scrypt.1 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254
  1. .\" Copyright 2009 Colin Percival
  2. .\" All rights reserved.
  3. .\"
  4. .\" Redistribution and use in source and binary forms, with or without
  5. .\" modification, are permitted provided that the following conditions
  6. .\" are met:
  7. .\" 1. Redistributions of source code must retain the above copyright
  8. .\" notice, this list of conditions and the following disclaimer.
  9. .\" 2. Redistributions in binary form must reproduce the above copyright
  10. .\" notice, this list of conditions and the following disclaimer in the
  11. .\" documentation and/or other materials provided with the distribution.
  12. .\"
  13. .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  14. .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  15. .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  16. .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  17. .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  18. .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  19. .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  20. .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  21. .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  22. .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  23. .\" SUCH DAMAGE.
  24. .Dd @DATE@
  25. .Dt SCRYPT 1
  26. .Os
  27. .Sh NAME
  28. .Nm scrypt
  29. .Nd encrypt and decrypt files.
  30. .Sh SYNOPSIS
  31. .Nm
  32. .Brq Cm enc | Cm dec | Cm info
  33. .Op Fl f
  34. .Op Fl -logN Ar value
  35. .Op Fl M Ar maxmem
  36. .Op Fl m Ar maxmemfrac
  37. .Op Fl P
  38. .Op Fl p Ar value
  39. .Op Fl -passphrase Ar method:arg
  40. .Op Fl r Ar value
  41. .Op Fl t Ar maxtime
  42. .Op Fl v
  43. .Ar infile
  44. .Op Ar outfile
  45. .Nm
  46. .Fl -version
  47. .Sh DESCRIPTION
  48. .Nm Cm enc
  49. encrypts
  50. .Ar infile
  51. and writes the result to
  52. .Ar outfile
  53. if specified, or the standard output otherwise.
  54. The user will be prompted to enter a passphrase (twice) to
  55. be used to generate a derived encryption key.
  56. .Pp
  57. .Nm Cm dec
  58. decrypts
  59. .Ar infile
  60. and writes the result to
  61. .Ar outfile
  62. if specified, or the standard output otherwise.
  63. The user will be prompted to enter the passphrase used at
  64. encryption time to generate the derived encryption key.
  65. .Pp
  66. .Nm Cm info
  67. provides information about the encryption parameters used for
  68. .Ar infile .
  69. .Pp
  70. If
  71. .Fl P
  72. is not given,
  73. .Nm
  74. reads passphrases from its controlling terminal, or failing that,
  75. from stdin. Prompts are only printed when
  76. .Nm
  77. is reading passphrases from some terminal. If
  78. .Fl P
  79. is given, then
  80. .Nm
  81. does not print any prompts, and reads a passphrase from stdin.
  82. .Sh OPTIONS
  83. .Bl -tag -width "-m maxmemfrac"
  84. .It Fl f
  85. Force the decryption to proceed even if it is anticipated to
  86. require an excessive amount of memory or CPU time.
  87. .It Fl -logN Ar value
  88. Set the work parameter N to
  89. .Pf 2^ Ar value .
  90. If
  91. .Fl -logN
  92. is set,
  93. .Fl r
  94. and
  95. .Fl p
  96. must also be set. If such explicit parameters are given, the
  97. resource limits set by
  98. .Fl M ,
  99. .Fl m ,
  100. and
  101. .Fl t
  102. are not enforced.
  103. .It Fl M Ar maxmem
  104. Use at most
  105. .Ar maxmem
  106. bytes of RAM to compute the derived encryption key.
  107. .It Fl m Ar maxmemfrac
  108. Use at most the fraction
  109. .Ar maxmemfrac
  110. of the available RAM to compute the derived encryption key.
  111. .It Fl P
  112. Always read passphrase from stdin, and do so only once even
  113. when encrypting. This cannot be used if
  114. .Ar infile
  115. is also stdin (aka '-').
  116. .It Fl p Ar value
  117. Set the work parameter p to
  118. .Ar value .
  119. If
  120. .Fl p
  121. is set,
  122. .Fl -logN
  123. and
  124. .Fl r
  125. must also be set. If such explicit parameters are given, the
  126. resource limits set by
  127. .Fl M ,
  128. .Fl m ,
  129. and
  130. .Fl t
  131. are not enforced.
  132. .It Fl -passphrase Ar method:arg
  133. Read the passphrase using the specified method.
  134. .Bl -tag -width aa
  135. .It Ar dev:tty-stdin
  136. Attempt to read the passphrase from /dev/tty; if that fails, read
  137. it from stdin. This is the default behaviour.
  138. .It Ar dev:stdin-once
  139. Attempt to read the passphrase from stdin, and do so only once
  140. even when encrypting. This cannot be used if
  141. .Ar infile
  142. is also stdin (aka '-').
  143. .It Ar dev:tty-once
  144. Attempt to read the passphrase from /dev/tty, and do so only once
  145. even when encrypting.
  146. .It Ar env:VAR
  147. Read the passphrase from the environment variable specified by
  148. .Ar VAR .
  149. .Pp
  150. .Bf Em
  151. Storing a passphrase in an environment variable may be a security risk.
  152. .Ef
  153. Only use this option if you are certain that you know what you are doing.
  154. .It Ar file:FILENAME
  155. Read the passphrase from the file specified by
  156. .Ar FILENAME .
  157. .Pp
  158. .Bf Em
  159. Storing a passphrase in a file may be a security risk.
  160. .Ef
  161. Only use this option if you are certain that you know what you are doing.
  162. .El
  163. .It Fl r Ar value
  164. Set the work parameter r to
  165. .Ar value .
  166. If
  167. .Fl r
  168. is set,
  169. .Fl -logN
  170. and
  171. .Fl p
  172. must also be set. If such explicit parameters are given, the
  173. resource limits set by
  174. .Fl M ,
  175. .Fl m ,
  176. and
  177. .Fl t
  178. are not enforced.
  179. .It Fl t Ar maxtime
  180. Use at most
  181. .Ar maxtime
  182. seconds of CPU time to compute the derived encryption key.
  183. .It Fl -v
  184. Print encryption parameters (N, r, p) and memory/cpu limits.
  185. .It Fl -version
  186. Print version of scrypt, and exit.
  187. .El
  188. .Pp
  189. In
  190. .Nm Cm enc ,
  191. the memory and CPU time limits are enforced by picking
  192. appropriate parameters to the
  193. .Nm
  194. key derivation function.
  195. In
  196. .Nm Cm dec ,
  197. the memory and CPU time limits are enforced by exiting with
  198. an error if decrypting the file would require too much memory
  199. or CPU time.
  200. .Sh EXIT STATUS
  201. The
  202. .Nm
  203. utility exits 0 on success, and >0 if an error occurs.
  204. .Pp
  205. Note that if the input encrypted file is corrupted,
  206. .Nm Cm dec
  207. may produce output prior to determining that the input
  208. was corrupt and exiting with a non-zero status; so
  209. users should direct the output to a safe location and
  210. check the exit status of
  211. .Nm
  212. before using the decrypted data.
  213. .Sh ALGORITHM PARAMETERS
  214. The scrypt algorithm has three tuneable work parameters: N, r, p.
  215. When decrypting, scrypt will always use the values specified by
  216. the encryption header. When encrypting, scrypt will choose
  217. appropriate values based on your system's speed and memory
  218. (influenced by
  219. .Fl M ,
  220. .Fl m ,
  221. and/or
  222. .Fl t ) ,
  223. unless you specify explicit parameters via
  224. .Fl -logN ,
  225. .Fl p ,
  226. .Fl r .
  227. .Sh SEE ALSO
  228. .Rs
  229. .%A "Colin Percival"
  230. .%T "Stronger Key Derivation via Sequential Memory-Hard Functions"
  231. .%R "BSDCan'09"
  232. .%D "May 2009"
  233. .Re
  234. .Rs
  235. .%A "Colin Percival"
  236. .%A "Simon Josefsson"
  237. .%T "The scrypt Password-Based Key Derivation Function"
  238. .%R "IETF RFC 7914"
  239. .%D "August 2016"
  240. .Re
  241. .Sh HISTORY
  242. The
  243. .Nm
  244. utility was written in May 2009 by Colin Percival as a
  245. demonstration of the
  246. .Nm
  247. key derivation function.
  248. The
  249. .Nm
  250. key derivation function was invented in March 2009 by Colin
  251. Percival in order to allow key files from the
  252. .Nm Tarsnap
  253. backup system to be passphrase protected.