You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mina.apache.org by jo...@apache.org on 2021/08/02 03:40:56 UTC
[mina] 11/15: certs cleanup
This is an automated email from the ASF dual-hosted git repository.
johnnyv pushed a commit to branch bugfix/DIRMINA1132
in repository https://gitbox.apache.org/repos/asf/mina.git
commit 040b77c426fc7d4999862b27d90f29c667ef690b
Author: Jonathan Valliere <jo...@apache.org>
AuthorDate: Mon Jul 26 12:36:09 2021 -0400
certs cleanup
---
.../org/apache/mina/filter/ssl2/SSL2Handler.java | 7 +++++
.../org/apache/mina/filter/ssl2/SSL2HandlerG0.java | 31 +++++++++++++++------
.../apache/mina/filter/ssl2/SSL2SimpleTest.java | 12 ++++----
.../filter/ssl2/{keystore.sslTest => keystore.jks} | Bin
.../ssl2/{truststore.sslTest => truststore.jks} | Bin
5 files changed, 37 insertions(+), 13 deletions(-)
diff --git a/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2Handler.java b/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2Handler.java
index 3329b8e..cdf186e 100644
--- a/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2Handler.java
+++ b/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2Handler.java
@@ -67,6 +67,13 @@ public abstract class SSL2Handler {
*/
protected IoBuffer mReceiveBuffer;
+ /**
+ * Instantiates a new handler
+ *
+ * @param p engine
+ * @param e executor
+ * @param s session
+ */
public SSL2Handler(SSLEngine p, Executor e, IoSession s) {
this.mEngine = p;
this.mExecutor = e;
diff --git a/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2HandlerG0.java b/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2HandlerG0.java
index 8f4e8d6..bf2fd6d 100644
--- a/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2HandlerG0.java
+++ b/mina-core/src/main/java/org/apache/mina/filter/ssl2/SSL2HandlerG0.java
@@ -39,6 +39,13 @@ public class SSL2HandlerG0 extends SSL2Handler {
*/
protected boolean mHandshakeStarted = false;
+ /**
+ * Instantiates a new handler
+ *
+ * @param p engine
+ * @param e executor
+ * @param s session
+ */
public SSL2HandlerG0(SSLEngine p, Executor e, IoSession s) {
super(p, e, s);
}
@@ -95,12 +102,11 @@ public class SSL2HandlerG0 extends SSL2Handler {
/**
* Process a received message
*
- * @param message received data
- * @param session user session
- * @param next filter
+ * @param next
+ * @param message
+ *
* @throws SSLException
*/
- @SuppressWarnings("incomplete-switch")
protected void qreceive(final NextFilter next, final IoBuffer message) throws SSLException {
if (LOGGER.isDebugEnabled()) {
LOGGER.debug("{} qreceive() - source {}", toString(), message);
@@ -210,11 +216,12 @@ public class SSL2HandlerG0 extends SSL2Handler {
/**
* Attempts to encode the WriteRequest and write the data to the IoSession
*
- * @param request
- * @param session
* @param next
+ * @param request
+ *
* @return {@code true} if the WriteRequest was fully consumed; otherwise
* {@code false}
+ *
* @throws SSLException
*/
@SuppressWarnings("incomplete-switch")
@@ -237,11 +244,13 @@ public class SSL2HandlerG0 extends SSL2Handler {
dest.free();
} else {
if (result.bytesConsumed() == 0) {
+ // an handshaking message must have been produced
EncryptedWriteRequest encrypted = new EncryptedWriteRequest(dest, null);
if (LOGGER.isDebugEnabled()) {
LOGGER.debug("{} qwrite() - result {}", toString(), encrypted);
}
next.filterWrite(this.mSession, encrypted);
+ // do not return because we want to enter the handshake switch
} else {
// then we probably consumed some data
dest.flip();
@@ -266,6 +275,7 @@ public class SSL2HandlerG0 extends SSL2Handler {
next.filterWrite(this.mSession, encrypted);
return true;
}
+ // we return because there is not reason to enter the handshake switch
}
}
@@ -299,9 +309,10 @@ public class SSL2HandlerG0 extends SSL2Handler {
/**
* Attempts to generate a handshake message and write the data to the IoSession
*
- * @param session
* @param next
+ *
* @return {@code true} if a message was generated and written
+ *
* @throws SSLException
*/
synchronized protected boolean qwrite(NextFilter next) throws SSLException {
@@ -321,9 +332,12 @@ public class SSL2HandlerG0 extends SSL2Handler {
* If FAST_HANDSHAKE is enabled, this method will recursively loop in order to
* combine multiple messages into one buffer.
*
- * @param session
* @param next
+ * @param source
+ * @param dest
+ *
* @return {@code true} if a message was generated and written
+ *
* @throws SSLException
*/
@SuppressWarnings("incomplete-switch")
@@ -418,6 +432,7 @@ public class SSL2HandlerG0 extends SSL2Handler {
* Flushes the encode queue
*
* @param next
+ *
* @throws SSLException
*/
synchronized protected void lflush(final NextFilter next) throws SSLException {
diff --git a/mina-core/src/test/java/org/apache/mina/filter/ssl2/SSL2SimpleTest.java b/mina-core/src/test/java/org/apache/mina/filter/ssl2/SSL2SimpleTest.java
index 8896875..ce1a310 100644
--- a/mina-core/src/test/java/org/apache/mina/filter/ssl2/SSL2SimpleTest.java
+++ b/mina-core/src/test/java/org/apache/mina/filter/ssl2/SSL2SimpleTest.java
@@ -31,7 +31,7 @@ public class SSL2SimpleTest {
public static void main(String[] args) throws NoSuchAlgorithmException, KeyManagementException, KeyStoreException,
UnrecoverableKeyException, CertificateException, IOException {
- // System.setProperty("javax.net.debug", "all");
+ System.setProperty("javax.net.debug", "all");
KeyManagerFactory kmf = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
TrustManagerFactory tmf = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
@@ -39,13 +39,15 @@ public class SSL2SimpleTest {
KeyStore ks = KeyStore.getInstance("JKS");
KeyStore ts = KeyStore.getInstance("JKS");
- ks.load(SslDIRMINA937Test.class.getResourceAsStream("keystore.sslTest"), "password".toCharArray());
- ts.load(SslDIRMINA937Test.class.getResourceAsStream("truststore.sslTest"), "password".toCharArray());
+ final char[] password = "password".toCharArray();
- kmf.init(ks, "password".toCharArray());
+ ks.load(SSL2SimpleTest.class.getResourceAsStream("keystore.jks"), password);
+ ts.load(SSL2SimpleTest.class.getResourceAsStream("truststore.jks"), password);
+
+ kmf.init(ks, password);
tmf.init(ts);
- final SSLContext context = SSLContext.getInstance("TLS");
+ final SSLContext context = SSLContext.getInstance("TLSv1.3");
context.init(kmf.getKeyManagers(), tmf.getTrustManagers(), new SecureRandom());
final SSL2Filter filter = new SSL2Filter(context);
diff --git a/mina-core/src/test/resources/org/apache/mina/filter/ssl2/keystore.sslTest b/mina-core/src/test/resources/org/apache/mina/filter/ssl2/keystore.jks
similarity index 100%
rename from mina-core/src/test/resources/org/apache/mina/filter/ssl2/keystore.sslTest
rename to mina-core/src/test/resources/org/apache/mina/filter/ssl2/keystore.jks
diff --git a/mina-core/src/test/resources/org/apache/mina/filter/ssl2/truststore.sslTest b/mina-core/src/test/resources/org/apache/mina/filter/ssl2/truststore.jks
similarity index 100%
rename from mina-core/src/test/resources/org/apache/mina/filter/ssl2/truststore.sslTest
rename to mina-core/src/test/resources/org/apache/mina/filter/ssl2/truststore.jks