GFSEC-USE(1) | Gfsecret Manual | GFSEC-USE(1) |
gfsec-use - Make use of a shared secret
gfsec-use |
[-h|--help] [-v|--version] [-c|--config file] [-k|--keep] [-o|--output file] [-r|--restore-cmd command] [-d|--destroy-cmd command] [command...] |
gfsec-use reconstructs a secret file that has been previously split using a tool like gfsplit(1) or the accompanying program gfsec-split(1).
A user-specified command (or a shell) is spawn once the secret has been reconstructed, and the secret file is deleted when the command terminates.
A configuration file describes one secret file to reconstruct. Blank lines and lines starting with a # character are ignored.
The following directives can be used:
Supported URI schemes are:
Whatever the scheme, the file part of the URI must end with an extension indicating the share number, as generated by gfsplit(1).
The URI may include a share=no parameter, indicating that the corresponding file contains the whole secret and not only a share (in that case, the previous remark about the share number in the extension does not apply).
Another parameter is sha256, which specifies the expected SHA-256 hash value of the share data. If such a parameter is specified, a share will only be used if the data matches the expected hash value.
The gfsec-split(1) program, used to split a file into shares, will automatically generate a suitable configuration file allowing to reconstruct the original file.
OUTFILE=/home/alice/mysecret MINSHARES=2 URI=file:///home/alice/.local/share/gfsecret/mysecret.024 URI=label://USBSTICK/mysecret.070?sha256=hex_hash URI=mtp://RF2GB6X704P/Documents/mysecret.139
Report bugs to Damien Goutte-Gattat.
gfsec-split(1), gfsplit(1), gfcombine(1), libgfshare(3), gfshare(7)
Copyright © 2017 Damien Goutte-Gattat
This program is released under the GNU General Public License. See the COPYING file in the source distribution or http://www.gnu.org/licenses/gpl.html.
2017-07-23 | gfsecret 0.4.6 |