From 61b9eb1be03fc03a9f4bb0013a08ff44a1059503 Mon Sep 17 00:00:00 2001
From: Jean-Noël Rouvignac <jean-noel.rouvignac@forgerock.com>
Date: Wed, 20 Apr 2016 14:25:46 +0000
Subject: [PATCH] opendj-server-legacy: added @Override + Autorefactor'ed comments
---
opendj-server-legacy/src/main/java/org/opends/server/extensions/BlindTrustManagerProvider.java | 26 +++-----------------------
1 files changed, 3 insertions(+), 23 deletions(-)
diff --git a/opendj-server-legacy/src/main/java/org/opends/server/extensions/BlindTrustManagerProvider.java b/opendj-server-legacy/src/main/java/org/opends/server/extensions/BlindTrustManagerProvider.java
index 52f8f87..f4e659e 100644
--- a/opendj-server-legacy/src/main/java/org/opends/server/extensions/BlindTrustManagerProvider.java
+++ b/opendj-server-legacy/src/main/java/org/opends/server/extensions/BlindTrustManagerProvider.java
@@ -16,8 +16,6 @@
*/
package org.opends.server.extensions;
-
-
import java.security.cert.X509Certificate;
import javax.net.ssl.TrustManager;
import javax.net.ssl.X509TrustManager;
@@ -28,8 +26,6 @@
import org.opends.server.types.DirectoryException;
import org.opends.server.types.InitializationException;
-
-
/**
* This class provides an implementation of a trust manager provider that will
* indicate that any certificate presented should be blindly trusted by the
@@ -52,9 +48,6 @@
// No implementation is required.
}
-
-
- /** {@inheritDoc} */
@Override
public void initializeTrustManagerProvider(
BlindTrustManagerProviderCfg configuration)
@@ -63,21 +56,12 @@
// No implementation is required.
}
-
-
- /**
- * Performs any finalization that may be necessary for this trust manager
- * provider.
- */
@Override
public void finalizeTrustManagerProvider()
{
// No implementation is required.
}
-
-
- /** {@inheritDoc} */
@Override
public TrustManager[] getTrustManagers()
throws DirectoryException
@@ -85,8 +69,6 @@
return new TrustManager[] { this };
}
-
-
/**
* Determines whether an SSL client with the provided certificate chain should
* be trusted. In this case, all client certificates will be trusted.
@@ -94,14 +76,13 @@
* @param chain The certificate chain for the SSL client.
* @param authType The authentication type based on the client certificate.
*/
+ @Override
public void checkClientTrusted(X509Certificate[] chain, String authType)
{
// As long as we don't throw an exception, then the client certificate will
// be considered trusted.
}
-
-
/**
* Determines whether an SSL server with the provided certificate chain should
* be trusted. In this case, all server certificates will be trusted.
@@ -109,14 +90,13 @@
* @param chain The certificate chain for the SSL server.
* @param authType The key exchange algorithm used.
*/
+ @Override
public void checkServerTrusted(X509Certificate[] chain, String authType)
{
// As long as we don't throw an exception, then the server certificate will
// be considered trusted.
}
-
-
/**
* Retrieves the set of certificate authority certificates which are trusted
* for authenticating peers.
@@ -124,9 +104,9 @@
* @return An empty array, since we don't care what certificates are
* presented because we will trust them all.
*/
+ @Override
public X509Certificate[] getAcceptedIssuers()
{
return new X509Certificate[0];
}
}
-
--
Gitblit v1.10.0