Wrap Utility Encryption Method?

Hi,
Does the WRAP utility use AES128 to encrypt?
Thanks,
Nora

Well, obviously, this is not the type of information Oracle wants to be made public. However, some careful use of Google may yield some interesting results.
-Mark

Similar Messages

  • Wrap utility doesn't work on Trigger

    Hello Experts,
    I want to encrypt the code in trigger on database by using wrap tool. I type this one below:
    wrap iname=TRG_INSERT_BB_TEMP.trg oname=TRG_INSERT_BB_TEMP_wrap.trg
    It doesn't work on my side. Or is it true, that such wrapping doesn't either on trigger?
    Is there any other Oracle Utility?
    regards,
    Pakpahan

    The wrap utility does not obfuscate the source code for triggers, but you can create a trigger who calls a wrapped procedure.
    Enrique

  • WRAP UTILITY, Any help please!

    Hi Gurus,
    Can I know if Wrap utility is also installed as part of options during Oracle Client installation.
    I had a problem as stated below from oracle cleint using on of my applications.
    java.io.IOException: wrap: not found
    at java.lang.UNIXProcess.forkAndExec(Native Method)
    at java.lang.UNIXProcess.<init>(UNIXProcess.java:72)
    at java.lang.Runtime.execInternal(Native Method)
    at java.lang.Runtime.exec(Runtime.java:602)
    at java.lang.Runtime.exec(Runtime.java:461)
    at java.lang.Runtime.exec(Runtime.java:397)
    at java.lang.Runtime.exec(Runtime.java:359)
    at com.r2000.integration.wcif.dbtools.EncodeScript.wrapPLSQL(EncodeScript.java:83)
    at com.r2000.integration.wcif.dbtools.EncodeScript.beginEncoding(EncodeScript.java:216)
    at com.r2000.integration.wcif.dbtools.IGP.begin(IGP.java:149)
    at com.r2000.integration.wcif.dbtools.IGP.main(IGP.java:231)
    Any help please?

    Can you get it now? Any help? I don't know what gets installed as part of the Oracle client only - I'm surrounded by servers, no client machines. What this suggest to me is that you don't have a test environment that replicates your users' environment. This is a dangerous practice and will likely lead you to deliver applications with broken dependencies, if you haven't already (which you apparently have).
    Which I suppose is not very helpful to your current situation but you at least know what you need to do to avoid this situation in the future.
    Cheers, APC

  • How to run wrap utility

    Hi All,
    I tried to use wrap utility from my command promt from c:/oracle9i/bin to encrypt the package code. But found that I am not having any wrap coomand in bin dir, so when I run wrap command from c:/oracle9i/bin, it gave me below error:
    C:\oracle9i\bin>wrap
    'wrap' is not recognized as an internal or external command,
    operable program or batch file.
    Can anybody help me in running wrap command. I am not able to understand if this is version issue, or complete pacakage has not been installed on my machine.
    Or there is some other way to run wrap utility, and I am running it in wrong manner.
    Thanks and Regards,
    Nidhi

    The wrap utility is a command line utility that obfuscates the contents of a PL/SQL source file. The syntax for the wrap utility is shown below.
    wrap iname=input_file [oname=output_file]
    The iname parameter specifies the source file, while the oname parameter specifies the destination file. If the destination file is not specified it defaults to the source file name with a ".pld" extension.
    Running the Wrap Utility
    Wrapping a package is amazingly simple, although there is one pitfall to avoid. Among the 500 plus files in the ORACLE_HOME/bin directory you will see wrap or WRAP depending on your operating system (a lot of the more common files and directories on Windows are upper-cased for ease of readability and identification).
    Using wrap is as simple as this:
    c:\ora9i\bin wrap iname=input_file_name
    You can specify an output file as a second argument by using this format:
    c:\ora9i\bin wrap iname=input_file_name oname=output_file_name
    Once wrapped, a package cannot be unwrapped. With that in mind, and just like what you would do with a real package, do not wrap the package until it is time to ship it. This implies keeping a source code repository of the original code. If a customer or user reports a bug against a wrapped package, there is no unwrapping it at the customer's site. You are going to have to ship another wrapped package with the fix in it. You will be making the bug fix or enhancement with the repository file and wrapping the new file.
    An Example of Using Wrap
    In a previous article, I used the DBMS_RANDOM package. A slightly modified bit of code from that produces the following:
    SQL> CREATE or REPLACE PROCEDURE wrap_it (seed_in NUMBER)
      2  IS
      3    v_rand INTEGER;
      4  BEGIN
      5    DBMS_RANDOM.INITIALIZE (seed_in);
      6    FOR i IN 1..5 LOOP
      7     v_rand := mod(abs(DBMS_RANDOM.RANDOM),45);
      8     dbms_output.put_line(i||': '||v_rand);
      9    END LOOP;
    10  END;
    11  /
    Procedure created.
    SQL> exec wrap_it(123456);
    1: 37
    2: 36
    3: 18
    4: 8
    5: 32
    PL/SQL procedure successfully completed.HTH.
    Amkotz

  • Wrap utility security strength

    Hello,
    I am using the PL/SQL wrap utility to protect my source codes
    that contains an encryption key. But my client wants to know
    what is the security strength of the wrap utility. Anyone has
    that information?
    Thanks a lot,
    Zhen

    hi you can buy a security software that prevents any persons from accessing to your codes.
    Beau

  • PL/SQL Wrap utility

    Is there any information available on oracle's site about security with the wrap utility provided by oracle.
    Can it be un-wrapped, can I get some pointers to it withing the oracle site.

    Ten seconds work with "Search" on the 9i documentation pages gives this:
    http://otn.oracle.com/docs/products/oracle9i/doc_library/release2/appdev.920/a96624/c_wrap.htm#138
    You can't "unwrap" previously wrapped code, as that would defeat the point of wrapping it in the first place.

  • Java.util.Properties methods load & store

    Does java.util.Properties methods load & store produce & load platform independent code?

    You mean that it is better to use loadFromXML(InputStream in) and storeToXML(OutputStream os, String comment) methods of this class in order to have platform independent code?

  • Oracle WRAP Utility

    I have a simple function:
    CREATE OR REPLACE FUNCTION hv_f ( p_1 IN NUMBER )
    RETURN NUMBER
    IS
    BEGIN
    RETURN p_1;
    END;
    When I compile and run this function in the database it works fine.
    SELECT hv_f ( 100 ) from dual;
    100
    I then used the wrap utility to wrap the code. Here is the output:
    C:\oracle\product\11.2.0\dbhome_1\BIN>wrap iname=hv_f.sql
    PL/SQL Wrapper: Release 11.2.0.1.0- Production on Wed Apr 25 09:47:30 2012
    Copyright (c) 1993, 2009, Oracle. All rights reserved.
    Processing hv_f.sql to hv_f.plb
    This is the wrapped code:
    CREATE OR REPLACE FUNCTION hv_f wrapped
    a000000
    b2
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    8
    4a 79
    Haipg9ui7ATKGIdMN+rVKka0XpMwg8eZgcfLCNL+XoUWba5eUGnn43jDpdJepZmBMsCyCVBd
    nsCyvbKsCL561r5ucVUAc1OOjg7TZ4E8ceI/0Tx0pu5009s=
    I then try to run this in the database, and I get this error:
    Error starting at line 1 in command:
    CREATE OR REPLACE FUNCTION hv_f wrapped
    a000000
    b2
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    8
    4a 79
    Haipg9ui7ATKGIdMN+rVKka0XpMwg8eZgcfLCNL+XoUWba5eUGnn43jDpdJepZmBMsCyCVBd
    nsCyvbKsCL561r5ucVUAc1OOjg7TZ4E8ceI/0Tx0pu5009s=
    Error report:
    Invalid argument(s) in call
    I tried a few other simple functions and procedures, and I get the same error. Not sure what is wrong. Does anyone have any ideas?
    Thanks.

    Thank you very much for all your help.
    I posted my output from the run, but I was running the wrapped function in SQL Developer (not SQL*Plus) like this:
    CREATE OR REPLACE FUNCTION hv_f wrapped
    a000000
    b2
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    abcd
    8
    4a 79
    Haipg9ui7ATKGIdMN+rVKka0XpMwg8eZgcfLCNL+XoUWba5eUGnn43jDpdJepZmBMsCyCVBd
    nsCyvbKsCL561r5ucVUAc1OOjg7TZ4E8ceI/0Tx0pu5009s=
    And this is the error I was getting in SQL Developer
    Error report:
    Invalid argument(s) in call
    I also tried running the plb this way: @hv_f.plb and I was still getting the same error.
    I then ran it in SQL Plus and it compiled fine.
    Thank you very much to all that responded.

  • Java.lang.NoSuchMethodError: java/util/Vector method revove...

    After using jexegen from microsoft to make EXE. I receive this error when i execute the my EXE :
    java.lang.NoSuchMethodError: java/util/Vector method revove...
    Any body know why?
    If i execute from JBuilder i have no problem!

    hi, i don't have much experience with M$ java products, but as far as i remember, M$ java stopped developping since jdk 1.1.4 (or 1.1.7).
    maybe that's the reason for throwing this exception. if you want to "exe" your class-file, try JToExe.
    greetzzz
    chris

  • Search  Encrypt Methods Of  Spatial Data !!!

    Hi&#65306;
    Hello&#65292;Everybody&#65281;
    I trying to search encrypt methods of spatial data(vector data),whether some also made a study of this aspect ,Can anyone guide to me ?
    Li in China

    Yes have read it that's why my query looks a lot like that sample...
    Turns out the objects are transferring but that the Oracle provider for OLE DB
    converts the VARBINARY(MAX) from SQL Server to LONG and given this has
    a length limit some of the spatial records are being truncated...
    Anybody know if a different provider would work or of a way of overridding the
    mapping to LONG with a different and longer Oracle datatype?

  • Simple encryption method

    Hey i am trying to create a simple encryption. This is my function.
    public static String Crypt(String sData)
    byte[] bytes = sData.getBytes();
    for(int i=0; i<bytes.length; i++)
    bytes[i] ^= 477;
    return (new String(bytes));
    Unfortunately the String that is returned has a lot of "???????" in it. I have also tried char arrays but to no effect. I want to be able to send the data using a socket therefore i need it in a char array or string. Can anyone help please?

    >
    return (new String(bytes));
    Unfortunately the String that is returned has a lot of
    "???????" in it. I have also tried char arrays but to
    no effect. I want to be able to send the data using a
    socket therefore i need it in a char array or string.1) Not all byte and byte combinations produce a valid String object so one cannot use 'new String(bytes)' with the certainty of being able to reverse the operation and get back the original bytes. i.e.
    new String(some bytes).getBytes() usually does not return 'some bytes'.
    2) You don't need to have a char array or string to send bytes down a Socket. Just send down the encrypted bytes.
    3) I hope you are not considering this encryption method for an industrial strength application!

  • Which encryption method is the best way to secure the data tranfer

    Hi ,
    I want to configure the Encryption between two cisco Wan routers(3845 & 3825).
    We use 50MB leased line connection and transfer the data. I also configured the QOS to limit the data transfer rate to 20MB on the same pipe and it's working fine.We also use the same pipe for trading purpose too. That's why I limit 20MB for data(copy) transfer between two hosts.
    Which encryption method should I use to secure the data transfer?
    Plese kinldy advise .
    Thanks,

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    I would recommend AES256.
    I would also recommend a VTI tunnel vs. GRE/IPSec.  However, both, depending on your IOS, should support AES256.
    Encryption will demand more from your routers.  I think the 3845 should be able to support 20 Mbps encrypted, not as sure about the 3825.  (BTW, if you have 50 Mbps LL, why are you limited transfer rate to 20 Mbps?)
    Also BTW, there's much involved in setting up encrypted tunnels for optimal performance.  Also see: http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/25885-pmtud-ipfrag.html

  • Phase 1 Encryption Method in Config File

    OK...  I see the statement for the declaration of Encryption for Phase 2.  It is clear in the Crypto Map section.  Where in the config file is the Phase 1 encryption method defined for a given IPSec Tunnel?
    Thanx

    Hi,
    From the ASA CLI you should be able to see all the phase 1 policies configured on the ASA with the command "show run crypto". They are at the very end.
    Each of the policies have a priority number in which order they are checked when a VPN connection is being formed.
    To my understanding none of them are locked to a certain VPN connection on your ASA. They are gone through with the other VPN device/client in the Phase1 negotiations until they find a policy match that both devices have.
    In my 8.4(3) ASA I for example have the policies like this
    crypto ikev1 policy 30
    authentication pre-share
    encryption aes-256
    hash sha
    group 2
    lifetime 86400
    crypto ikev1 policy 60
    authentication pre-share
    encryption aes-192
    hash sha
    group 2
    lifetime 86400
    For the older software the format might be different.
    Like
    "crypto isakmp policy 10"
    - Jouni

  • Log onto incoming mail server (POP3): Your server does not support the connection encryption type you have specified. Try changing the encryption method. Contact your mail server administrator or Internet service provider (ISP) for additional assistance.

    Hi All,
    This is my first post to ms exchange forum am getting  Log onto incoming mail server (POP3): Your server does not support the connection encryption type you have specified. Try changing the encryption method. Contact your mail server administrator
    or Internet service provider (ISP) for additional assistance. in my outlook clients, till last Sunday (12.04.15) my exchange was well & good, Monday morning suddenly the problem started like none of our outlook pop3 clients are able to communicate
    with exchange (rest  IMAP, SMTP & Exchange accounts are working fine). i have tried with all port no but no luck. please help me to get raid of this one.
    Exchange 2013 CU6 with server 2012 Std 64Bit
    Thanks,
    Murali 

    Dear All,
    I have found the solution for above problem, the problem has occur due to PopProxy inactivity
    please find relevant exchange management shell commends below.
    1. Get-ServerComponentstate -Identity <yourmailserver.com> 
    Server Component State
    yourmailserver.com ServerWideOffline Active
    yourmailserver.com HubTransport Active
    yourmailserver.com FrontendTransport Active
    yourmailserver.com Monitoring Active
    yourmailserver.com RecoveryActionsEnabled Active
    yourmailserver.com AutoDiscoverProxy Active
    yourmailserver.com ActiveSyncProxy Active
    yourmailserver.com EcpProxy Active
    yourmailserver.com EwsProxy Active
    yourmailserver.com ImapProxy Active
    yourmailserver.com OabProxy Active
    yourmailserver.com OwaProxy Active
    yourmailserver.com PopProxy Inactive
    yourmailserver.com PushNotificationsProxy Active
    yourmailserver.com RpsProxy Active
    yourmailserver.com RwsProxy Active
    yourmailserver.com RpcProxy Active
    yourmailserver.com UMCallRouter Active
    yourmailserver.com XropProxy Active
    yourmailserver.com HttpProxyAvailabilityGroup Active
    yourmailserver.com ForwardSyncDaemon Active
    yourmailserver.com ProvisioningRps Active
    yourmailserver.com MapiProxy Active
    yourmailserver.com EdgeTransport Active
    yourmailserver.com HighAvailability Active
    yourmailserver.com SharedCache Active
    2. Set-ServerComponentState -Identity <yourmailserver.com> -Component PopProxy -Requester HealthAPI
    -State Active
    3. Get-ServerComponentstate -Identity <yourmailserver.com> 
    Server Component State
    yourmailserver.com ServerWideOffline Active
    yourmailserver.com HubTransport Active
    yourmailserver.com FrontendTransport Active
    yourmailserver.com Monitoring Active
    yourmailserver.com RecoveryActionsEnabled Active
    yourmailserver.com AutoDiscoverProxy Active
    yourmailserver.com ActiveSyncProxy Active
    yourmailserver.com EcpProxy Active
    yourmailserver.com EwsProxy Active
    yourmailserver.com ImapProxy Active
    yourmailserver.com OabProxy Active
    yourmailserver.com OwaProxy Active
    yourmailserver.com PopProxy Active
    yourmailserver.com PushNotificationsProxy Active
    yourmailserver.com RpsProxy Active
    yourmailserver.com RwsProxy Active
    yourmailserver.com RpcProxy Active
    yourmailserver.com UMCallRouter Active
    yourmailserver.com XropProxy Active
    yourmailserver.com HttpProxyAvailabilityGroup Active
    yourmailserver.com ForwardSyncDaemon Active
    yourmailserver.com ProvisioningRps Active
    yourmailserver.com MapiProxy Active
    yourmailserver.com EdgeTransport Active
    yourmailserver.com HighAvailability Active
    yourmailserver.com SharedCache Activ
    Replace yourmailserver.com with your server host name.
    Thanks

  • BEST ENCRYPTION METHOD

    what is your best encryption method..
    please give me a link or an example please..

    w32sysfie wrote:
    what is your best encryption method..
    I suppose you'e moved on to bigger and better duke-whoring, but I just want to point out that this is a meaningless question. There's no single measure of goodness for encryption. If you want "best", you'll have to define your criteria.
    Hardest to break?
    Easiest to implement?
    Fastest to execute?
    Best supported in standard libraries on various platforms?
    Most likely it's not a single one of those, but there are weights on all of them. Only you know your requirements, and without more information, there's no way anybody can tell you what's "best" for your needs.

Maybe you are looking for

  • How to Refresh or TaskFlow from pageFragment button?

    Hello im using Jdev 11.1.1.3.0, and i have a task flow with a managed bean with pageFlow scope, this managed bean defines a lot of parameters for my page framents that are on my task flow. I need a custom on this bean to programatically refresh the t

  • Need Help in iProcurement

    Hi OAF Guys I am working in iProcurement and (new to iProcurement) to extend the non-catalog request template for suit to our organization. One of the extension is to provide all the information regarding the Travel Schedule when one employee wants t

  • HT1212 how can i fix my iPad is say iPad is disabled connect to iTunes

    Please help to my iPad is say .. iPad is disabled connect to iTunes

  • Difference between Materialised view in 10g and 11g

    Hi, I am beginner . I want to know the difference between Materialized view between 10g and 11g. Is there any impact if the materialized view used in 10g gets upgraded to 11g ? awaiting ur response.Please and Thanks

  • How do I merge Aperture libraries?

    On rather poor advice, I started splitting my Aperture library by year -- I did this by setting up a smart album for each year and clicking "Export > Smart Album as New Library..." I now want to merge them back together but am not sure how. I am also