@@ -87,9 +87,9 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
8787 final Set <String > availableCipherSuites = new LinkedHashSet <>(128 );
8888 availableCipherSuites .addAll (OpenSSLLibrary .findCiphers ("ALL" ));
8989 AVAILABLE_CIPHER_SUITES = Collections .unmodifiableSet (availableCipherSuites );
90- IMPLEMENTED_PROTOCOLS_SET = Set . of ( Constants . SSL_PROTO_SSLv2Hello , Constants . SSL_PROTO_SSLv3 ,
91- Constants .SSL_PROTO_TLSv1 , Constants .SSL_PROTO_TLSv1_1 , Constants .SSL_PROTO_TLSv1_2 ,
92- Constants .SSL_PROTO_TLSv1_3 );
90+ IMPLEMENTED_PROTOCOLS_SET =
91+ Set . of ( Constants .SSL_PROTO_SSLv2Hello , Constants .SSL_PROTO_SSLv3 , Constants .SSL_PROTO_TLSv1 ,
92+ Constants . SSL_PROTO_TLSv1_1 , Constants . SSL_PROTO_TLSv1_2 , Constants .SSL_PROTO_TLSv1_3 );
9393 }
9494
9595 private static final int MAX_PLAINTEXT_LENGTH = 16 * 1024 ; // 2^14
@@ -185,8 +185,8 @@ private enum PHAState {
185185 */
186186 OpenSSLEngine (Cleaner cleaner , MemorySegment sslCtx , String fallbackApplicationProtocol , boolean clientMode ,
187187 OpenSSLSessionContext sessionContext , boolean alpn , boolean initialized , int certificateVerificationDepth ,
188- boolean certificateVerificationOptionalNoCA , boolean noOcspCheck , boolean ocspSoftFail ,
189- int ocspTimeout , int ocspVerifyFlags ) {
188+ boolean certificateVerificationOptionalNoCA , boolean noOcspCheck , boolean ocspSoftFail , int ocspTimeout ,
189+ int ocspVerifyFlags ) {
190190 if (sslCtx == null ) {
191191 throw new IllegalArgumentException (sm .getString ("engine.noSSLContext" ));
192192 }
@@ -832,8 +832,8 @@ private byte[] getPeerCertificate() {
832832 try (var localArena = Arena .ofConfined ()) {
833833 // Use the new SSL_get0_peer_certificate call for OpenSSL 3+ to avoid having to call free
834834 MemorySegment /* (X509*) */ x509 =
835- (openssl_h_Compatibility .OPENSSL3 ) ? SSL_get0_peer_certificate (state .ssl )
836- : openssl_h_Compatibility .SSL_get_peer_certificate (state .ssl );
835+ (openssl_h_Compatibility .OPENSSL3 ) ? SSL_get0_peer_certificate (state .ssl ) :
836+ openssl_h_Compatibility .SSL_get_peer_certificate (state .ssl );
837837 MemorySegment bufPointer = localArena .allocateFrom (ValueLayout .ADDRESS , MemorySegment .NULL );
838838 int length = i2d_X509 (x509 , bufPointer );
839839 if (length <= 0 ) {
@@ -1145,7 +1145,8 @@ public int apply(int preverify_ok, MemorySegment /* X509_STORE_CTX */ x509ctx) {
11451145 (errnum == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN ()) ||
11461146 (errnum == X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY ()) ||
11471147 (errnum == X509_V_ERR_CERT_UNTRUSTED ()) || (errnum == X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE ());
1148- if ((verifyErrorIsOptional || errnum == X509_V_OK ()) && (state .certificateVerifyMode == OpenSSLContext .OPTIONAL_NO_CA )) {
1148+ if ((verifyErrorIsOptional || errnum == X509_V_OK ()) &&
1149+ (state .certificateVerifyMode == OpenSSLContext .OPTIONAL_NO_CA )) {
11491150 ok = 1 ;
11501151 openssl_h_Compatibility .SSL_set_verify_result (state .ssl , X509_V_OK ());
11511152 }
@@ -1247,7 +1248,8 @@ private static int processOCSP(EngineState state, MemorySegment /* X509_STORE_CT
12471248 for (String urlString : urls ) {
12481249 try {
12491250 URL url = (new URI (urlString )).toURL ();
1250- ocspResponse = processOCSPRequest (state , url , issuer , x509 , x509ctx , localArena );
1251+ ocspResponse =
1252+ processOCSPRequest (state , url , issuer , x509 , x509ctx , localArena );
12511253 if (log .isDebugEnabled ()) {
12521254 log .debug (sm .getString ("engine.ocspResponse" , urlString ,
12531255 Integer .toString (ocspResponse )));
@@ -1376,7 +1378,8 @@ private static int processOCSPRequest(EngineState state, URL url, MemorySegment
13761378 return V_OCSP_CERTSTATUS_UNKNOWN ();
13771379 }
13781380 MemorySegment certStack = OCSP_resp_get0_certs (basicResponse );
1379- if (OCSP_basic_verify (basicResponse , certStack , X509_STORE_CTX_get0_store (x509ctx ), state .ocspVerifyFlags ) <= 0 ) {
1381+ if (OCSP_basic_verify (basicResponse , certStack , X509_STORE_CTX_get0_store (x509ctx ),
1382+ state .ocspVerifyFlags ) <= 0 ) {
13801383 X509_STORE_CTX_set_error (x509ctx , X509_V_ERR_OCSP_SIGNATURE_FAILURE ());
13811384 return V_OCSP_CERTSTATUS_UNKNOWN ();
13821385 }
0 commit comments