.\" $NetBSD: digest.1,v 1.10 2021/09/28 13:05:08 nia Exp $ .\" .\" Copyright (c) 2001-2016 Alistair Crooks .\" All rights reserved. .\" .\" Redistribution and use in source and binary forms, with or without .\" modification, are permitted provided that the following conditions .\" are met: .\" 1. Redistributions of source code must retain the above copyright .\" notice, this list of conditions and the following disclaimer. .\" 2. Redistributions in binary form must reproduce the above copyright .\" notice, this list of conditions and the following disclaimer in the .\" documentation and/or other materials provided with the distribution. .\" .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" .Dd September 28, 2021 .Dt DIGEST 1 .Os .Sh NAME .Nm digest .Nd calculate message digests .Sh SYNOPSIS .Nm .Op Fl "Vt" .Ar algorithm .Op Ar .Sh DESCRIPTION The .Nm utility calculates message digests of files or, if no file is specified, standard input. .Pp It can also run self tests via the .Fl t command line option; the only self tests currently defined are for the .Dv SHA3 set of digests. .Pp The .Fl V command line option prints the version number of .Nm and exits successfully. .Pp The list of possible algorithms is: .Bl -tag -width SHA3_512xxx .It blake2b the blake2b algorithm will be used. .It blake2s the blake2s algorithm will be used. .It md5 the .Xr md5 3 algorithm will be used. .It rmd160 the .Xr rmd160 3 algorithm will be used. .It sha1 the .Xr sha1 3 algorithm will be used. .It sha256 the sha256 algorithm will be used. .It sha384 the sha384 algorithm will be used. .It sha3_224 the sha3_224 algorithm will be used. .It sha3_256 the sha3_256 algorithm will be used. .It sha3_384 the sha3_384 algorithm will be used. .It sha3_512 the sha3_512 algorithm will be used. .It sha512 the sha512 algorithm will be used. .It tiger the tiger algorithm will be used. .It whirlpool the whirlpool algorithm will be used. .El .Pp The .Nm utility is a simple wrapper for the various different algorithm implementations, which are located in the standard C library, and was designed to be scalable as new message digest algorithms are developed. .Pp The .Nm utility exits 0 on success, and \*[Gt]0 if an error occurs. .Sh SEE ALSO .Xr cksum 1 , .Xr md5 3 , .Xr rmd160 3 , .Xr sha1 3 .Sh HISTORY The .Nm utility first appeared in .Nx 1.6 . .Sh AUTHORS The .Nm utility was written by .An Alistair G. Crooks Aq Mt agc@netbsd.org .