@Override public void setSSLParameters(SSLParameters sslParameters) { engine.setSSLParameters(sslParameters); } }
@Override public void setSSLParameters(SSLParameters sslParameters) { engine.setSSLParameters(sslParameters); } }
@Override public void setSSLParameters(final SSLParameters sslParameters) { delegate.setSSLParameters(sslParameters); }
default void setSSLParameters(SSLContext sslContext, SSLEngine sslEngine, SSLParameters parameters) { sslEngine.setSSLParameters(parameters); }
/** {@inheritDoc} */ @Override protected SSLEngine engineCreateSSLEngine() { final SSLEngine engine = delegate.createSSLEngine(); if (parameters != null) engine.setSSLParameters(parameters); return engine; }
/** {@inheritDoc} */ @Override protected SSLEngine engineCreateSSLEngine(String s, int i) { final SSLEngine engine = delegate.createSSLEngine(); if (parameters != null) engine.setSSLParameters(parameters); return engine; }
public void setSSLParameters(final SSLParameters params) { currentRef.get().setSSLParameters(params); }
public void setSSLParameters(final SSLParameters params) { currentRef.get().setSSLParameters(params); }
public void setSSLParameters(final SSLParameters params) { currentRef.get().setSSLParameters(params); }
static void setApplicationProtocols(SSLEngine engine, List<String> supportedProtocols) { SSLParameters parameters = engine.getSSLParameters(); String[] protocolArray = supportedProtocols.toArray(EmptyArrays.EMPTY_STRINGS); try { SET_APPLICATION_PROTOCOLS.invoke(parameters, new Object[]{protocolArray}); } catch (UnsupportedOperationException ex) { throw ex; } catch (Exception ex) { throw new IllegalStateException(ex); } engine.setSSLParameters(parameters); }
@Override public ByteChannel wrapChannel(SocketChannel channel, SelectionKey key) throws IOException { SSLEngine e = sslcontext.createSSLEngine(); e.setUseClientMode(false); e.setSSLParameters(sslParameters); return new SSLSocketChannel2(channel, e, exec, key); } }
static void setApplicationProtocols(SSLEngine engine, List<String> supportedProtocols) { SSLParameters parameters = engine.getSSLParameters(); String[] protocolArray = supportedProtocols.toArray(EmptyArrays.EMPTY_STRINGS); try { SET_APPLICATION_PROTOCOLS.invoke(parameters, new Object[]{protocolArray}); } catch (UnsupportedOperationException ex) { throw ex; } catch (Exception ex) { throw new IllegalStateException(ex); } engine.setSSLParameters(parameters); }
private SSLEngine createSslEngine(SSLContext sslContext, String peerHost, int peerPort) { SSLEngine sslEngine = sslContext.createSSLEngine(peerHost, peerPort); if (cipherSuites != null) sslEngine.setEnabledCipherSuites(cipherSuites); if (enabledProtocols != null) sslEngine.setEnabledProtocols(enabledProtocols); // SSLParameters#setEndpointIdentificationAlgorithm enables endpoint validation // only in client mode. Hence, validation is enabled only for clients. if (mode == Mode.SERVER) { sslEngine.setUseClientMode(false); if (needClientAuth) sslEngine.setNeedClientAuth(needClientAuth); else sslEngine.setWantClientAuth(wantClientAuth); } else { sslEngine.setUseClientMode(true); SSLParameters sslParams = sslEngine.getSSLParameters(); sslParams.setEndpointIdentificationAlgorithm(endpointIdentification); sslEngine.setSSLParameters(sslParams); } return sslEngine; }
@Override public SSLEngine setProtocols(SSLEngine engine, String[] protocols) { SSLParameters sslParameters = engine.getSSLParameters(); try { JDK_9_ALPN_METHODS.setApplicationProtocols().invoke(sslParameters, (Object) protocols); } catch (IllegalAccessException | InvocationTargetException e) { throw new RuntimeException(e); } engine.setSSLParameters(sslParameters); return engine; }
protected void configureSslEngine(SSLEngine sslEngine, AsyncHttpClientConfig config) { sslEngine.setUseClientMode(true); if (!config.isDisableHttpsEndpointIdentificationAlgorithm()) { SSLParameters params = sslEngine.getSSLParameters(); params.setEndpointIdentificationAlgorithm("HTTPS"); sslEngine.setSSLParameters(params); } } }
@Override public void checkServerTrusted(X509Certificate[] chain, String authType, SSLEngine engine) throws CertificateException { // The Netty client we use for the internal client does not provide an option to disable the standard hostname // validation. When using custom certificate checks, we want to allow that option, so we change the endpoint // identification algorithm here. This is not needed for the server-side, since the Jetty server does provide // an option for enabling/disabling standard hostname validation. if (!validateServerHostnames) { SSLParameters params = engine.getSSLParameters(); params.setEndpointIdentificationAlgorithm(null); engine.setSSLParameters(params); } certificateChecker.checkServer(chain, authType, engine, delegate); } }
/** * Apply modifications to engine to enable hostname verification (client side only) * * @param sslEngine the engine used for handling TLS. Will be mutated by this method * @return the updated sslEngine that allows client side hostname verification */ @Override public SSLEngine apply( SSLEngine sslEngine ) { SSLParameters sslParameters = sslEngine.getSSLParameters(); sslParameters.setEndpointIdentificationAlgorithm( VerificationAlgorithm.HTTPS.getValue() ); sslEngine.setSSLParameters( sslParameters ); return sslEngine; }
public void configure(final SSLContext context, final SSLEngine sslEngine) { sslEngine.setUseClientMode(clientMode); final SSLParameters sslParameters = sslEngine.getSSLParameters(); configure(sslParameters, sslEngine.getSupportedProtocols(), sslEngine.getSupportedCipherSuites()); sslEngine.setSSLParameters(sslParameters); }
public void setSSLParameters(final SSLContext sslContext, final SSLEngine sslEngine, final SSLParameters parameters) { sslEngine.setSSLParameters(redefine(parameters, sslEngine.getSupportedCipherSuites(), sslEngine.getSupportedProtocols())); }
@Override protected TestSslTransportLayer newTransportLayer(String id, SelectionKey key, SSLEngine sslEngine) throws IOException { SSLParameters sslParams = sslEngine.getSSLParameters(); sslParams.setEndpointIdentificationAlgorithm("HTTPS"); sslEngine.setSSLParameters(sslParams); return super.newTransportLayer(id, key, sslEngine); } };