If you created a keystore using a password-based encryption cipher for the database master key, you can reconstruct the keystore in the event that the keystore is deleted or corrupted. Keystores created with any other master key cipher cannot be reconstructed. The following example shows the reconstruction of a keystore with a PBE passphrase:

proenv>proutil pbe_db -C epolicy manage keystore reconstruct
OpenEdge Release 10.2B1P as of Fri Nov 20 19:01:52 EST 2009
This command modifies encryption access control in the keystore file. After suc
cessful completion of the command, the keystore file must be backed-up. (15518
Enter PBE passphrase [required] :

Please Retype your Passphrase for Verification
Enter PBE passphrase [required] :

Enter administrator passphrase [required] :

Please Retype your Passphrase for Verification
Enter administrator passphrase [required] :

Key store Reconstruct Completed. (15516)

proenv>

If your database uses HSM as a second layer of TDE authentication, see Reconstruct a keystore secured with HSM.