aefp(1) aefp(1) NNAAMMEE aefp - calculate file fingerprint SSYYNNOOPPSSIISS aaeeffpp [ _o_p_t_i_o_n... ][ _f_i_l_e_n_a_m_e... ] aaeeffpp --HHeellpp aaeeffpp --VVEERRSSiioonn DDEESSCCRRIIPPTTIIOONN The _a_e_f_p program is used to calculate the fingerprints of files. A fingerprint is a hash of the contents of a file. The default fingerprint is cryptographically strong, so the probability of two different files having the same fingerprint is less than 1 in 2**200. The fingerprint is based on Dan Berstien public domain fingerprint 0.50 beta package 930809, posted to the alt.sources newsgroup. This program produces identical results; the expected test results were generated using Dan's package. The fingerprint is a base-64-sanely-encoded fingerprint of the input. Imagine this fingerprint as something univer- sal and permanent. A fingerprint is 76 characters long, containing the following: 1. A Snefru-8 (version 2.5, 8 passes, 512->256) hash. (Derived from the Xerox Secure Hash Function.) 2. An MD5 hash, as per RFC 1321. (Derived from the RSADSI MD5 Message-Digest Algorithm.) 3. A CRC checksum, as in the new cksum utility. 4. Length modulo 2^40. The output format is not expected to be compatible with anything. However, options are available to produce the purported output of Merkle's snefru program, the purported output of RSADSI's mddriver -x, or the purported output of the POSIX cksum program. If no files are named as input, the standard input will be used. The special file name ``-'' is understood to mean the standard input. OOPPTTIIOONNSS The following options are understood: --CChheecckkssuumm Print the CRC32 checksum and length of the named file(s). --IIddeennttiiffiieerr Print a condensed form of the fingerprint (obtained by performing a CRC32 checksum on the full fingerprint described above - a definite overkill). This is an 8-digit hexadecimal number, useful for generating unique short identifiers out of long names. The first character is forced to be a letter (g-p), so there is no problem in using the output as a variable name. --HHeellpp Provide some help with using the _a_e_f_p program. --MMeessssaaggee__DDiiggeesstt Print the RSA Data Security, Inc. MD5 Message- Digest Algorithm hash of the named file(s). --SSnneeffrruu Print the Snefru hash of the named file(s), derived from the Xerox Secure Hash Function. --VVEERRSSiioonn Print the version of the _a_e_f_p program being exe- cuted. All other options will produce a diagnostic error. All options may be abbreviated; the abbreviation is docu- mented as the upper case letters, all lower case letters and underscores (_) are optional. You must use consecu- tive sequences of optional letters. All options are case insensitive, you may type them in upper case or lower case or a combination of both, case is not important. For example: the arguments "-project, "-PROJ" and "-p" are all interpreted to mean the --PPrroojjeecctt option. The argument "-prj" will not be understood, because consecutive optional characters were not supplied. Options and other command line arguments may be mixed arbitrarily on the command line, after the function selec- tors. The GNU long option names are understood. Since all option names for _a_e_f_p are long, this means ignoring the extra leading '-'. The "----_o_p_t_i_o_n==_v_a_l_u_e" convention is also understood. EEXXIITT SSTTAATTUUSS The _a_e_f_p command will exit with a status of 1 on any error. The _a_e_f_p command will only exit with a status of 0 if there are no errors. EENNVVIIRROONNMMEENNTT VVAARRIIAABBLLEESS See _a_e_g_i_s(1) for a list of environment variables which may affect this command. CCOOPPYYRRIIGGHHTT aefp version .C001 Copyright (C) 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001 Peter Miller; All rights reserved. The aefp program comes with ABSOLUTELY NO WARRANTY; for details use the '_a_e_f_p _-_V_E_R_S_i_o_n _L_i_c_e_n_s_e' command. This is free software and you are welcome to redistribute it under certain conditions; for details use the '_a_e_f_p _-_V_E_R_S_i_o_n _L_i_c_e_n_s_e' command. AAUUTTHHOORR Peter Miller E-Mail: millerp@canb.auug.org.au /\/\* WWW: http://www.canb.auug.org.au/~millerp/ Portions of this program are derived from sources from other people, sometimes with liberal copyrights, and some- times in the public domain. These include: Dan Bernstien See _c_o_m_m_o_n_/_f_p_/_R_E_A_D_M_E for details. Gary S Brown. See _c_o_m_m_o_n_/_f_p_/_c_r_c_3_2_._c for details. RSA Data Security, Inc. See _c_o_m_m_o_n_/_f_p_/_m_d_5_._c for details. Xerox Corporation See _c_o_m_m_o_n_/_f_p_/_s_n_e_f_r_u_._c for details. In addition to the above copyright holders, there have been numerous authors and contributors, see the named files for details. Files names are relative to the root of the _a_e_g_i_s distribution. Reference Manual 1