First, thanks for reporting.
This issue is fixed in Git and the fix will come with v1.2.7 release.

Being a bug from user's point of view, actually this issue is due to
half-implemented sha256/sha512 support - without hash verification.
So up to this point the issue concerns all previous RHash version.

In more details.  RHash up to v1.2.6 can't uniquely identify a hash
function by hash length, so it supposed that
all 128-bit hashes are MD5 or ED2K
all 256-bit hashes are GOST R 34.11-94 hash
all 512-bit hashes are Whirlpool

Now the parsing of hash files and verification code was rewritten.
If the program can't detect the precise hash function for say a 256-bit
hash,
then the program will calculate all supported 256-bit hashes and verify
the hash value against all of them.
To speed up verification, user can now specify exact hash function at
command line.

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to