The program reads the keyfile given on the command line and computes both SDLH and SHA-1 hashes of the essential key material. Both hashes are printed to stdout.
A security hash is computed on the concatenation of
the modulus, the encryption value, the hash modulus, the generator and the user's identification string.
String representations of the numeric values are used.
Both signed and unsigned key files can be used.
All rights reserved. © 2003
This is free software. Use this software on your own risk or not at all. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.