|
52 | 52 | #define CFG_RECIPIENTS "recipients" /* list of encrypted data recipients */
|
53 | 53 | #define CFG_SIGNERS "signers" /* list of signers */
|
54 | 54 | #define CFG_HOMEDIR "homedir" /* home directory - folder with keyrings and so on */
|
55 |
| -#define CFG_KEYFILE "keyfile" /* path to the file with key(s), used instead of keyring */ |
56 |
| -#define CFG_PASSFD "pass-fd" /* password file descriptor */ |
57 |
| -#define CFG_PASSWD "password" /* password as command-line constant */ |
58 |
| -#define CFG_PASSWORDC "passwordc" /* number of passwords for symmetric encryption */ |
59 |
| -#define CFG_NUMTRIES "numtries" /* number of password request tries, or 'unlimited' */ |
60 |
| -#define CFG_EXPIRATION "expiration" /* signature expiration time */ |
61 |
| -#define CFG_CREATION "creation" /* signature validity start */ |
62 |
| -#define CFG_CIPHER "cipher" /* symmetric encryption algorithm as string */ |
63 |
| -#define CFG_HASH "hash" /* hash algorithm used, string like 'SHA1'*/ |
64 |
| -#define CFG_WEAK_HASH "weak-hash" /* allow weak algorithms */ |
65 |
| -#define CFG_S2K_ITER "s2k-iter" /* number of S2K hash iterations to perform */ |
66 |
| -#define CFG_S2K_MSEC "s2k-msec" /* number of milliseconds S2K should target */ |
67 |
| -#define CFG_ENCRYPT_PK "encrypt_pk" /* public key should be used during encryption */ |
68 |
| -#define CFG_ENCRYPT_SK "encrypt_sk" /* password encryption should be used */ |
69 |
| -#define CFG_IO_RESS "ress" /* results stream */ |
70 |
| -#define CFG_NUMBITS "numbits" /* number of bits in generated key */ |
71 |
| -#define CFG_EXPERT "expert" /* expert key generation mode */ |
72 |
| -#define CFG_ZLEVEL "zlevel" /* compression level: 0..9 (0 for no compression) */ |
73 |
| -#define CFG_ZALG "zalg" /* compression algorithm: zip, zlib or bzip2 */ |
74 |
| -#define CFG_AEAD "aead" /* if nonzero then AEAD enryption mode, int */ |
75 |
| -#define CFG_AEAD_CHUNK "aead_chunk" /* AEAD chunk size bits, int from 0 to 56 */ |
| 55 | +#define CFG_KEYFILE "keyfile" /* path to the file with key(s), used instead of keyring */ |
| 56 | +#define CFG_PASSFD "pass-fd" /* password file descriptor */ |
| 57 | +#define CFG_PASSWD "password" /* password as command-line constant */ |
| 58 | +#define CFG_PASSWORDC "passwordc" /* number of passwords for symmetric encryption */ |
| 59 | +#define CFG_NUMTRIES "numtries" /* number of password request tries, or 'unlimited' */ |
| 60 | +#define CFG_EXPIRATION "expiration" /* signature expiration time */ |
| 61 | +#define CFG_CREATION "creation" /* signature validity start */ |
| 62 | +#define CFG_CIPHER "cipher" /* symmetric encryption algorithm as string */ |
| 63 | +#define CFG_HASH "hash" /* hash algorithm used, string like 'SHA1'*/ |
| 64 | +#define CFG_WEAK_HASH "weak-hash" /* allow weak algorithms */ |
| 65 | +#define CFG_S2K_ITER "s2k-iter" /* number of S2K hash iterations to perform */ |
| 66 | +#define CFG_S2K_MSEC "s2k-msec" /* number of milliseconds S2K should target */ |
| 67 | +#define CFG_ENCRYPT_PK "encrypt_pk" /* public key should be used during encryption */ |
| 68 | +#define CFG_ENCRYPT_SK "encrypt_sk" /* password encryption should be used */ |
| 69 | +#define CFG_IO_RESS "ress" /* results stream */ |
| 70 | +#define CFG_NUMBITS "numbits" /* number of bits in generated key */ |
| 71 | +#define CFG_EXPERT "expert" /* expert key generation mode */ |
| 72 | +#define CFG_ZLEVEL "zlevel" /* compression level: 0..9 (0 for no compression) */ |
| 73 | +#define CFG_ZALG "zalg" /* compression algorithm: zip, zlib or bzip2 */ |
| 74 | +#define CFG_AEAD "aead" /* if nonzero then AEAD enryption mode, int */ |
| 75 | +#define CFG_AEAD_CHUNK "aead_chunk" /* AEAD chunk size bits, int from 0 to 56 */ |
76 | 76 | #define CFG_KEYSTORE_DISABLED \
|
77 | 77 | "disable_keystore" /* indicates whether keystore must be initialized */
|
78 | 78 | #define CFG_FORCE "force" /* force command to succeed operation */
|
|
0 commit comments