@@ -144,7 +144,7 @@ private CertStatusRequestSpec(HandshakeContext hc,
144144 if (statusType == CertStatusRequestType .OCSP .id ) {
145145 this .statusRequest = new OCSPStatusRequest (statusType , encoded );
146146 } else {
147- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
147+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
148148 SSLLogger .info (
149149 "Unknown certificate status request " +
150150 "(status type: " + statusType + ")" );
@@ -196,7 +196,7 @@ private CertStatusResponseSpec(HandshakeContext hc,
196196 if (type == CertStatusRequestType .OCSP .id ) {
197197 this .statusResponse = new OCSPStatusResponse (type , respData );
198198 } else {
199- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
199+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
200200 SSLLogger .info (
201201 "Unknown certificate status response " +
202202 "(status type: " + type + ")" );
@@ -557,7 +557,7 @@ public byte[] produce(ConnectionContext context,
557557 }
558558
559559 if (!chc .sslConfig .isAvailable (SSLExtension .CH_STATUS_REQUEST )) {
560- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
560+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
561561 SSLLogger .fine (
562562 "Ignore unavailable extension: " +
563563 SSLExtension .CH_STATUS_REQUEST .name );
@@ -598,7 +598,7 @@ public void consume(ConnectionContext context,
598598 ServerHandshakeContext shc = (ServerHandshakeContext )context ;
599599
600600 if (!shc .sslConfig .isAvailable (SSLExtension .CH_STATUS_REQUEST )) {
601- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
601+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
602602 SSLLogger .fine ("Ignore unavailable extension: " +
603603 SSLExtension .CH_STATUS_REQUEST .name );
604604 }
@@ -656,7 +656,7 @@ public byte[] produce(ConnectionContext context,
656656 shc .handshakeExtensions .get (SSLExtension .CH_STATUS_REQUEST );
657657 if (spec == null ) {
658658 // Ignore, no status_request extension requested.
659- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
659+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
660660 SSLLogger .finest ("Ignore unavailable extension: " +
661661 SSLExtension .CH_STATUS_REQUEST .name );
662662 }
@@ -666,7 +666,7 @@ public byte[] produce(ConnectionContext context,
666666
667667 // Is it a session resuming?
668668 if (shc .isResumption ) {
669- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
669+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
670670 SSLLogger .finest (
671671 "No status_request response for session resuming" );
672672 }
@@ -839,7 +839,7 @@ private CertStatusRequestV2Spec(HandshakeContext hc,
839839 statusRequests .add (
840840 new OCSPStatusRequest (statusType , encoded ));
841841 } else {
842- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
842+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
843843 SSLLogger .info (
844844 "Unknown certificate status request " +
845845 "(status type: " + statusType + ")" );
@@ -915,7 +915,7 @@ public byte[] produce(ConnectionContext context,
915915 }
916916
917917 if (!chc .sslConfig .isAvailable (SSLExtension .CH_STATUS_REQUEST_V2 )) {
918- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
918+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
919919 SSLLogger .finest (
920920 "Ignore unavailable status_request_v2 extension" );
921921 }
@@ -957,7 +957,7 @@ public void consume(ConnectionContext context,
957957 ServerHandshakeContext shc = (ServerHandshakeContext )context ;
958958
959959 if (!shc .sslConfig .isAvailable (SSLExtension .CH_STATUS_REQUEST_V2 )) {
960- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
960+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
961961 SSLLogger .finest (
962962 "Ignore unavailable status_request_v2 extension" );
963963 }
@@ -1017,7 +1017,7 @@ public byte[] produce(ConnectionContext context,
10171017 shc .handshakeExtensions .get (SSLExtension .CH_STATUS_REQUEST_V2 );
10181018 if (spec == null ) {
10191019 // Ignore, no status_request_v2 extension requested.
1020- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
1020+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
10211021 SSLLogger .finest (
10221022 "Ignore unavailable status_request_v2 extension" );
10231023 }
@@ -1027,7 +1027,7 @@ public byte[] produce(ConnectionContext context,
10271027
10281028 // Is it a session resuming?
10291029 if (shc .isResumption ) {
1030- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
1030+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
10311031 SSLLogger .finest (
10321032 "No status_request_v2 response for session resumption" );
10331033 }
@@ -1112,7 +1112,7 @@ public byte[] produce(ConnectionContext context,
11121112
11131113 // Stapling needs to be active and have valid data to proceed
11141114 if (shc .stapleParams == null ) {
1115- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
1115+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
11161116 SSLLogger .finest (
11171117 "Stapling is disabled for this connection" );
11181118 }
@@ -1121,7 +1121,7 @@ public byte[] produce(ConnectionContext context,
11211121
11221122 // There needs to be a non-null CertificateEntry to proceed
11231123 if (shc .currentCertEntry == null ) {
1124- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake" )) {
1124+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake" )) {
11251125 SSLLogger .finest ("Found null CertificateEntry in context" );
11261126 }
11271127 return null ;
@@ -1139,7 +1139,7 @@ public byte[] produce(ConnectionContext context,
11391139 byte [] respBytes = shc .stapleParams .responseMap .get (x509Cert );
11401140 if (respBytes == null ) {
11411141 // We're done with this entry. Clear it from the context
1142- if (SSLLogger .isOn &&
1142+ if (SSLLogger .isOn () &&
11431143 SSLLogger .isOn ("ssl,handshake,verbose" )) {
11441144 SSLLogger .finest ("No status response found for " +
11451145 x509Cert .getSubjectX500Principal ());
@@ -1149,7 +1149,7 @@ public byte[] produce(ConnectionContext context,
11491149 }
11501150
11511151 // Build a proper response buffer from the stapling information
1152- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake,verbose" )) {
1152+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake,verbose" )) {
11531153 SSLLogger .finest ("Found status response for " +
11541154 x509Cert .getSubjectX500Principal () +
11551155 ", response length: " + respBytes .length );
@@ -1208,7 +1208,7 @@ public void consume(ConnectionContext context,
12081208 respList .add (spec .statusResponse .encodedResponse );
12091209 chc .handshakeSession .setStatusResponses (respList );
12101210 } else {
1211- if (SSLLogger .isOn && SSLLogger .isOn ("ssl,handshake,verbose" )) {
1211+ if (SSLLogger .isOn () && SSLLogger .isOn ("ssl,handshake,verbose" )) {
12121212 SSLLogger .finest (
12131213 "Ignoring stapled data on resumed session" );
12141214 }
0 commit comments