remm        2005/07/13 06:03:51

  Modified:    http11/src/java/org/apache/coyote/http11
                        Http11AprProcessor.java
  Log:
  - Code cleanups and comments.
  
  Revision  Changes    Path
  1.25      +18 -10    
jakarta-tomcat-connectors/http11/src/java/org/apache/coyote/http11/Http11AprProcessor.java
  
  Index: Http11AprProcessor.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/http11/src/java/org/apache/coyote/http11/Http11AprProcessor.java,v
  retrieving revision 1.24
  retrieving revision 1.25
  diff -u -r1.24 -r1.25
  --- Http11AprProcessor.java   13 Jul 2005 11:05:19 -0000      1.24
  +++ Http11AprProcessor.java   13 Jul 2005 13:03:51 -0000      1.25
  @@ -1080,10 +1080,13 @@
   
               try {
                   if (ssl) {
  +                    // Cipher suite
                       Object sslO = SSLSocket.getInfoS(socket, 
SSL.SSL_INFO_CIPHER);
  -                    if (sslO != null)
  +                    if (sslO != null) {
                           request.setAttribute
                               ("javax.servlet.request.cipher_suite", sslO);
  +                    }
  +                    // Client certificate chain if present
                       int certLength = SSLSocket.getInfoI(socket, 
SSL.SSL_INFO_CLIENT_CERT_CHAIN);
                       X509Certificate[] certs = null;
                       if (certLength > 0) {
  @@ -1096,17 +1099,22 @@
                               certs[i] = (X509Certificate) 
cf.generateCertificate(stream);
                           }
                       }
  -                    if (certs != null)
  +                    if (certs != null) {
                           request.setAttribute
                               ("javax.servlet.request.X509Certificate", certs);
  +                    }
  +                    // User key size
                       sslO = new Integer(SSLSocket.getInfoI(socket, 
SSL.SSL_INFO_CIPHER_USEKEYSIZE));
  -                    if (sslO != null)
  +                    if (sslO != null) {
                           request.setAttribute
                               ("javax.servlet.request.key_size", sslO);
  +                    }
  +                    // SSL session ID
                       sslO = SSLSocket.getInfoS(socket, 
SSL.SSL_INFO_SESSION_ID);
  -                    if (sslO != null)
  +                    if (sslO != null) {
                           request.setAttribute
                               ("javax.servlet.request.ssl_session", sslO);
  +                    }
                   }
               } catch (Exception e) {
                   log.warn("Exception getting SSL attributes " ,e);
  @@ -1115,18 +1123,17 @@
           } else if (actionCode == ActionCode.ACTION_REQ_SSL_CERTIFICATE) {
   
               if (ssl) {
  -                /*
  -                 * Consume and buffer the request body, so that it does not
  -                 * interfere with the client's handshake messages
  -                 */
  +                 // Consume and buffer the request body, so that it does not
  +                 // interfere with the client's handshake messages
                   InputFilter[] inputFilters = inputBuffer.getFilters();
                   ((BufferedInputFilter) 
inputFilters[Constants.BUFFERED_FILTER])
                       .setLimit(maxSavePostSize);
                   inputBuffer.addActiveFilter
                       (inputFilters[Constants.BUFFERED_FILTER]);
                   try {
  -                    // FIXME: Verify this is the right thing to do
  +                    // Renegociate certificates
                       SSLSocket.renegotiate(socket);
  +                    // Client certificate chain if present
                       int certLength = SSLSocket.getInfoI(socket, 
SSL.SSL_INFO_CLIENT_CERT_CHAIN);
                       X509Certificate[] certs = null;
                       if (certLength > 0) {
  @@ -1139,9 +1146,10 @@
                               certs[i] = (X509Certificate) 
cf.generateCertificate(stream);
                           }
                       }
  -                    if (certs != null)
  +                    if (certs != null) {
                           request.setAttribute
                               ("javax.servlet.request.X509Certificate", certs);
  +                    }
                   } catch (Exception e) {
                       log.warn("Exception getting SSL Cert", e);
                   }
  
  
  

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to