You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
\fBclaes\fR\- conventional encryption tool interoperating with gpg and openssl
4
4
.SH SYNOPSIS
@@ -7,10 +7,10 @@
7
7
.SH DESCRIPTION
8
8
\fBclaes\fR encrypts or decrypts data in OpenPGP format, CMS format and OPENSSL format using files or standard input with a passphrase-based AES cipher.
9
9
If no FILE or "-" is given, data is read from standard input.
10
-
The size of any input data is limited to 150 MByte. The default mode of operation is \fBencryption\fR with the ciphertext stored base64-encoded in the OpenPGP format. To decrypt base64-encoded or binary input data the option "-decrypt" must be used.
10
+
The size of any internal input data is limited to 256 MByte. The default mode of operation is \fBencryption\fR with the ciphertext stored base64-encoded in the OpenPGP format. To decrypt base64-encoded or binary input data the option \fB-decrypt\fR must be used.
11
11
12
-
All input data is processed AS IS and is treated internally as binary data with no changes. For every encryption or decryption a user-provided passphrase is read from the terminal in which claes is run. So claes always works interactively.
13
-
There is deliberately no public-key-cryptography build into claes. If you need those, please use clsmime and clkeys.
12
+
All input data is processed AS IS and is treated internally as binary data with no changes. For every encryption or decryption a user-provided passphrase is read from the terminal in which claes is run. So \fBclaes\fR always works interactively.
13
+
There is deliberately no public-key-cryptography build into claes. If you need those, please use \fBclsmime\fR and \fBclkeys\fR.
14
14
15
15
.SH OPTIONS
16
16
.PP
@@ -28,14 +28,23 @@ print debugging information to stderr
28
28
produce CMS enveloped and encrypted data instead of OpenPGP (default)
29
29
.TP
30
30
\fB\-openssl\fR
31
-
produce encrypted data using pbkdf2 in openssl format
31
+
produce encrypted data in openssl format using pbkdf2 for passphrase mangling
32
32
.TP
33
33
\fB\-128\fR
34
-
forces the use of 128 bit AES keys in conjunction with -openssl\br
35
-
(256 bits is the default)
34
+
forces the use of 128 bit AES keys in conjunction with -openssl
35
+
.br
36
+
(AES 256 bits is the default)
36
37
.TP
37
38
\fB\-decrypt\fR
38
39
decrypts an encrypted message (default is encrypt)
40
+
.br
41
+
If data is compressed it will be de-compressed automatically
42
+
.TP
43
+
\fB\-binary\fR
44
+
uses binary data both for input and output
45
+
.TP
46
+
\fB\-compress\fR
47
+
forces compression before data is encrypted
39
48
.PP
40
49
41
50
.SH NOTES
@@ -62,20 +71,25 @@ data from stdin. This program is part of the systemd package.
62
71
63
72
Without any options claes produces OpenPGP (base64-encoded) encrypted messages using AES-128.
64
73
It can decrypt any messages (ascii or binary) produced by GnuPG with the following ciphers:
65
-
AES, AES192, AES256, 3DES and CAST-128.
74
+
AES, AES192, AES256, 3DES and CAST-128. The option "-binary" causes the output written to a
75
+
file with the .gpg extension. As binary output does not compute the CRC24 checksum, it is much
76
+
faster than the default mode and is recommended for the encryption of larger files.
66
77
67
-
To mangle the password correctly the option --s2k-digest-algo SHA256 must be used with gpg.
78
+
To mangle the password correctly the option \fB--s2k-digest-algoSHA256\fR must be used with gpg.
68
79
80
+
From version 1.1 an MDC packet is added to every encryption in OpenPGP mode. Integrity protection
81
+
is also used with the CMS format.
69
82
.TP
70
83
\fBopenssl\fR
71
84
72
-
In OpenSSL mode claes writes (base64-encoded) encrypted messages in the proprietary OpenSSL format using AES256 as the default.
85
+
In OpenSSL mode claes writes encrypted messages in the proprietary OpenSSL format using AES256 as the default.
73
86
74
87
These messages can be decrypted with openssl :\br
75
88
\fBopensslaes-256-cbc-pbkdf2-d-a-inFILE.asc\fR
76
89
77
90
The use of AES-128 can be forced by the additional option -128 both for encryption or decryption of OpenSSL messages.
78
91
92
+
There is no compression available in OpenSSL mode.
0 commit comments