Return-Path: X-Original-To: apmail-activemq-dev-archive@www.apache.org Delivered-To: apmail-activemq-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 0CFE3E4AC for ; Thu, 14 Feb 2013 20:05:13 +0000 (UTC) Received: (qmail 2076 invoked by uid 500); 14 Feb 2013 20:05:12 -0000 Delivered-To: apmail-activemq-dev-archive@activemq.apache.org Received: (qmail 2017 invoked by uid 500); 14 Feb 2013 20:05:12 -0000 Mailing-List: contact dev-help@activemq.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@activemq.apache.org Delivered-To: mailing list dev@activemq.apache.org Received: (qmail 1975 invoked by uid 99); 14 Feb 2013 20:05:12 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 14 Feb 2013 20:05:12 +0000 Date: Thu, 14 Feb 2013 20:05:12 +0000 (UTC) From: "Craig Condit (JIRA)" To: dev@activemq.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Updated] (AMQ-4321) NIO+SSL Connector corrupts stream when data size exceeds SSL buffer size MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/AMQ-4321?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Craig Condit updated AMQ-4321: ------------------------------ Labels: nio ssl transport (was: ) > NIO+SSL Connector corrupts stream when data size exceeds SSL buffer size > ------------------------------------------------------------------------ > > Key: AMQ-4321 > URL: https://issues.apache.org/jira/browse/AMQ-4321 > Project: ActiveMQ > Issue Type: Bug > Components: Transport > Affects Versions: 5.6.0, 5.7.0, 5.8.0 > Environment: JDK 1.7.0_09, Windows 7 x64, Linux CentOS5 64-bit > Reporter: Craig Condit > Labels: nio, ssl, transport > > When using the default enabledCipherSuites settings on Java 7, the NIO+SSL connector corrupts the SSL output stream when asked to flush a buffer larger than the SSL buffer size (approx. 16 KB). This is reproducible by sending a single BytesMessage >= 16KB to the broker and attempting to consume it. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira