|
29 | 29 | import io.vertx.test.fakecluster.FakeClusterManager;
|
30 | 30 | import org.junit.Rule;
|
31 | 31 |
|
| 32 | +import javax.net.ssl.SSLContext; |
| 33 | +import javax.net.ssl.SSLSocketFactory; |
| 34 | +import java.security.NoSuchAlgorithmException; |
32 | 35 | import java.util.ArrayList;
|
33 | 36 | import java.util.Collections;
|
34 | 37 | import java.util.List;
|
@@ -181,80 +184,17 @@ protected static void setOptions(TCPSSLOptions sslOptions, KeyCertOptions option
|
181 | 184 | }
|
182 | 185 | }
|
183 | 186 |
|
184 |
| - protected static final String[] ENABLED_CIPHER_SUITES = |
185 |
| - new String[] { |
186 |
| - "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256", |
187 |
| - "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", |
188 |
| - "TLS_RSA_WITH_AES_128_CBC_SHA256", |
189 |
| - "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256", |
190 |
| - "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256", |
191 |
| - "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256", |
192 |
| - "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256", |
193 |
| - "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA", |
194 |
| - "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", |
195 |
| - "TLS_RSA_WITH_AES_128_CBC_SHA", |
196 |
| - "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA", |
197 |
| - "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA", |
198 |
| - "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", |
199 |
| - "TLS_DHE_DSS_WITH_AES_128_CBC_SHA", |
200 |
| - "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA", |
201 |
| - "TLS_ECDHE_RSA_WITH_RC4_128_SHA", |
202 |
| - "SSL_RSA_WITH_RC4_128_SHA", |
203 |
| - "TLS_ECDH_ECDSA_WITH_RC4_128_SHA", |
204 |
| - "TLS_ECDH_RSA_WITH_RC4_128_SHA", |
205 |
| - "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", |
206 |
| - "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", |
207 |
| - "TLS_RSA_WITH_AES_128_GCM_SHA256", |
208 |
| - "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256", |
209 |
| - "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256", |
210 |
| - "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", |
211 |
| - "TLS_DHE_DSS_WITH_AES_128_GCM_SHA256", |
212 |
| - "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA", |
213 |
| - "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", |
214 |
| - "SSL_RSA_WITH_3DES_EDE_CBC_SHA", |
215 |
| - "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA", |
216 |
| - "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA", |
217 |
| - "SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA", |
218 |
| - "SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA", |
219 |
| - "SSL_RSA_WITH_RC4_128_MD5", |
220 |
| - "TLS_EMPTY_RENEGOTIATION_INFO_SCSV", |
221 |
| - "TLS_DH_anon_WITH_AES_128_GCM_SHA256", |
222 |
| - "TLS_DH_anon_WITH_AES_128_CBC_SHA256", |
223 |
| - "TLS_ECDH_anon_WITH_AES_128_CBC_SHA", |
224 |
| - "TLS_DH_anon_WITH_AES_128_CBC_SHA", |
225 |
| - "TLS_ECDH_anon_WITH_RC4_128_SHA", |
226 |
| - "SSL_DH_anon_WITH_RC4_128_MD5", |
227 |
| - "TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA", |
228 |
| - "SSL_DH_anon_WITH_3DES_EDE_CBC_SHA", |
229 |
| - "TLS_RSA_WITH_NULL_SHA256", |
230 |
| - "TLS_ECDHE_ECDSA_WITH_NULL_SHA", |
231 |
| - "TLS_ECDHE_RSA_WITH_NULL_SHA", |
232 |
| - "SSL_RSA_WITH_NULL_SHA", |
233 |
| - "TLS_ECDH_ECDSA_WITH_NULL_SHA", |
234 |
| - "TLS_ECDH_RSA_WITH_NULL_SHA", |
235 |
| - "TLS_ECDH_anon_WITH_NULL_SHA", |
236 |
| - "SSL_RSA_WITH_NULL_MD5", |
237 |
| - "SSL_RSA_WITH_DES_CBC_SHA", |
238 |
| - "SSL_DHE_RSA_WITH_DES_CBC_SHA", |
239 |
| - "SSL_DHE_DSS_WITH_DES_CBC_SHA", |
240 |
| - "SSL_DH_anon_WITH_DES_CBC_SHA", |
241 |
| - "SSL_RSA_EXPORT_WITH_RC4_40_MD5", |
242 |
| - "SSL_DH_anon_EXPORT_WITH_RC4_40_MD5", |
243 |
| - "SSL_RSA_EXPORT_WITH_DES40_CBC_SHA", |
244 |
| - "SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA", |
245 |
| - "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA", |
246 |
| - "SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA", |
247 |
| - "TLS_KRB5_WITH_RC4_128_SHA", |
248 |
| - "TLS_KRB5_WITH_RC4_128_MD5", |
249 |
| - "TLS_KRB5_WITH_3DES_EDE_CBC_SHA", |
250 |
| - "TLS_KRB5_WITH_3DES_EDE_CBC_MD5", |
251 |
| - "TLS_KRB5_WITH_DES_CBC_SHA", |
252 |
| - "TLS_KRB5_WITH_DES_CBC_MD5", |
253 |
| - "TLS_KRB5_EXPORT_WITH_RC4_40_SHA", |
254 |
| - "TLS_KRB5_EXPORT_WITH_RC4_40_MD5", |
255 |
| - "TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA", |
256 |
| - "TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5" |
257 |
| - }; |
| 187 | + protected static final String[] ENABLED_CIPHER_SUITES; |
| 188 | + |
| 189 | + static { |
| 190 | + String[] suites = new String[0]; |
| 191 | + try { |
| 192 | + suites = SSLContext.getDefault().getSocketFactory().getSupportedCipherSuites(); |
| 193 | + } catch (NoSuchAlgorithmException e) { |
| 194 | + e.printStackTrace(); |
| 195 | + } |
| 196 | + ENABLED_CIPHER_SUITES = suites; |
| 197 | + } |
258 | 198 |
|
259 | 199 | /**
|
260 | 200 | * Create a worker verticle for the current Vert.x and return its context.
|
|
0 commit comments