outputBuffer = new InternalAprOutputBuffer(response, headerBufferSize);
response.setOutputBuffer(outputBuffer);
request.setResponse(response);
-
- ssl = endpoint.isSSLEnabled();
initializeFilters(maxTrailerSize);
/**
- * SSL enabled ?
- */
- protected boolean ssl = false;
-
-
- /**
* Socket associated with the current connection.
*/
protected SocketWrapper<Long> socket = null;
} else if (actionCode == ActionCode.REQ_SSL_ATTRIBUTE ) {
- if (ssl && (socketRef != 0)) {
+ if (endpoint.isSSLEnabled() && (socketRef != 0)) {
try {
// Cipher suite
Object sslO = SSLSocket.getInfoS(socketRef, SSL.SSL_INFO_CIPHER);
} else if (actionCode == ActionCode.REQ_SSL_CERTIFICATE) {
- if (ssl && (socketRef != 0)) {
+ if (endpoint.isSSLEnabled() && (socketRef != 0)) {
// Consume and buffer the request body, so that it does not
// interfere with the client's handshake messages
InputFilter[] inputFilters = inputBuffer.getFilters();
contentDelimitation = false;
expectation = false;
sendfileData = null;
- if (ssl) {
+ if (endpoint.isSSLEnabled()) {
request.scheme().setString("https");
}
MessageBytes protocolMB = request.protocol();
}
if (colonPos < 0) {
- if (!ssl) {
+ if (!endpoint.isSSLEnabled()) {
// 80 - Default HTTP port
request.setServerPort(80);
} else {
response.setOutputBuffer(outputBuffer);
request.setResponse(response);
- ssl = endpoint.isSSLEnabled();
-
initializeFilters(maxTrailerSize);
// Cause loading of HexUtils
protected boolean cometClose = false;
/**
- * SSL enabled ?
- */
- protected boolean ssl = false;
-
-
- /**
* Socket associated with the current connection.
*/
protected NioChannel socket = null;
contentDelimitation = false;
expectation = false;
sendfileData = null;
- if (ssl) {
+ if (endpoint.isSSLEnabled()) {
request.scheme().setString("https");
}
MessageBytes protocolMB = request.protocol();
}
if (colonPos < 0) {
- if (!ssl) {
+ if (!endpoint.isSSLEnabled()) {
// 80 - Default HTTP port
request.setServerPort(80);
} else {