0

Make use of existing hash files (example: filename.sha1) when verifying copy integrity.

Nonsanity 3 months ago • updated by Peteris 2 months ago 1

If a source file has a similarly-named companion file with a hash type extension added ("filename.ext" and "filename.ext.sha1" for example), use that hash file to verify the destination copy instead (or possibly in addition to) generating a new hash by reading the source. This allows detection of damage to the source medium to be detected, as well as malfunctioning read hardware and any intermediate damage done to the source in the past.

Would be perfect if it could extract multiple checksum formats:
1. single file / same name, different extension - like: md5, sha1, hash

2. search for per-folder checksum / same name as folder and is inside of the folder, different extension - like: md5, sha1, hash

3. search for root-level checkum file and extract checksums from them  / located on the upper levels of folders

4. Mix all these options to extract as much checksums for verification.

5. Select what format to search for and use exclusively - md5/sha1/xxHash64/??? if not found then generate new in this format and use it for verification.

Would be super cool if logging where to be added to indicate what options where selected and write the checksum data in the report indicating if it was extracted from existing or generated. This would then make it more competitive with shotputpro, keka and some other tools that the film people use...