Package javax.net.ssl

Examples of javax.net.ssl.SSLServerSocketFactory


    /**
     * SSLServerSocketFactory.getDefaultCipherSuites() method testing.
     */
    public void testGetDefaultCipherSuites2() throws Exception {
        SSLServerSocketFactory serverSocketFactory
            = new SSLServerSocketFactoryImpl(JSSETestData.getSSLParameters());
        String[] supported = serverSocketFactory.getSupportedCipherSuites();
        String[] defaultcs = serverSocketFactory.getDefaultCipherSuites();
        assertNotNull(supported);
        assertNotNull(defaultcs);
        for (int i=0; i<defaultcs.length; i++) {
            found: {
                for (int j=0; j<supported.length; j++) {
View Full Code Here


        if (sslInfo == null) {
            throw new IOException(getFormatMessage(
                "iiop.invalid_sslserverport",
                new Object[] { iport }));
        }
        SSLServerSocketFactory ssf = sslInfo.getContext().getServerSocketFactory();  
        String[] ssl3TlsCiphers = sslInfo.getSsl3TlsCiphers();
        String[] ssl2Ciphers = sslInfo.getSsl2Ciphers();
        String[] ciphers = null;
        if (ssl3TlsCiphers != null || ssl2Ciphers != null) {
            String[] socketCiphers = ssf.getDefaultCipherSuites();
            ciphers = mergeCiphers(socketCiphers, ssl3TlsCiphers, ssl2Ciphers);
        }

  String cs[] = null;

  if(_logger.isLoggable(Level.FINE)) {
      cs = ssf.getSupportedCipherSuites();
      for(int i=0; i < cs.length; ++i) {
    _logger.log(Level.FINE,"Cipher Suite: " + cs[i]);
      }
  }
  ServerSocket ss = null;
        try{
            // bugfix for 6349541
            // specify the ip address to bind to, 50 is the default used
            // by the ssf implementation when only the port is specified
            ss = ssf.createServerSocket(port, BACKLOG, inetSocketAddress.getAddress());
            if (ciphers != null) {
                ((SSLServerSocket)ss).setEnabledCipherSuites(ciphers);
            }
        } catch(IOException e) {
            _logger.log(Level.SEVERE, "iiop.createsocket_exception",
View Full Code Here

            }
            final TrustManager[] tms = null; //not needed really untill we support client auth
            final SecureRandom sr = null; // need to handle better?
            // now initialize the SSLContext gotten above and return
            ctx.init(jkms, tms, sr);
            final SSLServerSocketFactory sf = ctx.getServerSocketFactory();
           
            InetAddress bindAddress = null;
            ServerSocket sss = null;
            if (address.equals(DEFAULT_ADDRESS))            
                sss = sf.createServerSocket(port);
            else {           
                bindAddress = InetAddress.getByName(address);            
                sss = sf.createServerSocket(port, 0, bindAddress);       
            }
            debug(sss);
            return ( sss );
        }
        catch (final Exception e) {
View Full Code Here

                    ssl2Prop = (Boolean)sslProps.get("ssl2Prop");                   
                    tlsProp = (Boolean)sslProps.get("tlsProp");
                    handlerCtx.setOutputValue("CertNickname", sslProps.get("certNickname"));
                }
            }
            SSLServerSocketFactory factory = (SSLServerSocketFactory)SSLServerSocketFactory.getDefault();
            String[] supportedCiphers = factory.getSupportedCipherSuites();
            Vector ciphers = getCiphersVector(supportedCiphers);
           
            SelectItem[] commonCiphers = ConfigurationHandlers.getOptions(getCommonCiphers(ciphers));
            SelectItem[] ephemeralCiphers = ConfigurationHandlers.getOptions(getEphemeralCiphers(ciphers));
            SelectItem[] otherCiphers = ConfigurationHandlers.getOptions(getOtherCiphers(ciphers));
View Full Code Here

                        sslConfig.setSSL2Enabled(ssl2Prop);                                           
                    }
                    boolean tlsProp = ((Boolean)handlerCtx.getInputValue("TLSProp")).booleanValue();
                    sslConfig.setTLSEnabled(tlsProp);
                    if(ssl3Prop || tlsProp){
                        SSLServerSocketFactory factory = (SSLServerSocketFactory)SSLServerSocketFactory.getDefault();
                        String[] supportedCiphers = factory.getDefaultCipherSuites();
                        Vector ciphersVector = getCiphersVector(supportedCiphers);
                        String[] selectedCiphers = getSelectedCiphersList(sslConfig.getSSL3TLSCiphers());
                        String[] selectedCommon = (String[])handlerCtx.getInputValue("SelectedCommon");
                        String[] selectedEph = (String[])handlerCtx.getInputValue("SelectedEph");
                        String[] selectedOther = (String[])handlerCtx.getInputValue("SelectedOther");
View Full Code Here

                    sslProps.put("ssl2-enabled", ssl2Prop);
                    sslProps.put("ssl3-enabled", ssl3Prop);
                    sslProps.put("tls-enabled", tlsProp);

                    if (ssl3Prop || tlsProp) {
                        SSLServerSocketFactory factory = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault();
                        String[] supportedCiphers = factory.getDefaultCipherSuites();
                        Vector ciphersVector = SipUtil.getCiphersVector(supportedCiphers);
                        String[] selectedCiphers = SipUtil.getSelectedCiphersList((String) JMXUtil.getAttribute(
                                ssl, "ssl3-tls-ciphers"));
                        String[] selectedCommon = (String[]) handlerContext.getInputValue(
                                "SelectedCommon");
View Full Code Here

         SSLContext context = SSLContext.getInstance(m_sslProtocol);
         // Below call does not handle TrustManagers, needed when server must authenticate clients.
         context.init(keyFactory.getKeyManagers(), trustFactory == null ? null : trustFactory.getTrustManagers(), null);

         SSLServerSocketFactory ssf = context.getServerSocketFactory();
         SSLServerSocket serverSocket = (SSLServerSocket)ssf.createServerSocket(port, backlog, InetAddress.getByName(host));

         return serverSocket;
      }
      catch (IOException x)
      {
View Full Code Here

                ServerSocketFactory.getDefault();
            return sf.createServerSocket(portNumber
                                         ,0,
                                         hostAddress);
        case SSL_BASIC:
            SSLServerSocketFactory ssf =
                (SSLServerSocketFactory)SSLServerSocketFactory.getDefault();
            return (SSLServerSocket)ssf.createServerSocket(portNumber,
                                                           0,
                                                           hostAddress);
        case SSL_PEER_AUTHENTICATION:
            SSLServerSocketFactory ssf2 =
                (SSLServerSocketFactory)SSLServerSocketFactory.getDefault();
            SSLServerSocket sss2=
                (SSLServerSocket)ssf2.createServerSocket(portNumber,
                                                         0,
                                                         hostAddress);
            sss2.setNeedClientAuth(true);
            return sss2;
        }
View Full Code Here

            this.cipherName = cipherName;
            this.protocolVersion = protocolVersion;
        }

        public static void updateCiphers(final SSLContext sslContext) {
            SSLServerSocketFactory factory = sslContext.getServerSocketFactory();
            String[] supportedCiphers = factory.getDefaultCipherSuites();
           
            ciphersLock.writeLock().lock();
            try {
                for (int i = 0, len = supportedCiphers.length; i < len; i++) {
                    String s = supportedCiphers[i];
View Full Code Here

            {
                _serverSocket = new ServerSocket();
            }
            else
            {
                SSLServerSocketFactory socketFactory = sslContext.getServerSocketFactory();
                _serverSocket = socketFactory.createServerSocket();
            }

            _serverSocket.bind(address);
            _serverSocket.setReuseAddress(true);
View Full Code Here

TOP

Related Classes of javax.net.ssl.SSLServerSocketFactory

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.