Encryption for OpenVMS Installation and Reference Manual


Begin Index

Contents (summary)
Preface Preface
Chapter 1 Product Overview
Chapter 2 Installing the Encryption for OpenVMS Software
Chapter 3 Using the Encryption for OpenVMS Features
Chapter 4 Programming with Encryption for OpenVMS Routines
Appendix A Command Reference
Appendix B Error Messages
  Index
  Figures
  Tables


Contents


Preface
Preface Preface
Chapter 1
1 Product Overview
     1.1     Encryption Process
         1.1.1         DES Encryption Algorithm
         1.1.2         Keys
         1.1.3         Decryption
     1.2     Authentication Process
     1.3     Encryption Interfaces
     1.4     Compatibility
Chapter 2
2 Installing the Encryption for OpenVMS Software
     2.1     Requirements
     2.2     Before You Run the Installation Procedure
         2.2.1         De-Installing Previous Versions
         2.2.2         Pre-Installation: Installing onto OpenVMS VAX Systems
         2.2.3         Pre-Installation: Loading the License PAK
             2.2.3.1             Installing After You Load the License PAK
             2.2.3.2             Installing Before You Load the License PAK
         2.2.4         Disk onto Which You Install
     2.3     Installing the Software
         2.3.1         Installation Procedure
     2.4     After You Run the Installation Procedure
         2.4.1         Rereading the Release Notes
     2.5     De-Installing
Chapter 3
3 Using the Encryption for OpenVMS Features
     3.1     Defining Keys
         3.1.1         Specifying the Key Name
         3.1.2         Specifying the Key Value
         3.1.3         Verifying Key Creation
         3.1.4         Specifying Key Storage Tables
         3.1.5         Key Maintenance
     3.2     Encrypting Files
         3.2.1         Input File Specification
         3.2.2         Output File Specification
         3.2.3         Displaying Processing Information
             3.2.3.1             FILES Keyword
             3.2.3.2             STATISTICS Keyword
         3.2.4         Specifying Files to Encrypt
             3.2.4.1             /BACKUP Qualifier
             3.2.4.2             /BEFORE Qualifier
             3.2.4.3             /BY_OWNER Qualifier
             3.2.4.4             /CONFIRM Qualifier
             3.2.4.5             /EXCLUDE Qualifier
             3.2.4.6             /EXPIRED Qualifier
             3.2.4.7             /MODIFIED Qualifier
             3.2.4.8             /SINCE Qualifier
         3.2.5         Deleting Encrypted Files
             3.2.5.1             /DELETE Qualifier
             3.2.5.2             /ERASE Qualifier
         3.2.6         Encryption Algorithms
         3.2.7         Encryption Algorithm Qualifiers
             3.2.7.1             /KEY_ALGORITHM Qualifier
             3.2.7.2             /DATA_ALGORITHM Qualifier
         3.2.8         File Compression
         3.2.9         Displaying the Version Number
     3.3     Authenticating Files
         3.3.1         Associating MACs with Files
         3.3.2         Checking Files
         3.3.3         Specifying a File for MACs Generated from File Contents
         3.3.4         Specifying a Security MAC File
         3.3.5         Specifying a Listing File
         3.3.6         Logging the Authentication Operation
     3.4     Deleting Key Definitions
     3.5     Decrypting Files
         3.5.1         Input File Specification
         3.5.2         Output File Specification
         3.5.3         Displaying Processing Information
             3.5.3.1             FILES Keyword
             3.5.3.2             STATISTICS Keyword
         3.5.4         Specifying Files to Decrypt
             3.5.4.1             /BACKUP Qualifier
             3.5.4.2             /BEFORE Qualifier
             3.5.4.3             /BY_OWNER Qualifier
             3.5.4.4             /CONFIRM Qualifier
             3.5.4.5             /EXCLUDE Qualifier
             3.5.4.6             /EXPIRED Qualifier
             3.5.4.7             /MODIFIED Qualifier
             3.5.4.8             /SINCE Qualifier
         3.5.5         Deleting Decrypted Files
             3.5.5.1             /DELETE Qualifier
             3.5.5.2             /ERASE Qualifier
         3.5.6         Algorithm Qualifiers
     3.6     Encrypting Save Sets
         3.6.1         Restoring Files
         3.6.2         Encrypting Distribution Files


Previous Next Contents Index