Convert Plaintext to Ciphertext and Back With These Command-line Options
[-authenticate • -chunksize • -cipher • -debug • -(de)compress • -entropy • -export • -help • -hmac • -key • -key-length • -keyring • -level • -list • -log • -mode • -passphrase • -properties • -random • -true-random • -verbose • -version]
Below is list of command-line options recognized by the Wizard's Toolkit command-line tools. If you want a description of a particular option, click on the option name in the navigation bar above and you will go right to it.
| authenticate with this method | |
To print a complete list of authentication methods, use the -list authenticate option.
| number of bytes in a chunk | |
| cipher to encipher or decipher content | |
To print a complete list of cipher algorithms, use the -list cipher option.
| automagically (de)compress BZIP and ZIP files | |
By default, the encipher and decipher tools automagically expand the content of any BZIP or ZIP files on input or compresses any content on output if the filename extension is .bz2 or .gz. The digest tool, by default, computes the message digest of the unexpanded content of BZIP and ZIP files. Use this option to change this default behavior. Use +(de)compress, for example, to encipher the compressed content of BZIP or ZIP files.
| display copious debugging information | |
To print a complete list of entropy types, use the -list entropy option.
| export a key from your keyring | |
| ensure message integrity with this hash | |
To print a complete list of hashes, use the -list hash option.
| strengthen the key with this hash | |
| cipher key length in bits: 256, 512, 1024, or 2048 | |
| get or add private keys to this file | |
| entropy level: 1 (less entropy) to 9 (more entropy) | |
| print a list of supported option arguments | |
Choose from these list types:
Authenticate
Cipher
Command
Configure
DataType
Debug
Endian
Entropy
EntropyLevel
Hash
KeyLength
List
Mode
| format of debugging information | |
| mode of encryption or decryption | |
To print a complete list of modes, use the -list mode option.
| get the passphrase from this file | |
| cipher properties to/from this file | |
| strengthen random data with this hash | |
To print a complete list of hashes, use the -list hash option.
| strengthen enciphering or deciphering with true random numbers | |
True random numbers are encouraged but may not always be practical because your application may block while entropy is gathered from your environment. If the application does block it may be waiting for your system to generate entropy. Move your mouse or press keystrokes in another window. Once enough entropy is generated, the application runs to completion.
Use +true-random to force cryptographically strong pseudo-random numbers that do not block your application.
| print detailed information about the secure content | |
| print version information | |