Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HADOOP-13694. Add support for AES-192 in OpensslCipher. #135

Open
wants to merge 2 commits into
base: trunk
Choose a base branch
from

Conversation

QwertyManiac
Copy link
Contributor

  • Adds equivalent support for 192-bit AES/CTR/NoPadding codec in the OpensslCipher
  • Adds test-cases to cover 192-bit (24-bytes) and 256-bit (32-bytes) keys to both JCE and OpenSSL crypto tests
  • Enhances the error message when an invalid Key or IV size is passed into OpensslCipher

@QwertyManiac QwertyManiac changed the title HDFS-9878. Add support for AES-192 in OpensslCipher. HADOOP-13694. Add support for AES-192 in OpensslCipher. Oct 13, 2016
if (asprintf(&keyLenErrMsg, "Invalid key length: %d bytes", jKeyLen) < 0) {
THROW(env, "java/lang/IllegalArgumentException", "Invalid key length");
} else {
THROW(env, "java/lang/IllegalArgumentException", keyLenErrMsg);

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You need to free keyLenErrMsg here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for the review! Done in the new commit.

if (asprintf(&ivLenErrMsg, "Invalid iv length: %d bytes", jIvLen) < 0) {
THROW(env, "java/lang/IllegalArgumentException", "Invalid iv length.");
} else {
THROW(env, "java/lang/IllegalArgumentException", ivLenErrMsg);

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same here -- you need to free ivLenErrMsg

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for the review! Done in the new commit.

- Added missing free calls to the messages generated, after the throw
shanthoosh pushed a commit to shanthoosh/hadoop that referenced this pull request Oct 15, 2019
Clean up the LocalApplicationRunner based on the further feedback. The changes include the following:
1. Remove the processorId from the JobCoordinatorFactory/JobCoordinator interfaces
2. LocalApplicationRunner.run() is non-blocking. Add LocalApplicationRunner.waitForFinish() for blocking for completion
3. Remove the config for CooridnatorServiceFactory, and now the CoordinatorService is created based on the type of JobCoordinator.
4. Clean up the StreamProcessor life cycle listener logic inside LocalApplicationRunner.

Author: Xinyu Liu <[email protected]>

Reviewers: Navina Ramesh <[email protected]>

Closes apache#135 from xinyuiscool/SAMZA-1222
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants