Wrap Utility Encryption Method?
Hi,
Does the WRAP utility use AES128 to encrypt?
Thanks,
Nora
Well, obviously, this is not the type of information Oracle wants to be made public. However, some careful use of Google may yield some interesting results.
-Mark
Similar Messages
-
Wrap utility doesn't work on Trigger
Hello Experts,
I want to encrypt the code in trigger on database by using wrap tool. I type this one below:
wrap iname=TRG_INSERT_BB_TEMP.trg oname=TRG_INSERT_BB_TEMP_wrap.trg
It doesn't work on my side. Or is it true, that such wrapping doesn't either on trigger?
Is there any other Oracle Utility?
regards,
PakpahanThe wrap utility does not obfuscate the source code for triggers, but you can create a trigger who calls a wrapped procedure.
Enrique -
WRAP UTILITY, Any help please!
Hi Gurus,
Can I know if Wrap utility is also installed as part of options during Oracle Client installation.
I had a problem as stated below from oracle cleint using on of my applications.
java.io.IOException: wrap: not found
at java.lang.UNIXProcess.forkAndExec(Native Method)
at java.lang.UNIXProcess.<init>(UNIXProcess.java:72)
at java.lang.Runtime.execInternal(Native Method)
at java.lang.Runtime.exec(Runtime.java:602)
at java.lang.Runtime.exec(Runtime.java:461)
at java.lang.Runtime.exec(Runtime.java:397)
at java.lang.Runtime.exec(Runtime.java:359)
at com.r2000.integration.wcif.dbtools.EncodeScript.wrapPLSQL(EncodeScript.java:83)
at com.r2000.integration.wcif.dbtools.EncodeScript.beginEncoding(EncodeScript.java:216)
at com.r2000.integration.wcif.dbtools.IGP.begin(IGP.java:149)
at com.r2000.integration.wcif.dbtools.IGP.main(IGP.java:231)
Any help please?Can you get it now? Any help? I don't know what gets installed as part of the Oracle client only - I'm surrounded by servers, no client machines. What this suggest to me is that you don't have a test environment that replicates your users' environment. This is a dangerous practice and will likely lead you to deliver applications with broken dependencies, if you haven't already (which you apparently have).
Which I suppose is not very helpful to your current situation but you at least know what you need to do to avoid this situation in the future.
Cheers, APC -
Hi All,
I tried to use wrap utility from my command promt from c:/oracle9i/bin to encrypt the package code. But found that I am not having any wrap coomand in bin dir, so when I run wrap command from c:/oracle9i/bin, it gave me below error:
C:\oracle9i\bin>wrap
'wrap' is not recognized as an internal or external command,
operable program or batch file.
Can anybody help me in running wrap command. I am not able to understand if this is version issue, or complete pacakage has not been installed on my machine.
Or there is some other way to run wrap utility, and I am running it in wrong manner.
Thanks and Regards,
NidhiThe wrap utility is a command line utility that obfuscates the contents of a PL/SQL source file. The syntax for the wrap utility is shown below.
wrap iname=input_file [oname=output_file]
The iname parameter specifies the source file, while the oname parameter specifies the destination file. If the destination file is not specified it defaults to the source file name with a ".pld" extension.
Running the Wrap Utility
Wrapping a package is amazingly simple, although there is one pitfall to avoid. Among the 500 plus files in the ORACLE_HOME/bin directory you will see wrap or WRAP depending on your operating system (a lot of the more common files and directories on Windows are upper-cased for ease of readability and identification).
Using wrap is as simple as this:
c:\ora9i\bin wrap iname=input_file_name
You can specify an output file as a second argument by using this format:
c:\ora9i\bin wrap iname=input_file_name oname=output_file_name
Once wrapped, a package cannot be unwrapped. With that in mind, and just like what you would do with a real package, do not wrap the package until it is time to ship it. This implies keeping a source code repository of the original code. If a customer or user reports a bug against a wrapped package, there is no unwrapping it at the customer's site. You are going to have to ship another wrapped package with the fix in it. You will be making the bug fix or enhancement with the repository file and wrapping the new file.
An Example of Using Wrap
In a previous article, I used the DBMS_RANDOM package. A slightly modified bit of code from that produces the following:
SQL> CREATE or REPLACE PROCEDURE wrap_it (seed_in NUMBER)
2 IS
3 v_rand INTEGER;
4 BEGIN
5 DBMS_RANDOM.INITIALIZE (seed_in);
6 FOR i IN 1..5 LOOP
7 v_rand := mod(abs(DBMS_RANDOM.RANDOM),45);
8 dbms_output.put_line(i||': '||v_rand);
9 END LOOP;
10 END;
11 /
Procedure created.
SQL> exec wrap_it(123456);
1: 37
2: 36
3: 18
4: 8
5: 32
PL/SQL procedure successfully completed.HTH.
Amkotz -
Wrap utility security strength
Hello,
I am using the PL/SQL wrap utility to protect my source codes
that contains an encryption key. But my client wants to know
what is the security strength of the wrap utility. Anyone has
that information?
Thanks a lot,
Zhenhi you can buy a security software that prevents any persons from accessing to your codes.
Beau -
Is there any information available on oracle's site about security with the wrap utility provided by oracle.
Can it be un-wrapped, can I get some pointers to it withing the oracle site.Ten seconds work with "Search" on the 9i documentation pages gives this:
http://otn.oracle.com/docs/products/oracle9i/doc_library/release2/appdev.920/a96624/c_wrap.htm#138
You can't "unwrap" previously wrapped code, as that would defeat the point of wrapping it in the first place. -
Java.util.Properties methods load & store
Does java.util.Properties methods load & store produce & load platform independent code?
You mean that it is better to use loadFromXML(InputStream in) and storeToXML(OutputStream os, String comment) methods of this class in order to have platform independent code?
-
I have a simple function:
CREATE OR REPLACE FUNCTION hv_f ( p_1 IN NUMBER )
RETURN NUMBER
IS
BEGIN
RETURN p_1;
END;
When I compile and run this function in the database it works fine.
SELECT hv_f ( 100 ) from dual;
100
I then used the wrap utility to wrap the code. Here is the output:
C:\oracle\product\11.2.0\dbhome_1\BIN>wrap iname=hv_f.sql
PL/SQL Wrapper: Release 11.2.0.1.0- Production on Wed Apr 25 09:47:30 2012
Copyright (c) 1993, 2009, Oracle. All rights reserved.
Processing hv_f.sql to hv_f.plb
This is the wrapped code:
CREATE OR REPLACE FUNCTION hv_f wrapped
a000000
b2
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
8
4a 79
Haipg9ui7ATKGIdMN+rVKka0XpMwg8eZgcfLCNL+XoUWba5eUGnn43jDpdJepZmBMsCyCVBd
nsCyvbKsCL561r5ucVUAc1OOjg7TZ4E8ceI/0Tx0pu5009s=
I then try to run this in the database, and I get this error:
Error starting at line 1 in command:
CREATE OR REPLACE FUNCTION hv_f wrapped
a000000
b2
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
8
4a 79
Haipg9ui7ATKGIdMN+rVKka0XpMwg8eZgcfLCNL+XoUWba5eUGnn43jDpdJepZmBMsCyCVBd
nsCyvbKsCL561r5ucVUAc1OOjg7TZ4E8ceI/0Tx0pu5009s=
Error report:
Invalid argument(s) in call
I tried a few other simple functions and procedures, and I get the same error. Not sure what is wrong. Does anyone have any ideas?
Thanks.Thank you very much for all your help.
I posted my output from the run, but I was running the wrapped function in SQL Developer (not SQL*Plus) like this:
CREATE OR REPLACE FUNCTION hv_f wrapped
a000000
b2
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
8
4a 79
Haipg9ui7ATKGIdMN+rVKka0XpMwg8eZgcfLCNL+XoUWba5eUGnn43jDpdJepZmBMsCyCVBd
nsCyvbKsCL561r5ucVUAc1OOjg7TZ4E8ceI/0Tx0pu5009s=
And this is the error I was getting in SQL Developer
Error report:
Invalid argument(s) in call
I also tried running the plb this way: @hv_f.plb and I was still getting the same error.
I then ran it in SQL Plus and it compiled fine.
Thank you very much to all that responded. -
After using jexegen from microsoft to make EXE. I receive this error when i execute the my EXE :
java.lang.NoSuchMethodError: java/util/Vector method revove...
Any body know why?
If i execute from JBuilder i have no problem!hi, i don't have much experience with M$ java products, but as far as i remember, M$ java stopped developping since jdk 1.1.4 (or 1.1.7).
maybe that's the reason for throwing this exception. if you want to "exe" your class-file, try JToExe.
greetzzz
chris -
Search Encrypt Methods Of Spatial Data !!!
Hi:
Hello,Everybody!
I trying to search encrypt methods of spatial data(vector data),whether some also made a study of this aspect ,Can anyone guide to me ?
Li in ChinaYes have read it that's why my query looks a lot like that sample...
Turns out the objects are transferring but that the Oracle provider for OLE DB
converts the VARBINARY(MAX) from SQL Server to LONG and given this has
a length limit some of the spatial records are being truncated...
Anybody know if a different provider would work or of a way of overridding the
mapping to LONG with a different and longer Oracle datatype? -
Hey i am trying to create a simple encryption. This is my function.
public static String Crypt(String sData)
byte[] bytes = sData.getBytes();
for(int i=0; i<bytes.length; i++)
bytes[i] ^= 477;
return (new String(bytes));
Unfortunately the String that is returned has a lot of "???????" in it. I have also tried char arrays but to no effect. I want to be able to send the data using a socket therefore i need it in a char array or string. Can anyone help please?>
return (new String(bytes));
Unfortunately the String that is returned has a lot of
"???????" in it. I have also tried char arrays but to
no effect. I want to be able to send the data using a
socket therefore i need it in a char array or string.1) Not all byte and byte combinations produce a valid String object so one cannot use 'new String(bytes)' with the certainty of being able to reverse the operation and get back the original bytes. i.e.
new String(some bytes).getBytes() usually does not return 'some bytes'.
2) You don't need to have a char array or string to send bytes down a Socket. Just send down the encrypted bytes.
3) I hope you are not considering this encryption method for an industrial strength application! -
Which encryption method is the best way to secure the data tranfer
Hi ,
I want to configure the Encryption between two cisco Wan routers(3845 & 3825).
We use 50MB leased line connection and transfer the data. I also configured the QOS to limit the data transfer rate to 20MB on the same pipe and it's working fine.We also use the same pipe for trading purpose too. That's why I limit 20MB for data(copy) transfer between two hosts.
Which encryption method should I use to secure the data transfer?
Plese kinldy advise .
Thanks,Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
I would recommend AES256.
I would also recommend a VTI tunnel vs. GRE/IPSec. However, both, depending on your IOS, should support AES256.
Encryption will demand more from your routers. I think the 3845 should be able to support 20 Mbps encrypted, not as sure about the 3825. (BTW, if you have 50 Mbps LL, why are you limited transfer rate to 20 Mbps?)
Also BTW, there's much involved in setting up encrypted tunnels for optimal performance. Also see: http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/25885-pmtud-ipfrag.html -
Phase 1 Encryption Method in Config File
OK... I see the statement for the declaration of Encryption for Phase 2. It is clear in the Crypto Map section. Where in the config file is the Phase 1 encryption method defined for a given IPSec Tunnel?
ThanxHi,
From the ASA CLI you should be able to see all the phase 1 policies configured on the ASA with the command "show run crypto". They are at the very end.
Each of the policies have a priority number in which order they are checked when a VPN connection is being formed.
To my understanding none of them are locked to a certain VPN connection on your ASA. They are gone through with the other VPN device/client in the Phase1 negotiations until they find a policy match that both devices have.
In my 8.4(3) ASA I for example have the policies like this
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
For the older software the format might be different.
Like
"crypto isakmp policy 10"
- Jouni -
Hi All,
This is my first post to ms exchange forum am getting Log onto incoming mail server (POP3): Your server does not support the connection encryption type you have specified. Try changing the encryption method. Contact your mail server administrator
or Internet service provider (ISP) for additional assistance. in my outlook clients, till last Sunday (12.04.15) my exchange was well & good, Monday morning suddenly the problem started like none of our outlook pop3 clients are able to communicate
with exchange (rest IMAP, SMTP & Exchange accounts are working fine). i have tried with all port no but no luck. please help me to get raid of this one.
Exchange 2013 CU6 with server 2012 Std 64Bit
Thanks,
MuraliDear All,
I have found the solution for above problem, the problem has occur due to PopProxy inactivity
please find relevant exchange management shell commends below.
1. Get-ServerComponentstate -Identity <yourmailserver.com>
Server Component State
yourmailserver.com ServerWideOffline Active
yourmailserver.com HubTransport Active
yourmailserver.com FrontendTransport Active
yourmailserver.com Monitoring Active
yourmailserver.com RecoveryActionsEnabled Active
yourmailserver.com AutoDiscoverProxy Active
yourmailserver.com ActiveSyncProxy Active
yourmailserver.com EcpProxy Active
yourmailserver.com EwsProxy Active
yourmailserver.com ImapProxy Active
yourmailserver.com OabProxy Active
yourmailserver.com OwaProxy Active
yourmailserver.com PopProxy Inactive
yourmailserver.com PushNotificationsProxy Active
yourmailserver.com RpsProxy Active
yourmailserver.com RwsProxy Active
yourmailserver.com RpcProxy Active
yourmailserver.com UMCallRouter Active
yourmailserver.com XropProxy Active
yourmailserver.com HttpProxyAvailabilityGroup Active
yourmailserver.com ForwardSyncDaemon Active
yourmailserver.com ProvisioningRps Active
yourmailserver.com MapiProxy Active
yourmailserver.com EdgeTransport Active
yourmailserver.com HighAvailability Active
yourmailserver.com SharedCache Active
2. Set-ServerComponentState -Identity <yourmailserver.com> -Component PopProxy -Requester HealthAPI
-State Active
3. Get-ServerComponentstate -Identity <yourmailserver.com>
Server Component State
yourmailserver.com ServerWideOffline Active
yourmailserver.com HubTransport Active
yourmailserver.com FrontendTransport Active
yourmailserver.com Monitoring Active
yourmailserver.com RecoveryActionsEnabled Active
yourmailserver.com AutoDiscoverProxy Active
yourmailserver.com ActiveSyncProxy Active
yourmailserver.com EcpProxy Active
yourmailserver.com EwsProxy Active
yourmailserver.com ImapProxy Active
yourmailserver.com OabProxy Active
yourmailserver.com OwaProxy Active
yourmailserver.com PopProxy Active
yourmailserver.com PushNotificationsProxy Active
yourmailserver.com RpsProxy Active
yourmailserver.com RwsProxy Active
yourmailserver.com RpcProxy Active
yourmailserver.com UMCallRouter Active
yourmailserver.com XropProxy Active
yourmailserver.com HttpProxyAvailabilityGroup Active
yourmailserver.com ForwardSyncDaemon Active
yourmailserver.com ProvisioningRps Active
yourmailserver.com MapiProxy Active
yourmailserver.com EdgeTransport Active
yourmailserver.com HighAvailability Active
yourmailserver.com SharedCache Activ
Replace yourmailserver.com with your server host name.
Thanks -
what is your best encryption method..
please give me a link or an example please..w32sysfie wrote:
what is your best encryption method..
I suppose you'e moved on to bigger and better duke-whoring, but I just want to point out that this is a meaningless question. There's no single measure of goodness for encryption. If you want "best", you'll have to define your criteria.
Hardest to break?
Easiest to implement?
Fastest to execute?
Best supported in standard libraries on various platforms?
Most likely it's not a single one of those, but there are weights on all of them. Only you know your requirements, and without more information, there's no way anybody can tell you what's "best" for your needs.
Maybe you are looking for
-
How to Refresh or TaskFlow from pageFragment button?
Hello im using Jdev 11.1.1.3.0, and i have a task flow with a managed bean with pageFlow scope, this managed bean defines a lot of parameters for my page framents that are on my task flow. I need a custom on this bean to programatically refresh the t
-
Hi OAF Guys I am working in iProcurement and (new to iProcurement) to extend the non-catalog request template for suit to our organization. One of the extension is to provide all the information regarding the Travel Schedule when one employee wants t
-
HT1212 how can i fix my iPad is say iPad is disabled connect to iTunes
Please help to my iPad is say .. iPad is disabled connect to iTunes
-
Difference between Materialised view in 10g and 11g
Hi, I am beginner . I want to know the difference between Materialized view between 10g and 11g. Is there any impact if the materialized view used in 10g gets upgraded to 11g ? awaiting ur response.Please and Thanks
-
How do I merge Aperture libraries?
On rather poor advice, I started splitting my Aperture library by year -- I did this by setting up a smart album for each year and clicking "Export > Smart Album as New Library..." I now want to merge them back together but am not sure how. I am also