This program provides encryption and decryption using Secret Keeper
Encrypt a file with choice of SecretKeeper
and choice of encrypting cipher
``` # Encrypt file $ encrypt enc -o OUT [ -k KEEPER ] [ -c CIPHER ] FILE
# Decrypt file $ encrypt dec -o OUT [ -k KEEPER ] [ -c CIPHER ] FILE
# View key envelope $ encrypt key view [ -k KEEPER ] FILE ```
If a secret keeper uri is not specified, default env:
is used.
Secret keepers:
env:
- passphrase for deriving key is in environment var VAULT_PASSWORDenv:VARNAME
- passphrase for deriving key is in environment variable VARNAMEprompt:
- user will be prompted on terminal for passphrase for deriving keyhashivault:...
- key-encrypting-key is on hashivault transit server.
See hashivault keeper doc for url syntax
cloudkms:...
- Google Cloud KMS
Default cipher is LZ4XChaCha20Poly1305, which combines LZ4 compression with XChaCha20-Poly1305. (Cipher algorithm implemented by RustCrypto
Cipher options (-c flag):
File nonces and keys are generated with the platform's OS CSRNG, using the rand crate.
cargo build
If you build from source, the binary should be in secret-keeper/target/{debug,release}/encrypt