http://git-wip-us.apache.org/repos/asf/hbase-site/blob/ca5b0275/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
----------------------------------------------------------------------
diff --git 
a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
 
b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
index 42b6f60..37a733a 100644
--- 
a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
+++ 
b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
@@ -28,10 +28,10 @@
 <span class="sourceLineNo">020</span>import static 
io.netty.handler.timeout.IdleState.READER_IDLE;<a name="line.20"></a>
 <span class="sourceLineNo">021</span>import static 
org.apache.hadoop.hdfs.DFSConfigKeys.DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY;<a
 name="line.21"></a>
 <span class="sourceLineNo">022</span><a name="line.22"></a>
-<span class="sourceLineNo">023</span>import com.google.common.base.Charsets;<a 
name="line.23"></a>
-<span class="sourceLineNo">024</span>import 
com.google.common.base.Throwables;<a name="line.24"></a>
-<span class="sourceLineNo">025</span>import 
com.google.common.collect.ImmutableSet;<a name="line.25"></a>
-<span class="sourceLineNo">026</span>import com.google.common.collect.Maps;<a 
name="line.26"></a>
+<span class="sourceLineNo">023</span>import 
org.apache.hadoop.hbase.shaded.com.google.common.base.Charsets;<a 
name="line.23"></a>
+<span class="sourceLineNo">024</span>import 
org.apache.hadoop.hbase.shaded.com.google.common.base.Throwables;<a 
name="line.24"></a>
+<span class="sourceLineNo">025</span>import 
org.apache.hadoop.hbase.shaded.com.google.common.collect.ImmutableSet;<a 
name="line.25"></a>
+<span class="sourceLineNo">026</span>import 
org.apache.hadoop.hbase.shaded.com.google.common.collect.Maps;<a 
name="line.26"></a>
 <span class="sourceLineNo">027</span>import 
com.google.protobuf.CodedOutputStream;<a name="line.27"></a>
 <span class="sourceLineNo">028</span><a name="line.28"></a>
 <span class="sourceLineNo">029</span>import io.netty.buffer.ByteBuf;<a 
name="line.29"></a>
@@ -93,7 +93,7 @@
 <span class="sourceLineNo">085</span>import 
org.apache.hadoop.crypto.key.KeyProvider.KeyVersion;<a name="line.85"></a>
 <span class="sourceLineNo">086</span>import 
org.apache.hadoop.fs.FileEncryptionInfo;<a name="line.86"></a>
 <span class="sourceLineNo">087</span>import 
org.apache.hadoop.hbase.classification.InterfaceAudience;<a name="line.87"></a>
-<span class="sourceLineNo">088</span>import 
org.apache.hadoop.hbase.util.ByteStringer;<a name="line.88"></a>
+<span class="sourceLineNo">088</span>import com.google.protobuf.ByteString;<a 
name="line.88"></a>
 <span class="sourceLineNo">089</span>import 
org.apache.hadoop.hdfs.DFSClient;<a name="line.89"></a>
 <span class="sourceLineNo">090</span>import 
org.apache.hadoop.hdfs.protocol.DatanodeInfo;<a name="line.90"></a>
 <span class="sourceLineNo">091</span>import 
org.apache.hadoop.hdfs.protocol.HdfsFileStatus;<a name="line.91"></a>
@@ -373,416 +373,418 @@
 <span class="sourceLineNo">365</span>          
DataTransferEncryptorMessageProto.newBuilder();<a name="line.365"></a>
 <span class="sourceLineNo">366</span>      
builder.setStatus(DataTransferEncryptorStatus.SUCCESS);<a name="line.366"></a>
 <span class="sourceLineNo">367</span>      if (payload != null) {<a 
name="line.367"></a>
-<span class="sourceLineNo">368</span>        
builder.setPayload(ByteStringer.wrap(payload));<a name="line.368"></a>
-<span class="sourceLineNo">369</span>      }<a name="line.369"></a>
-<span class="sourceLineNo">370</span>      if (options != null) {<a 
name="line.370"></a>
-<span class="sourceLineNo">371</span>        
builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a 
name="line.371"></a>
-<span class="sourceLineNo">372</span>      }<a name="line.372"></a>
-<span class="sourceLineNo">373</span>      DataTransferEncryptorMessageProto 
proto = builder.build();<a name="line.373"></a>
-<span class="sourceLineNo">374</span>      int size = 
proto.getSerializedSize();<a name="line.374"></a>
-<span class="sourceLineNo">375</span>      size += 
CodedOutputStream.computeRawVarint32Size(size);<a name="line.375"></a>
-<span class="sourceLineNo">376</span>      ByteBuf buf = 
ctx.alloc().buffer(size);<a name="line.376"></a>
-<span class="sourceLineNo">377</span>      proto.writeDelimitedTo(new 
ByteBufOutputStream(buf));<a name="line.377"></a>
-<span class="sourceLineNo">378</span>      ctx.write(buf);<a 
name="line.378"></a>
-<span class="sourceLineNo">379</span>    }<a name="line.379"></a>
-<span class="sourceLineNo">380</span><a name="line.380"></a>
-<span class="sourceLineNo">381</span>    @Override<a name="line.381"></a>
-<span class="sourceLineNo">382</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.382"></a>
-<span class="sourceLineNo">383</span>      
ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a 
name="line.383"></a>
-<span class="sourceLineNo">384</span>      sendSaslMessage(ctx, new 
byte[0]);<a name="line.384"></a>
-<span class="sourceLineNo">385</span>      ctx.flush();<a name="line.385"></a>
-<span class="sourceLineNo">386</span>      step++;<a name="line.386"></a>
-<span class="sourceLineNo">387</span>    }<a name="line.387"></a>
-<span class="sourceLineNo">388</span><a name="line.388"></a>
-<span class="sourceLineNo">389</span>    @Override<a name="line.389"></a>
-<span class="sourceLineNo">390</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.390"></a>
-<span class="sourceLineNo">391</span>      saslClient.dispose();<a 
name="line.391"></a>
-<span class="sourceLineNo">392</span>    }<a name="line.392"></a>
-<span class="sourceLineNo">393</span><a name="line.393"></a>
-<span class="sourceLineNo">394</span>    private void 
check(DataTransferEncryptorMessageProto proto) throws IOException {<a 
name="line.394"></a>
-<span class="sourceLineNo">395</span>      if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.395"></a>
-<span class="sourceLineNo">396</span>        throw new 
InvalidEncryptionKeyException(proto.getMessage());<a name="line.396"></a>
-<span class="sourceLineNo">397</span>      } else if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR) {<a name="line.397"></a>
-<span class="sourceLineNo">398</span>        throw new 
IOException(proto.getMessage());<a name="line.398"></a>
-<span class="sourceLineNo">399</span>      }<a name="line.399"></a>
-<span class="sourceLineNo">400</span>    }<a name="line.400"></a>
-<span class="sourceLineNo">401</span><a name="line.401"></a>
-<span class="sourceLineNo">402</span>    private String getNegotiatedQop() {<a 
name="line.402"></a>
-<span class="sourceLineNo">403</span>      return (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.403"></a>
-<span class="sourceLineNo">404</span>    }<a name="line.404"></a>
-<span class="sourceLineNo">405</span><a name="line.405"></a>
-<span class="sourceLineNo">406</span>    private boolean 
isNegotiatedQopPrivacy() {<a name="line.406"></a>
-<span class="sourceLineNo">407</span>      String qop = getNegotiatedQop();<a 
name="line.407"></a>
-<span class="sourceLineNo">408</span>      return qop != null &amp;&amp; 
"auth-conf".equalsIgnoreCase(qop);<a name="line.408"></a>
-<span class="sourceLineNo">409</span>    }<a name="line.409"></a>
-<span class="sourceLineNo">410</span><a name="line.410"></a>
-<span class="sourceLineNo">411</span>    private boolean 
requestedQopContainsPrivacy() {<a name="line.411"></a>
-<span class="sourceLineNo">412</span>      Set&lt;String&gt; requestedQop =<a 
name="line.412"></a>
-<span class="sourceLineNo">413</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.413"></a>
-<span class="sourceLineNo">414</span>      return 
requestedQop.contains("auth-conf");<a name="line.414"></a>
-<span class="sourceLineNo">415</span>    }<a name="line.415"></a>
-<span class="sourceLineNo">416</span><a name="line.416"></a>
-<span class="sourceLineNo">417</span>    private void checkSaslComplete() 
throws IOException {<a name="line.417"></a>
-<span class="sourceLineNo">418</span>      if (!saslClient.isComplete()) {<a 
name="line.418"></a>
-<span class="sourceLineNo">419</span>        throw new IOException("Failed to 
complete SASL handshake");<a name="line.419"></a>
-<span class="sourceLineNo">420</span>      }<a name="line.420"></a>
-<span class="sourceLineNo">421</span>      Set&lt;String&gt; requestedQop =<a 
name="line.421"></a>
-<span class="sourceLineNo">422</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.422"></a>
-<span class="sourceLineNo">423</span>      String negotiatedQop = 
getNegotiatedQop();<a name="line.423"></a>
-<span class="sourceLineNo">424</span>      LOG.debug(<a name="line.424"></a>
-<span class="sourceLineNo">425</span>        "Verifying QOP, requested QOP = " 
+ requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.425"></a>
-<span class="sourceLineNo">426</span>      if 
(!requestedQop.contains(negotiatedQop)) {<a name="line.426"></a>
-<span class="sourceLineNo">427</span>        throw new 
IOException(String.format("SASL handshake completed, but "<a 
name="line.427"></a>
-<span class="sourceLineNo">428</span>            + "channel does not have 
acceptable quality of protection, "<a name="line.428"></a>
-<span class="sourceLineNo">429</span>            + "requested = %s, negotiated 
= %s",<a name="line.429"></a>
-<span class="sourceLineNo">430</span>          requestedQop, 
negotiatedQop));<a name="line.430"></a>
-<span class="sourceLineNo">431</span>      }<a name="line.431"></a>
-<span class="sourceLineNo">432</span>    }<a name="line.432"></a>
-<span class="sourceLineNo">433</span><a name="line.433"></a>
-<span class="sourceLineNo">434</span>    private boolean useWrap() {<a 
name="line.434"></a>
-<span class="sourceLineNo">435</span>      String qop = (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.435"></a>
-<span class="sourceLineNo">436</span>      return qop != null &amp;&amp; 
!"auth".equalsIgnoreCase(qop);<a name="line.436"></a>
-<span class="sourceLineNo">437</span>    }<a name="line.437"></a>
-<span class="sourceLineNo">438</span><a name="line.438"></a>
-<span class="sourceLineNo">439</span>    private CipherOption 
unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a 
name="line.439"></a>
-<span class="sourceLineNo">440</span>      byte[] inKey = option.getInKey();<a 
name="line.440"></a>
-<span class="sourceLineNo">441</span>      if (inKey != null) {<a 
name="line.441"></a>
-<span class="sourceLineNo">442</span>        inKey = saslClient.unwrap(inKey, 
0, inKey.length);<a name="line.442"></a>
-<span class="sourceLineNo">443</span>      }<a name="line.443"></a>
-<span class="sourceLineNo">444</span>      byte[] outKey = 
option.getOutKey();<a name="line.444"></a>
-<span class="sourceLineNo">445</span>      if (outKey != null) {<a 
name="line.445"></a>
-<span class="sourceLineNo">446</span>        outKey = 
saslClient.unwrap(outKey, 0, outKey.length);<a name="line.446"></a>
-<span class="sourceLineNo">447</span>      }<a name="line.447"></a>
-<span class="sourceLineNo">448</span>      return new 
CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a 
name="line.448"></a>
-<span class="sourceLineNo">449</span>          option.getOutIv());<a 
name="line.449"></a>
-<span class="sourceLineNo">450</span>    }<a name="line.450"></a>
-<span class="sourceLineNo">451</span><a name="line.451"></a>
-<span class="sourceLineNo">452</span>    private CipherOption 
getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.452"></a>
-<span class="sourceLineNo">453</span>        boolean isNegotiatedQopPrivacy, 
SaslClient saslClient) throws IOException {<a name="line.453"></a>
-<span class="sourceLineNo">454</span>      List&lt;CipherOption&gt; 
cipherOptions =<a name="line.454"></a>
-<span class="sourceLineNo">455</span>          
PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a 
name="line.455"></a>
-<span class="sourceLineNo">456</span>      if (cipherOptions == null || 
cipherOptions.isEmpty()) {<a name="line.456"></a>
-<span class="sourceLineNo">457</span>        return null;<a 
name="line.457"></a>
-<span class="sourceLineNo">458</span>      }<a name="line.458"></a>
-<span class="sourceLineNo">459</span>      CipherOption cipherOption = 
cipherOptions.get(0);<a name="line.459"></a>
-<span class="sourceLineNo">460</span>      return isNegotiatedQopPrivacy ? 
unwrap(cipherOption, saslClient) : cipherOption;<a name="line.460"></a>
-<span class="sourceLineNo">461</span>    }<a name="line.461"></a>
-<span class="sourceLineNo">462</span><a name="line.462"></a>
-<span class="sourceLineNo">463</span>    @Override<a name="line.463"></a>
-<span class="sourceLineNo">464</span>    public void 
channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a 
name="line.464"></a>
-<span class="sourceLineNo">465</span>      if (msg instanceof 
DataTransferEncryptorMessageProto) {<a name="line.465"></a>
-<span class="sourceLineNo">466</span>        DataTransferEncryptorMessageProto 
proto = (DataTransferEncryptorMessageProto) msg;<a name="line.466"></a>
-<span class="sourceLineNo">467</span>        check(proto);<a 
name="line.467"></a>
-<span class="sourceLineNo">468</span>        byte[] challenge = 
proto.getPayload().toByteArray();<a name="line.468"></a>
-<span class="sourceLineNo">469</span>        byte[] response = 
saslClient.evaluateChallenge(challenge);<a name="line.469"></a>
-<span class="sourceLineNo">470</span>        switch (step) {<a 
name="line.470"></a>
-<span class="sourceLineNo">471</span>          case 1: {<a name="line.471"></a>
-<span class="sourceLineNo">472</span>            List&lt;CipherOption&gt; 
cipherOptions = null;<a name="line.472"></a>
-<span class="sourceLineNo">473</span>            if 
(requestedQopContainsPrivacy()) {<a name="line.473"></a>
-<span class="sourceLineNo">474</span>              cipherOptions = 
getCipherOptions();<a name="line.474"></a>
-<span class="sourceLineNo">475</span>            }<a name="line.475"></a>
-<span class="sourceLineNo">476</span>            sendSaslMessage(ctx, 
response, cipherOptions);<a name="line.476"></a>
-<span class="sourceLineNo">477</span>            ctx.flush();<a 
name="line.477"></a>
-<span class="sourceLineNo">478</span>            step++;<a name="line.478"></a>
-<span class="sourceLineNo">479</span>            break;<a name="line.479"></a>
-<span class="sourceLineNo">480</span>          }<a name="line.480"></a>
-<span class="sourceLineNo">481</span>          case 2: {<a name="line.481"></a>
-<span class="sourceLineNo">482</span>            assert response == null;<a 
name="line.482"></a>
-<span class="sourceLineNo">483</span>            checkSaslComplete();<a 
name="line.483"></a>
-<span class="sourceLineNo">484</span>            CipherOption cipherOption =<a 
name="line.484"></a>
-<span class="sourceLineNo">485</span>                getCipherOption(proto, 
isNegotiatedQopPrivacy(), saslClient);<a name="line.485"></a>
-<span class="sourceLineNo">486</span>            ChannelPipeline p = 
ctx.pipeline();<a name="line.486"></a>
-<span class="sourceLineNo">487</span>            while (p.first() != null) {<a 
name="line.487"></a>
-<span class="sourceLineNo">488</span>              p.removeFirst();<a 
name="line.488"></a>
-<span class="sourceLineNo">489</span>            }<a name="line.489"></a>
-<span class="sourceLineNo">490</span>            if (cipherOption != null) {<a 
name="line.490"></a>
-<span class="sourceLineNo">491</span>              CryptoCodec codec = 
CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a 
name="line.491"></a>
-<span class="sourceLineNo">492</span>              p.addLast(new 
EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a 
name="line.492"></a>
-<span class="sourceLineNo">493</span>                new DecryptHandler(codec, 
cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.493"></a>
-<span class="sourceLineNo">494</span>            } else {<a 
name="line.494"></a>
-<span class="sourceLineNo">495</span>              if (useWrap()) {<a 
name="line.495"></a>
-<span class="sourceLineNo">496</span>                p.addLast(new 
SaslWrapHandler(saslClient),<a name="line.496"></a>
-<span class="sourceLineNo">497</span>                  new 
LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.497"></a>
-<span class="sourceLineNo">498</span>                  new 
SaslUnwrapHandler(saslClient));<a name="line.498"></a>
-<span class="sourceLineNo">499</span>              }<a name="line.499"></a>
-<span class="sourceLineNo">500</span>            }<a name="line.500"></a>
-<span class="sourceLineNo">501</span>            promise.trySuccess(null);<a 
name="line.501"></a>
-<span class="sourceLineNo">502</span>            break;<a name="line.502"></a>
-<span class="sourceLineNo">503</span>          }<a name="line.503"></a>
-<span class="sourceLineNo">504</span>          default:<a name="line.504"></a>
-<span class="sourceLineNo">505</span>            throw new 
IllegalArgumentException("Unrecognized negotiation step: " + step);<a 
name="line.505"></a>
-<span class="sourceLineNo">506</span>        }<a name="line.506"></a>
-<span class="sourceLineNo">507</span>      } else {<a name="line.507"></a>
-<span class="sourceLineNo">508</span>        ctx.fireChannelRead(msg);<a 
name="line.508"></a>
-<span class="sourceLineNo">509</span>      }<a name="line.509"></a>
-<span class="sourceLineNo">510</span>    }<a name="line.510"></a>
-<span class="sourceLineNo">511</span><a name="line.511"></a>
-<span class="sourceLineNo">512</span>    @Override<a name="line.512"></a>
-<span class="sourceLineNo">513</span>    public void 
exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception 
{<a name="line.513"></a>
-<span class="sourceLineNo">514</span>      promise.tryFailure(cause);<a 
name="line.514"></a>
-<span class="sourceLineNo">515</span>    }<a name="line.515"></a>
-<span class="sourceLineNo">516</span><a name="line.516"></a>
-<span class="sourceLineNo">517</span>    @Override<a name="line.517"></a>
-<span class="sourceLineNo">518</span>    public void 
userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a 
name="line.518"></a>
-<span class="sourceLineNo">519</span>      if (evt instanceof IdleStateEvent 
&amp;&amp; ((IdleStateEvent) evt).state() == READER_IDLE) {<a 
name="line.519"></a>
-<span class="sourceLineNo">520</span>        promise.tryFailure(new 
IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a 
name="line.520"></a>
-<span class="sourceLineNo">521</span>      } else {<a name="line.521"></a>
-<span class="sourceLineNo">522</span>        super.userEventTriggered(ctx, 
evt);<a name="line.522"></a>
-<span class="sourceLineNo">523</span>      }<a name="line.523"></a>
-<span class="sourceLineNo">524</span>    }<a name="line.524"></a>
-<span class="sourceLineNo">525</span>  }<a name="line.525"></a>
-<span class="sourceLineNo">526</span><a name="line.526"></a>
-<span class="sourceLineNo">527</span>  private static final class 
SaslUnwrapHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.527"></a>
+<span class="sourceLineNo">368</span>        // Was ByteStringer; fix w/o 
using ByteStringer. Its in hbase-protocol<a name="line.368"></a>
+<span class="sourceLineNo">369</span>        // and we want to keep that out 
of hbase-server.<a name="line.369"></a>
+<span class="sourceLineNo">370</span>        
builder.setPayload(ByteString.copyFrom(payload));<a name="line.370"></a>
+<span class="sourceLineNo">371</span>      }<a name="line.371"></a>
+<span class="sourceLineNo">372</span>      if (options != null) {<a 
name="line.372"></a>
+<span class="sourceLineNo">373</span>        
builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a 
name="line.373"></a>
+<span class="sourceLineNo">374</span>      }<a name="line.374"></a>
+<span class="sourceLineNo">375</span>      DataTransferEncryptorMessageProto 
proto = builder.build();<a name="line.375"></a>
+<span class="sourceLineNo">376</span>      int size = 
proto.getSerializedSize();<a name="line.376"></a>
+<span class="sourceLineNo">377</span>      size += 
CodedOutputStream.computeRawVarint32Size(size);<a name="line.377"></a>
+<span class="sourceLineNo">378</span>      ByteBuf buf = 
ctx.alloc().buffer(size);<a name="line.378"></a>
+<span class="sourceLineNo">379</span>      proto.writeDelimitedTo(new 
ByteBufOutputStream(buf));<a name="line.379"></a>
+<span class="sourceLineNo">380</span>      ctx.write(buf);<a 
name="line.380"></a>
+<span class="sourceLineNo">381</span>    }<a name="line.381"></a>
+<span class="sourceLineNo">382</span><a name="line.382"></a>
+<span class="sourceLineNo">383</span>    @Override<a name="line.383"></a>
+<span class="sourceLineNo">384</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.384"></a>
+<span class="sourceLineNo">385</span>      
ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a 
name="line.385"></a>
+<span class="sourceLineNo">386</span>      sendSaslMessage(ctx, new 
byte[0]);<a name="line.386"></a>
+<span class="sourceLineNo">387</span>      ctx.flush();<a name="line.387"></a>
+<span class="sourceLineNo">388</span>      step++;<a name="line.388"></a>
+<span class="sourceLineNo">389</span>    }<a name="line.389"></a>
+<span class="sourceLineNo">390</span><a name="line.390"></a>
+<span class="sourceLineNo">391</span>    @Override<a name="line.391"></a>
+<span class="sourceLineNo">392</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.392"></a>
+<span class="sourceLineNo">393</span>      saslClient.dispose();<a 
name="line.393"></a>
+<span class="sourceLineNo">394</span>    }<a name="line.394"></a>
+<span class="sourceLineNo">395</span><a name="line.395"></a>
+<span class="sourceLineNo">396</span>    private void 
check(DataTransferEncryptorMessageProto proto) throws IOException {<a 
name="line.396"></a>
+<span class="sourceLineNo">397</span>      if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.397"></a>
+<span class="sourceLineNo">398</span>        throw new 
InvalidEncryptionKeyException(proto.getMessage());<a name="line.398"></a>
+<span class="sourceLineNo">399</span>      } else if (proto.getStatus() == 
DataTransferEncryptorStatus.ERROR) {<a name="line.399"></a>
+<span class="sourceLineNo">400</span>        throw new 
IOException(proto.getMessage());<a name="line.400"></a>
+<span class="sourceLineNo">401</span>      }<a name="line.401"></a>
+<span class="sourceLineNo">402</span>    }<a name="line.402"></a>
+<span class="sourceLineNo">403</span><a name="line.403"></a>
+<span class="sourceLineNo">404</span>    private String getNegotiatedQop() {<a 
name="line.404"></a>
+<span class="sourceLineNo">405</span>      return (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.405"></a>
+<span class="sourceLineNo">406</span>    }<a name="line.406"></a>
+<span class="sourceLineNo">407</span><a name="line.407"></a>
+<span class="sourceLineNo">408</span>    private boolean 
isNegotiatedQopPrivacy() {<a name="line.408"></a>
+<span class="sourceLineNo">409</span>      String qop = getNegotiatedQop();<a 
name="line.409"></a>
+<span class="sourceLineNo">410</span>      return qop != null &amp;&amp; 
"auth-conf".equalsIgnoreCase(qop);<a name="line.410"></a>
+<span class="sourceLineNo">411</span>    }<a name="line.411"></a>
+<span class="sourceLineNo">412</span><a name="line.412"></a>
+<span class="sourceLineNo">413</span>    private boolean 
requestedQopContainsPrivacy() {<a name="line.413"></a>
+<span class="sourceLineNo">414</span>      Set&lt;String&gt; requestedQop =<a 
name="line.414"></a>
+<span class="sourceLineNo">415</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.415"></a>
+<span class="sourceLineNo">416</span>      return 
requestedQop.contains("auth-conf");<a name="line.416"></a>
+<span class="sourceLineNo">417</span>    }<a name="line.417"></a>
+<span class="sourceLineNo">418</span><a name="line.418"></a>
+<span class="sourceLineNo">419</span>    private void checkSaslComplete() 
throws IOException {<a name="line.419"></a>
+<span class="sourceLineNo">420</span>      if (!saslClient.isComplete()) {<a 
name="line.420"></a>
+<span class="sourceLineNo">421</span>        throw new IOException("Failed to 
complete SASL handshake");<a name="line.421"></a>
+<span class="sourceLineNo">422</span>      }<a name="line.422"></a>
+<span class="sourceLineNo">423</span>      Set&lt;String&gt; requestedQop =<a 
name="line.423"></a>
+<span class="sourceLineNo">424</span>          
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a 
name="line.424"></a>
+<span class="sourceLineNo">425</span>      String negotiatedQop = 
getNegotiatedQop();<a name="line.425"></a>
+<span class="sourceLineNo">426</span>      LOG.debug(<a name="line.426"></a>
+<span class="sourceLineNo">427</span>        "Verifying QOP, requested QOP = " 
+ requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.427"></a>
+<span class="sourceLineNo">428</span>      if 
(!requestedQop.contains(negotiatedQop)) {<a name="line.428"></a>
+<span class="sourceLineNo">429</span>        throw new 
IOException(String.format("SASL handshake completed, but "<a 
name="line.429"></a>
+<span class="sourceLineNo">430</span>            + "channel does not have 
acceptable quality of protection, "<a name="line.430"></a>
+<span class="sourceLineNo">431</span>            + "requested = %s, negotiated 
= %s",<a name="line.431"></a>
+<span class="sourceLineNo">432</span>          requestedQop, 
negotiatedQop));<a name="line.432"></a>
+<span class="sourceLineNo">433</span>      }<a name="line.433"></a>
+<span class="sourceLineNo">434</span>    }<a name="line.434"></a>
+<span class="sourceLineNo">435</span><a name="line.435"></a>
+<span class="sourceLineNo">436</span>    private boolean useWrap() {<a 
name="line.436"></a>
+<span class="sourceLineNo">437</span>      String qop = (String) 
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.437"></a>
+<span class="sourceLineNo">438</span>      return qop != null &amp;&amp; 
!"auth".equalsIgnoreCase(qop);<a name="line.438"></a>
+<span class="sourceLineNo">439</span>    }<a name="line.439"></a>
+<span class="sourceLineNo">440</span><a name="line.440"></a>
+<span class="sourceLineNo">441</span>    private CipherOption 
unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a 
name="line.441"></a>
+<span class="sourceLineNo">442</span>      byte[] inKey = option.getInKey();<a 
name="line.442"></a>
+<span class="sourceLineNo">443</span>      if (inKey != null) {<a 
name="line.443"></a>
+<span class="sourceLineNo">444</span>        inKey = saslClient.unwrap(inKey, 
0, inKey.length);<a name="line.444"></a>
+<span class="sourceLineNo">445</span>      }<a name="line.445"></a>
+<span class="sourceLineNo">446</span>      byte[] outKey = 
option.getOutKey();<a name="line.446"></a>
+<span class="sourceLineNo">447</span>      if (outKey != null) {<a 
name="line.447"></a>
+<span class="sourceLineNo">448</span>        outKey = 
saslClient.unwrap(outKey, 0, outKey.length);<a name="line.448"></a>
+<span class="sourceLineNo">449</span>      }<a name="line.449"></a>
+<span class="sourceLineNo">450</span>      return new 
CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a 
name="line.450"></a>
+<span class="sourceLineNo">451</span>          option.getOutIv());<a 
name="line.451"></a>
+<span class="sourceLineNo">452</span>    }<a name="line.452"></a>
+<span class="sourceLineNo">453</span><a name="line.453"></a>
+<span class="sourceLineNo">454</span>    private CipherOption 
getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.454"></a>
+<span class="sourceLineNo">455</span>        boolean isNegotiatedQopPrivacy, 
SaslClient saslClient) throws IOException {<a name="line.455"></a>
+<span class="sourceLineNo">456</span>      List&lt;CipherOption&gt; 
cipherOptions =<a name="line.456"></a>
+<span class="sourceLineNo">457</span>          
PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a 
name="line.457"></a>
+<span class="sourceLineNo">458</span>      if (cipherOptions == null || 
cipherOptions.isEmpty()) {<a name="line.458"></a>
+<span class="sourceLineNo">459</span>        return null;<a 
name="line.459"></a>
+<span class="sourceLineNo">460</span>      }<a name="line.460"></a>
+<span class="sourceLineNo">461</span>      CipherOption cipherOption = 
cipherOptions.get(0);<a name="line.461"></a>
+<span class="sourceLineNo">462</span>      return isNegotiatedQopPrivacy ? 
unwrap(cipherOption, saslClient) : cipherOption;<a name="line.462"></a>
+<span class="sourceLineNo">463</span>    }<a name="line.463"></a>
+<span class="sourceLineNo">464</span><a name="line.464"></a>
+<span class="sourceLineNo">465</span>    @Override<a name="line.465"></a>
+<span class="sourceLineNo">466</span>    public void 
channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a 
name="line.466"></a>
+<span class="sourceLineNo">467</span>      if (msg instanceof 
DataTransferEncryptorMessageProto) {<a name="line.467"></a>
+<span class="sourceLineNo">468</span>        DataTransferEncryptorMessageProto 
proto = (DataTransferEncryptorMessageProto) msg;<a name="line.468"></a>
+<span class="sourceLineNo">469</span>        check(proto);<a 
name="line.469"></a>
+<span class="sourceLineNo">470</span>        byte[] challenge = 
proto.getPayload().toByteArray();<a name="line.470"></a>
+<span class="sourceLineNo">471</span>        byte[] response = 
saslClient.evaluateChallenge(challenge);<a name="line.471"></a>
+<span class="sourceLineNo">472</span>        switch (step) {<a 
name="line.472"></a>
+<span class="sourceLineNo">473</span>          case 1: {<a name="line.473"></a>
+<span class="sourceLineNo">474</span>            List&lt;CipherOption&gt; 
cipherOptions = null;<a name="line.474"></a>
+<span class="sourceLineNo">475</span>            if 
(requestedQopContainsPrivacy()) {<a name="line.475"></a>
+<span class="sourceLineNo">476</span>              cipherOptions = 
getCipherOptions();<a name="line.476"></a>
+<span class="sourceLineNo">477</span>            }<a name="line.477"></a>
+<span class="sourceLineNo">478</span>            sendSaslMessage(ctx, 
response, cipherOptions);<a name="line.478"></a>
+<span class="sourceLineNo">479</span>            ctx.flush();<a 
name="line.479"></a>
+<span class="sourceLineNo">480</span>            step++;<a name="line.480"></a>
+<span class="sourceLineNo">481</span>            break;<a name="line.481"></a>
+<span class="sourceLineNo">482</span>          }<a name="line.482"></a>
+<span class="sourceLineNo">483</span>          case 2: {<a name="line.483"></a>
+<span class="sourceLineNo">484</span>            assert response == null;<a 
name="line.484"></a>
+<span class="sourceLineNo">485</span>            checkSaslComplete();<a 
name="line.485"></a>
+<span class="sourceLineNo">486</span>            CipherOption cipherOption =<a 
name="line.486"></a>
+<span class="sourceLineNo">487</span>                getCipherOption(proto, 
isNegotiatedQopPrivacy(), saslClient);<a name="line.487"></a>
+<span class="sourceLineNo">488</span>            ChannelPipeline p = 
ctx.pipeline();<a name="line.488"></a>
+<span class="sourceLineNo">489</span>            while (p.first() != null) {<a 
name="line.489"></a>
+<span class="sourceLineNo">490</span>              p.removeFirst();<a 
name="line.490"></a>
+<span class="sourceLineNo">491</span>            }<a name="line.491"></a>
+<span class="sourceLineNo">492</span>            if (cipherOption != null) {<a 
name="line.492"></a>
+<span class="sourceLineNo">493</span>              CryptoCodec codec = 
CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a 
name="line.493"></a>
+<span class="sourceLineNo">494</span>              p.addLast(new 
EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a 
name="line.494"></a>
+<span class="sourceLineNo">495</span>                new DecryptHandler(codec, 
cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.495"></a>
+<span class="sourceLineNo">496</span>            } else {<a 
name="line.496"></a>
+<span class="sourceLineNo">497</span>              if (useWrap()) {<a 
name="line.497"></a>
+<span class="sourceLineNo">498</span>                p.addLast(new 
SaslWrapHandler(saslClient),<a name="line.498"></a>
+<span class="sourceLineNo">499</span>                  new 
LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.499"></a>
+<span class="sourceLineNo">500</span>                  new 
SaslUnwrapHandler(saslClient));<a name="line.500"></a>
+<span class="sourceLineNo">501</span>              }<a name="line.501"></a>
+<span class="sourceLineNo">502</span>            }<a name="line.502"></a>
+<span class="sourceLineNo">503</span>            promise.trySuccess(null);<a 
name="line.503"></a>
+<span class="sourceLineNo">504</span>            break;<a name="line.504"></a>
+<span class="sourceLineNo">505</span>          }<a name="line.505"></a>
+<span class="sourceLineNo">506</span>          default:<a name="line.506"></a>
+<span class="sourceLineNo">507</span>            throw new 
IllegalArgumentException("Unrecognized negotiation step: " + step);<a 
name="line.507"></a>
+<span class="sourceLineNo">508</span>        }<a name="line.508"></a>
+<span class="sourceLineNo">509</span>      } else {<a name="line.509"></a>
+<span class="sourceLineNo">510</span>        ctx.fireChannelRead(msg);<a 
name="line.510"></a>
+<span class="sourceLineNo">511</span>      }<a name="line.511"></a>
+<span class="sourceLineNo">512</span>    }<a name="line.512"></a>
+<span class="sourceLineNo">513</span><a name="line.513"></a>
+<span class="sourceLineNo">514</span>    @Override<a name="line.514"></a>
+<span class="sourceLineNo">515</span>    public void 
exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception 
{<a name="line.515"></a>
+<span class="sourceLineNo">516</span>      promise.tryFailure(cause);<a 
name="line.516"></a>
+<span class="sourceLineNo">517</span>    }<a name="line.517"></a>
+<span class="sourceLineNo">518</span><a name="line.518"></a>
+<span class="sourceLineNo">519</span>    @Override<a name="line.519"></a>
+<span class="sourceLineNo">520</span>    public void 
userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a 
name="line.520"></a>
+<span class="sourceLineNo">521</span>      if (evt instanceof IdleStateEvent 
&amp;&amp; ((IdleStateEvent) evt).state() == READER_IDLE) {<a 
name="line.521"></a>
+<span class="sourceLineNo">522</span>        promise.tryFailure(new 
IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a 
name="line.522"></a>
+<span class="sourceLineNo">523</span>      } else {<a name="line.523"></a>
+<span class="sourceLineNo">524</span>        super.userEventTriggered(ctx, 
evt);<a name="line.524"></a>
+<span class="sourceLineNo">525</span>      }<a name="line.525"></a>
+<span class="sourceLineNo">526</span>    }<a name="line.526"></a>
+<span class="sourceLineNo">527</span>  }<a name="line.527"></a>
 <span class="sourceLineNo">528</span><a name="line.528"></a>
-<span class="sourceLineNo">529</span>    private final SaslClient 
saslClient;<a name="line.529"></a>
+<span class="sourceLineNo">529</span>  private static final class 
SaslUnwrapHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.529"></a>
 <span class="sourceLineNo">530</span><a name="line.530"></a>
-<span class="sourceLineNo">531</span>    public SaslUnwrapHandler(SaslClient 
saslClient) {<a name="line.531"></a>
-<span class="sourceLineNo">532</span>      this.saslClient = saslClient;<a 
name="line.532"></a>
-<span class="sourceLineNo">533</span>    }<a name="line.533"></a>
-<span class="sourceLineNo">534</span><a name="line.534"></a>
-<span class="sourceLineNo">535</span>    @Override<a name="line.535"></a>
-<span class="sourceLineNo">536</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.536"></a>
-<span class="sourceLineNo">537</span>      saslClient.dispose();<a 
name="line.537"></a>
-<span class="sourceLineNo">538</span>    }<a name="line.538"></a>
-<span class="sourceLineNo">539</span><a name="line.539"></a>
-<span class="sourceLineNo">540</span>    @Override<a name="line.540"></a>
-<span class="sourceLineNo">541</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.541"></a>
-<span class="sourceLineNo">542</span>      msg.skipBytes(4);<a 
name="line.542"></a>
-<span class="sourceLineNo">543</span>      byte[] b = new 
byte[msg.readableBytes()];<a name="line.543"></a>
-<span class="sourceLineNo">544</span>      msg.readBytes(b);<a 
name="line.544"></a>
-<span class="sourceLineNo">545</span>      
ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, 
b.length)));<a name="line.545"></a>
-<span class="sourceLineNo">546</span>    }<a name="line.546"></a>
-<span class="sourceLineNo">547</span>  }<a name="line.547"></a>
-<span class="sourceLineNo">548</span><a name="line.548"></a>
-<span class="sourceLineNo">549</span>  private static final class 
SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.549"></a>
+<span class="sourceLineNo">531</span>    private final SaslClient 
saslClient;<a name="line.531"></a>
+<span class="sourceLineNo">532</span><a name="line.532"></a>
+<span class="sourceLineNo">533</span>    public SaslUnwrapHandler(SaslClient 
saslClient) {<a name="line.533"></a>
+<span class="sourceLineNo">534</span>      this.saslClient = saslClient;<a 
name="line.534"></a>
+<span class="sourceLineNo">535</span>    }<a name="line.535"></a>
+<span class="sourceLineNo">536</span><a name="line.536"></a>
+<span class="sourceLineNo">537</span>    @Override<a name="line.537"></a>
+<span class="sourceLineNo">538</span>    public void 
channelInactive(ChannelHandlerContext ctx) throws Exception {<a 
name="line.538"></a>
+<span class="sourceLineNo">539</span>      saslClient.dispose();<a 
name="line.539"></a>
+<span class="sourceLineNo">540</span>    }<a name="line.540"></a>
+<span class="sourceLineNo">541</span><a name="line.541"></a>
+<span class="sourceLineNo">542</span>    @Override<a name="line.542"></a>
+<span class="sourceLineNo">543</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.543"></a>
+<span class="sourceLineNo">544</span>      msg.skipBytes(4);<a 
name="line.544"></a>
+<span class="sourceLineNo">545</span>      byte[] b = new 
byte[msg.readableBytes()];<a name="line.545"></a>
+<span class="sourceLineNo">546</span>      msg.readBytes(b);<a 
name="line.546"></a>
+<span class="sourceLineNo">547</span>      
ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, 
b.length)));<a name="line.547"></a>
+<span class="sourceLineNo">548</span>    }<a name="line.548"></a>
+<span class="sourceLineNo">549</span>  }<a name="line.549"></a>
 <span class="sourceLineNo">550</span><a name="line.550"></a>
-<span class="sourceLineNo">551</span>    private final SaslClient 
saslClient;<a name="line.551"></a>
+<span class="sourceLineNo">551</span>  private static final class 
SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.551"></a>
 <span class="sourceLineNo">552</span><a name="line.552"></a>
-<span class="sourceLineNo">553</span>    private CompositeByteBuf cBuf;<a 
name="line.553"></a>
+<span class="sourceLineNo">553</span>    private final SaslClient 
saslClient;<a name="line.553"></a>
 <span class="sourceLineNo">554</span><a name="line.554"></a>
-<span class="sourceLineNo">555</span>    public SaslWrapHandler(SaslClient 
saslClient) {<a name="line.555"></a>
-<span class="sourceLineNo">556</span>      this.saslClient = saslClient;<a 
name="line.556"></a>
-<span class="sourceLineNo">557</span>    }<a name="line.557"></a>
-<span class="sourceLineNo">558</span><a name="line.558"></a>
-<span class="sourceLineNo">559</span>    @Override<a name="line.559"></a>
-<span class="sourceLineNo">560</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.560"></a>
-<span class="sourceLineNo">561</span>      cBuf = new 
CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.561"></a>
-<span class="sourceLineNo">562</span>    }<a name="line.562"></a>
-<span class="sourceLineNo">563</span><a name="line.563"></a>
-<span class="sourceLineNo">564</span>    @Override<a name="line.564"></a>
-<span class="sourceLineNo">565</span>    public void 
write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a 
name="line.565"></a>
-<span class="sourceLineNo">566</span>        throws Exception {<a 
name="line.566"></a>
-<span class="sourceLineNo">567</span>      if (msg instanceof ByteBuf) {<a 
name="line.567"></a>
-<span class="sourceLineNo">568</span>        ByteBuf buf = (ByteBuf) msg;<a 
name="line.568"></a>
-<span class="sourceLineNo">569</span>        cBuf.addComponent(buf);<a 
name="line.569"></a>
-<span class="sourceLineNo">570</span>        
cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a 
name="line.570"></a>
-<span class="sourceLineNo">571</span>      } else {<a name="line.571"></a>
-<span class="sourceLineNo">572</span>        ctx.write(msg);<a 
name="line.572"></a>
-<span class="sourceLineNo">573</span>      }<a name="line.573"></a>
-<span class="sourceLineNo">574</span>    }<a name="line.574"></a>
-<span class="sourceLineNo">575</span><a name="line.575"></a>
-<span class="sourceLineNo">576</span>    @Override<a name="line.576"></a>
-<span class="sourceLineNo">577</span>    public void 
flush(ChannelHandlerContext ctx) throws Exception {<a name="line.577"></a>
-<span class="sourceLineNo">578</span>      if (cBuf.isReadable()) {<a 
name="line.578"></a>
-<span class="sourceLineNo">579</span>        byte[] b = new 
byte[cBuf.readableBytes()];<a name="line.579"></a>
-<span class="sourceLineNo">580</span>        cBuf.readBytes(b);<a 
name="line.580"></a>
-<span class="sourceLineNo">581</span>        cBuf.discardReadComponents();<a 
name="line.581"></a>
-<span class="sourceLineNo">582</span>        byte[] wrapped = 
saslClient.wrap(b, 0, b.length);<a name="line.582"></a>
-<span class="sourceLineNo">583</span>        ByteBuf buf = 
ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.583"></a>
-<span class="sourceLineNo">584</span>        buf.writeInt(wrapped.length);<a 
name="line.584"></a>
-<span class="sourceLineNo">585</span>        buf.writeBytes(wrapped);<a 
name="line.585"></a>
-<span class="sourceLineNo">586</span>        ctx.write(buf);<a 
name="line.586"></a>
-<span class="sourceLineNo">587</span>      }<a name="line.587"></a>
-<span class="sourceLineNo">588</span>      ctx.flush();<a name="line.588"></a>
-<span class="sourceLineNo">589</span>    }<a name="line.589"></a>
-<span class="sourceLineNo">590</span><a name="line.590"></a>
-<span class="sourceLineNo">591</span>    @Override<a name="line.591"></a>
-<span class="sourceLineNo">592</span>    public void 
close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a 
name="line.592"></a>
-<span class="sourceLineNo">593</span>      cBuf.release();<a 
name="line.593"></a>
-<span class="sourceLineNo">594</span>      cBuf = null;<a name="line.594"></a>
-<span class="sourceLineNo">595</span>    }<a name="line.595"></a>
-<span class="sourceLineNo">596</span>  }<a name="line.596"></a>
-<span class="sourceLineNo">597</span><a name="line.597"></a>
-<span class="sourceLineNo">598</span>  private static final class 
DecryptHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.598"></a>
+<span class="sourceLineNo">555</span>    private CompositeByteBuf cBuf;<a 
name="line.555"></a>
+<span class="sourceLineNo">556</span><a name="line.556"></a>
+<span class="sourceLineNo">557</span>    public SaslWrapHandler(SaslClient 
saslClient) {<a name="line.557"></a>
+<span class="sourceLineNo">558</span>      this.saslClient = saslClient;<a 
name="line.558"></a>
+<span class="sourceLineNo">559</span>    }<a name="line.559"></a>
+<span class="sourceLineNo">560</span><a name="line.560"></a>
+<span class="sourceLineNo">561</span>    @Override<a name="line.561"></a>
+<span class="sourceLineNo">562</span>    public void 
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a 
name="line.562"></a>
+<span class="sourceLineNo">563</span>      cBuf = new 
CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.563"></a>
+<span class="sourceLineNo">564</span>    }<a name="line.564"></a>
+<span class="sourceLineNo">565</span><a name="line.565"></a>
+<span class="sourceLineNo">566</span>    @Override<a name="line.566"></a>
+<span class="sourceLineNo">567</span>    public void 
write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a 
name="line.567"></a>
+<span class="sourceLineNo">568</span>        throws Exception {<a 
name="line.568"></a>
+<span class="sourceLineNo">569</span>      if (msg instanceof ByteBuf) {<a 
name="line.569"></a>
+<span class="sourceLineNo">570</span>        ByteBuf buf = (ByteBuf) msg;<a 
name="line.570"></a>
+<span class="sourceLineNo">571</span>        cBuf.addComponent(buf);<a 
name="line.571"></a>
+<span class="sourceLineNo">572</span>        
cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a 
name="line.572"></a>
+<span class="sourceLineNo">573</span>      } else {<a name="line.573"></a>
+<span class="sourceLineNo">574</span>        ctx.write(msg);<a 
name="line.574"></a>
+<span class="sourceLineNo">575</span>      }<a name="line.575"></a>
+<span class="sourceLineNo">576</span>    }<a name="line.576"></a>
+<span class="sourceLineNo">577</span><a name="line.577"></a>
+<span class="sourceLineNo">578</span>    @Override<a name="line.578"></a>
+<span class="sourceLineNo">579</span>    public void 
flush(ChannelHandlerContext ctx) throws Exception {<a name="line.579"></a>
+<span class="sourceLineNo">580</span>      if (cBuf.isReadable()) {<a 
name="line.580"></a>
+<span class="sourceLineNo">581</span>        byte[] b = new 
byte[cBuf.readableBytes()];<a name="line.581"></a>
+<span class="sourceLineNo">582</span>        cBuf.readBytes(b);<a 
name="line.582"></a>
+<span class="sourceLineNo">583</span>        cBuf.discardReadComponents();<a 
name="line.583"></a>
+<span class="sourceLineNo">584</span>        byte[] wrapped = 
saslClient.wrap(b, 0, b.length);<a name="line.584"></a>
+<span class="sourceLineNo">585</span>        ByteBuf buf = 
ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.585"></a>
+<span class="sourceLineNo">586</span>        buf.writeInt(wrapped.length);<a 
name="line.586"></a>
+<span class="sourceLineNo">587</span>        buf.writeBytes(wrapped);<a 
name="line.587"></a>
+<span class="sourceLineNo">588</span>        ctx.write(buf);<a 
name="line.588"></a>
+<span class="sourceLineNo">589</span>      }<a name="line.589"></a>
+<span class="sourceLineNo">590</span>      ctx.flush();<a name="line.590"></a>
+<span class="sourceLineNo">591</span>    }<a name="line.591"></a>
+<span class="sourceLineNo">592</span><a name="line.592"></a>
+<span class="sourceLineNo">593</span>    @Override<a name="line.593"></a>
+<span class="sourceLineNo">594</span>    public void 
close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a 
name="line.594"></a>
+<span class="sourceLineNo">595</span>      cBuf.release();<a 
name="line.595"></a>
+<span class="sourceLineNo">596</span>      cBuf = null;<a name="line.596"></a>
+<span class="sourceLineNo">597</span>    }<a name="line.597"></a>
+<span class="sourceLineNo">598</span>  }<a name="line.598"></a>
 <span class="sourceLineNo">599</span><a name="line.599"></a>
-<span class="sourceLineNo">600</span>    private final Decryptor decryptor;<a 
name="line.600"></a>
+<span class="sourceLineNo">600</span>  private static final class 
DecryptHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a 
name="line.600"></a>
 <span class="sourceLineNo">601</span><a name="line.601"></a>
-<span class="sourceLineNo">602</span>    public DecryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.602"></a>
-<span class="sourceLineNo">603</span>        throws GeneralSecurityException, 
IOException {<a name="line.603"></a>
-<span class="sourceLineNo">604</span>      this.decryptor = 
codec.createDecryptor();<a name="line.604"></a>
-<span class="sourceLineNo">605</span>      this.decryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.605"></a>
-<span class="sourceLineNo">606</span>    }<a name="line.606"></a>
-<span class="sourceLineNo">607</span><a name="line.607"></a>
-<span class="sourceLineNo">608</span>    @Override<a name="line.608"></a>
-<span class="sourceLineNo">609</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.609"></a>
-<span class="sourceLineNo">610</span>      ByteBuf inBuf;<a 
name="line.610"></a>
-<span class="sourceLineNo">611</span>      boolean release = false;<a 
name="line.611"></a>
-<span class="sourceLineNo">612</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.612"></a>
-<span class="sourceLineNo">613</span>        inBuf = msg;<a 
name="line.613"></a>
-<span class="sourceLineNo">614</span>      } else {<a name="line.614"></a>
-<span class="sourceLineNo">615</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.615"></a>
-<span class="sourceLineNo">616</span>        msg.readBytes(inBuf);<a 
name="line.616"></a>
-<span class="sourceLineNo">617</span>        release = true;<a 
name="line.617"></a>
-<span class="sourceLineNo">618</span>      }<a name="line.618"></a>
-<span class="sourceLineNo">619</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.619"></a>
-<span class="sourceLineNo">620</span>      ByteBuf outBuf = 
ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.620"></a>
-<span class="sourceLineNo">621</span>      ByteBuffer outBuffer = 
outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.621"></a>
-<span class="sourceLineNo">622</span>      decryptor.decrypt(inBuffer, 
outBuffer);<a name="line.622"></a>
-<span class="sourceLineNo">623</span>      
outBuf.writerIndex(inBuf.readableBytes());<a name="line.623"></a>
-<span class="sourceLineNo">624</span>      if (release) {<a 
name="line.624"></a>
-<span class="sourceLineNo">625</span>        inBuf.release();<a 
name="line.625"></a>
-<span class="sourceLineNo">626</span>      }<a name="line.626"></a>
-<span class="sourceLineNo">627</span>      ctx.fireChannelRead(outBuf);<a 
name="line.627"></a>
-<span class="sourceLineNo">628</span>    }<a name="line.628"></a>
-<span class="sourceLineNo">629</span>  }<a name="line.629"></a>
-<span class="sourceLineNo">630</span><a name="line.630"></a>
-<span class="sourceLineNo">631</span>  private static final class 
EncryptHandler extends MessageToByteEncoder&lt;ByteBuf&gt; {<a 
name="line.631"></a>
+<span class="sourceLineNo">602</span>    private final Decryptor decryptor;<a 
name="line.602"></a>
+<span class="sourceLineNo">603</span><a name="line.603"></a>
+<span class="sourceLineNo">604</span>    public DecryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.604"></a>
+<span class="sourceLineNo">605</span>        throws GeneralSecurityException, 
IOException {<a name="line.605"></a>
+<span class="sourceLineNo">606</span>      this.decryptor = 
codec.createDecryptor();<a name="line.606"></a>
+<span class="sourceLineNo">607</span>      this.decryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.607"></a>
+<span class="sourceLineNo">608</span>    }<a name="line.608"></a>
+<span class="sourceLineNo">609</span><a name="line.609"></a>
+<span class="sourceLineNo">610</span>    @Override<a name="line.610"></a>
+<span class="sourceLineNo">611</span>    protected void 
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a 
name="line.611"></a>
+<span class="sourceLineNo">612</span>      ByteBuf inBuf;<a 
name="line.612"></a>
+<span class="sourceLineNo">613</span>      boolean release = false;<a 
name="line.613"></a>
+<span class="sourceLineNo">614</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.614"></a>
+<span class="sourceLineNo">615</span>        inBuf = msg;<a 
name="line.615"></a>
+<span class="sourceLineNo">616</span>      } else {<a name="line.616"></a>
+<span class="sourceLineNo">617</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.617"></a>
+<span class="sourceLineNo">618</span>        msg.readBytes(inBuf);<a 
name="line.618"></a>
+<span class="sourceLineNo">619</span>        release = true;<a 
name="line.619"></a>
+<span class="sourceLineNo">620</span>      }<a name="line.620"></a>
+<span class="sourceLineNo">621</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.621"></a>
+<span class="sourceLineNo">622</span>      ByteBuf outBuf = 
ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.622"></a>
+<span class="sourceLineNo">623</span>      ByteBuffer outBuffer = 
outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.623"></a>
+<span class="sourceLineNo">624</span>      decryptor.decrypt(inBuffer, 
outBuffer);<a name="line.624"></a>
+<span class="sourceLineNo">625</span>      
outBuf.writerIndex(inBuf.readableBytes());<a name="line.625"></a>
+<span class="sourceLineNo">626</span>      if (release) {<a 
name="line.626"></a>
+<span class="sourceLineNo">627</span>        inBuf.release();<a 
name="line.627"></a>
+<span class="sourceLineNo">628</span>      }<a name="line.628"></a>
+<span class="sourceLineNo">629</span>      ctx.fireChannelRead(outBuf);<a 
name="line.629"></a>
+<span class="sourceLineNo">630</span>    }<a name="line.630"></a>
+<span class="sourceLineNo">631</span>  }<a name="line.631"></a>
 <span class="sourceLineNo">632</span><a name="line.632"></a>
-<span class="sourceLineNo">633</span>    private final Encryptor encryptor;<a 
name="line.633"></a>
+<span class="sourceLineNo">633</span>  private static final class 
EncryptHandler extends MessageToByteEncoder&lt;ByteBuf&gt; {<a 
name="line.633"></a>
 <span class="sourceLineNo">634</span><a name="line.634"></a>
-<span class="sourceLineNo">635</span>    public EncryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.635"></a>
-<span class="sourceLineNo">636</span>        throws GeneralSecurityException, 
IOException {<a name="line.636"></a>
-<span class="sourceLineNo">637</span>      this.encryptor = 
codec.createEncryptor();<a name="line.637"></a>
-<span class="sourceLineNo">638</span>      this.encryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.638"></a>
-<span class="sourceLineNo">639</span>    }<a name="line.639"></a>
-<span class="sourceLineNo">640</span><a name="line.640"></a>
-<span class="sourceLineNo">641</span>    @Override<a name="line.641"></a>
-<span class="sourceLineNo">642</span>    protected ByteBuf 
allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a 
name="line.642"></a>
-<span class="sourceLineNo">643</span>        throws Exception {<a 
name="line.643"></a>
-<span class="sourceLineNo">644</span>      if (preferDirect) {<a 
name="line.644"></a>
-<span class="sourceLineNo">645</span>        return 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.645"></a>
-<span class="sourceLineNo">646</span>      } else {<a name="line.646"></a>
-<span class="sourceLineNo">647</span>        return 
ctx.alloc().buffer(msg.readableBytes());<a name="line.647"></a>
-<span class="sourceLineNo">648</span>      }<a name="line.648"></a>
-<span class="sourceLineNo">649</span>    }<a name="line.649"></a>
-<span class="sourceLineNo">650</span><a name="line.650"></a>
-<span class="sourceLineNo">651</span>    @Override<a name="line.651"></a>
-<span class="sourceLineNo">652</span>    protected void 
encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception 
{<a name="line.652"></a>
-<span class="sourceLineNo">653</span>      ByteBuf inBuf;<a 
name="line.653"></a>
-<span class="sourceLineNo">654</span>      boolean release = false;<a 
name="line.654"></a>
-<span class="sourceLineNo">655</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.655"></a>
-<span class="sourceLineNo">656</span>        inBuf = msg;<a 
name="line.656"></a>
-<span class="sourceLineNo">657</span>      } else {<a name="line.657"></a>
-<span class="sourceLineNo">658</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.658"></a>
-<span class="sourceLineNo">659</span>        msg.readBytes(inBuf);<a 
name="line.659"></a>
-<span class="sourceLineNo">660</span>        release = true;<a 
name="line.660"></a>
-<span class="sourceLineNo">661</span>      }<a name="line.661"></a>
-<span class="sourceLineNo">662</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.662"></a>
-<span class="sourceLineNo">663</span>      ByteBuffer outBuffer = 
out.nioBuffer(0, inBuf.readableBytes());<a name="line.663"></a>
-<span class="sourceLineNo">664</span>      encryptor.encrypt(inBuffer, 
outBuffer);<a name="line.664"></a>
-<span class="sourceLineNo">665</span>      
out.writerIndex(inBuf.readableBytes());<a name="line.665"></a>
-<span class="sourceLineNo">666</span>      if (release) {<a 
name="line.666"></a>
-<span class="sourceLineNo">667</span>        inBuf.release();<a 
name="line.667"></a>
-<span class="sourceLineNo">668</span>      }<a name="line.668"></a>
-<span class="sourceLineNo">669</span>    }<a name="line.669"></a>
-<span class="sourceLineNo">670</span>  }<a name="line.670"></a>
-<span class="sourceLineNo">671</span><a name="line.671"></a>
-<span class="sourceLineNo">672</span>  private static String 
getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a 
name="line.672"></a>
-<span class="sourceLineNo">673</span>    return encryptionKey.keyId + 
NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a 
name="line.673"></a>
-<span class="sourceLineNo">674</span>        + new 
String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a 
name="line.674"></a>
-<span class="sourceLineNo">675</span>  }<a name="line.675"></a>
-<span class="sourceLineNo">676</span><a name="line.676"></a>
-<span class="sourceLineNo">677</span>  private static char[] 
encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.677"></a>
-<span class="sourceLineNo">678</span>    return new 
String(Base64.encodeBase64(encryptionKey, false), 
Charsets.UTF_8).toCharArray();<a name="line.678"></a>
-<span class="sourceLineNo">679</span>  }<a name="line.679"></a>
-<span class="sourceLineNo">680</span><a name="line.680"></a>
-<span class="sourceLineNo">681</span>  private static String 
buildUsername(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.681"></a>
-<span class="sourceLineNo">682</span>    return new 
String(Base64.encodeBase64(blockToken.getIdentifier(), false), 
Charsets.UTF_8);<a name="line.682"></a>
-<span class="sourceLineNo">683</span>  }<a name="line.683"></a>
-<span class="sourceLineNo">684</span><a name="line.684"></a>
-<span class="sourceLineNo">685</span>  private static char[] 
buildClientPassword(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.685"></a>
-<span class="sourceLineNo">686</span>    return new 
String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a 
name="line.686"></a>
-<span class="sourceLineNo">687</span>        .toCharArray();<a 
name="line.687"></a>
-<span class="sourceLineNo">688</span>  }<a name="line.688"></a>
-<span class="sourceLineNo">689</span><a name="line.689"></a>
-<span class="sourceLineNo">690</span>  private static Map&lt;String, 
String&gt; createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a 
name="line.690"></a>
-<span class="sourceLineNo">691</span>    Map&lt;String, String&gt; saslProps = 
Maps.newHashMapWithExpectedSize(3);<a name="line.691"></a>
-<span class="sourceLineNo">692</span>    saslProps.put(Sasl.QOP, 
QualityOfProtection.PRIVACY.getSaslQop());<a name="line.692"></a>
-<span class="sourceLineNo">693</span>    saslProps.put(Sasl.SERVER_AUTH, 
"true");<a name="line.693"></a>
-<span class="sourceLineNo">694</span>    
saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a 
name="line.694"></a>
-<span class="sourceLineNo">695</span>    return saslProps;<a 
name="line.695"></a>
-<span class="sourceLineNo">696</span>  }<a name="line.696"></a>
-<span class="sourceLineNo">697</span><a name="line.697"></a>
-<span class="sourceLineNo">698</span>  private static void 
doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a 
name="line.698"></a>
-<span class="sourceLineNo">699</span>      String username, char[] password, 
Map&lt;String, String&gt; saslProps, Promise&lt;Void&gt; saslPromise) {<a 
name="line.699"></a>
-<span class="sourceLineNo">700</span>    try {<a name="line.700"></a>
-<span class="sourceLineNo">701</span>      channel.pipeline().addLast(new 
IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.701"></a>
-<span class="sourceLineNo">702</span>        new 
ProtobufVarint32FrameDecoder(),<a name="line.702"></a>
-<span class="sourceLineNo">703</span>        new 
ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a 
name="line.703"></a>
-<span class="sourceLineNo">704</span>        new SaslNegotiateHandler(conf, 
username, password, saslProps, timeoutMs, saslPromise));<a name="line.704"></a>
-<span class="sourceLineNo">705</span>    } catch (SaslException e) {<a 
name="line.705"></a>
-<span class="sourceLineNo">706</span>      saslPromise.tryFailure(e);<a 
name="line.706"></a>
-<span class="sourceLineNo">707</span>    }<a name="line.707"></a>
-<span class="sourceLineNo">708</span>  }<a name="line.708"></a>
-<span class="sourceLineNo">709</span><a name="line.709"></a>
-<span class="sourceLineNo">710</span>  static void 
trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a 
name="line.710"></a>
-<span class="sourceLineNo">711</span>      int timeoutMs, DFSClient client, 
Token&lt;BlockTokenIdentifier&gt; accessToken,<a name="line.711"></a>
-<span class="sourceLineNo">712</span>      Promise&lt;Void&gt; saslPromise) 
throws IOException {<a name="line.712"></a>
-<span class="sourceLineNo">713</span>    SaslDataTransferClient saslClient = 
client.getSaslDataTransferClient();<a name="line.713"></a>
-<span class="sourceLineNo">714</span>    SaslPropertiesResolver 
saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a 
name="line.714"></a>
-<span class="sourceLineNo">715</span>    TrustedChannelResolver 
trustedChannelResolver =<a name="line.715"></a>
-<span class="sourceLineNo">716</span>        
SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.716"></a>
-<span class="sourceLineNo">717</span>    AtomicBoolean fallbackToSimpleAuth = 
SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.717"></a>
-<span class="sourceLineNo">718</span>    InetAddress addr = 
((InetSocketAddress) channel.remoteAddress()).getAddress();<a 
name="line.718"></a>
-<span class="sourceLineNo">719</span>    if 
(trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) 
{<a name="line.719"></a>
-<span class="sourceLineNo">720</span>      saslPromise.trySuccess(null);<a 
name="line.720"></a>
-<span class="sourceLineNo">721</span>      return;<a name="line.721"></a>
-<span class="sourceLineNo">722</span>    }<a name="line.722"></a>
-<span class="sourceLineNo">723</span>    DataEncryptionKey encryptionKey = 
client.newDataEncryptionKey();<a name="line.723"></a>
-<span class="sourceLineNo">724</span>    if (encryptionKey != null) {<a 
name="line.724"></a>
-<span class="sourceLineNo">725</span>      if (LOG.isDebugEnabled()) {<a 
name="line.725"></a>
-<span class="sourceLineNo">726</span>        LOG.debug(<a name="line.726"></a>
-<span class="sourceLineNo">727</span>          "SASL client doing encrypted 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.727"></a>
-<span class="sourceLineNo">728</span>      }<a name="line.728"></a>
-<span class="sourceLineNo">729</span>      doSaslNegotiation(conf, channel, 
timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.729"></a>
-<span class="sourceLineNo">730</span>        
encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.730"></a>
-<span class="sourceLineNo">731</span>        
createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), 
saslPromise);<a name="line.731"></a>
-<span class="sourceLineNo">732</span>    } else if 
(!UserGroupInformation.isSecurityEnabled()) {<a name="line.732"></a>
-<span class="sourceLineNo">733</span>      if (LOG.isDebugEnabled()) {<a 
name="line.733"></a>
-<span class="sourceLineNo">734</span>        LOG.debug("SASL client skipping 
handshake in unsecured configuration for addr = " + addr<a name="line.734"></a>
-<span class="sourceLineNo">735</span>            + ", datanodeId = " + 
dnInfo);<a name="line.735"></a>
-<span class="sourceLineNo">736</span>      }<a name="line.736"></a>
-<span class="sourceLineNo">737</span>      saslPromise.trySuccess(null);<a 
name="line.737"></a>
-<span class="sourceLineNo">738</span>    } else if (dnInfo.getXferPort() &lt; 
1024) {<a name="line.738"></a>
-<span class="sourceLineNo">739</span>      if (LOG.isDebugEnabled()) {<a 
name="line.739"></a>
-<span class="sourceLineNo">740</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.740"></a>
-<span class="sourceLineNo">741</span>            + "privileged port for addr = 
" + addr + ", datanodeId = " + dnInfo);<a name="line.741"></a>
-<span class="sourceLineNo">742</span>      }<a name="line.742"></a>
-<span class="sourceLineNo">743</span>      saslPromise.trySuccess(null);<a 
name="line.743"></a>
-<span class="sourceLineNo">744</span>    } else if (fallbackToSimpleAuth != 
null &amp;&amp; fallbackToSimpleAuth.get()) {<a name="line.744"></a>
-<span class="sourceLineNo">745</span>      if (LOG.isDebugEnabled()) {<a 
name="line.745"></a>
-<span class="sourceLineNo">746</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.746"></a>
-<span class="sourceLineNo">747</span>            + "unsecured cluster for addr 
= " + addr + ", datanodeId = " + dnInfo);<a name="line.747"></a>
-<span class="sourceLineNo">748</span>      }<a name="line.748"></a>
-<span class="sourceLineNo">749</span>      saslPromise.trySuccess(null);<a 
name="line.749"></a>
-<span class="sourceLineNo">750</span>    } else if (saslPropsResolver != null) 
{<a name="line.750"></a>
-<span class="sourceLineNo">751</span>      if (LOG.isDebugEnabled()) {<a 
name="line.751"></a>
-<span class="sourceLineNo">752</span>        LOG.debug(<a name="line.752"></a>
-<span class="sourceLineNo">753</span>          "SASL client doing general 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.753"></a>
-<span class="sourceLineNo">754</span>      }<a name="line.754"></a>
-<span class="sourceLineNo">755</span>      doSaslNegotiation(conf, channel, 
timeoutMs, buildUsername(accessToken),<a name="line.755"></a>
-<span class="sourceLineNo">756</span>        buildClientPassword(accessToken), 
saslPropsResolver.getClientProperties(addr), saslPromise);<a 
name="line.756"></a>
-<span class="sourceLineNo">757</span>    } else {<a name="line.757"></a>
-<span class="sourceLineNo">758</span>      // It's a secured cluster using 
non-privileged ports, but no SASL. The only way this can<a name="line.758"></a>
-<span class="sourceLineNo">759</span>      // happen is if the DataNode has 
ignore.secure.ports.for.testing configured, so this is a rare<a 
name="line.759"></a>
-<span class="sourceLineNo">760</span>      // edge case.<a name="line.760"></a>
-<span class="sourceLineNo">761</span>      if (LOG.isDebugEnabled()) {<a 
name="line.761"></a>
-<span class="sourceLineNo">762</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with no SASL "<a name="line.762"></a>
-<span class="sourceLineNo">763</span>            + "protection configured for 
addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.763"></a>
-<span class="sourceLineNo">764</span>      }<a name="line.764"></a>
-<span class="sourceLineNo">765</span>      saslPromise.trySuccess(null);<a 
name="line.765"></a>
-<span class="sourceLineNo">766</span>    }<a name="line.766"></a>
-<span class="sourceLineNo">767</span>  }<a name="line.767"></a>
-<span class="sourceLineNo">768</span><a name="line.768"></a>
-<span class="sourceLineNo">769</span>  static Encryptor 
createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a 
name="line.769"></a>
-<span class="sourceLineNo">770</span>      throws IOException {<a 
name="line.770"></a>
-<span class="sourceLineNo">771</span>    FileEncryptionInfo feInfo = 
stat.getFileEncryptionInfo();<a name="line.771"></a>
-<span class="sourceLineNo">772</span>    if (feInfo == null) {<a 
name="line.772"></a>
-<span class="sourceLineNo">773</span>      return null;<a name="line.773"></a>
-<span class="sourceLineNo">774</span>    }<a name="line.774"></a>
-<span class="sourceLineNo">775</span>    return 
TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a 
name="line.775"></a>
-<span class="sourceLineNo">776</span>  }<a name="line.776"></a>
-<span class="sourceLineNo">777</span>}<a name="line.777"></a>
+<span class="sourceLineNo">635</span>    private final Encryptor encryptor;<a 
name="line.635"></a>
+<span class="sourceLineNo">636</span><a name="line.636"></a>
+<span class="sourceLineNo">637</span>    public EncryptHandler(CryptoCodec 
codec, byte[] key, byte[] iv)<a name="line.637"></a>
+<span class="sourceLineNo">638</span>        throws GeneralSecurityException, 
IOException {<a name="line.638"></a>
+<span class="sourceLineNo">639</span>      this.encryptor = 
codec.createEncryptor();<a name="line.639"></a>
+<span class="sourceLineNo">640</span>      this.encryptor.init(key, 
Arrays.copyOf(iv, iv.length));<a name="line.640"></a>
+<span class="sourceLineNo">641</span>    }<a name="line.641"></a>
+<span class="sourceLineNo">642</span><a name="line.642"></a>
+<span class="sourceLineNo">643</span>    @Override<a name="line.643"></a>
+<span class="sourceLineNo">644</span>    protected ByteBuf 
allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a 
name="line.644"></a>
+<span class="sourceLineNo">645</span>        throws Exception {<a 
name="line.645"></a>
+<span class="sourceLineNo">646</span>      if (preferDirect) {<a 
name="line.646"></a>
+<span class="sourceLineNo">647</span>        return 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.647"></a>
+<span class="sourceLineNo">648</span>      } else {<a name="line.648"></a>
+<span class="sourceLineNo">649</span>        return 
ctx.alloc().buffer(msg.readableBytes());<a name="line.649"></a>
+<span class="sourceLineNo">650</span>      }<a name="line.650"></a>
+<span class="sourceLineNo">651</span>    }<a name="line.651"></a>
+<span class="sourceLineNo">652</span><a name="line.652"></a>
+<span class="sourceLineNo">653</span>    @Override<a name="line.653"></a>
+<span class="sourceLineNo">654</span>    protected void 
encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception 
{<a name="line.654"></a>
+<span class="sourceLineNo">655</span>      ByteBuf inBuf;<a 
name="line.655"></a>
+<span class="sourceLineNo">656</span>      boolean release = false;<a 
name="line.656"></a>
+<span class="sourceLineNo">657</span>      if (msg.nioBufferCount() == 1) {<a 
name="line.657"></a>
+<span class="sourceLineNo">658</span>        inBuf = msg;<a 
name="line.658"></a>
+<span class="sourceLineNo">659</span>      } else {<a name="line.659"></a>
+<span class="sourceLineNo">660</span>        inBuf = 
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.660"></a>
+<span class="sourceLineNo">661</span>        msg.readBytes(inBuf);<a 
name="line.661"></a>
+<span class="sourceLineNo">662</span>        release = true;<a 
name="line.662"></a>
+<span class="sourceLineNo">663</span>      }<a name="line.663"></a>
+<span class="sourceLineNo">664</span>      ByteBuffer inBuffer = 
inBuf.nioBuffer();<a name="line.664"></a>
+<span class="sourceLineNo">665</span>      ByteBuffer outBuffer = 
out.nioBuffer(0, inBuf.readableBytes());<a name="line.665"></a>
+<span class="sourceLineNo">666</span>      encryptor.encrypt(inBuffer, 
outBuffer);<a name="line.666"></a>
+<span class="sourceLineNo">667</span>      
out.writerIndex(inBuf.readableBytes());<a name="line.667"></a>
+<span class="sourceLineNo">668</span>      if (release) {<a 
name="line.668"></a>
+<span class="sourceLineNo">669</span>        inBuf.release();<a 
name="line.669"></a>
+<span class="sourceLineNo">670</span>      }<a name="line.670"></a>
+<span class="sourceLineNo">671</span>    }<a name="line.671"></a>
+<span class="sourceLineNo">672</span>  }<a name="line.672"></a>
+<span class="sourceLineNo">673</span><a name="line.673"></a>
+<span class="sourceLineNo">674</span>  private static String 
getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a 
name="line.674"></a>
+<span class="sourceLineNo">675</span>    return encryptionKey.keyId + 
NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a 
name="line.675"></a>
+<span class="sourceLineNo">676</span>        + new 
String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a 
name="line.676"></a>
+<span class="sourceLineNo">677</span>  }<a name="line.677"></a>
+<span class="sourceLineNo">678</span><a name="line.678"></a>
+<span class="sourceLineNo">679</span>  private static char[] 
encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.679"></a>
+<span class="sourceLineNo">680</span>    return new 
String(Base64.encodeBase64(encryptionKey, false), 
Charsets.UTF_8).toCharArray();<a name="line.680"></a>
+<span class="sourceLineNo">681</span>  }<a name="line.681"></a>
+<span class="sourceLineNo">682</span><a name="line.682"></a>
+<span class="sourceLineNo">683</span>  private static String 
buildUsername(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.683"></a>
+<span class="sourceLineNo">684</span>    return new 
String(Base64.encodeBase64(blockToken.getIdentifier(), false), 
Charsets.UTF_8);<a name="line.684"></a>
+<span class="sourceLineNo">685</span>  }<a name="line.685"></a>
+<span class="sourceLineNo">686</span><a name="line.686"></a>
+<span class="sourceLineNo">687</span>  private static char[] 
buildClientPassword(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a 
name="line.687"></a>
+<span class="sourceLineNo">688</span>    return new 
String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a 
name="line.688"></a>
+<span class="sourceLineNo">689</span>        .toCharArray();<a 
name="line.689"></a>
+<span class="sourceLineNo">690</span>  }<a name="line.690"></a>
+<span class="sourceLineNo">691</span><a name="line.691"></a>
+<span class="sourceLineNo">692</span>  private static Map&lt;String, 
String&gt; createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a 
name="line.692"></a>
+<span class="sourceLineNo">693</span>    Map&lt;String, String&gt; saslProps = 
Maps.newHashMapWithExpectedSize(3);<a name="line.693"></a>
+<span class="sourceLineNo">694</span>    saslProps.put(Sasl.QOP, 
QualityOfProtection.PRIVACY.getSaslQop());<a name="line.694"></a>
+<span class="sourceLineNo">695</span>    saslProps.put(Sasl.SERVER_AUTH, 
"true");<a name="line.695"></a>
+<span class="sourceLineNo">696</span>    
saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a 
name="line.696"></a>
+<span class="sourceLineNo">697</span>    return saslProps;<a 
name="line.697"></a>
+<span class="sourceLineNo">698</span>  }<a name="line.698"></a>
+<span class="sourceLineNo">699</span><a name="line.699"></a>
+<span class="sourceLineNo">700</span>  private static void 
doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a 
name="line.700"></a>
+<span class="sourceLineNo">701</span>      String username, char[] password, 
Map&lt;String, String&gt; saslProps, Promise&lt;Void&gt; saslPromise) {<a 
name="line.701"></a>
+<span class="sourceLineNo">702</span>    try {<a name="line.702"></a>
+<span class="sourceLineNo">703</span>      channel.pipeline().addLast(new 
IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.703"></a>
+<span class="sourceLineNo">704</span>        new 
ProtobufVarint32FrameDecoder(),<a name="line.704"></a>
+<span class="sourceLineNo">705</span>        new 
ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a 
name="line.705"></a>
+<span class="sourceLineNo">706</span>        new SaslNegotiateHandler(conf, 
username, password, saslProps, timeoutMs, saslPromise));<a name="line.706"></a>
+<span class="sourceLineNo">707</span>    } catch (SaslException e) {<a 
name="line.707"></a>
+<span class="sourceLineNo">708</span>      saslPromise.tryFailure(e);<a 
name="line.708"></a>
+<span class="sourceLineNo">709</span>    }<a name="line.709"></a>
+<span class="sourceLineNo">710</span>  }<a name="line.710"></a>
+<span class="sourceLineNo">711</span><a name="line.711"></a>
+<span class="sourceLineNo">712</span>  static void 
trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a 
name="line.712"></a>
+<span class="sourceLineNo">713</span>      int timeoutMs, DFSClient client, 
Token&lt;BlockTokenIdentifier&gt; accessToken,<a name="line.713"></a>
+<span class="sourceLineNo">714</span>      Promise&lt;Void&gt; saslPromise) 
throws IOException {<a name="line.714"></a>
+<span class="sourceLineNo">715</span>    SaslDataTransferClient saslClient = 
client.getSaslDataTransferClient();<a name="line.715"></a>
+<span class="sourceLineNo">716</span>    SaslPropertiesResolver 
saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a 
name="line.716"></a>
+<span class="sourceLineNo">717</span>    TrustedChannelResolver 
trustedChannelResolver =<a name="line.717"></a>
+<span class="sourceLineNo">718</span>        
SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.718"></a>
+<span class="sourceLineNo">719</span>    AtomicBoolean fallbackToSimpleAuth = 
SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.719"></a>
+<span class="sourceLineNo">720</span>    InetAddress addr = 
((InetSocketAddress) channel.remoteAddress()).getAddress();<a 
name="line.720"></a>
+<span class="sourceLineNo">721</span>    if 
(trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) 
{<a name="line.721"></a>
+<span class="sourceLineNo">722</span>      saslPromise.trySuccess(null);<a 
name="line.722"></a>
+<span class="sourceLineNo">723</span>      return;<a name="line.723"></a>
+<span class="sourceLineNo">724</span>    }<a name="line.724"></a>
+<span class="sourceLineNo">725</span>    DataEncryptionKey encryptionKey = 
client.newDataEncryptionKey();<a name="line.725"></a>
+<span class="sourceLineNo">726</span>    if (encryptionKey != null) {<a 
name="line.726"></a>
+<span class="sourceLineNo">727</span>      if (LOG.isDebugEnabled()) {<a 
name="line.727"></a>
+<span class="sourceLineNo">728</span>        LOG.debug(<a name="line.728"></a>
+<span class="sourceLineNo">729</span>          "SASL client doing encrypted 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.729"></a>
+<span class="sourceLineNo">730</span>      }<a name="line.730"></a>
+<span class="sourceLineNo">731</span>      doSaslNegotiation(conf, channel, 
timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.731"></a>
+<span class="sourceLineNo">732</span>        
encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.732"></a>
+<span class="sourceLineNo">733</span>        
createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), 
saslPromise);<a name="line.733"></a>
+<span class="sourceLineNo">734</span>    } else if 
(!UserGroupInformation.isSecurityEnabled()) {<a name="line.734"></a>
+<span class="sourceLineNo">735</span>      if (LOG.isDebugEnabled()) {<a 
name="line.735"></a>
+<span class="sourceLineNo">736</span>        LOG.debug("SASL client skipping 
handshake in unsecured configuration for addr = " + addr<a name="line.736"></a>
+<span class="sourceLineNo">737</span>            + ", datanodeId = " + 
dnInfo);<a name="line.737"></a>
+<span class="sourceLineNo">738</span>      }<a name="line.738"></a>
+<span class="sourceLineNo">739</span>      saslPromise.trySuccess(null);<a 
name="line.739"></a>
+<span class="sourceLineNo">740</span>    } else if (dnInfo.getXferPort() &lt; 
1024) {<a name="line.740"></a>
+<span class="sourceLineNo">741</span>      if (LOG.isDebugEnabled()) {<a 
name="line.741"></a>
+<span class="sourceLineNo">742</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.742"></a>
+<span class="sourceLineNo">743</span>            + "privileged port for addr = 
" + addr + ", datanodeId = " + dnInfo);<a name="line.743"></a>
+<span class="sourceLineNo">744</span>      }<a name="line.744"></a>
+<span class="sourceLineNo">745</span>      saslPromise.trySuccess(null);<a 
name="line.745"></a>
+<span class="sourceLineNo">746</span>    } else if (fallbackToSimpleAuth != 
null &amp;&amp; fallbackToSimpleAuth.get()) {<a name="line.746"></a>
+<span class="sourceLineNo">747</span>      if (LOG.isDebugEnabled()) {<a 
name="line.747"></a>
+<span class="sourceLineNo">748</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with "<a name="line.748"></a>
+<span class="sourceLineNo">749</span>            + "unsecured cluster for addr 
= " + addr + ", datanodeId = " + dnInfo);<a name="line.749"></a>
+<span class="sourceLineNo">750</span>      }<a name="line.750"></a>
+<span class="sourceLineNo">751</span>      saslPromise.trySuccess(null);<a 
name="line.751"></a>
+<span class="sourceLineNo">752</span>    } else if (saslPropsResolver != null) 
{<a name="line.752"></a>
+<span class="sourceLineNo">753</span>      if (LOG.isDebugEnabled()) {<a 
name="line.753"></a>
+<span class="sourceLineNo">754</span>        LOG.debug(<a name="line.754"></a>
+<span class="sourceLineNo">755</span>          "SASL client doing general 
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a 
name="line.755"></a>
+<span class="sourceLineNo">756</span>      }<a name="line.756"></a>
+<span class="sourceLineNo">757</span>      doSaslNegotiation(conf, channel, 
timeoutMs, buildUsername(accessToken),<a name="line.757"></a>
+<span class="sourceLineNo">758</span>        buildClientPassword(accessToken), 
saslPropsResolver.getClientProperties(addr), saslPromise);<a 
name="line.758"></a>
+<span class="sourceLineNo">759</span>    } else {<a name="line.759"></a>
+<span class="sourceLineNo">760</span>      // It's a secured cluster using 
non-privileged ports, but no SASL. The only way this can<a name="line.760"></a>
+<span class="sourceLineNo">761</span>      // happen is if the DataNode has 
ignore.secure.ports.for.testing configured, so this is a rare<a 
name="line.761"></a>
+<span class="sourceLineNo">762</span>      // edge case.<a name="line.762"></a>
+<span class="sourceLineNo">763</span>      if (LOG.isDebugEnabled()) {<a 
name="line.763"></a>
+<span class="sourceLineNo">764</span>        LOG.debug("SASL client skipping 
handshake in secured configuration with no SASL "<a name="line.764"></a>
+<span class="sourceLineNo">765</span>            + "protection configured for 
addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.765"></a>
+<span class="sourceLineNo">766</span>      }<a name="line.766"></a>
+<span class="sourceLineNo">767</span>      saslPromise.trySuccess(null);<a 
name="line.767"></a>
+<span class="sourceLineNo">768</span>    }<a name="line.768"></a>
+<span class="sourceLineNo">769</span>  }<a name="line.769"></a>
+<span class="sourceLineNo">770</span><a name="line.770"></a>
+<span class="sourceLineNo">771</span>  static Encryptor 
createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a 
name="line.771"></a>
+<span class="sourceLineNo">772</span>      throws IOException {<a 
name="line.772"></a>
+<span class="sourceLineNo">773</span>    FileEncryptionInfo feInfo = 
stat.getFileEncryptionInfo();<a name="line.773"></a>
+<span class="sourceLineNo">774</span>    if (feInfo == null) {<a 
name="line.774"></a>
+<span class="sourceLineNo">775</span>      return null;<a name="line.775"></a>
+<span class="sourceLineNo">776</span>    }<a name="line.776"></a>
+<span class="sourceLineNo">777</span>    return 
TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a 
name="line.777"></a>
+<span class="sourceLineNo">778</span>  }<a name="line.778"></a>
+<span class="sourceLineNo">779</span>}<a name="line.779"></a>
 
 
 

Reply via email to