Copyright Digital Equipment Corp. All rights reserved.
There are four ENCRYPT commands:
ENCRYPT Encrypts files. Before you enter
this command, create a key with the
ENCRYPT /CREATE_KEY command.
ENCRYPT /AUTHENTICATE Checks for changes to either plain
text or cipher text files (see
/AUTHENTICATE).
ENCRYPT /CREATE_KEY Defines a key to be used during
encryption (see /CREATE_KEY).
ENCRYPT /REMOVE_KEY Deletes a key definition from a key
storage table (see /REMOVE_KEY).
Format for the ENCRYPT Command
ENCRYPT input-file key-name [qualifiers]
Parameters Qualifiers /BACKUP /BEFORE /BY_OWNER /COMPRESS /CONFIRM /DATA_ALGORITHM /DELETE /ERASE /EXCLUDE /EXPIRED /KEY_ALGORITHM /MODIFIED /OUTPUT /SHOW /SINCE /STATISTICS /VERSION Examples /AUTHENTICATE /CREATE_KEY /REMOVE_KEY