org.eclipse.jetty.http.ssl
Class SslSelectChannelEndPoint
java.lang.Object
org.eclipse.jetty.io.nio.ChannelEndPoint
org.eclipse.jetty.io.nio.SelectChannelEndPoint
org.eclipse.jetty.http.ssl.SslSelectChannelEndPoint
- All Implemented Interfaces:
- java.lang.Runnable, AsyncEndPoint, ConnectedEndPoint, EndPoint
public class SslSelectChannelEndPoint
- extends SelectChannelEndPoint
SslSelectChannelEndPoint
A SelectChannelEndPoint that uses an SSLEngine to handle an
SSL connection.
There is a named logger "org.eclipse.jetty.http.ssl"
| Methods inherited from class org.eclipse.jetty.io.nio.SelectChannelEndPoint |
blockReadable, blockWritable, cancelIdle, dispatch, getConnection, getSelectionKey, getSelectManager, getSelectSet, getTimeoutTask, isReadyForDispatch, run, schedule, scheduleIdle, scheduleWrite, setConnection, setWritable |
| Methods inherited from class java.lang.Object |
clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait |
SslSelectChannelEndPoint
public SslSelectChannelEndPoint(Buffers buffers,
java.nio.channels.SocketChannel channel,
SelectorManager.SelectSet selectSet,
java.nio.channels.SelectionKey key,
javax.net.ssl.SSLEngine engine)
throws java.io.IOException
- Throws:
java.io.IOException
isAllowRenegotiate
public boolean isAllowRenegotiate()
- Returns:
- True if SSL re-negotiation is allowed (default false)
setAllowRenegotiate
public void setAllowRenegotiate(boolean allowRenegotiate)
- Set if SSL re-negotiation is allowed. CVE-2009-3555 discovered
a vulnerability in SSL/TLS with re-negotiation. If your JVM
does not have CVE-2009-3555 fixed, then re-negotiation should
not be allowed.
- Parameters:
allowRenegotiate - true if re-negotiation is allowed (default false)
dump
public void dump()
idleExpired
protected void idleExpired()
- Overrides:
idleExpired in class SelectChannelEndPoint
doIdleExpired
protected void doIdleExpired()
close
public void close()
throws java.io.IOException
- Specified by:
close in interface EndPoint- Overrides:
close in class SelectChannelEndPoint
- Throws:
java.io.IOException
fill
public int fill(Buffer buffer)
throws java.io.IOException
- Fill the buffer with unencrypted bytes.
Called by a
Parser instance when more data is
needed to continue parsing a request or a response.
- Specified by:
fill in interface EndPoint- Overrides:
fill in class ChannelEndPoint
- Throws:
java.io.IOException
flush
public int flush(Buffer buffer)
throws java.io.IOException
- Specified by:
flush in interface EndPoint- Overrides:
flush in class SelectChannelEndPoint
- Throws:
java.io.IOException
flush
public int flush(Buffer header,
Buffer buffer,
Buffer trailer)
throws java.io.IOException
- Specified by:
flush in interface EndPoint- Overrides:
flush in class SelectChannelEndPoint
- Throws:
java.io.IOException
flush
public void flush()
throws java.io.IOException
- Specified by:
flush in interface EndPoint- Overrides:
flush in class ChannelEndPoint
- Throws:
java.io.IOException
isBufferingInput
public boolean isBufferingInput()
- Specified by:
isBufferingInput in interface EndPoint- Overrides:
isBufferingInput in class ChannelEndPoint
isBufferingOutput
public boolean isBufferingOutput()
- Specified by:
isBufferingOutput in interface EndPoint- Overrides:
isBufferingOutput in class ChannelEndPoint
isBufferred
public boolean isBufferred()
- Specified by:
isBufferred in interface EndPoint- Overrides:
isBufferred in class ChannelEndPoint
getSSLEngine
public javax.net.ssl.SSLEngine getSSLEngine()
toString
public java.lang.String toString()
- Overrides:
toString in class SelectChannelEndPoint
Copyright © 1995-2010 Mort Bay Consulting. All Rights Reserved.