private TLS_SEC_TRANS extractTlsSecTrans(IOR ior, CompoundSecMech mech) { TaggedComponent comp = mech.transport_mech; if (comp.tag != TAG_TLS_SEC_TRANS.value) { return null; } ORB orb = ior.getORB(); CDRInputStream in = doPrivileged(new PrivilegedAction<CDRInputStream>() { @Override public CDRInputStream run() { return new EncapsInputStream(orb, comp.component_data, comp.component_data.length); } }); in.consumeEndian(); return TLS_SEC_TRANSHelper.read(in); }
public void _read(final org.omg.CORBA.portable.InputStream _in) { value = org.omg.CSIIOP.TLS_SEC_TRANSHelper.read(_in); } public void _write(final org.omg.CORBA.portable.OutputStream _out)
public void _read(final org.omg.CORBA.portable.InputStream _in) { value = org.omg.CSIIOP.TLS_SEC_TRANSHelper.read(_in); } public void _write(final org.omg.CORBA.portable.OutputStream _out)
public void _read (org.omg.CORBA.portable.InputStream i) { value = org.omg.CSIIOP.TLS_SEC_TRANSHelper.read (i); }
public void _read (org.omg.CORBA.portable.InputStream i) { value = org.omg.CSIIOP.TLS_SEC_TRANSHelper.read (i); }
public static org.omg.CSIIOP.TLS_SEC_TRANS extract (org.omg.CORBA.Any a) { return read (a.create_input_stream ()); }
public static org.omg.CSIIOP.TLS_SEC_TRANS extract (org.omg.CORBA.Any a) { return read (a.create_input_stream ()); }
private TLS_SEC_TRANS extractTlsSecTrans(IOR ior, CompoundSecMech mech) { TaggedComponent comp = mech.transport_mech; if (comp.tag != TAG_TLS_SEC_TRANS.value) { return null; } ORB orb = ior.getORB(); CDRInputStream in = doPrivileged(new PrivilegedAction<CDRInputStream>() { @Override public CDRInputStream run() { return new EncapsInputStream(orb, comp.component_data, comp.component_data.length); } }); in.consumeEndian(); return TLS_SEC_TRANSHelper.read(in); }
private TLS_SEC_TRANS extractTlsSecTrans(IOR ior, CompoundSecMech mech) { TaggedComponent comp = mech.transport_mech; if (comp.tag != TAG_TLS_SEC_TRANS.value) { return null; } ORB orb = ior.getORB(); CDRInputStream in = doPrivileged(new PrivilegedAction<CDRInputStream>() { @Override public CDRInputStream run() { return new EncapsInputStream(orb, comp.component_data, comp.component_data.length); } }); in.consumeEndian(); return TLS_SEC_TRANSHelper.read(in); }
public static org.omg.CSIIOP.TLS_SEC_TRANS extract (final org.omg.CORBA.Any any) { org.omg.CORBA.portable.InputStream in = any.create_input_stream(); try { return read (in); } finally { try { in.close(); } catch (java.io.IOException e) { throw new RuntimeException("Unexpected exception " + e.toString() ); } } }
public static org.omg.CSIIOP.TLS_SEC_TRANS extract (final org.omg.CORBA.Any any) { org.omg.CORBA.portable.InputStream in = any.create_input_stream(); try { return read (in); } finally { try { in.close(); } catch (java.io.IOException e) { throw new RuntimeException("Unexpected exception " + e.toString() ); } } }
private static void printTlsSecTrans(byte[] tagData, PrintWriter out) { CDRInputStream in = new CDRInputStream(tagData ); try { in.openEncapsulatedArray(); TLS_SEC_TRANS tls = TLS_SEC_TRANSHelper.read( in ); out.println("\t\t\tTLS SEC TRANS target requires: " + tls.target_requires); out.println("\t\t\tTLS SEC TRANS target supports: " + tls.target_supports); for (int i = 0; i < tls.addresses.length; i++) { int ssl_port = tls.addresses[i].port; if( ssl_port < 0 ) { ssl_port += 65536; } out.println("\t\t\tTLS SEC TRANS address: " + tls.addresses[i].host_name+":"+ssl_port); } } catch ( Exception ex ) { out.print("\t\t\tTLS SEC TRANS: " ); dumpHex(tagData, out); out.println(); } }
tls = TLS_SEC_TRANSHelper.read( in );
TLS_SEC_TRANS tls = TLS_SEC_TRANSHelper.read(in); return (tls.target_requires & minimum_options) != 0;
private static String describeTLS_SEC_TRANS(org.omg.IOP.TaggedComponent component) { String result = ""; byte[] coct = component.component_data; int len = component.component_data.length; org.apache.yoko.orb.OCI.Buffer buf = new org.apache.yoko.orb.OCI.Buffer( coct, len); org.apache.yoko.orb.CORBA.InputStream in = new org.apache.yoko.orb.CORBA.InputStream( buf, 0, false); in._OB_readEndian(); org.omg.CSIIOP.TLS_SEC_TRANS info = org.omg.CSIIOP.TLS_SEC_TRANSHelper.read(in); result += " TLS_SEC_TRANS component:\n"; result += " target_supports: " + describeTransportFlags(info.target_supports) + "\n"; result += " target_requires: " + describeTransportFlags(info.target_requires) + "\n"; result += " addresses:\n"; for (int i = 0; i < info.addresses.length; i++) { result += " host_name: " + info.addresses[i].host_name + "\n"; result += " port: " + info.addresses[i].port + "\n"; } return result; }