Oracle Cryptographic Toolkit Programmer's Guide
Release 2.0.3

A54082-01

Library

Product

Contents

Prev

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 


A

API Interfaces, 1-5
API Layer, 1-5

C

Concepts
Cryptographic Engine, 3-4
Detached Signature, 3-4
Entity, 3-4
Enveloping, 3-4
Identity, 3-4
Persona, 3-4
Personal Resource Locator, 3-4
Protection Set, 3-5
Recipient Oriented Encryption, 3-5
Signature, 3-5
Symmetric Encryption, 3-5
Toolkit Data Unit, 3-5
Trust Point, 3-6
Wallet, 3-6
concepts
security, 3-2
Cryptographic Engine functions, 1-5

D

data structures, 2-3
data type names, 2-2
Definitions
Authentication, 3-2
Authorization, 3-2
Certificate, 3-2
Certificate Authority, 3-2
Confidentiality, 3-2
Cryptography, 3-2
Decryption, 3-2
Encryption, 3-3
Integrity, 3-3
Non-repudiation, 3-3
Oracle Cryptographic Toolkit, 1-4
Oracle Security Server, 1-2
Public/Private Key Pair, 3-3
Public-Key Encryption, 3-3
X.509, 3-3

E

Elements
Cryptographic Toolkit, 1-8
Examples
Generate a detached signature for an array of bytes, 4-5
Random Number Generator, 5-2
Using the signature and PK encryption features, 4-10

F

Features
Oracle Security Server, 1-2
Functions, 1-5
Cryptographic Engine, 1-5
OCI, 5-1
nztSign, 5-8
OCISecurityClosePersona, 5-7
OCISecurityCloseWallet, 5-5
OCISecurityHash, 5-15
OCISecurityInitBlock, 5-19
OCISecurityInitialize, 5-2
OCISecurityOpenPersona, 5-6
OCISecurityOpenWallet, 5-4
OCISecurityPurgeBlock, 5-21
OCISecurityRandomBytes, 5-17
OCISecurityRandomNumber, 5-18
OCISecurityReuseBlock, 5-20
OCISecuritySeedRandom, 5-16
OCISecuritySetBlock, 5-22
OCISecuritySignDetached, 5-12
OCISecurityTerminate, 5-3
OCISecurityValidate, 5-11
OCISecurityVerify, 5-9
OCISecurityVerifyDetached, 5-13
Persona/Identity, 1-7
PL/SQL
Data Encryption, 6-12
Digital Signature, 6-7
General Purpose, 6-2
Hash, 6-21
Random Number Generation, 6-24
Use Oracle Wallet, 6-3
Wallet, 1-7
functions
Oracle Call Interface, 5-1

I

Interfaces
Oracle call interface, 1-10
PL/SQL, 1-10

M

Mapping
Exceptions, D-4
Mappings
Overview, D-2

N

names of datatypes, 2-2

O

OCI functions
nztSign, 6-8, 6-9, 6-10, 6-11, 6-13, 6-14, 6-15, 6-16, 6-17, 6-18, 6-19, 6-20, 6-22, 6-23, 6-24

P

preface
Send Us Your Comments, ix
Prefixes
data type names, 2-2
Program Flow, 4-2
Programming Steps
Interface with the Oracle Security Server, 4-3
Programming steps, 4-2

R

Random Number Generator, 5-2
Example, 5-2
Functions, 5-2
Relationship, 1-4
Relationship
between Oracle Cryptographic Toolkit and Oracle Security Server Services, 1-10

S

Sample
PL/SQL Program, C-2
security concepts, 3-2
Send Us Your Comments
boilerplate, ix
structure
of data, 2-3

T

The, 1-4, 1-7
Toolkit
Elements, 1-8


Prev
Oracle
Copyright © 1997 Oracle Corporation.

All Rights Reserved.

Library

Product

Contents