Oracle8i Java Developer's Guide
Release 3 (8.1.7)

Part Number A83728-01

Library

Solution Area

Contents

Go to previous page

Index

A  B  C  D  E  F  G  I  J  L  M  N  O  P  R  S  T  U  V  W 


Symbols

#sql, 3-13, 3-14

A

act method, 6-13
application
compiling, 2-15
development, 2-3
distributed, 1-21
executing in a session, 2-3
execution control, 2-6
execution rights, 2-27
invoking, 3-3, 3-24
threading, 2-44
attributes
definition, 1-3
types of, 1-4
Aurora
definition, 2-2
authentication, 5-2

B

BasicPermission, 5-14
bean, 1-21
bytecode
defined, 1-8
verification, 2-22

C

call
definition, 2-2
managing resources across calls, 2-41
static fields, 2-5
call specification, 3-5
Callback class
act method, 6-13
class
attributes, 1-3, 1-5
definition, 1-2
dynamic loading, 1-16
execution, 2-2
hierarchy, 1-5
inheritance, 1-5, 1-6
loading, 2-2, 2-6, 2-23
marking valid, 2-20
methods, 1-3, 1-5
name, 2-32
publish, 2-2
resolving references, 2-19
Class class
getClassLoader method, 2-35
.class files, 2-14, 2-23, 2-24
Class interface
forName method, 2-33
class schema object, 2-14, 2-20, 2-23, 2-24
classes
loading, 3-2
protected, 5-25
publishing, 2-30, 3-2
resolving, 3-2
classes111.zip, 2-9
classes12.zip, 2-10
ClassForName class
lookupClass method, 2-36
classForNameAndSchema method, 2-36
ClassNotFoundException, 2-33
CLASSPATH, 2-14, 2-33, 4-9
client
setup, 4-8
code
native compilation, 6-2
CodeSource class, 5-5
equals method, 5-5
implies method, 5-5
COM, 1-22
compiling, 2-15
error messages, 2-16
memory problems, 6-11
options, 2-16
runtime, 2-15
setting options, 3-19
component, 1-21
configuration, 4-1
JServer, 4-6 to 4-8
performance, 6-7
connection
configuration, 4-6
security, 5-2
CORBA
configuring, 4-7, 4-8
CosNaming, 3-7
defined, xii, 1-17, 1-21, 2-5, 3-2, 3-6
documentation, 1-22
example, 3-9
invoking, 3-2
Java 2 support, 2-10
pure CORBA using Java 2, 2-13
security, 5-2
CosNaming, 3-7

D

data confidentiality, 5-2
database
configuration, 4-6
privileges, 5-2
DBA_JAVA_POLICY view, 5-6, 5-18, 5-20
DBMS_JAVA package, 3-21, 4-3
defined, 5-5
delete_permission method, 4-5, 5-18
disable_permission method, 4-5, 5-18
dropjava method, 4-4
enable_permission method, 4-5, 5-18
get_compiler_option method, 4-4
grant_permission method, 4-5, 5-8, 5-10
grant_policy_permission method, 4-5, 5-12, 5-20
loadjava method, 4-4
longname method, 2-29, 2-33, 4-3
manipulating security, 2-10
modifying permissions, 5-19
modifying PolicyTable permissions, 5-10, 5-12
reset_compiler_option method, 4-4
restart_debugging method, 3-22, 4-5
restrict_permission method, 4-5, 5-9, 5-10
revoke_permission method, 4-5, 5-18
set_compiler_option, 3-19
set_compiler_option method, 4-4
set_output method, 3-24, 4-4
setting permissions, 5-6
shortname method, 2-29, 2-33, 4-3
start_debugging method, 3-21, 4-5
stop_debugging method, 4-5
DBMS_OUTPUT package, 4-4
DbmsJava class, see DBMS_JAVA package
DbmsObjectInputStream class, 2-36
DbmsObjectOutputStream class, 2-36
deadlock, 2-45
DeadlockError exception, 2-45
debug
compiler option, 2-17
DebugAgent class, 3-19
debugging, 4-5, 5-25
agent, 3-19, 3-21
connecting a debugger, 3-22
Java applications, 3-18
necessary permissions, 5-25
setting compiler options, 3-19
starting Debug Agent, 3-21
starting proxy, 3-20
using OracleAgent class, 3-22
DebugProxy class, 3-19, 3-20
definer rights, 2-27
delete method, 5-18
delete_permission method, 4-5, 5-18
deployejb tool, 2-31
disable method, 5-18
disable_permission method, 4-5, 5-18
distributed objects, 1-21, 3-6
dropjava method, 4-4
dropjava tool, 2-25

E

EJB
component, 1-21
configuring, 4-7, 4-8
defined, xii, 1-17, 1-21, 2-5, 3-2, 3-6
documentation, 1-22
example, 3-8
invoking, 3-2
security, 5-2
state, 1-21
enable method, 5-18
enable_permission method, 4-5, 5-18
encoding
compiler option, 2-17
end-of-call migration, 6-12
EndOfCallRegistry class, 6-13
registerCallback method, 6-13
endSession method, 2-5, 2-46
Enterprise Java Beans, see EJB
equals method, 5-5
errors
compilation, 2-16
exception
ClassNotFoundException, 2-33
DeadlockError, 2-45
IOException, 2-39
LimboError, 2-45
ThreadDeathException, 2-46
execution rights, 2-27
exitCall method, 2-46

F

FilePermission, 5-8, 5-19, 5-21, 5-23
FilePermission permission, 6-6
files, 2-38
across calls, 2-41
lifetime, 2-39
finalizers, 2-41
footprint, 1-14, 2-4
forName method, 2-33

G

garbage collection, 1-13, 1-14, 2-5
managing resources, 2-38
misuse, 2-40
purpose, 2-40
General Inter-Orb Protocol, see GIOP
get_compiler_option method, 2-17, 4-4
getCallerClass method, 2-35
getClassLoader method, 2-35
GIOP
configuring, 4-6, 4-7
presentation, 4-8
grant method, 5-8
grant_permission method, 4-5, 5-8, 5-10
grant_policy_permission method, 4-5, 5-12, 5-20
granting permission, 5-5
grantPolicyPermission method, 5-13
GUI, 2-31

I

IIOP
configuring, 4-7
defined, 3-7
SSL, 4-8
implies method, 5-5
inheritance, 1-5, 1-6
init method, 2-11
initjvm.sql, 4-2, 4-3, 4-6
installation, 4-1, 4-2
integrity, 5-2
interfaces
defined, 1-6
user, 2-31
internet newsgroups, xiii
invoker rights, 2-27
IOException, 2-39

J

Java
applications, 2-1, 2-15
loading, 2-23
attributes, 1-3
class, 1-2
client
CLASSPATH, 4-9
setup, 4-8
compiling, 2-15
development environment, 2-14
differences from Sun JDK, 2-3
distributed applications, xii, 3-2
documentation, xii, 1-1, 1-22
execution control, 2-6
execution rights, 2-27
features, 1-11
in the database, 1-1, 1-12, 2-1, 2-2
interpreter, 2-2
introduction, xi
invoking, 2-2, 3-3
loading classes, 2-6, 3-2
checking results, 2-28
methods, 1-3
natively compiling, 6-2
overview, 1-1, 1-2
permissions, 4-5
polymorphism, 1-6
programming models, xii
publishing, 2-7
resolving classes, 2-19
resources, 1-2
stored procedures, see Java stored procedures
Java 2
migrating from JDK 1.1, 2-7
migrating security, 2-10
security, 5-2
Java Compatibility Kit, see JCK
.java files, 2-14, 2-23, 2-24
java interpreter, 2-2, 2-6
Java language specification, see JLS
Java Naming and Directory Interface, see JNDI
Java Native Interface, see JNI
Java Remote Method Invocation, see RMI
Java stored procedures, xii, 2-5
configuring, 4-7
defined, 1-17, 1-18, 3-3
documentation, 1-22
invoking, 3-2
publishing, 2-30
Java virtual machine, see JVM
JAVA$OPTIONS table, 2-16
JAVA_ADMIN role
assigned permissions, 5-21
example, 5-13
granting permission, 5-3, 5-5, 5-12, 5-20
JAVA_DEPLOY role, 6-6
JAVA_MAX_SESSIONSPACE_SIZE parameter, 6-8
JAVA_POOL_SIZE parameter
default, 4-6
defined, 6-8, 6-9
errors, 6-11
minimum value, 4-3
JAVA_SOFT_SESSIONSPACE_LIMIT parameter, 6-8
JAVADEBUGPRIV role, 5-24, 5-25
JavaServer Pages, 3-2
java.sql package, 2-8
JAVASYSPRIV role, 5-3, 5-23, 5-24
JAVAUSERPRIV role, 5-3, 5-23, 5-24
JCK, 1-11
jdb debugging tool, 3-18, 3-23
JDBC
2.0 support, 2-8
accessing SQL, 1-18
defined, 1-17, 3-2, 3-11
documentation, 1-22
driver types, 1-19, 3-11
example, 3-12
interacting with SQL, 3-17
security, 5-2
web information, xii
JDeveloper
debugging, 3-18
development environment, 1-22, 3-16, 4-12
JDK
requirements, 4-8
web location, xiii
JLS
specification, 1-11
web information, xiii
JNDI
defined, 3-7
name lookup, 3-8
JNI support, 3-10
JPublisher
documentation, 1-22
JServer
configure, 4-1
definition, xiii, 2-2
install, 4-1, 4-2
JServer Accelerator
for user applications, 6-5
installation requirements, 6-5
overview, 6-2, 6-3
JServerPermission, 5-8, 5-19, 5-20, 5-21, 5-22, 5-23, 5-24
defined, 5-20
JVM
bytecodes, 1-8
defined, 1-2, 1-8
garbage collection, 1-13, 1-14
multithreading, 1-13
responsibilities, 2-4
security, 4-5
specification, 1-11
web information, xiii

L

LimboError exception, 2-45
loading, 2-23 to 2-30
checking results, 2-25, 2-28
class, 1-16, 2-6, 2-15
compilation option, 2-15
granting execution, 2-27
JAR or ZIP files, 2-26
necessary privileges and permissions, 2-26
reloading classes, 2-27
restrictions, 2-25
loadjava method, 4-4
loadjava tool, 2-24 to 2-26
compiling source, 2-15, 6-12
example, 3-4
execution rights, 2-27, 5-3
loading class, 2-23
loading ZIP or JAR files, 2-26
restrictions, 2-25
using memory, 6-8
logging, 2-16
longname method, 2-29, 2-33, 4-3
lookupClass method, 2-36

M

main method, 2-6
memory
across calls, 2-40
call, 2-5
java pool, 6-10
leaks, 2-40
lifetime, 2-38, 2-39
manager, 2-14
performance configuration, 6-7
report allocation, 6-17
running out of, 6-11
session, 2-5, 6-13
Memory Profiling Utility, see MemStat
MemStat
analysis options, 6-18
example, 6-20, 6-22
reporting, 6-21
security permissions, 6-20
using, 6-19
warning, 6-20
MemStat class, 6-19
writeDump method, 6-19
writeDumpAtEOC method, 6-19
MemStat utility
overview, 6-17
methods, 1-3, 1-5
multithreading, 1-13

N

name service, 3-7
CosNaming, 3-7
JNDI, 3-7
native compilation, 1-15, 6-2
static, 6-3
native compiler, 6-2
ncomp
security, 6-6
ncomp tool, 6-5
executing, 6-7
Net8
configuring, 4-6
NetPermission, 5-8, 5-19, 5-21, 5-22
networking
configuration, 4-6

O

object
full to short name conversion, 2-29
lifetime, 2-39
schema, 2-14
serialization, 2-36
short name, 2-29
ObjectInputStream class, 2-36
ObjectOutputStream class, 2-36
online
compiler option, 2-17
operating system
resources, 2-38
across calls, 2-41
lifetime, 2-39
performance, 6-7
permission, 2-39
OracleAgent class
restart method, 3-22
start method, 3-22
stop method, 3-22
oracle.jdbc2 package, 2-8, 2-10
OracleRuntime class
exitCall method, 2-46
getCallerClass method, 2-35
Orb Class
init method, 2-11
ORBClass property, 2-13
ORBSingletonClass property, 2-13
output
redirecting, 3-24

P

packages
DBMS_JAVA, 4-3
oracle.jdbc2, 2-8
protected, 5-25
performance, 1-15, 6-1 to 6-17
Permission class, 5-7, 5-13, 5-14, 5-19
permissions, 4-5, 5-2 to 5-25
administrating, 5-12
assigning, 5-4, 5-6
creating, 5-14
deleting, 5-18
disabling, 5-17
enabling, 5-17
FilePermission, 6-6
granting, 5-5, 5-8, 5-10
granting policy, 5-12
grouped into roles, 5-24
JAVA_ADMIN role, 5-21
JAVA_DEPLOY role, 6-6
JAVADEBUGPRIV role, 5-24
JAVASYSPRIV role, 5-23
JAVAUSERPRIV role, 5-23
PUBLIC, 5-22
restricting, 5-5, 5-9, 5-10
specifying policy, 5-4
SYS permissions, 5-22
types, 5-7, 5-19
policy table
managing, 5-12
modifying, 5-6
setting permissions, 5-6
viewing, 5-6
PolicyTable class
specifying policy, 5-4
updating, 5-5, 5-14
PolicyTableManager class
delete method, 5-18
disable method, 5-18
enable method, 5-18
revoke method, 5-18
PolicyTablePermission, 5-8, 5-12, 5-19, 5-20, 5-21, 5-22
polymorphism, 1-6
presentation
compatibility for RMI, 3-10
presentation layer
GIOP, 4-8
privileges
database, 5-2
.properties files, 2-14, 2-23, 2-25
property
ORBClass, 2-13
ORBSingletonClass, 2-13
PropertyPermission, 5-8, 5-19, 5-21, 5-22, 5-24
PUBLIC permissions, 5-22
publish tool, 2-31
publishing, 2-7, 2-15, 2-30, 3-2
example, 3-5

R

ReflectPermission, 5-8, 5-19, 5-21, 5-22
registerCallback method, 6-13
requirements
JDK version, 4-8
reset_compiler_option method, 2-17, 4-4
resolver, 2-19 to 2-23
default, 2-20
defined, 2-14, 2-15, 2-20, 2-33, 3-2
example, 3-4
ignoring non-existent references, 2-20, 2-22
resource schema object, 2-14, 2-23, 2-25
restart method, 3-22
restart_debugging method, 3-22, 4-5
restrict method, 5-9
restrict_permission method, 4-5, 5-9, 5-10
revoke method, 5-18
revoke_permission method, 4-5, 5-18
RMI
support, 3-10
RuntimePermission, 5-8, 5-19, 5-21, 5-22, 5-23

S

schema object
defined, 2-23
name, 2-32
using, 2-14
security, 5-1 to 5-26
book recommendations, 5-4
CORBA, 5-2
EJB, 5-2
Java 2, 5-3
JDBC, 5-2
JVM, 4-5
network, 5-2
operating system resources, 2-39
SecurityManager class, 5-5
SecurityPermission, 5-8, 5-19, 5-21, 5-22
.ser files, 2-14, 2-23, 2-25
SerializablePermission, 5-8, 5-19, 5-21, 5-23
serialization, 2-36
ServerSocket class, 2-43
Servlets, 3-2
session
coordination with JVM, 2-4
definition, 2-2
footprint, 1-14
lifetime, 2-5
role in Java execution, 2-3
timeout, 2-5
session shell tool, 3-9
set_compiler_option method, 2-17, 4-4
set_compiler_option procedure, 3-19
set_output method, 3-24, 4-4
SHARED_POOL_SIZE parameter
default, 4-6
defined, 6-8
errors, 6-11
minimum value, 4-3
shortname method, 2-29, 2-33, 4-3
Socket class, 2-43
SocketPermission, 5-8, 5-19, 5-21, 5-23, 5-24
sockets
across calls, 2-38, 2-43
defined, 2-43
lifetime, 2-39, 2-43
source schema object, 2-14, 2-23, 2-24
SQL
query, 3-2, 3-11
SQLJ
accessing SQL, 1-18
converting, 3-17
defined, xii, 1-17, 1-19, 3-2, 3-11
documentation, xii, 1-22
example, 3-13
interoperates with PL/SQL, 3-17
running, 3-16
translating, 3-16
typing paradigm, 3-15
using JDBC, 1-19
.sqlj files, 2-14, 2-23, 2-24
sqlj utility, 3-16
SSL, 4-8
configuring, 4-6
start method, 3-22
start_debugging method, 3-21, 4-5
static variable, 2-5
end of call migration, 6-12
stop method, 3-22
stop_debugging method, 3-21, 4-5
SYS
assigned permissions, 5-22
security permissions, 5-19
System class
getProperty method, 3-24

T

ThreadDeathException, 2-46
threading
applications, 2-44
lifecycle, 2-45
model, 1-13, 2-44
using in JServer, 2-38
timeout, 2-5
trigger
using Java stored procedures, 3-3

U

user interface, 2-31
USER_ERRORS view, 2-16
USER_JAVA_POLICY view, 5-6, 5-20
USER_OBJECTS view, 2-25, 2-28, 4-4

V

V$SGASTAT table, 6-10
variables
static, 2-5
version
retrieving, 3-24
Visigenic, 2-10
Visigenic
version supported, 2-10

W

web sites, xii

Go to previous page
Oracle
Copyright © 1996-2000, Oracle Corporation.

All Rights Reserved.

Library

Solution Area

Contents