.RI [ item ...]
.br
.B encrypt
-.RB [ \-aC ]
+.RB [ \-apC ]
.RB [ \-k
.IR tag ]
.RB [ \-f
.RI [ file ]
.br
.B decrypt
-.RB [ \-aqvC ]
+.RB [ \-apqvC ]
.RB [ \-f
.IR format ]
.RB [ \-o
.RI [ file ]
.br
.B encode
+.RB [ \-p ]
.RB [ \-f
.IR format ]
.RB [ \-b
.RI [ file ]
.br
.B decode
+.RB [ \-p ]
.RB [ \-f
.IR format ]
.RB [ \-b
.B catcrypt
command deals with both signing and key-encapsulation keys. (Note that
.B catcrypt
-uses signing keys in the same way as
+uses signing keys in the same way as
.BR catsign (1).)
.SS "Key-encapsulation keys"
(Key encapsulation is a means of transmitting a short, known, random
.B rsapkcs1
This is almost the same as the RSASSA-PKCS1-v1_5 algorithm described in
RFC3447; the difference is that the hash is left bare rather than being
-wrapped in a DER-encoded
+wrapped in a DER-encoded
.B DigestInfo
structure. This doesn't affect security since the key can only be used
with the one hash function anyway, and dropping the DER wrapping permits
to generate the key.
.TP
.B dsa
-This is the DSA algorithm described in FIPS180-1 and FIPS180-2. Use the
+This is the DSA algorithm described in FIPS180-1 and FIPS180-2. Use the
.B dsa
algorithm of the
.B key add
.BR sha .
.hP \*o
For
-.BR kcdsa
+.BR kcdsa
and
.BR eckcdsa ,
the default hash function is
attribute.
.TP
.B enc
-The encodings which can be applied to encrypted messages; see
+The encodings which can be applied to encrypted messages; see
.B ENCODINGS
above.
.SS encrypt
in the current keyring; the default key is
.BR ccrypt .
.TP
+.BI "\-p, \-\-progress"
+Write a progress meter to standard error while processing large files.
+.TP
.BI "\-s, \-\-sign-key " tag
Use the signature key named
.I tag
Read input encoded according to
.IR format .
.TP
+.BI "\-p, \-\-progress"
+Write a progress meter to standard error while processing large files.
+.TP
.B "\-v, \-\-verbose"
Produce more verbose messages. See below for the messages produced
during decryption. The default verbosity level is 1. (Currently this
.BI "WARN " reason
.B catcrypt
encountered a situation which may or may not invalidate the decryption.
-.TP
+.TP
.BI "OK " message
Decryption was successful. This is only produced if main output is
being sent somewhere other than standard output.
.B Warning!
All output written has been checked for authenticity. However, output
can fail madway through for many reasons, and the resulting message may
-therefore be truncated. Don't rely on the output being complete until
+therefore be truncated. Don't rely on the output being complete until
.B OK
is printed or
.B catcrypt decrypt
command encodes an input file according to one of the encodings
described above in
.BR ENCODINGS .
-The input is read from the
+The input is read from the
.I file
given on the command line, or from standard input if none is specified.
Options provided are:
.TP
+.BI "\-p, \-\-progress"
+Write a progress meter to standard error while processing large files.
+.TP
.BI "\-f, \-\-format " format
Produce output in
.IR format .
command decodes an input file encoded according to one of the encodings
described above in
.BR ENCODINGS .
-The input is read from the
+The input is read from the
.I file
given on the command line, or from standard input if none is specified.
Options provided are:
i.e., assuming we're encoding in PEM format, start processing input
between
.BI "\-\-\-\-\-BEGIN " label "\-\-\-\-\-"
-and
+and
.BI "\-\-\-\-\-END " label "\-\-\-\-\-"
lines. Without this option,
.B catcrypt
will start reading at the first plausible boundary string, and continue
processing until it reaches the matching end boundary.
.TP
+.BI "\-p, \-\-progress"
+Write a progress meter to standard error while processing large files.
+.TP
.BI "\-o, \-\-output " file
Write output to
.I file