|
31 | 31 | import java.security.cert.*; |
32 | 32 | import java.util.*; |
33 | 33 | import javax.net.ssl.*; |
34 | | -import jdk.internal.misc.SharedSecrets; |
35 | 34 | import sun.security.action.GetPropertyAction; |
36 | 35 | import sun.security.provider.certpath.AlgorithmChecker; |
37 | 36 | import sun.security.validator.Validator; |
@@ -543,38 +542,20 @@ private abstract static class AbstractTLSContext extends SSLContextImpl { |
543 | 542 |
|
544 | 543 | static { |
545 | 544 | if (SunJSSE.isFIPS()) { |
546 | | - if (SharedSecrets.getJavaSecuritySystemConfiguratorAccess() |
547 | | - .isSystemFipsEnabled()) { |
548 | | - // RH1860986: TLSv1.3 key derivation not supported with |
549 | | - // the Security Providers available in system FIPS mode. |
550 | | - supportedProtocols = Arrays.asList( |
551 | | - ProtocolVersion.TLS12, |
552 | | - ProtocolVersion.TLS11, |
553 | | - ProtocolVersion.TLS10 |
554 | | - ); |
555 | | - |
556 | | - serverDefaultProtocols = getAvailableProtocols( |
557 | | - new ProtocolVersion[] { |
558 | | - ProtocolVersion.TLS12, |
559 | | - ProtocolVersion.TLS11, |
560 | | - ProtocolVersion.TLS10 |
561 | | - }); |
562 | | - } else { |
563 | | - supportedProtocols = Arrays.asList( |
564 | | - ProtocolVersion.TLS13, |
565 | | - ProtocolVersion.TLS12, |
566 | | - ProtocolVersion.TLS11, |
567 | | - ProtocolVersion.TLS10 |
568 | | - ); |
| 545 | + supportedProtocols = Arrays.asList( |
| 546 | + ProtocolVersion.TLS13, |
| 547 | + ProtocolVersion.TLS12, |
| 548 | + ProtocolVersion.TLS11, |
| 549 | + ProtocolVersion.TLS10 |
| 550 | + ); |
569 | 551 |
|
570 | | - serverDefaultProtocols = getAvailableProtocols( |
571 | | - new ProtocolVersion[] { |
572 | | - ProtocolVersion.TLS13, |
573 | | - ProtocolVersion.TLS12, |
574 | | - ProtocolVersion.TLS11, |
575 | | - ProtocolVersion.TLS10 |
576 | | - }); |
577 | | - } |
| 552 | + serverDefaultProtocols = getAvailableProtocols( |
| 553 | + new ProtocolVersion[] { |
| 554 | + ProtocolVersion.TLS13, |
| 555 | + ProtocolVersion.TLS12, |
| 556 | + ProtocolVersion.TLS11, |
| 557 | + ProtocolVersion.TLS10 |
| 558 | + }); |
578 | 559 | } else { |
579 | 560 | supportedProtocols = Arrays.asList( |
580 | 561 | ProtocolVersion.TLS13, |
@@ -639,16 +620,6 @@ boolean isDTLS() { |
639 | 620 |
|
640 | 621 | static ProtocolVersion[] getSupportedProtocols() { |
641 | 622 | if (SunJSSE.isFIPS()) { |
642 | | - if (SharedSecrets.getJavaSecuritySystemConfiguratorAccess() |
643 | | - .isSystemFipsEnabled()) { |
644 | | - // RH1860986: TLSv1.3 key derivation not supported with |
645 | | - // the Security Providers available in system FIPS mode. |
646 | | - return new ProtocolVersion[] { |
647 | | - ProtocolVersion.TLS12, |
648 | | - ProtocolVersion.TLS11, |
649 | | - ProtocolVersion.TLS10 |
650 | | - }; |
651 | | - } |
652 | 623 | return new ProtocolVersion[] { |
653 | 624 | ProtocolVersion.TLS13, |
654 | 625 | ProtocolVersion.TLS12, |
@@ -978,16 +949,6 @@ private static List<ProtocolVersion> customizedProtocols( |
978 | 949 |
|
979 | 950 | static ProtocolVersion[] getProtocols() { |
980 | 951 | if (SunJSSE.isFIPS()) { |
981 | | - if (SharedSecrets.getJavaSecuritySystemConfiguratorAccess() |
982 | | - .isSystemFipsEnabled()) { |
983 | | - // RH1860986: TLSv1.3 key derivation not supported with |
984 | | - // the Security Providers available in system FIPS mode. |
985 | | - return new ProtocolVersion[] { |
986 | | - ProtocolVersion.TLS12, |
987 | | - ProtocolVersion.TLS11, |
988 | | - ProtocolVersion.TLS10 |
989 | | - }; |
990 | | - } |
991 | 952 | return new ProtocolVersion[]{ |
992 | 953 | ProtocolVersion.TLS13, |
993 | 954 | ProtocolVersion.TLS12, |
|
0 commit comments