This section describes how to generate symmetric keys, how to create checksums for file integrity, and how to protect files from eavesdropping. The commands in this section can be run by regular users. Developers can write scripts that use these commands.
To setup your system in FIPS 140 mode, you must use FIPS-validated algorithms, modes, and key lengths. Refer to FIPS 140 Algorithm Lists and Certificate References for Oracle Solaris Systems in Using a FIPS 140 Enabled System in Oracle Solaris 11.2 .
The Cryptographic Framework can help you protect your files. The following task map points to procedures for listing the available algorithms, and for protecting your files cryptographically.
|