This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/main by this push:
     new 4473967f06 Code clean-up - formatting. No functional change.
4473967f06 is described below

commit 4473967f060474f5ce4c48ddda776553a5b16a0b
Author: Mark Thomas <ma...@apache.org>
AuthorDate: Thu May 22 17:32:37 2025 +0100

    Code clean-up - formatting. No functional change.
---
 .../tomcat/util/net/jsse/JSSEImplementation.java   |  2 +-
 .../tomcat/util/net/jsse/JSSEKeyManager.java       | 32 +++++++---------
 .../tomcat/util/net/jsse/JSSESSLContext.java       |  3 +-
 .../apache/tomcat/util/net/jsse/JSSESupport.java   | 43 ++++++++++------------
 java/org/apache/tomcat/util/net/jsse/JSSEUtil.java |  9 ++---
 java/org/apache/tomcat/util/net/jsse/PEMFile.java  | 10 ++---
 6 files changed, 43 insertions(+), 56 deletions(-)

diff --git a/java/org/apache/tomcat/util/net/jsse/JSSEImplementation.java 
b/java/org/apache/tomcat/util/net/jsse/JSSEImplementation.java
index 9ea9ce43d3..cc6ccfe332 100644
--- a/java/org/apache/tomcat/util/net/jsse/JSSEImplementation.java
+++ b/java/org/apache/tomcat/util/net/jsse/JSSEImplementation.java
@@ -43,7 +43,7 @@ public class JSSEImplementation extends SSLImplementation {
     }
 
     @Override
-    public SSLSupport getSSLSupport(SSLSession session, Map<String, 
List<String>> additionalAttributes) {
+    public SSLSupport getSSLSupport(SSLSession session, 
Map<String,List<String>> additionalAttributes) {
         return new JSSESupport(session, additionalAttributes);
     }
 
diff --git a/java/org/apache/tomcat/util/net/jsse/JSSEKeyManager.java 
b/java/org/apache/tomcat/util/net/jsse/JSSEKeyManager.java
index 5f63ba254e..04060565c8 100644
--- a/java/org/apache/tomcat/util/net/jsse/JSSEKeyManager.java
+++ b/java/org/apache/tomcat/util/net/jsse/JSSEKeyManager.java
@@ -26,9 +26,8 @@ import javax.net.ssl.X509ExtendedKeyManager;
 import javax.net.ssl.X509KeyManager;
 
 /**
- * X509KeyManager which allows selection of a specific key pair and certificate
- * chain (identified by their keystore alias name) to be used by the server to
- * authenticate itself to SSL clients.
+ * X509KeyManager which allows selection of a specific key pair and 
certificate chain (identified by their keystore
+ * alias name) to be used by the server to authenticate itself to SSL clients.
  *
  * @author Jan Luehe
  */
@@ -41,9 +40,8 @@ public final class JSSEKeyManager extends 
X509ExtendedKeyManager {
     /**
      * Constructor.
      *
-     * @param mgr The X509KeyManager used as a delegate
-     * @param serverKeyAlias The alias name of the server's key pair and
-     * supporting certificate chain
+     * @param mgr            The X509KeyManager used as a delegate
+     * @param serverKeyAlias The alias name of the server's key pair and 
supporting certificate chain
      */
     public JSSEKeyManager(X509KeyManager mgr, String serverKeyAlias) {
         super();
@@ -53,9 +51,8 @@ public final class JSSEKeyManager extends 
X509ExtendedKeyManager {
 
 
     /**
-     * Returns the server key alias that was provided in the constructor or the
-     * result from {@link X509KeyManager#chooseServerAlias(String, Principal[],
-     * Socket)} for the delegate if no alias is specified.
+     * Returns the server key alias that was provided in the constructor or 
the result from
+     * {@link X509KeyManager#chooseServerAlias(String, Principal[], Socket)} 
for the delegate if no alias is specified.
      */
     @Override
     public String chooseServerAlias(String keyType, Principal[] issuers, 
Socket socket) {
@@ -68,14 +65,13 @@ public final class JSSEKeyManager extends 
X509ExtendedKeyManager {
 
 
     /**
-     * Returns the server key alias that was provided in the constructor or the
-     * result from {@link 
X509ExtendedKeyManager#chooseEngineServerAlias(String,
-     * Principal[], SSLEngine)} for the delegate if no alias is specified.
+     * Returns the server key alias that was provided in the constructor or 
the result from
+     * {@link X509ExtendedKeyManager#chooseEngineServerAlias(String, 
Principal[], SSLEngine)} for the delegate if no
+     * alias is specified.
      */
     @Override
-    public String chooseEngineServerAlias(String keyType, Principal[] issuers,
-            SSLEngine engine) {
-        if (serverKeyAlias!=null) {
+    public String chooseEngineServerAlias(String keyType, Principal[] issuers, 
SSLEngine engine) {
+        if (serverKeyAlias != null) {
             return serverKeyAlias;
         }
 
@@ -84,8 +80,7 @@ public final class JSSEKeyManager extends 
X509ExtendedKeyManager {
 
 
     @Override
-    public String chooseClientAlias(String[] keyType, Principal[] issuers,
-                                    Socket socket) {
+    public String chooseClientAlias(String[] keyType, Principal[] issuers, 
Socket socket) {
         return delegate.chooseClientAlias(keyType, issuers, socket);
     }
 
@@ -115,8 +110,7 @@ public final class JSSEKeyManager extends 
X509ExtendedKeyManager {
 
 
     @Override
-    public String chooseEngineClientAlias(String[] keyType, Principal[] 
issuers,
-            SSLEngine engine) {
+    public String chooseEngineClientAlias(String[] keyType, Principal[] 
issuers, SSLEngine engine) {
         return delegate.chooseClientAlias(keyType, issuers, null);
     }
 }
diff --git a/java/org/apache/tomcat/util/net/jsse/JSSESSLContext.java 
b/java/org/apache/tomcat/util/net/jsse/JSSESSLContext.java
index ac058faf21..088257110b 100644
--- a/java/org/apache/tomcat/util/net/jsse/JSSESSLContext.java
+++ b/java/org/apache/tomcat/util/net/jsse/JSSESSLContext.java
@@ -46,8 +46,7 @@ class JSSESSLContext implements SSLContext {
     }
 
     @Override
-    public void init(KeyManager[] kms, TrustManager[] tms, SecureRandom sr)
-            throws KeyManagementException {
+    public void init(KeyManager[] kms, TrustManager[] tms, SecureRandom sr) 
throws KeyManagementException {
         this.kms = kms;
         this.tms = tms;
         context.init(kms, tms, sr);
diff --git a/java/org/apache/tomcat/util/net/jsse/JSSESupport.java 
b/java/org/apache/tomcat/util/net/jsse/JSSESupport.java
index da0decc95e..d2591f519d 100644
--- a/java/org/apache/tomcat/util/net/jsse/JSSESupport.java
+++ b/java/org/apache/tomcat/util/net/jsse/JSSESupport.java
@@ -36,13 +36,10 @@ import org.apache.tomcat.util.net.openssl.ciphers.Cipher;
 import org.apache.tomcat.util.res.StringManager;
 
 /**
- * JSSESupport.
- * Concrete implementation class for JSSE Support classes.
+ * JSSESupport. Concrete implementation class for JSSE Support classes.
  *
  * @author EKR
- * @author Craig R. McClanahan
- * Parts cribbed from JSSECertCompat
- * Parts cribbed from CertificatesValve
+ * @author Craig R. McClanahan Parts cribbed from JSSECertCompat Parts cribbed 
from CertificatesValve
  */
 public class JSSESupport implements SSLSupport, SSLSessionManager {
 
@@ -61,9 +58,8 @@ public class JSSESupport implements SSLSupport, 
SSLSessionManager {
     }
 
     /*
-     * NO-OP method provided to make it easy for other classes in this package
-     * to trigger the loading of this class and the population of the
-     * keySizeCache.
+     * NO-OP method provided to make it easy for other classes in this package 
to trigger the loading of this class and
+     * the population of the keySizeCache.
      */
     static void init() {
         // NO-OP
@@ -101,10 +97,10 @@ public class JSSESupport implements SSLSupport, 
SSLSessionManager {
             return null;
         }
 
-        Certificate [] certs;
+        Certificate[] certs;
         try {
             certs = session.getPeerCertificates();
-        } catch( Throwable t ) {
+        } catch (Throwable t) {
             log.debug(sm.getString("jsseSupport.clientCertError"), t);
             return null;
         }
@@ -114,31 +110,31 @@ public class JSSESupport implements SSLSupport, 
SSLSessionManager {
 
 
     private static X509Certificate[] convertCertificates(Certificate[] certs) {
-        if( certs==null ) {
+        if (certs == null) {
             return null;
         }
 
-        X509Certificate [] x509Certs = new X509Certificate[certs.length];
-        for(int i=0; i < certs.length; i++) {
-            if (certs[i] instanceof X509Certificate ) {
+        X509Certificate[] x509Certs = new X509Certificate[certs.length];
+        for (int i = 0; i < certs.length; i++) {
+            if (certs[i] instanceof X509Certificate) {
                 // always currently true with the JSSE 1.1.x
                 x509Certs[i] = (X509Certificate) certs[i];
             } else {
                 try {
-                    byte [] buffer = certs[i].getEncoded();
+                    byte[] buffer = certs[i].getEncoded();
                     CertificateFactory cf = 
CertificateFactory.getInstance("X.509");
                     ByteArrayInputStream stream = new 
ByteArrayInputStream(buffer);
                     x509Certs[i] = (X509Certificate) 
cf.generateCertificate(stream);
-                } catch(Exception ex) {
+                } catch (Exception ex) {
                     log.info(sm.getString("jsseSupport.certTranslationError", 
certs[i]), ex);
                     return null;
                 }
             }
-            if(log.isTraceEnabled()) {
+            if (log.isTraceEnabled()) {
                 log.trace("Cert #" + i + " = " + x509Certs[i]);
             }
         }
-        if(x509Certs.length < 1) {
+        if (x509Certs.length < 1) {
             return null;
         }
         return x509Certs;
@@ -161,18 +157,17 @@ public class JSSESupport implements SSLSupport, 
SSLSessionManager {
     }
 
     @Override
-    public String getSessionId()
-        throws IOException {
+    public String getSessionId() throws IOException {
         // Look up the current SSLSession
         if (session == null) {
             return null;
         }
         // Expose ssl_session (getId)
-        byte [] ssl_session = session.getId();
+        byte[] ssl_session = session.getId();
         if (ssl_session == null || ssl_session.length == 0) {
             return null;
         }
-        StringBuilder buf=new StringBuilder();
+        StringBuilder buf = new StringBuilder();
         for (byte b : ssl_session) {
             String digit = Integer.toHexString(b);
             if (digit.length() < 2) {
@@ -203,9 +198,9 @@ public class JSSESupport implements SSLSupport, 
SSLSessionManager {
     @Override
     public String getProtocol() throws IOException {
         if (session == null) {
-           return null;
+            return null;
         }
-       return session.getProtocol();
+        return session.getProtocol();
     }
 
     @Override
diff --git a/java/org/apache/tomcat/util/net/jsse/JSSEUtil.java 
b/java/org/apache/tomcat/util/net/jsse/JSSEUtil.java
index a8b3cf7b3c..5a83584691 100644
--- a/java/org/apache/tomcat/util/net/jsse/JSSEUtil.java
+++ b/java/org/apache/tomcat/util/net/jsse/JSSEUtil.java
@@ -52,12 +52,12 @@ public class JSSEUtil extends SSLUtilBase {
     private volatile Set<String> implementedCiphers;
 
 
-    public JSSEUtil (SSLHostConfigCertificate certificate) {
+    public JSSEUtil(SSLHostConfigCertificate certificate) {
         this(certificate, true);
     }
 
 
-    public JSSEUtil (SSLHostConfigCertificate certificate, boolean warnOnSkip) 
{
+    public JSSEUtil(SSLHostConfigCertificate certificate, boolean warnOnSkip) {
         super(certificate, warnOnSkip);
     }
 
@@ -90,8 +90,7 @@ public class JSSEUtil extends SSLUtilBase {
 
 
     @Override
-    public SSLContext createSSLContextInternal(List<String> 
negotiableProtocols)
-            throws NoSuchAlgorithmException {
+    public SSLContext createSSLContextInternal(List<String> 
negotiableProtocols) throws NoSuchAlgorithmException {
         return new JSSESSLContext(sslHostConfig.getSslProtocol());
     }
 
@@ -103,7 +102,7 @@ public class JSSEUtil extends SSLUtilBase {
                     SSLContext context;
                     try {
                         context = new 
JSSESSLContext(sslHostConfig.getSslProtocol());
-                        context.init(null,  null,  null);
+                        context.init(null, null, null);
                     } catch (NoSuchAlgorithmException | KeyManagementException 
e) {
                         // This is fatal for the connector so throw an 
exception to prevent
                         // it from starting
diff --git a/java/org/apache/tomcat/util/net/jsse/PEMFile.java 
b/java/org/apache/tomcat/util/net/jsse/PEMFile.java
index 930a7e1026..f380c385b0 100644
--- a/java/org/apache/tomcat/util/net/jsse/PEMFile.java
+++ b/java/org/apache/tomcat/util/net/jsse/PEMFile.java
@@ -107,10 +107,9 @@ public class PEMFile {
     }
 
     public static String toPEM(X509Certificate certificate) throws 
CertificateEncodingException {
-        return Part.BEGIN_BOUNDARY + Part.CERTIFICATE + Part.FINISH_BOUNDARY +
-                System.lineSeparator() +
-                
Base64.getMimeEncoder().encodeToString(certificate.getEncoded()) +
-                Part.END_BOUNDARY + Part.CERTIFICATE + Part.FINISH_BOUNDARY;
+        return Part.BEGIN_BOUNDARY + Part.CERTIFICATE + Part.FINISH_BOUNDARY + 
System.lineSeparator() +
+                
Base64.getMimeEncoder().encodeToString(certificate.getEncoded()) + 
Part.END_BOUNDARY +
+                Part.CERTIFICATE + Part.FINISH_BOUNDARY;
     }
 
     private final List<X509Certificate> certificates = new ArrayList<>();
@@ -412,7 +411,8 @@ public class PEMFile {
                         byte[] oidPRF = p.parseOIDAsBytes();
                         prf = OID_TO_PRF.get(HexUtils.toHexString(oidPRF));
                         if (prf == null) {
-                            throw new 
NoSuchAlgorithmException(sm.getString("pemFile.unknownPrfAlgorithm", 
toDottedOidString(oidPRF)));
+                            throw new NoSuchAlgorithmException(
+                                    
sm.getString("pemFile.unknownPrfAlgorithm", toDottedOidString(oidPRF)));
                         }
                         p.parseNull();
 


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to