| @@ -1,14 +1,14 @@ | | | @@ -1,14 +1,14 @@ |
1 | .\" $NetBSD: netpgp.1,v 1.19 2014/02/17 07:23:18 agc Exp $ | | 1 | .\" $NetBSD: netpgp.1,v 1.20 2017/03/27 21:30:23 khorben Exp $ |
2 | .\" | | 2 | .\" |
3 | .\" Copyright (c) 2009 The NetBSD Foundation, Inc. | | 3 | .\" Copyright (c) 2009 The NetBSD Foundation, Inc. |
4 | .\" All rights reserved. | | 4 | .\" All rights reserved. |
5 | .\" | | 5 | .\" |
6 | .\" This manual page is derived from software contributed to | | 6 | .\" This manual page is derived from software contributed to |
7 | .\" The NetBSD Foundation by Alistair Crooks (agc@NetBSD.org). | | 7 | .\" The NetBSD Foundation by Alistair Crooks (agc@NetBSD.org). |
8 | .\" | | 8 | .\" |
9 | .\" Redistribution and use in source and binary forms, with or without | | 9 | .\" Redistribution and use in source and binary forms, with or without |
10 | .\" modification, are permitted provided that the following conditions | | 10 | .\" modification, are permitted provided that the following conditions |
11 | .\" are met: | | 11 | .\" are met: |
12 | .\" 1. Redistributions of source code must retain the above copyright | | 12 | .\" 1. Redistributions of source code must retain the above copyright |
13 | .\" notice, this list of conditions and the following disclaimer. | | 13 | .\" notice, this list of conditions and the following disclaimer. |
14 | .\" 2. Redistributions in binary form must reproduce the above copyright | | 14 | .\" 2. Redistributions in binary form must reproduce the above copyright |
| @@ -193,27 +193,27 @@ Internally, | | | @@ -193,27 +193,27 @@ Internally, |
193 | .Nm | | 193 | .Nm |
194 | splits an encrypted or signed file into separate packets, and | | 194 | splits an encrypted or signed file into separate packets, and |
195 | this option is used to give a verbose representation | | 195 | this option is used to give a verbose representation |
196 | of these packets on standard output. | | 196 | of these packets on standard output. |
197 | .It Fl Fl version | | 197 | .It Fl Fl version |
198 | Print the version information from the | | 198 | Print the version information from the |
199 | .Xr libnetpgp 3 | | 199 | .Xr libnetpgp 3 |
200 | library. | | 200 | library. |
201 | .El | | 201 | .El |
202 | .Pp | | 202 | .Pp |
203 | In addition to one of the preceding commands, a number of qualifiers | | 203 | In addition to one of the preceding commands, a number of qualifiers |
204 | or options may be given. | | 204 | or options may be given. |
205 | .Bl -tag -width Ar | | 205 | .Bl -tag -width Ar |
206 | .It Fl Fl armour , Fl armor | | 206 | .It Fl Fl armour , Fl Fl armor |
207 | This option, however it is spelled, wraps the signature as an | | 207 | This option, however it is spelled, wraps the signature as an |
208 | ASCII-encoded piece of text, for ease of use. | | 208 | ASCII-encoded piece of text, for ease of use. |
209 | .It Fl Fl cipher Ar ciphername | | 209 | .It Fl Fl cipher Ar ciphername |
210 | can be used to specify the symmetric encryption algorithm (or | | 210 | can be used to specify the symmetric encryption algorithm (or |
211 | cipher) which is used when encrypting data. | | 211 | cipher) which is used when encrypting data. |
212 | To decrypt this data, the same cipher will be needed, | | 212 | To decrypt this data, the same cipher will be needed, |
213 | so care should be taken at encryption time to make sure | | 213 | so care should be taken at encryption time to make sure |
214 | that the person who decrypts the data has | | 214 | that the person who decrypts the data has |
215 | access to the cipher used. | | 215 | access to the cipher used. |
216 | The default cipher algorithm is the | | 216 | The default cipher algorithm is the |
217 | .Dq CAST5 | | 217 | .Dq CAST5 |
218 | algorithm. | | 218 | algorithm. |
219 | .It Fl Fl detached | | 219 | .It Fl Fl detached |