public Socket createSocket(InetAddress host, int port) throws IOException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(host, port); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{host, port}); } return socket; }
public Socket createSocket(String host, int port) throws IOException, UnknownHostException { SSLSocket socket = null; socket = (SSLSocket)sslSocketFactory.createSocket(host, port); if ((socket != null) && (ciphers != null)) { socket.setEnabledCipherSuites(ciphers); } if (socket == null) { LogUtils.log(LOG, Level.SEVERE, "PROBLEM_CREATING_OUTBOUND_REQUEST_SOCKET", new Object[]{host, port}); } return socket; }
public boolean setupMaxChainLength() { if (sslPolicy.isSetMaxChainLength()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"MaxChainLength"}); } return true; }
public boolean setupProxyHost() { if (sslPolicy.isSetProxyHost()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"ProxyHost"}); } return true; }
public boolean setupSessionCaching() { if (sslPolicy.isSetSessionCaching()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"SessionCaching"}); } return true; }
public void setupSecureSocketProtocol() { if (!sslPolicy.isSetSecureSocketProtocol()) { LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_NOT_SET"); secureSocketProtocol = DEFAULT_SECURE_SOCKET_PROTOCOL; return; } secureSocketProtocol = sslPolicy.getSecureSocketProtocol(); LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_SET", new Object[] {secureSocketProtocol}); }
public boolean setupSessionCaching() { if (sslPolicy.isSetSessionCaching()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"SessionCaching"}); } return true; }
public boolean setupProxyPort() { if (sslPolicy.isSetProxyPort()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"ProxyPort"}); } return true; }
public boolean setupTrustStoreType() { if (sslPolicy.isSetTrustStoreType()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"TrustStoreType"}); return true; } return true; }
public boolean setupMaxChainLength() { if (sslPolicy.isSetMaxChainLength()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"MaxChainLength"}); } return true; }
public boolean setupCertValidator() { if (sslPolicy.isSetCertValidator()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"CertValidator"}); } return true; }
public boolean setupCertValidator() { if (sslPolicy.isSetCertValidator()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"CertValidator"}); } return true; }
public void setupTrustStoreAlgorithm() { if (sslPolicy.isSetTrustStoreAlgorithm()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"TrustStoreAlgorithm"}); } }
public boolean setupSessionCacheKey() { if (sslPolicy.isSetSessionCacheKey()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_CLIENT_POLICY_DATA", new Object[]{"SessionCacheKey"}); } return true; }
public boolean setupSessionCacheKey() { if (sslPolicy.isSetSessionCacheKey()) { LogUtils.log(LOG, Level.WARNING, "UNSUPPORTED_SSL_SERVER_POLICY_DATA", new Object[]{"SessionCacheKey"}); } return true; }
public void setupKeystoreType() { if (!sslPolicy.isSetKeystoreType()) { LogUtils.log(LOG, Level.INFO, "KEY_STORE_TYPE_NOT_SET", new Object[]{DEFAUL_KEYSTORE_TYPE}); return; } keyStoreType = sslPolicy.getKeystoreType(); LogUtils.log(LOG, Level.INFO, "KEY_STORE_TYPE_SET", new Object[]{keyStoreType}); }
public void setupTrustStoreType() { if (!sslPolicy.isSetTrustStoreType()) { LogUtils.log(LOG, Level.INFO, "TRUST_STORE_TYPE_NOT_SET", new Object[]{DEFAUL_TRUST_STORE_TYPE}); //Can default to JKS so return return; } trustStoreType = sslPolicy.getTrustStoreType(); LogUtils.log(LOG, Level.INFO, "TRUST_STORE_TYPE_SET", new Object[]{trustStoreType}); }
public void setupTrustStoreAlgorithm() { if (sslPolicy.isSetKeystoreAlgorithm()) { trustStoreKeyManagerFactoryAlgorithm = sslPolicy.getTrustStoreAlgorithm(); LogUtils.log(LOG, Level.INFO, "TRUST_STORE_ALGORITHM_SET", new Object[] {trustStoreKeyManagerFactoryAlgorithm}); return; } trustStoreKeyManagerFactoryAlgorithm = TrustManagerFactory.getDefaultAlgorithm(); LogUtils.log(LOG, Level.INFO, "TRUST_STORE_ALGORITHM_NOT_SET", new Object[] {trustStoreKeyManagerFactoryAlgorithm}); }
public void setupSecureSocketProtocol() { String secureSocketProtocol = null; if (!sslPolicy.isSetSecureSocketProtocol()) { LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_NOT_SET"); secureSocketProtocol = DEFAULT_SECURE_SOCKET_PROTOCOL; return; } secureSocketProtocol = sslPolicy.getSecureSocketProtocol(); secureListener.setProtocol(secureSocketProtocol); LogUtils.log(LOG, Level.INFO, "SECURE_SOCKET_PROTOCOL_SET", new Object[] {secureSocketProtocol}); }
public boolean setupKeystoreType() { if (!sslPolicy.isSetKeystoreType()) { LogUtils.log(LOG, Level.INFO, "KEY_STORE_TYPE_NOT_SET", new Object[] {DEFAUL_KEYSTORE_TYPE}); //Can default to JKs so return true secureListener.setKeystoreType(DEFAUL_KEYSTORE_TYPE); return true; } String keyStoreType = sslPolicy.getKeystoreType(); LogUtils.log(LOG, Level.INFO, "KEY_STORE_TYPE_SET", new Object[] {keyStoreType}); secureListener.setKeystoreType(keyStoreType); return true; }