Skip to content
This repository was archived by the owner on Jan 25, 2018. It is now read-only.

Commit 17f8056

Browse files
committed
Merge pull request #737 from n8fr8/master
fixes #728 and #718 by disabling unsupport cipher suites
2 parents 9b31ce3 + 95e63a9 commit 17f8056

2 files changed

Lines changed: 27 additions & 19 deletions

File tree

src/info/guardianproject/otr/app/im/plugin/xmpp/XMPPCertPins.java

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -35,13 +35,13 @@ public class XMPPCertPins
3535
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
3636
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
3737
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
38-
"TLS_DHE_DSS_WITH_AES_128_CBC_SHA",
39-
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
38+
// "TLS_DHE_DSS_WITH_AES_128_CBC_SHA", //not support in Android 6
39+
// "TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
4040

41-
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
42-
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
43-
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
44-
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
41+
// "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
42+
// "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
43+
// "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
44+
// "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
4545
"TLS_RSA_WITH_AES_128_CBC_SHA256",
4646
"TLS_RSA_WITH_AES_256_CBC_SHA256",
4747
"TLS_RSA_WITH_AES_128_CBC_SHA",
@@ -56,13 +56,13 @@ public class XMPPCertPins
5656
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
5757
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
5858
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
59-
"TLS_DHE_DSS_WITH_AES_128_CBC_SHA",
60-
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
59+
// "TLS_DHE_DSS_WITH_AES_128_CBC_SHA",
60+
// "TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
6161

62-
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
63-
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
64-
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
65-
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
62+
// "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA",
63+
// "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA",
64+
//"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA",
65+
// "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA",
6666

6767
"TLS_RSA_WITH_AES_128_CBC_SHA",
6868
"TLS_RSA_WITH_AES_256_CBC_SHA",

src/info/guardianproject/otr/app/im/plugin/xmpp/XmppConnection.java

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1183,16 +1183,24 @@ else if (domain.contains("google.com")||domain.contains("gmail.com")) //if not g
11831183
sslContext.init(null, new javax.net.ssl.TrustManager[] { trustManager },
11841184
secureRandom);
11851185

1186-
sslContext.getDefaultSSLParameters().getCipherSuites();
1187-
1188-
if (Build.VERSION.SDK_INT >= 20) {
1189-
1190-
sslContext.getDefaultSSLParameters().setCipherSuites(XMPPCertPins.SSL_IDEAL_CIPHER_SUITES_API_20);
1186+
try
1187+
{
1188+
sslContext.getDefaultSSLParameters().getCipherSuites();
11911189

1190+
if (Build.VERSION.SDK_INT >= 20) {
1191+
1192+
sslContext.getDefaultSSLParameters().setCipherSuites(XMPPCertPins.SSL_IDEAL_CIPHER_SUITES_API_20);
1193+
}
1194+
else
1195+
{
1196+
sslContext.getDefaultSSLParameters().setCipherSuites(XMPPCertPins.SSL_IDEAL_CIPHER_SUITES);
1197+
}
11921198
}
1193-
else
1199+
catch (Exception e)
11941200
{
1195-
sslContext.getDefaultSSLParameters().setCipherSuites(XMPPCertPins.SSL_IDEAL_CIPHER_SUITES);
1201+
//this can happen if the cipher suites aren't available on the devices
1202+
debug(TAG, "Error setting ideal cipher suites: " + e);
1203+
11961204
}
11971205

11981206

0 commit comments

Comments
 (0)