3.3. Verify the Downloaded Files


Each downloaded file needs to be checked to verify that it is for the certified version of JBoss EAP 6.2.2. The Red Hat Customer Portal lists the SHA-256 hash sum for each file. If the SHA-256 hash sum of a downloaded file matches that quoted on the Red Hat Customer Portal, you can assume it is verified.
For JBoss downloads, you can view the SHA-256 hash sum on the Software Details page for each file on the by clicking on the file name in the Download File list. For Red Hat Enterprise Linux downloads, the SHA-256 has sum is listed next to the ISO download link.
On Apple OSX, the sha256 command must be replaced with shasum -a 256. On Microsoft Windows, a third-party SHA256 hash sum utility is required as there is no native utility.

Procedure 3.2. Using the sha256sum tool on Linux or Unix

  1. Open a terminal, and navigate to the directory where the file was downloaded.
  2. Execute the sha256sum command (or equivalent) on the file. For example:
    $ sha256sum jboss-eap-6.2.2.zip
    9414619e186708b34381ddbef1901a51335b5b45464838effb153b610b27918f jboss-eap-6.2.2.zip
Result

The value generated by the sha256sum utility must match the value displayed on the Red Hat Customer Portal for the file. If they are not the same, your download is either incomplete or corrupt, and you will need to download the file again. If the checksum will still not successfully validate after several attempted downloads, contact Red Hat Support for assistance.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top