mirror of
https://github.com/pgpainless/pgpainless.git
synced 2024-11-30 08:12:06 +01:00
106 lines
No EOL
2.6 KiB
Groff
106 lines
No EOL
2.6 KiB
Groff
'\" t
|
|
.\" Title: pgpainless-cli-decrypt
|
|
.\" Author: [see the "AUTHOR(S)" section]
|
|
.\" Generator: Asciidoctor 2.0.10
|
|
.\" Manual: PGPainless-CLI Manual
|
|
.\" Source:
|
|
.\" Language: English
|
|
.\"
|
|
.TH "PGPAINLESS\-CLI\-DECRYPT" "1" "" "" "PGPainless\-CLI Manual"
|
|
.ie \n(.g .ds Aq \(aq
|
|
.el .ds Aq '
|
|
.ss \n[.ss] 0
|
|
.nh
|
|
.ad l
|
|
.de URL
|
|
\fI\\$2\fP <\\$1>\\$3
|
|
..
|
|
.als MTO URL
|
|
.if \n[.g] \{\
|
|
. mso www.tmac
|
|
. am URL
|
|
. ad l
|
|
. .
|
|
. am MTO
|
|
. ad l
|
|
. .
|
|
. LINKSTYLE blue R < >
|
|
.\}
|
|
.SH "NAME"
|
|
pgpainless\-cli\-decrypt \- Decrypt a message
|
|
.SH "SYNOPSIS"
|
|
.sp
|
|
\fBpgpainless\-cli decrypt\fP [\fB\-\-stacktrace\fP] [\fB\-\-session\-key\-out\fP=\fISESSIONKEY\fP]
|
|
[\fB\-\-verifications\-out\fP=\fIVERIFICATIONS\fP] [\fB\-\-verify\-not\-after\fP=\fIDATE\fP]
|
|
[\fB\-\-verify\-not\-before\fP=\fIDATE\fP] [\fB\-\-verify\-with\fP=\fICERT\fP]...
|
|
[\fB\-\-with\-key\-password\fP=\fIPASSWORD\fP]... [\fB\-\-with\-password\fP=\fIPASSWORD\fP]...
|
|
[\fB\-\-with\-session\-key\fP=\fISESSIONKEY\fP]... [\fIKEY\fP...]
|
|
.SH "DESCRIPTION"
|
|
|
|
.SH "OPTIONS"
|
|
.sp
|
|
\fB\-\-session\-key\-out\fP=\fISESSIONKEY\fP
|
|
.RS 4
|
|
Can be used to learn the session key on successful decryption
|
|
.RE
|
|
.sp
|
|
\fB\-\-stacktrace\fP
|
|
.RS 4
|
|
Print stacktrace
|
|
.RE
|
|
.sp
|
|
\fB\-\-verifications\-out\fP=\fIVERIFICATIONS\fP, \fB\-\-verify\-not\-after\fP=\fIDATE\fP
|
|
.RS 4
|
|
ISO\-8601 formatted UTC date (e.g. \(aq2020\-11\-23T16:35Z)
|
|
.sp
|
|
Reject signatures with a creation date not in range.
|
|
.sp
|
|
Defaults to current system time (\(aqnow\(aq).
|
|
.sp
|
|
Accepts special value \(aq\-\(aq for end of time.
|
|
.RE
|
|
.sp
|
|
\fB\-\-verify\-not\-before\fP=\fIDATE\fP
|
|
.RS 4
|
|
ISO\-8601 formatted UTC date (e.g. \(aq2020\-11\-23T16:35Z)
|
|
.sp
|
|
Reject signatures with a creation date not in range.
|
|
.sp
|
|
Defaults to beginning of time (\(aq\-\(aq).
|
|
.RE
|
|
.sp
|
|
\fB\-\-verify\-with\fP=\fICERT\fP
|
|
.RS 4
|
|
Certificates for signature verification
|
|
.RE
|
|
.sp
|
|
\fB\-\-with\-key\-password\fP=\fIPASSWORD\fP
|
|
.RS 4
|
|
Passphrase to unlock the secret key(s).
|
|
.sp
|
|
Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
|
|
.RE
|
|
.sp
|
|
\fB\-\-with\-password\fP=\fIPASSWORD\fP
|
|
.RS 4
|
|
Symmetric passphrase to decrypt the message with.
|
|
.sp
|
|
Enables decryption based on any "SKESK" packets in the "CIPHERTEXT".
|
|
.sp
|
|
Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
|
|
.RE
|
|
.sp
|
|
\fB\-\-with\-session\-key\fP=\fISESSIONKEY\fP
|
|
.RS 4
|
|
Symmetric message key (session key).
|
|
.sp
|
|
Enables decryption of the "CIPHERTEXT" using the session key directly against the "SEIPD" packet.
|
|
.sp
|
|
Is an INDIRECT data type (e.g. file, environment variable, file descriptor...).
|
|
.RE
|
|
.SH "ARGUMENTS"
|
|
.sp
|
|
[\fIKEY\fP...]
|
|
.RS 4
|
|
Secret keys to attempt decryption with
|
|
.RE |