http://git-wip-us.apache.org/repos/asf/hbase-site/blob/10a20a24/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.SaslUnwrapHandler.html
----------------------------------------------------------------------
diff --git 
a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.SaslUnwrapHandler.html
 
b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.SaslUnwrapHandler.html
index 40ef9f4..36b4e7f 100644
--- 
a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.SaslUnwrapHandler.html
+++ 
b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.SaslUnwrapHandler.html
@@ -375,455 +375,464 @@
 <span class="sourceLineNo">367</span><a name="line.367"></a>
 <span class="sourceLineNo">368</span>    private final Promise&lt;Void&gt; 
promise;<a name="line.368"></a>
 <span class="sourceLineNo">369</span><a name="line.369"></a>
-<span class="sourceLineNo">370</span>    private int step = 0;<a 
name="line.370"></a>
+<span class="sourceLineNo">370</span>    private final DFSClient dfsClient;<a 
name="line.370"></a>
 <span class="sourceLineNo">371</span><a name="line.371"></a>
-<span class="sourceLineNo">372</span>    public 
SaslNegotiateHandler(Configuration conf, String username, char[] password,<a 
name="line.372"></a>
-<span class="sourceLineNo">373</span>        Map&lt;String, String&gt; 
saslProps, int timeoutMs, Promise&lt;Void&gt; promise) throws SaslException {<a 
name="line.373"></a>
-<span class="sourceLineNo">374</span>      this.conf = conf;<a 
name="line.374"></a>
-<span class="sourceLineNo">375</span>      this.saslProps = saslProps;<a 
name="line.375"></a>
-<span class="sourceLineNo">376</span>      this.saslClient = 
Sasl.createSaslClient(new String[] { MECHANISM }, username, PROTOCOL,<a 
name="line.376"></a>
-<span class="sourceLineNo">377</span>        SERVER_NAME, saslProps, new 
SaslClientCallbackHandler(username, password));<a name="line.377"></a>
-<span class="sourceLineNo">378</span>      this.timeoutMs = timeoutMs;<a 
name="line.378"></a>
-<span class="sourceLineNo">379</span>      this.promise = promise;<a 
name="line.379"></a>
-<span class="sourceLineNo">380</span>    }<a name="line.380"></a>
-<span class="sourceLineNo">381</span><a name="line.381"></a>
-<span class="sourceLineNo">382</span>    private void 
sendSaslMessage(ChannelHandlerContext ctx, byte[] payload) throws IOException 
{<a name="line.382"></a>
-<span class="sourceLineNo">383</span>      sendSaslMessage(ctx, payload, 
null);<a name="line.383"></a>
+<span class="sourceLineNo">372</span>    private int step = 0;<a 
name="line.372"></a>
+<span class="sourceLineNo">373</span><a name="line.373"></a>
+<span class="sourceLineNo">374</span>    public 
SaslNegotiateHandler(Configuration conf, String username, char[] password,<a 
name="line.374"></a>
+<span class="sourceLineNo">375</span>        Map&lt;String, String&gt; 
saslProps, int timeoutMs, Promise&lt;Void&gt; promise,<a name="line.375"></a>
+<span class="sourceLineNo">376</span>        DFSClient dfsClient) throws 
SaslException {<a name="line.376"></a>
+<span class="sourceLineNo">377</span>      this.conf = conf;<a 
name="line.377"></a>
+<span class="sourceLineNo">378</span>      this.saslProps = saslProps;<a 
name="line.378"></a>
+<span class="sourceLineNo">379</span>      this.saslClient = 
Sasl.createSaslClient(new String[] { MECHANISM }, username, PROTOCOL,<a 
name="line.379"></a>
+<span class="sourceLineNo">380</span>        SERVER_NAME, saslProps, new 
SaslClientCallbackHandler(username, password));<a name="line.380"></a>
+<span class="sourceLineNo">381</span>      this.timeoutMs = timeoutMs;<a 
name="line.381"></a>
+<span class="sourceLineNo">382</span>      this.promise = promise;<a 
name="line.382"></a>
+<span class="sourceLineNo">383</span>      this.dfsClient = dfsClient;<a 
name="line.383"></a>
 <span class="sourceLineNo">384</span>    }<a name="line.384"></a>
 <span class="sourceLineNo">385</span><a name="line.385"></a>
-<span class="sourceLineNo">386</span>    private List&lt;CipherOption&gt; 
getCipherOptions() throws IOException {<a name="line.386"></a>
-<span class="sourceLineNo">387</span>      // Negotiate cipher suites if 
configured. Currently, the only supported<a name="line.387"></a>
-<span class="sourceLineNo">388</span>      // cipher suite is 
AES/CTR/NoPadding, but the protocol allows multiple<a name="line.388"></a>
-<span class="sourceLineNo">389</span>      // values for future expansion.<a 
name="line.389"></a>
-<span class="sourceLineNo">390</span>      String cipherSuites = 
conf.get(DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY);<a name="line.390"></a>
-<span class="sourceLineNo">391</span>      if 
(StringUtils.isBlank(cipherSuites)) {<a name="line.391"></a>
-<span class="sourceLineNo">392</span>        return null;<a 
name="line.392"></a>
-<span class="sourceLineNo">393</span>      }<a name="line.393"></a>
-<span class="sourceLineNo">394</span>      if 
(!cipherSuites.equals(CipherSuite.AES_CTR_NOPADDING.getName())) {<a 
name="line.394"></a>
-<span class="sourceLineNo">395</span>        throw new 
IOException(String.format("Invalid cipher suite, %s=%s",<a name="line.395"></a>
-<span class="sourceLineNo">396</span>          
DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY, cipherSuites));<a 
name="line.396"></a>
+<span class="sourceLineNo">386</span>    private void 
sendSaslMessage(ChannelHandlerContext ctx, byte[] payload) throws IOException 
{<a name="line.386"></a>
+<span class="sourceLineNo">387</span>      sendSaslMessage(ctx, payload, 
null);<a name="line.387"></a>
+<span class="sourceLineNo">388</span>    }<a name="line.388"></a>
+<span class="sourceLineNo">389</span><a name="line.389"></a>
+<span class="sourceLineNo">390</span>    private List&lt;CipherOption&gt; 
getCipherOptions() throws IOException {<a name="line.390"></a>
+<span class="sourceLineNo">391</span>      // Negotiate cipher suites if 
configured. Currently, the only supported<a name="line.391"></a>
+<span class="sourceLineNo">392</span>      // cipher suite is 
AES/CTR/NoPadding, but the protocol allows multiple<a name="line.392"></a>
+<span class="sourceLineNo">393</span>      // values for future expansion.<a 
name="line.393"></a>
+<span class="sourceLineNo">394</span>      String cipherSuites = 
conf.get(DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY);<a name="line.394"></a>
+<span class="sourceLineNo">395</span>      if 
(StringUtils.isBlank(cipherSuites)) {<a name="line.395"></a>
+<span class="sourceLineNo">396</span>        return null;<a 
name="line.396"></a>
 <span class="sourceLineNo">397</span>      }<a name="line.397"></a>
-<span class="sourceLineNo">398</span>      return 
Collections.singletonList(new CipherOption(CipherSuite.AES_CTR_NOPADDING));<a 
name="line.398"></a>
-<span class="sourceLineNo">399</span>    }<a name="line.399"></a>
-<span class="sourceLineNo">400</span><a name="line.400"></a>
-<span class="sourceLineNo">401</span>    private void 
sendSaslMessage(ChannelHandlerContext ctx, byte[] payload,<a 
name="line.401"></a>
-<span class="sourceLineNo">402</span>        List&lt;CipherOption&gt; options) 
throws IOException {<a name="line.402"></a>
-<span class="sourceLineNo">403</span>      
DataTransferEncryptorMessageProto.Builder builder =<a name="line.403"></a>
-<span class="sourceLineNo">404</span>          
DataTransferEncryptorMessageProto.newBuilder();<a name="line.404"></a>
-<span class="sourceLineNo">405</span>      
builder.setStatus(DataTransferEncryptorStatus.SUCCESS);<a name="line.405"></a>
-<span class="sourceLineNo">406</span>      if (payload != null) {<a 
name="line.406"></a>
-<span class="sourceLineNo">407</span>        // Was ByteStringer; fix w/o 
using ByteStringer. Its in hbase-protocol<a name="line.407"></a>
-<span class="sourceLineNo">408</span>        // and we want to keep that out 
of hbase-server.<a name="line.408"></a>
-<span class="sourceLineNo">409</span>        
builder.setPayload(ByteString.copyFrom(payload));<a name="line.409"></a>
-<span class="sourceLineNo">410</span>      }<a name="line.410"></a>
-<span class="sourceLineNo">411</span>      if (options != null) {<a 
name="line.411"></a>
-<span class="sourceLineNo">412</span>        
builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a 
name="line.412"></a>
-<span class="sourceLineNo">413</span>      }<a name="line.413"></a>
-<span class="sourceLineNo">414</span>      DataTransferEncryptorMessageProto 
proto = builder.build();<a name="line.414"></a>
-<span class="sourceLineNo">415</span>      int size = 
proto.getSerializedSize();<a name="line.415"></a>
-<span class="sourceLineNo">416</span>      size += 
CodedOutputStream.computeRawVarint32Size(size);<a name="line.416"></a>
-<span class="sourceLineNo">417</span>      ByteBuf buf = 
ctx.alloc().buffer(size);<a name="line.417"></a>
-<span class="sourceLineNo">418</span>      proto.writeDelimitedTo(new 
ByteBufOutputStream(buf));<a name="line.418"></a>
-<span class="sourceLineNo">419</span>      ctx.write(buf);<a 
name="line.419"></a>
-<span class="sourceLineNo">420</span>    }<a name="line.420"></a>
-<span class="sourceLineNo">421</span><a name="line.421"></a>
-<span class="sourceLineNo">422</span>    @Override<a name="line.422"></a>
-<span class="sourceLineNo">423</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.423"></a>
-<span class="sourceLineNo">424</span>      
ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a 
name="line.424"></a>
-<span class="sourceLineNo">425</span>      sendSaslMessage(ctx, new 
byte[0]);<a name="line.425"></a>
-<span class="sourceLineNo">426</span>      ctx.flush();<a name="line.426"></a>
-<span class="sourceLineNo">427</span>      step++;<a name="line.427"></a>
-<span class="sourceLineNo">428</span>    }<a name="line.428"></a>
-<span class="sourceLineNo">429</span><a name="line.429"></a>
-<span class="sourceLineNo">430</span>    @Override<a name="line.430"></a>
-<span class="sourceLineNo">431</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.431"></a>
-<span class="sourceLineNo">432</span>      saslClient.dispose();<a 
name="line.432"></a>
-<span class="sourceLineNo">433</span>    }<a name="line.433"></a>
-<span class="sourceLineNo">434</span><a name="line.434"></a>
-<span class="sourceLineNo">435</span>    private void 
check(DataTransferEncryptorMessageProto proto) throws IOException {<a 
name="line.435"></a>
-<span class="sourceLineNo">436</span>      if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.436"></a>
-<span class="sourceLineNo">437</span>        throw new 
InvalidEncryptionKeyException(proto.getMessage());<a name="line.437"></a>
-<span class="sourceLineNo">438</span>      } else if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR) {<a name="line.438"></a>
-<span class="sourceLineNo">439</span>        throw new 
IOException(proto.getMessage());<a name="line.439"></a>
-<span class="sourceLineNo">440</span>      }<a name="line.440"></a>
-<span class="sourceLineNo">441</span>    }<a name="line.441"></a>
-<span class="sourceLineNo">442</span><a name="line.442"></a>
-<span class="sourceLineNo">443</span>    private String getNegotiatedQop() {<a 
name="line.443"></a>
-<span class="sourceLineNo">444</span>      return (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.444"></a>
-<span class="sourceLineNo">445</span>    }<a name="line.445"></a>
-<span class="sourceLineNo">446</span><a name="line.446"></a>
-<span class="sourceLineNo">447</span>    private boolean 
isNegotiatedQopPrivacy() {<a name="line.447"></a>
-<span class="sourceLineNo">448</span>      String qop = getNegotiatedQop();<a 
name="line.448"></a>
-<span class="sourceLineNo">449</span>      return qop != null &amp;&amp; 
"auth-conf".equalsIgnoreCase(qop);<a name="line.449"></a>
+<span class="sourceLineNo">398</span>      if 
(!cipherSuites.equals(CipherSuite.AES_CTR_NOPADDING.getName())) {<a 
name="line.398"></a>
+<span class="sourceLineNo">399</span>        throw new 
IOException(String.format("Invalid cipher suite, %s=%s",<a name="line.399"></a>
+<span class="sourceLineNo">400</span>          
DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY, cipherSuites));<a 
name="line.400"></a>
+<span class="sourceLineNo">401</span>      }<a name="line.401"></a>
+<span class="sourceLineNo">402</span>      return 
Collections.singletonList(new CipherOption(CipherSuite.AES_CTR_NOPADDING));<a 
name="line.402"></a>
+<span class="sourceLineNo">403</span>    }<a name="line.403"></a>
+<span class="sourceLineNo">404</span><a name="line.404"></a>
+<span class="sourceLineNo">405</span>    private void 
sendSaslMessage(ChannelHandlerContext ctx, byte[] payload,<a 
name="line.405"></a>
+<span class="sourceLineNo">406</span>        List&lt;CipherOption&gt; options) 
throws IOException {<a name="line.406"></a>
+<span class="sourceLineNo">407</span>      
DataTransferEncryptorMessageProto.Builder builder =<a name="line.407"></a>
+<span class="sourceLineNo">408</span>          
DataTransferEncryptorMessageProto.newBuilder();<a name="line.408"></a>
+<span class="sourceLineNo">409</span>      
builder.setStatus(DataTransferEncryptorStatus.SUCCESS);<a name="line.409"></a>
+<span class="sourceLineNo">410</span>      if (payload != null) {<a 
name="line.410"></a>
+<span class="sourceLineNo">411</span>        // Was ByteStringer; fix w/o 
using ByteStringer. Its in hbase-protocol<a name="line.411"></a>
+<span class="sourceLineNo">412</span>        // and we want to keep that out 
of hbase-server.<a name="line.412"></a>
+<span class="sourceLineNo">413</span>        
builder.setPayload(ByteString.copyFrom(payload));<a name="line.413"></a>
+<span class="sourceLineNo">414</span>      }<a name="line.414"></a>
+<span class="sourceLineNo">415</span>      if (options != null) {<a 
name="line.415"></a>
+<span class="sourceLineNo">416</span>        
builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a 
name="line.416"></a>
+<span class="sourceLineNo">417</span>      }<a name="line.417"></a>
+<span class="sourceLineNo">418</span>      DataTransferEncryptorMessageProto 
proto = builder.build();<a name="line.418"></a>
+<span class="sourceLineNo">419</span>      int size = 
proto.getSerializedSize();<a name="line.419"></a>
+<span class="sourceLineNo">420</span>      size += 
CodedOutputStream.computeRawVarint32Size(size);<a name="line.420"></a>
+<span class="sourceLineNo">421</span>      ByteBuf buf = 
ctx.alloc().buffer(size);<a name="line.421"></a>
+<span class="sourceLineNo">422</span>      proto.writeDelimitedTo(new 
ByteBufOutputStream(buf));<a name="line.422"></a>
+<span class="sourceLineNo">423</span>      ctx.write(buf);<a 
name="line.423"></a>
+<span class="sourceLineNo">424</span>    }<a name="line.424"></a>
+<span class="sourceLineNo">425</span><a name="line.425"></a>
+<span class="sourceLineNo">426</span>    @Override<a name="line.426"></a>
+<span class="sourceLineNo">427</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.427"></a>
+<span class="sourceLineNo">428</span>      
ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a 
name="line.428"></a>
+<span class="sourceLineNo">429</span>      sendSaslMessage(ctx, new 
byte[0]);<a name="line.429"></a>
+<span class="sourceLineNo">430</span>      ctx.flush();<a name="line.430"></a>
+<span class="sourceLineNo">431</span>      step++;<a name="line.431"></a>
+<span class="sourceLineNo">432</span>    }<a name="line.432"></a>
+<span class="sourceLineNo">433</span><a name="line.433"></a>
+<span class="sourceLineNo">434</span>    @Override<a name="line.434"></a>
+<span class="sourceLineNo">435</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.435"></a>
+<span class="sourceLineNo">436</span>      saslClient.dispose();<a 
name="line.436"></a>
+<span class="sourceLineNo">437</span>    }<a name="line.437"></a>
+<span class="sourceLineNo">438</span><a name="line.438"></a>
+<span class="sourceLineNo">439</span>    private void 
check(DataTransferEncryptorMessageProto proto) throws IOException {<a 
name="line.439"></a>
+<span class="sourceLineNo">440</span>      if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.440"></a>
+<span class="sourceLineNo">441</span>        
dfsClient.clearDataEncryptionKey();<a name="line.441"></a>
+<span class="sourceLineNo">442</span>        throw new 
InvalidEncryptionKeyException(proto.getMessage());<a name="line.442"></a>
+<span class="sourceLineNo">443</span>      } else if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR) {<a name="line.443"></a>
+<span class="sourceLineNo">444</span>        throw new 
IOException(proto.getMessage());<a name="line.444"></a>
+<span class="sourceLineNo">445</span>      }<a name="line.445"></a>
+<span class="sourceLineNo">446</span>    }<a name="line.446"></a>
+<span class="sourceLineNo">447</span><a name="line.447"></a>
+<span class="sourceLineNo">448</span>    private String getNegotiatedQop() {<a 
name="line.448"></a>
+<span class="sourceLineNo">449</span>      return (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.449"></a>
 <span class="sourceLineNo">450</span>    }<a name="line.450"></a>
 <span class="sourceLineNo">451</span><a name="line.451"></a>
-<span class="sourceLineNo">452</span>    private boolean 
requestedQopContainsPrivacy() {<a name="line.452"></a>
-<span class="sourceLineNo">453</span>      Set&lt;String&gt; requestedQop =<a 
name="line.453"></a>
-<span class="sourceLineNo">454</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.454"></a>
-<span class="sourceLineNo">455</span>      return 
requestedQop.contains("auth-conf");<a name="line.455"></a>
-<span class="sourceLineNo">456</span>    }<a name="line.456"></a>
-<span class="sourceLineNo">457</span><a name="line.457"></a>
-<span class="sourceLineNo">458</span>    private void checkSaslComplete() 
throws IOException {<a name="line.458"></a>
-<span class="sourceLineNo">459</span>      if (!saslClient.isComplete()) {<a 
name="line.459"></a>
-<span class="sourceLineNo">460</span>        throw new IOException("Failed to 
complete SASL handshake");<a name="line.460"></a>
-<span class="sourceLineNo">461</span>      }<a name="line.461"></a>
-<span class="sourceLineNo">462</span>      Set&lt;String&gt; requestedQop =<a 
name="line.462"></a>
-<span class="sourceLineNo">463</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.463"></a>
-<span class="sourceLineNo">464</span>      String negotiatedQop = 
getNegotiatedQop();<a name="line.464"></a>
-<span class="sourceLineNo">465</span>      LOG.debug(<a name="line.465"></a>
-<span class="sourceLineNo">466</span>        "Verifying QOP, requested QOP = " 
+ requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.466"></a>
-<span class="sourceLineNo">467</span>      if 
(!requestedQop.contains(negotiatedQop)) {<a name="line.467"></a>
-<span class="sourceLineNo">468</span>        throw new 
IOException(String.format("SASL handshake completed, but "<a 
name="line.468"></a>
-<span class="sourceLineNo">469</span>            + "channel does not have 
acceptable quality of protection, "<a name="line.469"></a>
-<span class="sourceLineNo">470</span>            + "requested = %s, negotiated 
= %s",<a name="line.470"></a>
-<span class="sourceLineNo">471</span>          requestedQop, 
negotiatedQop));<a name="line.471"></a>
-<span class="sourceLineNo">472</span>      }<a name="line.472"></a>
-<span class="sourceLineNo">473</span>    }<a name="line.473"></a>
-<span class="sourceLineNo">474</span><a name="line.474"></a>
-<span class="sourceLineNo">475</span>    private boolean useWrap() {<a 
name="line.475"></a>
-<span class="sourceLineNo">476</span>      String qop = (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.476"></a>
-<span class="sourceLineNo">477</span>      return qop != null &amp;&amp; 
!"auth".equalsIgnoreCase(qop);<a name="line.477"></a>
+<span class="sourceLineNo">452</span>    private boolean 
isNegotiatedQopPrivacy() {<a name="line.452"></a>
+<span class="sourceLineNo">453</span>      String qop = getNegotiatedQop();<a 
name="line.453"></a>
+<span class="sourceLineNo">454</span>      return qop != null &amp;&amp; 
"auth-conf".equalsIgnoreCase(qop);<a name="line.454"></a>
+<span class="sourceLineNo">455</span>    }<a name="line.455"></a>
+<span class="sourceLineNo">456</span><a name="line.456"></a>
+<span class="sourceLineNo">457</span>    private boolean 
requestedQopContainsPrivacy() {<a name="line.457"></a>
+<span class="sourceLineNo">458</span>      Set&lt;String&gt; requestedQop =<a 
name="line.458"></a>
+<span class="sourceLineNo">459</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.459"></a>
+<span class="sourceLineNo">460</span>      return 
requestedQop.contains("auth-conf");<a name="line.460"></a>
+<span class="sourceLineNo">461</span>    }<a name="line.461"></a>
+<span class="sourceLineNo">462</span><a name="line.462"></a>
+<span class="sourceLineNo">463</span>    private void checkSaslComplete() 
throws IOException {<a name="line.463"></a>
+<span class="sourceLineNo">464</span>      if (!saslClient.isComplete()) {<a 
name="line.464"></a>
+<span class="sourceLineNo">465</span>        throw new IOException("Failed to 
complete SASL handshake");<a name="line.465"></a>
+<span class="sourceLineNo">466</span>      }<a name="line.466"></a>
+<span class="sourceLineNo">467</span>      Set&lt;String&gt; requestedQop =<a 
name="line.467"></a>
+<span class="sourceLineNo">468</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.468"></a>
+<span class="sourceLineNo">469</span>      String negotiatedQop = 
getNegotiatedQop();<a name="line.469"></a>
+<span class="sourceLineNo">470</span>      LOG.debug(<a name="line.470"></a>
+<span class="sourceLineNo">471</span>        "Verifying QOP, requested QOP = " 
+ requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.471"></a>
+<span class="sourceLineNo">472</span>      if 
(!requestedQop.contains(negotiatedQop)) {<a name="line.472"></a>
+<span class="sourceLineNo">473</span>        throw new 
IOException(String.format("SASL handshake completed, but "<a 
name="line.473"></a>
+<span class="sourceLineNo">474</span>            + "channel does not have 
acceptable quality of protection, "<a name="line.474"></a>
+<span class="sourceLineNo">475</span>            + "requested = %s, negotiated 
= %s",<a name="line.475"></a>
+<span class="sourceLineNo">476</span>          requestedQop, 
negotiatedQop));<a name="line.476"></a>
+<span class="sourceLineNo">477</span>      }<a name="line.477"></a>
 <span class="sourceLineNo">478</span>    }<a name="line.478"></a>
 <span class="sourceLineNo">479</span><a name="line.479"></a>
-<span class="sourceLineNo">480</span>    private CipherOption 
unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a 
name="line.480"></a>
-<span class="sourceLineNo">481</span>      byte[] inKey = option.getInKey();<a 
name="line.481"></a>
-<span class="sourceLineNo">482</span>      if (inKey != null) {<a 
name="line.482"></a>
-<span class="sourceLineNo">483</span>        inKey = saslClient.unwrap(inKey, 
0, inKey.length);<a name="line.483"></a>
-<span class="sourceLineNo">484</span>      }<a name="line.484"></a>
-<span class="sourceLineNo">485</span>      byte[] outKey = 
option.getOutKey();<a name="line.485"></a>
-<span class="sourceLineNo">486</span>      if (outKey != null) {<a 
name="line.486"></a>
-<span class="sourceLineNo">487</span>        outKey = 
saslClient.unwrap(outKey, 0, outKey.length);<a name="line.487"></a>
-<span class="sourceLineNo">488</span>      }<a name="line.488"></a>
-<span class="sourceLineNo">489</span>      return new 
CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a 
name="line.489"></a>
-<span class="sourceLineNo">490</span>          option.getOutIv());<a 
name="line.490"></a>
-<span class="sourceLineNo">491</span>    }<a name="line.491"></a>
-<span class="sourceLineNo">492</span><a name="line.492"></a>
-<span class="sourceLineNo">493</span>    private CipherOption 
getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.493"></a>
-<span class="sourceLineNo">494</span>        boolean isNegotiatedQopPrivacy, 
SaslClient saslClient) throws IOException {<a name="line.494"></a>
-<span class="sourceLineNo">495</span>      List&lt;CipherOption&gt; 
cipherOptions =<a name="line.495"></a>
-<span class="sourceLineNo">496</span>          
PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a 
name="line.496"></a>
-<span class="sourceLineNo">497</span>      if (cipherOptions == null || 
cipherOptions.isEmpty()) {<a name="line.497"></a>
-<span class="sourceLineNo">498</span>        return null;<a 
name="line.498"></a>
-<span class="sourceLineNo">499</span>      }<a name="line.499"></a>
-<span class="sourceLineNo">500</span>      CipherOption cipherOption = 
cipherOptions.get(0);<a name="line.500"></a>
-<span class="sourceLineNo">501</span>      return isNegotiatedQopPrivacy ? 
unwrap(cipherOption, saslClient) : cipherOption;<a name="line.501"></a>
-<span class="sourceLineNo">502</span>    }<a name="line.502"></a>
-<span class="sourceLineNo">503</span><a name="line.503"></a>
-<span class="sourceLineNo">504</span>    @Override<a name="line.504"></a>
-<span class="sourceLineNo">505</span>    public void 
channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a 
name="line.505"></a>
-<span class="sourceLineNo">506</span>      if (msg instanceof 
DataTransferEncryptorMessageProto) {<a name="line.506"></a>
-<span class="sourceLineNo">507</span>        DataTransferEncryptorMessageProto 
proto = (DataTransferEncryptorMessageProto) msg;<a name="line.507"></a>
-<span class="sourceLineNo">508</span>        check(proto);<a 
name="line.508"></a>
-<span class="sourceLineNo">509</span>        byte[] challenge = 
proto.getPayload().toByteArray();<a name="line.509"></a>
-<span class="sourceLineNo">510</span>        byte[] response = 
saslClient.evaluateChallenge(challenge);<a name="line.510"></a>
-<span class="sourceLineNo">511</span>        switch (step) {<a 
name="line.511"></a>
-<span class="sourceLineNo">512</span>          case 1: {<a name="line.512"></a>
-<span class="sourceLineNo">513</span>            List&lt;CipherOption&gt; 
cipherOptions = null;<a name="line.513"></a>
-<span class="sourceLineNo">514</span>            if 
(requestedQopContainsPrivacy()) {<a name="line.514"></a>
-<span class="sourceLineNo">515</span>              cipherOptions = 
getCipherOptions();<a name="line.515"></a>
-<span class="sourceLineNo">516</span>            }<a name="line.516"></a>
-<span class="sourceLineNo">517</span>            sendSaslMessage(ctx, 
response, cipherOptions);<a name="line.517"></a>
-<span class="sourceLineNo">518</span>            ctx.flush();<a 
name="line.518"></a>
-<span class="sourceLineNo">519</span>            step++;<a name="line.519"></a>
-<span class="sourceLineNo">520</span>            break;<a name="line.520"></a>
-<span class="sourceLineNo">521</span>          }<a name="line.521"></a>
-<span class="sourceLineNo">522</span>          case 2: {<a name="line.522"></a>
-<span class="sourceLineNo">523</span>            assert response == null;<a 
name="line.523"></a>
-<span class="sourceLineNo">524</span>            checkSaslComplete();<a 
name="line.524"></a>
-<span class="sourceLineNo">525</span>            CipherOption cipherOption =<a 
name="line.525"></a>
-<span class="sourceLineNo">526</span>                getCipherOption(proto, 
isNegotiatedQopPrivacy(), saslClient);<a name="line.526"></a>
-<span class="sourceLineNo">527</span>            ChannelPipeline p = 
ctx.pipeline();<a name="line.527"></a>
-<span class="sourceLineNo">528</span>            while (p.first() != null) {<a 
name="line.528"></a>
-<span class="sourceLineNo">529</span>              p.removeFirst();<a 
name="line.529"></a>
-<span class="sourceLineNo">530</span>            }<a name="line.530"></a>
-<span class="sourceLineNo">531</span>            if (cipherOption != null) {<a 
name="line.531"></a>
-<span class="sourceLineNo">532</span>              CryptoCodec codec = 
CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a 
name="line.532"></a>
-<span class="sourceLineNo">533</span>              p.addLast(new 
EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a 
name="line.533"></a>
-<span class="sourceLineNo">534</span>                new DecryptHandler(codec, 
cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.534"></a>
-<span class="sourceLineNo">535</span>            } else {<a 
name="line.535"></a>
-<span class="sourceLineNo">536</span>              if (useWrap()) {<a 
name="line.536"></a>
-<span class="sourceLineNo">537</span>                p.addLast(new 
SaslWrapHandler(saslClient),<a name="line.537"></a>
-<span class="sourceLineNo">538</span>                  new 
LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.538"></a>
-<span class="sourceLineNo">539</span>                  new 
SaslUnwrapHandler(saslClient));<a name="line.539"></a>
-<span class="sourceLineNo">540</span>              }<a name="line.540"></a>
-<span class="sourceLineNo">541</span>            }<a name="line.541"></a>
-<span class="sourceLineNo">542</span>            promise.trySuccess(null);<a 
name="line.542"></a>
-<span class="sourceLineNo">543</span>            break;<a name="line.543"></a>
-<span class="sourceLineNo">544</span>          }<a name="line.544"></a>
-<span class="sourceLineNo">545</span>          default:<a name="line.545"></a>
-<span class="sourceLineNo">546</span>            throw new 
IllegalArgumentException("Unrecognized negotiation step: " + step);<a 
name="line.546"></a>
-<span class="sourceLineNo">547</span>        }<a name="line.547"></a>
-<span class="sourceLineNo">548</span>      } else {<a name="line.548"></a>
-<span class="sourceLineNo">549</span>        ctx.fireChannelRead(msg);<a 
name="line.549"></a>
-<span class="sourceLineNo">550</span>      }<a name="line.550"></a>
-<span class="sourceLineNo">551</span>    }<a name="line.551"></a>
-<span class="sourceLineNo">552</span><a name="line.552"></a>
-<span class="sourceLineNo">553</span>    @Override<a name="line.553"></a>
-<span class="sourceLineNo">554</span>    public void 
exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception 
{<a name="line.554"></a>
-<span class="sourceLineNo">555</span>      promise.tryFailure(cause);<a 
name="line.555"></a>
+<span class="sourceLineNo">480</span>    private boolean useWrap() {<a 
name="line.480"></a>
+<span class="sourceLineNo">481</span>      String qop = (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.481"></a>
+<span class="sourceLineNo">482</span>      return qop != null &amp;&amp; 
!"auth".equalsIgnoreCase(qop);<a name="line.482"></a>
+<span class="sourceLineNo">483</span>    }<a name="line.483"></a>
+<span class="sourceLineNo">484</span><a name="line.484"></a>
+<span class="sourceLineNo">485</span>    private CipherOption 
unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a 
name="line.485"></a>
+<span class="sourceLineNo">486</span>      byte[] inKey = option.getInKey();<a 
name="line.486"></a>
+<span class="sourceLineNo">487</span>      if (inKey != null) {<a 
name="line.487"></a>
+<span class="sourceLineNo">488</span>        inKey = saslClient.unwrap(inKey, 
0, inKey.length);<a name="line.488"></a>
+<span class="sourceLineNo">489</span>      }<a name="line.489"></a>
+<span class="sourceLineNo">490</span>      byte[] outKey = 
option.getOutKey();<a name="line.490"></a>
+<span class="sourceLineNo">491</span>      if (outKey != null) {<a 
name="line.491"></a>
+<span class="sourceLineNo">492</span>        outKey = 
saslClient.unwrap(outKey, 0, outKey.length);<a name="line.492"></a>
+<span class="sourceLineNo">493</span>      }<a name="line.493"></a>
+<span class="sourceLineNo">494</span>      return new 
CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a 
name="line.494"></a>
+<span class="sourceLineNo">495</span>          option.getOutIv());<a 
name="line.495"></a>
+<span class="sourceLineNo">496</span>    }<a name="line.496"></a>
+<span class="sourceLineNo">497</span><a name="line.497"></a>
+<span class="sourceLineNo">498</span>    private CipherOption 
getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.498"></a>
+<span class="sourceLineNo">499</span>        boolean isNegotiatedQopPrivacy, 
SaslClient saslClient) throws IOException {<a name="line.499"></a>
+<span class="sourceLineNo">500</span>      List&lt;CipherOption&gt; 
cipherOptions =<a name="line.500"></a>
+<span class="sourceLineNo">501</span>          
PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a 
name="line.501"></a>
+<span class="sourceLineNo">502</span>      if (cipherOptions == null || 
cipherOptions.isEmpty()) {<a name="line.502"></a>
+<span class="sourceLineNo">503</span>        return null;<a 
name="line.503"></a>
+<span class="sourceLineNo">504</span>      }<a name="line.504"></a>
+<span class="sourceLineNo">505</span>      CipherOption cipherOption = 
cipherOptions.get(0);<a name="line.505"></a>
+<span class="sourceLineNo">506</span>      return isNegotiatedQopPrivacy ? 
unwrap(cipherOption, saslClient) : cipherOption;<a name="line.506"></a>
+<span class="sourceLineNo">507</span>    }<a name="line.507"></a>
+<span class="sourceLineNo">508</span><a name="line.508"></a>
+<span class="sourceLineNo">509</span>    @Override<a name="line.509"></a>
+<span class="sourceLineNo">510</span>    public void 
channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a 
name="line.510"></a>
+<span class="sourceLineNo">511</span>      if (msg instanceof 
DataTransferEncryptorMessageProto) {<a name="line.511"></a>
+<span class="sourceLineNo">512</span>        DataTransferEncryptorMessageProto 
proto = (DataTransferEncryptorMessageProto) msg;<a name="line.512"></a>
+<span class="sourceLineNo">513</span>        check(proto);<a 
name="line.513"></a>
+<span class="sourceLineNo">514</span>        byte[] challenge = 
proto.getPayload().toByteArray();<a name="line.514"></a>
+<span class="sourceLineNo">515</span>        byte[] response = 
saslClient.evaluateChallenge(challenge);<a name="line.515"></a>
+<span class="sourceLineNo">516</span>        switch (step) {<a 
name="line.516"></a>
+<span class="sourceLineNo">517</span>          case 1: {<a name="line.517"></a>
+<span class="sourceLineNo">518</span>            List&lt;CipherOption&gt; 
cipherOptions = null;<a name="line.518"></a>
+<span class="sourceLineNo">519</span>            if 
(requestedQopContainsPrivacy()) {<a name="line.519"></a>
+<span class="sourceLineNo">520</span>              cipherOptions = 
getCipherOptions();<a name="line.520"></a>
+<span class="sourceLineNo">521</span>            }<a name="line.521"></a>
+<span class="sourceLineNo">522</span>            sendSaslMessage(ctx, 
response, cipherOptions);<a name="line.522"></a>
+<span class="sourceLineNo">523</span>            ctx.flush();<a 
name="line.523"></a>
+<span class="sourceLineNo">524</span>            step++;<a name="line.524"></a>
+<span class="sourceLineNo">525</span>            break;<a name="line.525"></a>
+<span class="sourceLineNo">526</span>          }<a name="line.526"></a>
+<span class="sourceLineNo">527</span>          case 2: {<a name="line.527"></a>
+<span class="sourceLineNo">528</span>            assert response == null;<a 
name="line.528"></a>
+<span class="sourceLineNo">529</span>            checkSaslComplete();<a 
name="line.529"></a>
+<span class="sourceLineNo">530</span>            CipherOption cipherOption =<a 
name="line.530"></a>
+<span class="sourceLineNo">531</span>                getCipherOption(proto, 
isNegotiatedQopPrivacy(), saslClient);<a name="line.531"></a>
+<span class="sourceLineNo">532</span>            ChannelPipeline p = 
ctx.pipeline();<a name="line.532"></a>
+<span class="sourceLineNo">533</span>            while (p.first() != null) {<a 
name="line.533"></a>
+<span class="sourceLineNo">534</span>              p.removeFirst();<a 
name="line.534"></a>
+<span class="sourceLineNo">535</span>            }<a name="line.535"></a>
+<span class="sourceLineNo">536</span>            if (cipherOption != null) {<a 
name="line.536"></a>
+<span class="sourceLineNo">537</span>              CryptoCodec codec = 
CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a 
name="line.537"></a>
+<span class="sourceLineNo">538</span>              p.addLast(new 
EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a 
name="line.538"></a>
+<span class="sourceLineNo">539</span>                new DecryptHandler(codec, 
cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.539"></a>
+<span class="sourceLineNo">540</span>            } else {<a 
name="line.540"></a>
+<span class="sourceLineNo">541</span>              if (useWrap()) {<a 
name="line.541"></a>
+<span class="sourceLineNo">542</span>                p.addLast(new 
SaslWrapHandler(saslClient),<a name="line.542"></a>
+<span class="sourceLineNo">543</span>                  new 
LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.543"></a>
+<span class="sourceLineNo">544</span>                  new 
SaslUnwrapHandler(saslClient));<a name="line.544"></a>
+<span class="sourceLineNo">545</span>              }<a name="line.545"></a>
+<span class="sourceLineNo">546</span>            }<a name="line.546"></a>
+<span class="sourceLineNo">547</span>            promise.trySuccess(null);<a 
name="line.547"></a>
+<span class="sourceLineNo">548</span>            break;<a name="line.548"></a>
+<span class="sourceLineNo">549</span>          }<a name="line.549"></a>
+<span class="sourceLineNo">550</span>          default:<a name="line.550"></a>
+<span class="sourceLineNo">551</span>            throw new 
IllegalArgumentException("Unrecognized negotiation step: " + step);<a 
name="line.551"></a>
+<span class="sourceLineNo">552</span>        }<a name="line.552"></a>
+<span class="sourceLineNo">553</span>      } else {<a name="line.553"></a>
+<span class="sourceLineNo">554</span>        ctx.fireChannelRead(msg);<a 
name="line.554"></a>
+<span class="sourceLineNo">555</span>      }<a name="line.555"></a>
 <span class="sourceLineNo">556</span>    }<a name="line.556"></a>
 <span class="sourceLineNo">557</span><a name="line.557"></a>
 <span class="sourceLineNo">558</span>    @Override<a name="line.558"></a>
-<span class="sourceLineNo">559</span>    public void 
userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a 
name="line.559"></a>
-<span class="sourceLineNo">560</span>      if (evt instanceof IdleStateEvent 
&amp;&amp; ((IdleStateEvent) evt).state() == READER_IDLE) {<a 
name="line.560"></a>
-<span class="sourceLineNo">561</span>        promise.tryFailure(new 
IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a 
name="line.561"></a>
-<span class="sourceLineNo">562</span>      } else {<a name="line.562"></a>
-<span class="sourceLineNo">563</span>        super.userEventTriggered(ctx, 
evt);<a name="line.563"></a>
-<span class="sourceLineNo">564</span>      }<a name="line.564"></a>
-<span class="sourceLineNo">565</span>    }<a name="line.565"></a>
-<span class="sourceLineNo">566</span>  }<a name="line.566"></a>
-<span class="sourceLineNo">567</span><a name="line.567"></a>
-<span class="sourceLineNo">568</span>  private static final class 
SaslUnwrapHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.568"></a>
-<span class="sourceLineNo">569</span><a name="line.569"></a>
-<span class="sourceLineNo">570</span>    private final SaslClient 
saslClient;<a name="line.570"></a>
-<span class="sourceLineNo">571</span><a name="line.571"></a>
-<span class="sourceLineNo">572</span>    public SaslUnwrapHandler(SaslClient 
saslClient) {<a name="line.572"></a>
-<span class="sourceLineNo">573</span>      this.saslClient = saslClient;<a 
name="line.573"></a>
-<span class="sourceLineNo">574</span>    }<a name="line.574"></a>
-<span class="sourceLineNo">575</span><a name="line.575"></a>
-<span class="sourceLineNo">576</span>    @Override<a name="line.576"></a>
-<span class="sourceLineNo">577</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.577"></a>
-<span class="sourceLineNo">578</span>      saslClient.dispose();<a 
name="line.578"></a>
+<span class="sourceLineNo">559</span>    public void 
exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception 
{<a name="line.559"></a>
+<span class="sourceLineNo">560</span>      promise.tryFailure(cause);<a 
name="line.560"></a>
+<span class="sourceLineNo">561</span>    }<a name="line.561"></a>
+<span class="sourceLineNo">562</span><a name="line.562"></a>
+<span class="sourceLineNo">563</span>    @Override<a name="line.563"></a>
+<span class="sourceLineNo">564</span>    public void 
userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a 
name="line.564"></a>
+<span class="sourceLineNo">565</span>      if (evt instanceof IdleStateEvent 
&amp;&amp; ((IdleStateEvent) evt).state() == READER_IDLE) {<a 
name="line.565"></a>
+<span class="sourceLineNo">566</span>        promise.tryFailure(new 
IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a 
name="line.566"></a>
+<span class="sourceLineNo">567</span>      } else {<a name="line.567"></a>
+<span class="sourceLineNo">568</span>        super.userEventTriggered(ctx, 
evt);<a name="line.568"></a>
+<span class="sourceLineNo">569</span>      }<a name="line.569"></a>
+<span class="sourceLineNo">570</span>    }<a name="line.570"></a>
+<span class="sourceLineNo">571</span>  }<a name="line.571"></a>
+<span class="sourceLineNo">572</span><a name="line.572"></a>
+<span class="sourceLineNo">573</span>  private static final class 
SaslUnwrapHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.573"></a>
+<span class="sourceLineNo">574</span><a name="line.574"></a>
+<span class="sourceLineNo">575</span>    private final SaslClient 
saslClient;<a name="line.575"></a>
+<span class="sourceLineNo">576</span><a name="line.576"></a>
+<span class="sourceLineNo">577</span>    public SaslUnwrapHandler(SaslClient 
saslClient) {<a name="line.577"></a>
+<span class="sourceLineNo">578</span>      this.saslClient = saslClient;<a 
name="line.578"></a>
 <span class="sourceLineNo">579</span>    }<a name="line.579"></a>
 <span class="sourceLineNo">580</span><a name="line.580"></a>
 <span class="sourceLineNo">581</span>    @Override<a name="line.581"></a>
-<span class="sourceLineNo">582</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.582"></a>
-<span class="sourceLineNo">583</span>      msg.skipBytes(4);<a 
name="line.583"></a>
-<span class="sourceLineNo">584</span>      byte[] b = new 
byte[msg.readableBytes()];<a name="line.584"></a>
-<span class="sourceLineNo">585</span>      msg.readBytes(b);<a 
name="line.585"></a>
-<span class="sourceLineNo">586</span>      
ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, 
b.length)));<a name="line.586"></a>
-<span class="sourceLineNo">587</span>    }<a name="line.587"></a>
-<span class="sourceLineNo">588</span>  }<a name="line.588"></a>
-<span class="sourceLineNo">589</span><a name="line.589"></a>
-<span class="sourceLineNo">590</span>  private static final class 
SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.590"></a>
-<span class="sourceLineNo">591</span><a name="line.591"></a>
-<span class="sourceLineNo">592</span>    private final SaslClient 
saslClient;<a name="line.592"></a>
-<span class="sourceLineNo">593</span><a name="line.593"></a>
-<span class="sourceLineNo">594</span>    private CompositeByteBuf cBuf;<a 
name="line.594"></a>
-<span class="sourceLineNo">595</span><a name="line.595"></a>
-<span class="sourceLineNo">596</span>    public SaslWrapHandler(SaslClient 
saslClient) {<a name="line.596"></a>
-<span class="sourceLineNo">597</span>      this.saslClient = saslClient;<a 
name="line.597"></a>
-<span class="sourceLineNo">598</span>    }<a name="line.598"></a>
-<span class="sourceLineNo">599</span><a name="line.599"></a>
-<span class="sourceLineNo">600</span>    @Override<a name="line.600"></a>
-<span class="sourceLineNo">601</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.601"></a>
-<span class="sourceLineNo">602</span>      cBuf = new 
CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.602"></a>
+<span class="sourceLineNo">582</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.582"></a>
+<span class="sourceLineNo">583</span>      saslClient.dispose();<a 
name="line.583"></a>
+<span class="sourceLineNo">584</span>    }<a name="line.584"></a>
+<span class="sourceLineNo">585</span><a name="line.585"></a>
+<span class="sourceLineNo">586</span>    @Override<a name="line.586"></a>
+<span class="sourceLineNo">587</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.587"></a>
+<span class="sourceLineNo">588</span>      msg.skipBytes(4);<a 
name="line.588"></a>
+<span class="sourceLineNo">589</span>      byte[] b = new 
byte[msg.readableBytes()];<a name="line.589"></a>
+<span class="sourceLineNo">590</span>      msg.readBytes(b);<a 
name="line.590"></a>
+<span class="sourceLineNo">591</span>      
ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, 
b.length)));<a name="line.591"></a>
+<span class="sourceLineNo">592</span>    }<a name="line.592"></a>
+<span class="sourceLineNo">593</span>  }<a name="line.593"></a>
+<span class="sourceLineNo">594</span><a name="line.594"></a>
+<span class="sourceLineNo">595</span>  private static final class 
SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.595"></a>
+<span class="sourceLineNo">596</span><a name="line.596"></a>
+<span class="sourceLineNo">597</span>    private final SaslClient 
saslClient;<a name="line.597"></a>
+<span class="sourceLineNo">598</span><a name="line.598"></a>
+<span class="sourceLineNo">599</span>    private CompositeByteBuf cBuf;<a 
name="line.599"></a>
+<span class="sourceLineNo">600</span><a name="line.600"></a>
+<span class="sourceLineNo">601</span>    public SaslWrapHandler(SaslClient 
saslClient) {<a name="line.601"></a>
+<span class="sourceLineNo">602</span>      this.saslClient = saslClient;<a 
name="line.602"></a>
 <span class="sourceLineNo">603</span>    }<a name="line.603"></a>
 <span class="sourceLineNo">604</span><a name="line.604"></a>
 <span class="sourceLineNo">605</span>    @Override<a name="line.605"></a>
-<span class="sourceLineNo">606</span>    public void 
write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a 
name="line.606"></a>
-<span class="sourceLineNo">607</span>        throws Exception {<a 
name="line.607"></a>
-<span class="sourceLineNo">608</span>      if (msg instanceof ByteBuf) {<a 
name="line.608"></a>
-<span class="sourceLineNo">609</span>        ByteBuf buf = (ByteBuf) msg;<a 
name="line.609"></a>
-<span class="sourceLineNo">610</span>        cBuf.addComponent(buf);<a 
name="line.610"></a>
-<span class="sourceLineNo">611</span>        
cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a 
name="line.611"></a>
-<span class="sourceLineNo">612</span>      } else {<a name="line.612"></a>
-<span class="sourceLineNo">613</span>        ctx.write(msg);<a 
name="line.613"></a>
-<span class="sourceLineNo">614</span>      }<a name="line.614"></a>
-<span class="sourceLineNo">615</span>    }<a name="line.615"></a>
-<span class="sourceLineNo">616</span><a name="line.616"></a>
-<span class="sourceLineNo">617</span>    @Override<a name="line.617"></a>
-<span class="sourceLineNo">618</span>    public void 
flush(ChannelHandlerContext ctx) throws Exception {<a name="line.618"></a>
-<span class="sourceLineNo">619</span>      if (cBuf.isReadable()) {<a 
name="line.619"></a>
-<span class="sourceLineNo">620</span>        byte[] b = new 
byte[cBuf.readableBytes()];<a name="line.620"></a>
-<span class="sourceLineNo">621</span>        cBuf.readBytes(b);<a 
name="line.621"></a>
-<span class="sourceLineNo">622</span>        cBuf.discardReadComponents();<a 
name="line.622"></a>
-<span class="sourceLineNo">623</span>        byte[] wrapped = 
saslClient.wrap(b, 0, b.length);<a name="line.623"></a>
-<span class="sourceLineNo">624</span>        ByteBuf buf = 
ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.624"></a>
-<span class="sourceLineNo">625</span>        buf.writeInt(wrapped.length);<a 
name="line.625"></a>
-<span class="sourceLineNo">626</span>        buf.writeBytes(wrapped);<a 
name="line.626"></a>
-<span class="sourceLineNo">627</span>        ctx.write(buf);<a 
name="line.627"></a>
-<span class="sourceLineNo">628</span>      }<a name="line.628"></a>
-<span class="sourceLineNo">629</span>      ctx.flush();<a name="line.629"></a>
-<span class="sourceLineNo">630</span>    }<a name="line.630"></a>
-<span class="sourceLineNo">631</span><a name="line.631"></a>
-<span class="sourceLineNo">632</span>    @Override<a name="line.632"></a>
-<span class="sourceLineNo">633</span>    public void 
close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a 
name="line.633"></a>
-<span class="sourceLineNo">634</span>      cBuf.release();<a 
name="line.634"></a>
-<span class="sourceLineNo">635</span>      cBuf = null;<a name="line.635"></a>
-<span class="sourceLineNo">636</span>    }<a name="line.636"></a>
-<span class="sourceLineNo">637</span>  }<a name="line.637"></a>
-<span class="sourceLineNo">638</span><a name="line.638"></a>
-<span class="sourceLineNo">639</span>  private static final class 
DecryptHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.639"></a>
-<span class="sourceLineNo">640</span><a name="line.640"></a>
-<span class="sourceLineNo">641</span>    private final Decryptor decryptor;<a 
name="line.641"></a>
-<span class="sourceLineNo">642</span><a name="line.642"></a>
-<span class="sourceLineNo">643</span>    public DecryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.643"></a>
-<span class="sourceLineNo">644</span>        throws GeneralSecurityException, 
IOException {<a name="line.644"></a>
-<span class="sourceLineNo">645</span>      this.decryptor = 
codec.createDecryptor();<a name="line.645"></a>
-<span class="sourceLineNo">646</span>      this.decryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.646"></a>
-<span class="sourceLineNo">647</span>    }<a name="line.647"></a>
-<span class="sourceLineNo">648</span><a name="line.648"></a>
-<span class="sourceLineNo">649</span>    @Override<a name="line.649"></a>
-<span class="sourceLineNo">650</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.650"></a>
-<span class="sourceLineNo">651</span>      ByteBuf inBuf;<a 
name="line.651"></a>
-<span class="sourceLineNo">652</span>      boolean release = false;<a 
name="line.652"></a>
-<span class="sourceLineNo">653</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.653"></a>
-<span class="sourceLineNo">654</span>        inBuf = msg;<a 
name="line.654"></a>
-<span class="sourceLineNo">655</span>      } else {<a name="line.655"></a>
-<span class="sourceLineNo">656</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.656"></a>
-<span class="sourceLineNo">657</span>        msg.readBytes(inBuf);<a 
name="line.657"></a>
-<span class="sourceLineNo">658</span>        release = true;<a 
name="line.658"></a>
-<span class="sourceLineNo">659</span>      }<a name="line.659"></a>
-<span class="sourceLineNo">660</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.660"></a>
-<span class="sourceLineNo">661</span>      ByteBuf outBuf = 
ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.661"></a>
-<span class="sourceLineNo">662</span>      ByteBuffer outBuffer = 
outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.662"></a>
-<span class="sourceLineNo">663</span>      decryptor.decrypt(inBuffer, 
outBuffer);<a name="line.663"></a>
-<span class="sourceLineNo">664</span>      
outBuf.writerIndex(inBuf.readableBytes());<a name="line.664"></a>
-<span class="sourceLineNo">665</span>      if (release) {<a 
name="line.665"></a>
-<span class="sourceLineNo">666</span>        inBuf.release();<a 
name="line.666"></a>
-<span class="sourceLineNo">667</span>      }<a name="line.667"></a>
-<span class="sourceLineNo">668</span>      ctx.fireChannelRead(outBuf);<a 
name="line.668"></a>
-<span class="sourceLineNo">669</span>    }<a name="line.669"></a>
-<span class="sourceLineNo">670</span>  }<a name="line.670"></a>
-<span class="sourceLineNo">671</span><a name="line.671"></a>
-<span class="sourceLineNo">672</span>  private static final class 
EncryptHandler extends MessageToByteEncoder&lt;ByteBuf&gt; {<a 
name="line.672"></a>
-<span class="sourceLineNo">673</span><a name="line.673"></a>
-<span class="sourceLineNo">674</span>    private final Encryptor encryptor;<a 
name="line.674"></a>
-<span class="sourceLineNo">675</span><a name="line.675"></a>
-<span class="sourceLineNo">676</span>    public EncryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.676"></a>
-<span class="sourceLineNo">677</span>        throws GeneralSecurityException, 
IOException {<a name="line.677"></a>
-<span class="sourceLineNo">678</span>      this.encryptor = 
codec.createEncryptor();<a name="line.678"></a>
-<span class="sourceLineNo">679</span>      this.encryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.679"></a>
-<span class="sourceLineNo">680</span>    }<a name="line.680"></a>
-<span class="sourceLineNo">681</span><a name="line.681"></a>
-<span class="sourceLineNo">682</span>    @Override<a name="line.682"></a>
-<span class="sourceLineNo">683</span>    protected ByteBuf 
allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a 
name="line.683"></a>
-<span class="sourceLineNo">684</span>        throws Exception {<a 
name="line.684"></a>
-<span class="sourceLineNo">685</span>      if (preferDirect) {<a 
name="line.685"></a>
-<span class="sourceLineNo">686</span>        return 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.686"></a>
-<span class="sourceLineNo">687</span>      } else {<a name="line.687"></a>
-<span class="sourceLineNo">688</span>        return 
ctx.alloc().buffer(msg.readableBytes());<a name="line.688"></a>
-<span class="sourceLineNo">689</span>      }<a name="line.689"></a>
-<span class="sourceLineNo">690</span>    }<a name="line.690"></a>
-<span class="sourceLineNo">691</span><a name="line.691"></a>
-<span class="sourceLineNo">692</span>    @Override<a name="line.692"></a>
-<span class="sourceLineNo">693</span>    protected void 
encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception 
{<a name="line.693"></a>
-<span class="sourceLineNo">694</span>      ByteBuf inBuf;<a 
name="line.694"></a>
-<span class="sourceLineNo">695</span>      boolean release = false;<a 
name="line.695"></a>
-<span class="sourceLineNo">696</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.696"></a>
-<span class="sourceLineNo">697</span>        inBuf = msg;<a 
name="line.697"></a>
-<span class="sourceLineNo">698</span>      } else {<a name="line.698"></a>
-<span class="sourceLineNo">699</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.699"></a>
-<span class="sourceLineNo">700</span>        msg.readBytes(inBuf);<a 
name="line.700"></a>
-<span class="sourceLineNo">701</span>        release = true;<a 
name="line.701"></a>
-<span class="sourceLineNo">702</span>      }<a name="line.702"></a>
-<span class="sourceLineNo">703</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.703"></a>
-<span class="sourceLineNo">704</span>      ByteBuffer outBuffer = 
out.nioBuffer(0, inBuf.readableBytes());<a name="line.704"></a>
-<span class="sourceLineNo">705</span>      encryptor.encrypt(inBuffer, 
outBuffer);<a name="line.705"></a>
-<span class="sourceLineNo">706</span>      
out.writerIndex(inBuf.readableBytes());<a name="line.706"></a>
-<span class="sourceLineNo">707</span>      if (release) {<a 
name="line.707"></a>
-<span class="sourceLineNo">708</span>        inBuf.release();<a 
name="line.708"></a>
-<span class="sourceLineNo">709</span>      }<a name="line.709"></a>
-<span class="sourceLineNo">710</span>    }<a name="line.710"></a>
-<span class="sourceLineNo">711</span>  }<a name="line.711"></a>
-<span class="sourceLineNo">712</span><a name="line.712"></a>
-<span class="sourceLineNo">713</span>  private static String 
getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a 
name="line.713"></a>
-<span class="sourceLineNo">714</span>    return encryptionKey.keyId + 
NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a 
name="line.714"></a>
-<span class="sourceLineNo">715</span>        + new 
String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a 
name="line.715"></a>
+<span class="sourceLineNo">606</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.606"></a>
+<span class="sourceLineNo">607</span>      cBuf = new 
CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.607"></a>
+<span class="sourceLineNo">608</span>    }<a name="line.608"></a>
+<span class="sourceLineNo">609</span><a name="line.609"></a>
+<span class="sourceLineNo">610</span>    @Override<a name="line.610"></a>
+<span class="sourceLineNo">611</span>    public void 
write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a 
name="line.611"></a>
+<span class="sourceLineNo">612</span>        throws Exception {<a 
name="line.612"></a>
+<span class="sourceLineNo">613</span>      if (msg instanceof ByteBuf) {<a 
name="line.613"></a>
+<span class="sourceLineNo">614</span>        ByteBuf buf = (ByteBuf) msg;<a 
name="line.614"></a>
+<span class="sourceLineNo">615</span>        cBuf.addComponent(buf);<a 
name="line.615"></a>
+<span class="sourceLineNo">616</span>        
cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a 
name="line.616"></a>
+<span class="sourceLineNo">617</span>      } else {<a name="line.617"></a>
+<span class="sourceLineNo">618</span>        ctx.write(msg);<a 
name="line.618"></a>
+<span class="sourceLineNo">619</span>      }<a name="line.619"></a>
+<span class="sourceLineNo">620</span>    }<a name="line.620"></a>
+<span class="sourceLineNo">621</span><a name="line.621"></a>
+<span class="sourceLineNo">622</span>    @Override<a name="line.622"></a>
+<span class="sourceLineNo">623</span>    public void 
flush(ChannelHandlerContext ctx) throws Exception {<a name="line.623"></a>
+<span class="sourceLineNo">624</span>      if (cBuf.isReadable()) {<a 
name="line.624"></a>
+<span class="sourceLineNo">625</span>        byte[] b = new 
byte[cBuf.readableBytes()];<a name="line.625"></a>
+<span class="sourceLineNo">626</span>        cBuf.readBytes(b);<a 
name="line.626"></a>
+<span class="sourceLineNo">627</span>        cBuf.discardReadComponents();<a 
name="line.627"></a>
+<span class="sourceLineNo">628</span>        byte[] wrapped = 
saslClient.wrap(b, 0, b.length);<a name="line.628"></a>
+<span class="sourceLineNo">629</span>        ByteBuf buf = 
ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.629"></a>
+<span class="sourceLineNo">630</span>        buf.writeInt(wrapped.length);<a 
name="line.630"></a>
+<span class="sourceLineNo">631</span>        buf.writeBytes(wrapped);<a 
name="line.631"></a>
+<span class="sourceLineNo">632</span>        ctx.write(buf);<a 
name="line.632"></a>
+<span class="sourceLineNo">633</span>      }<a name="line.633"></a>
+<span class="sourceLineNo">634</span>      ctx.flush();<a name="line.634"></a>
+<span class="sourceLineNo">635</span>    }<a name="line.635"></a>
+<span class="sourceLineNo">636</span><a name="line.636"></a>
+<span class="sourceLineNo">637</span>    @Override<a name="line.637"></a>
+<span class="sourceLineNo">638</span>    public void 
close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a 
name="line.638"></a>
+<span class="sourceLineNo">639</span>      cBuf.release();<a 
name="line.639"></a>
+<span class="sourceLineNo">640</span>      cBuf = null;<a name="line.640"></a>
+<span class="sourceLineNo">641</span>    }<a name="line.641"></a>
+<span class="sourceLineNo">642</span>  }<a name="line.642"></a>
+<span class="sourceLineNo">643</span><a name="line.643"></a>
+<span class="sourceLineNo">644</span>  private static final class 
DecryptHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.644"></a>
+<span class="sourceLineNo">645</span><a name="line.645"></a>
+<span class="sourceLineNo">646</span>    private final Decryptor decryptor;<a 
name="line.646"></a>
+<span class="sourceLineNo">647</span><a name="line.647"></a>
+<span class="sourceLineNo">648</span>    public DecryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.648"></a>
+<span class="sourceLineNo">649</span>        throws GeneralSecurityException, 
IOException {<a name="line.649"></a>
+<span class="sourceLineNo">650</span>      this.decryptor = 
codec.createDecryptor();<a name="line.650"></a>
+<span class="sourceLineNo">651</span>      this.decryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.651"></a>
+<span class="sourceLineNo">652</span>    }<a name="line.652"></a>
+<span class="sourceLineNo">653</span><a name="line.653"></a>
+<span class="sourceLineNo">654</span>    @Override<a name="line.654"></a>
+<span class="sourceLineNo">655</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.655"></a>
+<span class="sourceLineNo">656</span>      ByteBuf inBuf;<a 
name="line.656"></a>
+<span class="sourceLineNo">657</span>      boolean release = false;<a 
name="line.657"></a>
+<span class="sourceLineNo">658</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.658"></a>
+<span class="sourceLineNo">659</span>        inBuf = msg;<a 
name="line.659"></a>
+<span class="sourceLineNo">660</span>      } else {<a name="line.660"></a>
+<span class="sourceLineNo">661</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.661"></a>
+<span class="sourceLineNo">662</span>        msg.readBytes(inBuf);<a 
name="line.662"></a>
+<span class="sourceLineNo">663</span>        release = true;<a 
name="line.663"></a>
+<span class="sourceLineNo">664</span>      }<a name="line.664"></a>
+<span class="sourceLineNo">665</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.665"></a>
+<span class="sourceLineNo">666</span>      ByteBuf outBuf = 
ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.666"></a>
+<span class="sourceLineNo">667</span>      ByteBuffer outBuffer = 
outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.667"></a>
+<span class="sourceLineNo">668</span>      decryptor.decrypt(inBuffer, 
outBuffer);<a name="line.668"></a>
+<span class="sourceLineNo">669</span>      
outBuf.writerIndex(inBuf.readableBytes());<a name="line.669"></a>
+<span class="sourceLineNo">670</span>      if (release) {<a 
name="line.670"></a>
+<span class="sourceLineNo">671</span>        inBuf.release();<a 
name="line.671"></a>
+<span class="sourceLineNo">672</span>      }<a name="line.672"></a>
+<span class="sourceLineNo">673</span>      ctx.fireChannelRead(outBuf);<a 
name="line.673"></a>
+<span class="sourceLineNo">674</span>    }<a name="line.674"></a>
+<span class="sourceLineNo">675</span>  }<a name="line.675"></a>
+<span class="sourceLineNo">676</span><a name="line.676"></a>
+<span class="sourceLineNo">677</span>  private static final class 
EncryptHandler extends MessageToByteEncoder&lt;ByteBuf&gt; {<a 
name="line.677"></a>
+<span class="sourceLineNo">678</span><a name="line.678"></a>
+<span class="sourceLineNo">679</span>    private final Encryptor encryptor;<a 
name="line.679"></a>
+<span class="sourceLineNo">680</span><a name="line.680"></a>
+<span class="sourceLineNo">681</span>    public EncryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.681"></a>
+<span class="sourceLineNo">682</span>        throws GeneralSecurityException, 
IOException {<a name="line.682"></a>
+<span class="sourceLineNo">683</span>      this.encryptor = 
codec.createEncryptor();<a name="line.683"></a>
+<span class="sourceLineNo">684</span>      this.encryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.684"></a>
+<span class="sourceLineNo">685</span>    }<a name="line.685"></a>
+<span class="sourceLineNo">686</span><a name="line.686"></a>
+<span class="sourceLineNo">687</span>    @Override<a name="line.687"></a>
+<span class="sourceLineNo">688</span>    protected ByteBuf 
allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a 
name="line.688"></a>
+<span class="sourceLineNo">689</span>        throws Exception {<a 
name="line.689"></a>
+<span class="sourceLineNo">690</span>      if (preferDirect) {<a 
name="line.690"></a>
+<span class="sourceLineNo">691</span>        return 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.691"></a>
+<span class="sourceLineNo">692</span>      } else {<a name="line.692"></a>
+<span class="sourceLineNo">693</span>        return 
ctx.alloc().buffer(msg.readableBytes());<a name="line.693"></a>
+<span class="sourceLineNo">694</span>      }<a name="line.694"></a>
+<span class="sourceLineNo">695</span>    }<a name="line.695"></a>
+<span class="sourceLineNo">696</span><a name="line.696"></a>
+<span class="sourceLineNo">697</span>    @Override<a name="line.697"></a>
+<span class="sourceLineNo">698</span>    protected void 
encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception 
{<a name="line.698"></a>
+<span class="sourceLineNo">699</span>      ByteBuf inBuf;<a 
name="line.699"></a>
+<span class="sourceLineNo">700</span>      boolean release = false;<a 
name="line.700"></a>
+<span class="sourceLineNo">701</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.701"></a>
+<span class="sourceLineNo">702</span>        inBuf = msg;<a 
name="line.702"></a>
+<span class="sourceLineNo">703</span>      } else {<a name="line.703"></a>
+<span class="sourceLineNo">704</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.704"></a>
+<span class="sourceLineNo">705</span>        msg.readBytes(inBuf);<a 
name="line.705"></a>
+<span class="sourceLineNo">706</span>        release = true;<a 
name="line.706"></a>
+<span class="sourceLineNo">707</span>      }<a name="line.707"></a>
+<span class="sourceLineNo">708</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.708"></a>
+<span class="sourceLineNo">709</span>      ByteBuffer outBuffer = 
out.nioBuffer(0, inBuf.readableBytes());<a name="line.709"></a>
+<span class="sourceLineNo">710</span>      encryptor.encrypt(inBuffer, 
outBuffer);<a name="line.710"></a>
+<span class="sourceLineNo">711</span>      
out.writerIndex(inBuf.readableBytes());<a name="line.711"></a>
+<span class="sourceLineNo">712</span>      if (release) {<a 
name="line.712"></a>
+<span class="sourceLineNo">713</span>        inBuf.release();<a 
name="line.713"></a>
+<span class="sourceLineNo">714</span>      }<a name="line.714"></a>
+<span class="sourceLineNo">715</span>    }<a name="line.715"></a>
 <span class="sourceLineNo">716</span>  }<a name="line.716"></a>
 <span class="sourceLineNo">717</span><a name="line.717"></a>
-<span class="sourceLineNo">718</span>  private static char[] 
encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.718"></a>
-<span class="sourceLineNo">719</span>    return new 
String(Base64.encodeBase64(encryptionKey, false), 
Charsets.UTF_8).toCharArray();<a name="line.719"></a>
-<span class="sourceLineNo">720</span>  }<a name="line.720"></a>
-<span class="sourceLineNo">721</span><a name="line.721"></a>
-<span class="sourceLineNo">722</span>  private static String 
buildUsername(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.722"></a>
-<span class="sourceLineNo">723</span>    return new 
String(Base64.encodeBase64(blockToken.getIdentifier(), false), 
Charsets.UTF_8);<a name="line.723"></a>
-<span class="sourceLineNo">724</span>  }<a name="line.724"></a>
-<span class="sourceLineNo">725</span><a name="line.725"></a>
-<span class="sourceLineNo">726</span>  private static char[] 
buildClientPassword(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.726"></a>
-<span class="sourceLineNo">727</span>    return new 
String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a 
name="line.727"></a>
-<span class="sourceLineNo">728</span>        .toCharArray();<a 
name="line.728"></a>
+<span class="sourceLineNo">718</span>  private static String 
getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a 
name="line.718"></a>
+<span class="sourceLineNo">719</span>    return encryptionKey.keyId + 
NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a 
name="line.719"></a>
+<span class="sourceLineNo">720</span>        + new 
String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a 
name="line.720"></a>
+<span class="sourceLineNo">721</span>  }<a name="line.721"></a>
+<span class="sourceLineNo">722</span><a name="line.722"></a>
+<span class="sourceLineNo">723</span>  private static char[] 
encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.723"></a>
+<span class="sourceLineNo">724</span>    return new 
String(Base64.encodeBase64(encryptionKey, false), 
Charsets.UTF_8).toCharArray();<a name="line.724"></a>
+<span class="sourceLineNo">725</span>  }<a name="line.725"></a>
+<span class="sourceLineNo">726</span><a name="line.726"></a>
+<span class="sourceLineNo">727</span>  private static String 
buildUsername(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.727"></a>
+<span class="sourceLineNo">728</span>    return new 
String(Base64.encodeBase64(blockToken.getIdentifier(), false), 
Charsets.UTF_8);<a name="line.728"></a>
 <span class="sourceLineNo">729</span>  }<a name="line.729"></a>
 <span class="sourceLineNo">730</span><a name="line.730"></a>
-<span class="sourceLineNo">731</span>  private static Map&lt;String, 
String&gt; createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a 
name="line.731"></a>
-<span class="sourceLineNo">732</span>    Map&lt;String, String&gt; saslProps = 
Maps.newHashMapWithExpectedSize(3);<a name="line.732"></a>
-<span class="sourceLineNo">733</span>    saslProps.put(Sasl.QOP, 
QualityOfProtection.PRIVACY.getSaslQop());<a name="line.733"></a>
-<span class="sourceLineNo">734</span>    saslProps.put(Sasl.SERVER_AUTH, 
"true");<a name="line.734"></a>
-<span class="sourceLineNo">735</span>    
saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a 
name="line.735"></a>
-<span class="sourceLineNo">736</span>    return saslProps;<a 
name="line.736"></a>
-<span class="sourceLineNo">737</span>  }<a name="line.737"></a>
-<span class="sourceLineNo">738</span><a name="line.738"></a>
-<span class="sourceLineNo">739</span>  private static void 
doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a 
name="line.739"></a>
-<span class="sourceLineNo">740</span>      String username, char[] password, 
Map&lt;String, String&gt; saslProps, Promise&lt;Void&gt; saslPromise) {<a 
name="line.740"></a>
-<span class="sourceLineNo">741</span>    try {<a name="line.741"></a>
-<span class="sourceLineNo">742</span>      channel.pipeline().addLast(new 
IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.742"></a>
-<span class="sourceLineNo">743</span>        new 
ProtobufVarint32FrameDecoder(),<a name="line.743"></a>
-<span class="sourceLineNo">744</span>        new 
ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a 
name="line.744"></a>
-<span class="sourceLineNo">745</span>        new SaslNegotiateHandler(conf, 
username, password, saslProps, timeoutMs, saslPromise));<a name="line.745"></a>
-<span class="sourceLineNo">746</span>    } catch (SaslException e) {<a 
name="line.746"></a>
-<span class="sourceLineNo">747</span>      saslPromise.tryFailure(e);<a 
name="line.747"></a>
-<span class="sourceLineNo">748</span>    }<a name="line.748"></a>
-<span class="sourceLineNo">749</span>  }<a name="line.749"></a>
-<span class="sourceLineNo">750</span><a name="line.750"></a>
-<span class="sourceLineNo">751</span>  static void 
trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a 
name="line.751"></a>
-<span class="sourceLineNo">752</span>      int timeoutMs, DFSClient client, 
Token&lt;BlockTokenIdentifier&gt; accessToken,<a name="line.752"></a>
-<span class="sourceLineNo">753</span>      Promise&lt;Void&gt; saslPromise) 
throws IOException {<a name="line.753"></a>
-<span class="sourceLineNo">754</span>    SaslDataTransferClient saslClient = 
client.getSaslDataTransferClient();<a name="line.754"></a>
-<span class="sourceLineNo">755</span>    SaslPropertiesResolver 
saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a 
name="line.755"></a>
-<span class="sourceLineNo">756</span>    TrustedChannelResolver 
trustedChannelResolver =<a name="line.756"></a>
-<span class="sourceLineNo">757</span>        
SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.757"></a>
-<span class="sourceLineNo">758</span>    AtomicBoolean fallbackToSimpleAuth = 
SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.758"></a>
-<span class="sourceLineNo">759</span>    InetAddress addr = 
((InetSocketAddress) channel.remoteAddress()).getAddress();<a 
name="line.759"></a>
-<span class="sourceLineNo">760</span>    if 
(trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) 
{<a name="line.760"></a>
-<span class="sourceLineNo">761</span>      saslPromise.trySuccess(null);<a 
name="line.761"></a>
-<span class="sourceLineNo">762</span>      return;<a name="line.762"></a>
-<span class="sourceLineNo">763</span>    }<a name="line.763"></a>
-<span class="sourceLineNo">764</span>    DataEncryptionKey encryptionKey = 
client.newDataEncryptionKey();<a name="line.764"></a>
-<span class="sourceLineNo">765</span>    if (encryptionKey != null) {<a 
name="line.765"></a>
-<span class="sourceLineNo">766</span>      if (LOG.isDebugEnabled()) {<a 
name="line.766"></a>
-<span class="sourceLineNo">767</span>        LOG.debug(<a name="line.767"></a>
-<span class="sourceLineNo">768</span>          "SASL client doing encrypted 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.768"></a>
-<span class="sourceLineNo">769</span>      }<a name="line.769"></a>
-<span class="sourceLineNo">770</span>      doSaslNegotiation(conf, channel, 
timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.770"></a>
-<span class="sourceLineNo">771</span>        
encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.771"></a>
-<span class="sourceLineNo">772</span>        
createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), 
saslPromise);<a name="line.772"></a>
-<span class="sourceLineNo">773</span>    } else if 
(!UserGroupInformation.isSecurityEnabled()) {<a name="line.773"></a>
-<span class="sourceLineNo">774</span>      if (LOG.isDebugEnabled()) {<a 
name="line.774"></a>
-<span class="sourceLineNo">775</span>        LOG.debug("SASL client skipping 
handshake in unsecured configuration for addr = " + addr<a name="line.775"></a>
-<span class="sourceLineNo">776</span>            + ", datanodeId = " + 
dnInfo);<a name="line.776"></a>
-<span class="sourceLineNo">777</span>      }<a name="line.777"></a>
-<span class="sourceLineNo">778</span>      saslPromise.trySuccess(null);<a 
name="line.778"></a>
-<span class="sourceLineNo">779</span>    } else if (dnInfo.getXferPort() &lt; 
1024) {<a name="line.779"></a>
-<span class="sourceLineNo">780</span>      if (LOG.isDebugEnabled()) {<a 
name="line.780"></a>
-<span class="sourceLineNo">781</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.781"></a>
-<span class="sourceLineNo">782</span>            + "privileged port for addr = 
" + addr + ", datanodeId = " + dnInfo);<a name="line.782"></a>
-<span class="sourceLineNo">783</span>      }<a name="line.783"></a>
-<span class="sourceLineNo">784</span>      saslPromise.trySuccess(null);<a 
name="line.784"></a>
-<span class="sourceLineNo">785</span>    } else if (fallbackToSimpleAuth != 
null &amp;&amp; fallbackToSimpleAuth.get()) {<a name="line.785"></a>
-<span class="sourceLineNo">786</span>      if (LOG.isDebugEnabled()) {<a 
name="line.786"></a>
-<span class="sourceLineNo">787</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.787"></a>
-<span class="sourceLineNo">788</span>            + "unsecured cluster for addr 
= " + addr + ", datanodeId = " + dnInfo);<a name="line.788"></a>
-<span class="sourceLineNo">789</span>      }<a name="line.789"></a>
-<span class="sourceLineNo">790</span>      saslPromise.trySuccess(null);<a 
name="line.790"></a>
-<span class="sourceLineNo">791</span>    } else if (saslPropsResolver != null) 
{<a name="line.791"></a>
-<span class="sourceLineNo">792</span>      if (LOG.isDebugEnabled()) {<a 
name="line.792"></a>
-<span class="sourceLineNo">793</span>        LOG.debug(<a name="line.793"></a>
-<span class="sourceLineNo">794</span>          "SASL client doing general 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.794"></a>
-<span class="sourceLineNo">795</span>      }<a name="line.795"></a>
-<span class="sourceLineNo">796</span>      doSaslNegotiation(conf, channel, 
timeoutMs, buildUsername(accessToken),<a name="line.796"></a>
-<span class="sourceLineNo">797</span>        buildClientPassword(accessToken), 
saslPropsResolver.getClientProperties(addr), saslPromise);<a 
name="line.797"></a>
-<span class="sourceLineNo">798</span>    } else {<a name="line.798"></a>
-<span class="sourceLineNo">799</span>      // It's a secured cluster using 
non-privileged ports, but no SASL. The only way this can<a name="line.799"></a>
-<span class="sourceLineNo">800</span>      // happen is if the DataNode has 
ignore.secure.ports.for.testing configured, so this is a rare<a 
name="line.800"></a>
-<span class="sourceLineNo">801</span>      // edge case.<a name="line.801"></a>
-<span class="sourceLineNo">802</span>      if (LOG.isDebugEnabled()) {<a 
name="line.802"></a>
-<span class="sourceLineNo">803</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with no SASL "<a name="line.803"></a>
-<span class="sourceLineNo">804</span>            + "protection configured for 
addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.804"></a>
-<span class="sourceLineNo">805</span>      }<a name="line.805"></a>
-<span class="sourceLineNo">806</span>      saslPromise.trySuccess(null);<a 
name="line.806"></a>
-<span class="sourceLineNo">807</span>    }<a name="line.807"></a>
-<span class="sourceLineNo">808</span>  }<a name="line.808"></a>
-<span class="sourceLineNo">809</span><a name="line.809"></a>
-<span class="sourceLineNo">810</span>  static Encryptor 
createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a 
name="line.810"></a>
-<span class="sourceLineNo">811</span>      throws IOException {<a 
name="line.811"></a>
-<span class="sourceLineNo">812</span>    FileEncryptionInfo feInfo = 
stat.getFileEncryptionInfo();<a name="line.812"></a>
-<span class="sourceLineNo">813</span>    if (feInfo == null) {<a 
name="line.813"></a>
-<span class="sourceLineNo">814</span>      return null;<a name="line.814"></a>
-<span class="sourceLineNo">815</span>    }<a name="line.815"></a>
-<span class="sourceLineNo">816</span>    return 
TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a 
name="line.816"></a>
+<span class="sourceLineNo">731</span>  private static char[] 
buildClientPassword(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.731"></a>
+<span class="sourceLineNo">732</span>    return new 
String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a 
name="line.732"></a>
+<span class="sourceLineNo">733</span>        .toCharArray();<a 
name="line.733"></a>
+<span class="sourceLineNo">734</span>  }<a name="line.734"></a>
+<span class="sourceLineNo">735</span><a name="line.735"></a>
+<span class="sourceLineNo">736</span>  private static Map&lt;String, 
String&gt; createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a 
name="line.736"></a>
+<span class="sourceLineNo">737</span>    Map&lt;String, String&gt; saslProps = 
Maps.newHashMapWithExpectedSize(3);<a name="line.737"></a>
+<span class="sourceLineNo">738</span>    saslProps.put(Sasl.QOP, 
QualityOfProtection.PRIVACY.getSaslQop());<a name="line.738"></a>
+<span class="sourceLineNo">739</span>    saslProps.put(Sasl.SERVER_AUTH, 
"true");<a name="line.739"></a>
+<span class="sourceLineNo">740</span>    
saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a 
name="line.740"></a>
+<span class="sourceLineNo">741</span>    return saslProps;<a 
name="line.741"></a>
+<span class="sourceLineNo">742</span>  }<a name="line.742"></a>
+<span class="sourceLineNo">743</span><a name="line.743"></a>
+<span class="sourceLineNo">744</span>  private static void 
doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a 
name="line.744"></a>
+<span class="sourceLineNo">745</span>      String username, char[] password, 
Map&lt;String, String&gt; saslProps, Promise&lt;Void&gt; saslPromise,<a 
name="line.745"></a>
+<span class="sourceLineNo">746</span>      DFSClient dfsClient) {<a 
name="line.746"></a>
+<span class="sourceLineNo">747</span>    try {<a name="line.747"></a>
+<span class="sourceLineNo">748</span>      channel.pipeline().addLast(new 
IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.748"></a>
+<span class="sourceLineNo">749</span>        new 
ProtobufVarint32FrameDecoder(),<a name="line.749"></a>
+<span class="sourceLineNo">750</span>        new 
ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a 
name="line.750"></a>
+<span class="sourceLineNo">751</span>        new SaslNegotiateHandler(conf, 
username, password, saslProps, timeoutMs, saslPromise,<a name="line.751"></a>
+<span class="sourceLineNo">752</span>            dfsClient));<a 
name="line.752"></a>
+<span class="sourceLineNo">753</span>    } catch (SaslException e) {<a 
name="line.753"></a>
+<span class="sourceLineNo">754</span>      saslPromise.tryFailure(e);<a 
name="line.754"></a>
+<span class="sourceLineNo">755</span>    }<a name="line.755"></a>
+<span class="sourceLineNo">756</span>  }<a name="line.756"></a>
+<span class="sourceLineNo">757</span><a name="line.757"></a>
+<span class="sourceLineNo">758</span>  static void 
trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a 
name="line.758"></a>
+<span class="sourceLineNo">759</span>      int timeoutMs, DFSClient client, 
Token&lt;BlockTokenIdentifier&gt; accessToken,<a name="line.759"></a>
+<span class="sourceLineNo">760</span>      Promise&lt;Void&gt; saslPromise) 
throws IOException {<a name="line.760"></a>
+<span class="sourceLineNo">761</span>    SaslDataTransferClient saslClient = 
client.getSaslDataTransferClient();<a name="line.761"></a>
+<span class="sourceLineNo">762</span>    SaslPropertiesResolver 
saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a 
name="line.762"></a>
+<span class="sourceLineNo">763</span>    TrustedChannelResolver 
trustedChannelResolver =<a name="line.763"></a>
+<span class="sourceLineNo">764</span>        
SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.764"></a>
+<span class="sourceLineNo">765</span>    AtomicBoolean fallbackToSimpleAuth = 
SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.765"></a>
+<span class="sourceLineNo">766</span>    InetAddress addr = 
((InetSocketAddress) channel.remoteAddress()).getAddress();<a 
name="line.766"></a>
+<span class="sourceLineNo">767</span>    if 
(trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) 
{<a name="line.767"></a>
+<span class="sourceLineNo">768</span>      saslPromise.trySuccess(null);<a 
name="line.768"></a>
+<span class="sourceLineNo">769</span>      return;<a name="line.769"></a>
+<span class="sourceLineNo">770</span>    }<a name="line.770"></a>
+<span class="sourceLineNo">771</span>    DataEncryptionKey encryptionKey = 
client.newDataEncryptionKey();<a name="line.771"></a>
+<span class="sourceLineNo">772</span>    if (encryptionKey != null) {<a 
name="line.772"></a>
+<span class="sourceLineNo">773</span>      if (LOG.isDebugEnabled()) {<a 
name="line.773"></a>
+<span class="sourceLineNo">774</span>        LOG.debug(<a name="line.774"></a>
+<span class="sourceLineNo">775</span>          "SASL client doing encrypted 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.775"></a>
+<span class="sourceLineNo">776</span>      }<a name="line.776"></a>
+<span class="sourceLineNo">777</span>      doSaslNegotiation(conf, channel, 
timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.777"></a>
+<span class="sourceLineNo">778</span>        
encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.778"></a>
+<span class="sourceLineNo">779</span>        
createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), 
saslPromise,<a name="line.779"></a>
+<span class="sourceLineNo">780</span>          client);<a name="line.780"></a>
+<span class="sourceLineNo">781</span>    } else if 
(!UserGroupInformation.isSecurityEnabled()) {<a name="line.781"></a>
+<span class="sourceLineNo">782</span>      if (LOG.isDebugEnabled()) {<a 
name="line.782"></a>
+<span class="sourceLineNo">783</span>        LOG.debug("SASL client skipping 
handshake in unsecured configuration for addr = " + addr<a name="line.783"></a>
+<span class="sourceLineNo">784</span>            + ", datanodeId = " + 
dnInfo);<a name="line.784"></a>
+<span class="sourceLineNo">785</span>      }<a name="line.785"></a>
+<span class="sourceLineNo">786</span>      saslPromise.trySuccess(null);<a 
name="line.786"></a>
+<span class="sourceLineNo">787</span>    } else if (dnInfo.getXferPort() &lt; 
1024) {<a name="line.787"></a>
+<span class="sourceLineNo">788</span>      if (LOG.isDebugEnabled()) {<a 
name="line.788"></a>
+<span class="sourceLineNo">789</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.789"></a>
+<span class="sourceLineNo">790</span>            + "privileged port for addr = 
" + addr + ", datanodeId = " + dnInfo);<a name="line.790"></a>
+<span class="sourceLineNo">791</span>      }<a name="line.791"></a>
+<span class="sourceLineNo">792</span>      saslPromise.trySuccess(null);<a 
name="line.792"></a>
+<span class="sourceLineNo">793</span>    } else if (fallbackToSimpleAuth != 
null &amp;&amp; fallbackToSimpleAuth.get()) {<a name="line.793"></a>
+<span class="sourceLineNo">794</span>      if (LOG.isDebugEnabled()) {<a 
name="line.794"></a>
+<span class="sourceLineNo">795</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.795"></a>
+<span class="sourceLineNo">796</span>            + "unsecured cluster for addr 
= " + addr + ", datanodeId = " + dnInfo);<a name="line.796"></a>
+<span class="sourceLineNo">797</span>      }<a name="line.797"></a>
+<span class="sourceLineNo">798</span>      saslPromise.trySuccess(null);<a 
name="line.798"></a>
+<span class="sourceLineNo">799</span>    } else if (saslPropsResolver != null) 
{<a name="line.799"></a>
+<span class="sourceLineNo">800</span>      if (LOG.isDebugEnabled()) {<a 
name="line.800"></a>
+<span class="sourceLineNo">801</span>        LOG.debug(<a name="line.801"></a>
+<span class="sourceLineNo">802</span>          "SASL client doing general 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.802"></a>
+<span class="sourceLineNo">803</span>      }<a name="line.803"></a>
+<span class="sourceLineNo">804</span>      doSaslNegotiation(conf, channel, 
timeoutMs, buildUsername(accessToken),<a name="line.804"></a>
+<span class="sourceLineNo">805</span>        buildClientPassword(accessToken), 
saslPropsResolver.getClientProperties(addr), saslPromise,<a name="line.805"></a>
+<span class="sourceLineNo">806</span>          client);<a name="line.806"></a>
+<span class="sourceLineNo">807</span>    } else {<a name="line.807"></a>
+<span class="sourceLineNo">808</span>      // It's a secured cluster using 
non-privileged ports, but no SASL. The only way this can<a name="line.808"></a>
+<span class="sourceLineNo">809</span>      // happen is if the DataNode has 
ignore.secure.ports.for.testing configured, so this is a rare<a 
name="line.809"></a>
+<span class="sourceLineNo">810</span>      // edge case.<a name="line.810"></a>
+<span class="sourceLineNo">811</span>      if (LOG.isDebugEnabled()) {<a 
name="line.811"></a>
+<span class="sourceLineNo">812</span>        LOG.debug("S

<TRUNCATED>

Reply via email to