X-Git-Url: https://git.distorted.org.uk/u/mdw/catacomb/blobdiff_plain/298182ad446aaced14dea7ed0e7c968946787288..7280f7f44cfae62f6d34761ac88aa19da7da5dd8:/catcrypt.1 diff --git a/catcrypt.1 b/catcrypt.1 index 61da7f9..6bace86 100644 --- a/catcrypt.1 +++ b/catcrypt.1 @@ -44,7 +44,7 @@ is one of: .RI [ item ...] .br .B encrypt -.RB [ \-aC ] +.RB [ \-apC ] .RB [ \-k .IR tag ] .RB [ \-f @@ -54,7 +54,7 @@ is one of: .RI [ file ] .br .B decrypt -.RB [ \-aqvC ] +.RB [ \-apqvC ] .RB [ \-f .IR format ] .RB [ \-o @@ -62,6 +62,7 @@ is one of: .RI [ file ] .br .B encode +.RB [ \-p ] .RB [ \-f .IR format ] .RB [ \-b @@ -71,6 +72,7 @@ is one of: .RI [ file ] .br .B decode +.RB [ \-p ] .RB [ \-f .IR format ] .RB [ \-b @@ -120,7 +122,7 @@ on the key, or its type. The .B catcrypt command deals with both signing and key-encapsulation keys. (Note that .B catcrypt -uses signing keys in the same way as +uses signing keys in the same way as .BR catsign (1).) .SS "Key-encapsulation keys" (Key encapsulation is a means of transmitting a short, known, random @@ -278,7 +280,7 @@ for a list of supported signature algorithms. .B rsapkcs1 This is almost the same as the RSASSA-PKCS1-v1_5 algorithm described in RFC3447; the difference is that the hash is left bare rather than being -wrapped in a DER-encoded +wrapped in a DER-encoded .B DigestInfo structure. This doesn't affect security since the key can only be used with the one hash function anyway, and dropping the DER wrapping permits @@ -303,7 +305,7 @@ command (see to generate the key. .TP .B dsa -This is the DSA algorithm described in FIPS180-1 and FIPS180-2. Use the +This is the DSA algorithm described in FIPS180-1 and FIPS180-2. Use the .B dsa algorithm of the .B key add @@ -380,7 +382,7 @@ the default hash function is .BR sha . .hP \*o For -.BR kcdsa +.BR kcdsa and .BR eckcdsa , the default hash function is @@ -456,7 +458,7 @@ The hash functions which can be used in a key's attribute. .TP .B enc -The encodings which can be applied to encrypted messages; see +The encodings which can be applied to encrypted messages; see .B ENCODINGS above. .SS encrypt @@ -486,6 +488,9 @@ Use the key-encapsulation key named in the current keyring; the default key is .BR ccrypt . .TP +.BI "\-p, \-\-progress" +Write a progress meter to standard error while processing large files. +.TP .BI "\-s, \-\-sign-key " tag Use the signature key named .I tag @@ -523,6 +528,9 @@ on if output is to stdout, but is always available as an option. Read input encoded according to .IR format . .TP +.BI "\-p, \-\-progress" +Write a progress meter to standard error while processing large files. +.TP .B "\-v, \-\-verbose" Produce more verbose messages. See below for the messages produced during decryption. The default verbosity level is 1. (Currently this @@ -555,7 +563,7 @@ An error prevented decryption. The program will exit nonzero. .BI "WARN " reason .B catcrypt encountered a situation which may or may not invalidate the decryption. -.TP +.TP .BI "OK " message Decryption was successful. This is only produced if main output is being sent somewhere other than standard output. @@ -577,7 +585,7 @@ All messages. .B Warning! All output written has been checked for authenticity. However, output can fail madway through for many reasons, and the resulting message may -therefore be truncated. Don't rely on the output being complete until +therefore be truncated. Don't rely on the output being complete until .B OK is printed or .B catcrypt decrypt @@ -588,11 +596,14 @@ The command encodes an input file according to one of the encodings described above in .BR ENCODINGS . -The input is read from the +The input is read from the .I file given on the command line, or from standard input if none is specified. Options provided are: .TP +.BI "\-p, \-\-progress" +Write a progress meter to standard error while processing large files. +.TP .BI "\-f, \-\-format " format Produce output in .IR format . @@ -622,7 +633,7 @@ The command decodes an input file encoded according to one of the encodings described above in .BR ENCODINGS . -The input is read from the +The input is read from the .I file given on the command line, or from standard input if none is specified. Options provided are: @@ -640,13 +651,16 @@ Set the PEM boundary string to i.e., assuming we're encoding in PEM format, start processing input between .BI "\-\-\-\-\-BEGIN " label "\-\-\-\-\-" -and +and .BI "\-\-\-\-\-END " label "\-\-\-\-\-" lines. Without this option, .B catcrypt will start reading at the first plausible boundary string, and continue processing until it reaches the matching end boundary. .TP +.BI "\-p, \-\-progress" +Write a progress meter to standard error while processing large files. +.TP .BI "\-o, \-\-output " file Write output to .I file