enigma.1 (3898680cf705cef4e1cc606b44cd91fc4252bcd5) enigma.1 (be06d37c189080b5998f070f5de8317bceaf3086)
1.\"
2.\" enigma (aka. crypt) man page written by Joerg Wunsch.
3.\"
4.\" Since enigma itself is distributed in the Public Domain, this file
5.\" is also.
6.\"
7.\" $FreeBSD$
8.\" "

--- 19 unchanged lines hidden (view full) ---

28utility, also known as
29.Nm crypt
30is a
31.Em very
32simple encryption program, working on a
33.Dq secret-key
34basis. It operates as a filter, i. e. it encrypts or decrypts a
35stream of data from standard input, and writes the result to standard
1.\"
2.\" enigma (aka. crypt) man page written by Joerg Wunsch.
3.\"
4.\" Since enigma itself is distributed in the Public Domain, this file
5.\" is also.
6.\"
7.\" $FreeBSD$
8.\" "

--- 19 unchanged lines hidden (view full) ---

28utility, also known as
29.Nm crypt
30is a
31.Em very
32simple encryption program, working on a
33.Dq secret-key
34basis. It operates as a filter, i. e. it encrypts or decrypts a
35stream of data from standard input, and writes the result to standard
36output. It automatically detects whether the input data stream is
37already encrypted, and switches into decryption mode in this case.
36output.
37Since its operation is fully symmetrical, feeding the encrypted data
38stream again through the engine (using the same secret key) will
39decrypt it.
38.Pp
39There are several ways to provide the secret key to the program. By
40default, the program prompts the user on the controlling terminal for
41the key, using
42.Xr getpass 3 .
43This is the only safe way of providing it.
44.Pp
45Alternatively, the key can be provided as the sole command-line

--- 72 unchanged lines hidden ---
40.Pp
41There are several ways to provide the secret key to the program. By
42default, the program prompts the user on the controlling terminal for
43the key, using
44.Xr getpass 3 .
45This is the only safe way of providing it.
46.Pp
47Alternatively, the key can be provided as the sole command-line

--- 72 unchanged lines hidden ---