This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/main by this push:
     new b79827b6d3 Apply standard code formatting
b79827b6d3 is described below

commit b79827b6d30237237722acdcbd8a58e1bb4b61a6
Author: Mark Thomas <[email protected]>
AuthorDate: Wed Mar 18 08:43:22 2026 +0000

    Apply standard code formatting
    
    (to minimise differences between versions)
---
 .../util/net/openssl/panama/OpenSSLContext.java    | 14 +++++++------
 .../util/net/openssl/panama/OpenSSLEngine.java     | 23 ++++++++++++----------
 .../util/net/openssl/panama/OpenSSLUtil.java       |  2 --
 3 files changed, 21 insertions(+), 18 deletions(-)

diff --git a/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLContext.java 
b/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLContext.java
index 66d1f08db7..28818a7ba9 100644
--- a/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLContext.java
+++ b/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLContext.java
@@ -265,8 +265,8 @@ public class OpenSSLContext implements 
org.apache.tomcat.util.net.SSLContext {
 
             // Set server groups
             // Note: It is also possible to override setSSLParameters in 
OpenSSLEngine to set the final
-            //  list of groups per connection, but this is less efficient than 
setting the configured
-            //  group list on the SSL context and letting OpenSSL figure it 
out.
+            // list of groups per connection, but this is less efficient than 
setting the configured
+            // group list on the SSL context and letting OpenSSL figure it out.
             if (sslHostConfig.getGroupList() != null) {
                 StringBuilder sb = new StringBuilder();
                 boolean first = true;
@@ -532,7 +532,8 @@ public class OpenSSLContext implements 
org.apache.tomcat.util.net.SSLContext {
             }
             if (maxTlsVersion >= TLS1_3_VERSION()) {
                 try {
-                    if (SSL_CTX_set_ciphersuites(state.sslCtx, 
localArena.allocateFrom(sslHostConfig.getCipherSuites())) <= 0) {
+                    if (SSL_CTX_set_ciphersuites(state.sslCtx,
+                            
localArena.allocateFrom(sslHostConfig.getCipherSuites())) <= 0) {
                         tls13Warning = 
sm.getString("engine.failedCipherSuite", sslHostConfig.getCipherSuites());
                     } else {
                         ciphersSet = true;
@@ -611,7 +612,8 @@ public class OpenSSLContext implements 
org.apache.tomcat.util.net.SSLContext {
                         localArena
                                 
.allocateFrom(SSLHostConfig.adjustRelativePath(sslHostConfig.getCaCertificatePath()))
 :
                         MemorySegment.NULL;
-                if (SSL_CTX_load_verify_locations(state.sslCtx, 
caCertificateFileNative, caCertificatePathNative) <= 0) {
+                if (SSL_CTX_load_verify_locations(state.sslCtx, 
caCertificateFileNative,
+                        caCertificatePathNative) <= 0) {
                     logLastError("openssl.errorConfiguringLocations");
                 } else {
                     var caCerts = SSL_CTX_get_client_CA_list(state.sslCtx);
@@ -1368,8 +1370,8 @@ public class OpenSSLContext implements 
org.apache.tomcat.util.net.SSLContext {
     public SSLEngine createSSLEngine() {
         return new OpenSSLEngine(cleaner, state.sslCtx, defaultProtocol, 
false, sessionContext, alpn, initialized,
                 sslHostConfig.getCertificateVerificationDepth(),
-                sslHostConfig.getCertificateVerification() == 
CertificateVerification.OPTIONAL_NO_CA,
-                noOcspCheck, ocspSoftFail, ocspTimeout, ocspVerifyFlags);
+                sslHostConfig.getCertificateVerification() == 
CertificateVerification.OPTIONAL_NO_CA, noOcspCheck,
+                ocspSoftFail, ocspTimeout, ocspVerifyFlags);
     }
 
     @Override
diff --git a/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java 
b/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java
index 3e8ef3698d..cd529e0fb4 100644
--- a/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java
+++ b/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java
@@ -87,9 +87,9 @@ public final class OpenSSLEngine extends SSLEngine implements 
SSLUtil.ProtocolIn
         final Set<String> availableCipherSuites = new LinkedHashSet<>(128);
         availableCipherSuites.addAll(OpenSSLLibrary.findCiphers("ALL"));
         AVAILABLE_CIPHER_SUITES = 
Collections.unmodifiableSet(availableCipherSuites);
-        IMPLEMENTED_PROTOCOLS_SET = Set.of(Constants.SSL_PROTO_SSLv2Hello, 
Constants.SSL_PROTO_SSLv3,
-                Constants.SSL_PROTO_TLSv1, Constants.SSL_PROTO_TLSv1_1, 
Constants.SSL_PROTO_TLSv1_2,
-                Constants.SSL_PROTO_TLSv1_3);
+        IMPLEMENTED_PROTOCOLS_SET =
+                Set.of(Constants.SSL_PROTO_SSLv2Hello, 
Constants.SSL_PROTO_SSLv3, Constants.SSL_PROTO_TLSv1,
+                        Constants.SSL_PROTO_TLSv1_1, 
Constants.SSL_PROTO_TLSv1_2, Constants.SSL_PROTO_TLSv1_3);
     }
 
     private static final int MAX_PLAINTEXT_LENGTH = 16 * 1024; // 2^14
@@ -185,8 +185,8 @@ public final class OpenSSLEngine extends SSLEngine 
implements SSLUtil.ProtocolIn
      */
     OpenSSLEngine(Cleaner cleaner, MemorySegment sslCtx, String 
fallbackApplicationProtocol, boolean clientMode,
             OpenSSLSessionContext sessionContext, boolean alpn, boolean 
initialized, int certificateVerificationDepth,
-            boolean certificateVerificationOptionalNoCA, boolean noOcspCheck, 
boolean ocspSoftFail,
-            int ocspTimeout, int ocspVerifyFlags) {
+            boolean certificateVerificationOptionalNoCA, boolean noOcspCheck, 
boolean ocspSoftFail, int ocspTimeout,
+            int ocspVerifyFlags) {
         if (sslCtx == null) {
             throw new 
IllegalArgumentException(sm.getString("engine.noSSLContext"));
         }
@@ -832,8 +832,8 @@ public final class OpenSSLEngine extends SSLEngine 
implements SSLUtil.ProtocolIn
         try (var localArena = Arena.ofConfined()) {
             // Use the new SSL_get0_peer_certificate call for OpenSSL 3+ to 
avoid having to call free
             MemorySegment/* (X509*) */ x509 =
-                    (openssl_h_Compatibility.OPENSSL3) ? 
SSL_get0_peer_certificate(state.ssl)
-                            : 
openssl_h_Compatibility.SSL_get_peer_certificate(state.ssl);
+                    (openssl_h_Compatibility.OPENSSL3) ? 
SSL_get0_peer_certificate(state.ssl) :
+                            
openssl_h_Compatibility.SSL_get_peer_certificate(state.ssl);
             MemorySegment bufPointer = 
localArena.allocateFrom(ValueLayout.ADDRESS, MemorySegment.NULL);
             int length = i2d_X509(x509, bufPointer);
             if (length <= 0) {
@@ -1145,7 +1145,8 @@ public final class OpenSSLEngine extends SSLEngine 
implements SSLUtil.ProtocolIn
                     (errnum == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN()) ||
                     (errnum == X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY()) 
||
                     (errnum == X509_V_ERR_CERT_UNTRUSTED()) || (errnum == 
X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE());
-            if ((verifyErrorIsOptional || errnum == X509_V_OK()) && 
(state.certificateVerifyMode == OpenSSLContext.OPTIONAL_NO_CA)) {
+            if ((verifyErrorIsOptional || errnum == X509_V_OK()) &&
+                    (state.certificateVerifyMode == 
OpenSSLContext.OPTIONAL_NO_CA)) {
                 ok = 1;
                 openssl_h_Compatibility.SSL_set_verify_result(state.ssl, 
X509_V_OK());
             }
@@ -1247,7 +1248,8 @@ public final class OpenSSLEngine extends SSLEngine 
implements SSLUtil.ProtocolIn
                                     for (String urlString : urls) {
                                         try {
                                             URL url = (new 
URI(urlString)).toURL();
-                                            ocspResponse = 
processOCSPRequest(state, url, issuer, x509, x509ctx, localArena);
+                                            ocspResponse =
+                                                    processOCSPRequest(state, 
url, issuer, x509, x509ctx, localArena);
                                             if (log.isDebugEnabled()) {
                                                 
log.debug(sm.getString("engine.ocspResponse", urlString,
                                                         
Integer.toString(ocspResponse)));
@@ -1376,7 +1378,8 @@ public final class OpenSSLEngine extends SSLEngine 
implements SSLUtil.ProtocolIn
                         return V_OCSP_CERTSTATUS_UNKNOWN();
                     }
                     MemorySegment certStack = 
OCSP_resp_get0_certs(basicResponse);
-                    if (OCSP_basic_verify(basicResponse, certStack, 
X509_STORE_CTX_get0_store(x509ctx), state.ocspVerifyFlags) <= 0) {
+                    if (OCSP_basic_verify(basicResponse, certStack, 
X509_STORE_CTX_get0_store(x509ctx),
+                            state.ocspVerifyFlags) <= 0) {
                         X509_STORE_CTX_set_error(x509ctx, 
X509_V_ERR_OCSP_SIGNATURE_FAILURE());
                         return V_OCSP_CERTSTATUS_UNKNOWN();
                     }
diff --git a/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLUtil.java 
b/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLUtil.java
index df278a62dc..1d7e768271 100644
--- a/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLUtil.java
+++ b/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLUtil.java
@@ -105,6 +105,4 @@ public class OpenSSLUtil extends SSLUtilBase {
             throw e;
         }
     }
-
-
 }


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to