![Thales ProtectToolkit 5.9.1 Скачать руководство пользователя страница 78](http://html1.mh-extra.com/html/thales/protecttoolkit-5-9-1/protecttoolkit-5-9-1_installation-and-configuration-manual_1099198078.webp)
Chapter 4: ProtectToolkit Software Installation
•
ProtectToolkit C SDK:
installs the PTK-C software development platform. Header files are included, in
addition to the
PTK-C Runtime
. Requires the correct
Access Provider
package for your deployment
as a prerequisite.
NOTE
The Runtime and SDK packages cannot be installed concurrently. To switch from one
package to the other, uninstall the package that is no longer required and then install the new
one.
2.
Execute the following as
root
for your selected package (where x.x.x-yy is the PTK version number).
Specify the location you chose for the installation files:
•
ProtectToolkit C Runtime:
# cd /output-unix/Linux64/PTKC_Runtime
rpm -i PTKcprt-x.x.x-yy.x86_64.rpm
•
ProtectToolkit C SDK:
# cd /output-unix/Linux64/hsm_net_server
rpm -i PTKcpsdk-x.x.x-yy.x86_64.rpm
3.
Add the
/opt/safenet/protecttoolkit5/ptk/bin
directory to the execution path and the
/opt/safenet/protecttoolkit5/ptk/lib
directory to the library path. The following commands may be used to
configure your paths for the
sh
(1) shell.
Once installed, the software is ready to use under
/opt/safenet/protecttoolkit5.
To uninstall the ProtectToolkit-C packages manually
Use the
rpm(8)
command with the appropriate package name as a parameter.
# rpm -e PTKcprt
# rpm -e PTKcpsdk
Changing the Cryptoki Provider manually
This section applies to the SDK package only.
Different ProtectToolkit-C Cryptoki provider files are required if an HSM is present (PCI or network mode) or
not (software-only mode).
Both Cryptoki provider files are installed with the SDK package. On Unix/Linux systems, the software-only
Cryptoki provider is made active by default.
To change the default Cryptoki provider selection
Remove the soft-link:
/opt/safenet/protecttoolkit5/ptk/lib/libcryptoki.so or
/opt/safenet/protecttoolkit5/ptk/lib/libcryptoki.a (for AIX)
and recreate it to point to the SafeNet HSM Cryptoki provider. For example, the following shell commands may
be used to enable the HSM (executed as the super-user):
# cd /opt/safenet/protecttoolkit5/ptk/lib
# rm libcryptoki.so
# ln -s libcthsm.so libcryptoki.so
The following shell commands may be used to enable the software emulation (executed as the super-user):
Thales ProtectServer HSM 5.9.1 ProtectServer HSM and ProtectToolkit Installation and Configuration Guide
2021-11-02 08:51:40-04:00 Copyright 2009-2021 Thales Group
78