CTX116166
XenServer
XenServer 6_2_0,XenServer 6_1_0,XenServer 6_0
Configuration
2016-04-15
2014-05-23
This article contains information about checking the integrity of the downloaded ISO image before burning it to a media.

Objective

This article contains information about checking the integrity of the downloaded ISO image before burning it to a media. Corrupted ISO images can lead to problems during installation. Therefore, it is a good practice to check the integrity of the downloaded ISO image.


Instructions

Checking the Integrity of the ISO Image in Linux Operating System

Md5sum

Md5sum is a Linux command line utility to generate and verify the MD5 digests by using the MD5 algorithm. This is helpful for detecting file corruption.
Download pages provide md5sum digests for ISO images to verify against the file once it is downloaded. You can use md5sum to generate the md5 digest on your computer and verify it against the one available on the website. If they differ, then the downloaded ISO image is corrupt.

Command Syntax:

# md5sum [OPTION] [FILE]
Following is a sample of the simplest form of this command:
# md5sum <iso-file>
For more command options, refer the man page for md5sum.

Sha256sum

Sha256sum is another Linux command line utility used to compute and check the SHA256 message digest algorithm. Along with Md5sum, it is used for detecting file corruption as well.
Download pages also provide sha256sum digests for ISO images to verify against the file once it is downloaded. You can use sha256sum to generate the sha256 digest on your computer and verify it against the one available on the website. If they differ, then the downloaded ISO image is corrupt.
Command Syntax:

# sha256sum [OPTION] [FILE]
Following is a sample of the simplest form of this command:
# sha256sum <iso-file>
For more command options, refer the man page for sha256sum.

Checking the Integrity of the ISO Image in the Windows Operating System

The File Checksum Integrity Verifier (FCIV) computes and verifies MD5 hash values. FCIV can be used on Windows 2000/2003/XP.
To install and use FCIV, complete the following procedure:

  1. Create a new folder with the name FCIV.

  2. Download FCIV from FCIV Download and save it to the folder created in step 1.

  3. Navigate to the FCIV folder and double click the downloaded file, windows-kb841290-x86-enu.exe and follow the onscreen instructions.
    The process extracts the file fciv.exe to the specified location.

  4. Append the path of fciv.exe in the system environment variable PATH. For example, if FCIV was installed in the directory C:\FCIV, open a command prompt and run the following command to add it to the system path:
    set PATH=%PATH%;C:\FCIV

  5. Run the command, fciv from a command prompt to generate and verify an MD5 sum.
    c:\> fciv <iso-file>
    For help and more options , run the following command:
    C:\FCIV /?


Disclaimer

The above mentioned sample code is provided to you as is with no representations, warranties or conditions of any kind. You may use, modify and distribute it at your own risk. CITRIX DISCLAIMS ALL WARRANTIES WHATSOEVER, EXPRESS, IMPLIED, WRITTEN, ORAL OR STATUTORY, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NONINFRINGEMENT. Without limiting the generality of the foregoing, you acknowledge and agree that (a) the sample code may exhibit errors, design flaws or other problems, possibly resulting in loss of data or damage to property; (b) it may not be possible to make the sample code fully functional; and (c) Citrix may, without notice or liability to you, cease to make available the current version and/or any future versions of the sample code. In no event should the code be used to support of ultra-hazardous activities, including but not limited to life support or blasting activities. NEITHER CITRIX NOR ITS AFFILIATES OR AGENTS WILL BE LIABLE, UNDER BREACH OF CONTRACT OR ANY OTHER THEORY OF LIABILITY, FOR ANY DAMAGES WHATSOEVER ARISING FROM USE OF THE SAMPLE CODE, INCLUDING WITHOUT LIMITATION DIRECT, SPECIAL, INCIDENTAL, PUNITIVE, CONSEQUENTIAL OR OTHER DAMAGES, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Although the copyright in the code belongs to Citrix, any distribution of the code should include only your own standard copyright attribution, and not that of Citrix. You agree to indemnify and defend Citrix against any and all claims arising from your use, modification or distribution of the code.

 

Join the conversation

Citrix Discussions

Open a case

Citrix Support

特别说明


本文来源为Citrix.com所有,翻译后版权归翻译者所有.如需转载请注明出处.

文档版本


.

广告招租


最新留言


.

广告招租


.