Sha256: 71818e4cbda5f869bd98ba4789522993ad1c6cc46e116ca8e3f7659492552d4d
Contents?: true
Size: 1.72 KB
Versions: 2
Compression:
Stored size: 1.72 KB
Contents
# ronin-decrypt 1 "2023-02-01" Ronin "User Manuals" ## NAME ronin-decrypt - Decrypts data ## SYNOPSIS `ronin decrypt` [*options*] [*FILE* ...] ## DESCRIPTION Encrypts data. ## ARGUMENTS *FILE* : The optional file to read and decrypt. If no *FILE* arguments are given, input will be read from `stdin`. ## OPTIONS `-k`, `--key` *STRING* : The raw key string for the cipher. `-K`, `--key-file` *FILE* : Reads the key string from the file. `-c`, `--cipher` *NAME* : The cipher to decrypt with. See `--list-ciphers` for a list of supported ciphers. Default to `aes-256-cbc` if not given. `-P`, `--password` *PASSWORD* : The password to decrypt with. `-H`, `--hash` `md5`\|`sha1`\|`sha256`\|`sha512` : The hash algorithm to use for the password. Default to `sha256` if not given. `--iv` *STRING* : Sets the Initial Vector (IV) value of the cipher. `--padding` *NUM* : Sets the padding size, in bytes, of the decryption cipher. `-b`, `--block-size` *NUM* : The size, in bytes, to read data in. Default to `16384` if not given. `--list-ciphers` : List the supported ciphers and exits. `-h`, `--help` : Print help information. ## EXAMPLES Decrypt a file using AES-256 (CBC mode) with a password: $ ronin decrypt --cipher aes-256-cbc --password "..." encrypted.bin Decrypt a file using a raw key string: $ ronin decrypt --cipher aes-256-cbc --key "12345abcdef..." encrypted.bin Decrypt a file using a raw key read from a file: $ ronin decrypt --cipher aes-256-cbc --key-file key.bin encrypted.bin Specifying a custom IV (initialization vector): $ ronin decrypt --cipher aes-256-cbc --key "..." --iv "..." encrypted.bin ## AUTHOR Postmodern <postmodern.mod3@gmail.com> ## SEE ALSO [ronin-encrypt](ronin-encrypt.1.md)
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
ronin-2.1.0 | man/ronin-decrypt.1.md |
ronin-2.1.0.rc1 | man/ronin-decrypt.1.md |