023-Java-014

关系运算符

public class Test {
 
  public static void main(String args[]) {
     int a = 10;
     int b = 20;
     System.out.println("a == b = " + (a == b) );
     System.out.println("a != b = " + (a != b) );
     System.out.println("a > b = " + (a > b) );
     System.out.println("a < b = " + (a < b) );
     System.out.println("b >= a = " + (b >= a) );
     System.out.println("b <= a = " + (b <= a) );
  }
}

位运算符

public class Test {
  public static void main(String args[]) {
     int a = 60; /* 60 = 0011 1100 */ 
     int b = 13; /* 13 = 0000 1101 */
     int c = 0;
     c = a & b;       /* 12 = 0000 1100 */
     System.out.println("a & b = " + c );
 
     c = a | b;       /* 61 = 0011 1101 */
     System.out.println("a | b = " + c );
 
     c = a ^ b;       /* 49 = 0011 0001 */
     System.out.println("a ^ b = " + c );
 
     c = ~a;          /*-61 = 1100 0011 */
     System.out.println("~a = " + c );
 
     c = a << 2;     /* 240 = 1111 0000 */
     System.out.println("a << 2 = " + c );
 
     c = a >> 2;     /* 15 = 1111 */
     System.out.println("a >> 2  = " + c );
  
     c = a >>> 2;     /* 15 = 0000 1111 */
     System.out.println("a >>> 2 = " + c );
  }
}

a & b = 12
a | b = 61
a ^ b = 49
~a = -61
a << 2 = 240
a >> 15
a >>> 15

基于可靠性评估序贯蒙特卡洛模拟法的配电网可靠性评估研究(Matlab代码实现)内容概要:本文围绕“基于可靠性评估序贯蒙特卡洛模拟法的配电网可靠性评估研究”,介绍了利用Matlab代码实现配电网可靠性的仿真分析方法。重点采用序贯蒙特卡洛模拟法对配电网进行长时间段的状态抽样与统计,通过模拟系统元件的故障与修复过程,评估配电网的关键可靠性指标,如系统停电频率、停电持续时间、负荷点可靠性等。该方法能够有效处理复杂网络结构与设备时序特性,提升评估精度,适用于含分布式电源、电动汽车等新型负荷接入的现代配电网。文中提供了完整的Matlab实现代码与案例分析,便于复现和扩展应用。; 适合人群:具备电力系统基础知识和Matlab编程能力的高校研究生、科研人员及电力行业技术人员,尤其适合从事配电网规划、运行与可靠性分析相关工作的人员; 使用场景及目标:①掌握序贯蒙特卡洛模拟法在电力系统可靠性评估中的基本原理与实现流程;②学习如何通过Matlab构建配电网仿真模型并进行状态转移模拟;③应用于含新能源接入的复杂配电网可靠性定量评估与优化设计; 阅读建议:建议结合文中提供的Matlab代码逐段调试运行,理解状态抽样、故障判断、修复逻辑及指标统计的具体实现方式,同时可扩展至不同网络结构或加入更多不确定性因素进行深化研究。
问题出在哪? javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|ClientHello.java:678|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "F5 F1 AD 52 3E E8 A2 73 F0 AA 1B 56 AB CD AA CD E8 7A 20 61 D5 D5 0D 36 41 7B 10 FE B6 CE 84 D0", "session id" : "", "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=127.0.0.1 }, "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "extended_master_secret (23)": { <empty> }, "supported_versions (43)": { "versions": [TLSv1.2] } ] } ) javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:192|Consumed extension: supported_versions javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|ClientHello.java:708|Negotiated protocol version: TLSv1.2 javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:192|Consumed extension: server_name javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:173|Ignore unavailable extension: status_request javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:192|Consumed extension: supported_groups javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:192|Consumed extension: ec_point_formats javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.779 CST|SSLExtensions.java:192|Consumed extension: signature_algorithms javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2 javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:192|Consumed extension: extended_master_secret javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:192|Consumed extension: supported_versions javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:163|Ignore unsupported extension: cookie javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:163|Ignore unsupported extension: psk_key_exchange_modes javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:163|Ignore unsupported extension: certificate_authorities javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:163|Ignore unsupported extension: key_share javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|RenegoInfoExtension.java:288|Safe renegotiation, using the SCSV signgling javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:163|Ignore unsupported extension: pre_shared_key javax.net.ssl|WARNING|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:215|Ignore impact of unsupported extension: server_name javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:207|Ignore unavailable extension: status_request javax.net.ssl|WARNING|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups javax.net.ssl|WARNING|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.780 CST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:224|Populated with extension: signature_algorithms javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 javax.net.ssl|WARNING|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:215|Ignore impact of unsupported extension: extended_master_secret javax.net.ssl|WARNING|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions javax.net.ssl|FINE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.781 CST|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.782 CST|X509Authentication.java:270|No X.509 cert selected for EC javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.782 CST|X509Authentication.java:270|No X.509 cert selected for EC javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for DSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for DSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for EC javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for EC javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.783 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for DSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for DSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for EC javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for EC javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for DSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for DSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.784 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.785 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.785 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.785 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.785 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|ALL|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.785 CST|X509Authentication.java:270|No X.509 cert selected for RSA javax.net.ssl|SEVERE|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.786 CST|TransportContext.java:347|Fatal (HANDSHAKE_FAILURE): no cipher suites in common ( "throwable" : { javax.net.ssl.SSLHandshakeException: no cipher suites in common at sun.security.ssl.Alert.createSSLException(Alert.java:131) at sun.security.ssl.Alert.createSSLException(Alert.java:117) at sun.security.ssl.TransportContext.fatal(TransportContext.java:342) at sun.security.ssl.TransportContext.fatal(TransportContext.java:298) at sun.security.ssl.TransportContext.fatal(TransportContext.java:289) at sun.security.ssl.ServerHello$T12ServerHelloProducer.chooseCipherSuite(ServerHello.java:461) at sun.security.ssl.ServerHello$T12ServerHelloProducer.produce(ServerHello.java:296) at sun.security.ssl.SSLHandshake.produce(SSLHandshake.java:421) at sun.security.ssl.ClientHello$T12ClientHelloConsumer.consume(ClientHello.java:1009) at sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:716) at sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:682) at sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:377) at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:444) at sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:981) at sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:968) at java.security.AccessController.doPrivileged(Native Method) at sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:915) at io.netty.handler.ssl.SslHandler.runAllDelegatedTasks(SslHandler.java:1508) at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1522) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1406) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1233) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1280) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:498) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:437) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:377) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:355) at io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:377) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:355) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:377) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:163) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.lang.Thread.run(Thread.java:750)} ) javax.net.ssl|WARNING|92|nioEventLoopGroup-3-1|2025-09-26 18:33:19.788 CST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data javax.net.ssl|FINE|91|nioEventLoopGroup-6-1|2025-09-26 18:33:19.789 CST|Alert.java:238|Received alert message ( "Alert": { "level" : "fatal", "description": "handshake_failure" } ) javax.net.ssl|SEVERE|91|nioEventLoopGroup-6-1|2025-09-26 18:33:19.789 CST|TransportContext.java:347|Fatal (HANDSHAKE_FAILURE): Received fatal alert: handshake_failure ( "throwable" : { javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure at sun.security.ssl.Alert.createSSLException(Alert.java:131) at sun.security.ssl.Alert.createSSLException(Alert.java:117) at sun.security.ssl.TransportContext.fatal(TransportContext.java:342) 2025-09-26 18:33:19.789 WARN 24016 --- [oxy-request-4-1] c.t.s.c.p.s.t.ProxyRequestHandler : javax.net.ssl.SSLHandshakeException: no cipher suites in common at sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) at sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) at sun.security.ssl.SSLTransport.decode(SSLTransport.java:156) at sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:588) at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:544) at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:411) at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:390) at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:629) at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:281) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1338) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1233) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1280) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:498) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:437) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:377) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:355) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:377) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:163) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.lang.Thread.run(Thread.java:750)} )
09-27
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值