Oracle Cryptographic Toolkit Programmer's Guide
Release 2.0.4
A54082-02
Library
Product
Contents
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
API Interfaces, 1-5
API Layer, 1-5
Attached sign/verify, 1-5
C
Certificate Authority (CA), 1-2
Certificate Management Services, 1-3
Certificate Revocation List (CRL), 1-3
Checksums
generating, 7-12
Concepts
Cryptographic Engine, 3-4
Detached Signature, 3-4
Entity, 3-4
Enveloping, 3-4
Identity, 3-4
Persona, 3-4
Personal Resource Locator, 3-4
Protection Set, 3-5
Recipient Oriented Encryption, 3-5
security, 3-2
Signature, 3-5
Symmetric Encryption, 3-5
Toolkit Data Unit, 3-5
Trust Point, 3-6
Wallet, 3-6
Cryptographic Engine functions, 1-5
D
data structures, 2-5
Data type names, 2-2
DBMS_RANDOM, 7-15
Definitions
Authentication, 3-2
Authorization, 3-2
Certificate, 3-2
Certificate Authority, 3-2
Confidentiality, 3-2
Cryptography, 3-2
Decryption, 3-2
Encryption, 3-3
Integrity, 3-3
Non-repudiation, 3-3
Oracle Cryptographic Toolkit, 1-4
Oracle Security Server, 1-2
Public/Private Key Pair, 3-3
Public-Key Encryption, 3-3
X.509, 3-3
Detached sign/verify, 1-6
Digital signatures
PL/SQL routines for, 7-7
E
Examples
Generate a detached signature for an array of bytes, 4-5
Random Number Generator, 5-2
F
Features
Oracle Security Server, 1-2
Functions
Cryptographic Engine, 1-5
OCI, 6-1
OCISecurityClosePersona, 6-7
OCISecurityCloseWallet, 6-5
OCISecurityHash, 6-15
OCISecurityInitBlock, 6-19
OCISecurityInitialize, 6-2
OCISecurityOpenPersona, 6-6
OCISecurityOpenWallet, 6-4
OCISecurityPurgeBlock, 6-21
OCISecurityRandomBytes, 6-17
OCISecurityRandomNumber, 6-18
OCISecurityReuseBlock, 6-20
OCISecuritySeedRandom, 6-16
OCISecuritySetBlock, 6-22
OCISecuritySign, 6-8
OCISecuritySignDetached, 6-12
OCISecurityTerminate, 6-3
OCISecurityValidate, 6-11
OCISecurityVerify, 6-9
OCISecurityVerifyDetached, 6-13
Oracle Call Interface.
See
Functions
OCI
Persona/Identity, 1-6
PL/SQL
Digital Signature, 7-7
General Purpose, 7-2
Hash, 7-12
Random Number Generation, 7-15
Use Oracle Wallet, 7-3
Wallet, 1-6
H
Hash, 1-6
I
Identity
definition of, 1-7
Interfaces
Oracle call interface, 1-10
PL/SQL, 1-10
K
Keyed hash, 1-6
M
Mapping
Exceptions, B-3
Overview, B-2
O
Oracle Call Interface, 1-10
Oracle Enterprise Manager, 1-3
Oracle Security Server Manager, 1-3
P
Persona
definition of, 1-8
PL/SQL functions
AbortIdentity, 7-5
ClosePersona, 7-4
CloseWallet, 7-3
CreateIdentity, 7-5
CreatePersona, 7-4
DestroyWallet, 7-3
iInitialize, 7-2
OpenPersona, 7-4
OpenWallet, 7-2
RemoveIdentity, 7-5
RemovePersona, 7-4
StorePersona, 7-3
StoreTrustedIdentity, 7-6
Terminate, 7-2
Validate, 7-6
PL/SQL interface, 1-10
PL/SQL routines
Hash, 7-14
KeyedHash, 7-13
Random, 7-15
SeedRandom, 7-15
Sign, 7-8
SignDetached, 7-10
Verify, 7-9
VerifyDetached, 7-11
Prefixes
data type names, 2-2
Program Flow, 4-2
Programming Steps
Interface with the Oracle Security Server, 4-3
R
Random Number Generator, 5-2
Example, 5-2
Functions, 5-2
Relationship
between Oracle Cryptographic Toolkit and Oracle Security Server Services, 1-9
S
Sample
PL/SQL Program, A-2
Security concepts, 3-2
Signatures
DSS, 1-5
RSA, 1-5
T
Toolkit
Elements of, 1-7
Trusted Identity
definition of, 1-8
W
Wallet
definition of, 1-9
X
X.509 v1 Certificate, 1-2
Prev
Copyright © 1997 Oracle Corporation.
All Rights Reserved.
Library
Product
Contents