--- a/jdk/src/share/classes/sun/security/ssl/SSLContextImpl.java Sat Nov 24 03:34:27 2012 -0800
+++ b/jdk/src/share/classes/sun/security/ssl/SSLContextImpl.java Sat Nov 24 04:09:19 2012 -0800
@@ -71,6 +71,7 @@
serverCache = new SSLSessionContextImpl();
}
+ @Override
protected void engineInit(KeyManager[] km, TrustManager[] tm,
SecureRandom sr) throws KeyManagementException {
isInitialized = false;
@@ -177,6 +178,7 @@
return DummyX509KeyManager.INSTANCE;
}
+ @Override
protected SSLSocketFactory engineGetSocketFactory() {
if (!isInitialized) {
throw new IllegalStateException(
@@ -185,6 +187,7 @@
return new SSLSocketFactoryImpl(this);
}
+ @Override
protected SSLServerSocketFactory engineGetServerSocketFactory() {
if (!isInitialized) {
throw new IllegalStateException("SSLContext is not initialized");
@@ -192,6 +195,7 @@
return new SSLServerSocketFactoryImpl(this);
}
+ @Override
protected SSLEngine engineCreateSSLEngine() {
if (!isInitialized) {
throw new IllegalStateException(
@@ -200,6 +204,7 @@
return new SSLEngineImpl(this);
}
+ @Override
protected SSLEngine engineCreateSSLEngine(String host, int port) {
if (!isInitialized) {
throw new IllegalStateException(
@@ -208,10 +213,12 @@
return new SSLEngineImpl(this, host, port);
}
+ @Override
protected SSLSessionContext engineGetClientSessionContext() {
return clientCache;
}
+ @Override
protected SSLSessionContext engineGetServerSessionContext() {
return serverCache;
}
@@ -463,14 +470,17 @@
}
}
+ @Override
SSLParameters getDefaultServerSSLParams() {
return defaultServerSSLParams;
}
+ @Override
SSLParameters getDefaultClientSSLParams() {
return defaultClientSSLParams;
}
+ @Override
SSLParameters getSupportedSSLParams() {
return supportedSSLParams;
}
@@ -506,6 +516,7 @@
}
}
+ @Override
protected void engineInit(KeyManager[] km, TrustManager[] tm,
SecureRandom sr) throws KeyManagementException {
throw new KeyManagementException
@@ -544,6 +555,7 @@
final Map<String,String> props = new HashMap<>();
AccessController.doPrivileged(
new PrivilegedExceptionAction<Object>() {
+ @Override
public Object run() throws Exception {
props.put("keyStore", System.getProperty(
"javax.net.ssl.keyStore", ""));
@@ -583,6 +595,7 @@
!NONE.equals(defaultKeyStore)) {
fs = AccessController.doPrivileged(
new PrivilegedExceptionAction<FileInputStream>() {
+ @Override
public FileInputStream run() throws Exception {
return new FileInputStream(defaultKeyStore);
}
@@ -697,14 +710,17 @@
}
}
+ @Override
SSLParameters getDefaultServerSSLParams() {
return defaultServerSSLParams;
}
+ @Override
SSLParameters getDefaultClientSSLParams() {
return defaultClientSSLParams;
}
+ @Override
SSLParameters getSupportedSSLParams() {
return supportedSSLParams;
}
@@ -761,14 +777,17 @@
}
}
+ @Override
SSLParameters getDefaultServerSSLParams() {
return defaultServerSSLParams;
}
+ @Override
SSLParameters getDefaultClientSSLParams() {
return defaultClientSSLParams;
}
+ @Override
SSLParameters getSupportedSSLParams() {
return supportedSSLParams;
}
@@ -1041,28 +1060,34 @@
this.km = km;
}
+ @Override
public String[] getClientAliases(String keyType, Principal[] issuers) {
return km.getClientAliases(keyType, issuers);
}
+ @Override
public String chooseClientAlias(String[] keyType, Principal[] issuers,
Socket socket) {
return km.chooseClientAlias(keyType, issuers, socket);
}
+ @Override
public String[] getServerAliases(String keyType, Principal[] issuers) {
return km.getServerAliases(keyType, issuers);
}
+ @Override
public String chooseServerAlias(String keyType, Principal[] issuers,
Socket socket) {
return km.chooseServerAlias(keyType, issuers, socket);
}
+ @Override
public X509Certificate[] getCertificateChain(String alias) {
return km.getCertificateChain(alias);
}
+ @Override
public PrivateKey getPrivateKey(String alias) {
return km.getPrivateKey(alias);
}
@@ -1087,6 +1112,7 @@
* socket given the public key type and the list of
* certificate issuer authorities recognized by the peer (if any).
*/
+ @Override
public String[] getClientAliases(String keyType, Principal[] issuers) {
return null;
}
@@ -1096,6 +1122,7 @@
* socket given the public key type and the list of
* certificate issuer authorities recognized by the peer (if any).
*/
+ @Override
public String chooseClientAlias(String[] keyTypes, Principal[] issuers,
Socket socket) {
return null;
@@ -1106,6 +1133,7 @@
* engine given the public key type and the list of
* certificate issuer authorities recognized by the peer (if any).
*/
+ @Override
public String chooseEngineClientAlias(
String[] keyTypes, Principal[] issuers, SSLEngine engine) {
return null;
@@ -1116,6 +1144,7 @@
* socket given the public key type and the list of
* certificate issuer authorities recognized by the peer (if any).
*/
+ @Override
public String[] getServerAliases(String keyType, Principal[] issuers) {
return null;
}
@@ -1125,6 +1154,7 @@
* socket given the public key type and the list of
* certificate issuer authorities recognized by the peer (if any).
*/
+ @Override
public String chooseServerAlias(String keyType, Principal[] issuers,
Socket socket) {
return null;
@@ -1135,6 +1165,7 @@
* given the public key type and the list of
* certificate issuer authorities recognized by the peer (if any).
*/
+ @Override
public String chooseEngineServerAlias(
String keyType, Principal[] issuers, SSLEngine engine) {
return null;
@@ -1148,6 +1179,7 @@
* @return the certificate chain (ordered with the user's certificate first
* and the root certificate authority last)
*/
+ @Override
public X509Certificate[] getCertificateChain(String alias) {
return null;
}
@@ -1160,6 +1192,7 @@
*
* @return the requested key
*/
+ @Override
public PrivateKey getPrivateKey(String alias) {
return null;
}