Author: markt
Date: Thu Dec 21 20:16:26 2017
New Revision: 1818976

URL: http://svn.apache.org/viewvc?rev=1818976&view=rev
Log:
Add support for the OpenSSL ARIA ciphers to the OpenSSL to JSSE cipher mapping.
Modified:
    tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Cipher.java
    tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Encryption.java
    tomcat/trunk/test/org/apache/tomcat/util/net/openssl/ciphers/TestCipher.java
    tomcat/trunk/webapps/docs/changelog.xml

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Cipher.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Cipher.java?rev=1818976&r1=1818975&r2=1818976&view=diff
==============================================================================
--- tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Cipher.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Cipher.java 
Thu Dec 21 20:16:26 2017
@@ -3706,9 +3706,291 @@ public enum Cipher {
             null
     ),
 
-    /* ARIA ciphers 0xC03C to 0xC071
+    /* ARIA ciphers 0xC03C to 0xC04F
      * Unsupported by both Java and OpenSSL
      */
+
+    TLS_RSA_WITH_ARIA_128_GCM_SHA256(
+            0xC050,
+            "ARIA128-GCM-SHA256",
+            KeyExchange.RSA,
+            Authentication.RSA,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_RSA_WITH_ARIA_256_GCM_SHA384(
+            0xC051,
+            "ARIA256-GCM-SHA384",
+            KeyExchange.RSA,
+            Authentication.RSA,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+    TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256(
+            0xC052,
+            "DHE-RSA-ARIA128-GCM-SHA256",
+            KeyExchange.EDH,
+            Authentication.RSA,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384(
+            0xC053,
+            "DHE-RSA-ARIA256-GCM-SHA384",
+            KeyExchange.EDH,
+            Authentication.RSA,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+
+    /* ARIA ciphers 0xC054 to 0xC055
+     * Unsupported by both Java and OpenSSL
+     */
+
+    TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256(
+            0xC056,
+            "DHE-DSS-ARIA128-GCM-SHA256",
+            KeyExchange.EDH,
+            Authentication.DSS,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384(
+            0xC057,
+            "DHE-DSS-ARIA256-GCM-SHA384",
+            KeyExchange.EDH,
+            Authentication.DSS,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+
+    /* ARIA ciphers 0xC058 to 0xC05B
+     * Unsupported by both Java and OpenSSL
+     */
+
+    TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256(
+            0xC05C,
+            "ECDHE_ECDSA-ARIA128-GCM-SHA256",
+            KeyExchange.ECDHe,
+            Authentication.ECDSA,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384(
+            0xC05D,
+            "ECDHE_ECDSA-ARIA256-GCM-SHA384",
+            KeyExchange.ECDHe,
+            Authentication.ECDSA,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+
+    /* ARIA ciphers 0xC05E to 0xC05F
+     * Unsupported by both Java and OpenSSL
+     */
+
+    TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256(
+            0xC060,
+            "ECDHE-RSA-ARIA128-GCM-SHA256",
+            KeyExchange.ECDHe,
+            Authentication.RSA,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384(
+            0xC061,
+            "ECDHE-RSA-ARIA256-GCM-SHA384",
+            KeyExchange.ECDHe,
+            Authentication.RSA,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+
+    /* ARIA ciphers 0xC062 to 0xC069
+     * Unsupported by both Java and OpenSSL
+     */
+
+    TLS_PSK_WITH_ARIA_128_GCM_SHA256(
+            0xC06A,
+            "PSK-ARIA128-GCM-SHA256",
+            KeyExchange.PSK,
+            Authentication.PSK,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_PSK_WITH_ARIA_256_GCM_SHA384(
+            0xC06B,
+            "PSK-ARIA256-GCM-SHA384",
+            KeyExchange.PSK,
+            Authentication.PSK,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+    TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256(
+            0xC06C,
+            "DHE-PSK-ARIA128-GCM-SHA256",
+            KeyExchange.DHEPSK,
+            Authentication.PSK,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384(
+            0xC06D,
+            "DHE-PSK-ARIA256-GCM-SHA384",
+            KeyExchange.DHEPSK,
+            Authentication.PSK,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+    TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256(
+            0xC06E,
+            "RSA-PSK-ARIA128-GCM-SHA256",
+            KeyExchange.RSAPSK,
+            Authentication.RSA,
+            Encryption.ARIA128GCM,
+            MessageDigest.SHA256,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            128,
+            128,
+            null,
+            null
+    ),
+    TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384(
+            0xC06F,
+            "RSA-PSK-ARIA256-GCM-SHA384",
+            KeyExchange.RSAPSK,
+            Authentication.RSA,
+            Encryption.ARIA256GCM,
+            MessageDigest.SHA384,
+            Protocol.TLSv1_2,
+            false,
+            EncryptionLevel.HIGH,
+            false,
+            256,
+            256,
+            null,
+            null
+    ),
+
+    /* ARIA ciphers 0xC070 to 0xC071
+     * Unsupported by both Java and OpenSSL
+     */
+
     // Cipher C072
     TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256(
             0xC072,

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Encryption.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Encryption.java?rev=1818976&r1=1818975&r2=1818976&view=diff
==============================================================================
--- 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Encryption.java 
(original)
+++ 
tomcat/trunk/java/org/apache/tomcat/util/net/openssl/ciphers/Encryption.java 
Thu Dec 21 20:16:26 2017
@@ -26,6 +26,8 @@ enum Encryption {
     AES256CCM,
     AES256CCM8,
     AES256GCM,
+    ARIA128GCM,
+    ARIA256GCM,
     CAMELLIA256,
     CAMELLIA128,
     CHACHA20POLY1305,

Modified: 
tomcat/trunk/test/org/apache/tomcat/util/net/openssl/ciphers/TestCipher.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/test/org/apache/tomcat/util/net/openssl/ciphers/TestCipher.java?rev=1818976&r1=1818975&r2=1818976&view=diff
==============================================================================
--- 
tomcat/trunk/test/org/apache/tomcat/util/net/openssl/ciphers/TestCipher.java 
(original)
+++ 
tomcat/trunk/test/org/apache/tomcat/util/net/openssl/ciphers/TestCipher.java 
Thu Dec 21 20:16:26 2017
@@ -373,12 +373,18 @@ public class TestCipher {
                     "AES128-CCM8+TLSv1.2",
                     "AES256-CCM+TLSv1.2",
                     "AES256-CCM8+TLSv1.2",
+                    "ARIA128-GCM-SHA256",
+                    "ARIA256-GCM-SHA384",
                     "DES-CBC-MD5+SSLv2",
                     "DES-CBC3-MD5+SSLv2",
+                    "DHE-DSS-ARIA128-GCM-SHA256",
+                    "DHE-DSS-ARIA256-GCM-SHA384",
                     "DHE-PSK-AES128-CCM+TLSv1.2",
                     "DHE-PSK-AES128-CCM8+TLSv1.2",
                     "DHE-PSK-AES256-CCM+TLSv1.2",
                     "DHE-PSK-AES256-CCM8+TLSv1.2",
+                    "DHE-PSK-ARIA128-GCM-SHA256",
+                    "DHE-PSK-ARIA256-GCM-SHA384",
                     "DHE-PSK-CAMELLIA128-SHA256+TLSv1",
                     "DHE-PSK-CAMELLIA256-SHA384+TLSv1",
                     "DHE-PSK-CHACHA20-POLY1305+TLSv1.2",
@@ -386,6 +392,10 @@ public class TestCipher {
                     "DHE-RSA-AES128-CCM8+TLSv1.2",
                     "DHE-RSA-AES256-CCM+TLSv1.2",
                     "DHE-RSA-AES256-CCM8+TLSv1.2",
+                    "DHE-RSA-ARIA128-GCM-SHA256",
+                    "DHE-RSA-ARIA256-GCM-SHA384",
+                    "ECDHE-ARIA128-GCM-SHA256",
+                    "ECDHE-ARIA256-GCM-SHA384",
                     "DHE-RSA-CHACHA20-POLY1305+TLSv1.2",
                     "ECDH-ECDSA-CAMELLIA128-SHA256+TLSv1.2",
                     "ECDH-ECDSA-CAMELLIA256-SHA384+TLSv1.2",
@@ -395,6 +405,8 @@ public class TestCipher {
                     "ECDHE-ECDSA-AES128-CCM8+TLSv1.2",
                     "ECDHE-ECDSA-AES256-CCM+TLSv1.2",
                     "ECDHE-ECDSA-AES256-CCM8+TLSv1.2",
+                    "ECDHE-ECDSA-ARIA128-GCM-SHA256",
+                    "ECDHE-ECDSA-ARIA256-GCM-SHA384",
                     "ECDHE-ECDSA-CAMELLIA128-SHA256+TLSv1.2",
                     "ECDHE-ECDSA-CAMELLIA256-SHA384+TLSv1.2",
                     "ECDHE-ECDSA-CHACHA20-POLY1305+TLSv1.2",
@@ -411,11 +423,15 @@ public class TestCipher {
                     "PSK-AES128-CCM8+TLSv1.2",
                     "PSK-AES256-CCM+TLSv1.2",
                     "PSK-AES256-CCM8+TLSv1.2",
+                    "PSK-ARIA128-GCM-SHA256",
+                    "PSK-ARIA256-GCM-SHA384",
                     "PSK-CAMELLIA128-SHA256+TLSv1",
                     "PSK-CAMELLIA256-SHA384+TLSv1",
                     "PSK-CHACHA20-POLY1305+TLSv1.2",
                     "RC2-CBC-MD5+SSLv2",
                     "RC4-MD5+SSLv2",
+                    "RSA-PSK-ARIA128-GCM-SHA256",
+                    "RSA-PSK-ARIA256-GCM-SHA384",
                     "RSA-PSK-CAMELLIA128-SHA256+TLSv1",
                     "RSA-PSK-CAMELLIA256-SHA384+TLSv1",
                     "RSA-PSK-CHACHA20-POLY1305+TLSv1.2",
@@ -569,6 +585,8 @@ public class TestCipher {
                     "AES128-CCM8+TLSv1.2",
                     "AES256-CCM+TLSv1.2",
                     "AES256-CCM8+TLSv1.2",
+                    "ARIA128-GCM-SHA256",
+                    "ARIA256-GCM-SHA384",
                     "CAMELLIA128-SHA+SSLv3",
                     "CAMELLIA256-SHA+SSLv3",
                     "CAMELLIA128-SHA256+TLSv1.2",
@@ -601,6 +619,8 @@ public class TestCipher {
                     "DH-RSA-DES-CBC-SHA+SSLv3",
                     "DH-RSA-DES-CBC3-SHA+SSLv3",
                     "DH-RSA-SEED-SHA+SSLv3",
+                    "DHE-DSS-ARIA128-GCM-SHA256",
+                    "DHE-DSS-ARIA256-GCM-SHA384",
                     "DHE-DSS-CAMELLIA128-SHA+SSLv3",
                     "DHE-DSS-CAMELLIA128-SHA256+TLSv1.2",
                     "DHE-DSS-CAMELLIA256-SHA+SSLv3",
@@ -617,6 +637,8 @@ public class TestCipher {
                     "DHE-PSK-AES256-CCM+TLSv1.2",
                     "DHE-PSK-AES256-CCM8+TLSv1.2",
                     "DHE-PSK-AES256-GCM-SHA384+TLSv1.2",
+                    "DHE-PSK-ARIA128-GCM-SHA256",
+                    "DHE-PSK-ARIA256-GCM-SHA384",
                     "DHE-PSK-CAMELLIA128-SHA256+TLSv1",
                     "DHE-PSK-CAMELLIA256-SHA384+TLSv1",
                     "DHE-PSK-CHACHA20-POLY1305+TLSv1.2",
@@ -628,6 +650,8 @@ public class TestCipher {
                     "DHE-RSA-AES128-CCM8+TLSv1.2",
                     "DHE-RSA-AES256-CCM+TLSv1.2",
                     "DHE-RSA-AES256-CCM8+TLSv1.2",
+                    "DHE-RSA-ARIA128-GCM-SHA256",
+                    "DHE-RSA-ARIA256-GCM-SHA384",
                     "DHE-RSA-CAMELLIA128-SHA+SSLv3",
                     "DHE-RSA-CAMELLIA128-SHA256+TLSv1.2",
                     "DHE-RSA-CAMELLIA256-SHA+SSLv3",
@@ -638,10 +662,14 @@ public class TestCipher {
                     "ECDH-ECDSA-CAMELLIA256-SHA384+TLSv1.2",
                     "ECDH-RSA-CAMELLIA128-SHA256+TLSv1.2",
                     "ECDH-RSA-CAMELLIA256-SHA384+TLSv1.2",
+                    "ECDHE-ARIA128-GCM-SHA256",
+                    "ECDHE-ARIA256-GCM-SHA384",
                     "ECDHE-ECDSA-AES128-CCM+TLSv1.2",
                     "ECDHE-ECDSA-AES128-CCM8+TLSv1.2",
                     "ECDHE-ECDSA-AES256-CCM+TLSv1.2",
                     "ECDHE-ECDSA-AES256-CCM8+TLSv1.2",
+                    "ECDHE-ECDSA-ARIA128-GCM-SHA256",
+                    "ECDHE-ECDSA-ARIA256-GCM-SHA384",
                     "ECDHE-ECDSA-CAMELLIA128-SHA256+TLSv1.2",
                     "ECDHE-ECDSA-CAMELLIA256-SHA384+TLSv1.2",
                     "ECDHE-ECDSA-CHACHA20-POLY1305+TLSv1.2",
@@ -677,6 +705,8 @@ public class TestCipher {
                     "PSK-AES256-CCM+TLSv1.2",
                     "PSK-AES256-CCM8+TLSv1.2",
                     "PSK-AES256-GCM-SHA384+TLSv1.2",
+                    "PSK-ARIA128-GCM-SHA256",
+                    "PSK-ARIA256-GCM-SHA384",
                     "PSK-CAMELLIA128-SHA256+TLSv1",
                     "PSK-CAMELLIA256-SHA384+TLSv1",
                     "PSK-CHACHA20-POLY1305+TLSv1.2",
@@ -693,6 +723,8 @@ public class TestCipher {
                     "RSA-PSK-AES256-CBC-SHA+SSLv3",
                     "RSA-PSK-AES256-CBC-SHA384+TLSv1",
                     "RSA-PSK-AES256-GCM-SHA384+TLSv1.2",
+                    "RSA-PSK-ARIA128-GCM-SHA256",
+                    "RSA-PSK-ARIA256-GCM-SHA384",
                     "RSA-PSK-CAMELLIA128-SHA256+TLSv1",
                     "RSA-PSK-CAMELLIA256-SHA384+TLSv1",
                     "RSA-PSK-CHACHA20-POLY1305+TLSv1.2",

Modified: tomcat/trunk/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/webapps/docs/changelog.xml?rev=1818976&r1=1818975&r2=1818976&view=diff
==============================================================================
--- tomcat/trunk/webapps/docs/changelog.xml (original)
+++ tomcat/trunk/webapps/docs/changelog.xml Thu Dec 21 20:16:26 2017
@@ -79,6 +79,10 @@
         <bug>61914</bug>: Possible NPE with Java 9 when creating a SSL engine.
         Patch submitted by Evgenij Ryazanov. (remm)
       </fix>
+      <add>
+        Add support for the OpenSSL ARIA ciphers to the OpenSSL to JSSE
+        cipher mapping. (markt)
+      </add>
     </changelog>
   </subsection>
   <subsection name="Jasper">



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to