utility decrypts data using the Rijndael algorithm, the winner of
the Advanced Encryption Standard (AES) competition.
The decryption is done in Cipher Block Feedback (CFB-128) mode, with
the salt read from the first 128 bits (16 bytes) of the encrypted data
as generated by the
The encrypted data (including the salt) is read from standard input and
the decrypted plaintext is written to standard output.
The decryption key may be read from standard input or from a file,
depending on the argument passed to the
is used as a filename, the
utility reads as many hexadecimal digits as needed from standard input
and then one additional byte to allow for a newline separating the key
from the actual data to be decrypted.
If the filename is not
utility opens the specified file and reads text lines from it until
a line starting with the characters
Those characters should be immediately followed by as many hexadecimal
digits as needed; the rest of the line, as well as the rest of the file,
The decryption key may be 128, 192, or 256 bits long.
By default, the
utility uses (and expects to read) a 128-bit key, unless a different size
is supplied by the
Decrypt the contents of the
file with a key (128-bit by default) read from a file:
aesget -k key.txt < hosts.aes > hosts.txt
Decrypt a file with a 192-bit key supplied directly:
(echo 012345678901234567890123456789012345678901234567; cat test.aes) | ./aesget -s 192 -k -