Skip to content

Commit 573eace

Browse files
mcpowersBradford Wetmore
authored and
Bradford Wetmore
committedApr 28, 2022
8285504: Minor cleanup could be done in javax.net
Reviewed-by: wetmore
1 parent bba456a commit 573eace

20 files changed

+107
-128
lines changed
 

‎src/java.base/share/classes/javax/net/ServerSocketFactory.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2007, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -195,7 +195,7 @@ public abstract ServerSocket createServerSocket(int port)
195195

196196

197197
//
198-
// The default factory has NO intelligence. In fact it's not clear
198+
// The default factory has NO intelligence. In fact, it's not clear
199199
// what sort of intelligence servers need; the onus is on clients,
200200
// who have to know how to tunnel etc.
201201
//

‎src/java.base/share/classes/javax/net/ssl/HandshakeCompletedEvent.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2020, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -32,7 +32,7 @@
3232

3333
/**
3434
* This event indicates that an SSL handshake completed on a given
35-
* SSL connection. All of the core information about that handshake's
35+
* SSL connection. All the core information about that handshake's
3636
* result is captured through an "SSLSession" object. As a convenience,
3737
* this event class provides direct access to some important session
3838
* attributes.
@@ -52,7 +52,7 @@ public class HandshakeCompletedEvent extends EventObject
5252
@java.io.Serial
5353
private static final long serialVersionUID = 7914963744257769778L;
5454

55-
private transient SSLSession session;
55+
private final transient SSLSession session;
5656

5757
/**
5858
* Constructs a new HandshakeCompletedEvent.

‎src/java.base/share/classes/javax/net/ssl/HostnameVerifier.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2001, 2012, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2001, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -52,5 +52,5 @@ public interface HostnameVerifier {
5252
* @param session SSLSession used on the connection to host
5353
* @return true if the host name is acceptable
5454
*/
55-
public boolean verify(String hostname, SSLSession session);
55+
boolean verify(String hostname, SSLSession session);
5656
}

‎src/java.base/share/classes/javax/net/ssl/KeyManagerFactory.java

+8-13
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1999, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1999, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -42,13 +42,13 @@
4242
*/
4343
public class KeyManagerFactory {
4444
// The provider
45-
private Provider provider;
45+
private final Provider provider;
4646

4747
// The provider implementation (delegate)
48-
private KeyManagerFactorySpi factorySpi;
48+
private final KeyManagerFactorySpi factorySpi;
4949

5050
// The name of the key management algorithm.
51-
private String algorithm;
51+
private final String algorithm;
5252

5353
/**
5454
* Obtains the default KeyManagerFactory algorithm name.
@@ -63,15 +63,10 @@ public class KeyManagerFactory {
6363
* implementation-specific default if no such property exists.
6464
*/
6565
@SuppressWarnings("removal")
66-
public static final String getDefaultAlgorithm() {
66+
public static String getDefaultAlgorithm() {
6767
String type;
68-
type = AccessController.doPrivileged(new PrivilegedAction<>() {
69-
@Override
70-
public String run() {
71-
return Security.getProperty(
72-
"ssl.KeyManagerFactory.algorithm");
73-
}
74-
});
68+
type = AccessController.doPrivileged((PrivilegedAction<String>) () ->
69+
Security.getProperty("ssl.KeyManagerFactory.algorithm"));
7570
if (type == null) {
7671
type = "SunX509";
7772
}
@@ -123,7 +118,7 @@ public final String getAlgorithm() {
123118
* {@code jdk.security.provider.preferred}
124119
* {@link Security#getProperty(String) Security} property to determine
125120
* the preferred provider order for the specified algorithm. This
126-
* may be different than the order of providers returned by
121+
* may be different from the order of providers returned by
127122
* {@link Security#getProviders() Security.getProviders()}.
128123
*
129124
* @param algorithm the standard name of the requested algorithm.

‎src/java.base/share/classes/javax/net/ssl/KeyStoreBuilderParameters.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2003, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -69,7 +69,7 @@ public KeyStoreBuilderParameters(List<Builder> parameters) {
6969
}
7070

7171
this.parameters = Collections.unmodifiableList(
72-
new ArrayList<Builder>(parameters));
72+
new ArrayList<>(parameters));
7373
}
7474

7575
/**

‎src/java.base/share/classes/javax/net/ssl/SNIHostName.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2012, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2012, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -255,7 +255,7 @@ public int hashCode() {
255255
* "type=host_name (0), value={@literal <hostname>}"
256256
* </pre>
257257
* The "{@literal <hostname>}" is an ASCII representation of the hostname,
258-
* which may contains A-labels. For example, a returned value of an pseudo
258+
* which may contain A-labels. For example, a returned value of a pseudo
259259
* hostname may look like:
260260
* <pre>
261261
* "type=host_name (0), value=www.example.com"

‎src/java.base/share/classes/javax/net/ssl/SNIServerName.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2012, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2012, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -161,7 +161,7 @@ public int hashCode() {
161161
* name, and INTEGER is the integer value of the name type. The format
162162
* of "{@literal <name value>}" is "XX:...:XX", where "XX" is the
163163
* hexadecimal digit representation of a byte value. For example, a
164-
* returned value of an pseudo server name may look like:
164+
* returned value of a pseudo server name may look like:
165165
* <pre>
166166
* "type=(31), value=77:77:77:2E:65:78:61:6D:70:6C:65:2E:63:6E"
167167
* </pre>

‎src/java.base/share/classes/javax/net/ssl/SSLContext.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1999, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1999, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -159,7 +159,7 @@ public static void setDefault(SSLContext context) {
159159
* {@code jdk.security.provider.preferred}
160160
* {@link Security#getProperty(String) Security} property to determine
161161
* the preferred provider order for the specified algorithm. This
162-
* may be different than the order of providers returned by
162+
* may be different from the order of providers returned by
163163
* {@link Security#getProviders() Security.getProviders()}.
164164
*
165165
* @param protocol the standard name of the requested protocol.

‎src/java.base/share/classes/javax/net/ssl/SSLEngine.java

+5-7
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
* using the {@link #getSession()} method.
6969
* <P>
7070
* The {@code SSLSocket} class provides much of the same security
71-
* functionality, but all of the inbound and outbound data is
71+
* functionality, but all the inbound and outbound data is
7272
* automatically transported using the underlying {@link
7373
* java.net.Socket Socket}, which by design uses a blocking model.
7474
* While this is appropriate for many applications, this model does not
@@ -870,7 +870,7 @@ public abstract SSLEngineResult unwrap(ByteBuffer src,
870870
* accept any more inbound data messages.
871871
*
872872
* @return true if the {@code SSLEngine} will not
873-
* consume anymore network data (and by implication,
873+
* consume any more network data (and by implication,
874874
* will not produce any more application data.)
875875
* @see #closeInbound()
876876
*/
@@ -974,7 +974,7 @@ public abstract SSLEngineResult unwrap(ByteBuffer src,
974974
* for a certain cipher suite.
975975
* <P>
976976
* See {@link #getEnabledCipherSuites()} for more information
977-
* on why a specific cipher suite may never be used on a engine.
977+
* on why a specific cipher suite may never be used on an engine.
978978
*
979979
* @param suites Names of all the cipher suites to enable
980980
* @throws IllegalArgumentException when one or more of the ciphers
@@ -1031,7 +1031,7 @@ public abstract SSLEngineResult unwrap(ByteBuffer src,
10311031
* Returns the {@code SSLSession} in use in this
10321032
* {@code SSLEngine}.
10331033
* <P>
1034-
* These can be long lived, and frequently correspond to an entire
1034+
* These can be long-lived, and frequently correspond to an entire
10351035
* login session for some user. The session specifies a particular
10361036
* cipher suite which is being actively used by all connections in
10371037
* that session, as well as the identities of the session's client
@@ -1336,10 +1336,8 @@ public void setSSLParameters(SSLParameters params) {
13361336
}
13371337
if (params.getNeedClientAuth()) {
13381338
setNeedClientAuth(true);
1339-
} else if (params.getWantClientAuth()) {
1340-
setWantClientAuth(true);
13411339
} else {
1342-
setWantClientAuth(false);
1340+
setWantClientAuth(params.getWantClientAuth());
13431341
}
13441342
}
13451343

‎src/java.base/share/classes/javax/net/ssl/SSLEngineResult.java

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2003, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2003, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -62,7 +62,7 @@ public class SSLEngineResult {
6262
* @author Brad R. Wetmore
6363
* @since 1.5
6464
*/
65-
public static enum Status {
65+
public enum Status {
6666

6767
/**
6868
* The {@code SSLEngine} was not able to unwrap the
@@ -97,7 +97,7 @@ public static enum Status {
9797
* {@code SSLEngine}, or the operation
9898
* could not be completed because it was already closed.
9999
*/
100-
CLOSED;
100+
CLOSED
101101
}
102102

103103
/**
@@ -107,7 +107,7 @@ public static enum Status {
107107
* @author Brad R. Wetmore
108108
* @since 1.5
109109
*/
110-
public static enum HandshakeStatus {
110+
public enum HandshakeStatus {
111111

112112
/**
113113
* The {@code SSLEngine} is not currently handshaking.
@@ -163,7 +163,7 @@ public static enum HandshakeStatus {
163163
*
164164
* @since 9
165165
*/
166-
NEED_UNWRAP_AGAIN;
166+
NEED_UNWRAP_AGAIN
167167
}
168168

169169

‎src/java.base/share/classes/javax/net/ssl/SSLServerSocket.java

+5-7
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ protected SSLServerSocket(int port)
109109
* The <code>backlog</code> argument is the requested maximum number of
110110
* pending connections on the socket. Its exact semantics are implementation
111111
* specific. In particular, an implementation may impose a maximum length
112-
* or may choose to ignore the parameter altogther. The value provided
112+
* or may choose to ignore the parameter altogether. The value provided
113113
* should be greater than <code>0</code>. If it is less than or equal to
114114
* <code>0</code>, then an implementation specific default will be used.
115115
* <P>
@@ -154,7 +154,7 @@ protected SSLServerSocket(int port, int backlog)
154154
* The <code>backlog</code> argument is the requested maximum number of
155155
* pending connections on the socket. Its exact semantics are implementation
156156
* specific. In particular, an implementation may impose a maximum length
157-
* or may choose to ignore the parameter altogther. The value provided
157+
* or may choose to ignore the parameter altogether. The value provided
158158
* should be greater than <code>0</code>. If it is less than or equal to
159159
* <code>0</code>, then an implementation specific default will be used.
160160
* <P>
@@ -238,7 +238,7 @@ protected SSLServerSocket(int port, int backlog, InetAddress address)
238238
* @see #getSupportedCipherSuites()
239239
* @see #getEnabledCipherSuites()
240240
*/
241-
public abstract void setEnabledCipherSuites(String suites []);
241+
public abstract void setEnabledCipherSuites(String[] suites);
242242

243243

244244
/**
@@ -309,7 +309,7 @@ protected SSLServerSocket(int port, int backlog, InetAddress address)
309309
* @see #getEnabledProtocols()
310310
* @see #getSupportedProtocols()
311311
*/
312-
public abstract void setEnabledProtocols(String protocols[]);
312+
public abstract void setEnabledProtocols(String[] protocols);
313313

314314

315315
/**
@@ -545,10 +545,8 @@ public void setSSLParameters(SSLParameters params) {
545545

546546
if (params.getNeedClientAuth()) {
547547
setNeedClientAuth(true);
548-
} else if (params.getWantClientAuth()) {
549-
setWantClientAuth(true);
550548
} else {
551-
setWantClientAuth(false);
549+
setWantClientAuth(params.getWantClientAuth());
552550
}
553551
}
554552

‎src/java.base/share/classes/javax/net/ssl/SSLSession.java

+22-22
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2020, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -70,7 +70,7 @@ public interface SSLSession {
7070
*
7171
* @return the Session identifier
7272
*/
73-
public byte[] getId();
73+
byte[] getId();
7474

7575

7676
/**
@@ -91,7 +91,7 @@ public interface SSLSession {
9191
* @return the session context used for this session, or null
9292
* if the context is unavailable.
9393
*/
94-
public SSLSessionContext getSessionContext();
94+
SSLSessionContext getSessionContext();
9595

9696

9797
/**
@@ -100,7 +100,7 @@ public interface SSLSession {
100100
*
101101
* @return the time this Session was created
102102
*/
103-
public long getCreationTime();
103+
long getCreationTime();
104104

105105

106106
/**
@@ -119,7 +119,7 @@ public interface SSLSession {
119119
*
120120
* @return the last time this Session was accessed
121121
*/
122-
public long getLastAccessedTime();
122+
long getLastAccessedTime();
123123

124124

125125
/**
@@ -132,7 +132,7 @@ public interface SSLSession {
132132
*
133133
* @see #isValid()
134134
*/
135-
public void invalidate();
135+
void invalidate();
136136

137137

138138
/**
@@ -144,7 +144,7 @@ public interface SSLSession {
144144
*
145145
* @since 1.5
146146
*/
147-
public boolean isValid();
147+
boolean isValid();
148148

149149

150150
/**
@@ -166,7 +166,7 @@ public interface SSLSession {
166166
* @param value the data object to be bound. This may not be null.
167167
* @throws IllegalArgumentException if either argument is null.
168168
*/
169-
public void putValue(String name, Object value);
169+
void putValue(String name, Object value);
170170

171171

172172
/**
@@ -181,7 +181,7 @@ public interface SSLSession {
181181
* not exist.
182182
* @throws IllegalArgumentException if the argument is null.
183183
*/
184-
public Object getValue(String name);
184+
Object getValue(String name);
185185

186186

187187
/**
@@ -198,7 +198,7 @@ public interface SSLSession {
198198
* across different access control contexts
199199
* @throws IllegalArgumentException if the argument is null.
200200
*/
201-
public void removeValue(String name);
201+
void removeValue(String name);
202202

203203

204204
/**
@@ -211,7 +211,7 @@ public interface SSLSession {
211211
* @return a non-null (possibly empty) array of names of the objects
212212
* bound to this Session.
213213
*/
214-
public String [] getValueNames();
214+
String [] getValueNames();
215215

216216
/**
217217
* Returns the identity of the peer which was established as part
@@ -231,7 +231,7 @@ public interface SSLSession {
231231
* been verified
232232
* @see #getPeerPrincipal()
233233
*/
234-
public java.security.cert.Certificate [] getPeerCertificates()
234+
java.security.cert.Certificate [] getPeerCertificates()
235235
throws SSLPeerUnverifiedException;
236236

237237
/**
@@ -254,7 +254,7 @@ public interface SSLSession {
254254
*
255255
* @see #getLocalPrincipal()
256256
*/
257-
public java.security.cert.Certificate [] getLocalCertificates();
257+
java.security.cert.Certificate [] getLocalCertificates();
258258

259259
/**
260260
* Returns the identity of the peer which was identified as part
@@ -291,7 +291,7 @@ public interface SSLSession {
291291
*/
292292
@SuppressWarnings("removal")
293293
@Deprecated(since="9", forRemoval=true)
294-
public default javax.security.cert.X509Certificate[]
294+
default javax.security.cert.X509Certificate[]
295295
getPeerCertificateChain() throws SSLPeerUnverifiedException {
296296
throw new UnsupportedOperationException(
297297
"This method is deprecated and marked for removal. Use the " +
@@ -314,7 +314,7 @@ public interface SSLSession {
314314
*
315315
* @since 1.5
316316
*/
317-
public Principal getPeerPrincipal()
317+
Principal getPeerPrincipal()
318318
throws SSLPeerUnverifiedException;
319319

320320
/**
@@ -330,7 +330,7 @@ public Principal getPeerPrincipal()
330330
*
331331
* @since 1.5
332332
*/
333-
public Principal getLocalPrincipal();
333+
Principal getLocalPrincipal();
334334

335335
/**
336336
* Returns the name of the SSL cipher suite which is used for all
@@ -342,7 +342,7 @@ public Principal getPeerPrincipal()
342342
*
343343
* @return the name of the session's cipher suite
344344
*/
345-
public String getCipherSuite();
345+
String getCipherSuite();
346346

347347
/**
348348
* Returns the standard name of the protocol used for all
@@ -353,7 +353,7 @@ public Principal getPeerPrincipal()
353353
* @return the standard name of the protocol used for all
354354
* connections in the session.
355355
*/
356-
public String getProtocol();
356+
String getProtocol();
357357

358358
/**
359359
* Returns the host name of the peer in this session.
@@ -373,7 +373,7 @@ public Principal getPeerPrincipal()
373373
* @return the host name of the peer host, or null if no information
374374
* is available.
375375
*/
376-
public String getPeerHost();
376+
String getPeerHost();
377377

378378
/**
379379
* Returns the port number of the peer in this session.
@@ -390,7 +390,7 @@ public Principal getPeerPrincipal()
390390
*
391391
* @since 1.5
392392
*/
393-
public int getPeerPort();
393+
int getPeerPort();
394394

395395
/**
396396
* Gets the current size of the largest SSL/TLS/DTLS packet that is
@@ -409,7 +409,7 @@ public Principal getPeerPrincipal()
409409
*
410410
* @since 1.5
411411
*/
412-
public int getPacketBufferSize();
412+
int getPacketBufferSize();
413413

414414

415415
/**
@@ -428,5 +428,5 @@ public Principal getPeerPrincipal()
428428
*
429429
* @since 1.5
430430
*/
431-
public int getApplicationBufferSize();
431+
int getApplicationBufferSize();
432432
}

‎src/java.base/share/classes/javax/net/ssl/SSLSessionBindingEvent.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2019, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -34,7 +34,7 @@
3434
* When a listener object is bound or unbound to an SSLSession by
3535
* {@link SSLSession#putValue(String, Object)}
3636
* or {@link SSLSession#removeValue(String)}, objects which
37-
* implement the SSLSessionBindingListener will be receive an
37+
* implement the SSLSessionBindingListener will receive an
3838
* event of this type. The event's <code>name</code> field is the
3939
* key in which the listener is being bound or unbound.
4040
*
@@ -55,7 +55,7 @@ class SSLSessionBindingEvent
5555
/**
5656
* @serial The name to which the object is being bound or unbound
5757
*/
58-
private String name;
58+
private final String name;
5959

6060
/**
6161
* Constructs a new SSLSessionBindingEvent.

‎src/java.base/share/classes/javax/net/ssl/SSLSessionBindingListener.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2001, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -53,7 +53,7 @@ interface SSLSessionBindingListener
5353
* @param event the event identifying the SSLSession into
5454
* which the listener is being bound.
5555
*/
56-
public void valueBound(SSLSessionBindingEvent event);
56+
void valueBound(SSLSessionBindingEvent event);
5757

5858
/**
5959
* This is called to notify the listener that it is being unbound
@@ -62,5 +62,5 @@ interface SSLSessionBindingListener
6262
* @param event the event identifying the SSLSession from
6363
* which the listener is being unbound.
6464
*/
65-
public void valueUnbound(SSLSessionBindingEvent event);
65+
void valueUnbound(SSLSessionBindingEvent event);
6666
}

‎src/java.base/share/classes/javax/net/ssl/SSLSessionContext.java

+7-9
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2019, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -69,7 +69,7 @@ public interface SSLSessionContext {
6969
*
7070
* @throws NullPointerException if <code>sessionId</code> is null.
7171
*/
72-
public SSLSession getSession(byte[] sessionId);
72+
SSLSession getSession(byte[] sessionId);
7373

7474
/**
7575
* Returns an Enumeration of all known session id's grouped under this
@@ -79,7 +79,7 @@ public interface SSLSessionContext {
7979
*
8080
* @return an enumeration of all the Session id's
8181
*/
82-
public Enumeration<byte[]> getIds();
82+
Enumeration<byte[]> getIds();
8383

8484
/**
8585
* Sets the timeout limit for <code>SSLSession</code> objects grouped
@@ -106,8 +106,7 @@ public interface SSLSessionContext {
106106
*
107107
* @see #getSessionTimeout
108108
*/
109-
public void setSessionTimeout(int seconds)
110-
throws IllegalArgumentException;
109+
void setSessionTimeout(int seconds);
111110

112111
/**
113112
* Returns the timeout limit of <code>SSLSession</code> objects grouped
@@ -131,7 +130,7 @@ public void setSessionTimeout(int seconds)
131130
*
132131
* @see #setSessionTimeout
133132
*/
134-
public int getSessionTimeout();
133+
int getSessionTimeout();
135134

136135
/**
137136
* Sets the size of the cache used for storing <code>SSLSession</code>
@@ -150,8 +149,7 @@ public void setSessionTimeout(int seconds)
150149
*
151150
* @see #getSessionCacheSize
152151
*/
153-
public void setSessionCacheSize(int size)
154-
throws IllegalArgumentException;
152+
void setSessionCacheSize(int size);
155153

156154
/**
157155
* Returns the size of the cache used for storing <code>SSLSession</code>
@@ -167,5 +165,5 @@ public void setSessionCacheSize(int size)
167165
*
168166
* @see #setSessionCacheSize
169167
*/
170-
public int getSessionCacheSize();
168+
int getSessionCacheSize();
171169
}

‎src/java.base/share/classes/javax/net/ssl/SSLSocket.java

+4-6
Original file line numberDiff line numberDiff line change
@@ -392,7 +392,7 @@ protected SSLSocket(InetAddress address, int port,
392392
* @see #getSupportedCipherSuites()
393393
* @see #getEnabledCipherSuites()
394394
*/
395-
public abstract void setEnabledCipherSuites(String suites []);
395+
public abstract void setEnabledCipherSuites(String[] suites);
396396

397397

398398
/**
@@ -433,12 +433,12 @@ protected SSLSocket(InetAddress address, int port,
433433
* when the protocols parameter is null.
434434
* @see #getEnabledProtocols()
435435
*/
436-
public abstract void setEnabledProtocols(String protocols[]);
436+
public abstract void setEnabledProtocols(String[] protocols);
437437

438438

439439
/**
440440
* Returns the SSL Session in use by this connection. These can
441-
* be long lived, and frequently correspond to an entire login session
441+
* be long-lived, and frequently correspond to an entire login session
442442
* for some user. The session specifies a particular cipher suite
443443
* which is being actively used by all connections in that session,
444444
* as well as the identities of the session's client and server.
@@ -744,10 +744,8 @@ public void setSSLParameters(SSLParameters params) {
744744
}
745745
if (params.getNeedClientAuth()) {
746746
setNeedClientAuth(true);
747-
} else if (params.getWantClientAuth()) {
748-
setWantClientAuth(true);
749747
} else {
750-
setWantClientAuth(false);
748+
setWantClientAuth(params.getWantClientAuth());
751749
}
752750
}
753751

‎src/java.base/share/classes/javax/net/ssl/SSLSocketFactory.java

+9-12
Original file line numberDiff line numberDiff line change
@@ -88,18 +88,15 @@ public static SocketFactory getDefault() {
8888

8989
@SuppressWarnings("removal")
9090
static String getSecurityProperty(final String name) {
91-
return AccessController.doPrivileged(new PrivilegedAction<>() {
92-
@Override
93-
public String run() {
94-
String s = java.security.Security.getProperty(name);
95-
if (s != null) {
96-
s = s.trim();
97-
if (s.isEmpty()) {
98-
s = null;
99-
}
91+
return AccessController.doPrivileged((PrivilegedAction<String>) () -> {
92+
String s = Security.getProperty(name);
93+
if (s != null) {
94+
s = s.trim();
95+
if (s.isEmpty()) {
96+
s = null;
10097
}
101-
return s;
10298
}
99+
return s;
103100
});
104101
}
105102

@@ -175,7 +172,7 @@ public abstract Socket createSocket(Socket s, String host,
175172
* underlying {@link InputStream} should be loaded into the
176173
* {@code consumed} stream before this method is called, perhaps
177174
* using a {@link java.io.ByteArrayInputStream}. When this
178-
* {@link Socket} begins handshaking, it will read all of the data in
175+
* {@link Socket} begins handshaking, it will read all the data in
179176
* {@code consumed} until it reaches {@code EOF}, then all further
180177
* data is read from the underlying {@link InputStream} as
181178
* usual.
@@ -256,7 +253,7 @@ private static void log(String msg) {
256253
// file private
257254
class DefaultSSLSocketFactory extends SSLSocketFactory
258255
{
259-
private Exception reason;
256+
private final Exception reason;
260257

261258
DefaultSSLSocketFactory(Exception reason) {
262259
this.reason = reason;

‎src/java.base/share/classes/javax/net/ssl/TrustManagerFactory.java

+8-13
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1999, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1999, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -54,13 +54,13 @@
5454
*/
5555
public class TrustManagerFactory {
5656
// The provider
57-
private Provider provider;
57+
private final Provider provider;
5858

5959
// The provider implementation (delegate)
60-
private TrustManagerFactorySpi factorySpi;
60+
private final TrustManagerFactorySpi factorySpi;
6161

6262
// The name of the trust management algorithm.
63-
private String algorithm;
63+
private final String algorithm;
6464

6565
/**
6666
* Obtains the default TrustManagerFactory algorithm name.
@@ -75,15 +75,10 @@ public class TrustManagerFactory {
7575
* implementation-specific default if no such property exists.
7676
*/
7777
@SuppressWarnings("removal")
78-
public static final String getDefaultAlgorithm() {
78+
public static String getDefaultAlgorithm() {
7979
String type;
80-
type = AccessController.doPrivileged(new PrivilegedAction<>() {
81-
@Override
82-
public String run() {
83-
return Security.getProperty(
84-
"ssl.TrustManagerFactory.algorithm");
85-
}
86-
});
80+
type = AccessController.doPrivileged((PrivilegedAction<String>) () ->
81+
Security.getProperty( "ssl.TrustManagerFactory.algorithm"));
8782
if (type == null) {
8883
type = "SunX509";
8984
}
@@ -137,7 +132,7 @@ public final String getAlgorithm() {
137132
* {@code jdk.security.provider.preferred}
138133
* {@link Security#getProperty(String) Security} property to determine
139134
* the preferred provider order for the specified algorithm. This
140-
* may be different than the order of providers returned by
135+
* may be different from the order of providers returned by
141136
* {@link Security#getProviders() Security.getProviders()}.
142137
*
143138
* @param algorithm the standard name of the requested trust management

‎src/java.base/share/classes/javax/net/ssl/X509KeyManager.java

+9-9
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1999, 2016, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1999, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -62,7 +62,7 @@ public interface X509KeyManager extends KeyManager {
6262
* @return an array of the matching alias names, or null if there
6363
* were no matches.
6464
*/
65-
public String[] getClientAliases(String keyType, Principal[] issuers);
65+
String[] getClientAliases(String keyType, Principal[] issuers);
6666

6767
/**
6868
* Choose an alias to authenticate the client side of a secure
@@ -80,8 +80,8 @@ public interface X509KeyManager extends KeyManager {
8080
* @return the alias name for the desired key, or null if there
8181
* are no matches.
8282
*/
83-
public String chooseClientAlias(String[] keyType, Principal[] issuers,
84-
Socket socket);
83+
String chooseClientAlias(String[] keyType, Principal[] issuers,
84+
Socket socket);
8585

8686
/**
8787
* Get the matching aliases for authenticating the server side of a secure
@@ -94,7 +94,7 @@ public String chooseClientAlias(String[] keyType, Principal[] issuers,
9494
* @return an array of the matching alias names, or null
9595
* if there were no matches.
9696
*/
97-
public String[] getServerAliases(String keyType, Principal[] issuers);
97+
String[] getServerAliases(String keyType, Principal[] issuers);
9898

9999
/**
100100
* Choose an alias to authenticate the server side of a secure
@@ -111,8 +111,8 @@ public String chooseClientAlias(String[] keyType, Principal[] issuers,
111111
* @return the alias name for the desired key, or null if there
112112
* are no matches.
113113
*/
114-
public String chooseServerAlias(String keyType, Principal[] issuers,
115-
Socket socket);
114+
String chooseServerAlias(String keyType, Principal[] issuers,
115+
Socket socket);
116116

117117
/**
118118
* Returns the certificate chain associated with the given alias.
@@ -122,13 +122,13 @@ public String chooseServerAlias(String keyType, Principal[] issuers,
122122
* and the root certificate authority last), or null
123123
* if the alias can't be found.
124124
*/
125-
public X509Certificate[] getCertificateChain(String alias);
125+
X509Certificate[] getCertificateChain(String alias);
126126

127127
/**
128128
* Returns the key associated with the given alias.
129129
*
130130
* @param alias the alias name
131131
* @return the requested key, or null if the alias can't be found.
132132
*/
133-
public PrivateKey getPrivateKey(String alias);
133+
PrivateKey getPrivateKey(String alias);
134134
}

‎src/java.base/share/classes/javax/net/ssl/X509TrustManager.java

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1999, 2005, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1999, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -55,7 +55,7 @@ public interface X509TrustManager extends TrustManager {
5555
* @throws CertificateException if the certificate chain is not trusted
5656
* by this TrustManager.
5757
*/
58-
public void checkClientTrusted(X509Certificate[] chain, String authType)
58+
void checkClientTrusted(X509Certificate[] chain, String authType)
5959
throws CertificateException;
6060

6161
/**
@@ -81,7 +81,7 @@ public void checkClientTrusted(X509Certificate[] chain, String authType)
8181
* @throws CertificateException if the certificate chain is not trusted
8282
* by this TrustManager.
8383
*/
84-
public void checkServerTrusted(X509Certificate[] chain, String authType)
84+
void checkServerTrusted(X509Certificate[] chain, String authType)
8585
throws CertificateException;
8686

8787
/**
@@ -91,5 +91,5 @@ public void checkServerTrusted(X509Certificate[] chain, String authType)
9191
* @return a non-null (possibly empty) array of acceptable
9292
* CA issuer certificates.
9393
*/
94-
public X509Certificate[] getAcceptedIssuers();
94+
X509Certificate[] getAcceptedIssuers();
9595
}

0 commit comments

Comments
 (0)
Please sign in to comment.