Oracle8i Documentation Addendum
Release 3 (8.1.7)

Part Number A85455-01

Library

Product

Contents

Index

Go to previous page Go to next page

6
PL/SQL Supplied Packages

This chapter contains a description of the new DBMS_LDAP package and the DBMS_OBFUSCATION_TOOLKIT which had significant changes for the 8.1.7 release.

This addendum contains these topics:

Package Overview

A package is an encapsulated collection of related program objects stored together in the database. Program objects are procedures, functions, variables, constants, cursors, and exceptions.

Packages have many advantages over stand-alone procedures and functions. For example, they:

Using Oracle Supplied Packages

Most Oracle supplied packages are automatically installed when the database is created and the CATPROC.SQL script is run. For example, to create the DBMS_ALERT package, the DBMSALRT.SQL and PRVTALRT.PLB scripts must be run when connected as the user SYS. These scripts, however, are run automatically by the CATPROC.SQL script.

Certain packages are not installed automatically. Special installation instructions for these packages are documented in the individual chapters.

To call a PL/SQL function from SQL, you must either own the function or have EXECUTE privileges on the function. To select from a view defined with a PL/SQL function, you must have SELECT privileges on the view. No separate EXECUTE privileges are needed to select from the view. Instructions on special requirements for packages are documented in the individual chapters.

Creating New Packages

There are two distinct steps to creating a new package:

  1. Create the package specification with the CREATE PACKAGE statement.

    You can declare program objects in the package specification. Such objects are called public objects. Public objects can be referenced outside the package, as well as by other objects in the package.


    Note:

    It is often more convenient to add the OR REPLACE clause in the CREATE PACKAGE statement. 


  2. Create the package body with the CREATE PACKAGE BODY statement.

    You can declare and define program objects in the package body:

Separation of Specification and Body

The specification of a package declares the public types, variables, constants, and subprograms that are visible outside the immediate scope of the package. The body of a package defines the objects declared in the specification, as well as private objects that are not visible to applications outside the package.

Oracle stores the specification and body of a package separately in the database. Other schema objects that call or reference public program objects depend only on the package specification, not on the package body. This distinction allows you to change the definition of a program object in the package body without causing Oracle to invalidate other schema objects that call or reference the program object. Oracle invalidates dependent schema objects only if you change the declaration of the program object in the package specification.

Example

The following example shows a package specification for a package named EMPLOYEE_MANAGEMENT. The package contains one stored function and two stored procedures.

CREATE PACKAGE employee_management AS
   FUNCTION hire_emp (name VARCHAR2, job VARCHAR2,
      mgr NUMBER, hiredate DATE, sal NUMBER, comm NUMBER,
      deptno NUMBER) RETURN NUMBER;
   PROCEDURE fire_emp (emp_id NUMBER);
   PROCEDURE sal_raise (emp_id NUMBER, sal_incr NUMBER);
END employee_management;

The body for this package defines the function and the procedures:

CREATE PACKAGE BODY employee_management AS
   FUNCTION hire_emp (name VARCHAR2, job VARCHAR2,
      mgr NUMBER, hiredate DATE, sal NUMBER, comm NUMBER,
      deptno NUMBER) RETURN NUMBER IS

The function accepts all arguments for the fields in the employee table except for the employee number. A value for this field is supplied by a sequence. The function returns the sequence number generated by the call to this function.

       new_empno    NUMBER(10);

   BEGIN
      SELECT emp_sequence.NEXTVAL INTO new_empno FROM dual;
      INSERT INTO emp VALUES (new_empno, name, job, mgr,
         hiredate, sal, comm, deptno);
      RETURN (new_empno);
   END hire_emp;

   PROCEDURE fire_emp(emp_id IN NUMBER) AS

The procedure deletes the employee with an employee number that corresponds to the argument emp_id. If no employee is found, then an exception is raised.

   BEGIN
      DELETE FROM emp WHERE empno = emp_id;
      IF SQL%NOTFOUND THEN
      raise_application_error(-20011, 'Invalid Employee
         Number: ' || TO_CHAR(emp_id));
   END IF;
END fire_emp;

PROCEDURE sal_raise (emp_id IN NUMBER, sal_incr IN NUMBER) AS

The procedure accepts two arguments. Emp_id is a number that corresponds to an employee number. Sal_incr is the amount by which to increase the employee's salary.

   BEGIN

   -- If employee exists, then update salary with increase.
   
      UPDATE emp
         SET sal = sal + sal_incr
         WHERE empno = emp_id;
      IF SQL%NOTFOUND THEN
         raise_application_error(-20011, 'Invalid Employee
            Number: ' || TO_CHAR(emp_id));
      END IF;
   END sal_raise;
END employee_management;


Note:

If you want to try this example, then first create the sequence number emp_sequence. You can do this using the following SQL*Plus statement:

SQL> EXECUTE CREATE SEQUENCE emp_sequence
   > START WITH 8000 INCREMENT BY 10;
 

Referencing Package Contents

To reference the types, items, and subprograms declared in a package specification, use the dot notation (you might need to specify the schema also). For example:

package_name.type_name
package_name.item_name
package_name.subprogram_name

DBMS_LDAP

The PL/SQL package DBMS_LDAP contains the functions and procedures which can be used by PL/SQL programmers to access data from LDAP servers. This section explains all of the API functions in detail. End users (client programmers) are expected to have read through the users guide and the examples (use cases). The information presented in this section should be used as a programming reference.

Summary of Subprograms

Table 6-1 DBMS_LDAP API Subprograms
Function or Procedure  Description 

FUNCTION init 

init() initializes a session with an LDAP server. This actually establishes a connection with the LDAP server. 

FUNCTION simple_bind_s 

The function simple_bind_s can be used to perform simple username/password based authentication to the directory server. 

FUNCTION bind_s 

The function bind_s can be used to perform complex authentication to the directory server. 

FUNCTION unbind_s 

The function unbind_s is used for closing an active LDAP session. 

FUNCTION compare_s 

The function compare_s can be used to test if a particular attribute in a particular entry has a particular value. 

FUNCTION search_s 

The function search_s performs a synchronous search in the LDAP server. It returns control to the PL/SQL environment only after all of the search results have been sent by the server or if the search request is `timed-out' by the server. 

FUNCTION search_st 

The function search_st performs a synchonous search in the LDAP server with a client side timeout. It returns control to the PL/SQL environment only after all of the search results have been sent by the server or if the search request is 'timed-out' by the client or the server. 

FUNCTION first_entry 

The function first_entry is used to retrieve the first entry in the result set returned by either search_s or search_st. 

FUNCTION next_entry 

The function next_entry() is used to iterate to the next entry in the result set of a search operation. 

FUNCTION count_entries 

This function is used to count the number of entries in the result set. It can also be used to count the number of entries remaining during a traversal of the result set using a combination of the functions first_entry() and next_entry(). 

FUNCTION first_attribute 

The function first_attribute() fetches the first attribute of a given entry in the result set. 

FUNCTION next_attribute 

The function next_attribute() fetches the next attribute of a given entry in the result set. 

FUNCTION get_dn 

The function get_dn() retrieves the X.500 distinguished name of given entry in the result set. 

FUNCTION get_values 

The function get_values() can be used to retrieve all of the values associated for a given attribute in a given entry. 

FUNCTION get_values_len 

The function get_values_len() can be used to retrieve values of attributes that have a binary' syntax. 

FUNCTION delete_s 

This function can be used to remove a leaf entry in the LDAP Directory Information Tree. 

FUNCTION modrdn2_s 

The function modrdn2_s() can be used to rename the relative distinguished name of an entry. 

FUNCTION err2string 

The function err2string() can be used to convert an LDAP error code to string in the local language in which the API is operating. 

FUNCTION create_mod_array 

The function create_mod_array() allocates memory for array modification entries that will be applied to an entry using the modify_s() functions. 

PROCEDURE populate_mod_array (String Version) 

Populates one set of attribute information for add or modify operations. 

PROCEDURE populate_mod_array (Binary Version) 

Populates one set of attribute information for add or modify operations. This procedure call has to happen after DBMS_LDAP.create_mod_array() is called. 

FUNCTION modify_s 

Performs a sychronous modification of an existing LDAP directory entry.  

FUNCTION add_s 

Adds a new entry to the LDAP directory synchronously. Before calling add_s, you have to call DBMS_LDAP.creat_mod_array () and DBMS_LDAP.populate_mod_array() first. 

PROCEDURE free_mod_array 

Frees the memory allocated by DBMS_LDAP.create_mod_array(). 

FUNCTION count_values 

Counts the number of values returned by DBMS_LDAP.get_values (). 

FUNCTION count_values_len 

Counts the number of values returned by DBMS_LDAP.get_values_len (). 

FUNCTION rename_s 

Renames an LDAP entry synchronously. 

FUNCTION explode_dn 

Breaks a dn up into its components. 

FUNCTION open_ssl 

Establishes an SSL (Secure Sockets Layer) connection over an existing LDAP connection. 

Exception Summary

The DBMS_LDAP package shipped with RDBMS 8.1.7 can generate the following exceptions

Table 6-2 DBMS_LDAP Exception Summary
Exception Name  Oracle Error Number  Cause of Exception 

general_error 

31202 

Raised anytime an error is encountered that does not have a specific PL/SQL exception associated with it. The error string contains the description of the problem in the local language of the user. 

init_failed 

31203 

Raised by DBMS_LDAP.init() if there are some problems. 

invalid_session 

31204 

Raised by all functions and procedures in the DBMS_LDAP package if they are passed an invalid session handle. 

invalid_auth_method 

31205 

Raised by DBMS_LDAP.bind_s() if the authentication method requested is not supported. 

invalid_search_scope 

31206 

Raised by all of the search functions if the scope of the search is invalid. 

invalid_search_time_val 

31207 

Raised by time based search function: DBMS_LDAP.search_st() if it is given an invalid value for the time limit. 

invalid_message 

31208 

Raised by all functions that iterate through a result-set for getting entries from a search operation if the message handle given to them is invalid. 

count_entry_error 

31209 

Raised by DBMS_LDAP.count_entries if it cannot count the entries in a given result set. 

get_dn_error 

31210 

Raised by DBMS_LDAP.get_dn if the dn of the entry it is retrieving is NULL. 

invalid_entry_dn 

31211 

Raised by all the functions that modify add or rename an entry if they are presented with an invalid entry dn. 

invalid_mod_array 

31212 

Raised by all functions that take a modification array as an argument if they are given an invalid modification array. 

invalid_mod_option 

31213 

Raised by DBMS_LDAP.populate_mod_array if the modification option given is anything other than MOD_ADD, MOD_DELETE or MOD_REPLACE. 

invalid_mod_type 

31214 

Raised by DBMS_LDAP.populate_mod_array if the attribute type that is being modified is NULL. 

invalid_mod_value 

31215 

Raised by DBMS_LDAP.populate_mod_array if the modification value parameter for a given attribute is NULL.  

invalid_rdn 

31216 

Raised by all functions and procedures that expect a valid RDN if the value of the RDN is NULL. 

invalid_newparent 

31217 

Raised by DBMS_LDAP.rename_s if the new parent of an entry being renamed is NULL. 

invalid_deleteoldrdn 

31218 

Raised by DBMS_LDAP.rename_s if the deleteoldrdn parameter is invalid. 

invalid_notypes 

31219 

Raised by DBMS_LDAP.explode_dn if the notypes parameter is invalid. 

invalid_ssl_wallet_loc 

31220 

Raised by DBMS_LDAP.open_ssl if the wallet location is NULL but the SSL authentication mode requires a valid wallet. 

invalid_ssl_wallet_password 

31221 

Raised by DBMS_LDAP.open_ssl if the wallet password given is NULL. 

invalid_ssl_auth_mode 

31222 

Raised by DBMS_LDAP.open_ssl if the SSL authentication mode is not one of 1, 2 or 3. 

mts_mode_not_supported 

31398 

Raised by the functions init(), bind_s() or simple_bind_s() if they are ever invoked in MTS mode.  

Data-Type Summary

The DBMS_LDAP package uses the following data-types.

Table 6-3 DBMS_LDAP Data-Type Summary
Data-Type  Purpose 

SESSION 

Used to hold the handle of the LDAP session. Nearly all of the functions in the API require a valid LDAP session to work. 

MESSAGE 

Used to hold a handle to the message retrieved from the result set. This is used by all functions that work with entries attributes and values. 

MOD_ARRAY 

Used to hold a handle into the array of modifications being passed into either modify_s() or add_s(). 

TIMEVAL 

Used to pass time limit information to the LDAP API functions that require a time limit. 

BER_ELEMENT 

Used to hold a handle to a BER structure used for decoding incoming messages. 

STRING_COLLECTION 

Used to hold a list of VARCHAR2 strings which can be passed on to the LDAP server. 

BINVAL_COLLECTION 

Used to hold a list of RAW data which represent binary data. 

BERVAL_COLLECTION 

Used to hold a list of BERVAL values that are used for populating a modification array. 

FUNCTION init

init() initializes a session with an LDAP server. This actually establishes a connection with the LDAP server.

Syntax

FUNCTION init      (hostname IN VARCHAR2, 
                    portnum  IN PLS_INTEGER )
      RETURN SESSION;

Parameters
Table 6-4 INIT Function Parameters
Parameter  Description 

hostname 

Contains a space-separated list of hostnames or dotted strings representing the IP address of hosts running an LDAP server to connect to. Each hostname in the list MAY include a port number which is separated from the host itself with a colon (:) character. The hosts will be tried in the order listed, stopping with the first one to which a successful connection is made. 

portnum 

Contains the TCP port number to connect to. If a host includes a port number then this parameter is ignored. If this parameter is not specified and the hostname also does not contain the port number, a default port number of 389 is assumed. 

Return Values
Table 6-5 INIT Function Return Values
Value  Description 

SESSION (function return) 

A handle to an LDAP session which can be used for further calls into the API. 

Exceptions
Table 6-6 INIT Function Exceptions
Exception  Description 

init_failed 

Raised when there is a problem contacting the LDAP server. 

ts_mode_not_supported 

Raised if DBMS_LDAP.init() is invoked from a user session that is logged onto the database using an MTS service. 

general_error 

For all other errors. The error string associated with the exception describes the error in detail. 

Usage Notes

DBMS_LDAP.init() is the first function that should be called in order to establish a session to the LDAP server. Function DBMS_LDAP.init() returns a "session handle," a pointer to an opaque structure that MUST be passed to subsequent calls pertaining to the session. This routine will return NULL and raise the "INIT_FAILED" exception if the session cannot be initialized.Subsequent to the call to init(), the connection has to be authenticated using DBMS_LDAP.bind_s or DBMS_LDAP.simple_bind_s().

See Also

DBMS_LDAP.simple_bind_s(), DBMS_LDAP.bind_s().

FUNCTION simple_bind_s

The function simple_bind_s can be used to perform simple username/password based authentication to the directory server.

Syntax

FUNCTION simple_bind_s (    ld     IN SESSION,
                            dn     IN VARCHAR2,
                            passwd IN VARCHAR2)
      RETURN PLS_INTEGER;

Parameters
Table 6-7 SIMPLE_BIND_S Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

dn 

The distinguished name of the user who is attempting to login  

passwd  

A text string containing the password. 

Return Values
Table 6-8 SIMPLE_BIND_S Function Return Values
Value  Description 

PLS_INTEGER (function return) 

DBMS_LDAP SUCCESS on a successful completion. If there was a problem, one of the following exceptions will be raised. 

Exceptions
Table 6-9 SIMPLE_BIND_S Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

mts_mode_not_supported 

Raised if DBMS_LDAP.init() is invoked from a user session that is logged onto as an MTS service. 

general_error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

DBMS_LDAP.simple_bind_s() can be used to authenticate a user whose directory distinguished name and directory password are known. It can be called only after a valid LDAP session handle is obtained from a call to DBMS_LDAP.init().

FUNCTION bind_s

The function bind_s can be used to perform complex authentication to the directory server.

Syntax

FUNCTION  bind_s       (    ld     IN SESSION,
                            dn     IN VARCHAR2,
                            passwd IN VARCHAR2,
                            meth IN PLS_INTEGER )
      RETURN PLS_INTEGER;

Parameters
Table 6-10 BIND_S Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

dn 

The distinguished Name of the User that you are trying to login as. 

cred  

A text string containing the credentials used for authentication. 

meth 

The authentication method. 

Return Values
Table 6-11 BIND_S Function Return Values
Value  Description 

PLS_INTEGER (function return) 

DBMS_LDAP.SUCCESS on a successful completion. One of the following exceptions is raised if there was a problem. 

Exceptions
Table 6-12 BIND_S Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_auth_method 

Raised if the authentication method requested is not supported. 

mts_mode_not_supported 

Raised if invoked from a user session that is logged onto an MTS service. 

general_error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

DBMS_LDAP.bind_s() can be used to authenticate a user. It can be called only after a valid LDAP session handle is obtained from a call to DBMS_LDAP.init().

See Also

DBMS_LDAP.init(), DBMS_LDAP.simple_bind_s().

FUNCTION unbind_s

The function unbind_s is used for closing an active LDAP session.

Syntax

FUNCTION unbind_s (ld IN SESSION )  RETURN PLS_INTEGER;

Parameters
Table 6-13 UNBIND_S Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle 

Return Values
Table 6-14 UNBIND_S Function Return Values
Value  Description 

PLS_INTEGER (function return) 

SUCCESS on proper completion. One of the following exceptions is raised otherwise. 

Exceptions
Table 6-15 UNBIND_S Function Exceptions
Exception  Description 

invalid_session 

Raised if the sessions handle ld is invalid. 

general error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

The unbind_s() function, will send an unbind request to the server, close all open connections associated with the LDAP session and dispose of all resources associated with the session handle before returning. After a call to this function, the session handle ld is invalid and it is illegal to make any further LDAP API calls using ld.

See Also

DBMS_LDAP.bind_s(), DBMS_LDAP.simple_bind_s().

FUNCTION compare_s

The function compare_s can be used to test if a particular attribute in a particular entry has a particular value.

Syntax

FUNCTION compare_s (    ld    IN SESSION,
                        dn    IN VARCHAR2,
                        attr  IN VARCHAR2,
                        value IN VARCHAR2)
      RETURN PLS_INTEGER;

Parameters
Table 6-16 COMPARE_S Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle 

dn 

The name of the entry to compare against 

attr  

The attribute to compare against. 

value  

A string attribute value to compare against 

Return Values
Table 6-17 COMPARE_S Function Return Values
Value  Description 

PLS_INTEGER (function return) 

COMPARE_TRUE is the given attribute has a matching value.

COMPARE_FALSE if the value of the attribute does not match the value given. 

Exceptions
Table 6-18 COMPARE_S Function Exceptions
Exception  Description 

invalid_session 

Raised if hte session handle ld is invalid. 

general_error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

The function compare_s can be used to determine if the value of a given attribute stored in the directory server matches a certain value.This operation can only be performed on attributes whose syntax definition allows them to be compared. The compare_s function can only be called after a valid LDAP session handle has been obtained from the init() function and authenticated using the bind_s() or simple_bind_s() functions.

See Also

DBMS_LDAP.bind_s()

FUNCTION search_s

The function search_s performs a synchronous search in the LDAP server. It returns control to the PL/SQL environment only after all of the search results have been sent by the server or if the search request is timed-out by the server.

Syntax

FUNCTION search_s  (    ld       IN  SESSION,
                        base     IN  VARCHAR2,
                        scope    IN  PLS_INTEGER,
                        filter   IN  VARCHAR2,
                        attrs    IN  STRING_COLLECTION,
                        attronly IN  PLS_INTEGER,
                        res      OUT MESSAGE)
      RETURN PLS_INTEGER;

Parameters
Table 6-19 SEARCH_S Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

base  

The dn of the entry at which to start the search. 

scope  

One of SCOPE_BASE (0x00), SCOPE_ONELEVEL (0x01), or SCOPE_SUBTREE (0x02), indicating the scope of the search.  

filter  

A character string representing the search filter. The value NULL can be passed to indicate that the filter "(objectclass=*)" which matches all entries is to be used. 

attrs  

A collection of strings indicating which attributes to return for each matching entry. Passing NULL for this parameter causes all available user attributes to be retrieved. The special constant string NO_ATTRS ("1.1") MAY be used as the only string in the array to indicate that no attribute types are to be returned by the server. The special constant string ALL_USER_ATTRS ("*") can be used in the attrs array along with the names of some operational attributes to indicate that all user attributes plus the listed operational attributes are to be returned.  

attrsonly  

A boolean value that must be zero if both attribute types and values are to be returned, and non-zero if only types are wanted.  

res  

This is a result parameter which will contain the results of the search upon completion of the call. If no results are returned, *res is set to NULL.  

Return Values
Table 6-20 SEARCH_S Function Return Value
Value  Description 

PLS_INTEGER (function return) 

DBMS_LDAP.SUCCESS if the search operation succeeded. An exception is raised in all other cases. 

res (OUT parameter) 

If the search succeeded and there are entries, this parameter is set to a NON-NULL value which can be used to iterate through the result set. 

Exceptions
Table 6-21 SEARCH_S Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_search_scope 

Raised if the search scope is not one of SCOPE_BASE, SCOPE_ONELEVEL, or SCOPE_SUBTREE. 

general_error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

The function search_s() issues a search operation and does not return control to the user environment until all of the results have been returned from the server. Entries returned from the search (if any) are contained in the res parameter. This parameter is opaque to the caller. Entries, attributes, values, etc., can be extracted by calling the parsing routines described below.

See Also

DBMS_LDAP.search_st(), DBMS_LDAP.first_entry(), DBMS_LDAP.next_entry.

FUNCTION search_st

The function search_st performs a synchronous search in the LDAP server with a client-side timeout. It returns control to the PL/SQL environment only after all of the search results have been sent by the server or if the search request is timed-out by the client or the server.

Syntax

FUNCTION search_st  (ld       IN  SESSION,
                         base     IN  VARCHAR2,
                         scope    IN  PLS_INTEGER,
                         filter   IN  VARCHAR2,
                         attrs    IN  STRING_COLLECTION,
                         attronly IN  PLS_INTEGER,
                         tv       IN  TIMEVAL,
                         res      OUT MESSAGE)
      RETURN PLS_INTEGER;

Parameters
Table 6-22 SEARCH_ST Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

base  

The dn of the entry at which to start the search. 

scope  

One of SCOPE_BASE (0x00), SCOPE_ONELEVEL (0x01), or SCOPE_SUBTREE (0x02), indicating the scope of the search.  

filter  

A character string representing the search filter. The value NULL can be passed to indicate that the filter "(objectclass=*)" which matches all entries is to be used. 

attrs  

A collection of strings indicating which attributes to return for each matching entry. Passing NULL for this parameter causes all available user attributes to be retrieved. The special constant string NO_ATTRS ("1.1") may be used as the only string in the array to indicate that no attribute types are to be returned by the server. The special constant string ALL_USER_ATTRS ("*") can be used in the attrs array along with the names of some operational attributes to indicate that all user attributes plus the listed operational attributes are to be returned.  

attrsonly  

A boolean value that must be zero if both attribute types and values are to be returned, and non-zero if only types are wanted.  

tv 

The timeout value expressed in se conds and microseconds that should be used for this search. 

res  

This is a result parameter which will contain the results of the search upon completion of the call. If no results are returned, *res is set to NULL.  

Return Values
Table 6-23 SEARCH_ST Function Return Values
Value  Description 

PLS_INTEGER (function return) 

DBMS_LDAP.SUCCESS if the search operation succeeded. An exception is raised in all other cases. 

res (OUT parameter) 

If the search succeeded and there are entries, this parameter is set to a NON_NULL value which can be used to iterate through the result set. 

Exceptions
Table 6-24 SEARCH_ST Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle "ld" is invalid. 

invalid_search_scope 

Raised if the search scope is not one of SCOPE_BASE, SCOPE_ONELEVEL or SCOPE_SUBTREE. 

invalid_search_time_value 

Raised if the time value specified for the timeout is invalid. 

general_error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

This function is very similar to DBMS_LDAP.search_s() except that it requires a timeout value to be given.

See Also

DBMS_LDAP.search_s(), DBML_LDAP.first_entry(), DBMS_LDAP.next_entry.

FUNCTION first_entry

The function first_entry is used to retrieve the first entry in the result set returned by either search_s() or search_st()

Syntax

FUNCTION first_entry (ld  IN SESSION,
                          msg IN MESSAGE )
      RETURN MESSAGE;

Parameters
Table 6-25 FIRST_ENTRY Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

msg 

The search result, as obtained by a call to one of the synchronous search routines. 

Return Values
Table 6-26 FIRST_ENTRY Return Values
Value  Description 

MESSAGE (function return) 

A handle to the first entry in the list of entries returned from the LDAP server. It is set to NULL if there was an error and an exception is raised. 

Exceptions
Table 6-27 FIRST_ENTRY Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_message 

Raised if the incoming msg handle is invalid. 

Usage Notes

The function first_entry() should always be the first function used to retrieve the results from a search operation.

See Also

DBMS_LDAP.next_entry(), DBMS_LDAP.search_s(), DBMS_LDAP.search_st()

FUNCTION next_entry

The function next_entry() is used to iterate to the next entry in the result set of a search operation.

Syntax

FUNCTION next_entry (ld  IN SESSION,
                         msg IN MESSAGE )
      RETURN MESSAGE;

Parameters
Table 6-28 NEXT_ENTRY Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

msg 

The search result, as obtained by a call to one of the synchronous search routines. 

Return Values
Table 6-29 NEXT_ENTRY Function Return Values
Value  Description 

MESSAGE 

A handle to the next entry in the list of entries returned from the LDAP server. It is set to null if there was an error and an exception is raised. 

Exceptions
Table 6-30 NEXT_ENTRY Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle, ld is invalid. 

invalid_message 

Raised if the incoming msg handle is invalid. 

Usage Notes

The function next_entry() should always be called after a call to the function first_entry(). Also, the return value of a successful call to next_entry() should be used as `msg' argument used in a subsequent call to the function next_entry() to fetch the next entry in the list.

See Also

DBMS_LDAP.first_entry(), DBMS_LDAP.search_s(), DBMS_LDAP.search_st()

FUNCTION count_entries

This function is used to count the number of entries in the result set. It can also be used to count the number of entries remaining during a traversal of the result set using a combination of the functions first_entry() and next_entry().

Syntax

FUNCTION count_entries (ld  IN SESSION,
                            msg IN MESSAGE )
      RETURN PLS_INTEGER;

Parameters
Table 6-31 COUNT_ENTRY Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle 

msg 

The search result, as obtained by a call to one of the synchronous search routines 

Return Values
Table 6-32 COUNT_ENTRY Function Return Values
Value  Description 

PLS INTEGER (function return) 

Non-zero if there are entries in the result set

-1 if there was a problem. 

Exceptions
Table 6-33 COUNT_ENTRY Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_message 

Raised if the incoming msg handle is invalid. 

count_entry_error 

Raised if there was a problem in counting the entries. 

Usage Notes

count_entries() returns the number of entries contained in a chain of entries; if an error occurs such as the res parameter being invalid, -1 is returned. The count_entries() call can also be used to count the number of entries that remain in a chain if called with a message, entry or reference returned by first_message(), next_message(), first_entry(), next_entry(), first_reference(), next_reference().

See Also

DBMS_LDAP.first_entry(), DBMS_LDAP.next_entry().

FUNCTION first_attribute

The function first_attribute() fetches the first attribute of a given entry in the result set.

Syntax

FUNCTION first_attribute     (ld       IN  SESSION,
                              msg      IN  MESSAGE,
                              ber_elem OUT BER_ELEMENT)
      RETURN VARCHAR2;

Parameters
Table 6-34 FIRST_ATTRIBUTE Function Parameter
Parameter  Description 

ld 

A valid LDAP session handle 

msg 

The entry whose attributes are to be stepped through, as returned by first_entry() or next_entry() 

ber_elem  

A handle to a BER ELEMENT that is used to keep track of which attribute in the entry has been read 

Return Values
Table 6-35 FIRST_ATTRIBUTE Function Return Values
Value  Description 

VARCHAR2 (function return) 

The name of the attribute if it exists.

NULL if no attribute exists or if an error occurred. 

ber_elem 

A handle used by DBMS_LDAP.next_attribute() to iterate over all of the attributes 

Exceptions
Table 6-36 FIRST_ATTRIBUTE Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_message 

Raised if the incoming msg handle is invalid 

Usage Notes

The handle to the BER_ELEMENT returned as a function parameter to first_attribute() should be used in the next call to next_attribute() to iterate through the various attributes of an entry. The name of the attribute returned from a call to first_attribute() can in turn be used in calls to the functions get_values() or get_values_len() to get the values of that particular attribute.

See Also

DBMS_LDAP.next_attribute(), DBMS_LDAP.get_values(), DBMS_LDAP.get_values_len(), DBMS_LDAP.first_entry(), DBMS_LDAP.next_entry().

FUNCTION next_attribute

The function next_attribute() fetches the next attribute of a given entry in the result set.

Syntax

FUNCTION next_attribute (    ld       IN SESSION,
                             msg      IN MESSAGE,
                             ber_elem IN BER_ELEMENT)
      RETURN VARCHAR2;

Parameters
Table 6-37 NEXT_ATTRIBUTE Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

msg 

The entry whose attributes are to be stepped through, as returned by first_entry() or next_entry(). 

ber_elem  

A handle to a BER ELEMENT that is used to keep track of which attribute in the entry has been read. 

Return Values
Table 6-38 NEXT_ATTRIBUTE Function Return Values
Value  Description 

VARCHAR2 (function return) 

The name of the attribute if it exists. 

Exceptions
Table 6-39 NEXT_ATTRIBUTE Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_message 

Raised if the incoming msg handle is invalid. 

Usage Notes

The handle to the BER_ELEMENT returned as a function parameter to first_attribute() should be used in the next call to next_attribute() to iterate through the various attributes of an entry. The name of the attribute returned from a call to next_attribute() can in turn be used in calls to the functions get_values() or get_values_len() to get the values of that particular attribute.

See Also

DBMS_LDAP.first_attribute(), DBMS_LDAP.get_values(), DBMS_LDAP.get_values_len(), DBMS_LDAP.first_entry(), DBMS_LDAP.next_entry().

FUNCTION get_dn

The function get_dn() retrieves the X.500 distinguished name of given entry in the result set.

The function first_attribute() fetches the first attribute of a given entry in the result set

Syntax

FUNCTION get_dn(    ld  IN SESSION,
                    msg IN MESSAGE)
     RETURN VARCHAR2;

Parameters
Table 6-40 GET_DN Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

msg 

The entry whose dn is to be returned. 

Return Values
Table 6-41 GET_DN Function Return Values
Value  Description 

VARCHAR2 (function return) 

The X.500 distinguished name of the entry as a PL/SQL string.

NULL if there was a problem. 

Exceptions
Table 6-42 GET_DN Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_message 

Raised if the incoming msg handle is invalid. 

get_dn_error 

Raised if there was a problem in determining the dn 

Usage Notes

The function get_dn() can be used to retrieve the dn of an entry as the program logic is iterating through the result set. This can in turn be used as an input to explode_dn() to retrieve the individual components of the dn.

See Also

DBMS_LDAP.explode_dn().

FUNCTION get_values

The function get_values() can be used to retrieve all of the values associated for a given attribute in a given entry.

Syntax

FUNCTION get_values(    ld   IN SESSION,
                        ldapentry IN MESSAGE,
                        attr IN VARCHAR2)
      RETURN STRING_COLLECTION;

Parameters
Table 6-43 GET_VALUES Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle 

ldapentry 

A valid handle to an entry returned from a search result 

attr 

The name of the attribute for which values are being sought 

Return Values
Table 6-44 GET_VALUES Function Return Values
Value  Description 

STRING_COLLECTION (function return) 

A PL/SQL string collection containing all of the values of the given attribute

NULL if there are no values associated with the given attribute 

Exceptions
Table 6-45 GET_VALUES Function Exceptions
Exception  Description 

invalid session 

Raised if the session handle ld is invalid. 

invalid message 

Raised if the incoming "entry handle' is invalid. 

Usage Notes

The function get_values() can only be called after the handle to entry has been first retrieved by call to either first_entry() or next_entry(). The name of the attribute may be known beforehand or can also be determined by a call to first_attribute() or next_attribute().The function get_values() always assumes that the data-type of the attribute it is retrieving is String. For retrieving binary data-types, get_values_len() should be used.

See Also

DBMS_LDAP.first_entry(), DBMS_LDAP.next_entry(), DBMS_LDAP.count_values(), DBMS_LDAP.get_values_len().

FUNCTION get_values_len

The function get_values_len() can be used to retrieve values of attributes that have a binary syntax.

Syntax

FUNCTION get_values_len(    ld   IN SESSION,
                            ldapentry IN MESSAGE,
                            attr IN VARCHAR2)
      RETURN BINVAL_COLLECTION;

Parameters
Table 6-46 GET_VALUES_LEN Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

ldapentrymsg 

A valid handle to an entry returned from a search result. 

attr 

The string name of the attribute for which values are being sought. 

Return Values
Table 6-47 GET_VALUES_LEN Function Return Values
Value  Description 

BINVAL_COLLECTION (function return) 

A PL/SQL raw collection containing all the values of the given attribute.

NULL if there are no values associated with the given attribute. 

Exceptions
Table 6-48 GET_VALUES_LEN Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_message 

Raised if the incoming entry handle is invalid 

Usage Notes

The function get_values_len() can only be called after the handle to entry has been first retrieved by call to either first_entry() or next_entry().The name of the attribute may be known beforehand or can also be determined by a call to first_attribute() or next_attribute().This function can be used to retrieve both binary and non-binary attribute values.

See Also

DBMS_LDAP.first_entry(), DBMS_LDAP.next_entry(), DBMS_LDAP.count_values_len(), DBMS_LDAP.get_values().

FUNCTION delete_s

The function delete_s() can be used to remove a leaf entry in the LDAP Directory Information Tree.

Syntax

FUNCTION delete_s(ld      IN SESSION,
                      entrydn IN VARCHAR2)
RETURN PLS_INTEGER;
Table 6-49 DELETE_S Function Parameters
Parameter Name  Description 

ld 

A valid LDAP session 

entrydn 

The X.500 distinguished name of the entry to delete 

Return Values
Table 6-50 DELETE_S Function Return Values
Value  Description 

PLS_INTEGER (function return) 

DBMS_LDAP.SUCCESS if the delete operation was successful. And exception is raised otherwise. 

Exceptions
Table 6-51 DELETE_S Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_entry_dn 

Raised if the distinguished name of the entry is invalid 

general_error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

The function delete_s() can be used to remove only leaf level entries in the LDAP DIT. A leaf level entry is an entry that does not have any children or LDAP entries under it. It cannot be used to delete non-leaf entries.

See Also

DBMS_LDAP.modrdn2_s()

FUNCTION modrdn2_s

The function modrdn2_s() can be used to rename the relative distinguished name of an entry.

Syntax

FUNCTION modrdn2_s (ld IN SESSION,

entrydn in VARCHAR2
newrdn in VARCHAR2
deleteoldrdn IN PLS_INTEGER)
RETURN PLS_INTEGER;

Parameters
Table 6-52 MODRDN2_S Function Parameters
Parameter  Description 

ld 

A valid LDAP session handle. 

entrydn 

The distinguished name of the entry. This entry must be a leaf node in the DIT. 

newrdn 

The new relative distinguished name of the entry. 

deleteoldrdn 

A boolean value that if non-zero indicates that the attribute values from the old name should be removed from the entry. 

Return Values
Table 6-53 MODRDN2_S Function Return Values
Value  Description 

PLS_INTEGER (function return) 

DBMS_LDAP.SUCCESS if the operation was successful. An exception is raised otherwise. 

Exceptions
Table 6-54 MODRDN2_S Function Exceptions
Exception  Description 

invalid_session 

Raised if the session handle ld is invalid. 

invalid_entry_dn 

Raised if the distinguished name of the entry is invalid. 

invalid_rdn 

Invalid LDAP RDN. 

invalid_deleteoldrdn 

Invalid LDAP deleteoldrdn. 

general error 

For all other errors. The error string associated with this exception will explain the error in detail. 

Usage Notes

The function nodrdn2_s() can be used to rename the leaf nodes of a DIT. It simply changes the relative distinguished name by which they are known. The use of this function is being deprecated in the LDAP v3 standard. Please use rename_s() which can achieve the same foundation.

See Also

DBMS_LDAP.rename_s().

FUNCTION err2string

The function err2string() can be used to convert an LDAP error code to string in the local language in which the API is operating.

Syntax

FUNCTION err2string( ldap_err IN PLS_INTEGER )

RETURN VARCHAR2;

Parameters
Table 6-55 ERR2STRING Function Parameters
Parameter  Description 

ldap_err 

An error number returned from one the API calls. 

Return Values
Table 6-56 ERR2STRING Function Returrn Values
Value  Description 

VARCHAR@ (function return) 

A character string appropriately translated to the local language which describes the error in detail. 

Exceptions
Table 6-57 ERR2STRING Function Exceptions
Exception  Description 

N/A 

None 

Usage Notes

In this release, the exception handling mechanism automatically invokes this if any of the API calls encounter an error.

See Also

N/A

FUNCTION create_mod_array

The function create_mod_array() allocates memory for array modification entries that will be applied to an entry using the modify_s() or add_s() functions.

Syntax

FUNCTION create_mod_array (num IN PLS_INTEGER)

RETURN MOD_ARRAY;

Parameters
Table 6-58 CREATE_MOD_ARRAY Function Parameters
Parameter  Description 

num 

The number of the attributes that you want to add or modify. 

Return Values
Table 6-59 CREATE_MOD_ARRAY Function Return Values
Value  Description 

MOD_ARRAY (function return) 

The data structure holds a pointer to an LDAP mod array.

NULL if there was a problem. 

Exceptions
Table 6-60 CREATE_MOD_ARRAY Function Exceptions
Exception  Description 

N/A 

No LDAP specific exception will be raised 

Usage Notes

This function is one of the preparation steps for DBMS_LDAP.add_s and DBMS_LDAP.modify_s. It is required to call DBMS_LDAP.free_mod_array to free memory after the calls to add_s or modify_s have completed.

See Also

DBMS_LDAP.populate_mod_array(), DBMS_LDAP.modify_s(), DBMS_LDAP.add_s(), and DBMS_LDAP.free_mod_array().

PROCEDURE populate_mod_array (String Version)

Populates one set of attribute information for add or modify operations.

Syntax

PROCEDURE populate_mod_array
    (modptr   IN DBMS_LDAP.MOD_ARRAY,
     mod_op   IN PLS_INTEGER,
     mod_type IN VARCHAR2,
     modval   IN DBMS_LDAP.STRING_COLLECTION);

Parameters
Table 6-61 POPULATE_MOD_ARRAY (String Version) Procedure Parameters
Parameter  Description 

modptr 

The data structure holds a pointer to an LDAP mod array. 

Mod_op 

This field specifies the type of modification to perform. 

Mod_type 

This field indicates the name of the attribute type to which the modification applies. 

Modval 

This field specifies the attribute values to add, delete, or replace. It is for the string values only. 

Return Values
Table 6-62 POPULATE_MOD_ARRAY (String Version) Procedure Return Values
Value  Description 

N/A 

 

Exceptions
Table 6-63 POPULATE_MOD_ARRAY (String Version) Procedure Exceptions
Exception  Description 

invalid_mod_array 

Invalid LDAP mod array 

invalid_mod_option 

Invalid LDAP mod option 

invalid_mod_type 

Invalid LDAP mod type 

invalid_mod_value 

Invalid LDAP mod value 

Usage Notes

This function is one of the preparation steps for DBMS_LDAP.add_s and DBMS_LDAP.modify_s. It has to be called after DBMS_LDAP.create_mod_array is called.

See Also

DBMS_LDAP.create_mod_array(), DBMS_LDAP.modify_s(), DBMS_LDAP.add_s(), and DBMS_LDAP.free_mod_array().

PROCEDURE populate_mod_array (Binary Version)

Populates one set of attribute information for add or modify operations. This procedure call has to happen after DBMS_LDAP.create_mod_array() is called.

Syntax

PROCEDURE populate_mod_array
    (modptr   IN DBMS_LDAP.MOD_ARRAY,
     mod_op   IN PLS_INTEGER,
     mod_type IN VARCHAR2,
     modval   IN DBMS_LDAP.BERVAL_COLLECTION);

Parameters
Table 6-64 POPULATE_MOD_ARRAY (Binary Version) Procedure Parameters
Parameter  Description 

modptr 

The data structure holds a pointer to an LDAP mod array 

Mod_op 

This field specifies the type of modification to perform 

Mod_type 

This field indicates the name of the attribute type to which the modification applies 

Modval 

This field specifies the attribute values to add, delete, or replace. It is for the binary values 

Return Values
Table 6-65 POPULATE_MOD_ARRAY (Binary Version) Procedure Return Values
Value  Description 

N/A 

 

Exceptions
Table 6-66 POPULATE_MOD_ARRAY (Binary Version) Procedure Exceptions
Exception  Description 

invalid_mod_array 

Invalid LDAP mod array 

invalid_mod_option 

Invalid LDAP mod option 

invalid_mod_type 

Invalid LDAP mod type 

invalid_mod_value 

Invalid LDAP mod value 

Usage Notes

This function is one of the preparation steps for DBMS_LDAP.add_s and DBMS_LDAP.modify_s. It has to happen after DBMS_LDAP.create_mod_array is called.

See Also

DBMS_LDAP.create_mod_array(), DBMS_LDAP.modify_s(), DBMS_LDAP.add_s(), and DBMS_LDAP.free_mod_array().

FUNCTION modify_s

Performs a synchronous modification of an existing LDAP directory entry.

Syntax

FUNCTION modify_s(ld      IN DBMS_LDAP.SESSION,
                     entrydn IN VARCHAR2,
                     modptr  IN DBMS_LDAP.MOD_ARRAY)

RETURN PLS_INTEGER;

Parameters
Table 6-67 MODIFY_S Function Parameters
Parameter  Description 

ld 

This parameter is a handle to an LDAP session, as returned by a successful call to DBMS_LDAP.init(). 

entrydn 

This parameter specifies the name of the directory entry whose contents are to be modified. 

modptr 

This parameter is the handle to an LDAP mod structure, as returned by successful call to DBMS_LDAP.create_mod_array(). 

Return Values
Table 6-68 MODIFY_S Function Return Values
Value  Description 

PLS_INTEGER 

The indication of the success or failure of the modification operation 

Exceptions
Table 6-69 MODIFY_S Function Exceptions
Exception  Description 

invalid_session 

Invalid LDAP session 

invalid_entry_dn 

Invalid LDAP entry dn 

invalid_mod_array 

Invalid LDAP mod array 

Usage Notes

This function call has to follow successful calls of DBMS_LDAP.create_mod_array() and DBMS_LDAP.populate_mod_array() .

See Also

DBMS_LDAP.create_mod_array(),DBMS_LDAP.populate_mod_array(), DBMS_LDAP.add_s(), and DBMS_LDAP.free_mod_array().

FUNCTION add_s

Adds a new entry to the LDAP directory synchronously. Before calling add_s, you have to call DBMS_LDAP.create_mod_array() and DBMS_LDAP.populate_mod_array().

Syntax

FUNCTION add_s(ld      IN DBMS_LDAP.SESSION,
                  entrydn IN VARCHAR2,
                  modptr  IN DBMS_LDAP.MOD_ARRAY)
RETURN PLS_INTEGER;

Parameters
Table 6-70 ADD_S Function Parameters
Parameter  Description 

ld 

This parameter is a handle to an LDAP session, as returned by a successful call to DBMS_LDAP.init(). 

Entrydn 

This parameter specifies the name of the directory entry to be created. 

Modptr 

This parameter is the handle to an LDAP mod structure, as returned by successful call to DBMS_LDAP.create_mod_array(). 

Return Values
Table 6-71 ADD_S Function Return Values
Value  Description 

PLS_INTEGER 

The indication of the success or failure of the modification operation. 

Exceptions
Table 6-72 ADD_S Function Exceptions
Exception  Description 

invalid_session 

Invalid LDAP session. 

invalid_entry_dn 

Invalid LDAP entry dn. 

invalid_mod_array 

Invalid LDAP mod array. 

Usage Notes

The parent entry of the entry to be added must already exist in the directory. This function call has to follow successful calls of DBMS_LDAP.create_mod_array() and DBMS_LDAP.populate_mod_array() .

See Also

DBMS_LDAP.create_mod_array(),DBMS_LDAP.populate_mod_array(), DBMS_LDAP.modify_s(), and DBMS_LDAP.free_mod_array().

PROCEDURE free_mod_array

Frees the memory allocated by DBMS_LDAP.create_mod_array().

Syntax

PROCEDURE free_mod_array(modptr IN DBMS_LDAP.MOD_ARRAY);

Parameters
Table 6-73 FREE_MOD_ARRAY Procedure Parameters
Parameter  Description 

modptr 

This parameter is the handle to an LDAP mod structure, as returned by successful call to DBMS_LDAP.create_mod_array(). 

Return Values
Table 6-74 FREE_MOD_ARRAY Procedure Return Value
Value  Description 

N/A 

 

Exceptions
Table 6-75 FREE_MOD_ARRAY Procedure Exceptions
Exception  Description 

N/A 

No LDAP specific exception will be raised. 

Usage Notes

N/A

See Also

DBMS_LDAP.populate_mod_array(), DBMS_LDAP.modify_s(), DBMS_LDAP.add_s(), and DBMS_LDAP.create_mod_array().

FUNCTION count_values

Counts the number of values returned by DBMS_LDAP.get_values().

Syntax

FUNCTION count_values

   (values IN DBMS_LDAP.STRING_COLLECTION)
RETURN PLS_INTEGER;

Parameters
Table 6-76 COUNT_VALUES Function Parameters
Parameter  Description 

values 

The collection of string values. 

Return Values
Table 6-77 COUNT_VALUES Function Return Values
Value  Description 

PLS_INTEGER 

The indication of the success or failure of the operation. 

Exceptions
Table 6-78 COUNT_VALUES Function Exceptions
Exception  Description 

N/A 

No LDAP specific exception will be raised. 

Usage Notes

N/A

See Also

DBMS_LDAP.count_values_len(), DBMS_LDAP.get_values().

FUNCTION count_values_len

Counts the number of values returned by DBMS_LDAP.get_values_len().

Syntax

FUNCTION count_values_len (values IN DBMS_LDAP.BINVAL_COLLECTION)

RETURN PLS_INTEGER;

Parameters
Table 6-79 COUNT_VALUES_LEN Function Parameters
Parameter  Description 

values 

The collection of binary values. 

Return Values
Table 6-80 COUNT_VALUES_LEN Function Return Values
Value  Description 

PLS_INTEGER 

The indication of the success or failure of the operation. 

Exceptions
Table 6-81 COUNT_VALUES_LEN Function Exceptions
Exception  Description 

N/A 

No LDAP specific exception will be raised. 

Usage Notes

N/A

See Also

DBMS_LDAP.count_values(), DBMS_LDAP.get_values_len().

FUNCTION rename_s

Renames an LDAP entry synchronously.

Syntax

FUNCTION rename_s(ld           IN SESSION,
                     dn           IN VARCHAR2,
                     newrdn       IN VARCHAR2,
                     newparent    IN VARCHAR2,
                     deleteoldrdn IN PLS_INTEGER,
                     serverctrls  IN LDAPCONTROL,
                     clientctrls  IN LDAPCONTROL)

RETURN PLS_INTEGER;

Parameters
Table 6-82 RENAME_S Function Parameters
Parameter  Description 

ld 

This parameter is a handle to an LDAP session, as returned by a successful call to DBMS_LDAP.init(). 

Dn 

This parameter specifies the name of the directory entry to be renamed or moved. 

newrdn 

This parameter specifies the new RDN. 

Newparent 

This parameter specifies the dn of the new parent. 

Deleteoldrdn 

This parameter specifies if the old RDN should be retained. If this value is 1, then the old RDN will be removed. 

Serverctrls 

Currently not supported. 

Clientctrls 

Currently not supported. 

Return Values
Table 6-83 RENAME_S Function Return Values
Value  Description 

PLS_INTEGER 

The indication of the success or failure of the operation. 

Exceptions
Table 6-84 RENAME_S Function Exceptions
Exception  Description 

invalid_session 

Invalid LDAP Session. 

invalid_entry_dn 

Invalid LDAP dn. 

invalid_rdn 

Invalid LDAP Rdn. 

invalid_newparent 

Invalid LDAP newparent. 

invalid_deleteoldrdn 

Invalid LDAP deleteoldrdn. 

Usage Notes

N/A

See Also

DBMS_LDAP.modrdn2_s().

FUNCTION explode_dn

Breaks a DN up into its components.

Syntax

FUNCTION explode_dn (dn      IN VARCHAR2,
                             notypes IN PLS_INTEGER)

RETURN STRING_COLLECTION;

Parameters
Table 6-85 EXPLODE_DN Function Parameters
Parameter  Description 

dn 

This parameter specifies the name of the directory entry to be broken up. 

Notypes 

This parameter specifies if the attribute tags will be returned. If this value is not 0, then there will be no attribute tags will be returned. 

Return Values
Table 6-86 EXPLODE_DN Function Return Values
Value  Description 

STRING_COLLECTION 

An array of strings. If the dn can not be broken up, NULL will be returned. 

Exceptions
Table 6-87 EXPLODE_DN Function Exceptions
Exception  Description 

invalid_entry_dn 

Invalid LDAP dn. 

invalid_notypes 

Invalid LDAP notypes value. 

Usage Notes

N/A

See Also

DBMS_LDAP.get_dn().

FUNCTION open_ssl

Establishes an SSL(Secure Sockets Layer) connection over an existing LDAP connection.

Syntax

FUNCTION open_ssl(ld              IN SESSION,

sslwrl          IN VARCHAR2,
sslwalletpasswd IN VARCHAR2,
sslauth         IN PLS_INTEGER)
RETURN PLS_INTEGER;

Parameters
Table 6-88 OPEN_SSL Function Parameters
Parameter  Description 

ld 

This parameter is a handle to an LDAP session, as returned by a successful call to DBMS_LDAP.init(). 

Sslwrl 

This parameter specifies the wallet location (Required for one-way or two-way SSL connection.) 

sslwalletpasswd 

This parameter specifies the wallet password (Required for one-way or two-way SSL connection.) 

sslauth 

This parameter specifies the SSL Authentication Mode (1 for no authentication required, 2 for one way authentication required, 3 for two way authentication required. 

Return Values
Table 6-89 OPEN_SSL Function Return Values
Value  Description 

PLS_INTEGER 

The indication of the success or failure of the operation. 

Exceptions
Table 6-90 OPEN_SSL Function Exceptions
Exception  Description 

invalid_session 

Invalid LDAP Session. 

invalid_ssl_wallet_loc 

Invalid LDAP SSL wallet location. 

invalid_ssl_wallet_passwd 

Invalid LDAP SSL wallet passwd. 

invalid_ssl_auth_mode 

Invalid LDAP SSL authentication mode. 

Usage Notes

Need to call DBMS_LDAP.init() first to acquire a valid LDAP session.

See Also

DBMS_LDAP.init().

DBMS_OBFUSCATION_TOOLKIT

The DBMS_OBFUSCATION_TOOLKIT package allows an application to encrypt data using either the Data Encryption Standard (DES) or the Triple DES algorithms.

The Data Encryption Standard (DES), also known as the Data Encryption Algorithm (DEA) by the American National Standards Institute (ANSI) and DEA-1 by the International Standards Organization (ISO), has been a worldwide encryption standard for over twenty years. The banking industry has also adopted DES-based standards for transactions between private financial institutions, and between financial institutions and private individuals.

DES is a symmetric key cipher; that is, the same key is used to encrypt data as well as decrypt data. DES encrypts data in 64-bit blocks using a 56-bit key. The DES algorithm ignores 8 bits of the 64-bit key that is supplied; however, developers must supply a 64-bit key to the algorithm.

Triple DES (3DES) is a far stronger cipher than DES; the resulting ciphertext (encrypted data) is much harder to break using an exhaustive search: 2**112 or 2**168 attempts instead of 2**56 attempts. Triple DES is also not as vulnerable to certain types of cryptanalysis as is DES.

The DES procedures are the following:

Oracle installs this package in the SYS schema. You can then grant access the package to existing users and roles as needed. The package also grants access to the PUBLIC role so no explicit grant needs to be done.

Overview of Key Management

Key management, including both generation and secure storage of cryptographic keys, is one of the most important aspects of encryption. If keys are poorly chosen or stored improperly, then it is far easier for a malefactor to break the encryption. Rather than using an exhaustive key search attack (that is, cycling through all the possible keys in hopes of finding the correct decryption key), cryptanalysts typically seek weaknesses in the choice of keys, or the way in which keys are stored.

Key generation is an important aspect of encryption. Typically, keys are generated automatically through a random-number generator. Provided that the random number generation is cryptographically secure, this can be an acceptable form of key generation. However, if random numbers are not cryptographically secure, but have elements of predictability, the security of the encryption may be easily compromised.

The DBMS_OBFUSCATION_TOOLKIT package does not generate encryption keys nor does it maintain them. Care must be taken by the application developer to ensure the secure generation and storage of encryption keys used with this package. Furthermore, the encryption and decryption done by the DBMS_OBFUSCATION_TOOLKIT takes place on the server, not the client. If the key is passed over the connection between the client and the server, the connection must be protected using Oracle Advanced Security, otherwise the key is vulnerable to capture over the wire.

Key storage is one of the most important, yet difficult aspects of encryption and one of the hardest to manage properly. To recover data encrypted with a symmetric key, the key must be accessible to the application or user seeking to decrypt data. The key needs to be easy enough to retrieve that users can access encrypted data when they need to without significant performance degradation. The key also needs to be secure enough that it is not easily recoverable by unauthorized users trying to access encrypted data they are not supposed to see.

The three options available to a developer are:

Store the Key in the Database

Storing the keys in the database cannot always provide "bullet-proof" security if you are trying to protect data against the DBA accessing encrypted data (since an all-privileged DBA could access tables containing encryption keys), but it can provide security against the casual snooper, or against someone compromising the database files on the operating system. Furthermore, the security you can obtain by storing keys in the database does not have to be bullet-proof in order to be extremely useful.

For example, suppose you want to encrypt an employee's security number, one of the columns in table EMP. You could encrypt each employee's security number using a key which is stored in a separate column in EMP. However, anyone with SELECT access on the EMP table could retrieve the encryption key and decrypt the matching social security number. Alternatively, you could store the encryption keys in another table, and use a package to retrieve the correct key for the encrypted data item, based on a primary key-foreign key relationship between the tables.

A developer could envelope both the DBMS_OBFUSCATION_TOOLKIT package and the procedure to retrieve the encryption keys supplied to the package. Furthermore, the encryption key itself could be transformed in some way (for example, XORed with the foreign key to the EMP table) so that the key itself is not stored in easily recoverable form.

Oracle recommends using the wrap utility of PL/SQL to obfuscate the code within a PL SQL package itself that does the encryption. That prevents people from breaking the encryption by looking at the PL/SQL code that handles keys, calls encrypting routines, etc.. In other words, use the wrap utility to obfuscate the PL/SQL packages themselves.

This scheme is secure enough to prevent users with SELECT access to EMP from reading unencrypted sensitive data, and a DBA from easily retrieving encryption keys and using them to decrypt data in the EMP table. It can be made more secure by changing encryption keys regularly, or having a better key storage algorithm (so the keys themselves are encrypted, for example).

Storing the Key in the Operating System

Storing keys in the operating system (e.g. in a flat file) is another option. Oracle8i allows you to make callouts from PL/SQL, which you could use to retrieve encryption keys. If you store keys in the O/S and make callouts to retrieve the keys, then the security of your encrypted data is only as secure as the protection of the key file on the O/S. Of course, a user retrieving keys from the operating system would have to be able to either access the Oracle database files (to decrypt encrypted data), or be able to gain access to the table in which the encrypted data is stored as a legitimate user.

User Managed Keys

If you ask user to supply the key, it is crucial that you use network encryption, such as that provided by Oracle Advanced Security, so the key is not passed from client to server in the clear. Furthermore, you have to rely on the user to remember the key, or your data is nonrecoverable.

DESEncrypt Procedure

The DESEncrypt procedure generates the encrypted form of the input data. An example of the DESEncrypt procedure appears at the end of this chapter.

The DES algorithm encrypts data in 64-bit blocks using a 56-bit key. The DES algorithm throws away 8 bits of the supplied key (the particular bits which are thrown away is beyond the scope of this documentation). However, developers using the algorithm must supply a 64-bit key or the package will raise an error.

Parameter Descriptions

Table 6-91 and Table 6-92 list the parameters for the DESEncrypt syntax as well as their modes, types, and descriptions.

Table 6-91 DESEncrypt parameters for raw data
Parameter Name  Mode  Type  Description 

input 

IN 

RAW 

data to be encrypted 

key 

IN 

RAW 

encryption key 

encrypted_data 

OUT 

RAW 

encrypted data 

Table 6-92 DESEncrypt parameters for string data
Parameter Name  Mode  Type  Description 

input_string 

IN 

VARCHAR2  

string to be encrypted 

key_string 

IN 

VARCHAR2  

encryption key string 

encrypted_string 

OUT 

VARCHAR2  

encrypted string 

If the input data or key given to the PL/SQL DESEncrypt procedure is empty, then the procedure raises the error ORA-28231 "Invalid input to Obfuscation toolkit".

If the input data given to the DESEncrypt procedure is not a multiple of 8 bytes, the procedure raises the error ORA-28232 "Invalid input size for Obfuscation toolkit".

If the user tries to double encrypt data using the DESEncrypt procedure, then the procedure raises the error ORA-28233 "Double encryption not supported".

Encryption Procedure Restriction

The DESEncryption procedure has two restrictions. The first is that the DES key length for encryption is fixed at 56 bits; you cannot alter this key length.

The second is that you cannot execute multiple passes of encryption. That is, you cannot re-encrypt previously encrypted data by calling the function twice.


Note:

Both the key length limitation and the prevention of multiple encryption passes are requirements of US regulations governing the export of cryptographic products.  


DESDecrypt Procedure

The purpose of the DESDecrypt procedure is to generate the decrypted form of the input data. An example of the DESDecrypt procedure appears at the end of this chapter.

Parameter Descriptions

Table 6-93 and Table 6-94 list the parameters for the DESDecrypt syntax, their modes, types, and descriptions.

Table 6-93 DESDecrypt parameters for raw data
Parameter Name  Mode  Type  Description 

input 

IN 

RAW 

Data to be decrypted 

key 

IN 

RAW 

Decryption key 

decrypted_data 

OUT 

RAW 

Decrypted data 

Table 6-94 DESDecrypt parameters for string data
Parameter Name  Mode  Type  Description 

input_string 

IN 

VARCHAR2 

String to be decrypted 

key_string 

IN 

VARCHAR2 

Decryption key string 

decrypted_string 

OUT 

VARCHAR2 

Decrypted string 

If the input data or key given to the PL/SQL DESDecrypt function is empty, then Oracle raises ORA error 28231 "Invalid input to Obfuscation toolkit".

If the input data given to the DESDecrypt function is not a multiple of 8 bytes, Oracle raises ORA error 28232 "Invalid input size for Obfuscation toolkit".


Note:

ORA-28233 is not applicable for the DESDecrypt function.  


DESDecryption Procedure Restriction

The DES key length for encryption is fixed at 64 bits (of which 56 bits are used); you cannot alter this key length.


Note:

The key length limitation is a requirement of US regulations governing the export of cryptographic products.  


DES Encryption Code Example

Following is a sample PL/SQL program for your reference. Segments of the code are numbered and contain narrative text explaining portions of the code.

DECLARE
   input_string        VARCHAR2(16) := 'tigertigertigert';
   raw_input           RAW(128) := UTL_RAW.CAST_TO_RAW(input_string);
   key_string          VARCHAR2(8)  := 'scottsco';
   raw_key             RAW(128) := UTL_RAW.CAST_TO_RAW(key_string);
   encrypted_raw               RAW(2048);
   encrypted_string            VARCHAR2(2048);
   decrypted_raw               RAW(2048);
   decrypted_string            VARCHAR2(2048); 
   error_in_input_buffer_length EXCEPTION;
   PRAGMA EXCEPTION_INIT(error_in_input_buffer_length, -28232);
   INPUT_BUFFER_LENGTH_ERR_MSG VARCHAR2(100) :=
    '*** DES INPUT BUFFER NOT A MULTIPLE OF 8 BYTES - IGNORING 
EXCEPTION ***';
   double_encrypt_not_permitted EXCEPTION;
   PRAGMA EXCEPTION_INIT(double_encrypt_not_permitted, -28233);
   DOUBLE_ENCRYPTION_ERR_MSG VARCHAR2(100) :=
    '*** CANNOT DOUBLE ENCRYPT DATA - IGNORING EXCEPTION ***';
-- 1. Begin testing raw data encryption and decryption
   BEGIN
   dbms_output.put_line('> ========= BEGIN TEST RAW DATA =========');
   dbms_output.put_line('> Raw input                        : ' || 
                 UTL_RAW.CAST_TO_VARCHAR2(raw_input));
   BEGIN 
      dbms_obfuscation_toolkit.DESEncrypt(input => raw_input, 
               key => raw_key, encrypted_data => encrypted_raw );
      dbms_output.put_line('> encrypted hex value              : ' || 
               rawtohex(encrypted_raw));
      dbms_obfuscation_toolkit.DESDecrypt(input => encrypted_raw, 
               key => raw_key, decrypted_data => decrypted_raw);
      dbms_output.put_line('> Decrypted raw output             : ' || 
                    UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw));
      dbms_output.put_line('>  ');      
      if UTL_RAW.CAST_TO_VARCHAR2(raw_input) = 
                    UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw) THEN
         dbms_output.put_line('> Raw DES Encyption and Decryption successful');
      END if;
   EXCEPTION
      WHEN error_in_input_buffer_length THEN
             dbms_output.put_line('> ' || INPUT_BUFFER_LENGTH_ERR_MSG);
   END;
   dbms_output.put_line('>  ');
-- 2. Begin testing string data encryption and decryption
   dbms_output.put_line('> ========= BEGIN TEST STRING DATA =========');
   BEGIN 
      dbms_output.put_line('> input string                     : ' 
                           || input_string);
      dbms_obfuscation_toolkit.DESEncrypt(
               input_string => input_string, 
               key_string => key_string, 
               encrypted_string => encrypted_string );
      dbms_output.put_line('> encrypted hex value              : ' || 
                   rawtohex(UTL_RAW.CAST_TO_RAW(encrypted_string)));
      dbms_obfuscation_toolkit.DESDecrypt(
               input_string => encrypted_string, 
               key_string => key_string, 
               decrypted_string => decrypted_string );
      dbms_output.put_line('> decrypted string output          : ' || 
                 decrypted_string);
      if input_string = decrypted_string THEN
         dbms_output.put_line('> String DES Encyption and Decryption successful');

      END if;
   EXCEPTION
      WHEN error_in_input_buffer_length THEN
             dbms_output.put_line(' ' || INPUT_BUFFER_LENGTH_ERR_MSG);
   END;
   dbms_output.put_line('>  ');

DES3Encrypt Procedure

The DES3Encrypt procedure generates the encrypted form of the input data by passing it through the Triple DES encryption algorithm. An example of the DESEncrypt procedure appears at the end of this chapter.

Oracle's implementation of 3DES supports either a 2-key or 3-key implementation, in outer cipher-block-chaining (CBC) mode.

A developer choosing to use Oracle's 3DES interface with a 2-key implementation must supply a single key of 128 bits as an argument to the DES3Encrypt procedure. Oracle then breaks the supplied key into two 64-bit keys. As with DES, the 3DES algorithm throws away 8 bits of each derived key (the particular bits which are thrown away is beyond the scope of this documentation). However, developers using the algorithm must supply a single 128-bit key for the 2-key 3DES implementation or the package will raise an error. The DES3Encrypt procedure uses the 2-key implementation by default.

A developer using Oracle's 3DES interface with a 3-key implementation must supply a single key of 192 bits as an argument to the DES3Encrypt procedure. Oracle then breaks the supplied key into three 64-bit keys. As with DES, the 3DES algorithm throws away 8 bits of each derived key (the particular bits which are thrown away is beyond the scope of this documentation). However, developers using the algorithm must supply a single 192-bit key for the 3-key 3DES implementation or the package will raise an error.

Parameter Descriptions

Table 6-95 and Table 6-96 list the parameters for the DES3Encrypt syntax, their modes, types, and descriptions.

Table 6-95 DES3Encrypt parameters for raw data
Parameter Name  Mode  Type  Description 

input 

IN 

RAW 

data to be encrypted 

key 

IN 

RAW 

encryption key 

encrypted_data 

OUT 

RAW 

encrypted data 

Table 6-96 DES3Encrypt parameters for string data
Parameter Name  Mode  Type  Description 

input_string 

IN 

VARCHAR2  

string to be encrypted 

key_string 

IN 

VARCHAR2  

encryption key string 

encrypted_string 

OUT 

VARCHAR2  

encrypted string 

If the input data or key given to the PL/SQL DES3Encrypt procedure is empty, then the procedure raises the error ORA-28231 "Invalid input to Obfuscation toolkit".

If the input data given to the DES3Encrypt procedure is not a multiple of 8 bytes, the procedure raises the error ORA-28232 "Invalid input size for Obfuscation toolkit".

If the user tries to double encrypt data using the DES3Encrypt procedure, then the procedure raises the error ORA-28233 "Double encryption not supported".

Encryption Procedure Restriction

The DES3Encrypt procedure has two restrictions. The first is that the DES key length for encryption is fixed at 128 bits (for 2-key DES) or 192 bits (for 3-key DES); you cannot alter these key lengths.

The second is that you cannot execute multiple passes of encryption using 3DES. The 3DES algorithm itself encrypts data multiple times; however, you cannot call the 3DESencrypt function itself more than once to encrypt the same data using 3DES.


Note:

Both the key length limitation and the prevention of multiple encryption passes are requirements of US regulations governing the export of cryptographic products.  


DES3Decrypt Procedure

The purpose of the DES3Decrypt procedure is to generate the decrypted form of the input data. An example of the DES3Decrypt procedure appears at the end of this chapter.

Parameter Descriptions

Table 6-97 and Table 6-98 list the parameters for the DES3Decrypt syntax, their modes, types, and descriptions.

Table 6-97 DES3Decrypt parameters for raw data
Parameter Name  Mode  Type  Description 

input 

IN 

RAW 

Data to be decrypted 

key 

IN 

RAW 

Decryption key 

decrypted_data 

OUT 

RAW 

Decrypted data 

Table 6-98 DES3Decrypt parameters for string data
Parameter Name  Mode  Type  Description 

input_string 

IN 

VARCHAR2 

String to be decrypted 

key_string 

IN 

VARCHAR2 

Decryption key string 

decrypted_string 

OUT 

VARCHAR2 

Decrypted string 

If the input data or key given to the DES3Decrypt procedure is empty, then the procedure raises the error ORA-28231 "Invalid input to Obfuscation toolkit".

If the input data given to the DES3Decrypt procedure is not a multiple of 8 bytes, the procedure raises the error ORA-28232 "Invalid input size for Obfuscation toolkit".


Note:

ORA-28233 is NOT applicable for the DES3Decrypt function.  


DES3Decrypt Procedure Restriction

As stated above, a developer must supply a single key of either 128 bits for a 2-key implementation (of which only 112 are used), or a single key of 192 bits for a 3-key implementation (of which 168 bits are used). Oracle automatically truncates the supplied key into 56-bit lengths for decryption. This keylength is fixed and cannot be altered.


Note:

Both the key length limitation and the prevention of multiple encryption passes are requirements of US regulations governing the export of cryptographic products.  


DES3 Encryption Code Example

Following is a sample PL/SQL program for your reference. Segments of the code are numbered and contain narrative text explaining portions of the code.

DECLARE
   input_string        VARCHAR2(16) := 'tigertigertigert';
   raw_input           RAW(128) := UTL_RAW.CAST_TO_RAW(input_string);
   key_string          VARCHAR2(8)  := 'scottsco';
   raw_key             RAW(128) := UTL_RAW.CAST_TO_RAW(key_string);
encrypted_raw               RAW(2048);
   encrypted_string            VARCHAR2(2048);
decrypted_raw               RAW(2048);
   decrypted_string            VARCHAR2(2048); 
   error_in_input_buffer_length EXCEPTION;
   PRAGMA EXCEPTION_INIT(error_in_input_buffer_length, -28232);
   INPUT_BUFFER_LENGTH_ERR_MSG VARCHAR2(100) :=
    '*** DES INPUT BUFFER NOT A MULTIPLE OF 8 BYTES - IGNORING EXCEPTION ***';
   double_encrypt_not_permitted EXCEPTION;
   PRAGMA EXCEPTION_INIT(double_encrypt_not_permitted, -28233);
   DOUBLE_ENCRYPTION_ERR_MSG VARCHAR2(100) :=
    '*** CANNOT DOUBLE ENCRYPT DATA - IGNORING EXCEPTION ***';

-- 1. Begin testing raw data encryption and decryption
   BEGIN
   dbms_output.put_line('> ========= BEGIN TEST RAW DATA =========');
   dbms_output.put_line('> Raw input                        : ' || 
                 UTL_RAW.CAST_TO_VARCHAR2(raw_input));
   BEGIN 
      dbms_obfuscation_toolkit.DES3Encrypt(input => raw_input, 
               key => raw_key, encrypted_data => encrypted_raw );
      dbms_output.put_line('> encrypted hex value              : ' || 
               rawtohex(encrypted_raw));
      dbms_obfuscation_toolkit.DES3Decrypt(input => encrypted_raw, 
               key => raw_key, decrypted_data => decrypted_raw);
      dbms_output.put_line('> Decrypted raw output             : ' || 
                    UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw));
      dbms_output.put_line('>  ');      
      if UTL_RAW.CAST_TO_VARCHAR2(raw_input) = 
                    UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw) THEN
         dbms_output.put_line('> Raw DES3 Encyption and Decryption successful');
      END if;
   EXCEPTION
      WHEN error_in_input_buffer_length THEN
             dbms_output.put_line('> ' || INPUT_BUFFER_LENGTH_ERR_MSG);
   END;
   dbms_output.put_line('>  ');

-- 2. Begin testing string data encryption and decryption
   dbms_output.put_line('> ========= BEGIN TEST STRING DATA =========');

   BEGIN 
      dbms_output.put_line('> input string                     : ' 
                           || input_string);
      dbms_obfuscation_toolkit.DES3Encrypt(
               input_string => input_string, 
               key_string => key_string, 
               encrypted_string => encrypted_string );
      dbms_output.put_line('> encrypted hex value              : ' || 
                   rawtohex(UTL_RAW.CAST_TO_RAW(encrypted_string)));
      dbms_obfuscation_toolkit.DES3Decrypt(
               input_string => encrypted_string, 
               key_string => key_string, 
               decrypted_string => decrypted_string );
      dbms_output.put_line('> decrypted string output          : ' || 
                 decrypted_string);
      if input_string = decrypted_string THEN
         dbms_output.put_line('> String DES3 Encyption and Decryption 
successful');
      END if;
   EXCEPTION
      WHEN error_in_input_buffer_length THEN
             dbms_output.put_line(' ' || INPUT_BUFFER_LENGTH_ERR_MSG);
   END;
   dbms_output.put_line('>  ');

/


Go to previous page Go to next page
Oracle
Copyright © 1996-2000, Oracle Corporation.

All Rights Reserved.

Library

Product

Contents

Index