Command-line Options

Below is list of command-line options recognized by the Wizard's Toolkit command-line tools. If you want a description of a particular option, click on the option name in the navigation bar above and you will go right to it.

-authenticate method

authenticate with this method

To print a complete list of authentication methods, use the -list authenticate option.

-chunksize bytes

number of bytes in a chunk

-cipher type

cipher to encipher or decipher content

To print a complete list of cipher algorithms, use the -list cipher option.


automagically (de)compress BZIP and ZIP files

By default, the encipher and decipher tools automagically expand the content of any BZIP or ZIP files on input or compresses any content on output if the filename extension is .bz2 or .gz. The digest tool, by default, computes the message digest of the unexpanded content of BZIP and ZIP files. Use this option to change this default behavior. Use +(de)compress, for example, to encipher the compressed content of BZIP or ZIP files.

-debug events

display copious debugging information

-entropy type

increase content entropy

To print a complete list of entropy types, use the -list entropy option.

-export id

export a key from your keyring


print program options

-hmac hash

ensure message integrity with this hash

To print a complete list of hashes, use the -list hash option.

-key hash

strengthen the key with this hash

-key-length value

cipher key length in bits: 256, 512, 1024, or 2048

-keyring filename

get or add private keys to this file

-level value

entropy level: 1 (less entropy) to 9 (more entropy)

-list type

print a list of supported option arguments

Choose from these list types:


-log format

format of debugging information

-mode type

mode of encryption or decryption

To print a complete list of modes, use the -list mode option.

-passphrase filename

get the passphrase from this file

-properties filename

cipher properties to/from this file

-random hash

strengthen random data with this hash

To print a complete list of hashes, use the -list hash option.


strengthen enciphering or deciphering with true random numbers

True random numbers are encouraged but may not always be practical because your application may block while entropy is gathered from your environment. If the application does block it may be waiting for your system to generate entropy. Move your mouse or press keystrokes in another window. Once enough entropy is generated, the application runs to completion.

Use +true-random to force cryptographically strong pseudo-random numbers that do not block your application.


print detailed information about the secure content


print version information