Author: violetagg
Date: Fri Sep  9 12:59:02 2016
New Revision: 1760005

URL: http://svn.apache.org/viewvc?rev=1760005&view=rev
Log:
Access the socket buffer handler via getBufHandler method for consistency with 
the rest of the code.

Modified:
    tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java
    tomcat/trunk/java/org/apache/tomcat/util/net/SecureNioChannel.java

Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java?rev=1760005&r1=1760004&r2=1760005&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java Fri Sep 
 9 12:59:02 2016
@@ -378,7 +378,7 @@ public class SecureNio2Channel extends N
 
         // Ensure the application buffers (which have to be created earlier) 
are
         // big enough.
-        bufHandler.expand(sslEngine.getSession().getApplicationBufferSize());
+        
getBufHandler().expand(sslEngine.getSession().getApplicationBufferSize());
         if (netOutBuffer.capacity() < 
sslEngine.getSession().getApplicationBufferSize()) {
             // Info for now as we may need to increase DEFAULT_NET_BUFFER_SIZE
             log.info(sm.getString("channel.nio.ssl.expandNetOutBuffer",
@@ -465,8 +465,8 @@ public class SecureNio2Channel extends N
         //so we can clear it here.
         netOutBuffer.clear();
         //perform the wrap
-        bufHandler.configureWriteBufferForRead();
-        SSLEngineResult result = sslEngine.wrap(bufHandler.getWriteBuffer(), 
netOutBuffer);
+        getBufHandler().configureWriteBufferForRead();
+        SSLEngineResult result = 
sslEngine.wrap(getBufHandler().getWriteBuffer(), netOutBuffer);
         //prepare the results to be written
         netOutBuffer.flip();
         //set the status
@@ -491,8 +491,8 @@ public class SecureNio2Channel extends N
             //prepare the buffer with the incoming data
             netInBuffer.flip();
             //call unwrap
-            bufHandler.configureReadBufferForWrite();
-            result = sslEngine.unwrap(netInBuffer, bufHandler.getReadBuffer());
+            getBufHandler().configureReadBufferForWrite();
+            result = sslEngine.unwrap(netInBuffer, 
getBufHandler().getReadBuffer());
             //compact the buffer, this is an optional method, wonder what 
would happen if we didn't
             netInBuffer.compact();
             //read in the status
@@ -661,11 +661,11 @@ public class SecureNio2Channel extends N
                     } else {
                         // The SSL session has increased the required buffer 
size
                         // since the buffer was created.
-                        if (dst == 
socket.getSocketBufferHandler().getReadBuffer()) {
+                        if (dst == getBufHandler().getReadBuffer()) {
                             // This is the normal case for this code
-                            socket.getSocketBufferHandler().expand(
-                                    
sslEngine.getSession().getApplicationBufferSize());
-                            dst = 
socket.getSocketBufferHandler().getReadBuffer();
+                            getBufHandler()
+                                    
.expand(sslEngine.getSession().getApplicationBufferSize());
+                            dst = getBufHandler().getReadBuffer();
                         } else {
                             // Can't expand the buffer as there is no way to 
signal
                             // to the caller that the buffer has been replaced.
@@ -846,11 +846,11 @@ public class SecureNio2Channel extends N
                                 } else {
                                     // The SSL session has increased the 
required buffer size
                                     // since the buffer was created.
-                                    if (dst2 == 
socket.getSocketBufferHandler().getReadBuffer()) {
+                                    if (dst2 == 
getBufHandler().getReadBuffer()) {
                                         // This is the normal case for this 
code
-                                        socket.getSocketBufferHandler().expand(
+                                        getBufHandler().expand(
                                                 
sslEngine.getSession().getApplicationBufferSize());
-                                        dst2 = 
socket.getSocketBufferHandler().getReadBuffer();
+                                        dst2 = getBufHandler().getReadBuffer();
                                     } else {
                                         // Can't expand the buffer as there is 
no way to signal
                                         // to the caller that the buffer has 
been replaced.

Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNioChannel.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/SecureNioChannel.java?rev=1760005&r1=1760004&r2=1760005&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/SecureNioChannel.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/SecureNioChannel.java Fri Sep  
9 12:59:02 2016
@@ -232,7 +232,7 @@ public class SecureNioChannel extends Ni
                         //read more data, reregister for OP_READ
                         return SelectionKey.OP_READ;
                     } else if (handshake.getStatus() == 
Status.BUFFER_OVERFLOW) {
-                        bufHandler.configureReadBufferForWrite();
+                        getBufHandler().configureReadBufferForWrite();
                     } else {
                         throw new 
IOException(sm.getString("channel.nio.ssl.unexpectedStatusDuringWrap", 
handshakeStatus));
                     }//switch
@@ -307,7 +307,7 @@ public class SecureNioChannel extends Ni
 
         // Ensure the application buffers (which have to be created earlier) 
are
         // big enough.
-        bufHandler.expand(sslEngine.getSession().getApplicationBufferSize());
+        
getBufHandler().expand(sslEngine.getSession().getApplicationBufferSize());
         if (netOutBuffer.capacity() < 
sslEngine.getSession().getApplicationBufferSize()) {
             // Info for now as we may need to increase DEFAULT_NET_BUFFER_SIZE
             log.info(sm.getString("channel.nio.ssl.expandNetOutBuffer",
@@ -410,8 +410,8 @@ public class SecureNioChannel extends Ni
         //so we can clear it here.
         netOutBuffer.clear();
         //perform the wrap
-        bufHandler.configureWriteBufferForWrite();
-        SSLEngineResult result = sslEngine.wrap(bufHandler.getWriteBuffer(), 
netOutBuffer);
+        getBufHandler().configureWriteBufferForWrite();
+        SSLEngineResult result = 
sslEngine.wrap(getBufHandler().getWriteBuffer(), netOutBuffer);
         //prepare the results to be written
         netOutBuffer.flip();
         //set the status
@@ -445,8 +445,8 @@ public class SecureNioChannel extends Ni
             //prepare the buffer with the incoming data
             netInBuffer.flip();
             //call unwrap
-            bufHandler.configureReadBufferForWrite();
-            result = sslEngine.unwrap(netInBuffer, bufHandler.getReadBuffer());
+            getBufHandler().configureReadBufferForWrite();
+            result = sslEngine.unwrap(netInBuffer, 
getBufHandler().getReadBuffer());
             //compact the buffer, this is an optional method, wonder what 
would happen if we didn't
             netInBuffer.compact();
             //read in the status
@@ -523,12 +523,12 @@ public class SecureNioChannel extends Ni
      *         channel has reached end-of-stream
      * @throws IOException If some other I/O error occurs
      * @throws IllegalArgumentException if the destination buffer is different
-     *                                  than bufHandler.getReadBuffer()
+     *                                  than getBufHandler().getReadBuffer()
      */
     @Override
     public int read(ByteBuffer dst) throws IOException {
         // Make sure we only use the ApplicationBufferHandler's buffers
-        if (dst != bufHandler.getReadBuffer()) {
+        if (dst != getBufHandler().getReadBuffer()) {
             throw new 
IllegalArgumentException(sm.getString("channel.nio.ssl.invalidBuffer"));
         }
         //are we in the middle of closing or closed?
@@ -573,11 +573,10 @@ public class SecureNioChannel extends Ni
                 } else {
                     // The SSL session has increased the required buffer size
                     // since the buffer was created.
-                    if (dst == 
socketWrapper.getSocketBufferHandler().getReadBuffer()) {
+                    if (dst == getBufHandler().getReadBuffer()) {
                         // This is the normal case for this code
-                        socketWrapper.getSocketBufferHandler().expand(
-                                
sslEngine.getSession().getApplicationBufferSize());
-                        dst = 
socketWrapper.getSocketBufferHandler().getReadBuffer();
+                        
getBufHandler().expand(sslEngine.getSession().getApplicationBufferSize());
+                        dst = getBufHandler().getReadBuffer();
                     } else {
                         // Can't expand the buffer as there is no way to signal
                         // to the caller that the buffer has been replaced.
@@ -664,11 +663,6 @@ public class SecureNioChannel extends Ni
     }
 
     @Override
-    public SocketBufferHandler getBufHandler() {
-        return bufHandler;
-    }
-
-    @Override
     public boolean isHandshakeComplete() {
         return handshakeComplete;
     }



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to