diff options
author | ru <ru@FreeBSD.org> | 2004-07-02 22:22:35 +0000 |
---|---|---|
committer | ru <ru@FreeBSD.org> | 2004-07-02 22:22:35 +0000 |
commit | fb1d8b3724cde10863de04d2c0884fbc5035eeef (patch) | |
tree | b3cdbab3d24866d3829616606f702cb5cb5d6c97 /usr.bin/enigma | |
parent | 2334c79a7573e958e33d5cc7301829244e5d216f (diff) | |
download | FreeBSD-src-fb1d8b3724cde10863de04d2c0884fbc5035eeef.zip FreeBSD-src-fb1d8b3724cde10863de04d2c0884fbc5035eeef.tar.gz |
Mechanically kill hard sentence breaks.
Diffstat (limited to 'usr.bin/enigma')
-rw-r--r-- | usr.bin/enigma/enigma.1 | 16 |
1 files changed, 11 insertions, 5 deletions
diff --git a/usr.bin/enigma/enigma.1 b/usr.bin/enigma/enigma.1 index c0c10b7..c1114ec 100644 --- a/usr.bin/enigma/enigma.1 +++ b/usr.bin/enigma/enigma.1 @@ -31,14 +31,17 @@ is a .Em very simple encryption program, working on a .Dq secret-key -basis. It operates as a filter, i. e. it encrypts or decrypts a +basis. +It operates as a filter, i.e., +it encrypts or decrypts a stream of data from standard input, and writes the result to standard output. Since its operation is fully symmetrical, feeding the encrypted data stream again through the engine (using the same secret key) will decrypt it. .Pp -There are several ways to provide the secret key to the program. By +There are several ways to provide the secret key to the program. +By default, the program prompts the user on the controlling terminal for the key, using .Xr getpass 3 . @@ -47,7 +50,8 @@ This is the only safe way of providing it. Alternatively, the key can be provided as the sole command-line argument .Ar password -when starting the program. Obviously, this way the key can easily be +when starting the program. +Obviously, this way the key can easily be spotted by other users running .Xr ps 1 . As yet another alternative, @@ -73,7 +77,8 @@ little more secure, but incompatible with other implementations. .Ss Warning The cryptographic value of .Nm -is rather small. This program is only provided here for compatibility +is rather small. +This program is only provided here for compatibility with other operating systems that also provide an implementation (usually called .Xr crypt 1 @@ -121,6 +126,7 @@ Implementations of .Nm crypt are very common among .Ux -operating systems. This implementation has been taken from the +operating systems. +This implementation has been taken from the .Em Cryptbreakers Workbench which is in the public domain. |