Oracle Cryptographic Toolkit Programmer's Guide Release 2.0.3 A54082-01 |
|
This chapter discusses Oracle Cryptographic Toolkit external datatype codes. The following topics are covered:
Each data type name and its corresponding data type prefix used in the Oracle Cryptographic Toolkit is listed as a subheading below. The table below each subheading lists the possible data type values and their corresponding descriptions.
Each data type used in the Oracle Cryptographic Toolkit has a unique prefix. Following is a list of Oracle Cryptographic Toolkit data type names and prefixes.
nzttces
NZTTCES_CONTINUE |
Continue processing input |
NZTTCES_END |
End processing input |
NZTTCES_RESET |
Reset processing and skip generating output |
nzttid
nzttID |
Unique IDs for personas and identities represented with 128 bits |
nztttstamp
nzttTStamp |
Timestamp as a 32 bit quantity in UTC |
Following is a list of Oracle Cryptographic Toolkit data structures. Each data structure is listed along with a brief description.
A function uses an output parameter block to describe each buffer when that function needs to fill (and possibly grow) an output buffer. The flags_nzttBufferBlock member tells the function whether the buffer can be grown. The buffer is automatically reallocated when flags_nzttBufferBlock is 0.
The buflen_nzttBufferBlock member is set to the length of the buffer before the function is called and equals the length of the buffer when the function is finished. If buflen_nzttBufferBlock is 0, then the initial pointer stored in buflen_nzttBufferBlock is ignored.
The usedlen_nzttBufferBlock member is set to the length of the object stored in the buffer when the function is finished. If the initial buffer had a non zero length, then it is possible that the object length is shorter than the buffer length.
The buffer_nzttBufferBlock member is a pointer to the output object. Refer to Table 2-3, "nzttBufferBlock".
The wallet structure contains one or more personas. Each of these personas contains its private key, its identity, and trusted third party identities. All identities are qualified with trust where the qualifier can indicate anything from untrusted to trusted for specific operations. Refer to Table 2-4, "nzttWallet".
The persona structure contains information about a persona. Refer to Table 2-5, "nzttPersona".
The identity structure contains information about an identity. Refer to Table 2-6, "nzttIdentity".