re sign java home_loadjava sunrsasign.jar — oracle-tech

I did not try it with SunJCEProvider but still BouncyCastle. I'm not sure if the complex deployment tasks described above are really necessary. Therefore I stripped my code to a small and complete AES128 JSP-ToGo example. It is tested on 10.2.0.1.0 WinXP.

Hope that gives some light.

**********************************************************************

install stuff:

**********************************************************************

SQL> connect system

CREATE USER test IDENTIFIED BY test;

GRANT CONNECT, RESOURCE TO test;

call dbms_java.grant_permission(

'TEST',

'java.security.SecurityPermission',

'putProviderProperty.BC',

'' );

call dbms_java.grant_permission(

'TEST',

'java.security.SecurityPermission',

'insertProvider.BC',

'' );

commit;

C:\cryptotest>loadjava -u test/[email protected] -v lib\bcprov-jdk13-134.jar

SQL>connect test

@src\de\hg\Crypto.java

create or replace FUNCTION HGCryptoTest

return VARCHAR2 as language java name

'de.hg.Crypto.test() return java.lang.String';

/

set serveroutput on size 10000

call dbms_java.set_output(10000);

select HGCryptoTest from dual;

**********************************************************************

content of file Crypto.java:

**********************************************************************

create or replace and compile java source named HGCrypto as package de.hg;

import java.security.GeneralSecurityException;

import java.security.Key;

import java.security.Security;

import javax.crypto.Cipher;

import javax.crypto.KeyGenerator;

public class Crypto {

private static boolean initialized = false;

public static String test() {

try {

if(!initialized) {

Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());

initialized = true;

}

KeyGenerator keyGen = KeyGenerator.getInstance("AES"/*, "BC"*/);

keyGen.init(128);

Key key = keyGen.generateKey();

Cipher cipher = Cipher.getInstance("AES"/*, "BC"*/);

System.out.println("Cipher provider: " + cipher.getProvider());

byte[] data = "Hello World!".getBytes();

System.out.println("Original data : " + new String(data));

cipher.init(Cipher.ENCRYPT_MODE, key);

byte[] result = cipher.doFinal(data);

System.out.println("Encrypted data: " + new String(result));

cipher.init(Cipher.DECRYPT_MODE, key);

byte[] original = cipher.doFinal(result);

System.out.println("Decrypted data: " + new String(original));

return "ok";

} catch (GeneralSecurityException e) {

e.printStackTrace();

} catch (IllegalStateException e) {

e.printStackTrace();

}

return "error";

}

}

/

**********************************************************************

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值