public Socket createSocket(InetAddress host, int port) throws IOException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(host, port); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{host, port}); } return socket; }
/** * Checks log level and logs * * @param logger the Logger the log to * @param level the severity level * @param message the log message * @param parameters the parameters to substitute into message */ public static void log(Logger logger, Level level, String message, Object[] parameters) { if (logger.isLoggable(level)) { final String formattedMessage = MessageFormat.format(localize(logger, message), parameters); logger.log(level, formattedMessage); } }
public Socket createSocket(String host, int port) throws IOException, UnknownHostException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(host, port); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{host, port}); } return socket; }
/** * Checks log level and logs * * @param logger the Logger the log to * @param level the severity level * @param message the log message */ public static void log(Logger logger, Level level, String message) { if (logger.isLoggable(level)) { final String formattedMessage = MessageFormat.format(localize(logger, message), NO_PARAMETERS); logger.log(level, formattedMessage); } }
public Socket createSocket(String host, int port, InetAddress localHost, int localPort) throws IOException, UnknownHostException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(host, port, localHost, localPort); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{host, port}); } return socket; }
/** * Allows both parameter substitution and a typed Throwable to be logged. * * @param logger the Logger the log to * @param level the severity level * @param message the log message * @param throwable the Throwable to log * @param parameters the parameters to substitute into message */ public static void log(Logger logger, Level level, String message, Throwable throwable, Object... parameters) { if (logger.isLoggable(level)) { final String formattedMessage = MessageFormat.format(localize(logger, message), parameters); logger.log(level, formattedMessage, throwable); } }
public Socket createSocket(InetAddress address, int port, InetAddress localAddress, int localPort) throws IOException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(address, port, localAddress, localPort); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{address, port}); } return socket; }
/** * Allows both parameter substitution and a typed Throwable to be logged. * * @param logger the Logger the log to * @param level the severity level * @param message the log message * @param throwable the Throwable to log * @param parameter the parameter to substitute into message */ public static void log(Logger logger, Level level, String message, Throwable throwable, Object parameter) { if (logger.isLoggable(level)) { final String formattedMessage = MessageFormat.format(localize(logger, message), parameter); logger.log(level, formattedMessage, throwable); } }
public void setupKeystorePassword() { if (sslPolicy.isSetKeystorePassword()) { LogUtils.log(LOG, Level.INFO, "KEY_STORE_PASSWORD_SET"); keyStorePassword = sslPolicy.getKeystorePassword(); return; } keyStorePassword = System.getProperty("javax.net.ssl.keyStorePassword"); if (keyStorePassword != null) { LogUtils.log(LOG, Level.INFO, "KEY_STORE_PASSWORD_SYSTEM_PROPERTY_SET"); return; } LogUtils.log(LOG, Level.INFO, "KEY_STORE_PASSWORD_NOT_SET"); }
public void setupKeyPassword() { if (sslPolicy.isSetKeyPassword()) { LogUtils.log(LOG, Level.INFO, "KEY_PASSWORD_SET"); keyPassword = sslPolicy.getKeyPassword(); return; } keyPassword = System.getProperty("javax.net.ssl.keyStorePassword"); if (keyPassword != null) { LogUtils.log(LOG, Level.INFO, "KEY_PASSWORD_SYSTEM_PROPERTY_SET"); return; } LogUtils.log(LOG, Level.INFO, "KEY_PASSWORD_NOT_SET"); }
public void setupKeystore() { if (sslPolicy.isSetKeystore()) { keyStoreLocation = sslPolicy.getKeystore(); LogUtils.log(LOG, Level.INFO, "KEY_STORE_SET", new Object[]{keyStoreLocation}); return; } keyStoreLocation = System.getProperty("javax.net.ssl.keyStore"); if (keyStoreLocation != null) { LogUtils.log(LOG, Level.INFO, "KEY_STORE_SYSTEM_PROPERTY_SET", new Object[]{keyStoreLocation}); return; } keyStoreLocation = System.getProperty("user.home") + "/.keystore"; LogUtils.log(LOG, Level.INFO, "KEY_STORE_NOT_SET", new Object[]{keyStoreLocation}); }
public boolean setupMaxChainLength() { if (sslPolicy.isSetMaxChainLength()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"MaxChainLength"}); } return true; }
public boolean setupProxyHost() { if (sslPolicy.isSetProxyHost()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"ProxyHost"}); } return true; }
public boolean setupSessionCaching() { if (sslPolicy.isSetSessionCaching()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"SessionCaching"}); } return true; }
public void setupSecureSocketProtocol() { if (!sslPolicy.isSetSecureSocketProtocol()) { LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_NOT_SET"); secureSocketProtocol = DEFAULT_SECURE_SOCKET_PROTOCOL; return; } secureSocketProtocol = sslPolicy.getSecureSocketProtocol(); LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_SET", new Object[] {secureSocketProtocol}); }
public boolean setupSessionCaching() { if (sslPolicy.isSetSessionCaching()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"SessionCaching"}); } return true; }
public boolean setupProxyPort() { if (sslPolicy.isSetProxyPort()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"ProxyPort"}); } return true; }
public boolean setupTrustStoreType() { if (sslPolicy.isSetTrustStoreType()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"TrustStoreType"}); return true; } return true; }
public boolean setupMaxChainLength() { if (sslPolicy.isSetMaxChainLength()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"MaxChainLength"}); } return true; }
public boolean setupCertValidator() { if (sslPolicy.isSetCertValidator()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"CertValidator"}); } return true; }