From 768ad4de2abf0407193acaf00bd00330cb04d6bf Mon Sep 17 00:00:00 2001 From: Evan Harris Date: Sun, 12 Jul 2020 19:04:59 -0500 Subject: [PATCH] docs: Updated crypt/cryptdecode docs with additional info --- cmd/cryptdecode/cryptdecode.go | 3 +++ docs/content/crypt.md | 4 ++++ 2 files changed, 7 insertions(+) diff --git a/cmd/cryptdecode/cryptdecode.go b/cmd/cryptdecode/cryptdecode.go index 7e7514a0c..bd754b017 100644 --- a/cmd/cryptdecode/cryptdecode.go +++ b/cmd/cryptdecode/cryptdecode.go @@ -36,6 +36,9 @@ use it like this rclone cryptdecode encryptedremote: encryptedfilename1 encryptedfilename2 rclone cryptdecode --reverse encryptedremote: filename1 filename2 + +Another way to accomplish this is by using the ` + "`rclone backend encode` (or `decode`)" + `command. +See the documentation on the ` + "`crypt`" + ` overlay for more info. `, Run: func(command *cobra.Command, args []string) { cmd.CheckArgs(2, 11, command, args) diff --git a/docs/content/crypt.md b/docs/content/crypt.md index d42652378..6b449fac3 100644 --- a/docs/content/crypt.md +++ b/docs/content/crypt.md @@ -557,3 +557,7 @@ then rclone uses an internal one. `scrypt` makes it impractical to mount a dictionary attack on rclone encrypted data. For full protection against this you should always use a salt. + +## SEE ALSO + +* [rclone cryptdecode](/commands/rclone_cryptdecode/) - Show forward/reverse mapping of encrypted filenames