Top Banner

Click here to load reader

a54082[1]

Oct 10, 2014

ReportDownload

Documents

matakito

Oracle Cryptographic Toolkit

Programmers Guide

Release 2.0.4

October 1997 Part No. A54082-02

.

Oracle Cryptographic Toolkit Programmers Guide Part No. A54082-02 Release 2.0.4 Copyright 1996, 1997, Oracle Corporation. All rights reserved. Printed in the U.S.A Primary Author: Gilbert Gonzalez Andre Srinivasan, Richard Wessman

Contributing Authors:

Contributors: Paul Lambert, Patricia Markee, Kendall Scott, Sandy Venning The programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be licensee's responsibility to take all appropriate fail-safe, back up, redundancy and other measures to ensure the safe use of such applications if the Programs are used for such purposes, and Oracle disclaims liability for any damages caused by such use of the Programs. This Program contains proprietary information of Oracle Corporation; it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright patent and other intellectual property law. Reverse engineering of the software is prohibited. The information contained in this document is subject to change without notice. If you nd any problems in the documentation, please report them to us in writing. Oracle Corporation does not warrant that this document is error free. If this Program is delivered to a U.S. Government Agency of the Department of Defense, then it is delivered with Restricted Rights and the following legend is applicable: Restricted Rights Legend Programs delivered subject to the DOD FAR Supplement are 'commercial computer software' and use, duplication and disclosure of the Programs shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement. Otherwise, Programs delivered subject to the Federal Acquisition Regulations are 'restricted computer software' and use, duplication and disclosure of the Programs shall be subject to the restrictions in FAR 52..227-14, Rights in Data -- General, including Alternate III (June 1987). Oracle Corporation, 500 Oracle Parkway, Redwood City, CA 94065.

This product contains security software from RSA Data Security, Inc. Copyright 1994 RSA Data Security, Inc. All rights reserved. This version supports International Security with RSA Public Key Cryptography, MD2, MD5, and RC4. This product contains encryption and/or authentication engines from RSA Data Security, Inc. Copyright 1996 RSA Data Security, Inc. All rights reserved. Oracle and SQL*Plus are registered trademarks of Oracle Corporation, Redwood City, California. Oracle Security Server, Oracle Enterprise Manager, Oracle Call Interface, Net8, PL/SQL, and Oracle8 are trademarks of Oracle Corporation, Redwood City, California. All other product or company names are used for identication purposes only, and may be trademarks of their respective owners.

PrefacePurposeThe Oracle Cryptographic Toolkit Programmers Guide provides independent application programmers with programming interfaces to the services provided by the Oracle Security Server.

Intended AudienceThe Oracle Cryptographic Toolkit Programmers Guide is designed to be used by both Oracle and non-Oracle application programmers who require an interface to the services provided by the Oracle Security Server. This document assumes that the reader is familiar with the functionality of the Oracle Security Server, as described in the Oracle Security Server Guide.

StructureThis manual contains three parts, seven chapters, and two appendices. Part I Chapter 1 Concepts The Concepts chapters contain the following information: Overview Provides denitions of the Oracle Security Server and the Oracle Cryptographic Toolkit and states the purpose of this Programmers Guide Data Types Discusses public functions, data types, and data structures Concepts Discusses general security concepts and Oracle Cryptographic Toolkit concepts

Chapter 2 Chapter 3

iii

Chapter 4 Chapter 5 Part II Chapter 6

Using the Oracle Cryptographic Toolkit Shows you how to program using the Oracle Cryptographic Toolkit Random Number Generator Shows users how to generate random data for their applications Reference The Reference chapters contain the following information: OCI Functions for C Describes each Oracle Call Interface (OCI) function in the Oracle Cryptographic Toolkit PL/SQL Functions Describes each PL/SQL function in the Oracle Cryptographic Toolkit Appendices The Appendices contain reference information, including sample C programs, sample PL/SQL programs, and OCI - API function mappings. Sample PL/SQL Code Contains sample PL/SQL programs OCI - API Mappings Lists each OCI function that is directly mapped to an API function Lists terms, abbreviations, and denitions used in this guide

Chapter 7 Part III

Appendix A Appendix B Glossary

Related DocumentsFor more information, see the following manuals:s

Oracle8TM Server Application Developers Guide Oracle Security ServerTM Guide Programmers Guide to the Oracle Call InterfaceTM

s

s

iv

ConventionsThe following conventions are used in this manual:Convention Meaning Code examples and data type names are displayed in monospace font. Names of related manuals are displayed in italic font.

monospace italic

v

vi

Send Us Your CommentsOracle Cryptographic Toolkit Programmers Guide Part No. A54082-02 Oracle Corporation welcomes your comments and suggestions on the quality and usefulness of this publication. Your input is an important part of the information used for revision.s s s s s

Did you nd any errors? Is the information clearly presented? Do you need more information? If so, where? Are the examples correct? Do you need more examples? What features did you like most about this manual?

If you nd any errors or have any other suggestions for improvement, please indicate the chapter, section, and page number (if available). You can send comments to us in the following wayss s

electronic mail: [email protected] postal service: Oracle Corporation Documentation Manager: Enterprise Application Services 500 Oracle Parkway Redwood City CA 94065 USA

If you would like a reply, please give your name, address, and telephone number below.

ContentsPreface............................................................................................................................................................ iii Send Us Your Comments .................................................................................................................. vii Part I Concepts 1 Overview1.1 1.1.1 1.2 1.3 1.3.1 1.3.2 1.3.3 1.3.4 1.4 1.4.1 1.4.2 1.4.3 1.4.4 1.5 1.5.1 1.5.2 What is the Oracle Security Server?........................................................................................ 2 Oracle Security Server Features ....................................................................................... 2 What is the Oracle Cryptographic Toolkit?........................................................................... 4 Oracle Cryptographic Toolkit Functional Layers................................................................. 5 API Layer............................................................................................................................. 5 Cryptographic Engine Functions..................................................................................... 5 Persona/Identity Functions.............................................................................................. 6 Wallet Functions................................................................................................................. 6 Oracle Cryptographic Toolkit Elements ................................................................................ 7 Identity................................................................................................................................. 7 Trusted Identity.................................................................................................................. 8 Persona................................................................................................................................. 8 Wallet ................................................................................................................................... 9 Types of Interfaces .................................................................................................................. 10 Oracle Call Interface ........................................................................................................ 10 PL/SQL Interface ............................................................................................................. 10

ix

2

Data Types2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.1.7 2.1.8 2.1.9 2.2 2.2.1 2.2.2 2.2.3 2.2.4 Data Types .................................................................................................................................. Name Prefixes ..................................................................................................................... Crypto Engine State ........................................................................................................... Crypto Engine Functions................................................................................................... Identity Type....................................................................................................................... Cipher Types ....................................................................................................................... TDU Formats......................................................................................................................