<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Oracle User Defined Functions and APIs on</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/</link><description>Recent content in Oracle User Defined Functions and APIs on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/index.xml" rel="self" type="application/rss+xml"/><item><title>General UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_general_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_general_udfs/</guid><description>&lt;p>This section includes the general UDFs that can be used to retrieve the Oracle Protector version and the current user.&lt;/p>
&lt;h2 id="ptywhoami">pty.whoami&lt;/h2>
&lt;p>The UDF returns the name of the user who is currently logged in to the database.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.whoami()
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>
None&lt;/p>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>
This UDF returns the name of the user as the VARCHAR2 string.&lt;/p>
&lt;p>&lt;strong>Exception:&lt;/strong>&lt;br>
None&lt;/p>
&lt;p>&lt;strong>Example:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>select pty.whoami() ”Test of WhoAmI” from dual;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>Test of WhoAmI
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>---
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>USER1
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h2 id="ptygetversion">pty.getversion&lt;/h2>
&lt;p>This UDF returns the version of the protector.&lt;/p></description></item><item><title>Access Check Procedures</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_access_chk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_access_chk/</guid><description>&lt;p>The procedures listed here check whether the user is granted access permissions to the data element. The procedures will pass if the user has access. Otherwise, it casts an exception with the reason for failure.&lt;/p>
&lt;blockquote>
&lt;p>The permissions for protect, unprotect, and reprotect are defined based on the roles assigned to
the user. For more information about how to grant these permissions and assign roles, refer to Policy Management.&lt;/p>&lt;/blockquote>
&lt;h2 id="ptyins_check">pty.ins_check&lt;/h2>
&lt;p>This procedure determines if the user has &lt;code>insert(protect)&lt;/code> access to the data element.&lt;/p></description></item><item><title>Insert Encryption UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_ins_enc_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_ins_enc_udfs/</guid><description>&lt;p>These UDFs encrypt the data.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> The permissions for protect, unprotect, and reprotect are defined based on the roles assigned to the user. For more information about how to grant these permissions and assign roles, refer to Policy Management.&lt;/p>&lt;/blockquote>
&lt;h2 id="ptyins_encrypt">pty.ins_encrypt&lt;/h2>
&lt;p>This UDF encrypts data with a data element for encryption.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.ins_encrypt (dataelement CHAR, inval CHAR, scid BINARY_INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>inval&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>BINARY_INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero.&lt;br>&lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>
This UDF returns the encrypted value as RAW data.&lt;/p></description></item><item><title>Insert No-Encryption, Token, and FPE UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_ins_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_ins_udfs/</guid><description>&lt;p>These UDFs are used with Tokenization, Format Preserving Encryption (FPE) and, No Encryption data elements.&lt;/p>
&lt;h2 id="ptyins_char">pty.ins_char&lt;/h2>
&lt;p>This UDF protects the &lt;code>CHAR&lt;/code> data with tokenization and No Encryption data elements.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> This UDF supports masking.&lt;/p>&lt;/blockquote>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.ins_char (dataelement CHAR, inval CHAR, scid BINARY_INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>inval&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>BINARY_INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero.&lt;br>&lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>
This UDF returns the protected value as the &lt;code>CHAR&lt;/code> data type.&lt;/p></description></item><item><title>Multiple Insert Encryption Procedures</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_mult_ins_enc_prc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_mult_ins_enc_prc/</guid><description>&lt;p>These procedures encrypt one to four values of data with one procedure call. The user must be granted &lt;code>Protect&lt;/code> access for the data element that will be used to execute these procedures. You can use the &lt;code>ins_check&lt;/code> procedure to check whether the user has &lt;code>Protect&lt;/code> access.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> These UDFs are marked for deprecation and will be removed from the future releases. Protegrity recommends to use the standard Insert or Protect UDFs.&lt;/p></description></item><item><title>Select Decryption UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_sel_dec_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_sel_dec_udfs/</guid><description>&lt;p>The UDFs in this section decrypt the encrypted data. Unprotect access is required to use these procedures.&lt;/p>
&lt;h2 id="ptysel_decrypt">pty.sel_decrypt&lt;/h2>
&lt;p>This UDF decrypts the &lt;code>RAW&lt;/code> data with an encryption data element.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.sel_decrypt(dataelement CHAR, inval RAW, scid BINARY_INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>inval&lt;/code>&lt;/td>
 &lt;td>RAW&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>BINARY_INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero. &lt;br> &lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>&lt;/p></description></item><item><title>Select No-Encryption, Token, and FPE UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_sel_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_sel_udfs/</guid><description>&lt;p>These UDFs unprotect the protected data. Unprotect access is required to use these UDFs.&lt;/p>
&lt;h2 id="ptysel_char">pty.sel_char&lt;/h2>
&lt;p>This UDF unprotects the &lt;code>CHAR&lt;/code> data with tokenization and No Encryption data elements.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> This UDF supports masking.&lt;/p>&lt;/blockquote>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.sel_char(dataelement CHAR, inval CHAR, scid BINARY_INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>inval&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>BINARY_INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero. &lt;br> &lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>&lt;/p></description></item><item><title>Update Encryption UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_upd_enc_udf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_upd_enc_udf/</guid><description>&lt;p>These UDFs update the data. &lt;code>Protect&lt;/code> access is required to use these functions.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> These UDFs are marked for deprecation and will be removed from the future releases. Protegrity recommends to use the standard Insert or Protect UDFs.&lt;/p>&lt;/blockquote>
&lt;h2 id="ptyencupdate">pty.encUpdate&lt;/h2>
&lt;p>This procedure updates and encrypts one value of the &lt;code>VARCHAR2&lt;/code> data with one data element for encryption.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.encUpdate(dataelement VARCHAR2, cdata VARCHAR2, rdata RAW, scid INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>VARCHAR2&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>cdata&lt;/code>&lt;/td>
 &lt;td>VARCHAR2&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>rdata&lt;/code>&lt;/td>
 &lt;td>RAW&lt;/td>
 &lt;td>Specifies the encrypted output data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero.&lt;br>&lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>
This UDF returns the encrypted value as RAW data.&lt;/p></description></item><item><title>Update No-Encryption, Token, and FPE UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_upd_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_upd_udfs/</guid><description>&lt;p>These UDFs are used to update the data for tokenization and Format Preserving Encryption (FPE). The user must have &lt;code>Protect&lt;/code> access to use these procedures.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> For reprotect operations, the Audit logs are generated as Protect Logs instead of Reprotect Logs.&lt;/p>&lt;/blockquote>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> These UDFs are marked for deprecation and will be removed from the future releases. Protegrity recommends to use the standard Insert or Protect UDFs.&lt;/p>&lt;/blockquote>
&lt;h2 id="ptyupd_char">pty.upd_char&lt;/h2>
&lt;p>This UDF re-protects the &lt;code>CHAR&lt;/code> data with tokenization and No Encryption data elements.&lt;/p></description></item><item><title>Multiple Update Encryption Procedures</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_mult_upd_enc_prc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_mult_upd_enc_prc/</guid><description>&lt;p>These procedures encrypt one to four values of data with one procedure call. The user must be granted &lt;code>Protect&lt;/code> access for the data element that will be used to execute these procedures. You can use the &lt;code>upd_check&lt;/code> procedure to check whether the user has &lt;code>Protect&lt;/code> access.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> These UDFs are marked for deprecation and will be removed from the future releases. Protegrity recommends to use the standard Insert or Protect UDFs.&lt;/p></description></item><item><title>Hash UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_hash_udf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_hash_udf/</guid><description>&lt;p>These UDFs protect the data as a hash value.&lt;/p>
&lt;h2 id="ptyins_hash_varchar2">pty.ins_hash_varchar2&lt;/h2>
&lt;p>This UDF uses the hash function to protect the &lt;code>VARCHAR&lt;/code> data with a data element for hashing to return a protected value.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-gdscript3" data-lang="gdscript3">&lt;span style="display:flex;">&lt;span>&lt;span style="color:#000">pty&lt;/span>&lt;span style="color:#ce5c00;font-weight:bold">.&lt;/span>&lt;span style="color:#000">ins_hash_varchar2&lt;/span>&lt;span style="color:#000;font-weight:bold">(&lt;/span>&lt;span style="color:#000">dataelement&lt;/span> &lt;span style="color:#000">CHAR&lt;/span>&lt;span style="color:#000;font-weight:bold">,&lt;/span> &lt;span style="color:#000">cdata&lt;/span> &lt;span style="color:#000">VARCHAR2&lt;/span>&lt;span style="color:#000;font-weight:bold">,&lt;/span> &lt;span style="color:#000">scid&lt;/span> &lt;span style="color:#000">BINARY_INTEGER&lt;/span>&lt;span style="color:#000;font-weight:bold">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>cdata&lt;/code>&lt;/td>
 &lt;td>VARCHAR2&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>BINARY_INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero. &lt;br> &lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>&lt;/p></description></item><item><title>Blob UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_blob_udf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_blob_udf/</guid><description>&lt;p>These UDFs can be used to encrypt and decrypt the data stored in the &lt;code>BLOB&lt;/code> data type.&lt;/p>
&lt;h2 id="ptyins_encrypt_blob">pty.ins_encrypt_blob&lt;/h2>
&lt;p>This function is used to encrypt the data stored in a &lt;code>BLOB&lt;/code> with an encryption data element.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.ins_encrypt_blob(dataelement CHAR, input_data BLOB , scid INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;strong>Parameters:&lt;/strong>&lt;br>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Name&lt;/th>
 &lt;th>Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;code>dataelement&lt;/code>&lt;/td>
 &lt;td>CHAR&lt;/td>
 &lt;td>Specifies the name of the data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>input_data&lt;/code>&lt;/td>
 &lt;td>BLOB&lt;/td>
 &lt;td>Specifies the input data.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;code>scid&lt;/code>&lt;/td>
 &lt;td>BINARY_INTEGER&lt;/td>
 &lt;td>Specifies the security co-ordinate ID. Set the value of the parameter to zero. &lt;br> &lt;strong>Note:&lt;/strong> This parameter is no longer used and is retained for compatibility purposes only.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Returns:&lt;/strong>&lt;br>
This UDF returns the encrypted value as the BLOB data.
&amp;gt; &lt;strong>Note:&lt;/strong> If you perform a protect operation with the input data as null or empty, then the output will be an &lt;code>empty_blob&lt;/code>.&lt;/p></description></item><item><title>Clob UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_clob_udf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_clob_udf/</guid><description>&lt;p>These UDFs can be used to encrypt and decrypt the data stored in the &lt;code>CLOB&lt;/code> data type.&lt;/p>
&lt;h2 id="ptyins_encrypt_clob">pty.ins_encrypt_clob&lt;/h2>
&lt;p>This function is used to encrypt the data stored in a &lt;code>CLOB&lt;/code> with an encryption data element.&lt;/p>
&lt;p>&lt;strong>Signature:&lt;/strong>&lt;br>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>pty.ins_encrypt_clob(dataelement CHAR, input_data CLOB, scid INTEGER)
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;blockquote>
&lt;p>&lt;strong>CAUTION:&lt;/strong> Ensure that the input data stored in the CLOB data type does not contain multibyte characters. If you pass data containing multibyte characters to the CLOB UDF, then an unexpected behaviour is observed. &lt;br> For example: An error &lt;code>'ORA-28579: network error during callback from external procedure agent'&lt;/code> is returned or the input data is corrupted. For more information about CLOB data type, refer to the &lt;a href="http://ora-srv.wlv.ac.uk/oracle19c_doc/addci/working-with-multimedia-data-types.html#GUID-5469F1F7-BD5B-4FB4-8F13-AE4CA0915F6D">Oracle Help Center.&lt;/a>&lt;/p></description></item><item><title>Bulk UDFs</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_varchar_bulk_udfs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_varchar_bulk_udfs/</guid><description>&lt;p>Bulk User-Defined Functions (UDFs) in Oracle are designed to process multiple rows in a single call, rather than operating on one row at a time like scalar UDFs. They are typically used for batch operations such as tokenization, encryption, or transformation of large datasets. In Oracle v10.0.0, bulk UDFs are implemented to improve efficiency when working with large tables or columns containing sensitive data.&lt;/p>
&lt;p>The features of the bulk UDFs are listed below.&lt;/p></description></item><item><title>Oracle Input Datatype to UDF Mapping</title><link>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_input_datatype_udf_map/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/dbp/dbp_api_udfs/oracle_api_udfs/dbp_oracle_input_datatype_udf_map/</guid><description>&lt;p>This section provides tables with the Oracle input data type to the appropriate UDF mapping. It also provides the data element information that must be considered when creating a policy.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>CAUTION:&lt;/strong> Starting from version 10.0.0, the 3DES, CUSP 3DES, and HMAC-SHA1 protection methods have been deprecated based on NIST recommendations around weak ciphers. It is recommended to use the following protection methods instead of the deprecated methods:&lt;/p>&lt;/blockquote>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Deprecated Protection Methods&lt;/th>
 &lt;th>Recommended Protection Methods&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>3DES&lt;/td>
 &lt;td>AES-128 and AES-256&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CUSP 3DES&lt;/td>
 &lt;td>CUSP AES-128 and CUSP AES-256&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>HMAC-SHA1&lt;/td>
 &lt;td>HMAC-SHA256&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>For assistance in switching to a different protection method, contact Protegrity.&lt;/p></description></item></channel></rss>