/** {@inheritDoc} */ @Override protected SSLSessionContext engineGetClientSessionContext() { return delegate.getClientSessionContext(); }
protected SSLSessionContext engineGetClientSessionContext() { return delegate.getClientSessionContext(); }
@Override protected SSLSessionContext engineGetClientSessionContext() { return matcher.getDefaultContext().getClientSessionContext(); } }
@Override protected SSLSessionContext engineGetClientSessionContext() { return matcher.getDefaultContext().getClientSessionContext(); } }
null); SSLSessionContext sessCtx = ctx.getClientSessionContext(); if (sessionCacheSize > 0) { sessCtx.setSessionCacheSize((int) Math.min(sessionCacheSize, Integer.MAX_VALUE));
null); SSLSessionContext sessCtx = ctx.getClientSessionContext(); if (sessionCacheSize > 0) { sessCtx.setSessionCacheSize((int) Math.min(sessionCacheSize, Integer.MAX_VALUE));
/** * Returns the JDK {@link SSLSessionContext} object held by this context. */ @Override public final SSLSessionContext sessionContext() { if (isServer()) { return context().getServerSessionContext(); } else { return context().getClientSessionContext(); } }
SSLSessionContext sessCtx = ctx.getClientSessionContext(); if (sessionCacheSize > 0) { sessCtx.setSessionCacheSize((int) Math.min(sessionCacheSize, Integer.MAX_VALUE));
/** * Returns the JDK {@link SSLSessionContext} object held by this context. */ @Override public final SSLSessionContext sessionContext() { if (isServer()) { return context().getServerSessionContext(); } else { return context().getClientSessionContext(); } }
/** * Returns the JDK {@link SSLSessionContext} object held by this context. */ public final SSLSessionContext sessionContext() { if (isServer()) { return context().getServerSessionContext(); } else { return context().getClientSessionContext(); } }
LOG.debug("connection failed due to SSL error, clearing TLS session cache", sslEx); clearSessionCache(sslContext.getClientSessionContext(), remoteAddress);
sslContext.getClientSessionContext().setSessionCacheSize(optionMap.get(Options.SSL_CLIENT_SESSION_CACHE_SIZE, 0)); sslContext.getClientSessionContext().setSessionTimeout(optionMap.get(Options.SSL_CLIENT_SESSION_TIMEOUT, 0)); sslContext.getServerSessionContext().setSessionCacheSize(optionMap.get(Options.SSL_SERVER_SESSION_CACHE_SIZE, 0)); sslContext.getServerSessionContext().setSessionTimeout(optionMap.get(Options.SSL_SERVER_SESSION_TIMEOUT, 0));
SSLSessionContext sessionContext = clientMode ? sslContext.getClientSessionContext() : sslContext.getServerSessionContext(); if (sessionContext != null) { if (sessionCacheSize >= 0) sessionContext.setSessionCacheSize(sessionCacheSize);
null); SSLSessionContext sessCtx = ctx.getClientSessionContext(); if (sessionCacheSize > 0) { sessCtx.setSessionCacheSize((int) Math.min(sessionCacheSize, Integer.MAX_VALUE));
public SSLContext getSSLContext(AsyncHttpClientConfig config) throws GeneralSecurityException { SSLContext sslContext = config.getSSLContext(); if (sslContext == null) { sslContext = config.isAcceptAnyCertificate() ? looseTrustManagerSSLContext : SSLContext.getDefault(); if (config.getSslSessionCacheSize() != null) sslContext.getClientSessionContext().setSessionCacheSize(config.getSslSessionCacheSize()); if (config.getSslSessionTimeout() != null) sslContext.getClientSessionContext().setSessionTimeout(config.getSslSessionTimeout()); } return sslContext; } }
/** * Returns the JDK {@link SSLSessionContext} object held by this context. */ @Override public final SSLSessionContext sessionContext() { if (isServer()) { return context().getServerSessionContext(); } else { return context().getClientSessionContext(); } }
public static SSLContext getSSLContext(TLSParameterBase parameters) throws GeneralSecurityException { // TODO do we need to cache the context String provider = parameters.getJsseProvider(); String protocol = parameters.getSecureSocketProtocol() != null ? parameters .getSecureSocketProtocol() : "TLS"; SSLContext ctx = provider == null ? SSLContext.getInstance(protocol) : SSLContext .getInstance(protocol, provider); KeyManager[] keyManagers = parameters.getKeyManagers(); if (keyManagers == null && parameters instanceof TLSClientParameters) { keyManagers = org.apache.cxf.configuration.jsse.SSLUtils.getDefaultKeyStoreManagers(LOG); } KeyManager[] configuredKeyManagers = configureKeyManagersWithCertAlias(parameters, keyManagers); TrustManager[] trustManagers = parameters.getTrustManagers(); if (trustManagers == null && parameters instanceof TLSClientParameters) { trustManagers = org.apache.cxf.configuration.jsse.SSLUtils.getDefaultTrustStoreManagers(LOG); } ctx.init(configuredKeyManagers, trustManagers, parameters.getSecureRandom()); if (parameters instanceof TLSClientParameters && ctx.getClientSessionContext() != null) { ctx.getClientSessionContext().setSessionTimeout(((TLSClientParameters)parameters).getSslCacheTimeout()); } return ctx; }
LOG.debug("connection failed due to SSL error, clearing TLS session cache", sslEx); clearSessionCache(sslContext.getClientSessionContext(), remoteAddress);
@Override protected SSLSessionContext engineGetClientSessionContext() { return matcher.getDefaultContext().getClientSessionContext(); } }
/** * Returns the JDK {@link SSLSessionContext} object held by this context. */ @Override public final SSLSessionContext sessionContext() { if (isServer()) { return context().getServerSessionContext(); } else { return context().getClientSessionContext(); } }