From 96effd13b5a98b3971d3c56e16e2abad16136c82 Mon Sep 17 00:00:00 2001 From: llsth Date: Mon, 9 Mar 2015 15:01:29 +0100 Subject: [PATCH] Removed deprecated sections --- README | 16 ---------------- 1 file changed, 16 deletions(-) diff --git a/README b/README index 732dc16..32c086d 100644 --- a/README +++ b/README @@ -32,24 +32,11 @@ It can use SHA-1, SHA-256, SHA-384, or SHA-512, which generate respectively, hashes of 160, 256, 384, or 512 bits. sha can be used in scripts to do, for example, file integrity checking. -For more information on SHA (the algorithms), visit: -http://csrc.nist.gov/encryption/tkhash.html - -To build sha, see INSTALL. - Using sha is simple. Just pass the names of one or more files on the command line. By default, sha will use SHA-1 unless passed one of the following flags: -2 for SHA-256, -3 for SHA-384 or -5 for SHA-512. Type "sha -h" for help. -If no filenames are given, sha will hash stdin. - -If the environment variable SHA_DEFAULT is set, the default hashing -algorithm can be changed. Only the first character of the value of -SHA_DEFAULT is significant. It can be '1' for SHA-1, '2' for SHA-256, -'3' for SHA-384, or '5' for SHA-512. With any other value, sha will -use SHA-1 by default. Again, "sha -h" will display the default. - You may want to perform a sanity check on sha before relying on it. A program called "shatest" is built along with sha (but not installed). If you run shatest, it will display the results of running the various @@ -62,7 +49,4 @@ They are fast and relatively portable. Please see the top of each source file for copyright and warranty information. See README.SHA for technical notes. -The latest version of sha can always be found at: -http://philosophysw.com/ - - Allan Saddi