From 5d136f074795fe37239d0b4436c82cb4536ff1af Mon Sep 17 00:00:00 2001 From: Christopher Wellons Date: Tue, 23 Jan 2018 14:47:03 -0500 Subject: [PATCH] Update man page to 3.4 --- index.html | 39 ++++++++++++++++++++------------------- 1 file changed, 20 insertions(+), 19 deletions(-) diff --git a/index.html b/index.html index 5d421e2..6133d3b 100644 --- a/index.html +++ b/index.html @@ -1,5 +1,5 @@ - + @@ -59,16 +59,15 @@ personal archive encryption

- -

[-a[seconds]|-A] -[-r device] [-p pubkey] -[-s seckey]

+

[-a|-A] +[-e] [-p pubkey] +[-s seckey] [--version] +[--help]

-

[--version] -[--help]
-keygen
[-d[N]] [-e] [-f] -[-i] [-k N] [-u]
+

keygen +[-d[N]] [-e] [-f] [-i] +[-k N] [-u]
archive
[-d]
extract
[-d]
fingerprint

@@ -93,8 +92,9 @@ secured with ChaCha20, Curve25519, and HMAC-SHA256.

-

-a -seconds, --agent[=seconds]

+ +

-aseconds, +--agent[=seconds]

Runs the key agent for awhile after successfully reading the passphrase. The agent will @@ -106,18 +106,19 @@ passes. Default is 900 seconds (15 minutes).

Do not start the key agent (default).

+

-eprogram, +--pinentry[=program]

+ +

Read passphrases using the +system’s pinentry program. By default Enchive uses the +program named "pinentry".

+

-p, --pubkey file

Specifies the public key file to use for encryption.

-

-r, ---random-device device

- -

Use device as an entropy -source instead of /dev/urandom.

-

-s, --seckey file

@@ -156,7 +157,7 @@ prefix for a command is accepted. For example, the command keygen
[OPTION]...

Generates a new keypair either -from the random device or a passphrase.

+from system entropy or a passphrase.

-d[N], --derive[=N]

@@ -220,7 +221,7 @@ archival using the secret key. If no output filename is given, the output filename will be the input filename with the .enchive suffix removed. Without an output filename, it is an error for the input to lack this suffix. -If no filenames are given, dencrypt standard input to +If no filenames are given, decrypt standard input to standard output.

-d, --delete