Current Path : /usr/src/usr.bin/enigma/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //usr/src/usr.bin/enigma/enigma.1 |
.\" .\" enigma (aka. crypt) man page written by Joerg Wunsch. .\" .\" Since enigma itself is distributed in the Public Domain, this file .\" is also. .\" .\" $FreeBSD: release/9.1.0/usr.bin/enigma/enigma.1 206622 2010-04-14 19:08:06Z uqs $ .\" " .Dd May 14, 2004 .Dt ENIGMA 1 .Os .Sh NAME .Nm enigma , .Nm crypt .Nd very simple file encryption .Sh SYNOPSIS .Nm .Op Fl s .Op Fl k .Op Ar password .Nm crypt .Op Fl s .Op Fl k .Op Ar password .Sh DESCRIPTION The .Nm utility, also known as .Nm crypt is a .Em very simple encryption program, working on a .Dq secret-key basis. It operates as a filter, i.e., it encrypts or decrypts a stream of data from standard input, and writes the result to standard output. Since its operation is fully symmetrical, feeding the encrypted data stream again through the engine (using the same secret key) will decrypt it. .Pp There are several ways to provide the secret key to the program. By default, the program prompts the user on the controlling terminal for the key, using .Xr getpass 3 . This is the only safe way of providing it. .Pp Alternatively, the key can be provided as the sole command-line argument .Ar password when starting the program. Obviously, this way the key can easily be spotted by other users running .Xr ps 1 . As yet another alternative, .Nm can be given the option .Fl k , and it will take the key from the environment variable .Ev CrYpTkEy . While this at a first glance seems to be more secure than the previous option, it actually is not since environment variables can also be examined with .Xr ps 1 . Thus this option is mainly provided for compatibility with other implementations of .Nm . .Pp When specifying the option .Fl s , .Nm modifies the encryption engine in a way that is supposed to make it a little more secure, but incompatible with other implementations. .Pp .Ss Warning The cryptographic value of .Nm is rather small. This program is only provided here for compatibility with other operating systems that also provide an implementation (usually called .Xr crypt 1 there). For real encryption, refer to .Xr bdes 1 , .Xr openssl 1 , .Xr pgp 1 Pq Pa ports/security/pgp , or .Xr gpg 1 Pq Pa ports/security/gnupg . However, restrictions for exporting, importing or using such tools might exist in some countries, so those stronger programs are not being shipped as part of the operating system by default. .Sh ENVIRONMENT .Bl -tag -offset indent -width ".Ev CrYpTkEy" .It Ev CrYpTkEy used to obtain the secret key when option .Fl k has been given .El .Sh EXAMPLES .Bd -literal -offset indent man enigma | enigma > encrypted Enter key: (XXX \(em key not echoed) .Ed .Pp This will create an encrypted form of this man page, and store it in the file .Pa encrypted . .Bd -literal -offset indent enigma XXX < encrypted .Ed .Pp This displays the previously created file on the terminal. .Sh SEE ALSO .Xr bdes 1 , .Xr gpg 1 , .Xr openssl 1 , .Xr pgp 1 , .Xr ps 1 , .Xr getpass 3 .Sh HISTORY Implementations of .Nm crypt are very common among .Ux operating systems. This implementation has been taken from the .Em Cryptbreakers Workbench which is in the public domain.