Oracle Cryptographic Toolkit Programmer's Guide
Release 2.0.3
A54082-01
Library
Product
Contents
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
API Interfaces, 1-5
API Layer, 1-5
C
Concepts
Cryptographic Engine, 3-4
Detached Signature, 3-4
Entity, 3-4
Enveloping, 3-4
Identity, 3-4
Persona, 3-4
Personal Resource Locator, 3-4
Protection Set, 3-5
Recipient Oriented Encryption, 3-5
Signature, 3-5
Symmetric Encryption, 3-5
Toolkit Data Unit, 3-5
Trust Point, 3-6
Wallet, 3-6
concepts
security, 3-2
Cryptographic Engine functions, 1-5
D
data structures, 2-3
data type names, 2-2
Definitions
Authentication, 3-2
Authorization, 3-2
Certificate, 3-2
Certificate Authority, 3-2
Confidentiality, 3-2
Cryptography, 3-2
Decryption, 3-2
Encryption, 3-3
Integrity, 3-3
Non-repudiation, 3-3
Oracle Cryptographic Toolkit, 1-4
Oracle Security Server, 1-2
Public/Private Key Pair, 3-3
Public-Key Encryption, 3-3
X.509, 3-3
E
Elements
Cryptographic Toolkit, 1-8
Examples
Generate a detached signature for an array of bytes, 4-5
Random Number Generator, 5-2
Using the signature and PK encryption features, 4-10
F
Features
Oracle Security Server, 1-2
Functions, 1-5
Cryptographic Engine, 1-5
OCI, 5-1
nztSign, 5-8
OCISecurityClosePersona, 5-7
OCISecurityCloseWallet, 5-5
OCISecurityHash, 5-15
OCISecurityInitBlock, 5-19
OCISecurityInitialize, 5-2
OCISecurityOpenPersona, 5-6
OCISecurityOpenWallet, 5-4
OCISecurityPurgeBlock, 5-21
OCISecurityRandomBytes, 5-17
OCISecurityRandomNumber, 5-18
OCISecurityReuseBlock, 5-20
OCISecuritySeedRandom, 5-16
OCISecuritySetBlock, 5-22
OCISecuritySignDetached, 5-12
OCISecurityTerminate, 5-3
OCISecurityValidate, 5-11
OCISecurityVerify, 5-9
OCISecurityVerifyDetached, 5-13
Persona/Identity, 1-7
PL/SQL
Data Encryption, 6-12
Digital Signature, 6-7
General Purpose, 6-2
Hash, 6-21
Random Number Generation, 6-24
Use Oracle Wallet, 6-3
Wallet, 1-7
functions
Oracle Call Interface, 5-1
I
Interfaces
Oracle call interface, 1-10
PL/SQL, 1-10
M
Mapping
Exceptions, D-4
Mappings
Overview, D-2
N
names of datatypes, 2-2
O
OCI functions
nztSign, 6-8,
6-9,
6-10,
6-11,
6-13,
6-14,
6-15,
6-16,
6-17,
6-18,
6-19,
6-20,
6-22,
6-23,
6-24
P
preface
Send Us Your Comments, ix
Prefixes
data type names, 2-2
Program Flow, 4-2
Programming Steps
Interface with the Oracle Security Server, 4-3
Programming steps, 4-2
R
Random Number Generator, 5-2
Example, 5-2
Functions, 5-2
Relationship, 1-4
Relationship
between Oracle Cryptographic Toolkit and Oracle Security Server Services, 1-10
S
Sample
PL/SQL Program, C-2
security concepts, 3-2
Send Us Your Comments
boilerplate, ix
structure
of data, 2-3
T
The, 1-4,
1-7
Toolkit
Elements, 1-8
Prev
Copyright © 1997 Oracle Corporation.
All Rights Reserved.
Library
Product
Contents