/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; OpenSslSessionContext context = sessionContext(); if (context != null) { context.destroy(); } } } finally { writerLock.unlock(); } }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; OpenSslSessionContext context = sessionContext(); if (context != null) { context.destroy(); } } } finally { writerLock.unlock(); } }
clientMode = context.isClient(); if (PlatformDependent.javaVersion() >= 7) { session = new ExtendedOpenSslSession(new DefaultOpenSslSession(context.sessionContext())) { private String[] peerSupportedSignatureAlgorithms; private List requestedServerNames; session = new DefaultOpenSslSession(context.sessionContext());
this.alloc = checkNotNull(alloc, "alloc"); apn = (OpenSslApplicationProtocolNegotiator) context.applicationProtocolNegotiator(); session = new OpenSslSession(context.sessionContext()); clientMode = context.isClient(); engineMap = context.engineMap;
public void configureOpenSslStatsMetrics(SslContext sslContext, String sslContextId) { // Setup metrics tracking the OpenSSL stats. if (sslContext instanceof ReferenceCountedOpenSslContext) { OpenSslSessionStats stats = ((ReferenceCountedOpenSslContext) sslContext).sessionContext().stats(); openSslStatGauge(stats, sslContextId, "accept", OpenSslSessionStats::accept); openSslStatGauge(stats, sslContextId, "accept_good", OpenSslSessionStats::acceptGood); openSslStatGauge(stats, sslContextId, "accept_renegotiate", OpenSslSessionStats::acceptRenegotiate); openSslStatGauge(stats, sslContextId, "number", OpenSslSessionStats::number); openSslStatGauge(stats, sslContextId, "connect", OpenSslSessionStats::connect); openSslStatGauge(stats, sslContextId, "connect_good", OpenSslSessionStats::connectGood); openSslStatGauge(stats, sslContextId, "connect_renegotiate", OpenSslSessionStats::connectRenegotiate); openSslStatGauge(stats, sslContextId, "hits", OpenSslSessionStats::hits); openSslStatGauge(stats, sslContextId, "cb_hits", OpenSslSessionStats::cbHits); openSslStatGauge(stats, sslContextId, "misses", OpenSslSessionStats::misses); openSslStatGauge(stats, sslContextId, "timeouts", OpenSslSessionStats::timeouts); openSslStatGauge(stats, sslContextId, "cache_full", OpenSslSessionStats::cacheFull); openSslStatGauge(stats, sslContextId, "ticket_key_fail", OpenSslSessionStats::ticketKeyFail); openSslStatGauge(stats, sslContextId, "ticket_key_new", OpenSslSessionStats::ticketKeyNew); openSslStatGauge(stats, sslContextId, "ticket_key_renew", OpenSslSessionStats::ticketKeyRenew); openSslStatGauge(stats, sslContextId, "ticket_key_resume", OpenSslSessionStats::ticketKeyResume); } }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
public void configureOpenSslStatsMetrics(SslContext sslContext, String sslContextId) { // Setup metrics tracking the OpenSSL stats. if (sslContext instanceof ReferenceCountedOpenSslContext) { OpenSslSessionStats stats = ((ReferenceCountedOpenSslContext) sslContext).sessionContext().stats(); openSslStatGauge(stats, sslContextId, "accept", OpenSslSessionStats::accept); openSslStatGauge(stats, sslContextId, "accept_good", OpenSslSessionStats::acceptGood); openSslStatGauge(stats, sslContextId, "accept_renegotiate", OpenSslSessionStats::acceptRenegotiate); openSslStatGauge(stats, sslContextId, "number", OpenSslSessionStats::number); openSslStatGauge(stats, sslContextId, "connect", OpenSslSessionStats::connect); openSslStatGauge(stats, sslContextId, "connect_good", OpenSslSessionStats::connectGood); openSslStatGauge(stats, sslContextId, "connect_renegotiate", OpenSslSessionStats::connectRenegotiate); openSslStatGauge(stats, sslContextId, "hits", OpenSslSessionStats::hits); openSslStatGauge(stats, sslContextId, "cb_hits", OpenSslSessionStats::cbHits); openSslStatGauge(stats, sslContextId, "misses", OpenSslSessionStats::misses); openSslStatGauge(stats, sslContextId, "timeouts", OpenSslSessionStats::timeouts); openSslStatGauge(stats, sslContextId, "cache_full", OpenSslSessionStats::cacheFull); openSslStatGauge(stats, sslContextId, "ticket_key_fail", OpenSslSessionStats::ticketKeyFail); openSslStatGauge(stats, sslContextId, "ticket_key_new", OpenSslSessionStats::ticketKeyNew); openSslStatGauge(stats, sslContextId, "ticket_key_renew", OpenSslSessionStats::ticketKeyRenew); openSslStatGauge(stats, sslContextId, "ticket_key_resume", OpenSslSessionStats::ticketKeyResume); } }
private void destroy() { Lock writerLock = ctxLock.writeLock(); writerLock.lock(); try { if (ctx != 0) { if (enableOcsp) { SSLContext.disableOcsp(ctx); } SSLContext.free(ctx); ctx = 0; OpenSslSessionContext context = sessionContext(); if (context != null) { context.destroy(); } } } finally { writerLock.unlock(); } }
clientMode = context.isClient(); if (PlatformDependent.javaVersion() >= 7) { session = new ExtendedOpenSslSession(new DefaultOpenSslSession(context.sessionContext())) { private String[] peerSupportedSignatureAlgorithms; private List requestedServerNames; session = new DefaultOpenSslSession(context.sessionContext());
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }
/** * Returns the stats of this context. * * @deprecated use {@link #sessionContext#stats()} */ @Deprecated public final OpenSslSessionStats stats() { return sessionContext().stats(); }
/** * Sets the SSL session ticket keys of this context. * * @deprecated use {@link OpenSslSessionContext#setTicketKeys(byte[])} */ @Deprecated public final void setTicketKeys(byte[] keys) { sessionContext().setTicketKeys(keys); }