This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 11.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/11.0.x by this push:
     new 4decf9f7b3 Remove support for the FZA aliases
4decf9f7b3 is described below

commit 4decf9f7b3ebd7fb7c0353ce049393bcd09c3fc1
Author: Mark Thomas <[email protected]>
AuthorDate: Tue Feb 10 16:18:52 2026 +0000

    Remove support for the FZA aliases
---
 .../ciphers/OpenSSLCipherConfigurationParser.java  | 21 ----------
 .../TestOpenSSLCipherConfigurationParser.java      | 48 +++++++++++-----------
 webapps/docs/changelog.xml                         |  8 ++--
 3 files changed, 29 insertions(+), 48 deletions(-)

diff --git 
a/java/org/apache/tomcat/util/net/openssl/ciphers/OpenSSLCipherConfigurationParser.java
 
b/java/org/apache/tomcat/util/net/openssl/ciphers/OpenSSLCipherConfigurationParser.java
index 8add5928d2..f8e1042745 100644
--- 
a/java/org/apache/tomcat/util/net/openssl/ciphers/OpenSSLCipherConfigurationParser.java
+++ 
b/java/org/apache/tomcat/util/net/openssl/ciphers/OpenSSLCipherConfigurationParser.java
@@ -199,22 +199,6 @@ public class OpenSSLCipherConfigurationParser {
      * Cipher suites effectively using ECDSA authentication, i.e. the 
certificates carry ECDSA keys.
      */
     private static final String ECDSA = "ECDSA";
-    /**
-     * Ciphers suites using FORTEZZA key exchange algorithms.
-     */
-    private static final String kFZA = "kFZA";
-    /**
-     * Ciphers suites using FORTEZZA authentication algorithms.
-     */
-    private static final String aFZA = "aFZA";
-    /**
-     * Ciphers suites using FORTEZZA encryption algorithms.
-     */
-    private static final String eFZA = "eFZA";
-    /**
-     * Ciphers suites using all FORTEZZA algorithms.
-     */
-    private static final String FZA = "FZA";
     /**
      * Cipher suites using DH, including anonymous DH, ephemeral DH and fixed 
DH.
      */
@@ -476,11 +460,6 @@ public class OpenSSLCipherConfigurationParser {
         addListAlias(aECDH, filterByAuthentication(allCiphers, 
Collections.singleton(Authentication.ECDH)));
         addListAlias(ECDSA, filterByAuthentication(allCiphers, 
Collections.singleton(Authentication.ECDSA)));
         aliases.put(aECDSA, aliases.get(ECDSA));
-        addListAlias(kFZA, filterByKeyExchange(allCiphers, 
Collections.singleton(KeyExchange.FZA)));
-        addListAlias(aFZA, filterByAuthentication(allCiphers, 
Collections.singleton(Authentication.FZA)));
-        addListAlias(eFZA, filterByEncryption(allCiphers, 
Collections.singleton(Encryption.FZA)));
-        addListAlias(FZA, filter(allCiphers, null, 
Collections.singleton(KeyExchange.FZA),
-                Collections.singleton(Authentication.FZA), 
Collections.singleton(Encryption.FZA), null, null));
         addListAlias(Constants.SSL_PROTO_TLSv1_2,
                 filterByProtocol(allCiphers, 
Collections.singleton(Protocol.TLSv1_2)));
         addListAlias(Constants.SSL_PROTO_TLSv1_0, filterByProtocol(allCiphers, 
Collections.singleton(Protocol.TLSv1)));
diff --git 
a/test/org/apache/tomcat/util/net/openssl/ciphers/TestOpenSSLCipherConfigurationParser.java
 
b/test/org/apache/tomcat/util/net/openssl/ciphers/TestOpenSSLCipherConfigurationParser.java
index c48bcb40d6..2c092efa7a 100644
--- 
a/test/org/apache/tomcat/util/net/openssl/ciphers/TestOpenSSLCipherConfigurationParser.java
+++ 
b/test/org/apache/tomcat/util/net/openssl/ciphers/TestOpenSSLCipherConfigurationParser.java
@@ -232,30 +232,6 @@ public class TestOpenSSLCipherConfigurationParser {
     }
 
 
-    @Test
-    public void testkFZA() throws Exception {
-        testSpecification("kFZA");
-    }
-
-
-    @Test
-    public void testaFZA() throws Exception {
-        testSpecification("aFZA");
-    }
-
-
-    @Test
-    public void testeFZA() throws Exception {
-        testSpecification("eFZA");
-    }
-
-
-    @Test
-    public void testFZA() throws Exception {
-        testSpecification("FZA");
-    }
-
-
     @Test
     public void testTLSv1_2() throws Exception {
         testSpecification("TLSv1.2");
@@ -599,6 +575,30 @@ public class TestOpenSSLCipherConfigurationParser {
     }
 
 
+    @Test
+    public void testSpecificationIsEmptykFZA() throws Exception {
+        testSpecificationIsEmpty("kFZA");
+    }
+
+
+    @Test
+    public void testSpecificationIsEmptyaFZA() throws Exception {
+        testSpecificationIsEmpty("aFZA");
+    }
+
+
+    @Test
+    public void testSpecificationIsEmptyeFZA() throws Exception {
+        testSpecificationIsEmpty("eFZA");
+    }
+
+
+    @Test
+    public void testSpecificationIsEmptyFZA() throws Exception {
+        testSpecificationIsEmpty("FZA");
+    }
+
+
     private void testSpecificationIsEmpty(String specification) throws 
Exception {
         String openSSLCipherList = 
TesterOpenSSL.getOpenSSLCiphersAsExpression(specification);
         Assert.assertEquals("Specification [" + specification + "] returned [" 
+ openSSLCipherList +
diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 0e7baf198b..155a76005c 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -120,9 +120,11 @@
       <fix>
         To maintain the documented alignment with the OpenSSL development
         branch, the use of the aliases <code>SSLv3</code>, <code>EXPORT</code>,
-        <code>EXPORT40</code>, <code>EXPORT56</code> and <code>KRB5</code> are
-        no longer supported when setting the <code>ciphers</code> attribute of
-        an <code>SSLHostConfig</code> element. (markt)
+        <code>EXPORT40</code>, <code>EXPORT56</code>, <code>KRB5</code>,
+        <code>kFZA</code>, <code>aFZA</code>, <code>eFZA</code> and
+        <code>FZA</code> are no longer supported when setting the
+        <code>ciphers</code> attribute of an <code>SSLHostConfig</code> 
element.
+        (markt)
       </fix>
       <fix>
         To maintain the documented alignment with the OpenSSL development


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to