Is JTA part of JDK

Can any one tell me if JTA is part of JDK/JRE. That is, if I have JDK/JRE is there any need for me to have it separately

But JDK may be providing some mailing utilities,
right? How is this utility different from the one
provided by JavaMail. What exactly is the advantage
of using JavaMailThe only thing the JDK provides for mailing is a very
old sun.* class that you're not supposed to be using
and that has very, very limited capabilities.
The advantage of using JavaMail is that it was designed
for sending mail and it supports everything you need to send
(and read) the most common types of email.

Similar Messages

  • Is javamail part of JDK/JRE

    Can any one tell me whether JavaMail is part of JDK or JRE. If so, what is the purpose of providing it separately

    But JDK may be providing some mailing utilities,
    right? How is this utility different from the one
    provided by JavaMail. What exactly is the advantage
    of using JavaMailThe only thing the JDK provides for mailing is a very
    old sun.* class that you're not supposed to be using
    and that has very, very limited capabilities.
    The advantage of using JavaMail is that it was designed
    for sending mail and it supports everything you need to send
    (and read) the most common types of email.

  • JDK 1.6: Annotation Processing & Compiler Hack

    Hello,
    I am currently using JDK 1.6.0_23
    For one of the requirement, I am going with annotation processing & compiler Hack using Tools.jar available as part of JDK.
    I have refered a PDF - "The Hacker's Guide to javac (PDF) by David Erni and Adrian Kuhn (2008)
    " suggested from page of - http://openjdk.java.net/groups/compiler/
    My requirement is below ->
    Origional Source:
    public void someMethod() {
    }Modified Source:
    public void someMethod() {
       int items = new example.Product().getItems();
    } Below is my code to generate the variable declaration -
    private TreeMaker make; // fetch it from somewhere
    JCNewClass newProduct = make.NewClass(null, List.<JCExpression>nil(), make.Ident(names.fromString("example.Product")), List.<JCExpression>nil(), null);
    JCFieldAccess fieldAccess = make.Select(newProduct, names.fromString("getItems"));
    JCMethodInvocation getTimeMethodInvocation = make.Apply(List.<JCExpression>nil(), fieldAccess, List.<JCExpression>nil());
    expression = getTimeMethodInvocation;
    JCVariableDecl itemsDeclaration = make.VarDef(modifiers,name,varType,expression);
    System.out.println(itemsDeclaration); // this prints int items = new example.Product().getItems(); This itemsDeclaration, I am adding to a List<JCStatement> of JCBlock of JCMethodDecl.
    However modified code does not compile :(
    If I make below changes - Modified does compile
    1)
    JCNewClass newProduct = make.NewClass(null, List.<JCExpression>nil(), make.Ident(names.fromString("Product")), List.<JCExpression>nil(), null);Product insteadof example.Product
    2) Add belwo statement in the origional source code
    import examle.Product; What exactly am I missing here ???
    The AST tree is diffcult to understand with minimum documentation & without much help on the interent.
    I hope this is correct forum, for my query.
    It will be a great help.
    Regards,
    Vikas Parikh

    Hello,
    I couldn't contact them, as the white papaer didn't conatin any email address / contact info.
    I have investigated myself on this & would like to share with you guys, so that any other developer
    do not have to invest precious time like I have done.
    To create a New Class, you require a JCExpression.
    Below would work, if class already has imported Product class.
    make.Ident(names.fromString("Product"))However, if class has not imported the Product class, then there are 2 options -
    1) Create a Ident</pre> from <pre>Symbol (ClassSymbol)
    2) Create a JCField</pre> from <pre>NameI used a later approach.
    Regards,
    Vikas Parikh
    Edited by: 996153 on Mar 31, 2013 11:04 PM

  • Building JDK 1.4.2.13 in Windows

    I am trying to build JDK 1.4.2.13 in Windows. I am using Windows XP (instead of NT) and is the only difference from the informaiton given in build instructions document part of JDK 1.4.2.13. I am trying to build a JRE package from the JDK source which is similar like downloaded JRE file.
    Here are the problems:
    1. When I build the package, it is is not picking up the latest object files from J2SDK 1.4.2.13 but old files that were part of 1.4.2.0 (JDK 1.4.2). Are these new object files supposed to get updated when the JRE is installed on the target machine or they should overwrite the object files in package itself.
    2. The package got built but while installing it complained about plugin.jar file being missing. I traced and found that for WIN32 plugin.jar does not get built ie BUILD_PLUGIN sets to false if win32 folder is not there. But this plugin.jar file is present in the downloaded JRE file.
    3. I removed custom action for plugin.jar and retried installation. This time it failed with an error of InstallJavaJRERegistrySettings having improper arguments. This API is part of RegUtil dll which I tried with different copies but all returned same error.
    4. I removed the above custom action and able to install JRE on the target machine. But it got installed under D:\Program Files\Java\j2re1.4.2 instead of j2re1.4.2.13. I confirmed that the JDK_VERSION property gets a value of 1.4.2 only.
    5. java -version returns an error which could be the reason for 'InstallJavaJRERegistrySettings' not getting executed.
    How can I get updates for installation files in JDK source.
    I had created a message in another link but could not get much help. That link can be accessed in
    http://forum.java.sun.com/thread.jspa?threadID=5119418&tstart=0

    are you using any IDE for build purposes? Are you using ant? what is the error that you get during the build process. Are you sure that your env is setup correctly, meaning, Path, classpath, Java_home, ant_home etc. depending on the tool you are using for the build.
    &spades;

  • Unable to execute java version of ojc, error string C:\jdk\jdev\bin\ojcw

    I Can't deploy EJB to WebLogic Server 6.1.
    I get error:
    Checking weblogic-ejb-jar.xml for completeness...
    Wrote EJB .jar file to C:\java\webservices\weather\ejb1.jar
    Generating WebLogic EJB container classes...
    C:\jdk\jdk\jre\bin\javaw.exe -classpath C:\jdk\jdev\lib\ext\weblogic.jar;C:\jdk\jdk\jre\lib\rt.jar;C:\jdk\jdk\jre\lib\i18n.jar;C:\jdk\jdk\jre\lib\sunrsasign.jar;C:\jdk\jdk\jre\lib\jsse.jar;C:\jdk\jdk\jre\lib\jce.jar;C:\jdk\jdk\jre\lib\charsets.jar;C:\jdk\jdk\jre\classes;C:\jdk\jdev\lib\ojc.jar;C:\jdk\jdev\lib\jdev-rt.jar;C:\jdk\jdk\jre\lib\ext\activation.jar;C:\jdk\jdk\jre\lib\ext\jcert.jar;C:\jdk\jdk\jre\lib\ext\jndi.jar;C:\jdk\jdk\jre\lib\ext\jnet.jar;C:\jdk\jdk\jre\lib\ext\jta.jar;C:\jdk\jdk\jre\lib\ext\mail.jar;C:\jdk\j2ee\home\ejb.jar;C:\jdk\j2ee\home\jaxp.jar;C:\jdk\j2ee\home\jdbc.jar;C:\jdk\j2ee\home\jaas.jar;C:\jdk\j2ee\home\jsse.jar weblogic.ejbc -compiler C:\jdk\jdev\bin\ojcw.exe -classpath C:\jdk\jdev\lib\ext\weblogic.jar;C:\jdk\jdk\jre\lib\rt.jar;C:\jdk\jdk\jre\lib\i18n.jar;C:\jdk\jdk\jre\lib\sunrsasign.jar;C:\jdk\jdk\jre\lib\jsse.jar;C:\jdk\jdk\jre\lib\jce.jar;C:\jdk\jdk\jre\lib\charsets.jar;C:\jdk\jdk\jre\classes;C:\jdk\jdev\lib\ojc.jar;C:\jdk\jdev\lib\jdev-rt.jar;C:\jdk\jdk\jre\lib\ext\activation.jar;C:\jdk\jdk\jre\lib\ext\jcert.jar;C:\jdk\jdk\jre\lib\ext\jndi.jar;C:\jdk\jdk\jre\lib\ext\jnet.jar;C:\jdk\jdk\jre\lib\ext\jta.jar;C:\jdk\jdk\jre\lib\ext\mail.jar;C:\jdk\j2ee\home\ejb.jar;C:\jdk\j2ee\home\jaxp.jar;C:\jdk\j2ee\home\jdbc.jar;C:\jdk\j2ee\home\jaas.jar;C:\jdk\j2ee\home\jsse.jar C:\java\webservices\weather\ejb1.jar C:\DOCUME~1\jakubowg\USTAWI~1\Temp\wlejb61185.jar
    fatal error: unable to execute java version of ojc, error string <C:\jdk\jdev\bin\ojcw.exe>
    Exec failed .. exiting
    **** weblogic.ejbc returned with a non-zero exit status:
    #### Deployment incomplete. #### 2002-06-27 11:19:29
    Does anyone give me some advices?
    Grzegorz

    try to compile your programm from command prompt
    change dir to hello.java directory
    to compile programm type:
    javac hello.java
    if it will compile successfully run it by typing
    java hello
    if it will not be helpfull uninstall JDK 1.4 and instal JDK again. I'd recomend JDK 1.5.

  • JDK 1.4.1_07 / iPlanet 6.0 SP7

    Does JDK 1.4.1_07 run with iPlanet 6.0 SP7? The problem I am experiencing is a module that I am implementing is looking for a class, javax.crypto.interfaces.DHPublicKey. This class supposively is part of JDK 1.4.1 and it's in jce.jar under <JRE>/lib directory. I was wondering why iPlanet is throwing the following error out? Any ideas....
    [24/Feb/2004:11:36:03] failure ( 2436): Internal error: Unexpected error condition thrown (java.lang.NoClassDefFoundError: javax/crypto/interfaces/DHPublicKey,javax/crypto/interfaces/DHPublicKey), stack: java.lang.NoClassDefFoundError: javax/crypto/interfaces/DHPublicKey
         at com.baltimore.jpkiplus.x509.utils.TBSCertificate.fromASN1Object([DashoPro-V1.3-013000])
         at com.baltimore.jpkiplus.x509.utils.TBSCertificate.<init>([DashoPro-V1.3-013000])
         at com.baltimore.jpkiplus.x509.JCRYPTO_X509Certificate.fromASN1Object([DashoPro-V1.3-013000])
         at com.baltimore.jpkiplus.x509.JCRYPTO_X509Certificate.fromDER([DashoPro-V1.3-013000])
         at com.baltimore.jpkiplus.x509.JCRYPTO_X509Certificate.<init>([DashoPro-V1.3-013000])
         at com.baltimore.jpkiplus.x509.X509CertificateFactoryImpl.engineGenerateCertificate([DashoPro-V1.3-013000])
         at java.security.cert.CertificateFactory.generateCertificate(CertificateFactory.java:389)

    Hi,
    JDK 1.41_xx is supported (see the Release Notes of the iws6.0sp7)
    Did you stop and start your web-server instance in order to pick up the new 1.4.1 JRE ?
    I think only a non-1.4.1 JRE would not pick up the jce.jar in t.he /lib directory.
    Also, in Global Settings, Configure JRE/JDK make sure that the field JRE Runtime Libpath is set to blank (default).
    regards,

  • New to JDK 1.6

    Hi all,
    I just recently seeing some code like this:
    public interface AliasTarget<T extends Alias<? extends AliasTarget<T>>> {
    and don't quite understand what it means. I believe this is part of JDK 1.6 and wonder if you can explain what it means and/or show me the on-line document to learn more about this.
    Thanks very much,
    Thong

    This is Generic code: "An enhancement to the type system that supports operations on objects of various types while providing compile-time type safety."
    See these tutorials
    [http://java.sun.com/docs/books/tutorial/java/generics/index.html] (for beginner)
    [http://java.sun.com/docs/books/tutorial/extra/generics/index.html] (advanced)

  • How can I see objects on jeap using tools in jdk-bin directory

    Hi,
    I am using Jconsole to monitor JVM. It is giving how many objects are there in heap.
    But how can see the list of those classes ?
    Is there tool available in standard JDK ?

    Use jmap to dump the heap
    and use jhat to view them...
    jmap and jhat are part of jdk so no extra downloads...

  • Java Security Model: Java Protection Domains

    1.     Policy Configuration
    Until now, security policy was hard-coded in the security manager used by Java applications. This gives us the effective but rigid Java sandbox for applets.A major enhancement to the Java sandbox is the separation of policy from mechanism. Policy is now expressed in a separate, persistent format. The policy is represented in simple ascii, and can be modified and displayed by any tools that support the policy syntax specification. This allows:
    o     Configurable policies -- no longer is the security policy hard-coded into the application.
    o     Flexible policies -- Since the policy is configurable, system administrators can enforce global polices for the enterprise. If permitted by the enterprise's global policy, end-users can refine the policy for their desktop.
    o     Fine-grain policies -- The policy configuration file uses a simple, extensible syntax that allows you to specify access on specific files or to particular network hosts. Access to resources can be granted only to code signed by trusted principals.
    o     Application policies -- The sandbox is generalized so that applications of any stripe can use the policy mechanism. Previously, to establish a security policy for an application, an developer needed to implement a subclass of the SecurityManager, and hard-code the application's policies in that subclass. Now, the application can make use of the policy file and the extensible Permission object to build an application whose policy is separate from the implementation of the application.
    o     Extensible policies -- Application developers can choose to define new resource types that require fine-grain access control. They need only define a new Permission object and a method that the system invokes to make access decisions. The policy configuration file and policy tools automatically support application-defined permissions. For example, an application could define a CheckBook object and a CheckBookPermission.
    2.     X.509v3 Certificate APIs
    Public-key cryptography is an effective tool for associating an identity with a piece of code. JavaSoft is introducing API support in the core APIs for X.509v3 certificates. This allows system administrators to use certificates from enterprise Certificate Authorities (CAs), as well as trusted third-party CAs, to cryptographically establish identities.
    3.     Protection Domains
    The central architectural feature of the Java security model is its concept of a Protection Domain. The Java sandbox is an example of a Protection Domain that places tight controls around the execution of downloaded code. This concept is generalized so that each Java class executes within one and only one Protection Domain, with associated permissions.
    When code is loaded, its Protection Domain comes into existence. The Protection Domain has two attributes - a signer and a location. The signer could be null if the code is not signed by anyone. The location is the URL where the Java classes reside. The system consults the global policy on behalf of the new Protection Domain. It derives the set of permissions for the Protection Domain based on its signer/location attributes. Those permissions are put into the Protection Domain's bag of permissions.
    4.     Access Decisions
    Access decisions are straightforward. When code tries to access a protected resource, it creates an access request. If the request matches a permission contained in the bag of permissions, then access is granted. Otherwise, access is denied. This simple way of making access decisions extends easily to application-defined resources and access control. For example, the banking application allows access to the CheckBook only when the executing code holds the appropriate CheckBookPermission.
    Sandbox model for Security
    Java is supported in applications and applets, small programs that spurred Java's early growth and are executable in a browser environment. The applet code is downloaded at runtime and executes in the context of a JVM hosted by the browser. An applet's code can be downloaded from anywhere in the network, so Java's early designers thought such code should not be given unlimited access to the target system. That led to the sandbox model -- the security model introduced with JDK 1.0.
    The sandbox model deems all code downloaded from the network untrustworthy, and confines the code to a limited area of the browser -- the sandbox. For instance, code downloaded from the network could not update the local file system. It's probably more accurate to call this a "fenced-in" model, since a sandbox does not connote strict confinement.
    While this may seem a very secure approach, there are inherent problems. First, it dictates a rigid policy that is closely tied to the implementation. Second, it's seldom a good idea to put all one's eggs in one basket -- that is, it's unwise to rely entirely on one approach to provide overall system security.
    Security needs to be layered for depth of defense and flexible enough to accommodate different policies -- the sandbox model is neither.
    java.security.ProtectionDomain
    This class represents a unit of protection within the Java application environment, and is typically associated with a concept of "principal," where a principal is an entity in the computer system to which permissions (and as a result, accountability) are granted.
    A domain conceptually encloses a set of classes whose instances are granted the same set of permissions. Currently, a domain is uniquely identified by a CodeSource, which encapsulates two characteristics of the code running inside the domain: the codebase (java.net.URL), and a set of certificates (of type java.security.cert.Certificate) for public keys that correspond to the private keys that signed all code in this domain. Thus, classes signed by the same keys and from the same URL are placed in the same domain.
    A domain also encompasses the permissions granted to code in the domain, as determined by the security policy currently in effect.
    Classes that have the same permissions but are from different code sources belong to different domains.
    A class belongs to one and only one ProtectionDomain.
    Note that currently in Java 2 SDK, v 1.2, protection domains are created "on demand" as a result of class loading. The getProtectionDomain method in java.lang.Class can be used to look up the protection domain that is associated with a given class. Note that one must have the appropriate permission (the RuntimePermission "getProtectionDomain") to successfully invoke this method.
    Today all code shipped as part of the Java 2 SDK is considered system code and run inside the unique system domain. Each applet or application runs in its appropriate domain, determined by its code source.
    It is possible to ensure that objects in any non-system domain cannot automatically discover objects in another non-system domain. This partition can be achieved by careful class resolution and loading, for example, using different classloaders for different domains. However, SecureClassLoader (or its subclasses) can, at its choice, load classes from different domains, thus allowing these classes to co-exist within the same name space (as partitioned by a classloader).
    jarsigner and keytool
    example : cd D:\EicherProject\EicherWEB\Web Content jarsigner -keystore eicher.store source.jar eichercert
    The javakey tool from JDK 1.1 has been replaced by two tools in Java 2.
    One tool manages keys and certificates in a database. The other is responsible for signing and verifying JAR files. Both tools require access to a keystore that contains certificate and key information to operate. The keystore replaces the identitydb.obj from JDK 1.1. New to Java 2 is the notion of policy, which controls what resources applets are granted access to outside of the sandbox (see Chapter 3).
    The javakey replacement tools are both command-line driven, and neither requires the use of the awkward directive files required in JDK 1.1.x. Management of keystores, and the generation of keys and certificates, is carried out by keytool. jarsigner uses certificates to sign JAR files and to verify the signatures found on signed JAR files.
    Here we list simple steps of doing the signing. We assume that JDK 1.3 is installed and the tools jarsigner and keytool that are part of JDK are in the execution PATH. Following are Unix commands, however with proper changes, these could be used in Windows as well.
    1. First generate a key pair for our Certificate:
    keytool -genkey -keyalg rsa -alias AppletCert
    2. Generate a certification-signing request.
    keytool -certreq -alias AppletCert > CertReq.pem
    3. Send this CertReq.pem to VeriSign/Thawte webform. Let the signed reply from them be SignedCert.pem.
    4. Import the chain into keystore:
    keytool -import -alias AppletCert -file SignedCert.pem
    5. Sign the CyberVote archive �TeleVote.jar�:
    jarsigner TeleVote.jar AppletCert
    This signed applet TeleVote.jar can now be made available to the web server. For testing purpose we can have our own test root CA. Following are the steps to generate a root CA by using openssl.
    1. Generate a key pair for root CA:
    openssl genrsa -des3 -out CyberVoteCA.key 1024
    2. Generate an x509 certificate using the above keypair:
    openssl req -new -x509 -days key CyberVoteCA.key -out CyberVoteCA.crt
    3. Import the Certificate to keystore.
    keytool -import -alias CyberVoteRoot -file CyberVoteCA.crt
    Now, in the step 3 of jar signing above, instead of sending the request certificate to VeriSign/Thawte webform for signing, we 365 - can sign using our newly created root CA using this command:
    openssl x509 -req -CA CyberVoteCA.crt -CAkey CyberVoteCA.key -days 365 -in CertReq.pem -out SignedCert.pem �Cacreateserial
    However, our test root CA has to be imported to the keystore of voter�s web browser in some way. [This was not investigated. We used some manual importing procedure which is not recommended way]
    The Important Classes
    The MessageDigest class, which is used in current CyberVote mockup system (see section 2), is an engine class designed to provide the functionality of cryptographically secure message digests such as SHA-1 or MD5. A cryptographically secure message digest takes arbitrary-sized input (a byte array), and generates a fixed-size output, called a digest or hash. A digest has the following properties:
    � It should be computationally infeasible to find two messages that hashed to the same value.
    � The digest does not reveal anything about the input that was used to generate it.
    Message digests are used to produce unique and reliable identifiers of data. They are sometimes called the "digital fingerprints" of data.
    The (Digital)Signature class is an engine class designed to provide the functionality of a cryptographic digital signature algorithm such as DSA or RSA with MD5. A cryptographically secure signature algorithm takes arbitrary-sized input and a private key and generates a relatively short (often fixed-size) string of bytes, called the signature, with the following properties:
    � Given the public key corresponding to the private key used to generate the signature, it should be possible to verify the authenticity and integrity of the input.
    � The signature and the public key do not reveal anything about the private key.
    A Signature object can be used to sign data. It can also be used to verify whether or not an alleged signature is in fact the authentic signature of the data associated with it.
    ----Cheers
    ---- Dinesh Vishwakarma

    Hi,
    these concepts are used and implemented in jGuard(www.jguard.net) which enable easy JAAS integration into j2ee webapps across application servers.
    cheers,
    Charles(jGuard team).

  • How can I prevent the MediaTracker waitForID method from blocking?

    Hi everyone:
    I am writing an application that deals with various image file formats with the help of the JIMI package (available at http://java.sun.com/products/jimi/). Everything works fine except for the Targa format. When I generate an Image object as follows (url is a valid URL object):
    Image image = Jimi.getImage(url);
    ImageIcon icon = new ImageIcon(image);the program execution blocks at the second line above. I searched the ImageIcon source code for some clues, which led me to the following ImageIcon method (tracker is a MediaTracker object, a static property of ImageIcon):
    (01) protected void loadImage(Image image) {
    (02)   synchronized(tracker) {
    (03)     tracker.addImage(image, 0);
    (04)     try {
    (05)       tracker.waitForID(0, 0);
    (06)     } catch (InterruptedException e) {
    (07)       System.out.println("INTERRUPTED while loading Image");
    (08)     }
    (09)     loadStatus = tracker.statusID(0, false);
    (10)     tracker.removeImage(image, 0);
    (11)
    (12)     width = image.getWidth(imageObserver);
    (13)     height = image.getHeight(imageObserver);
    (14)   }
    (15) }The program blocks at line (05) above. I peeked into the MediaTracker class source code, which brought me to determine that the image loading process never finishes. The symptoms are as follows:
    (1) When I perform a c.checkImage(image, null) where c is some Component, I always get a result of 7, which translates to the following combination of ImageObserver constants:
    WIDTH | HEIGHT | PROPERTIESAs matter of fact, the dimensions are indeed determined correctly. However, when the loading process terminates, the checkImage result includes ALLBITS or FRAMEBITS in case of success, ABORT or ERROR in case of failure. None of these bits is ever turned on whenever I try to load a Targa image.
    (2) When I get to the MediaTracker source code, I see that when none of the four bytes above is set, the internal MediaTracker status has the MediaTracker.LOADING bit turned on (nothing abnormal here). And the waitForID method terminates precisely only when this bit is turned off!
    Logically, if the loading process fails for some reason, I should expect to get an error response so that I can go further in code execution. However, since the loading process never terminates, everything stays blocked at the waitForID method invocation.
    Is there an efficient way to detect such a hidden loading error without letting my program go into the waitForID endless loop? In other words, going back to the first two lines of code of this message, how could I detect that an Image loading process will not terminate before calling the ImageIcon constructor?
    Thanks in advance for any useful help...
    Jean-Fran�ois Morin

    Hi:
    I tried precisely your suggestion before posting my message to the forum yesterday. I just forgot to mention it... Maybe I was afraid of increasing my message length more and more...
    I already know that this solution prevents the MediaTracker from blocking. However...
    (1) If they reach a troublesome image (like a Targa), the users of my application might not be pleased by its freezing for 10 seconds. Actually, this image loading module is part of an architecture for database applications from which my development team and I produce applications for various customers. Images are used, in particular, in Oracle BLOB support.
    (2) If I use a smaller timeout delay, I have no guarantee that any image, whatever its length, will load properly (Targa excluded, of course). According to tests I performed yesterday, I am virtually sure that the 10-second delay will be busted very easily by pictures larger than 1 Mb. I cannot overlook this potential problem: an Oracle BLOB can contain up to 2 terabytes of data!
    On the other side, I don't want to focus too much the attention on the JIMI Targa import filter because I know that a revised version of the JIMI and JAI packages will be part of JDK 1.4. This is why I am trying to figure out what is happening in the MediaTracker and Toolkit classes, which are much more fundamental than the Jimi ones...
    Thanks anyway...
    Best regards,
    Jean-Fran�ois Morin

  • Distributing Password Protected PDF's via Information Broadcasting

    Is it possible to password protect a distributed report (pdf format) using individual Member's unique password?
    Then, can we easily administer the (e.g. user-create/e-mail confirmation) the actual passwords?

    What about the Java Cryptography Extension framework for PDFs? 
    Can NetWeaver support this....
    http://xmlgraphics.apache.org/fop/trunk/pdfencryption.html
    Environment
    In order to use PDF encryption, FOP has to be compiled with cryptography support. Currently, only JCE is supported. JCE is part of JDK 1.4. For earlier JDKs, it can be installed separately. The build process automatically detects JCE presence and installs PDF encryption support if possible, otherwise a stub is compiled in.

  • Help on Custom Annotation Mapping between @CustomAnno and ResultSet Mapping

    Hi,
    I am working on a DAO which has getter and setter methods and annotation of the Database Table Column Name.
    Class UserDao {
    @CustomAnnotation(value="FIRST_NAME")
    String firstName
    CREATE TABLE USER(
    FIRST_NAME VARCHAR(30)
    Question
    1. I am planning to create a generic implementation where the when i give the Result Set and Dao name it should fill the Dao automatically. I was using Reflection but was wondering is any better way to handel this?
    I am using JDK 1.6 and i am not sure why JDBC 4.0 (which says its part of JDK 1.6) has no DataSet api's.
    Any ideas are very helpful.
    Thanks..,
    User
    Edited by: user.java on Feb 18, 2010 6:56 PM

    Far as I know annotations do not magically produce code. You must use them in something else which understands the annotations and the intent. I didn't see you mentioning anything like that. I am rather certain that there are existing consumers (of annotations) that do that and you can create your own.
    Also, again as far as I know, you don't really have a "DAO" there, but rather a DTO.

  • 12.0.4 Migration from RedHat Linux 4.0 (32-bit) to RedHat Linux 5.0 (64-Bit

    Hi,
    1) I have migrated our E-bus Environment (Test Instance) from RHEL 4.0 32-bit to RHEL 5.0 (64-bit) as per the Note IDs 416301.1 and 471566.1.
    2) The Application has been tested by the test team after migration and it is working fine.
    3) I did not upgrade the JDK 1.5 from 32-bit to 64-bit.
    Is it a must to upgrade the JDK from 32-bit to 64-bit after the migration or will the application work fine if the JDK is left untouched?
    We also plan to upgrade to 12.1.1 and then to 12.1.3 on RHEL 5.0 64-bit which I think requires JDK 6.0 as per the note 752619.1.
    AS a part of JDK upgrade, Do I have to have JDK 6.0 64-bit for the application to work properly or JDK 6.0 32-bit is good enough?
    Thanks a lot in advance.

    3) I did not upgrade the JDK 1.5 from 32-bit to 64-bit.
    Is it a must to upgrade the JDK from 32-bit to 64-bit after the migration or will the application work fine if the JDK is left untouched?Keep the 32-bit version -- Using Latest Update of JDK 5.0 with Oracle E-Business Suite Release 12 [ID 384249.1], “Step 1 Download Latest Update of JDK 5.0”
    We also plan to upgrade to 12.1.1 and then to 12.1.3 on RHEL 5.0 64-bit which I think requires JDK 6.0 as per the note 752619.1.
    AS a part of JDK upgrade, Do I have to have JDK 6.0 64-bit for the application to work properly or JDK 6.0 32-bit is good enough?The 32-bit is good enough -- Using Latest Java 6.0 Update With Oracle E-Business Suite Release 12 [ID 455492.1], "Step 2.1: Download Latest JDK 6.0 Update" section.
    Thanks,
    Hussein

  • PACKAGE BASICS.UTIL..REGEX

    I have problem with my perogram!
    is package basic util.regex need to be download or it's already built in java!for information i use j2sdk 1.4.1!
    thanks a lot

    you're probably thinking of java.util.regex, which is part of jdk 1.4 and above.

  • Using JAXB for classes extending third party objects

    I am trying to use JMX WS connector in my project. I have stuck with a problem I cannot solve. For example, I have class
    public class TypedObjectName extends ObjectName
    I do not know how to annotate this class. If I am trying to use @XmlRootElement annotation and provide no-arg default constructor for this class, JAXB throws an error
    Caused by: com.sun.xml.bind.v2.runtime.IllegalAnnotationsException: 1 counts of IllegalAnnotationExceptions
    javax.management.ObjectName does not have a no-arg default constructor.
    this problem is related to the following location:
    at javax.management.ObjectName
    at com.hp.usage.mgmt.naming.TypedObjectName
    I am not able to modify ObjectName because it is a part of jdk, third party class from javax.management. I need to have this class in JAXB context since one my service has a method with this type, for example
    *public interface PerformanceMeasurement {*
    public TypedObjectName getJob();
    Any ideas to make it workable?

    Yes, right, I have seen this blog and if you read it carefully, there is a note rearding root object
    The root object case is not quite as clean. The result of the unmarshal operation will be the adapted object, then you will need to call the conversion code yourself.
    It means I need to change an API, in case of JMX WS Connector, instead of
    public interface PerformanceMeasurement {
    public TypedObjectName getJob();
    I will provide
    public interface PerformanceMeasurement {
    public TypedObjectNameAdapter getJob();
    Not sure that it is a good idea
    Edited by: tvv2000 on 03.02.2013 21:24

Maybe you are looking for