The Solaris Cryptographic Framework can help you protect your files. The following task map points to procedures for listing the available algorithms, and for protecting your files cryptographically.
Task |
Description |
For Instructions |
---|---|---|
Generate a symmetric key |
Generates a random key for use with algorithms that the user specifies. | |
Generates a key of user-specified length. Optionally, stores the key in a file, a PKCS #11 keystore, or an NSS keystore. | ||
Provide a checksum that ensures the integrity of a file |
Verifies that the receiver's copy of a file is identical to the file that was sent. | |
Protect a file with a message authentication code (MAC) |
Verifies to the receiver of your message that you were the sender. | |
Encrypt a file, and then decrypt the encrypted file |
Protects the content of files by encrypting the file. Provides the encryption parameters to decrypt the file. |