Author: markt
Date: Fri Jun 19 11:17:07 2015
New Revision: 1686385

URL: http://svn.apache.org/r1686385
Log:
Clean up the IDE warnings

Modified:
    
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/CipherSuiteConverter.java
    tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLContext.java
    tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/CipherSuiteConverter.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/openssl/CipherSuiteConverter.java?rev=1686385&r1=1686384&r2=1686385&view=diff
==============================================================================
--- 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/CipherSuiteConverter.java 
(original)
+++ 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/CipherSuiteConverter.java 
Fri Jun 19 11:17:07 2015
@@ -176,7 +176,7 @@ public final class CipherSuiteConverter
 
         // Cache the reverse mapping after stripping the protocol prefix (TLS_ 
or SSL_)
         final String javaCipherSuiteSuffix = javaCipherSuite.substring(4);
-        Map<String, String> p2j = new HashMap<String, String>(4);
+        Map<String, String> p2j = new HashMap<>(4);
         p2j.put("", javaCipherSuiteSuffix);
         p2j.put("SSL", "SSL_" + javaCipherSuiteSuffix);
         p2j.put("TLS", "TLS_" + javaCipherSuiteSuffix);
@@ -300,7 +300,7 @@ public final class CipherSuiteConverter
         final String javaCipherSuiteTls = "TLS_" + javaCipherSuiteSuffix;
 
         // Cache the mapping.
-        final Map<String, String> p2j = new HashMap<String, String>(4);
+        final Map<String, String> p2j = new HashMap<>(4);
         p2j.put("", javaCipherSuiteSuffix);
         p2j.put("SSL", javaCipherSuiteSsl);
         p2j.put("TLS", javaCipherSuiteTls);

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLContext.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLContext.java?rev=1686385&r1=1686384&r2=1686385&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLContext.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLContext.java 
Fri Jun 19 11:17:07 2015
@@ -452,7 +452,6 @@ public class OpenSSLContext implements o
     }
 
     @Override
-    @SuppressWarnings("FinalizeDeclaration")
     protected final void finalize() throws Throwable {
         super.finalize();
         synchronized (OpenSSLContext.class) {

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java?rev=1686385&r1=1686384&r2=1686385&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/openssl/OpenSSLEngine.java Fri 
Jun 19 11:17:07 2015
@@ -71,7 +71,7 @@ public final class OpenSSLEngine extends
     private static final Set<String> AVAILABLE_CIPHER_SUITES;
 
     static {
-        final Set<String> availableCipherSuites = new 
LinkedHashSet<String>(128);
+        final Set<String> availableCipherSuites = new LinkedHashSet<>(128);
         final long aprPool = Pool.create(0);
         try {
             final long sslCtx = SSLContext.make(aprPool, SSL.SSL_PROTOCOL_ALL, 
SSL.SSL_MODE_SERVER);
@@ -124,7 +124,8 @@ public final class OpenSSLEngine extends
         Constants.SSL_PROTO_TLSv1_1,
         Constants.SSL_PROTO_TLSv1_2
     };
-    private static final Set<String> SUPPORTED_PROTOCOLS_SET = new 
HashSet<String>(Arrays.asList(SUPPORTED_PROTOCOLS));
+    private static final Set<String> SUPPORTED_PROTOCOLS_SET =
+            new HashSet<>(Arrays.asList(SUPPORTED_PROTOCOLS));
 
     // Header (5) + Data (2^14) + Compression (1024) + Encryption (1024) + MAC 
(20) + Padding (256)
     static final int MAX_ENCRYPTED_PACKET_LENGTH = MAX_CIPHERTEXT_LENGTH + 5 + 
20 + 256;
@@ -155,7 +156,6 @@ public final class OpenSSLEngine extends
     private int accepted;
     private boolean handshakeFinished;
     private boolean receivedShutdown;
-    @SuppressWarnings("UnusedDeclaration")
     private volatile int destroyed;
 
     // Use an invalid cipherSuite until the handshake is completed
@@ -176,7 +176,6 @@ public final class OpenSSLEngine extends
     private final String fallbackApplicationProtocol;
     private final OpenSSLSessionContext sessionContext;
 
-    @SuppressWarnings("unused")
     private volatile SSLSession session;
 
     /**
@@ -257,7 +256,8 @@ public final class OpenSSLEngine extends
             }
         }
 
-        throw new 
IllegalStateException(sm.getString("engine.writeToSSLFailed", sslWrote));
+        throw new IllegalStateException(
+                sm.getString("engine.writeToSSLFailed", 
Integer.toString(sslWrote)));
     }
 
     /**
@@ -386,7 +386,9 @@ public final class OpenSSLEngine extends
         }
 
         if (offset >= srcs.length || offset + length > srcs.length) {
-            throw new 
IndexOutOfBoundsException(sm.getString("engine.invalidBufferArray", offset, 
length, srcs.length));
+            throw new 
IndexOutOfBoundsException(sm.getString("engine.invalidBufferArray",
+                    Integer.toString(offset), Integer.toString(length),
+                    Integer.toString(srcs.length)));
         }
 
         if (dst.isReadOnly()) {
@@ -491,7 +493,9 @@ public final class OpenSSLEngine extends
             throw new 
IllegalArgumentException(sm.getString("engine.nullBuffer"));
         }
         if (offset >= dsts.length || offset + length > dsts.length) {
-            throw new 
IndexOutOfBoundsException(sm.getString("engine.invalidBufferArray", offset, 
length, dsts.length));
+            throw new 
IndexOutOfBoundsException(sm.getString("engine.invalidBufferArray",
+                    Integer.toString(offset), Integer.toString(length),
+                    Integer.toString(dsts.length)));
         }
 
         int capacity = 0;
@@ -554,7 +558,8 @@ public final class OpenSSLEngine extends
                 if (error != SSL.SSL_ERROR_NONE) {
                     String err = SSL.getErrorString(error);
                     if (logger.isDebugEnabled()) {
-                        logger.debug(sm.getString("engine.readFromSSLFailed", 
error, lastPrimingReadResult, err));
+                        logger.debug(sm.getString("engine.readFromSSLFailed", 
Long.toString(error),
+                                Integer.toString(lastPrimingReadResult), err));
                     }
                     // There was an internal error -- shutdown
                     shutdown();
@@ -741,7 +746,7 @@ public final class OpenSSLEngine extends
 
     @Override
     public String[] getEnabledProtocols() {
-        List<String> enabled = new ArrayList<String>();
+        List<String> enabled = new ArrayList<>();
         // Seems like there is no way to explict disable SSLv2Hello in openssl 
so it is always enabled
         enabled.add(Constants.SSL_PROTO_SSLv2Hello);
         int opts = SSL.getOptions(ssl);
@@ -915,7 +920,7 @@ public final class OpenSSLEngine extends
                     Map<String, Object> values = this.values;
                     if (values == null) {
                         // Use size of 2 to keep the memory overhead small
-                        values = this.values = new HashMap<String, Object>(2);
+                        values = this.values = new HashMap<>(2);
                     }
                     Object old = values.put(name, value);
                     if (value instanceof SSLSessionBindingListener) {
@@ -1303,7 +1308,6 @@ public final class OpenSSLEngine extends
     }
 
     @Override
-    @SuppressWarnings("FinalizeDeclaration")
     protected void finalize() throws Throwable {
         super.finalize();
         // Call shutdown as the user may have created the OpenSslEngine and 
not used it at all.



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to