Extracting Encrypted Schema Source Files

To indicate that extracted schema source files are encrypted, first check the Encrypt Sources check box in the Extract dialog Schema Options sheet. (For details, see "Specifying Your Schema Options", earlier in this chapter.) You can encrypt schema source files extracted to a multiple extract file, if required.

When extracting method source code and source encryption is enabled, the following occurs.

  1. JADE looks in the SchemaEncryptionHookLibrary parameter in the [JadeSecurity] section of the JADE initialization file for the name of your user-defined encryption library. JADE uses a default encryption algorithm if you do not supply your own library.

  2. JADE attempts to load the encryption library by calling LoadLibrary and gets the address of your predefined encryption hook routine by calling GetProcAddress. An error is raised if the library cannot be located.

  3. The source code is passed to your specified encryption routine. The encryption routine can encrypt the source in any way, and can change its length. For example, the encryption routine could embed an identifier at the beginning of the source to identify the type of encryption algorithm that is used.

  4. The encrypted source code is written to the extract file.