Weisse Spuren
Warum nicht jetzt schon die Tools von morgen nutzen. ./design2013/header-frau-3-schatten_web.png
File Hashes

On this page you get a short description, how you can get the signature hashes of our installers and other .exe files and check them if they are correct. So you can determine if a file was downloaded completely or if there were errors during the download even if the file looks intact but does not work.

file properties screenshot First of all check if the file size of the file matches the file size given in the download area.

Go to the folder where the downloaded file is and open the file properties by a right click on that file.

Here you see the value with the label "Size"; In the example on the left it is 20.834.936 Bytes.

If the sizes differ, the file was not downloaded correctly. Try again to download the file.
hash screenshot 1 Change to the tab "Digital Signatures".
Here you will find an entry with sha1 and/or sha256.
Select an entry and open the details.

If the tab "Digital Signatures" is missing, then no valid digital signature could be found in the file. Either because the file is not signed yet or because the signature is damaged or invalid (This is also possible for matching file sizes. In this case try again to download the file).
If a file is signed can be seen in the download area.
hash screenshot 2 Here you see if the selected certificate is valid. The name should be
"GLIWA GmbH embedded systems".

Now change to the tab "Advanced".
hash screenshot 3 Here you can see the hash value of the digital signature in a readable form.

For that select the field "Message Digest" in the area "Authenticated attributes". In the field below the hash is displayed (in the example left: "04 20 ... 03 06".

In the download area there are text files (pattern: ".sha***.txt") containing the correct hashes for the selected algorithm (if the download is signed).

If the hashes are identical, you can assume that the file is valid and that it is in the exact same state we released it.

If the hashes differ, the file is damaged. In this case try the download again.

Newsbox Oben
GLIWA goes YouTube
Our brand new videos provide concrete and entertaining insights into the functions and advantages of the various components of the T1 Analysis Suite.

GLIWA providing fundamental
knowledge besides outstanding

The practice-oriented, book on methodology and analysis of embedded software timing. Numerous case studies help to avoid tricky problems, facilitate optimal use of processor resources and give many hints to secure correct runtime behavior.

Edited by Springer. Available as printed edition and eBook. Take a closer look here.
Now also available in Korea and China!
Peter Gliwa's coveted book was recently published in Korea and – in cooperation with the highly recognized Tsinghua University of Beijing – will also be available on the Chinese book market.

To find out more about T1 or to arrange a free presentation, just call:
+49 881 138522-70

T1 supports TC39x
Synchronized traces from 6 cores!
T1 makes it happen. Click here, to view a screenshot of T1 with 6 synchronized traces and some cross-core communications.


More details on the AURIX 2G can be found in Infineon's official press-release.
Newsbox Unten