]> WPIA git - gigi.git/commitdiff
upd: whitespace changes (formatting)
authorFelix Dörre <felix@dogcraft.de>
Mon, 27 Jun 2016 22:07:42 +0000 (00:07 +0200)
committerFelix Dörre <felix@dogcraft.de>
Mon, 27 Jun 2016 22:16:33 +0000 (00:16 +0200)
.. to make all source files comply with committed formatter settings

Change-Id: Iac4c831a1d71da206936727221d83c8e09d2cc7d

19 files changed:
src/org/cacert/gigi/Gigi.java
src/org/cacert/gigi/Launcher.java
src/org/cacert/gigi/crypto/SMIME.java
src/org/cacert/gigi/dbObjects/DomainPingType.java
src/org/cacert/gigi/email/EmailProvider.java
src/org/cacert/gigi/pages/account/certs/CertificateAdd.java
src/org/cacert/gigi/ping/SSLPinger.java
src/org/cacert/gigi/util/DNSUtil.java
src/org/cacert/gigi/util/PasswordHash.java
tests/com/lambdaworks/crypto/test/CryptoTestUtil.java
tests/com/lambdaworks/crypto/test/PBKDFTest.java
tests/com/lambdaworks/crypto/test/SCryptTest.java
tests/com/lambdaworks/crypto/test/SCryptUtilTest.java
tests/org/cacert/gigi/email/TestEmailProviderClass.java
tests/org/cacert/gigi/pages/account/TestCertificateAdd.java
tests/org/cacert/gigi/pages/account/TestChangePassword.java
tests/org/cacert/gigi/ping/TestSSL.java
tests/org/cacert/gigi/testUtils/ManagedTest.java
util/org/cacert/gigi/util/FetchLocales.java

index 578c1353f9cb456934b9f4a88d9f4281441a2b8e..5470c271de17388183c193471894ee3c92a2c4ac 100644 (file)
@@ -330,10 +330,9 @@ public final class Gigi extends HttpServlet {
         // it always
         String originHeader = req.getHeader("Origin");
         if (originHeader != null //
-                &&
-                !(originHeader.matches("^" + Pattern.quote("https://" + ServerConstants.getWwwHostNamePortSecure()) + "(/.*|)") || //
+                && !(originHeader.matches("^" + Pattern.quote("https://" + ServerConstants.getWwwHostNamePortSecure()) + "(/.*|)") || //
                         originHeader.matches("^" + Pattern.quote("http://" + ServerConstants.getWwwHostNamePort()) + "(/.*|)") || //
-                originHeader.matches("^" + Pattern.quote("https://" + ServerConstants.getSecureHostNamePort()) + "(/.*|)"))) {
+                        originHeader.matches("^" + Pattern.quote("https://" + ServerConstants.getSecureHostNamePort()) + "(/.*|)"))) {
             resp.setContentType("text/html; charset=utf-8");
             resp.getWriter().println("<html><head><title>Alert</title></head><body>No cross domain access allowed.<br/><b>If you don't know why you're seeing this you may have been fished! Please change your password immediately!</b></body></html>");
             return;
index 763c21b4464ec893ff05088b82303fb6f6d96281..7bf5bd119554387739d8b07a2647342cde3f82df 100644 (file)
@@ -137,7 +137,7 @@ public class Launcher {
         if (conf.getMainProps().getProperty("proxy", "false").equals("true")) {
             httpConfig.addCustomizer(new ExtendedForwarded());
             s.setConnectors(new Connector[] {
-                ConnectorsLauncher.createConnector(conf, s, httpConfig, false)
+                    ConnectorsLauncher.createConnector(conf, s, httpConfig, false)
             });
         } else {
             HttpConfiguration httpsConfig = createHttpConfiguration();
@@ -286,11 +286,11 @@ public class Launcher {
 
             ContextHandler ch = generateGigiServletContext(webAppServlet);
             ch.setVirtualHosts(new String[] {
-                ServerConstants.getWwwHostName()
+                    ServerConstants.getWwwHostName()
             });
             ContextHandler chSecure = generateGigiServletContext(webAppServlet);
             chSecure.setVirtualHosts(new String[] {
-                ServerConstants.getSecureHostName()
+                    ServerConstants.getSecureHostName()
             });
 
             HandlerList hl = new HandlerList();
@@ -332,7 +332,7 @@ public class Launcher {
             ContextHandler ch = new ContextHandler();
             ch.setHandler(rh);
             ch.setVirtualHosts(new String[] {
-                ServerConstants.getStaticHostName()
+                    ServerConstants.getStaticHostName()
             });
 
             return ch;
@@ -355,7 +355,7 @@ public class Launcher {
             ServletContextHandler sch = new ServletContextHandler();
 
             sch.addVirtualHosts(new String[] {
-                ServerConstants.getApiHostName()
+                    ServerConstants.getApiHostName()
             });
             sch.addServlet(new ServletHolder(new GigiAPI()), "/*");
             return sch;
index f37fbe8a17b428202430fcb27dc5a5bc5acde764..321a4df63a987af9f53193838af6839e68770b3f 100644 (file)
@@ -62,11 +62,11 @@ public class SMIME {
 
         // Create PKCS7 Signed data
         PKCS7 p7 = new PKCS7(new AlgorithmId[] {
-            new AlgorithmId(AlgorithmId.SHA_oid)
+                new AlgorithmId(AlgorithmId.SHA_oid)
         }, cInfo, new java.security.cert.X509Certificate[] {
-            c
+                c
         }, new SignerInfo[] {
-            sInfo
+                sInfo
         });
 
         ByteArrayOutputStream bOut = new DerOutputStream();
index 8c3a0722b8e1374d25ccb38faa3cd0e59aa01e68..fcef3ce18790f0e8425b8ec4a5407b6c6fc46850 100644 (file)
@@ -2,4 +2,4 @@ package org.cacert.gigi.dbObjects;
 
 public enum DomainPingType {
     EMAIL, DNS, HTTP, SSL;
-}
\ No newline at end of file
+}
index a32031187525f853b0306668b4b434ff739df4c9..b66ba3f9aa71bcc88f7b1b6247a55063d3070d05 100644 (file)
@@ -93,7 +93,8 @@ public abstract class EmailProvider {
                 } else {
                     return "Strange MX records.";
                 }
-                try (Socket s = new Socket(host, 25); BufferedReader br0 = new BufferedReader(new InputStreamReader(s.getInputStream(), "UTF-8"));//
+                try (Socket s = new Socket(host, 25);
+                        BufferedReader br0 = new BufferedReader(new InputStreamReader(s.getInputStream(), "UTF-8"));//
                         PrintWriter pw0 = new PrintWriter(new OutputStreamWriter(s.getOutputStream(), "UTF-8"))) {
                     BufferedReader br = br0;
                     PrintWriter pw = pw0;
index fa3c1456536677cb19a591d24ccc6a50384b1f7b..e37b930cd040a835e7baca178f4d490c4115c7f7 100644 (file)
@@ -43,7 +43,7 @@ public class CertificateAdd extends Page {
             }
             resp.sendRedirect(Certificates.PATH + "/" + ser);
         }
-        f.output(resp.getWriter(), getLanguage(req), Collections.<String,Object>emptyMap());
+        f.output(resp.getWriter(), getLanguage(req), Collections.<String, Object>emptyMap());
 
     }
 
index 505a6b349767a3856aec5504413016e554aa16ba..71612920b88cb2b809868f5a439992b8a2c0366c 100644 (file)
@@ -168,24 +168,24 @@ public class SSLPinger extends DomainPinger {
                 TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509");
                 tmf.init(truststore);
                 sc.init(null, new TrustManager[] {
-                    new X509TrustManager() {
+                        new X509TrustManager() {
 
-                        @Override
-                        public java.security.cert.X509Certificate[] getAcceptedIssuers() {
-                            return null;
-                        }
+                            @Override
+                            public java.security.cert.X509Certificate[] getAcceptedIssuers() {
+                                return null;
+                            }
 
-                        @Override
-                        public void checkServerTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {
-                            java.security.cert.X509Certificate c = chain[0];
-                            if ( !c.getExtendedKeyUsage().contains("1.3.6.1.5.5.7.3.1")) {
-                                throw new java.security.cert.CertificateException("Illegal EKU");
+                            @Override
+                            public void checkServerTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {
+                                java.security.cert.X509Certificate c = chain[0];
+                                if ( !c.getExtendedKeyUsage().contains("1.3.6.1.5.5.7.3.1")) {
+                                    throw new java.security.cert.CertificateException("Illegal EKU");
+                                }
                             }
-                        }
 
-                        @Override
-                        public void checkClientTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {}
-                    }
+                            @Override
+                            public void checkClientTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {}
+                        }
                 }, new SecureRandom());
             } catch (KeyManagementException e) {
                 e.printStackTrace();
index f1d5f9f3a86f9415aed483486ae857c5764c9dc2..31fb1d6e2e88e00cc855e554cf520f748142cd4f 100644 (file)
@@ -25,7 +25,7 @@ public class DNSUtil {
 
     public static String[] getNSNames(String name) throws NamingException {
         Attributes dnsLookup = context.getAttributes(name, new String[] {
-            "NS"
+                "NS"
         });
         return extractTextEntries(dnsLookup.get("NS"));
     }
@@ -39,7 +39,7 @@ public class DNSUtil {
         try {
 
             Attributes dnsLookup = context.getAttributes(name, new String[] {
-                "TXT"
+                    "TXT"
             });
             return extractTextEntries(dnsLookup.get("TXT"));
         } finally {
@@ -61,7 +61,7 @@ public class DNSUtil {
 
     public static String[] getMXEntries(String domain) throws NamingException {
         Attributes dnsLookup = context.getAttributes(domain, new String[] {
-            "MX"
+                "MX"
         });
         return extractTextEntries(dnsLookup.get("MX"));
     }
index 4de92440dff10febe39a14ac31595c5e9e4446aa..6d598e77575f706fb8d6804eb9dcab748394b408 100644 (file)
@@ -15,7 +15,8 @@ public class PasswordHash {
      *            The password that should result in the given hash.
      * @param hash
      *            The hash to verify the password against.
-     * @return <ul>
+     * @return
+     *         <ul>
      *         <li><code>null</code>, if the password was valid</li>
      *         <li><code>hash</code>, if the password is valid and the hash
      *         doesn't need to be updated</li>
index 418c5f9e04614b425fd75fce7a9cb51b4fadbf63..9b1e7bbbbc1fce1022b6dbb5748c6615a9980697 100644 (file)
@@ -1,8 +1,9 @@
-// Copyright (C) 2011 - Will Glozer.  All rights reserved.
+// Copyright (C) 2011 - Will Glozer. All rights reserved.
 
 package com.lambdaworks.crypto.test;
 
 public class CryptoTestUtil {
+
     public static byte[] decode(String str) {
         byte[] bytes = new byte[str.length() / 2];
         int index = 0;
index 92a08b624238c9478f53130515f0cc9b7243895c..001a6228407cff8994a1cb264d5f5e0b95350265 100644 (file)
@@ -1,4 +1,4 @@
-// Copyright (C) 2011 - Will Glozer.  All rights reserved.
+// Copyright (C) 2011 - Will Glozer. All rights reserved.
 
 package com.lambdaworks.crypto.test;
 
@@ -11,6 +11,7 @@ import static org.junit.Assert.*;
 import static com.lambdaworks.crypto.test.CryptoTestUtil.*;
 
 public class PBKDFTest {
+
     @Test
     public void pbkdf2_hmac_sha1_rfc6070() throws Exception {
         String alg = "HmacSHA1";
index bd34bb2efae9f9dc0e9493c0ac0b9d870ffadfae..fe2242f0b9eec5b7da879613689c2b9ab2499bec 100644 (file)
@@ -1,4 +1,4 @@
-// Copyright (C) 2011 - Will Glozer.  All rights reserved.
+// Copyright (C) 2011 - Will Glozer. All rights reserved.
 
 package com.lambdaworks.crypto.test;
 
@@ -10,6 +10,7 @@ import static com.lambdaworks.crypto.test.CryptoTestUtil.*;
 import static com.lambdaworks.crypto.SCrypt.*;
 
 public class SCryptTest {
+
     @Test
     public void scrypt_paper_appendix_b() throws Exception {
         byte[] P, S;
@@ -67,18 +68,18 @@ public class SCryptTest {
     public void scrypt_invalid_N_large() throws Exception {
         byte[] P = "pleaseletmein".getBytes("UTF-8");
         byte[] S = "SodiumChloride".getBytes("UTF-8");
-        int    r = 8;
-        int    N = Integer.MAX_VALUE / 128;
+        int r = 8;
+        int N = Integer.MAX_VALUE / 128;
         scrypt(P, S, N, r, 1, 64);
     }
 
-//    @Test(expected = IllegalArgumentException.class)
-//    public void scrypt_invalid_r_large() throws Exception {
-//        byte[] P = "pleaseletmein".getBytes("UTF-8");
-//        byte[] S = "SodiumChloride".getBytes("UTF-8");
-//        int    N = 1024;
-//        int    r = Integer.MAX_VALUE / 128 + 1;
-//        int    p = 0;
-//        scrypt(P, S, N, r, p, 64);
-//    }
+    // @Test(expected = IllegalArgumentException.class)
+    // public void scrypt_invalid_r_large() throws Exception {
+    // byte[] P = "pleaseletmein".getBytes("UTF-8");
+    // byte[] S = "SodiumChloride".getBytes("UTF-8");
+    // int N = 1024;
+    // int r = Integer.MAX_VALUE / 128 + 1;
+    // int p = 0;
+    // scrypt(P, S, N, r, p, 64);
+    // }
 }
index 2691a826e9e3a51ea46b1423f787face20fd2ec5..cac9c436f47eb62460216d188371028387793181 100644 (file)
@@ -1,4 +1,4 @@
-// Copyright (C) 2011 - Will Glozer.  All rights reserved.
+// Copyright (C) 2011 - Will Glozer. All rights reserved.
 
 package com.lambdaworks.crypto.test;
 
@@ -12,6 +12,7 @@ import org.junit.Test;
 import static org.junit.Assert.*;
 
 public class SCryptUtilTest {
+
     String passwd = "secret";
 
     @Test
index 2b470f767c2c4040c201604f2ee9ecd43baf0a8b..3b38bc2646730cbc5fab25d5949e5c42a5edd0b8 100644 (file)
@@ -51,23 +51,23 @@ public class TestEmailProviderClass extends ConfiguredTest {
         EmailProvider.initSystem(prop, null, null);
         SSLContext c = SSLContext.getInstance("TLS");
         c.init(null, new TrustManager[] {
-            new X509TrustManager() {
+                new X509TrustManager() {
 
-                @Override
-                public X509Certificate[] getAcceptedIssuers() {
-                    return null;
-                }
+                    @Override
+                    public X509Certificate[] getAcceptedIssuers() {
+                        return null;
+                    }
 
-                @Override
-                public void checkClientTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
+                    @Override
+                    public void checkClientTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
 
                 }
 
-                @Override
-                public void checkServerTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
+                    @Override
+                    public void checkServerTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
 
                 }
-            }
+                }
         }, null);
         SSLContext.setDefault(c);
     }
index 401d883826b51272c3467b401d1c152fbc3fceaa..57a5e634c8d10585bba4312936bbfcb601441a7f 100644 (file)
@@ -68,7 +68,7 @@ public class TestCertificateAdd extends ClientTest {
     @Test
     public void testSimpleServer() throws IOException, GeneralSecurityException {
         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
-            CertificateRequest.OID_KEY_USAGE_SSL_SERVER
+                CertificateRequest.OID_KEY_USAGE_SSL_SERVER
         }, new DNSName(uniq + ".tld"));
 
         String pem = generatePEMCSR(kp, "CN=a." + uniq + ".tld", atts);
@@ -82,7 +82,7 @@ public class TestCertificateAdd extends ClientTest {
     @Test
     public void testSimpleMail() throws IOException, GeneralSecurityException {
         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
-            CertificateRequest.OID_KEY_USAGE_EMAIL_PROTECTION
+                CertificateRequest.OID_KEY_USAGE_EMAIL_PROTECTION
         }, new DNSName("a." + uniq + ".tld"), new DNSName("b." + uniq + ".tld"), new RFC822Name(email));
 
         String pem = generatePEMCSR(kp, "CN=a b", atts, "SHA384WithRSA");
@@ -96,7 +96,7 @@ public class TestCertificateAdd extends ClientTest {
     @Test
     public void testSimpleClient() throws IOException, GeneralSecurityException {
         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
-            CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
+                CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
         }, new RFC822Name(email));
 
         String pem = generatePEMCSR(kp, "CN=a b,email=" + email, atts, "SHA512WithRSA");
@@ -116,7 +116,7 @@ public class TestCertificateAdd extends ClientTest {
     @Test
     public void testIssue() throws IOException, GeneralSecurityException {
         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
-            CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
+                CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
         }, new RFC822Name(email));
 
         String pem = generatePEMCSR(kp, "CN=a b,email=" + email, atts, "SHA512WithRSA");
@@ -243,7 +243,7 @@ public class TestCertificateAdd extends ClientTest {
 
     private X509Certificate createCertWithValidity(String validity) throws IOException, GeneralSecurityException, UnsupportedEncodingException, MalformedURLException, CertificateException {
         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
-            CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
+                CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
         }, new RFC822Name(email));
 
         String pem = generatePEMCSR(kp, "CN=a b", atts, "SHA512WithRSA");
@@ -310,7 +310,7 @@ public class TestCertificateAdd extends ClientTest {
         }
         attributeValue.set("SANs", new SubjectAlternativeNameExtension(names));
         PKCS10Attributes atts = new PKCS10Attributes(new PKCS10Attribute[] {
-            new PKCS10Attribute(PKCS9Attribute.EXTENSION_REQUEST_OID, attributeValue)
+                new PKCS10Attribute(PKCS9Attribute.EXTENSION_REQUEST_OID, attributeValue)
         });
         ExtendedKeyUsageExtension eku = new ExtendedKeyUsageExtension(//
                 new Vector<>(Arrays.<ObjectIdentifier>asList(ekuOIDs)));
index 89d318e6e54e06c89fd0b8105fb366d75e395759..9601842631a1b639e730233458d43e6c87b7993a 100644 (file)
@@ -34,9 +34,10 @@ public class TestChangePassword extends ClientTest {
 
     @Test
     public void testChangePasswordWeb() throws IOException {
-        String error = executeBasicWebInteraction(cookie, path, "oldpassword=" + URLEncoder.encode(TEST_PASSWORD, "UTF-8") //
-                + "&pword1=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8")//
-                + "&pword2=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8"));
+        String error = executeBasicWebInteraction(cookie, path,
+                "oldpassword=" + URLEncoder.encode(TEST_PASSWORD, "UTF-8") //
+                        + "&pword1=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8")//
+                        + "&pword2=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8"));
         assertNull(error);
         assertTrue(isLoggedin(login(u.getEmail(), TEST_PASSWORD + "v2")));
         assertFalse(isLoggedin(login(u.getEmail(), TEST_PASSWORD)));
@@ -45,9 +46,10 @@ public class TestChangePassword extends ClientTest {
 
     @Test
     public void testChangePasswordWebOldWrong() throws IOException {
-        String error = executeBasicWebInteraction(cookie, path, "oldpassword=a" + URLEncoder.encode(TEST_PASSWORD, "UTF-8") //
-                + "&pword1=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8")//
-                + "&pword2=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8"));
+        String error = executeBasicWebInteraction(cookie, path,
+                "oldpassword=a" + URLEncoder.encode(TEST_PASSWORD, "UTF-8") //
+                        + "&pword1=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8")//
+                        + "&pword2=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8"));
         assertNotNull(error);
         assertFalse(isLoggedin(login(u.getEmail(), TEST_PASSWORD + "v2")));
         assertTrue(isLoggedin(login(u.getEmail(), TEST_PASSWORD)));
@@ -56,9 +58,10 @@ public class TestChangePassword extends ClientTest {
 
     @Test
     public void testChangePasswordWebNewWrong() throws IOException {
-        String error = executeBasicWebInteraction(cookie, path, "oldpassword=" + URLEncoder.encode(TEST_PASSWORD, "UTF-8") //
-                + "&pword1=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8")//
-                + "&pword2=a" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8"));
+        String error = executeBasicWebInteraction(cookie, path,
+                "oldpassword=" + URLEncoder.encode(TEST_PASSWORD, "UTF-8") //
+                        + "&pword1=" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8")//
+                        + "&pword2=a" + URLEncoder.encode(TEST_PASSWORD + "v2", "UTF-8"));
         assertNotNull(error);
         assertFalse(isLoggedin(login(u.getEmail(), TEST_PASSWORD + "v2")));
         assertTrue(isLoggedin(login(u.getEmail(), TEST_PASSWORD)));
index ab41ca510a11014f5adaefb5dda3469c533cb4a1..34c8d297a7f829838e6e292ed6b4218f28fbef36 100644 (file)
@@ -59,9 +59,9 @@ public class TestSSL extends PingTest {
     @Parameters(name = "self-signed = {0}")
     public static Iterable<Object[]> genParams() throws IOException {
         return Arrays.asList(new Object[] {
-            true
+                true
         }, new Object[] {
-            false
+                false
         });
 
     }
@@ -258,57 +258,57 @@ public class TestSSL extends PingTest {
         try {
             sc = SSLContext.getInstance("SSL");
             sc.init(new KeyManager[] {
-                new X509KeyManager() {
+                    new X509KeyManager() {
+
+                        @Override
+                        public String[] getServerAliases(String keyType, Principal[] issuers) {
+                            return new String[] {
+                                    "server"
+                            };
+                        }
+
+                        @Override
+                        public PrivateKey getPrivateKey(String alias) {
+                            return priv;
+                        }
+
+                        @Override
+                        public String[] getClientAliases(String keyType, Principal[] issuers) {
+                            throw new Error();
+                        }
+
+                        @Override
+                        public X509Certificate[] getCertificateChain(String alias) {
+                            return new X509Certificate[] {
+                                    cert
+                            };
+                        }
+
+                        @Override
+                        public String chooseClientAlias(String[] keyType, Principal[] issuers, Socket socket) {
+                            throw new Error();
+                        }
+
+                        @Override
+                        public String chooseServerAlias(String keyType, Principal[] issuers, Socket socket) {
+                            return "server";
+                        }
 
-                    @Override
-                    public String[] getServerAliases(String keyType, Principal[] issuers) {
-                        return new String[] {
-                            "server"
-                        };
                     }
-
-                    @Override
-                    public PrivateKey getPrivateKey(String alias) {
-                        return priv;
-                    }
-
-                    @Override
-                    public String[] getClientAliases(String keyType, Principal[] issuers) {
-                        throw new Error();
-                    }
-
-                    @Override
-                    public X509Certificate[] getCertificateChain(String alias) {
-                        return new X509Certificate[] {
-                            cert
-                        };
-                    }
-
-                    @Override
-                    public String chooseClientAlias(String[] keyType, Principal[] issuers, Socket socket) {
-                        throw new Error();
-                    }
-
-                    @Override
-                    public String chooseServerAlias(String keyType, Principal[] issuers, Socket socket) {
-                        return "server";
-                    }
-
-                }
             }, new TrustManager[] {
-                new X509TrustManager() {
+                    new X509TrustManager() {
 
-                    @Override
-                    public X509Certificate[] getAcceptedIssuers() {
-                        return null;
-                    }
+                        @Override
+                        public X509Certificate[] getAcceptedIssuers() {
+                            return null;
+                        }
 
-                    @Override
-                    public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {}
+                        @Override
+                        public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {}
 
-                    @Override
-                    public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException {}
-                }
+                        @Override
+                        public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException {}
+                    }
             }, new SecureRandom());
         } catch (NoSuchAlgorithmException e) {
             e.printStackTrace();
index 77418641e6c07fe72b66c703d9f57b4154a652ee..d5d3f8c6cfc97fb9106f0da66c0d33bfd25b727b 100644 (file)
@@ -393,14 +393,14 @@ public class ManagedTest extends ConfiguredTest {
             @Override
             public X509Certificate[] getCertificateChain(String arg0) {
                 return new X509Certificate[] {
-                    ce
+                        ce
                 };
             }
 
             @Override
             public String[] getClientAliases(String arg0, Principal[] arg1) {
                 return new String[] {
-                    "client"
+                        "client"
                 };
             }
 
@@ -415,13 +415,13 @@ public class ManagedTest extends ConfiguredTest {
             @Override
             public String[] getServerAliases(String arg0, Principal[] arg1) {
                 return new String[] {
-                    "client"
+                        "client"
                 };
             }
         };
         SSLContext sc = SSLContext.getInstance("TLS");
         sc.init(new KeyManager[] {
-            km
+                km
         }, null, null);
         if (connection instanceof HttpsURLConnection) {
             ((HttpsURLConnection) connection).setSSLSocketFactory(sc.getSocketFactory());
@@ -468,7 +468,7 @@ public class ManagedTest extends ConfiguredTest {
         uc.setDoOutput(true);
         OutputStream os = uc.getOutputStream();
         os.write(("csrf=" + URLEncoder.encode(csrf, "UTF-8") + "&" //
-        + query//
+                + query//
         ).getBytes("UTF-8"));
         os.flush();
         return (HttpURLConnection) uc;
index f3097af1ba36f3ecb321b0ea2253fa8f12f3faec..0b61dcca65763b1196678a7fa4b74daa83e10cb8 100644 (file)
@@ -33,7 +33,7 @@ public class FetchLocales {
     public static String PO_URL_TEMPLATE = "https://" + DOWNLOAD_SERVER + "/%/gigi/messages.po";
 
     public static final String[] AUTO_LANGS = new String[] {
-        "de"
+            "de"
     };
 
     public static void main(String[] args) throws IOException, ParserConfigurationException, TransformerException {