Warning: file_get_contents(/data/phpspider/zhask/data//catemap/3/sockets/2.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
JavaRMI应用程序中的SSL握手错误_Java_Sockets_Ssl_Rmi - Fatal编程技术网

JavaRMI应用程序中的SSL握手错误

JavaRMI应用程序中的SSL握手错误,java,sockets,ssl,rmi,Java,Sockets,Ssl,Rmi,我在JavaRMI应用程序中SSL握手的开始时遇到了一些问题 我的应用程序与标准RMI套接字配合良好,但如果按照以下指南将默认套接字更改为SSL套接字,则无法完成握手: 因此,我将可激活服务器的构造函数从 public MyActivatableServer(ActivationID id, MarshalledObject<MyType> obj) throws RemoteException { // Some code ... // int po

我在JavaRMI应用程序中SSL握手的开始时遇到了一些问题

我的应用程序与标准RMI套接字配合良好,但如果按照以下指南将默认套接字更改为SSL套接字,则无法完成握手:

因此,我将可激活服务器的构造函数从

public MyActivatableServer(ActivationID id, MarshalledObject<MyType> obj)
        throws RemoteException
{
    // Some code ...
    // int port = ...
    // Other code ...

    Activatable.exportObject(this, id, port);
}
最后,我将这些属性添加到启动可激活服务器的JVM中:


您需要在安装程序的
ActivationGroupDesc
中定义这些属性。

您是如何“将这些属性添加到启动可激活服务器的JVM”的?显然是添加到错误的JVM:)谢谢您的帮助!!!您必须在安装程序的ActivationGroup中定义它们。
public MyActivatableServer(ActivationID id, MarshalledObject<MyType> obj)
        throws RemoteException
{
    // Some code ...
    // int port = ...
    // Other code ...

    Activatable.exportObject(this, id, port, new SslRMIClientSocketFactory(),
        new SslRMIServerSocketFactory());
}
*** ClientHello, TLSv1
RandomCookie:  GMT: 1410959810 bytes = { 20, 172, 181, 158, 246, 172, 183, 30, 232, 42, 80, 36, 77, 5, 67, 56, 30, 191, 170, 142, 14, 2, 113, 241, 183, 154, 213, 24 }
Session ID:  {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods:  { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
***
main, WRITE: TLSv1 Handshake, length = 149
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT:  fatal, handshake_failure
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
-Djavax.net.ssl.keyStore=keystore
-Djavax.net.ssl.keyStorePassword=password