#sha-256 #hash #md5 #hashing #sha-512 #sha-384 #sha-1

bin+lib ezcheck

An easy-to-use, lightweight, cross-platform, and high-performance tool for calculating, comparing, and verifying hash of strings and files

5 releases

0.1.5 Nov 29, 2024
0.1.4 Nov 19, 2024
0.1.3 Nov 17, 2024
0.1.2 Nov 11, 2024
0.1.1 Nov 6, 2024

#488 in Cryptography

Download history 114/week @ 2024-11-04 186/week @ 2024-11-11 231/week @ 2024-11-18 116/week @ 2024-11-25 66/week @ 2024-12-02 189/week @ 2024-12-09

654 downloads per month

MIT license

2MB
923 lines

ezcheck

Build Test Crates.io Version Mirror Gitee

中文文档

ezcheck(easy check) is an easy-to-use, lightweight, cross-platform, and high-performance tool for calculating, comparing, and verifying hash of strings and files.

ezcheck have three backends: ring, hashes and mix backend(ring and hashes), and you can only choose one of them. The main differences between them are:

Features ring hashes mix
Speed Fast. About 5 times slower than ring. Use the fastest backend that supports the algorithm.
Supported algorithms SHA256, SHA384, SHA512, SHA512/256 MD2, MD4, MD5, SHA1, SHA224, SHA256, SHA384, SHA512, SHA512/256 MD2, MD4, MD5, SHA1, SHA224, SHA256, SHA384, SHA512, SHA512/256
Implement languages Assembly, Rust, C and etc.. Rust Assembly, Rust, C and etc..
Compatibility May not work on every machine with different architecture. Works well with Rust. Same to ring.

❗️ To achieve both fastest speed and maximum compatibility, the default backend is mix backend.

⚠️ Please notice that although ezcheck supports a lot of hash algorithms, MD2, MD4, MD5, SHA1 are proven to be insecure. ezcheck still provides them for maximum compatibility, but it does not recommend users continue to use them.

Setup

Install from binary

Download suitable binary from release.

Install from Cargo

$ # mix backend
$ cargo install ezcheck
$ # ring backend
$ cargo install ezcheck --no-default-features --features ring_backend
$ # hashes backend
$ cargo install ezcheck --no-default-features --features hashes_backend

Instantly run ezcheck with x-cmd

x-cmd is a lightweight cross-platform package manager implemented in posix shell. Quickly download and execute ezcheck with a single command: x ezcheck

You can also install ezcheck in the user level without requiring root privileges:

$ x env use ezcheck

Build from source

MSRV

Build

$ git clone https://github.com/Metaphorme/ezcheck && cd ezcheck
$ # Choose one from mix backend, hashes backend or ring backend
$ # mix backend
$ cargo build --release
$ # ring backend
$ cargo build --release --no-default-features --features ring_backend
$ # hashes backend
$ cargo build --release --no-default-features --features hashes_backend
$
$ ./target/release/ezcheck --version

Run tests

$ git clone https://github.com/Metaphorme/ezcheck && cd ezcheck
$ cargo test  # mix backend
$ cargo test --no-default-features --features ring_backend    # ring backend
$ cargo test --no-default-features --features hashes_backend  # hashes backend

Usage

Supported hash algorithms of different backends:

ring hashes mix
MD2 MD2 (hashes backend)
MD4 MD4 (hashes backend)
MD5 MD5 (hashes backend)
SHA1 SHA1 (hashes backend)
SHA224 SHA224 (hashes backend)
SHA256 SHA256 SHA256 (ring backend)
SHA384 SHA384 SHA384 (ring backend)
SHA512 SHA512 SHA512 (ring backend)
SHA512/256 SHA512/256 SHA512/256 (ring backend)

Calculate

Calculate hash for file(s) or text.

$ # Usage:
$ #  ezcheck calculate|c [ALGORITHM (Default SHA256)] (-f file(s)/"-" for standard input | -t text)
$
$ # Examples:
$ ezcheck c sha256 -f image.jpg
4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f  image.jpg
$
$ cat image.jpg | ezcheck calculate sha256 -f -
4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f  -
$
$ ezcheck calculate sha256 -t "Hello"
SHA256:  185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
$
$ ezcheck calculate -f image.jpg
No algorithm specified. Using SHA256 as the default.
4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f  image.jpg
$
$ # We could also redirect the output into a file, just like shasum does.
$ ezcheck calculate sha256 -f image.jpg > sha256sum.txt

Compare

Compare with given hash.

$ # Usage:
$ #  ezcheck compare|m [ALGORITHM (Leave blank to automatically detect algorithm)] (-f file/"-" for standard input | -t text) -c hash
$  
$ # Examples:
$ ezcheck m sha256 -f image.jpg -c 4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f
SHA256 OK
$
$ cat image.jpg | ezcheck compare sha256 -f - -c 4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f                           
SHA256 OK
$
$ ezcheck compare sha256 -t "Hello" -c 085f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
SHA256 FAILED  Current Hash:  185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
$
$ # Auto detect hash algorithm
$ ezcheck compare -f image.jpg -c bebc102992450c68e5543383889e27c9
INFO: Hash Algorithm could be MD5, MD4, MD2
MD5 FAILED  Current Hash:  cb74bb502cc0949aad5cd838f91f0623
MD4 OK

Check

Check with given shasum-style check file.

shasum-style check file could be generated from shasum and ezcheck. It looks like:

00691413c731ee37f551bfaca6a34b8443b3e85d7c0816a6fe90aa8fc8eaec95  滕王阁序.txt
4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f *image.jpg
$ # Usage:
$ #  ezcheck check|k [ALGORITHM (Leave blank to automatically detect algorithm)] -c check-file
$
$ # Warning: The shasum file (or check file) should be in the same directory with files to be checked.
$ # Example:
$ ezcheck k sha256 -c sha256sum.txt 
滕王阁序.txt: SHA256 OK
image.jpg: SHA256 OK
$
$ # Auto detect hash algorithm
$ cat sha256sum.txt
9ec44ac67ab1e1c98fe0406478d5297d  滕王阁序.txt
bebc102992450c68e5543383889e27c9  image.jpg
$ ezcheck check -c sha256sum.txt 
滕王阁序.txt: MD5 FAILED  Current Hash:  07c4e6a2c2db5f2d3a8998a3dba84a96
滕王阁序.txt: MD4 OK
image.jpg: MD5 FAILED  Current Hash:  cb74bb502cc0949aad5cd838f91f0623
image.jpg: MD4 OK
$
$ # Actually, ezcheck supports various algorithm in the same check file in auto detect.
$ # 🤔 But why this happens?
$ cat sha256sum.txt
00691413c731ee37f551bfaca6a34b8443b3e85d7c0816a6fe90aa8fc8eaec95  滕王阁序.txt
4c03795a6bca220a68eae7c4f136d6247d58671e074bccd58a3b9989da55f56f *image.jpg
9ec44ac67ab1e1c98fe0406478d5297d  滕王阁序.txt
$
$ ezcheck check -c sha256sum.txt
滕王阁序.txt: SHA256 OK
image.jpg: SHA256 OK
滕王阁序.txt: MD5 FAILED  Current Hash:  07c4e6a2c2db5f2d3a8998a3dba84a96
滕王阁序.txt: MD4 OK

Benchmark

Method

  • Device: MacBook Air M1 8GB

  • Steps:

  1. Run and repeat 3 times:

    $ count=10000  # Test size = 1MiB * $count
    $ # Bare, Speed of generating the data
    $ dd if=/dev/zero bs=1M count=$count | pv > /dev/null
    $ # ezcheck-hashes
    $ dd if=/dev/zero bs=1M count=$count | pv | ./ezcheck-hashes calculate sha256 -f -
    $ # ezcheck-ring
    $ dd if=/dev/zero bs=1M count=$count | pv | ./ezcheck-ring calculate sha256 -f -
    $ # sha256sum
    $ dd if=/dev/zero bs=1M count=$count | pv | sha256sum
    
  2. Calculate the average value.

Result

Command/Speed(GiB/s)/Test size(MiB) 1 100 500 1000 5000 10000
Bare (Speed of generating the data) 2.13 3.02 4.59 5.31 5.97 6.07
ezcheck-hashes 0.13 0.28 0.29 0.30 0.30 0.30
ezcheck-ring 0.58 1.24 1.57 1.63 1.68 1.68
sha256sum 0.73 1.26 1.63 1.69 1.75 1.81

benchmark

License

MIT License

Copyright (c) 2024 Heqi Liu

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

Dependencies

~1.1–9.5MB
~119K SLoC