enigma.1 (1a36faad54665288ed4eb839d2a4699ae2ead45e) enigma.1 (7ed109451289a4cac488e2181f38b86bc3680d6c)
1.\"
2.\" enigma (aka. crypt) man page written by Joerg Wunsch.
3.\"
4.\" Since enigma itself is distributed in the Public Domain, this file
5.\" is also.
6.\"
7.\" $FreeBSD$
8.\" "
1.\"
2.\" enigma (aka. crypt) man page written by Joerg Wunsch.
3.\"
4.\" Since enigma itself is distributed in the Public Domain, this file
5.\" is also.
6.\"
7.\" $FreeBSD$
8.\" "
9.Dd February 5, 2017
9.Dd May 8, 2018
10.Dt ENIGMA 1
11.Os
12.Sh NAME
13.Nm enigma ,
14.Nm crypt
15.Nd very simple file encryption
16.Sh SYNOPSIS
17.Nm

--- 62 unchanged lines hidden (view full) ---

80is rather small.
81This program is only provided here for compatibility
82with other operating systems that also provide an implementation
83(usually called
84.Xr crypt 1
85there).
86For real encryption, refer to
87.Xr openssl 1 ,
10.Dt ENIGMA 1
11.Os
12.Sh NAME
13.Nm enigma ,
14.Nm crypt
15.Nd very simple file encryption
16.Sh SYNOPSIS
17.Nm

--- 62 unchanged lines hidden (view full) ---

80is rather small.
81This program is only provided here for compatibility
82with other operating systems that also provide an implementation
83(usually called
84.Xr crypt 1
85there).
86For real encryption, refer to
87.Xr openssl 1 ,
88.Xr pgp 1 Pq Pa ports/security/pgp ,
89or
88or
90.Xr gpg 1 Pq Pa ports/security/gnupg .
91However, restrictions for exporting,
92importing or using such tools might exist in some countries, so those
93stronger programs are not being shipped as part of the operating
94system by default.
89.Xr gpg 1 Pq Pa security/gnupg1 .
95.Sh ENVIRONMENT
96.Bl -tag -offset indent -width ".Ev CrYpTkEy"
97.It Ev CrYpTkEy
98used to obtain the secret key when option
99.Fl k
100has been given
101.El
102.Sh EXAMPLES

--- 8 unchanged lines hidden (view full) ---

111.Bd -literal -offset indent
112enigma XXX < encrypted
113.Ed
114.Pp
115This displays the previously created file on the terminal.
116.Sh SEE ALSO
117.Xr gpg 1 ,
118.Xr openssl 1 ,
90.Sh ENVIRONMENT
91.Bl -tag -offset indent -width ".Ev CrYpTkEy"
92.It Ev CrYpTkEy
93used to obtain the secret key when option
94.Fl k
95has been given
96.El
97.Sh EXAMPLES

--- 8 unchanged lines hidden (view full) ---

106.Bd -literal -offset indent
107enigma XXX < encrypted
108.Ed
109.Pp
110This displays the previously created file on the terminal.
111.Sh SEE ALSO
112.Xr gpg 1 ,
113.Xr openssl 1 ,
119.Xr pgp 1 ,
120.Xr ps 1 ,
121.Xr getpass 3
122.Sh HISTORY
123Implementations of
124.Nm crypt
125are very common among
126.Ux
127operating systems.
128This implementation has been taken from the
129.Em Cryptbreakers Workbench
130which is in the public domain.
114.Xr ps 1 ,
115.Xr getpass 3
116.Sh HISTORY
117Implementations of
118.Nm crypt
119are very common among
120.Ux
121operating systems.
122This implementation has been taken from the
123.Em Cryptbreakers Workbench
124which is in the public domain.