pencrypt.1 3.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. .TH PENCRYPT 1 "27 December 2014" "" Panda3D
  2. .SH NAME
  3. pencrypt, pdecrypt \- encrypt or decrypt a file
  4. .SH SYNOPSIS
  5. .B pencrypt
  6. [
  7. .I opts
  8. ]
  9. .I file
  10. [
  11. .I file2 file3 ...
  12. ]
  13. .br
  14. .B pencrypt -o
  15. .I dest_file file
  16. .PP
  17. .B pdecrypt
  18. [
  19. .B -p
  20. .I password
  21. ]
  22. .I file.pe
  23. [
  24. .I file2.pe file3.pe ...
  25. ]
  26. .br
  27. .B pdecrypt
  28. [
  29. .B -p
  30. .I password
  31. ]
  32. .B -o
  33. .I dest_file file.pe
  34. .SH DESCRIPTION
  35. \fBpencrypt\fP will apply an encryption algorithm to a file (or multiple files),
  36. creating an encrypted version of each file which can only be recovered using
  37. pdecrypt and the same password that was supplied to \fBpencrypt\fP. The
  38. compressed versions are written to a file with the same name as the original,
  39. but the extension .pe added to the filename, and the original file is removed
  40. (unless the version with \fB\-o\fP is used, in which case you can encrypt only
  41. one file, you specify the destination file name, and the original file is not
  42. removed).
  43. .PP
  44. Note that if you are adding files to a Panda multifile (.mf file) with the
  45. .BR multify (1)
  46. command, it is not necessary to encrypt them separately; \fBmultify\fP has an
  47. inline encryption option.
  48. .PP
  49. \fBpdecrypt\fP reverses the operation of a previous \fBpdecrypt\fP command.
  50. It decrypts the contents of the named source file(s) and removes the .pe
  51. extension. The encryption algorithm need not be specified; it can be
  52. determined by examining the header of each encrypted file. The password
  53. must match the encryption password exactly. If it does not, an error may
  54. or may not be reported; but the file will not be decrypted correctly even
  55. if no error is reported.
  56. .SH OPTIONS
  57. .TP
  58. .BI "\-p " \"password\"
  59. Specifies the password to use for encryption. There are no
  60. restrictions on the password length or contents, but longer passwords
  61. are more secure. If this is not specified, the user is prompted from
  62. standard input.
  63. .PP
  64. The following options are only available to \fBpencrypt\fP. These settings
  65. are automatically read from the header of the encrypted file by \fBpdecrypt\fP.
  66. .TP
  67. .B \-t
  68. Read the file as a text file. This will automatically convert universal
  69. end-of-line characters into a newline character, ascii 10.
  70. .TP
  71. .BI "\-a " \"algorithm\"
  72. Specifies the particular encryption algorithm to use. The complete
  73. set of available algorithms is defined by the current version of
  74. OpenSSL. The default algorithm is taken from the encryption-
  75. algorithm config variable.
  76. .TP
  77. .BI "\-k " key_length
  78. Specifies the key length, in bits, for the selected encryption
  79. algorithm. This only makes sense for those algorithms that support
  80. a variable key length. The default value is taken from the
  81. \fBencryption\-key\-length\fP config variable.
  82. .TP
  83. .BI "\-i " iteration_count
  84. Specifies the number of times the password is hashed to generate
  85. a key. The only purpose of this is to make it computationally
  86. more expensive for an attacker to search the key space exhaustively.
  87. This should be a multiple of 1,000 and should not exceed about 65
  88. million; the value 0 indicates just one application of the hashing
  89. algorithm. The default value is taken from the
  90. \fBencryption\-iteration\-count\fP config variable.
  91. .SH "SEE ALSO"
  92. .BR multify (1)