Skip to content
This repository has been archived by the owner on Feb 13, 2019. It is now read-only.

Commit

Permalink
Version 0.9.1.25
Browse files Browse the repository at this point in the history
Enabled Cipher Suite TLS_RSA_WITH_AES_256_CBC_SHA256 for Oracle and IBM mapping
  • Loading branch information
ChrisAbelee committed Jul 10, 2017
1 parent 2a15d69 commit bc755e2
Show file tree
Hide file tree
Showing 8 changed files with 5 additions and 1 deletion.
2 changes: 1 addition & 1 deletion META-INF/MANIFEST.MF
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Bundle-Vendor: dynaTrace
Bundle-ClassPath: .,lib/com.ibm.mq.commonservices.jar,lib/com.ibm.mq.h
eaders.jar,lib/com.ibm.mq.jar,lib/com.ibm.mq.jmqi.jar,lib/com.ibm.mq.
pcf.jar,lib/connector.jar
Bundle-Version: 0.9.1.22
Bundle-Version: 0.9.1.25
Bundle-Name: MQ Queue Channel Monitor
Bundle-ManifestVersion: 2
Bundle-SymbolicName: com.dynatrace.plugin.MQQueueChannelMonitorUpdated
Expand Down
Binary file modified lib/com.ibm.mq.commonservices.jar
Binary file not shown.
Binary file modified lib/com.ibm.mq.headers.jar
Binary file not shown.
Binary file modified lib/com.ibm.mq.jar
Binary file not shown.
Binary file modified lib/com.ibm.mq.jmqi.jar
Binary file not shown.
Binary file modified lib/com.ibm.mq.pcf.jar
Binary file not shown.
2 changes: 2 additions & 0 deletions plugin.xml
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,8 @@
<item value="TRIPLE_DES_SHA_US" />
<item value="TLS_RSA_WITH_AES_128_CBC_SHA" />
<item value="TLS_RSA_WITH_AES_256_CBC_SHA" />
<item value="TLS_RSA_WITH_AES_256_CBC_SHA256_Oracle" />
<item value="TLS_RSA_WITH_AES_256_CBC_SHA256_IBM" />
<item value="AES_SHA_US2" />
<item value="TLS_RSA_WITH_DES_CBC_SHA" />
<item value="TLS_RSA_WITH_3DES_EDE_CBC_SHA" />
Expand Down
2 changes: 2 additions & 0 deletions src/com/dynatrace/plugin/MQQueueChannelMonitorUpdated.java
Original file line number Diff line number Diff line change
Expand Up @@ -412,6 +412,8 @@ private String getCipherEquiv(String inCipher){
else if (inCipher.equalsIgnoreCase("TRIPLE_DES_SHA_US")) outCipher = "SSL_RSA_WITH_3DES_EDE_CBC_SHA";
else if (inCipher.equalsIgnoreCase("TLS_RSA_WITH_AES_128_CBC_SHA")) outCipher = "SSL_RSA_WITH_AES_128_CBC_SHA";
else if (inCipher.equalsIgnoreCase("TLS_RSA_WITH_AES_256_CBC_SHA5")) outCipher = "SSL_RSA_WITH_AES_256_CBC_SHA";
else if (inCipher.equalsIgnoreCase("TLS_RSA_WITH_AES_256_CBC_SHA256_IBM")) outCipher = "SSL_RSA_WITH_AES_256_CBC_SHA256";
else if (inCipher.equalsIgnoreCase("TLS_RSA_WITH_AES_256_CBC_SHA256_Oracle")) outCipher = "TLS_RSA_WITH_AES_256_CBC_SHA256";
else if (inCipher.equalsIgnoreCase("AES_SHA_US2")) outCipher = "";
else if (inCipher.equalsIgnoreCase("TLS_RSA_WITH_DES_CBC_SHA")) outCipher = "SSL_RSA_WITH_DES_CBC_SHA";
else if (inCipher.equalsIgnoreCase("TLS_RSA_WITH_3DES_EDE_CBC_SHA")) outCipher = "SSL_RSA_WITH_3DES_EDE_CBC_SHA";
Expand Down

0 comments on commit bc755e2

Please sign in to comment.