You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by ma...@apache.org on 2013/01/14 09:44:07 UTC
svn commit: r1432839 - in /tomcat/trunk:
java/org/apache/tomcat/util/net/SSLUtil.java
java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
webapps/docs/config/http.xml
Author: markt
Date: Mon Jan 14 08:44:06 2013
New Revision: 1432839
URL: http://svn.apache.org/viewvc?rev=1432839&view=rev
Log:
Whitespace police
Fix Java 7 <> related warnings
Modified:
tomcat/trunk/java/org/apache/tomcat/util/net/SSLUtil.java
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
tomcat/trunk/webapps/docs/config/http.xml
Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SSLUtil.java
URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/SSLUtil.java?rev=1432839&r1=1432838&r2=1432839&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/SSLUtil.java (original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/SSLUtil.java Mon Jan 14 08:44:06 2013
@@ -40,11 +40,11 @@ public interface SSLUtil {
*
* @return Array of SSL cipher suites that may be enabled (which may be
* empty if none of the specified ciphers are supported), or
- * the defaults for the underlying SSL implementation if
+ * the defaults for the underlying SSL implementation if
* the endpoint configuration does not specify any ciphers.
*/
public String[] getEnableableCiphers(SSLContext context);
-
+
/**
* Determines the SSL protocol variants that can be enabled, based on the
* configuration of the endpoint and the ciphers supported by the SSL
@@ -54,7 +54,7 @@ public interface SSLUtil {
*
* @return Array of SSL protocol variants that may be enabled (which may be
* empty if none of the specified protocols are supported), or
- * the defaults for the underlying SSL implementation if
+ * the defaults for the underlying SSL implementation if
* the endpoint configuration does not specify any protocols.
*/
public String[] getEnableableProtocols(SSLContext context);
Modified: tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java?rev=1432839&r1=1432838&r2=1432839&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java (original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java Mon Jan 14 08:44:06 2013
@@ -214,7 +214,7 @@ public class JSSESocketFactory implement
return context.getDefaultSSLParameters().getCipherSuites();
}
- List<String> requestedCiphers = new ArrayList<String>();
+ List<String> requestedCiphers = new ArrayList<>();
for (String rc : requestedCiphersStr.split(",")) {
final String cipher = rc.trim();
if (cipher.length() > 0) {
@@ -224,7 +224,7 @@ public class JSSESocketFactory implement
if (requestedCiphers.isEmpty()) {
return context.getDefaultSSLParameters().getCipherSuites();
}
- List<String> ciphers = new ArrayList<String>(requestedCiphers);
+ List<String> ciphers = new ArrayList<>(requestedCiphers);
ciphers.retainAll(Arrays.asList(context.getSupportedSSLParameters()
.getCipherSuites()));
@@ -235,7 +235,7 @@ public class JSSESocketFactory implement
if (log.isDebugEnabled()) {
log.debug(sm.getString("jsse.enableable_ciphers", ciphers));
if (ciphers.size() != requestedCiphers.size()) {
- List<String> skipped = new ArrayList<String>(requestedCiphers);
+ List<String> skipped = new ArrayList<>(requestedCiphers);
skipped.removeAll(ciphers);
log.debug(sm.getString("jsse.unsupported_ciphers", skipped));
}
@@ -684,7 +684,7 @@ public class JSSESocketFactory implement
return context.getDefaultSSLParameters().getProtocols();
}
- List<String> protocols = new ArrayList<String>(
+ List<String> protocols = new ArrayList<>(
Arrays.asList(requestedProtocols));
protocols.retainAll(Arrays.asList(context.getSupportedSSLParameters()
.getProtocols()));
@@ -696,7 +696,7 @@ public class JSSESocketFactory implement
if (log.isDebugEnabled()) {
log.debug(sm.getString("jsse.enableable_protocols", protocols));
if (protocols.size() != requestedProtocols.length) {
- List<String> skipped = new ArrayList<String>(
+ List<String> skipped = new ArrayList<>(
Arrays.asList(requestedProtocols));
skipped.removeAll(protocols);
log.debug(sm.getString("jsse.unsupported_protocols", skipped));
@@ -729,7 +729,7 @@ public class JSSESocketFactory implement
socket.setEnabledCipherSuites(enabledCiphers);
socket.setEnabledProtocols(enabledProtocols);
-
+
// we don't know if client auth is needed -
// after parsing the request we may re-handshake
configureClientAuth(socket);
Modified: tomcat/trunk/webapps/docs/config/http.xml
URL: http://svn.apache.org/viewvc/tomcat/trunk/webapps/docs/config/http.xml?rev=1432839&r1=1432838&r2=1432839&view=diff
==============================================================================
--- tomcat/trunk/webapps/docs/config/http.xml (original)
+++ tomcat/trunk/webapps/docs/config/http.xml Mon Jan 14 08:44:06 2013
@@ -1024,7 +1024,7 @@
connections. If specified, only the protocols that are listed and
supported by the SSL implementation will be enabled. If not specified,
the JVM default is used. The permitted values may be obtained from the
- JVM documentation for the allowed values for
+ JVM documentation for the allowed values for
<code>SSLSocket.setEnabledProtocols()</code> e.g.
<a href="http://docs.oracle.com/javase/6/docs/technotes/guides/security/StandardNames.html#jssenames">
Oracle Java 6</a> and
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org
For additional commands, e-mail: dev-help@tomcat.apache.org