Oracle Cryptographic Toolkit Programmer's Guide
Release 2.0.4

A54082-02

Library

Product

Contents

Prev

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 


A

API Interfaces, 1-5
API Layer, 1-5
Attached sign/verify, 1-5

C

Certificate Authority (CA), 1-2
Certificate Management Services, 1-3
Certificate Revocation List (CRL), 1-3
Checksums
generating, 7-12
Concepts
Cryptographic Engine, 3-4
Detached Signature, 3-4
Entity, 3-4
Enveloping, 3-4
Identity, 3-4
Persona, 3-4
Personal Resource Locator, 3-4
Protection Set, 3-5
Recipient Oriented Encryption, 3-5
security, 3-2
Signature, 3-5
Symmetric Encryption, 3-5
Toolkit Data Unit, 3-5
Trust Point, 3-6
Wallet, 3-6
Cryptographic Engine functions, 1-5

D

data structures, 2-5
Data type names, 2-2
DBMS_RANDOM, 7-15
Definitions
Authentication, 3-2
Authorization, 3-2
Certificate, 3-2
Certificate Authority, 3-2
Confidentiality, 3-2
Cryptography, 3-2
Decryption, 3-2
Encryption, 3-3
Integrity, 3-3
Non-repudiation, 3-3
Oracle Cryptographic Toolkit, 1-4
Oracle Security Server, 1-2
Public/Private Key Pair, 3-3
Public-Key Encryption, 3-3
X.509, 3-3
Detached sign/verify, 1-6
Digital signatures
PL/SQL routines for, 7-7

E

Examples
Generate a detached signature for an array of bytes, 4-5
Random Number Generator, 5-2

F

Features
Oracle Security Server, 1-2
Functions
Cryptographic Engine, 1-5
OCI, 6-1
OCISecurityClosePersona, 6-7
OCISecurityCloseWallet, 6-5
OCISecurityHash, 6-15
OCISecurityInitBlock, 6-19
OCISecurityInitialize, 6-2
OCISecurityOpenPersona, 6-6
OCISecurityOpenWallet, 6-4
OCISecurityPurgeBlock, 6-21
OCISecurityRandomBytes, 6-17
OCISecurityRandomNumber, 6-18
OCISecurityReuseBlock, 6-20
OCISecuritySeedRandom, 6-16
OCISecuritySetBlock, 6-22
OCISecuritySign, 6-8
OCISecuritySignDetached, 6-12
OCISecurityTerminate, 6-3
OCISecurityValidate, 6-11
OCISecurityVerify, 6-9
OCISecurityVerifyDetached, 6-13
Oracle Call Interface. See Functions
OCI
Persona/Identity, 1-6
PL/SQL
Digital Signature, 7-7
General Purpose, 7-2
Hash, 7-12
Random Number Generation, 7-15
Use Oracle Wallet, 7-3
Wallet, 1-6

H

Hash, 1-6

I

Identity
definition of, 1-7
Interfaces
Oracle call interface, 1-10
PL/SQL, 1-10

K

Keyed hash, 1-6

M

Mapping
Exceptions, B-3
Overview, B-2

O

Oracle Call Interface, 1-10
Oracle Enterprise Manager, 1-3
Oracle Security Server Manager, 1-3

P

Persona
definition of, 1-8
PL/SQL functions
AbortIdentity, 7-5
ClosePersona, 7-4
CloseWallet, 7-3
CreateIdentity, 7-5
CreatePersona, 7-4
DestroyWallet, 7-3
iInitialize, 7-2
OpenPersona, 7-4
OpenWallet, 7-2
RemoveIdentity, 7-5
RemovePersona, 7-4
StorePersona, 7-3
StoreTrustedIdentity, 7-6
Terminate, 7-2
Validate, 7-6
PL/SQL interface, 1-10
PL/SQL routines
Hash, 7-14
KeyedHash, 7-13
Random, 7-15
SeedRandom, 7-15
Sign, 7-8
SignDetached, 7-10
Verify, 7-9
VerifyDetached, 7-11
Prefixes
data type names, 2-2
Program Flow, 4-2
Programming Steps
Interface with the Oracle Security Server, 4-3

R

Random Number Generator, 5-2
Example, 5-2
Functions, 5-2
Relationship
between Oracle Cryptographic Toolkit and Oracle Security Server Services, 1-9

S

Sample
PL/SQL Program, A-2
Security concepts, 3-2
Signatures
DSS, 1-5
RSA, 1-5

T

Toolkit
Elements of, 1-7
Trusted Identity
definition of, 1-8

W

Wallet
definition of, 1-9

X

X.509 v1 Certificate, 1-2


Prev
Oracle
Copyright © 1997 Oracle Corporation.

All Rights Reserved.

Library

Product

Contents