Sha256: 124298d7e7cb28e31546ec9b27f3b5e5994a23f67ec43c178871634f25f1c9b6
Contents?: true
Size: 1.67 KB
Versions: 4
Compression:
Stored size: 1.67 KB
Contents
# ronin-decrypt 1 "2023-02-01" Ronin "User Manuals" ## SYNOPSIS `ronin decrypt` [*options*] [*FILE* ...] ## DESCRIPTION Encrypts data. ## ARGUMENTS *FILE* The optional file to read and decrypt. If no *FILE* arguments are given, input will be read from `stdin`. ## OPTIONS `-k`, `--key` *STRING* The raw key string for the cipher. `-K`, `--key-file` *FILE* Reads the key string from the file. `-c`, `--cipher` *NAME* The cipher to decrypt with. See `--list-ciphers` for a list of supported ciphers. Default to `aes-256-cbc` if not given. `-P`, `--password` *PASSWORD* The password to decrypt with. `-H`, `--hash` `md5`\|`sha1`\|`sha256`\|`sha512` The hash algorithm to use for the password. Default to `sha256` if not given. `--iv` *STRING* Sets the Initial Vector (IV) value of the cipher. `--padding` *NUM* Sets the padding size, in bytes, of the decryption cipher. `-b`, `--block-size` *NUM* The size, in bytes, to read data in. Default to `16384` if not given. `--list-ciphers` List the supported ciphers and exits. `-h`, `--help` Print help information. ## EXAMPLES Decrypt a file using AES-256 (CBC mode) with a password: $ ronin decrypt --cipher aes-256-cbc --password "..." encrypted.bin Decrypt a file using a raw key string: $ ronin decrypt --cipher aes-256-cbc --key "12345abcdef..." encrypted.bin Decrypt a file using a raw key read from a file: $ ronin decrypt --cipher aes-256-cbc --key-file key.bin encrypted.bin Specifying a custom IV (initialization vector): $ ronin decrypt --cipher aes-256-cbc --key "..." --iv "..." encrypted.bin ## AUTHOR Postmodern <postmodern.mod3@gmail.com> ## SEE ALSO ronin-encrypt(1)
Version data entries
4 entries across 4 versions & 1 rubygems
Version | Path |
---|---|
ronin-2.0.5 | man/ronin-decrypt.1.md |
ronin-2.0.4 | man/ronin-decrypt.1.md |
ronin-2.0.3 | man/ronin-decrypt.1.md |
ronin-2.0.2 | man/ronin-decrypt.1.md |