User manual
Software Authentication Manager Commands on Cisco IOS XR Software
sam verify
SR-214
Cisco IOS XR System Security Command Reference
sam verify
To use the Message Digest 5 (MD5) hash algorithm to verify the integrity of the software component on
a flash memory card and ensure that it has not been tampered with during transit, use the sam verify
command in EXEC mode.
sam verify {location | file-system} {MD5 | SHA [digest]}
Syntax Description
Defaults No default behavior or values
Command Modes EXEC
Command History
Usage Guidelines To use this command, you must be in a user group associated with a task group that includes the proper
task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on
Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the sam verify command to generate a message digest for a given device. The message digest is
useful for determining whether software on a flash memory card has been tampered with during transit.
The command generates a hash code that can be used to compare the integrity of the software between
the time it was shipped and the time you received it.
For example, if you are given a flash memory card with preinstalled software and a previously generated
MD5 message digest, you can verify the integrity of the software using this command:
sam verify device MD5 digest
where device is the flash device and digest is the message digest supplied by the originator of the
software.
location Name of the flash memory card slot, either disk0 or disk1.
file-system Absolute path to the file to be verified.
MD5 Specifies a one-way hashing algorithm to generate a 128-bit hash (or message
digest) of the specified software component.
SHA Specifies the Secure Hash Algorithm, a hashing algorithm that takes a message of
less than 264 bits in length and produces a 160-bit message digest. The large
message digest provides security against brute-force collision and inversion
attacks.
digest (Optional) Message digest generated by the hashing algorithm, to be compared in
determining the integrity of the software component.
Release Modification
Release 2.0 This command was introduced on the Cisco CRS-1.
Release 3.0 No modification.
Release 3.2 This command was supported on the Cisco XR 12000 Series Router.