activemq-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Craig Condit (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (AMQ-4321) NIO+SSL Connector corrupts stream when data size exceeds SSL buffer size
Date Thu, 14 Feb 2013 20:09:13 GMT

     [ https://issues.apache.org/jira/browse/AMQ-4321?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Craig Condit updated AMQ-4321:
------------------------------

    Attachment: AMQ4321-UnitTest.patch
                AMQ4321.patch

Added patches to add unit test and bug fix.
                
> NIO+SSL Connector corrupts stream when data size exceeds SSL buffer size
> ------------------------------------------------------------------------
>
>                 Key: AMQ-4321
>                 URL: https://issues.apache.org/jira/browse/AMQ-4321
>             Project: ActiveMQ
>          Issue Type: Bug
>          Components: Transport
>    Affects Versions: 5.6.0, 5.7.0, 5.8.0
>         Environment: JDK 1.7.0_09, Windows 7 x64, Linux CentOS5 64-bit
>            Reporter: Craig Condit
>              Labels: nio, ssl, transport
>         Attachments: AMQ4321.patch, AMQ4321-UnitTest.patch
>
>
> When using the default enabledCipherSuites settings on Java 7, the NIO+SSL connector
corrupts the SSL output stream when asked to flush a buffer larger than the SSL buffer size
(approx. 16 KB). This is reproducible by sending a single BytesMessage >= 16KB to the broker
and attempting to consume it. 

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message