public Socket createSocket(InetAddress host, int port) throws IOException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(host, port); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{host, port}); } return socket; }
public boolean setupMaxChainLength() { if (sslPolicy.isSetMaxChainLength()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"MaxChainLength"}); } return true; }
public boolean setupProxyHost() { if (sslPolicy.isSetProxyHost()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"ProxyHost"}); } return true; }
public boolean setupSessionCaching() { if (sslPolicy.isSetSessionCaching()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"SessionCaching"}); } return true; }
public void setupSecureSocketProtocol() { if (!sslPolicy.isSetSecureSocketProtocol()) { LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_NOT_SET"); secureSocketProtocol = DEFAULT_SECURE_SOCKET_PROTOCOL; return; } secureSocketProtocol = sslPolicy.getSecureSocketProtocol(); LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_SET", new Object[] {secureSocketProtocol}); }
public boolean setupSessionCaching() { if (sslPolicy.isSetSessionCaching()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"SessionCaching"}); } return true; }
public boolean setupProxyPort() { if (sslPolicy.isSetProxyPort()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"ProxyPort"}); } return true; }
public boolean setupTrustStoreType() { if (sslPolicy.isSetTrustStoreType()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"TrustStoreType"}); return true; } return true; }
public boolean setupMaxChainLength() { if (sslPolicy.isSetMaxChainLength()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"MaxChainLength"}); } return true; }
public boolean setupCertValidator() { if (sslPolicy.isSetCertValidator()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"CertValidator"}); } return true; }
public boolean setupCertValidator() { if (sslPolicy.isSetCertValidator()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"CertValidator"}); } return true; }
public void setupTrustStoreAlgorithm() { if (sslPolicy.isSetTrustStoreAlgorithm()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"TrustStoreAlgorithm"}); } }
private void invokeSetter(Method method, Object resource) { try { method.invoke(getTarget(), resource); } catch (IllegalAccessException e) { LOG.log(Level.SEVERE, "INJECTION_SETTER_NOT_VISIBLE", method); } catch (InvocationTargetException e) { LogUtils.log(LOG, Level.SEVERE, "INJECTION_SETTER_RAISED_EXCEPTION", e, method); } }
public boolean setupSessionCacheKey() { if (sslPolicy.isSetSessionCacheKey()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"SessionCacheKey"}); } return true; }
public boolean setupSessionCacheKey() { if (sslPolicy.isSetSessionCacheKey()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"SessionCacheKey"}); } return true; }
public void setupTrustStoreAlgorithm() { if (sslPolicy.isSetKeystoreAlgorithm()) { trustStoreKeyManagerFactoryAlgorithm = sslPolicy.getTrustStoreAlgorithm(); LogUtils.log(LOG, Level.INFO, "TRUST_STORE_ALGORITHM_SET", new Object[] {trustStoreKeyManagerFactoryAlgorithm}); return; } trustStoreKeyManagerFactoryAlgorithm = TrustManagerFactory.getDefaultAlgorithm(); LogUtils.log(LOG, Level.INFO, "TRUST_STORE_ALGORITHM_NOT_SET", new Object[] {trustStoreKeyManagerFactoryAlgorithm}); }
public void setupTrustStoreType() { if (!sslPolicy.isSetTrustStoreType()) { LogUtils.log(LOG, Level.INFO, "TRUST_STORE_TYPE_NOT_SET", new Object[]{DEFAUL_TRUST_STORE_TYPE}); //Can default to JKS so return return; } trustStoreType = sslPolicy.getTrustStoreType(); LogUtils.log(LOG, Level.INFO, "TRUST_STORE_TYPE_SET", new Object[]{trustStoreType}); }
public void setupSecureSocketProtocol() { String secureSocketProtocol = null; if (!sslPolicy.isSetSecureSocketProtocol()) { LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_NOT_SET"); secureSocketProtocol = DEFAULT_SECURE_SOCKET_PROTOCOL; return; } secureSocketProtocol = sslPolicy.getSecureSocketProtocol(); secureListener.setProtocol(secureSocketProtocol); LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_SET", new Object[] {secureSocketProtocol}); }
public boolean setupKeystoreType() { if (!sslPolicy.isSetKeystoreType()) { LogUtils.log(LOG, Level.INFO, "KEY_STORE_TYPE_NOT_SET", new Object[] {DEFAUL_KEYSTORE_TYPE}); //Can default to JKs so return true secureListener.setKeystoreType(DEFAUL_KEYSTORE_TYPE); return true; } String keyStoreType = sslPolicy.getKeystoreType(); LogUtils.log(LOG, Level.INFO, "KEY_STORE_TYPE_SET", new Object[] {keyStoreType}); secureListener.setKeystoreType(keyStoreType); return true; }
Object createPlugin(String pluginClassName) throws PluginException { ClassLoader cl = getPluginClassLoader(); Object plugin = null; try { Class<?> pluginClass = Class.forName(pluginClassName, true, cl); plugin = pluginClass.newInstance(); } catch (Exception ex) { LogUtils.log(LOG, Level.SEVERE, "PLUGIN_LOAD_FAILURE_MSG", ex, pluginClassName); throw new PluginException(new Message("LOAD_FAILED_EXC", LOG, pluginClassName), ex); } return plugin; }