fix warnings and findbugs hints
This commit is contained in:
parent
6ae8eb27da
commit
df70e41643
@ -957,9 +957,9 @@ public class CaptiveValidator {
|
||||
|
||||
break;
|
||||
|
||||
case NODATA:
|
||||
log.trace("Validating a NODATA response");
|
||||
validateNodataResponse(message, key_rrset, mErrorList);
|
||||
case NODATA:
|
||||
log.trace("Validating a NODATA response");
|
||||
validateNodataResponse(message, key_rrset, mErrorList);
|
||||
|
||||
break;
|
||||
|
||||
|
@ -46,28 +46,35 @@ public class DnsSecVerifier {
|
||||
private Logger log = Logger.getLogger(this.getClass());
|
||||
|
||||
/**
|
||||
* This is a mapping of DNSSEC algorithm numbers/private identifiers to JCA
|
||||
* algorithm identifiers.
|
||||
* This is a mapping of DNSSEC algorithm numbers to JCA algorithm
|
||||
* identifiers.
|
||||
*/
|
||||
private HashMap<Integer, AlgEntry> mAlgorithmMap;
|
||||
|
||||
/**
|
||||
* This is a mapping of DNSSEC private (DNS name) identifiers to JCA
|
||||
* algorithm identifiers.
|
||||
*/
|
||||
private HashMap<Name, AlgEntry> mPrivateAlgorithmMap;
|
||||
|
||||
public DnsSecVerifier() {
|
||||
mAlgorithmMap = new HashMap<Integer, AlgEntry>();
|
||||
mPrivateAlgorithmMap = new HashMap<Name, AlgEntry>();
|
||||
|
||||
// set the default algorithm map.
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.RSAMD5), new AlgEntry(
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.RSAMD5), new AlgEntry(
|
||||
"MD5withRSA", DNSSEC.RSAMD5, false));
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.DSA), new AlgEntry("SHA1withDSA",
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.DSA), new AlgEntry("SHA1withDSA",
|
||||
DNSSEC.DSA, true));
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.RSASHA1), new AlgEntry(
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.RSASHA1), new AlgEntry(
|
||||
"SHA1withRSA", DNSSEC.RSASHA1, false));
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.DSA_NSEC3_SHA1), new AlgEntry(
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.DSA_NSEC3_SHA1), new AlgEntry(
|
||||
"SHA1withDSA", DNSSEC.DSA, true));
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.RSA_NSEC3_SHA1), new AlgEntry(
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.RSA_NSEC3_SHA1), new AlgEntry(
|
||||
"SHA1withRSA", DNSSEC.RSASHA1, false));
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.RSASHA256), new AlgEntry(
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.RSASHA256), new AlgEntry(
|
||||
"SHA256withRSA", DNSSEC.RSASHA256, false));
|
||||
mAlgorithmMap.put(new Integer(DNSSEC.RSASHA512), new AlgEntry(
|
||||
mAlgorithmMap.put(Integer.valueOf(DNSSEC.RSASHA512), new AlgEntry(
|
||||
"SHA512withRSA", DNSSEC.RSASHA512, false));
|
||||
}
|
||||
|
||||
@ -85,7 +92,7 @@ public class DnsSecVerifier {
|
||||
return false;
|
||||
}
|
||||
|
||||
AlgEntry entry = (AlgEntry) mAlgorithmMap.get(new Integer(algorithm));
|
||||
AlgEntry entry = (AlgEntry) mAlgorithmMap.get(Integer.valueOf(algorithm));
|
||||
|
||||
if (entry != null) {
|
||||
return entry.isDSA;
|
||||
@ -107,8 +114,8 @@ public class DnsSecVerifier {
|
||||
"dns.algorithm.");
|
||||
|
||||
for (Util.ConfigEntry entry : aliases) {
|
||||
Integer alg_alias = new Integer(Util.parseInt(entry.key, -1));
|
||||
Integer alg_orig = new Integer(Util.parseInt(entry.value, -1));
|
||||
Integer alg_alias = Integer.valueOf(Util.parseInt(entry.key, -1));
|
||||
Integer alg_orig = Integer.valueOf(Util.parseInt(entry.value, -1));
|
||||
|
||||
if (!mAlgorithmMap.containsKey(alg_orig)) {
|
||||
log.warn("Unable to alias " + alg_alias
|
||||
@ -152,7 +159,7 @@ public class DnsSecVerifier {
|
||||
* @return A List contains a one or more DNSKEYRecord objects, or null if a
|
||||
* matching DNSKEY could not be found.
|
||||
*/
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
private List<DNSKEYRecord> findKey(RRset dnskey_rrset, RRSIGRecord signature) {
|
||||
if (!signature.getSigner().equals(dnskey_rrset.getName())) {
|
||||
log.trace("findKey: could not find appropriate key because "
|
||||
@ -236,7 +243,7 @@ public class DnsSecVerifier {
|
||||
}
|
||||
|
||||
public PublicKey parseDNSKEY(DNSKEYRecord key) {
|
||||
AlgEntry ae = (AlgEntry) mAlgorithmMap.get(new Integer(key
|
||||
AlgEntry ae = (AlgEntry) mAlgorithmMap.get(Integer.valueOf(key
|
||||
.getAlgorithm()));
|
||||
|
||||
if (key.getAlgorithm() != ae.dnssecAlg) {
|
||||
@ -361,7 +368,7 @@ public class DnsSecVerifier {
|
||||
* @return SecurityStatus.SECURE if the rrest verified positively,
|
||||
* SecurityStatus.BOGUS otherwise.
|
||||
*/
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
public byte verify(RRset rrset, RRset key_rrset) {
|
||||
Iterator i = rrset.sigs();
|
||||
|
||||
@ -397,7 +404,7 @@ public class DnsSecVerifier {
|
||||
* The DNSKEY to verify with.
|
||||
* @return SecurityStatus.SECURE if the rrset verified, BOGUS otherwise.
|
||||
*/
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
public byte verify(RRset rrset, DNSKEYRecord dnskey) {
|
||||
// Iterate over RRSIGS
|
||||
Iterator i = rrset.sigs();
|
||||
@ -429,11 +436,11 @@ public class DnsSecVerifier {
|
||||
}
|
||||
|
||||
public boolean supportsAlgorithm(int algorithm) {
|
||||
return mAlgorithmMap.containsKey(new Integer(algorithm));
|
||||
return mAlgorithmMap.containsKey(Integer.valueOf(algorithm));
|
||||
}
|
||||
|
||||
public boolean supportsAlgorithm(Name private_id) {
|
||||
return mAlgorithmMap.containsKey(private_id);
|
||||
return mPrivateAlgorithmMap.containsKey(private_id);
|
||||
}
|
||||
|
||||
public int baseAlgorithm(int algorithm) {
|
||||
@ -446,7 +453,7 @@ public class DnsSecVerifier {
|
||||
return DSA;
|
||||
}
|
||||
|
||||
AlgEntry entry = (AlgEntry) mAlgorithmMap.get(new Integer(algorithm));
|
||||
AlgEntry entry = (AlgEntry) mAlgorithmMap.get(Integer.valueOf(algorithm));
|
||||
|
||||
if (entry == null) {
|
||||
return UNKNOWN;
|
||||
@ -465,7 +472,7 @@ public class DnsSecVerifier {
|
||||
|
||||
try {
|
||||
AlgEntry entry = (AlgEntry) mAlgorithmMap
|
||||
.get(new Integer(algorithm));
|
||||
.get(Integer.valueOf(algorithm));
|
||||
|
||||
if (entry == null) {
|
||||
log.info("DNSSEC algorithm " + algorithm + " not recognized.");
|
||||
|
@ -137,17 +137,6 @@ public class NSEC3ValUtils {
|
||||
}
|
||||
}
|
||||
|
||||
private static byte[] hash(Name name, NSEC3Record nsec3) {
|
||||
try {
|
||||
return nsec3.hashName(name);
|
||||
} catch (NoSuchAlgorithmException e) {
|
||||
st_log.warn("Did not recognize hash algorithm: "
|
||||
+ nsec3.getHashAlgorithm());
|
||||
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Given the name of a closest encloser, return the name *.closest_encloser.
|
||||
*
|
||||
@ -458,7 +447,7 @@ public class NSEC3ValUtils {
|
||||
return -1;
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
private static boolean validIterations(NSEC3Parameters nsec3params,
|
||||
RRset dnskey_rrset, DnsSecVerifier verifier) {
|
||||
// for now, we return the maximum iterations based simply on the key
|
||||
|
@ -31,6 +31,7 @@ import java.util.*;
|
||||
* A version of the RRset class overrides the standard security status.
|
||||
*/
|
||||
public class SRRset extends RRset {
|
||||
private static final long serialVersionUID = 1L;
|
||||
private SecurityStatus mSecurityStatus;
|
||||
|
||||
/** Create a new, blank SRRset. */
|
||||
@ -43,7 +44,7 @@ public class SRRset extends RRset {
|
||||
* Create a new SRRset from an existing RRset. This SRRset will contain that
|
||||
* same internal Record objects as the original RRset.
|
||||
*/
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
public SRRset(RRset r) {
|
||||
this();
|
||||
|
||||
|
@ -23,12 +23,16 @@
|
||||
|
||||
package com.verisign.tat.dnssec;
|
||||
|
||||
import java.io.Serializable;
|
||||
|
||||
/**
|
||||
* Codes for DNSSEC security statuses.
|
||||
*
|
||||
* @author davidb
|
||||
*/
|
||||
public class SecurityStatus {
|
||||
public class SecurityStatus implements Serializable {
|
||||
private static final long serialVersionUID = 1L;
|
||||
|
||||
public static final byte INVALID = -1;
|
||||
|
||||
/**
|
||||
|
@ -35,6 +35,7 @@ import org.xbill.DNS.utils.base64;
|
||||
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.Serializable;
|
||||
|
||||
import java.security.SignatureException;
|
||||
import java.security.interfaces.DSAParams;
|
||||
@ -178,7 +179,7 @@ public class SignUtils {
|
||||
* @return the canonical wire line format of the rrset. This is the second
|
||||
* part of data to be signed.
|
||||
*/
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
public static byte[] generateCanonicalRRsetData(RRset rrset, long ttl,
|
||||
int labels) {
|
||||
DNSOutput image = new DNSOutput();
|
||||
@ -456,7 +457,8 @@ public class SignUtils {
|
||||
* useful for comparing RDATA portions of DNS records in doing DNSSEC
|
||||
* canonical ordering.
|
||||
*/
|
||||
public static class ByteArrayComparator implements Comparator<byte[]> {
|
||||
public static class ByteArrayComparator implements Comparator<byte[]>, Serializable {
|
||||
private static final long serialVersionUID = 1L;
|
||||
private int mOffset = 0;
|
||||
private boolean mDebug = false;
|
||||
|
||||
|
@ -339,7 +339,7 @@ public class ValUtils {
|
||||
return false;
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
@SuppressWarnings("rawtypes")
|
||||
public static RRSIGRecord rrsetFirstSig(RRset rrset) {
|
||||
for (Iterator i = rrset.sigs(); i.hasNext();) {
|
||||
return (RRSIGRecord) i.next();
|
||||
|
Loading…
Reference in New Issue
Block a user