Oracle8
i
Java Developer's Guide
Release 3 (8.1.7)
Part Number A83728-01
Library
Service
Contents
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X Y Z
Symbols
#sql, 3-13,
3-14
A
act method, 6-13
application
compiling, 2-15
development, 2-3
distributed, 1-21
executing in a session, 2-3
execution control, 2-6
execution rights, 2-27
invoking, 3-3,
3-24
threading, 2-44
attributes
definition, 1-3
types of, 1-4
Aurora
definition, 2-2
authentication, 5-2
B
BasicPermission, 5-14
bean, 1-21
bytecode
defined, 1-8
verification, 2-22
C
call
definition, 2-2
managing resources across calls, 2-41
static fields, 2-5
call specification, 3-5
Callback class
act method, 6-13
class
attributes, 1-3,
1-5
definition, 1-2
dynamic loading, 1-16
execution, 2-2
hierarchy, 1-5
inheritance, 1-5,
1-6
loading, 2-2,
2-6,
2-23
marking valid, 2-20
methods, 1-3,
1-5
name, 2-32
publish, 2-2
resolving references, 2-19
Class class
getClassLoader method, 2-35
.class files, 2-14,
2-23,
2-24
Class interface
forName method, 2-33
class schema object, 2-14,
2-20,
2-23,
2-24
classes
loading, 3-2
protected, 5-25
publishing, 2-30,
3-2
resolving, 3-2
classes111.zip, 2-9
classes12.zip, 2-10
ClassForName class
lookupClass method, 2-36
classForNameAndSchema method, 2-36
ClassNotFoundException, 2-33
CLASSPATH, 2-14,
2-33,
4-9
client
setup, 4-8
code
native compilation, 6-2
CodeSource class, 5-5
equals method, 5-5
implies method, 5-5
COM, 1-22
compiling, 2-15
error messages, 2-16
memory problems, 6-11
options, 2-16
runtime, 2-15
setting options, 3-19
component, 1-21
configuration, 4-1
JServer, 4-6 to
4-8
performance, 6-7
connection
configuration, 4-6
security, 5-2
CORBA
configuring, 4-7,
4-8
CosNaming, 3-7
defined, xii,
1-17,
1-21,
2-5,
3-2,
3-6
documentation, 1-22
example, 3-9
invoking, 3-2
Java 2 support, 2-10
pure CORBA using Java 2, 2-13
security, 5-2
CosNaming, 3-7
D
data confidentiality, 5-2
database
configuration, 4-6
privileges, 5-2
DBA_JAVA_POLICY view, 5-6,
5-18,
5-20
DBMS_JAVA package, 3-21,
4-3
defined, 5-5
delete_permission method, 4-5,
5-18
disable_permission method, 4-5,
5-18
dropjava method, 4-4
enable_permission method, 4-5,
5-18
get_compiler_option method, 4-4
grant_permission method, 4-5,
5-8,
5-10
grant_policy_permission method, 4-5,
5-12,
5-20
loadjava method, 4-4
longname method, 2-29,
2-33,
4-3
manipulating security, 2-10
modifying permissions, 5-19
modifying PolicyTable permissions, 5-10,
5-12
reset_compiler_option method, 4-4
restart_debugging method, 3-22,
4-5
restrict_permission method, 4-5,
5-9,
5-10
revoke_permission method, 4-5,
5-18
set_compiler_option, 3-19
set_compiler_option method, 4-4
set_output method, 3-24,
4-4
setting permissions, 5-6
shortname method, 2-29,
2-33,
4-3
start_debugging method, 3-21,
4-5
stop_debugging method, 4-5
DBMS_OUTPUT package, 4-4
DbmsJava class, see DBMS_JAVA package
DbmsObjectInputStream class, 2-36
DbmsObjectOutputStream class, 2-36
deadlock, 2-45
DeadlockError exception, 2-45
debug
compiler option, 2-17
DebugAgent class, 3-19
debugging, 4-5,
5-25
agent, 3-19,
3-21
connecting a debugger, 3-22
Java applications, 3-18
necessary permissions, 5-25
setting compiler options, 3-19
starting Debug Agent, 3-21
starting proxy, 3-20
using OracleAgent class, 3-22
DebugProxy class, 3-19,
3-20
definer rights, 2-27
delete method, 5-18
delete_permission method, 4-5,
5-18
deployejb tool, 2-31
disable method, 5-18
disable_permission method, 4-5,
5-18
distributed objects, 1-21,
3-6
dropjava method, 4-4
dropjava tool, 2-25
E
EJB
component, 1-21
configuring, 4-7,
4-8
defined, xii,
1-17,
1-21,
2-5,
3-2,
3-6
documentation, 1-22
example, 3-8
invoking, 3-2
security, 5-2
state, 1-21
enable method, 5-18
enable_permission method, 4-5,
5-18
encoding
compiler option, 2-17
end-of-call migration, 6-12
EndOfCallRegistry class, 6-13
registerCallback method, 6-13
endSession method, 2-5,
2-46
Enterprise Java Beans, see EJB
equals method, 5-5
errors
compilation, 2-16
exception
ClassNotFoundException, 2-33
DeadlockError, 2-45
IOException, 2-39
LimboError, 2-45
ThreadDeathException, 2-46
execution rights, 2-27
exitCall method, 2-46
F
FilePermission, 5-8,
5-19,
5-21,
5-23
FilePermission permission, 6-6
files, 2-38
across calls, 2-41
lifetime, 2-39
finalizers, 2-41
footprint, 1-14,
2-4
forName method, 2-33
G
garbage collection, 1-13,
1-14,
2-5
managing resources, 2-38
misuse, 2-40
purpose, 2-40
General Inter-Orb Protocol, see GIOP
get_compiler_option method, 2-17,
4-4
getCallerClass method, 2-35
getClassLoader method, 2-35
GIOP
configuring, 4-6,
4-7
presentation, 4-8
grant method, 5-8
grant_permission method, 4-5,
5-8,
5-10
grant_policy_permission method, 4-5,
5-12,
5-20
granting permission, 5-5
grantPolicyPermission method, 5-13
GUI, 2-31
I
IIOP
configuring, 4-7
defined, 3-7
SSL, 4-8
implies method, 5-5
inheritance, 1-5,
1-6
init method, 2-11
initjvm.sql, 4-2,
4-3,
4-6
installation, 4-1,
4-2
integrity, 5-2
interfaces
defined, 1-6
user, 2-31
internet newsgroups, xiii
invoker rights, 2-27
IOException, 2-39
J
Java
applications, 2-1,
2-15
loading, 2-23
attributes, 1-3
class, 1-2
client
CLASSPATH, 4-9
setup, 4-8
compiling, 2-15
development environment, 2-14
differences from Sun JDK, 2-3
distributed applications, xii,
3-2
documentation, xii,
1-1,
1-22
execution control, 2-6
execution rights, 2-27
features, 1-11
in the database, 1-1,
1-12,
2-1,
2-2
interpreter, 2-2
introduction, xi
invoking, 2-2,
3-3
loading classes, 2-6,
3-2
checking results, 2-28
methods, 1-3
natively compiling, 6-2
overview, 1-1,
1-2
permissions, 4-5
polymorphism, 1-6
programming models, xii
publishing, 2-7
resolving classes, 2-19
resources, 1-2
stored procedures, see Java stored procedures
Java 2
migrating from JDK 1.1, 2-7
migrating security, 2-10
security, 5-2
Java Compatibility Kit, see JCK
.java files, 2-14,
2-23,
2-24
java interpreter, 2-2,
2-6
Java language specification, see JLS
Java Naming and Directory Interface, see JNDI
Java Native Interface, see JNI
Java Remote Method Invocation, see RMI
Java stored procedures, xii,
2-5
configuring, 4-7
defined, 1-17,
1-18,
3-3
documentation, 1-22
invoking, 3-2
publishing, 2-30
Java virtual machine, see JVM
JAVA$OPTIONS table, 2-16
JAVA_ADMIN role
assigned permissions, 5-21
example, 5-13
granting permission, 5-3,
5-5,
5-12,
5-20
JAVA_DEPLOY role, 6-6
JAVA_MAX_SESSIONSPACE_SIZE parameter, 6-8
JAVA_POOL_SIZE parameter
default, 4-6
defined, 6-8,
6-9
errors, 6-11
minimum value, 4-3
JAVA_SOFT_SESSIONSPACE_LIMIT parameter, 6-8
JAVADEBUGPRIV role, 5-24,
5-25
JavaServer Pages, 3-2
java.sql package, 2-8
JAVASYSPRIV role, 5-3,
5-23,
5-24
JAVAUSERPRIV role, 5-3,
5-23,
5-24
JCK, 1-11
jdb debugging tool, 3-18,
3-23
JDBC
2.0 support, 2-8
accessing SQL, 1-18
defined, 1-17,
3-2,
3-11
documentation, 1-22
driver types, 1-19,
3-11
example, 3-12
interacting with SQL, 3-17
security, 5-2
web information, xii
JDeveloper
debugging, 3-18
development environment, 1-22,
3-16,
4-12
JDK
requirements, 4-8
web location, xiii
JLS
specification, 1-11
web information, xiii
JNDI
defined, 3-7
name lookup, 3-8
JNI support, 3-10
JPublisher
documentation, 1-22
JServer
configure, 4-1
definition, xiii,
2-2
install, 4-1,
4-2
JServer Accelerator
for user applications, 6-5
installation requirements, 6-5
overview, 6-2,
6-3
JServerPermission, 5-8,
5-19,
5-20,
5-21,
5-22,
5-23,
5-24
defined, 5-20
JVM
bytecodes, 1-8
defined, 1-2,
1-8
garbage collection, 1-13,
1-14
multithreading, 1-13
responsibilities, 2-4
security, 4-5
specification, 1-11
web information, xiii
L
LimboError exception, 2-45
loading, 2-23 to
2-30
checking results, 2-25,
2-28
class, 1-16,
2-6,
2-15
compilation option, 2-15
granting execution, 2-27
JAR or ZIP files, 2-26
necessary privileges and permissions, 2-26
reloading classes, 2-27
restrictions, 2-25
loadjava method, 4-4
loadjava tool, 2-24 to
2-26
compiling source, 2-15,
6-12
example, 3-4
execution rights, 2-27,
5-3
loading class, 2-23
loading ZIP or JAR files, 2-26
restrictions, 2-25
using memory, 6-8
logging, 2-16
longname method, 2-29,
2-33,
4-3
lookupClass method, 2-36
M
main method, 2-6
memory
across calls, 2-40
call, 2-5
java pool, 6-10
leaks, 2-40
lifetime, 2-38,
2-39
manager, 2-14
performance configuration, 6-7
report allocation, 6-17
running out of, 6-11
session, 2-5,
6-13
Memory Profiling Utility, see MemStat
MemStat
analysis options, 6-18
example, 6-20,
6-22
reporting, 6-21
security permissions, 6-20
using, 6-19
warning, 6-20
MemStat class, 6-19
writeDump method, 6-19
writeDumpAtEOC method, 6-19
MemStat utility
overview, 6-17
methods, 1-3,
1-5
multithreading, 1-13
N
name service, 3-7
CosNaming, 3-7
JNDI, 3-7
native compilation, 1-15,
6-2
static, 6-3
native compiler, 6-2
ncomp
security, 6-6
ncomp tool, 6-5
executing, 6-7
Net8
configuring, 4-6
NetPermission, 5-8,
5-19,
5-21,
5-22
networking
configuration, 4-6
O
object
full to short name conversion, 2-29
lifetime, 2-39
schema, 2-14
serialization, 2-36
short name, 2-29
ObjectInputStream class, 2-36
ObjectOutputStream class, 2-36
online
compiler option, 2-17
operating system
resources, 2-38
across calls, 2-41
lifetime, 2-39
performance, 6-7
permission, 2-39
OracleAgent class
restart method, 3-22
start method, 3-22
stop method, 3-22
oracle.jdbc2 package, 2-8,
2-10
OracleRuntime class
exitCall method, 2-46
getCallerClass method, 2-35
Orb Class
init method, 2-11
ORBClass property, 2-13
ORBSingletonClass property, 2-13
output
redirecting, 3-24
P
packages
DBMS_JAVA, 4-3
oracle.jdbc2, 2-8
protected, 5-25
performance, 1-15,
6-1 to
6-17
Permission class, 5-7,
5-13,
5-14,
5-19
permissions, 4-5,
5-2 to
5-25
administrating, 5-12
assigning, 5-4,
5-6
creating, 5-14
deleting, 5-18
disabling, 5-17
enabling, 5-17
FilePermission, 6-6
granting, 5-5,
5-8,
5-10
granting policy, 5-12
grouped into roles, 5-24
JAVA_ADMIN role, 5-21
JAVA_DEPLOY role, 6-6
JAVADEBUGPRIV role, 5-24
JAVASYSPRIV role, 5-23
JAVAUSERPRIV role, 5-23
PUBLIC, 5-22
restricting, 5-5,
5-9,
5-10
specifying policy, 5-4
SYS permissions, 5-22
types, 5-7,
5-19
policy table
managing, 5-12
modifying, 5-6
setting permissions, 5-6
viewing, 5-6
PolicyTable class
specifying policy, 5-4
updating, 5-5,
5-14
PolicyTableManager class
delete method, 5-18
disable method, 5-18
enable method, 5-18
revoke method, 5-18
PolicyTablePermission, 5-8,
5-12,
5-19,
5-20,
5-21,
5-22
polymorphism, 1-6
presentation
compatibility for RMI, 3-10
presentation layer
GIOP, 4-8
privileges
database, 5-2
.properties files, 2-14,
2-23,
2-25
property
ORBClass, 2-13
ORBSingletonClass, 2-13
PropertyPermission, 5-8,
5-19,
5-21,
5-22,
5-24
PUBLIC permissions, 5-22
publish tool, 2-31
publishing, 2-7,
2-15,
2-30,
3-2
example, 3-5
R
ReflectPermission, 5-8,
5-19,
5-21,
5-22
registerCallback method, 6-13
requirements
JDK version, 4-8
reset_compiler_option method, 2-17,
4-4
resolver, 2-19 to
2-23
default, 2-20
defined, 2-14,
2-15,
2-20,
2-33,
3-2
example, 3-4
ignoring non-existent references, 2-20,
2-22
resource schema object, 2-14,
2-23,
2-25
restart method, 3-22
restart_debugging method, 3-22,
4-5
restrict method, 5-9
restrict_permission method, 4-5,
5-9,
5-10
revoke method, 5-18
revoke_permission method, 4-5,
5-18
RMI
support, 3-10
RuntimePermission, 5-8,
5-19,
5-21,
5-22,
5-23
S
schema object
defined, 2-23
name, 2-32
using, 2-14
security, 5-1 to
5-26
book recommendations, 5-4
CORBA, 5-2
EJB, 5-2
Java 2, 5-3
JDBC, 5-2
JVM, 4-5
network, 5-2
operating system resources, 2-39
SecurityManager class, 5-5
SecurityPermission, 5-8,
5-19,
5-21,
5-22
.ser files, 2-14,
2-23,
2-25
SerializablePermission, 5-8,
5-19,
5-21,
5-23
serialization, 2-36
ServerSocket class, 2-43
Servlets, 3-2
session
coordination with JVM, 2-4
definition, 2-2
footprint, 1-14
lifetime, 2-5
role in Java execution, 2-3
timeout, 2-5
session shell tool, 3-9
set_compiler_option method, 2-17,
4-4
set_compiler_option procedure, 3-19
set_output method, 3-24,
4-4
SHARED_POOL_SIZE parameter
default, 4-6
defined, 6-8
errors, 6-11
minimum value, 4-3
shortname method, 2-29,
2-33,
4-3
Socket class, 2-43
SocketPermission, 5-8,
5-19,
5-21,
5-23,
5-24
sockets
across calls, 2-38,
2-43
defined, 2-43
lifetime, 2-39,
2-43
source schema object, 2-14,
2-23,
2-24
SQL
query, 3-2,
3-11
SQLJ
accessing SQL, 1-18
converting, 3-17
defined, xii,
1-17,
1-19,
3-2,
3-11
documentation, xii,
1-22
example, 3-13
interoperates with PL/SQL, 3-17
running, 3-16
translating, 3-16
typing paradigm, 3-15
using JDBC, 1-19
.sqlj files, 2-14,
2-23,
2-24
sqlj utility, 3-16
SSL, 4-8
configuring, 4-6
start method, 3-22
start_debugging method, 3-21,
4-5
static variable, 2-5
end of call migration, 6-12
stop method, 3-22
stop_debugging method, 3-21,
4-5
SYS
assigned permissions, 5-22
security permissions, 5-19
System class
getProperty method, 3-24
T
ThreadDeathException, 2-46
threading
applications, 2-44
lifecycle, 2-45
model, 1-13,
2-44
using in JServer, 2-38
timeout, 2-5
trigger
using Java stored procedures, 3-3
U
user interface, 2-31
USER_ERRORS view, 2-16
USER_JAVA_POLICY view, 5-6,
5-20
USER_OBJECTS view, 2-25,
2-28,
4-4
V
V$SGASTAT table, 6-10
variables
static, 2-5
version
retrieving, 3-24
Visigenic, 2-10
Visigenic
version supported, 2-10
W
web sites, xii
Copyright © 1996-2000, Oracle Corporation.
All Rights Reserved.
Library
Service
Contents