/[gentoo]/xml/htdocs/doc/en/handbook/hb-install-alpha-medium.xml
Gentoo

Diff of /xml/htdocs/doc/en/handbook/hb-install-alpha-medium.xml

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.59 Revision 1.60
2<!DOCTYPE sections SYSTEM "/dtd/book.dtd"> 2<!DOCTYPE sections SYSTEM "/dtd/book.dtd">
3 3
4<!-- The content of this document is licensed under the CC-BY-SA license --> 4<!-- The content of this document is licensed under the CC-BY-SA license -->
5<!-- See http://creativecommons.org/licenses/by-sa/2.5 --> 5<!-- See http://creativecommons.org/licenses/by-sa/2.5 -->
6 6
7<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/handbook/hb-install-alpha-medium.xml,v 1.59 2012/11/12 21:04:16 swift Exp $ --> 7<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/handbook/hb-install-alpha-medium.xml,v 1.60 2013/08/01 19:02:27 swift Exp $ -->
8 8
9<sections> 9<sections>
10 10
11<version>17</version> 11<version>18</version>
12<date>2012-11-12</date> 12<date>2013-08-01</date>
13 13
14<section> 14<section>
15<title>Hardware Requirements</title> 15<title>Hardware Requirements</title>
16<subsection> 16<subsection>
17<title>Introduction</title> 17<title>Introduction</title>
244<path><keyval id="min-cd-name"/>.DIGESTS</path>). You can check the SHA-2 checksum 244<path><keyval id="min-cd-name"/>.DIGESTS</path>). You can check the SHA-2 checksum
245with the <c>sha512sum</c> tool under Linux/Unix or <uri 245with the <c>sha512sum</c> tool under Linux/Unix or <uri
246link="http://www.krylack.com/file-checksum-tool/">File Checksum Tool</uri> for Windows. 246link="http://www.krylack.com/file-checksum-tool/">File Checksum Tool</uri> for Windows.
247</p> 247</p>
248 248
249<pre caption="Verifying the SHA-2 checksum">
250$ <i>sha512sum -c &lt;downloaded iso.DIGESTS&gt;</i>
251</pre>
252
253<note>
254If you get the message that no properly formatted SHA checksum was found, take a
255look at the DIGESTS file yourself to see what the supported checksums are.
256</note>
257
249<p> 258<p>
250Another way to check the validity of the downloaded file is to use GnuPG to 259Another way to check the validity of the downloaded file is to use GnuPG to
251verify the cryptographic signature that we provide (the file ending with 260verify the cryptographic signature that we provide (the file ending with
252<path>.asc</path>). Download the signature file and obtain the public keys whose 261<path>.asc</path>). Download the signature file and obtain the public keys whose
253key ids can be found on the <uri link="/proj/en/releng/index.xml">release 262key ids can be found on the <uri link="/proj/en/releng/index.xml">release
262<p> 271<p>
263Now verify the signature: 272Now verify the signature:
264</p> 273</p>
265 274
266<pre caption="Verify the files"> 275<pre caption="Verify the files">
267<comment>(Verify the cryptographic signature)</comment>
268$ <i>gpg --verify &lt;downloaded iso.DIGESTS.asc&gt;</i> 276$ <i>gpg --verify &lt;downloaded iso.DIGESTS.asc&gt;</i>
269<comment>(Verify the checksum)</comment>
270$ <i>sha1sum -c &lt;downloaded iso.DIGESTS.asc&gt;</i> 277$ <i>sha512sum -c &lt;downloaded iso.DIGESTS.asc&gt;</i>
271</pre> 278</pre>
272 279
273<p> 280<p>
274To burn the downloaded ISO(s), you have to select raw-burning. How you 281To burn the downloaded ISO(s), you have to select raw-burning. How you
275do this is highly program-dependent. We will discuss <c>cdrecord</c> and 282do this is highly program-dependent. We will discuss <c>cdrecord</c> and

Legend:
Removed from v.1.59  
changed lines
  Added in v.1.60

  ViewVC Help
Powered by ViewVC 1.1.20