enigma.1 (7ed109451289a4cac488e2181f38b86bc3680d6c) | enigma.1 (f7473c7e7768cfd6337bfb3b58d703289ea071d0) |
---|---|
1.\" 2.\" enigma (aka. crypt) man page written by Joerg Wunsch. 3.\" 4.\" Since enigma itself is distributed in the Public Domain, this file 5.\" is also. 6.\" 7.\" $FreeBSD$ 8.\" " --- 72 unchanged lines hidden (view full) --- 81This program is only provided here for compatibility 82with other operating systems that also provide an implementation 83(usually called 84.Xr crypt 1 85there). 86For real encryption, refer to 87.Xr openssl 1 , 88or | 1.\" 2.\" enigma (aka. crypt) man page written by Joerg Wunsch. 3.\" 4.\" Since enigma itself is distributed in the Public Domain, this file 5.\" is also. 6.\" 7.\" $FreeBSD$ 8.\" " --- 72 unchanged lines hidden (view full) --- 81This program is only provided here for compatibility 82with other operating systems that also provide an implementation 83(usually called 84.Xr crypt 1 85there). 86For real encryption, refer to 87.Xr openssl 1 , 88or |
89.Xr gpg 1 Pq Pa security/gnupg1 . | 89.Xr gpg 1 Pq Pa ports/security/gnupg1 . |
90.Sh ENVIRONMENT 91.Bl -tag -offset indent -width ".Ev CrYpTkEy" 92.It Ev CrYpTkEy 93used to obtain the secret key when option 94.Fl k 95has been given 96.El 97.Sh EXAMPLES --- 6 unchanged lines hidden (view full) --- 104the file 105.Pa encrypted . 106.Bd -literal -offset indent 107enigma XXX < encrypted 108.Ed 109.Pp 110This displays the previously created file on the terminal. 111.Sh SEE ALSO | 90.Sh ENVIRONMENT 91.Bl -tag -offset indent -width ".Ev CrYpTkEy" 92.It Ev CrYpTkEy 93used to obtain the secret key when option 94.Fl k 95has been given 96.El 97.Sh EXAMPLES --- 6 unchanged lines hidden (view full) --- 104the file 105.Pa encrypted . 106.Bd -literal -offset indent 107enigma XXX < encrypted 108.Ed 109.Pp 110This displays the previously created file on the terminal. 111.Sh SEE ALSO |
112.Xr gpg 1 , | 112.Xr gpg 1 Pq Pa ports/security/gnupg1 , |
113.Xr openssl 1 , 114.Xr ps 1 , 115.Xr getpass 3 116.Sh HISTORY 117Implementations of 118.Nm crypt 119are very common among 120.Ux 121operating systems. 122This implementation has been taken from the 123.Em Cryptbreakers Workbench 124which is in the public domain. | 113.Xr openssl 1 , 114.Xr ps 1 , 115.Xr getpass 3 116.Sh HISTORY 117Implementations of 118.Nm crypt 119are very common among 120.Ux 121operating systems. 122This implementation has been taken from the 123.Em Cryptbreakers Workbench 124which is in the public domain. |