Skip to content

Commit 85e4319

Browse files
authored
chore: remove @Deprecated APIs in preparation for v1.5 (#159)
1 parent a8f6051 commit 85e4319

File tree

3 files changed

+0
-49
lines changed

3 files changed

+0
-49
lines changed

aws-crt-kotlin/api/aws-crt-kotlin.api

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -810,14 +810,8 @@ public final class aws/sdk/kotlin/crt/io/SocketType : java/lang/Enum {
810810
}
811811

812812
public final class aws/sdk/kotlin/crt/io/TlsCipherPreference : java/lang/Enum {
813-
public static final field KMS_PQ_SIKE_TLS_V1_0_2019_11 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
814-
public static final field KMS_PQ_SIKE_TLS_V1_0_2020_02 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
815-
public static final field KMS_PQ_TLS_V1_0_2019_06 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
816-
public static final field KMS_PQ_TLS_V1_0_2020_02 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
817-
public static final field KMS_PQ_TLS_V1_0_2020_07 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
818813
public static final field PQ_DEFAULT Laws/sdk/kotlin/crt/io/TlsCipherPreference;
819814
public static final field PQ_TLSV1_2_2024_10 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
820-
public static final field PQ_TLS_V1_0_2021_05 Laws/sdk/kotlin/crt/io/TlsCipherPreference;
821815
public static final field SYSTEM_DEFAULT Laws/sdk/kotlin/crt/io/TlsCipherPreference;
822816
public static fun getEntries ()Lkotlin/enums/EnumEntries;
823817
public final fun getValue ()I

aws-crt-kotlin/common/src/aws/sdk/kotlin/crt/io/TlsCipherPreference.kt

Lines changed: 0 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -18,42 +18,6 @@ public enum class TlsCipherPreference(public val value: Int) {
1818
*/
1919
SYSTEM_DEFAULT(0),
2020

21-
/**
22-
* This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.
23-
*/
24-
@Deprecated("This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.")
25-
KMS_PQ_TLS_V1_0_2019_06(1),
26-
27-
/**
28-
* This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.
29-
*/
30-
@Deprecated("This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.")
31-
KMS_PQ_SIKE_TLS_V1_0_2019_11(2),
32-
33-
/**
34-
* This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.
35-
*/
36-
@Deprecated("This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.")
37-
KMS_PQ_TLS_V1_0_2020_02(3),
38-
39-
/**
40-
* This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.
41-
*/
42-
@Deprecated("This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.")
43-
KMS_PQ_SIKE_TLS_V1_0_2020_02(4),
44-
45-
/**
46-
* This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.
47-
*/
48-
@Deprecated("This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.")
49-
KMS_PQ_TLS_V1_0_2020_07(5),
50-
51-
/**
52-
* This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.
53-
*/
54-
@Deprecated("This cipher preference is no longer supported. Use PQ_TLSV1_2_2024_10 instead.")
55-
PQ_TLS_V1_0_2021_05(6),
56-
5721
/**
5822
* This TLS cipher preference list contains post-quantum key exchange algorithms that have been standardized by
5923
* NIST. PQ algorithms in this preference list will be used in hybrid mode, and always combined with a classical

aws-crt-kotlin/jvm/src/aws/sdk/kotlin/crt/io/TlsContextJVM.kt

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,8 @@ internal actual fun isCipherSupported(cipher: TlsCipherPreference): Boolean =
2727

2828
internal actual fun isAlpnSupported(): Boolean = TlsContextOptionsJni.isAlpnSupported()
2929

30-
@Suppress("DEPRECATION")
3130
private fun TlsCipherPreference.into(): TlsCipherPreferenceJni = when (this) {
3231
TlsCipherPreference.SYSTEM_DEFAULT -> TlsCipherPreferenceJni.TLS_CIPHER_SYSTEM_DEFAULT
33-
TlsCipherPreference.KMS_PQ_TLS_V1_0_2019_06 -> TlsCipherPreferenceJni.TLS_CIPHER_KMS_PQ_TLSv1_0_2019_06
34-
TlsCipherPreference.KMS_PQ_SIKE_TLS_V1_0_2019_11 -> TlsCipherPreferenceJni.TLS_CIPHER_PREF_KMS_PQ_SIKE_TLSv1_0_2019_11
35-
TlsCipherPreference.KMS_PQ_TLS_V1_0_2020_02 -> TlsCipherPreferenceJni.TLS_CIPHER_PREF_KMS_PQ_TLSv1_0_2020_02
36-
TlsCipherPreference.KMS_PQ_SIKE_TLS_V1_0_2020_02 -> TlsCipherPreferenceJni.TLS_CIPHER_PREF_KMS_PQ_SIKE_TLSv1_0_2020_02
37-
TlsCipherPreference.KMS_PQ_TLS_V1_0_2020_07 -> TlsCipherPreferenceJni.TLS_CIPHER_PREF_KMS_PQ_TLSv1_0_2020_07
38-
TlsCipherPreference.PQ_TLS_V1_0_2021_05 -> TlsCipherPreferenceJni.TLS_CIPHER_PREF_PQ_TLSv1_0_2021_05
3932
TlsCipherPreference.PQ_TLSV1_2_2024_10 -> TlsCipherPreferenceJni.TLS_CIPHER_PREF_PQ_TLSv1_2_2023
4033
TlsCipherPreference.PQ_DEFAULT -> TlsCipherPreferenceJni.TLS_CIPHER_PQ_DEFAULT
4134
}

0 commit comments

Comments
 (0)