DirHash.exe -benchmark [HashAlgo | All] [-t ResultFileName] [-clip] [-overwrite] [-quiet] [-nologo] [-nowait]
Possible values for HashAlgo (not case sensitive):
- MD5
- SHA1
- SHA256
- SHA384
- SHA512
- Streebog
- Blake2s
- Blake2b
- Blake3
If HashAlgo is not specified, Blake3 is used by default.
ResultFileName specifies an optional text file where the result will be appended.
if -benchmark is specified, program will perform speed benchmark of the selected hash algorithm
if -mscrypto specified, program will use Windows native implementation of hash algorithms (This is always enabled on Windows ARM platforms since OpenSSL is too slow on them).
if -sum is specified, program will output the hash of every file processed in a format similar to shasum.
if -verify is specified, program will verify the hash of every file processed against its hash value present in the given checksum file.
if -threads is specified (only when -sum or -verify specified), multithreading will be used to accelerate hashing of files.
if -clip is specified, the hash result is copied to Windows clipboard. This switch is ignored when -sum is specified.
if -lowercase is specified, program outputs hash value(s) in lower case instead of upper case.
if -progress is specified, information about the progress of file hash operation is displayed.
if -overwrite is specified (only when -t is present), the output text file will be overwritten instead of having hash result appended to it.
if -quiet is specified, no text is displayed or written to the output file except the hash value.
if -nowait is specified, program will exit immediately after displaying the hash result. Otherwise, it prompts user to hit a key before it exits.
if -hashnames is specified, the case sensitive path of the files and directories will be included in the hash computation. Otherwise, only files content is used.
if -stripnames is specified (only when -hashnames also specified), only the the last path portion of files and directoroes is used for hash computation.
if -exclude is specified, it must be followed by a string indicating the file type that must be excluded from the hash computation. For example, to exclude .log files, you specify "-exclude *.log". This switch can be repeated many times in the command line to specify different file types to exclude.