Blob Blame History Raw
diff -up azureus-5.7.2.0/com/aelitis/azureus/core/clientmessageservice/secure/impl/SecureMessageServiceClientHelper.java.nobcprov azureus-5.7.2.0/com/aelitis/azureus/core/clientmessageservice/secure/impl/SecureMessageServiceClientHelper.java
--- azureus-5.7.2.0/com/aelitis/azureus/core/clientmessageservice/secure/impl/SecureMessageServiceClientHelper.java.nobcprov	2016-04-13 20:20:34.000000000 +0200
+++ azureus-5.7.2.0/com/aelitis/azureus/core/clientmessageservice/secure/impl/SecureMessageServiceClientHelper.java	2016-05-31 21:19:32.698994793 +0200
@@ -36,7 +36,6 @@ import org.gudy.bouncycastle.crypto.Ciph
 import org.gudy.bouncycastle.crypto.encodings.PKCS1Encoding;
 import org.gudy.bouncycastle.crypto.engines.RSAEngine;
 import org.gudy.bouncycastle.crypto.params.ParametersWithRandom;
-import org.gudy.bouncycastle.jce.provider.RSAUtil;
 
 import com.aelitis.azureus.core.clientmessageservice.ClientMessageService;
 import com.aelitis.azureus.core.clientmessageservice.ClientMessageServiceClient;
@@ -80,30 +79,12 @@ SecureMessageServiceClientHelper
 				
 			byte[] secret_bytes = session_key.getEncoded();
 			
-			try{
 				Cipher	rsa_cipher = Cipher.getInstance( "RSA" );
 		    
 				rsa_cipher.init( Cipher.ENCRYPT_MODE, public_key );
 		    
 				encryped_session_key = rsa_cipher.doFinal( secret_bytes );
 				
-			}catch( Throwable e ){
-				
-					// fallback to the BC implementation for jdk1.4.2 as JCE RSA not available
-				
-				RSAEngine	eng = new RSAEngine();
-				
-				PKCS1Encoding	padded_eng = new PKCS1Encoding( eng );
-				
-	            CipherParameters param = RSAUtil.generatePublicKeyParameter(public_key);
-	            
-	            param = new ParametersWithRandom(param, RandomUtils.SECURE_RANDOM);
-	            
-	            padded_eng.init( true, param );
-				
-				encryped_session_key = padded_eng.processBlock(secret_bytes, 0, secret_bytes.length);
-			}
-
 		}catch( Throwable e ){
 			
 			e.printStackTrace();