![]() ![]() The CRC-16, CRC-16/CCITT and CRC-32 algorithms can be customized by clicking the Options button and using the Custom Polynomials section. This feature is useful to calculate the checksums for files where the actual checksum is stored in the file and thus should be excluded from the calculation. For example, entering the ranges '512.515,0x1000' would ignore the 4 bytes starting at position 512, and the single byte at 0x1000. Any of the standard numeric formats can be used in the field. ![]() Multiple addresses can be indicated using commas, and a range of addresses can be indicated using '.' between two addresses (the range is inclusive). When a selection is made, select the Selection toggle in the dialog box to apply the algorithms to only the selected bytes (the default), or the Entire File toggle to apply the algorithms to all bytes.īesides limiting the checksum to the selected bytes, explicitly excluding certain byte ranges is possible by enabling the Ignore Byte Ranges toggle and entered ranges in the associated field. ![]() If no bytes are selected in the file when the Check Sum tool is run, the algorithms will be applied to all bytes in the file. Some advanced options can be controlled by clicking the Options button. The details of the other algorithms are beyond the scope of this help file. For unsigned short, int, or int64 checksum algorithms the data will be padded with zeros if the data size is not a multiple of the data type size. Note that there are two versions of these algorithms, one where the file is treated as Little Endian and one where the file is treated as Big Endian (see Introduction to Byte Ordering for more information on endianness). These type of checksums can be calculated by selecting the Checksum - UShort, Checksum - UInt, or Checksum - UInt64 algorithms respectively. However, some checksum algorithms need to treat the data file as a list of unsigned shorts, ints, or int64s (see Using the Inspector for more information on different data types). Most checksum algorithms treat the data file as a list of unsigned bytes and then sum the values of those bytes (this type of algorithm can be performed by selecting the Checkum - UByte algorithm).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |