enigma.1 (7ed109451289a4cac488e2181f38b86bc3680d6c) enigma.1 (f7473c7e7768cfd6337bfb3b58d703289ea071d0)
1.\"
2.\" enigma (aka. crypt) man page written by Joerg Wunsch.
3.\"
4.\" Since enigma itself is distributed in the Public Domain, this file
5.\" is also.
6.\"
7.\" $FreeBSD$
8.\" "

--- 72 unchanged lines hidden (view full) ---

81This program is only provided here for compatibility
82with other operating systems that also provide an implementation
83(usually called
84.Xr crypt 1
85there).
86For real encryption, refer to
87.Xr openssl 1 ,
88or
1.\"
2.\" enigma (aka. crypt) man page written by Joerg Wunsch.
3.\"
4.\" Since enigma itself is distributed in the Public Domain, this file
5.\" is also.
6.\"
7.\" $FreeBSD$
8.\" "

--- 72 unchanged lines hidden (view full) ---

81This program is only provided here for compatibility
82with other operating systems that also provide an implementation
83(usually called
84.Xr crypt 1
85there).
86For real encryption, refer to
87.Xr openssl 1 ,
88or
89.Xr gpg 1 Pq Pa security/gnupg1 .
89.Xr gpg 1 Pq Pa ports/security/gnupg1 .
90.Sh ENVIRONMENT
91.Bl -tag -offset indent -width ".Ev CrYpTkEy"
92.It Ev CrYpTkEy
93used to obtain the secret key when option
94.Fl k
95has been given
96.El
97.Sh EXAMPLES

--- 6 unchanged lines hidden (view full) ---

104the file
105.Pa encrypted .
106.Bd -literal -offset indent
107enigma XXX < encrypted
108.Ed
109.Pp
110This displays the previously created file on the terminal.
111.Sh SEE ALSO
90.Sh ENVIRONMENT
91.Bl -tag -offset indent -width ".Ev CrYpTkEy"
92.It Ev CrYpTkEy
93used to obtain the secret key when option
94.Fl k
95has been given
96.El
97.Sh EXAMPLES

--- 6 unchanged lines hidden (view full) ---

104the file
105.Pa encrypted .
106.Bd -literal -offset indent
107enigma XXX < encrypted
108.Ed
109.Pp
110This displays the previously created file on the terminal.
111.Sh SEE ALSO
112.Xr gpg 1 ,
112.Xr gpg 1 Pq Pa ports/security/gnupg1 ,
113.Xr openssl 1 ,
114.Xr ps 1 ,
115.Xr getpass 3
116.Sh HISTORY
117Implementations of
118.Nm crypt
119are very common among
120.Ux
121operating systems.
122This implementation has been taken from the
123.Em Cryptbreakers Workbench
124which is in the public domain.
113.Xr openssl 1 ,
114.Xr ps 1 ,
115.Xr getpass 3
116.Sh HISTORY
117Implementations of
118.Nm crypt
119are very common among
120.Ux
121operating systems.
122This implementation has been taken from the
123.Em Cryptbreakers Workbench
124which is in the public domain.