O'Reilly logo

APIs at Work, Second Edition by Ron Hawkins, Doug Pence, Bruce Vining

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Encrypting Data Using a Key Store

At this point, FIG11_12 has loaded master key 3, set master key 3, created the key store ABCSTORE in SOMELIB, and added one record to the ABCSTORE key store file with the record label ‘Customer file’. The program now ends, and it’s time to move on to the FIG11_17 sample program, which encrypts the CUSTOMER data using the AES key stored in the key store. This program is shown in Figure 11.17.

Figure 11.17. Encrypting data with key management
h dftactgrp(*no)

FFilename++IPEASF.....L.....A.Device+.Keywords+++++++++++++++++++++++++
fCustomer  if    e            disk
fEncrCust  o     e            disk

DName+++++++++++ETDsFrom+++To/L+++IDc.Keywords+++++++++++++++++++++++++ d/copy qsysinc/qrpglesrc,qc3cci d/copy qsysinc/qrpglesrc,qusec dCrtKeyCtx ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required