Oracle Cryptographic Toolkit Programmer's Guide 2.0.4

Read Online or Download Oracle Cryptographic Toolkit Programmer's Guide 2.0.4 PDF

Best databases books

Teradata RDBMS SQL/Data Dictionary Quick Reference

This booklet is a short reference for the SQL dialect supported by way of the Teradata Relational Database administration method. The ebook can also be a short connection with the supported information description words for the Teradata RDBMS and the information Dictionary. The viewers for this speedy reference is all clients of Teradata SQL who want quickly, non-detailed information regarding the way to constitution a SQL assertion.

Access Forms & Reports For Dummies

Create queries that make types and stories necessary strengthen kinds to entry the information you wish and make studies that make feel! should you inspiration you needed to use a spreadsheet application to provide studies and types, bet what! entry can end up great-looking types and reviews that really express what is going on along with your facts -- in case you know the way to invite it properly.

Extra resources for Oracle Cryptographic Toolkit Programmer's Guide 2.0.4

Example text

Table 6–9 OCISecuritySign parameters Parameter Name Description Mode Type OCISecurity osshandle OCIError error_handle persona Open persona acting as signer {IN} nzttPersona signature_state State of the signature {IN} nzttces input_length Length of this input part {IN} sizt_t input This input part {OUT} ub1 buffer_block TDU buffer {IN/OUT} nzttBufferBlock Comments This function generates a signature that consists of a cryptographic checksum of the data to be signed: encrypted with the private key of the signing persona.

Table 2–6 nzttIdentity Type Name Description size_t aliaslen_nzttIdentity Length of alias text alias_nzttIdentity Alias size_t commentlen_nzttIdentity Length of comment text comment_nzttIdentity Comment nzttIdentityPrivate private_nzttIdentity Opaque part of identity 2-6 Oracle Cryptographic Toolkit Programmer’s Guide 3 Concepts This chapter discusses concepts behind the Oracle Cryptographic Toolkit. 1 Security Concepts Following is a list of security concepts used in this document. 1, “Oracle Security Server Features”, for an explanation of how these concepts apply to the Oracle Cryptographic Toolkit.

Table 6–12 OCISecurityValidate parameters Parameter Name Description Mode Type OCISecurity osshandle OCIError error_handle persona Persona {IN} nzttPersona identity Identity {IN} nzttIdentity validated TRUE if identity was validated {OUT} boolean Comments An identity is validated for trust and to verify that it has not expired. Returns Following is a list of possible error codes returned by this function.

Download PDF sample

Rated 4.61 of 5 – based on 11 votes