Tiny Encrytion Algorithm (TEA)

Hi Guys!
I am currently developing the Tiny Encrytion Algorithm
Currenlty is takes in a number to encrytp and works fine but I want to ammend this so it takes in a string.
My current "get" method is as follows:
public void getNumber() {
        BufferedReader br = new BufferedReader(new InputStreamReader(System.in));
        int count = 0, idx = 0;
        try {
            String number = br.readLine();
            while (count <= 1) {
                num_array[count++] = Integer.parseInt(number.substring(idx, idx + 2));
                idx += 2;
        } catch (IOException ex) {
            ex.printStackTrace();
        } catch (NumberFormatException ex) {
            ex.printStackTrace();
            System.out.println("You have entered an invalid number");
    }How do I go about amending this to take in a String, but still cut it up and save it to an Integer array? (The integer array is required for the encrytion process at a later stage).
So in other words, i need to get from String to Integer, while cutting it up!!
I have played about with the charAt() and toBytes() method but i'm just going round in circles! :(
Cheers!!!
Edited by: smitty350z on Oct 31, 2007 4:49 AM

HI Sabre,
Thanks so much for the immediate reply. I can paste the entire equivalent TEA algorithm that i wrote in java script. That didnt work, then i tried the Java side, bcos eventually i can call it from java script. The main task is to embed the script in to my load test runner. For your reference, please see below the java script equivalent that was written, and debugiing this a big nightmare. Sorry for the format of the javascript codes, its a bit annoying.
Thanks so much
function encrypt(src, key, token) {
          if(src.length == 0) return "";
alert("strToChars(src):" + strToChars(src));
alert("charsToLongs(strToChars(src)):" + charsToLongs(strToChars(src)));
alert("hexToChars(key):" + hexToChars(key));
alert("charsToLongs(hexToChars(key)):" + charsToLongs(hexToChars(key)));
          var v = charsToLongs(strToChars(src));
          var k = charsToLongs(hexToChars(key));
          var n = v.length;
          if (n % 2==1) v[n++] = 0;
          tempv = new Array(2);
          newv = new Array(v.length);
          for (i=0; i<v.length; i=i+2){
               tempv = tea_code(k,v,v[i+1]);
               newv[i] = tempv[0];
               newv[i+1] = tempv[1];
          var encStr = charsToHex(longsToChars(newv));
alert("encStr"+ encStr);
          return [key,(token + encStr)];
function strToChars(src) {
     var codes = [];
     var strArr = src.split("");
     strArr1 = new String(strArr);
     var sl = strArr.length;
     var cnt = 0;
     var schar="";
     var intStringLen=strArr1.length;
     for (var intCur = 0; intCur < intStringLen; intCur++) {
          codes[intCur] = strArr1.charCodeAt(intCur);
     return codes;
function charsToLongs(chars) {
     var tlength = Math.ceil(chars.length/4);
     var temp = [];
     var ti = 0;
     for(var i = 0; i<tlength; i++){
          ti = i*4;
          temp[i] = (((chars[ti] << 24) + (chars[ti+1]<<16)) + (chars[ti+2]<<8)) + chars[ti+3];
     return temp;
function hexToChars(hex) {
          var codes = [];
          var hexArr = hex.split("");
          var hl = hexArr.length/2;
          for(var i=0;i<hl;i++) {
//               codes[i] = int("0x"+hexArr[i*2]+hexArr[(i*2)+1]);
               codes[i] = Math.round("0x"+hexArr[i*2]+hexArr[(i*2)+1]);
          return codes;
function tea_code (k,y,z) {
     sum = 0;n = 32;
     //while (sum != -957401312) {
     while (n-- >= 0) {
          y = Math.round(y + ((((z << 4) ^ (z >>> 5)) + z) ^ (sum + k[sum & 3]))); y = y|0 ;
          sum = Math.round(sum + 0x9E3779B9);
          sum = sum|0;
          z = Math.round(z + ((((y << 4) ^ (y >>> 5)) + y) ^ (sum + k[(sum >>> 11) & 3]))); z = z|0 ;
     return [y,z];

Similar Messages

  • The Java source for TEA (Tiny Encryption Algorithm)

    Hi,
    I'm looking for the Java implementation for both encode and decode routines for TEA.
    I did them in C but I used "unsigned" modifier for data because I have to perform the left shift.
    Of course, I'll be happy if someone can give me a solution for the simulation of an "unsigned" int in Java.
    Thanks a lot!

    For simulating unsigned int:int signedInt = -2001;
    long unsigned = signedInt & 0xffffffff;

  • How to implement Tiny Encryption Algorithm

    hi all,
    I am new to this cryptography, I need to implement the TinyEncryption Algorithm in MIDlet.
    Can anybody please give me some suggetions or Examples, which were explaining the Algorithm.
    Please help it was more important for me
    Thanks in advance
    lakshman

    Here's a page with plenty of TEA info:
    http://www.simonshepherd.supanet.com/tea.htm
    But TEA has some known weaknesses so you'd be better
    off with XTEA.
    http://www.simonshepherd.supanet.com/XTEA_java_td.txt
    There seems to be a newer version called XXTEA,
    I couldnt find it in java, but its on this page in javascript:
    http://www.farfarfar.com/scripts/encrypt/

  • Tiny bit of tea spilled on my MacBook Air

    ok I was at a coffee shop and I took a sip of my full tea and accidentally spilled about 2 teaspoons of it on my macbook. I have a plastic cover over the whole thing including the keyboard. Most of the tea spilt on to the keyboard and some got in between where the keyboard and screen meets. I wiped it down quickly with a napkin because everything was really on my plastic cover I really thought it would be fine. It was such a small amount. I continued to use my computer just fine for another 30 minutes, shut it, packed it up and went home. When I got home I noticed that a small amount of water had gotten in between my case and the computer on both the top and bottom. I think it leaked through when it got in the middle. I'm talking a small small amount. Anyway, my computer then wouldn't power on and when I plugged it in no green light came up. I know it's not good to try and power it on or charge it but I didn't even know it wasn't going to work because it was just working for a good amount of time after I spilt it. I now have it soaking in rice. It's such a small amount do you guys think the rice will fix it based on what happened? Thanks.

    liquid spills very rarely end in good news.  You need to take it somewhere to have it looked at.  You should not turn it back on until then.

  • Tiny Encryption Algorithm problem

    I am trying to use the tiny encryption alrorithm in some code
    (TEAV can be found at http://www.jars.com/classes/jresout.cgi?resource=4325).
    I try and run the example that is in the static main function of the TEAV.java (without modifying the source at all) and the decoded string is not the same as the encoded string.
    Is there an error in this code or am I doing something wrong?
    any help would be much appreciated
    --Evan                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

    I emailed the author of TEAV.java and his response was this:
    There was a '>>' where there should have been a '>>>' in line 220.
    It should have looked similar to the calculation for 'z'.
    I haven't had time to test it yet but I assume it works
    --Evan                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

  • Could someone tell me where to look?

    Ok here is my idea - I want to create a program that sniffs packets coming into my computer from an online Poker Server. I want to read the cards in my hand and in the flop with this program. Im starting to read and learn about sockets, but my question is, since im logged in to my poker program, wouldnt my java program need to be 'logged on' as well, to be able to 'see' my cards? i know it must be posible, but so far studying sockets i have seen nothing about logins/passwords. can someone point me in the right direction to some materials to study? Im confused about security i guess. Sorry for being such a n00b and wasting your time! :D

    This is complicated. You shouldn't be worrying about logins/passwords yet. The first thing you need to do is to examine the packets the program and the server are exchanging. Several years ago I looked into programs that did this, but don't remember much about them. Start googling and you can find a program to just log the packets going in and out of a port. Then you are going to need to learn to read those packets, so you are going to need some way to correlate what is happening on the screen with what is going over the port. So you are going to have to somehow log what is happening on the screen. Maybe the easiest would be some kind of screen capture program. You press ctrl-alt-printscrn and the screen gets logged to a file.
    Now you have to sit down & figure out what it means. I would bet you aren't the first person to think of this, so there is a very good chance the messages being passed back and forth are encrypted. If this is the case, you are going to need to figure out the encryption algorithm. Unless you are some kind of codebreaker, the only clue you have is the program they sent you. Open it up in a debugger (a good one) and start figuring out where the code for the encrytion algorithm is. It might not be a good idea to go online and do this too much (although it's probably necessary) because they are going to get suspicious when they see a lot of 'broken' messages coming from you. If it's not encrypted, the job of figuring out the format is much easier.
    Now that you know what the packets look like, you could write a program to listen to each side of the conversation between the program they gave you and the server and convert the binary messages into some kind of readable format. You do this as a proof of concept so that your program understands the meaning of what is going back and forth. To do this, you are going to need to get 'in between' the program and the server. You can either do this by putting code on a single machine or 'routing' it though another machine. If you put code on a single machine, there are a couple ways to do it. The simplest in Java would be to route the messages through one port, process them with your java program and then pass them out through another port which is being used by the poker program. This may or may not be possible depending on the poker program. You can also 'hook' the port and process the message 'on the fly', but this is beyond the capabilities of Java. You would have to use something like C++ for this.
    The other option is to use two machines. One is just a 'pass through' for the packets and the other just runs the regular poker program. The 'pass through' machine contains your java program.
    Now your job is to get the java program to emulate the poker program. You could start out simply by figuring out when it was obvious to fold. So the only thing the 'pass through' program does is auto-fold. You start adding features to it including the username/password deal you started out on.
    It's probably a good idea if you understand exactly what you are doing before you start any of this because I think that if the poker service gets even the slightest hint that you are doing something like this, they will shut you down like Napster.
    If you are starting to get the idea that this might constitute a lot of work... good, because it will be.

  • My password is not working, its the right one, anyone have any ideas?

    A tiny bit of tea spashed on my keyboard today. I turned it upside down and dried it well, and it seemed to be working-playing music, etc, but laterscreens opening really slowly. I turned it off, turned back on no problem, but now my password no longer opens it up. I'm running a big eco-festival tomorrow, and am pretty stuck without my mac. Not sure about the operating system. I bought it at the very end of 2010.
    Thanks!

    Had similar issue calling Apple seems to be the only way to resolve the problem.  The issue can be resolved when you get to iTunes, since they are the ones that keep  this info. They will ask you your security questions and your purchases software, music etc. Once they are happy with your answers they will get you back up. If you choose you could go the route of forgot my password etc. but I never had any luck with that. Just my 2 cents.
    Steve

  • Cipher suite

    When using JSSE to create SSL socket, are the following items automatically applied?:
    1. Key exchange agreement - Diffie-Hellman
    2. Symmetric Encrytion Algorithms - AES 128 bits
    3. Message Authentication Code (MAC) - HMAC
    4. Message Digest Algorithm - SHA-1
    5. Public algorithm for signing - RSA

    1. Key exchange agreement - Diffie-Hellman
    2. Symmetric Encrytion Algorithms - AES 128 bits
    3. Message Authentication Code (MAC) - HMAC
    4. Message Digest Algorithm - SHA-1
    5. Public algorithm for signing - RSAThe answer to all those is yes, but in each case the actual protocol or algorithm depends on the negotiated cipher suite, which depends on:
    (a) the enabled cipher suites at the client
    (b) the enabled cipher suites at the server
    (c) the available X.50 certificates at the server
    and, if client authentication is enabled at the server
    (d) the available X.509 certificates at the client.

  • Explaination and a simple example on TagExtraInfo class anyone ??

    Hi Guys,
    Could anyone please explain the concept of TagExtraInfo class and give a simple example with code. This one is really urgent !!
    Thanks
    Rasmeet

    Is this a genuine forum topic ? Or are we seeing the birth of some new encrytion algorithm here.
    Assuming its the former,...
    Have you seen http://java.sun.com/j2ee/tutorial/doc/JSPTags5.html#68067

  • Ctrl key seems to be stuck

    Hey
    I am quite desperate and hope someone can help me here.
    My Macbook acts as if the ctrl key is constantly pressed.
    This happened a day after I spilled a tiny bit of tea on the keyboard (first everything seemed to be fine).
    Now the keyboard is strange: Letters dont work but some of the other keys do.
    External Keyboard works perfectly fine.
    When using the Keyboard viewer I can see that when I press of the Letter Keys the key turns grey. So basically they should work.
    By pressing the shift key on the internal keyboard or the enter key on the external following happens:
    sorry I cant use screenshots because we wont be able to see it right then.
    I already took the ctrl key out and checked it. Everything looks clean and right. It really just was a tiny bit of non sweeted tea.
    I have googled this and spend already hours and reading and trying to find a solution to this problem but failed so far.
    Really hope someone can help me.
    It is a late 2009 macbook with OSX 10.7.2
    Thank you in advance

    Hello,
    my father has the same problem. Same machine. He pretends that nothing was spilled over. He has a tiny place where uses his laptop that has not even space to place a cup of beverage beside the computer.
    A little more details: I tried to log out and log in as the admin user but cant give the password. Some keys provoke a chime while typing, others dont.
    While rebooting, Command-Alternate-P-R doesnt seem to work. Pressing Alternate to get into the boot volume chooser does not work. Pressing Command-S to boot into single user mode works, however I cant type any command while in the shell, now fsck, no reboot, nothing. Pressing "R" makes the prompt change to something like "search backwards `´" for a very short moment. I cant reproduce this behaviour in Terminal on my own machine pressing Control-R, so I am not sure what it is.
    The way I came to the conclusion that the machine behaves like the Control key being pressed all time was within Apple Mail typing Command-N to open a new Mail opened a new notice instead. I was not able to close the Window Typing Command-W. I opened the trash can using the mouse and tried to resize the window because there was so much in the trash can but I got a context menu instead when grabbing the title bar. Scrolling with two fingers zoomed the whole Screen instead.
    My father allow my small nephew to install games while in vacation. He even gave him the admin password although I told him not to do so. So my first idea was that he had changed something with the input methods. But then, the strange behaviour would be gone during the boot sequence at least I guess. And I should be able to log in as another user (I always create a separate user for everyday use that has no admin rights).
    I have no firewire cable at hand to reinstall in target mode and -gosh- the MacBook 2009 does not even support this essential function because it has not firewire port, it is a crippled machine. I dont have any idea who to analyze the problem further.
    Please throw some wisdom from heaven.
    Bye, Christian

  • HELP! spilled tea on macbook!

    So the other night I was working on a term paper when suddenly my phone rings.
    And so, without thinking, I quickly went to pick it up.
    But when I did so, I accidently knocked over a cup of tea.
    I use no cream or sugar and it was about half a cup.
    My macbook suddenly shuts down.
    And needless to say, I started panicking!
    I have learned a couple of things on this forum.
    I have flipped it upside down to dry for about 3 days before I turned it on again.
    What happened was, it went to the Apple Sign, but after about 3-4 seconds, it goes into a deep sleep mode. And when I try to turn it back on again, it remains in the deep sleep mode.
    What's wrong with it? Is the logic board fried?
    I checked my battery by pressing the button on the back and it seems to be fully charged.
    Please help! I'm desperate! =(
    MacBook   Mac OS X (10.4.9)  

    It may not be dry yet. Or it may be fried. Really, the only way you're going to find out, besides waiting a few more days, is to take it to Apple. And even if it works again, the acid in tea is, I believe Not a Good Thing.
    That said, a few years ago I spilled about half a cup of water on my beloved tiny Sony. It wouldn't start, and I sent it to Sony, which said it needed an $800 motherboard. The computer was 3 years old, a new one cost about a thousand dollars, and so I bought the new one and Sony returned the old -- which worked just fine when I turned it back on.
    So there is always room for hope, but perhaps not a lot of room...
    Why not wait a few days, try again, and if it doesn't work, try booting from your install disks and check out whether all your hardware is working. If that doesn't work, the only recourse is probably to send it to Apple.

  • Encryption Algorithms

    Hi,
    I use Truecrypt on one of my laptops usin AES encrytion with a 20 complex password.
    There are also Serpent and Twofish algorithms but I went for AES. One could also combine the three one but...
    Is a AES container with a 20 complex password (mixed CAPS and a few !"#¤%&) good enough, how long would it take for NSA to decrypt it?
    If not, shall I go with a more complex password or combine with Serpent and Twofish?
    The speed in and out of the container is reduced with 75% if I go with all three algorithms...

    ftornell wrote:Is a AES container with a 20 complex password (mixed CAPS and a few !"#¤%&) good enough, how long would it take for NSA to decrypt it?
    I believe Bruce Schneier, who is knowledgeable in such matters, once said:
    Assume the NSA can break *anything* they want but not *everything* they want.
    The real question here is what do you have on your hard drive that would be of any interest to the NSA?

  • How to list the available algorithms ?

    Hi,
    I would like to get all the available algorithms so that the user can choose the one he wants.
    Is it possible to write a generic function that can encryt/decrypt a file with an algorithm as parameter
    Because I've got the following problem : I use this code to list the available algorithms :
    public static String[] getCryptoImpls(String serviceType) {       
            Set result = new HashSet();                
            Provider[] providers = Security.getProviders();
            for (int i=0; i<providers.length; i++) {           
                Set keys = providers[ i].keySet();
                for (Iterator it=keys.iterator(); it.hasNext(); ) {
                    String key = (String)it.next();
                    key = key.split(" ")[0];   
                    if (key.startsWith(serviceType+".")) {
                        result.add(key.substring(serviceType.length()+1));
                    } else if (key.startsWith("Alg.Alias."+serviceType+".")) {                   
                        result.add(key.substring(serviceType.length()+11));
            return (String[])result.toArray(new String[result.size()]);
        }    I call it as : getCryptoImpls("Cipher");
    But some elements of the list are not available !
    Other problem :
    I encrypt/decrypt files using a password, and when I use different algorithms when encrypting and
    decrypting, it works ! Strange ...
    I create a key like this :
    SecretKey key = SecretKeyFactory.getInstance(algo).generateSecret(keySpec);here is the whole code for you to understand better :
        /*  CLASSE                  : CryptoUtils                                 */
        /*  PACKAGE                 : crypto.utils                                */   
        /*  AUTEUR                  : Guillaume YVON                              */
        /*  CREATION                : 15-07-2005                                  */
        /*  DERNIERE MODIFICATION   : 17-07-2005                                  */
        /*  DESCRIPTION             : gestion du cryptage / d�cryptage            */
    package crypto.utils;
    import crypto.component.*;
    import java.io.*;
    import java.util.*;
    import java.security.*;
    import javax.crypto.*;
    import javax.crypto.spec.*;
    import java.security.spec.*;
    public class CryptoUtils {   
        public static final int ENCRYPT_MODE = 1;
        public static final int DECRYPT_MODE = 2;
        /* ----- D�claration de variables ----- */
        private static Cipher ecipher;
        private static Cipher dcipher;      
        /* Cr�ation d'un vecteur d'initialisation de 8 octets */
        private static byte[] salt = {
            (byte)0xA9, (byte)0x9B, (byte)0xC8, (byte)0x32,
            (byte)0x56, (byte)0x35, (byte)0xE3, (byte)0x03
        /* Compteur pour l'it�ration */
        private static int iterationCount = 19;
        /* Buffer utilis� pour transporter les octets entre les flux */
        private static byte[] buf = new byte[1024];
        /*            PROCEDURE D'INITIALISATION DES CLES DE CRYPTAGE             */
        /* PARAMETRES D'ENTREE                                                    */
        /*      - password => mot de passe pour le cryptage : String              */
        /* PARAMETRES DE SORTIE                                                   */
        /*      - aucun                                                           */
        private static void init(String password,String algo) {
            try {
                /* G�n�ration de la cl� de cryptage � partir du mot de passe */
                KeySpec keySpec = new PBEKeySpec(password.toCharArray(), salt, iterationCount);            
                SecretKey key = SecretKeyFactory.getInstance(algo).generateSecret(keySpec);
                ecipher = Cipher.getInstance(key.getAlgorithm());
                dcipher = Cipher.getInstance(key.getAlgorithm());
                /* Pr�paration des param�tres pour les ciphers */
                AlgorithmParameterSpec paramSpec = new PBEParameterSpec(salt, iterationCount);
                /* Cr�ation des ciphers */
                ecipher.init(Cipher.ENCRYPT_MODE, key, paramSpec);
                dcipher.init(Cipher.DECRYPT_MODE, key, paramSpec);
            } catch (Exception e){ System.err.println(e); }
        /*                   PROCEDURE DE CRYPTAGE / DECRYPTAGE                   */
        /* PARAMETRES D'ENTREE                                                    */
        /*      - mode        => mode de cryptage/decryptage : int                */
        /*      - in          => flux d'entr�e (lecture) : InputStream            */
        /*      - out         => flux de sortie (�criture) : OutputStream         */
        /*      - srcSize     => taille du fichier source : long                  */
        /*      - progressBar => barre de progression                             */
        /* PARAMETRES DE SORTIE                                                   */
        /*      - aucun                                                           */
        private static void crypt(int mode, InputStream in, OutputStream out, long srcSize,
    JProgressBarWindow progressBar){
            try {           
                if(mode == ENCRYPT_MODE){
                    /* Les octets �crits dans out seront crypt�s */
                    out = new CipherOutputStream(out, ecipher);
                }else if(mode == DECRYPT_MODE){
                    /* Les octets lus dans in seront d�crypt�s */           
                    in = new CipherInputStream(in, dcipher);
                /* Lit dans le texte clair les octets et �crit dans out pour le cryptage */
                int sum = 0;
                int numRead = 0;           
                while ((numRead = in.read(buf)) >= 0) {               
                    out.write(buf, 0, numRead);
                    sum += numRead;
                    Float percent = sum / (new Float(srcSize)) * 100;
                    if(progressBar!=null) progressBar.setValue(percent.intValue());               
                out.close();
            } catch (java.io.IOException e) { System.out.println(e); }
        /*             PROCEDURE DE LANCEMENT DU CRYPTAGE/DECRYPTAGE              */
        /* PARAMETRES D'ENTREE                                                    */
        /*      - mode        => mode de cryptage/decryptage : int                */
        /*      - algo        => algorythme � utiliser : String                   */
        /*      - srcFile     => flux d'entr�e (lecture) : String                 */
        /*      - tgtFile     => flux de sortie (�criture) : String               */
        /*      - password    => taille du fichier source : String                */
        /*      - progressBar => barre de progression : JProgressBarWindow        */
        /*      - text        => texte � afficher : String                        */
        /* PARAMETRES DE SORTIE                                                   */
        /*      - aucun                                                           */
        public static void launch(int mode,String algo,String srcFile,String tgtFile,String password,
                                    JProgressBarWindow progressBar,String text){
            try {           
                init(password,algo);                                  
                if(progressBar!=null && text!=null) progressBar.setLabelText(text);
                crypt(mode,new FileInputStream(srcFile),new
    FileOutputStream(tgtFile),FileUtils.getFileSize(srcFile), progressBar);                           
            } catch (Exception e) {}
        /*      FONCTION QUI RENVOIE LES IMPLEMENTATIONS DISPONIBLES POUR         */
        /*                          UN TYPE DE SERVICE                            */
        /* PARAMETRES D'ENTREE                                                    */
        /*      - serviceType => nom du service                                   */   
        /* PARAMETRES DE SORTIE                                                   */
        /*      - liste des impl�mentations : String[]                            */
        public static String[] getCryptoImpls(String serviceType) {       
            Set result = new HashSet();                
            Provider[] providers = Security.getProviders();
            for (int i=0; i<providers.length; i++) {           
                Set keys = providers[ i].keySet();
                for (Iterator it=keys.iterator(); it.hasNext(); ) {
                    String key = (String)it.next();
                    key = key.split(" ")[0];   
                    if (key.startsWith(serviceType+".")) {
                        result.add(key.substring(serviceType.length()+1));
                    } else if (key.startsWith("Alg.Alias."+serviceType+".")) {                   
                        result.add(key.substring(serviceType.length()+11));
            return (String[])result.toArray(new String[result.size()]);
        /*     FONCTION QUI RENVOIE LA LISTE DES TYPES DE SERVICE DISPONIBLES     */   
        /* PARAMETRES D'ENTREE                                                    */
        /*      - aucun                                                           */   
        /* PARAMETRES DE SORTIE                                                   */
        /*      - liste des services : String[]                                   */
        public static String[] getServiceTypes() {
            Set result = new HashSet();           
            Provider[] providers = Security.getProviders();
            for (int i=0; i<providers.length; i++) {           
                Set keys = providers[ i].keySet();
                for (Iterator it=keys.iterator(); it.hasNext(); ) {
                    String key = (String)it.next();
                    key = key.split(" ")[0];   
                    if (key.startsWith("Alg.Alias.")) {                   
                        key = key.substring(10);
                    int ix = key.indexOf('.');
                    result.add(key.substring(0, ix));
            return (String[])result.toArray(new String[result.size()]);
    }Any tip is welcome !
    (sorry for the french comments...)

    From 11.1 onwards, the below two views are available to identify the jar files loaded into the Database.
    JAVAJAR$
    JAVAJAROBJECTS$
    By querying the JAVAJAR$ view you can know information about the JAR files loaded into the Database and using JAVAJAROBJECTS$ view you can find all the java objects associated with the given JAR file.
    These views are populated everytime you use LOADJAVA with "-jarsasdbobjects" option to load your custom java classes.
    But unfortunately this feature is available only from 11.1 onwards and there is no clear workaround for above in 10.2 or earlier.

  • Spilt Tea On Computer

    My boyfriend split a bunch of tea over the keyboard of my Macbook and it seemed to be working fine. However, when I plugged it in to charge I noticed that the green light that normally comes on when you plug the power cord in to the computer did not come on. The battery icon indicated that the battery was fully charged, but when I unplugged the power cord the battery was only charged at 5 percent. I figured that my battery had started to die so I took my Macbook to the Mac store and purchased a new battery. The new battery seemed fine for awhile but it stopped charging at 26 percent and when I unplug it the charge goes down extremely fast and when I plug it in again the charge stays the same. Now I think that the tea may have caused this and was wondering what people think and what I should do. Thanks

    My advice to you is to take it into the store and come clean with them about the spill.
    In November, I spilled a tiny amount of champagne on my keyboard and under the computer. Though I cleaned it up within seconds and let it dry out, etc., I had a similar experience with my battery. I got a new one under warranty from Apple Care, but it did the same thing you're talking about--the light would be green (or flicker back and forth), and the battery would only hold a charge up to a low percentage. I had a keyboard issue as well (the infamous crack), so when I took that in for repair, they saw the small spill. At that point, I asked them to do something more about the battery. They replaced two small parts in the computer--one about $13 and the other $11--one the battery connector and the other a part where the MagSafe thing connects. It now works perfectly fine.

  • Who do I complain to regarding an Apple iPhone upgrade that has taken my my full screen contact picture and turned it into a tiny circle that is hard to see at a glance!!!

    I'm trying to find an outlet for the frustration I feel regarding the "upgrade" that replaced my full screen picture for my contact numbers to a tiny, little dot in the right hand corner.  Are they going to give us an option to go back or did someone  just need to justify their job by making  changes??

    Apple.com/feedback

Maybe you are looking for

  • Mac version of BlackBerry Desktop Manager KB articles

    The following is a list of knowledge base articles for the Mac version of BlackBerry® Desktop Manager: KB18769 - System requirements for BlackBerry Desktop Manager version 1.0 (for Mac OS) KB18770 - Features of BlackBerry Desktop Manager 1.0 (for Mac

  • Creation of one outbound interface for two diferent senders

    helo. i just want to conform ont thing that . my scenario is  two diferent files from 2 diferent business systems are sending to one Rfc. so i was created only one outbound interface for both senders and one message type bcos the file structure is sa

  • Stored function with OUT parameter

    Hi there, anyone knows wether a stored function may have an OUT parameter other than a returning value and/or IN parameter. I think not but I've a doubt about it. Thanks Paolo Paolucci Oracle Consulting

  • How to display Dynamic text after adding flash file to html

    Please help - I have a dynamic text field in a movieclip inside a main movieclip - Within flash the dynamic text display properly but once I load the file to an html page the dynamic text no longer display - It loads undefined in text box. However wh

  • Help! 500 No configured channel has an endpoint path '/flex2gateway/'

    Hello. I have 2 servers running CF 7 and one of my customer's web sites flex app works fine with no config involved. However, the development server gives the following Error when you try and access the app: 500 No configured channel has an endpoint