD4(RFC 1320) + MD2(RFC 1319) + AES-GMAC(RFC 4543) + AES-CMAC(RFC 4493) +The default mode is to print a line with checksum, a character indicating +input mode ('*' for binary, space for text), and name for each FILE. + +Report bugs to mark@infocomm.com +``` \ No newline at end of file