On Jun 22, 2017, at 6:15 PM, Frank Swarbrick <frank.swarbr...@outlook.com> wrote: > > The MD5 is used to verify that the file sent from the mainframe has the same > data when received on the interim distributed system. So creating the MD5 > after its already there does no good.
I will just add 2 points: 1. If you compute the MD5 hash while the file is still EBCDIC, you will get a completely different value than the hash of the ASCII version. Hash algorithms work on the binary representation, not the logical meaning. 2. If you’re trying to ensure the data hasn’t been intentionally modified, MD5 is nearly useless. If you need a hash for detecting malicious corruption, I’d use at least SHA2. -- Pew, Curtis G curtis....@austin.utexas.edu ITS Systems/Core/Administrative Services ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN