You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@activemq.apache.org by "Timothy Bish (JIRA)" <ji...@apache.org> on 2013/02/14 22:59:13 UTC
[jira] [Resolved] (AMQ-4321) NIO+SSL Connector corrupts stream when
data size exceeds SSL buffer size
[ https://issues.apache.org/jira/browse/AMQ-4321?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Timothy Bish resolved AMQ-4321.
-------------------------------
Resolution: Fixed
Fix Version/s: 5.9.0
Assignee: Timothy Bish
Fixed in trunk, thanks!
> NIO+SSL Connector corrupts stream when data size exceeds SSL buffer size
> ------------------------------------------------------------------------
>
> Key: AMQ-4321
> URL: https://issues.apache.org/jira/browse/AMQ-4321
> Project: ActiveMQ
> Issue Type: Bug
> Components: Transport
> Affects Versions: 5.6.0, 5.7.0, 5.8.0
> Environment: JDK 1.7.0_09, Windows 7 x64, Linux CentOS5 64-bit
> Reporter: Craig Condit
> Assignee: Timothy Bish
> Labels: nio, ssl, transport
> Fix For: 5.9.0
>
> Attachments: AMQ4321.patch, AMQ4321-UnitTest.patch
>
>
> When using the default enabledCipherSuites settings on Java 7, the NIO+SSL connector corrupts the SSL output stream when asked to flush a buffer larger than the SSL buffer size (approx. 16 KB). This is reproducible by sending a single BytesMessage >= 16KB to the broker and attempting to consume it.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira