/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; OpenSslSessionContext context = sessionContext(); if (context != null) { context.destroy(); } } } finally { writerLock.unlock(); } }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; OpenSslSessionContext context = sessionContext(); if (context != null) { context.destroy(); } } } finally { writerLock.unlock(); } }
public void configureOpenSslStatsMetrics(SslContext sslContext, String sslContextId) { // Setup metrics tracking the OpenSSL stats. if (sslContext instanceof ReferenceCountedOpenSslContext) { OpenSslSessionStats stats = ((ReferenceCountedOpenSslContext) sslContext).sessionContext().stats(); openSslStatGauge(stats, sslContextId, "accept", OpenSslSessionStats::accept); openSslStatGauge(stats, sslContextId, "accept_good", OpenSslSessionStats::acceptGood); openSslStatGauge(stats, sslContextId, "accept_renegotiate", OpenSslSessionStats::acceptRenegotiate); openSslStatGauge(stats, sslContextId, "number", OpenSslSessionStats::number); openSslStatGauge(stats, sslContextId, "connect", OpenSslSessionStats::connect); openSslStatGauge(stats, sslContextId, "connect_good", OpenSslSessionStats::connectGood); openSslStatGauge(stats, sslContextId, "connect_renegotiate", OpenSslSessionStats::connectRenegotiate); openSslStatGauge(stats, sslContextId, "hits", OpenSslSessionStats::hits); openSslStatGauge(stats, sslContextId, "cb_hits", OpenSslSessionStats::cbHits); openSslStatGauge(stats, sslContextId, "misses", OpenSslSessionStats::misses); openSslStatGauge(stats, sslContextId, "timeouts", OpenSslSessionStats::timeouts); openSslStatGauge(stats, sslContextId, "cache_full", OpenSslSessionStats::cacheFull); openSslStatGauge(stats, sslContextId, "ticket_key_fail", OpenSslSessionStats::ticketKeyFail); openSslStatGauge(stats, sslContextId, "ticket_key_new", OpenSslSessionStats::ticketKeyNew); openSslStatGauge(stats, sslContextId, "ticket_key_renew", OpenSslSessionStats::ticketKeyRenew); openSslStatGauge(stats, sslContextId, "ticket_key_resume", OpenSslSessionStats::ticketKeyResume); } }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; OpenSslSessionContext context = sessionContext(); if (context != null) { context.destroy(); } } } finally { writerLock.unlock(); } }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; sessionContext().destroy(); } } finally { writerLock.unlock(); } }
public void configureOpenSslStatsMetrics(SslContext sslContext, String sslContextId) { // Setup metrics tracking the OpenSSL stats. if (sslContext instanceof ReferenceCountedOpenSslContext) { OpenSslSessionStats stats = ((ReferenceCountedOpenSslContext) sslContext).sessionContext().stats(); openSslStatGauge(stats, sslContextId, "accept", OpenSslSessionStats::accept); openSslStatGauge(stats, sslContextId, "accept_good", OpenSslSessionStats::acceptGood); openSslStatGauge(stats, sslContextId, "accept_renegotiate", OpenSslSessionStats::acceptRenegotiate); openSslStatGauge(stats, sslContextId, "number", OpenSslSessionStats::number); openSslStatGauge(stats, sslContextId, "connect", OpenSslSessionStats::connect); openSslStatGauge(stats, sslContextId, "connect_good", OpenSslSessionStats::connectGood); openSslStatGauge(stats, sslContextId, "connect_renegotiate", OpenSslSessionStats::connectRenegotiate); openSslStatGauge(stats, sslContextId, "hits", OpenSslSessionStats::hits); openSslStatGauge(stats, sslContextId, "cb_hits", OpenSslSessionStats::cbHits); openSslStatGauge(stats, sslContextId, "misses", OpenSslSessionStats::misses); openSslStatGauge(stats, sslContextId, "timeouts", OpenSslSessionStats::timeouts); openSslStatGauge(stats, sslContextId, "cache_full", OpenSslSessionStats::cacheFull); openSslStatGauge(stats, sslContextId, "ticket_key_fail", OpenSslSessionStats::ticketKeyFail); openSslStatGauge(stats, sslContextId, "ticket_key_new", OpenSslSessionStats::ticketKeyNew); openSslStatGauge(stats, sslContextId, "ticket_key_renew", OpenSslSessionStats::ticketKeyRenew); openSslStatGauge(stats, sslContextId, "ticket_key_resume", OpenSslSessionStats::ticketKeyResume); } }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
private static void registerOpenSslStats(SslContext sslContext, MetricRegistry metricRegistry) { SSLSessionContext sslSessionContext = sslContext.sessionContext(); if (sslSessionContext instanceof OpenSslSessionContext) { OpenSslSessionStats stats = ((OpenSslSessionContext) sslSessionContext).stats(); MetricRegistry sessionStatsRegistry = metricRegistry.scope("connections.openssl.session"); sessionStatsRegistry.register("number", (Gauge<Long>) stats::number); sessionStatsRegistry.register("accept", (Gauge<Long>) stats::accept); sessionStatsRegistry.register("acceptGood", (Gauge<Long>) stats::acceptGood); sessionStatsRegistry.register("acceptRenegotiate", (Gauge<Long>) stats::acceptRenegotiate); sessionStatsRegistry.register("hits", (Gauge<Long>) stats::hits); sessionStatsRegistry.register("misses", (Gauge<Long>) stats::misses); sessionStatsRegistry.register("cbHits", (Gauge<Long>) stats::cbHits); sessionStatsRegistry.register("cacheFull", (Gauge<Long>) stats::cacheFull); sessionStatsRegistry.register("timeouts", (Gauge<Long>) stats::timeouts); } }
public void configureOpenSslStatsMetrics(SslContext sslContext, String sslContextId) { // Setup metrics tracking the OpenSSL stats. if (sslContext instanceof ReferenceCountedOpenSslContext) { OpenSslSessionStats stats = ((ReferenceCountedOpenSslContext) sslContext).sessionContext().stats(); openSslStatGauge(stats, sslContextId, "accept", OpenSslSessionStats::accept); openSslStatGauge(stats, sslContextId, "accept_good", OpenSslSessionStats::acceptGood); openSslStatGauge(stats, sslContextId, "accept_renegotiate", OpenSslSessionStats::acceptRenegotiate); openSslStatGauge(stats, sslContextId, "number", OpenSslSessionStats::number); openSslStatGauge(stats, sslContextId, "connect", OpenSslSessionStats::connect); openSslStatGauge(stats, sslContextId, "connect_good", OpenSslSessionStats::connectGood); openSslStatGauge(stats, sslContextId, "connect_renegotiate", OpenSslSessionStats::connectRenegotiate); openSslStatGauge(stats, sslContextId, "hits", OpenSslSessionStats::hits); openSslStatGauge(stats, sslContextId, "cb_hits", OpenSslSessionStats::cbHits); openSslStatGauge(stats, sslContextId, "misses", OpenSslSessionStats::misses); openSslStatGauge(stats, sslContextId, "timeouts", OpenSslSessionStats::timeouts); openSslStatGauge(stats, sslContextId, "cache_full", OpenSslSessionStats::cacheFull); openSslStatGauge(stats, sslContextId, "ticket_key_fail", OpenSslSessionStats::ticketKeyFail); openSslStatGauge(stats, sslContextId, "ticket_key_new", OpenSslSessionStats::ticketKeyNew); openSslStatGauge(stats, sslContextId, "ticket_key_renew", OpenSslSessionStats::ticketKeyRenew); openSslStatGauge(stats, sslContextId, "ticket_key_resume", OpenSslSessionStats::ticketKeyResume); } }