Package com.sun.corba.ee.spi.transport

Examples of com.sun.corba.ee.spi.transport.SocketInfo


            String host = primary.getHost().toLowerCase();

            String type = null;
            int port = 0;
            ConnectionContext ctx = new ConnectionContext();
            SocketInfo socketInfo = selector.getSSLPort(ior, ctx);
            selector.setClientConnectionContext(ctx);
            if (socketInfo == null) {
                type = SocketInfo.IIOP_CLEAR_TEXT;
                port = primary.getPort();
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: did not find SSL SocketInfo");
    }
            } else {
                type = socketInfo.getType();
                port = socketInfo.getPort();
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: found SSL socketInfo");
    }
            }
       
      if (_logger.isLoggable(Level.FINE)) {
    _logger.log(Level.FINE, baseMsg
          + ".getSocketInfo: Connection Context:" + ctx);
    _logger.log(Level.FINE, baseMsg
          + ".getSocketInfo: ENDPOINT INFO:type=" + type + ",host=" +host + ", port=" + port);
      }

            // for SSL
            if (socketInfo != null ) {
                result.add(socketInfo);
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: returning SSL socketInfo:"
        + " " + socketInfo.getType()
        + " " + socketInfo.getHost()
        + " " + socketInfo.getPort());
    }
    // REVISIT: should call IIOPPrimaryToContactInfo.reset
    // right here to invalidate sticky for this result.
    // However, SSL and IIOP-FO is not a supported feature.
                return result;
            }

      ////////////////////////////////////////////////////
      //
      // The remainder of this code is non-SSL.
      // Author: Harold Carr
      // Please contact author is changes needed.
      //

            // for non-SSL
      if (_logger.isLoggable(Level.FINE)) {
    _logger.log(Level.FINE, baseMsg
          + ".getSocketInfo: returning non SSL socketInfo");
      }

      if (! previous.isEmpty()) {
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: returning previous socketInfo: "
        + previous);
    }
    return previous;
      }

      //
      // Save and add primary address
      //

      SocketInfo primarySocketInfo =
    createSocketInfo("primary", type, host, port);
      result.add(primarySocketInfo);

      //
      // List alternate addresses.
View Full Code Here


      + msg
      + "; type/address/port: "
      + type + "/" + host + "/" + port);
  }

        return new SocketInfo() {
                public String getType() {
                    return type;
                }

                public String getHost() {
                    return host;
                }

                public int getPort() {
                    return port;
                }

    public boolean equals(Object o) {
        if (o == null) {
      return false;
        }
        if (! (o instanceof SocketInfo)) {
      return false;
        }
        SocketInfo other = (SocketInfo)o;
        if (other.getPort() != port) {
      return false;
        }
        if (! other.getHost().equals(host)) {
      return false;
        }
        if (! other.getType().equals(type)) {
      return false;
        }
        return true;
    }
View Full Code Here

     * SSL should not be used or an SocketInfo containing the SSL port
     * if SSL should be used.
     */
    public SocketInfo getSSLPort(IOR ior, ConnectionContext ctx)
    {
        SocketInfo info = null;
        try {
            mechanism = selectSecurityMechanism(ior);
        } catch(SecurityMechanismException sme) {
            throw new RuntimeException(sme.getMessage());
        }
View Full Code Here

            if (sslRequired) {
                // Attempt to create SSL connection to host, ORBInitialPort
                IIOPProfileTemplate templ = (IIOPProfileTemplate)
                    ior.getProfile().getTaggedProfileTemplate();
                IIOPAddress addr = templ.getPrimaryAddress();
                SocketInfo info = IORToSocketInfoImpl.createSocketInfo(
            "SecurityMechanismSelector1",
                        "SSL", addr.getHost(), ORBManager.getORBInitialPort());
                //SocketInfo[] sInfos = new SocketInfo[]{info};
                List<SocketInfo> sInfos = new ArrayList<SocketInfo>();
                sInfos.add(info);
                return sInfos;
            } else {
                return null;
            }
        }

        int targetRequires = ssl.target_requires;
        int targetSupports = ssl.target_supports;
       
        /*
         * If target requires any of Integrity, Confidentiality or
         * EstablishTrustInClient, then SSL is used.
         */
        if (isSet(targetRequires, Integrity.value) ||
                isSet(targetRequires, Confidentiality.value) ||
                isSet(targetRequires, EstablishTrustInClient.value)) {
            if (_logger.isLoggable(Level.FINE)) {
                 _logger.log(Level.FINE, "Target requires SSL");
            }
            ctx.setSSLUsed(true);
            String type = "SSL";
            if(isSet(targetRequires, EstablishTrustInClient.value)) {
                type = "SSL_MUTUALAUTH";
                ctx.setSSLClientAuthenticationOccurred(true);
            }
            //SocketInfo[] socketInfos = new SocketInfo[ssl.addresses.size];
            List<SocketInfo> socketInfos = new ArrayList<SocketInfo>();
            for(int addressIndex =0; addressIndex < ssl.addresses.length; addressIndex++){
                short sslport = ssl.addresses[addressIndex].port;
                int ssl_port = Utility.shortToInt(sslport);
                String host_name = ssl.addresses[addressIndex].host_name;
           
                SocketInfo sInfo = IORToSocketInfoImpl.createSocketInfo(
        "SecurityMechanismSelector2",
                    type, host_name, ssl_port);
                socketInfos.add(sInfo);
            }
            return socketInfos;
        } else if (isSet(targetSupports, Integrity.value) ||
                    isSet(targetSupports, Confidentiality.value) ||
                    isSet(targetSupports, EstablishTrustInClient.value)) {
            if (_logger.isLoggable(Level.FINE)) {
                _logger.log(Level.FINE, "Target supports SSL");
            }

            if ( sslRequired ) {
                if (_logger.isLoggable(Level.FINE)) {
                    _logger.log(Level.FINE, "Client is configured to require SSL for the target");
                }

                ctx.setSSLUsed(true);
                //SocketInfo[] socketInfos = new SocketInfo[ssl.addresses.size];
                List<SocketInfo> socketInfos = new ArrayList<SocketInfo>();
                for(int addressIndex =0; addressIndex < ssl.addresses.length; addressIndex++){
                    short sslport = ssl.addresses[addressIndex].port;
                    int ssl_port = Utility.shortToInt(sslport);
                    String host_name = ssl.addresses[addressIndex].host_name;

                    SocketInfo sInfo = IORToSocketInfoImpl.createSocketInfo(
                        "SecurityMechanismSelector3",
                        "SSL", host_name, ssl_port);
                    socketInfos.add(sInfo);
                }
                return socketInfos;               
View Full Code Here

     * SSL should not be used or an SocketInfo containing the SSL port
     * if SSL should be used.
     */
    public SocketInfo getSSLPort(IOR ior, ConnectionContext ctx)
    {
        SocketInfo info = null;
        CompoundSecMech mechanism = null;
        try {
             mechanism = selectSecurityMechanism(ior);
        } catch(SecurityMechanismException sme) {
            throw new RuntimeException(sme.getMessage());
View Full Code Here

            if (isSslRequired()) {
                // Attempt to create SSL connection to host, ORBInitialPort
                IIOPProfileTemplate templ = (IIOPProfileTemplate)
                    ior.getProfile().getTaggedProfileTemplate();
                IIOPAddress addr = templ.getPrimaryAddress();
                SocketInfo info = IORToSocketInfoImpl.createSocketInfo(
            "SecurityMechanismSelector1",
                        "SSL", addr.getHost(), orbHelper.getORBPort(orbHelper.getORB()));
                //SocketInfo[] sInfos = new SocketInfo[]{info};
                List<SocketInfo> sInfos = new ArrayList<SocketInfo>();
                sInfos.add(info);
                return sInfos;
            } else {
                return null;
            }
        }

        int targetRequires = ssl.target_requires;
        int targetSupports = ssl.target_supports;
       
        /*
         * If target requires any of Integrity, Confidentiality or
         * EstablishTrustInClient, then SSL is used.
         */
        if (isSet(targetRequires, Integrity.value) ||
                isSet(targetRequires, Confidentiality.value) ||
                isSet(targetRequires, EstablishTrustInClient.value)) {
            if (_logger.isLoggable(Level.FINE)) {
                 _logger.log(Level.FINE, "Target requires SSL");
            }
            ctx.setSSLUsed(true);
            String type = "SSL";
            if(isSet(targetRequires, EstablishTrustInClient.value)) {
                type = "SSL_MUTUALAUTH";
                ctx.setSSLClientAuthenticationOccurred(true);
            }
            //SocketInfo[] socketInfos = new SocketInfo[ssl.addresses.size];
            List<SocketInfo> socketInfos = new ArrayList<SocketInfo>();
            for(int addressIndex =0; addressIndex < ssl.addresses.length; addressIndex++){
                short sslport = ssl.addresses[addressIndex].port;
                int ssl_port = Utility.shortToInt(sslport);
                String host_name = ssl.addresses[addressIndex].host_name;
           
                SocketInfo sInfo = IORToSocketInfoImpl.createSocketInfo(
        "SecurityMechanismSelector2",
                    type, host_name, ssl_port);
                socketInfos.add(sInfo);
            }
            return socketInfos;
        } else if (isSet(targetSupports, Integrity.value) ||
                    isSet(targetSupports, Confidentiality.value) ||
                    isSet(targetSupports, EstablishTrustInClient.value)) {
            if (_logger.isLoggable(Level.FINE)) {
                _logger.log(Level.FINE, "Target supports SSL");
            }

            if ( isSslRequired() ) {
                if (_logger.isLoggable(Level.FINE)) {
                    _logger.log(Level.FINE, "Client is configured to require SSL for the target");
                }

                ctx.setSSLUsed(true);
                //SocketInfo[] socketInfos = new SocketInfo[ssl.addresses.size];
                List<SocketInfo> socketInfos = new ArrayList<SocketInfo>();
                for(int addressIndex =0; addressIndex < ssl.addresses.length; addressIndex++){
                    short sslport = ssl.addresses[addressIndex].port;
                    int ssl_port = Utility.shortToInt(sslport);
                    String host_name = ssl.addresses[addressIndex].host_name;

                    SocketInfo sInfo = IORToSocketInfoImpl.createSocketInfo(
                        "SecurityMechanismSelector3",
                        "SSL", host_name, ssl_port);
                    socketInfos.add(sInfo);
                }
                return socketInfos;               
View Full Code Here

            String host = primary.getHost().toLowerCase();

            String type = null;
            int port = 0;
            ConnectionContext ctx = new ConnectionContext();
            SocketInfo socketInfo = selector.getSSLPort(ior, ctx);
            selector.setClientConnectionContext(ctx);
            if (socketInfo == null) {
                type = SocketInfo.IIOP_CLEAR_TEXT;
                port = primary.getPort();
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: did not find SSL SocketInfo");
    }
            } else {
                type = socketInfo.getType();
                port = socketInfo.getPort();
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: found SSL socketInfo");
    }
            }
       
      if (_logger.isLoggable(Level.FINE)) {
    _logger.log(Level.FINE, baseMsg
          + ".getSocketInfo: Connection Context:" + ctx);
    _logger.log(Level.FINE, baseMsg
          + ".getSocketInfo: ENDPOINT INFO:type=" + type + ",host=" +host + ", port=" + port);
      }

            // for SSL
            if (socketInfo != null ) {
                result.add(socketInfo);
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: returning SSL socketInfo:"
        + " " + socketInfo.getType()
        + " " + socketInfo.getHost()
        + " " + socketInfo.getPort());
    }
    // REVISIT: should call IIOPPrimaryToContactInfo.reset
    // right here to invalidate sticky for this result.
    // However, SSL and IIOP-FO is not a supported feature.
                return result;
            }

      ////////////////////////////////////////////////////
      //
      // The remainder of this code is non-SSL.
      // Author: Harold Carr
      // Please contact author is changes needed.
      //

            // for non-SSL
      if (_logger.isLoggable(Level.FINE)) {
    _logger.log(Level.FINE, baseMsg
          + ".getSocketInfo: returning non SSL socketInfo");
      }

      if (! previous.isEmpty()) {
    if (_logger.isLoggable(Level.FINE)) {
        _logger.log(Level.FINE, baseMsg
        + ".getSocketInfo: returning previous socketInfo: "
        + previous);
    }
    return previous;
      }

      //
      // Save and add primary address
      //

      SocketInfo primarySocketInfo =
    createSocketInfo("primary", type, host, port);
      result.add(primarySocketInfo);

      //
      // List alternate addresses.
View Full Code Here

      + msg
      + "; type/address/port: "
      + type + "/" + host + "/" + port);
  }

        return new SocketInfo() {
                public String getType() {
                    return type;
                }

                public String getHost() {
                    return host;
                }

                public int getPort() {
                    return port;
                }

    public boolean equals(Object o) {
        if (o == null) {
      return false;
        }
        if (! (o instanceof SocketInfo)) {
      return false;
        }
        SocketInfo other = (SocketInfo)o;
        if (other.getPort() != port) {
      return false;
        }
        if (! other.getHost().equals(host)) {
      return false;
        }
        if (! other.getType().equals(type)) {
      return false;
        }
        return true;
    }
View Full Code Here

     * SSL should not be used or an SocketInfo containing the SSL port
     * if SSL should be used.
     */
    public SocketInfo getSSLPort(IOR ior, ConnectionContext ctx)
    {
        SocketInfo info = null;
        CompoundSecMech mechanism = null;
        try {
             mechanism = selectSecurityMechanism(ior);
        } catch(SecurityMechanismException sme) {
            throw new RuntimeException(sme.getMessage());
View Full Code Here

            if (isSslRequired()) {
                // Attempt to create SSL connection to host, ORBInitialPort
                IIOPProfileTemplate templ = (IIOPProfileTemplate)
                    ior.getProfile().getTaggedProfileTemplate();
                IIOPAddress addr = templ.getPrimaryAddress();
                SocketInfo info = IORToSocketInfoImpl.createSocketInfo(
            "SecurityMechanismSelector1",
                        "SSL", addr.getHost(), orbHelper.getORBPort(orbHelper.getORB()));
                //SocketInfo[] sInfos = new SocketInfo[]{info};
                List<SocketInfo> sInfos = new ArrayList<SocketInfo>();
                sInfos.add(info);
                return sInfos;
            } else {
                return null;
            }
        }

        int targetRequires = ssl.target_requires;
        int targetSupports = ssl.target_supports;
       
        /*
         * If target requires any of Integrity, Confidentiality or
         * EstablishTrustInClient, then SSL is used.
         */
        if (isSet(targetRequires, Integrity.value) ||
                isSet(targetRequires, Confidentiality.value) ||
                isSet(targetRequires, EstablishTrustInClient.value)) {
            if (_logger.isLoggable(Level.FINE)) {
                 _logger.log(Level.FINE, "Target requires SSL");
            }
            ctx.setSSLUsed(true);
            String type = "SSL";
            if(isSet(targetRequires, EstablishTrustInClient.value)) {
                type = "SSL_MUTUALAUTH";
                ctx.setSSLClientAuthenticationOccurred(true);
            }
            //SocketInfo[] socketInfos = new SocketInfo[ssl.addresses.size];
            List<SocketInfo> socketInfos = new ArrayList<SocketInfo>();
            for(int addressIndex =0; addressIndex < ssl.addresses.length; addressIndex++){
                short sslport = ssl.addresses[addressIndex].port;
                int ssl_port = Utility.shortToInt(sslport);
                String host_name = ssl.addresses[addressIndex].host_name;
           
                SocketInfo sInfo = IORToSocketInfoImpl.createSocketInfo(
        "SecurityMechanismSelector2",
                    type, host_name, ssl_port);
                socketInfos.add(sInfo);
            }
            return socketInfos;
        } else if (isSet(targetSupports, Integrity.value) ||
                    isSet(targetSupports, Confidentiality.value) ||
                    isSet(targetSupports, EstablishTrustInClient.value)) {
            if (_logger.isLoggable(Level.FINE)) {
                _logger.log(Level.FINE, "Target supports SSL");
            }

            if ( isSslRequired() ) {
                if (_logger.isLoggable(Level.FINE)) {
                    _logger.log(Level.FINE, "Client is configured to require SSL for the target");
                }

                ctx.setSSLUsed(true);
                //SocketInfo[] socketInfos = new SocketInfo[ssl.addresses.size];
                List<SocketInfo> socketInfos = new ArrayList<SocketInfo>();
                for(int addressIndex =0; addressIndex < ssl.addresses.length; addressIndex++){
                    short sslport = ssl.addresses[addressIndex].port;
                    int ssl_port = Utility.shortToInt(sslport);
                    String host_name = ssl.addresses[addressIndex].host_name;

                    SocketInfo sInfo = IORToSocketInfoImpl.createSocketInfo(
                        "SecurityMechanismSelector3",
                        "SSL", host_name, ssl_port);
                    socketInfos.add(sInfo);
                }
                return socketInfos;               
View Full Code Here

TOP

Related Classes of com.sun.corba.ee.spi.transport.SocketInfo

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.