@@ -21,41 +21,47 @@ import net.corda.core.serialization.deserialize
21
21
import net.corda.core.serialization.serialize
22
22
import net.corda.core.utilities.days
23
23
import net.corda.core.utilities.hours
24
- import net.corda.nodeapi.internal.serialization.amqp.AMQPServerSerializationScheme
25
- import net.corda.nodeapi.internal.config.MutualSslConfiguration
26
- import net.corda.nodeapi.internal.createDevNodeCa
27
- import net.corda.nodeapi.internal.crypto.X509Utilities.DEFAULT_IDENTITY_SIGNATURE_SCHEME
28
- import net.corda.nodeapi.internal.crypto.X509Utilities.DEFAULT_TLS_SIGNATURE_SCHEME
29
- import net.corda.nodeapi.internal.installDevNodeCaCertPath
30
- import net.corda.nodeapi.internal.protonwrapper.netty.init
31
- import net.corda.nodeapi.internal.registerDevP2pCertificates
32
- import net.corda.serialization.internal.AllWhitelist
33
- import net.corda.serialization.internal.SerializationContextImpl
34
- import net.corda.serialization.internal.SerializationFactoryImpl
35
- import net.corda.serialization.internal.amqp.amqpMagic
36
- import net.corda.testing.core.ALICE_NAME
37
- import net.corda.testing.core.BOB_NAME
38
- import net.corda.testing.core.TestIdentity
39
- import net.corda.testing.driver.internal.incrementalPortAllocation
40
24
import net.corda.coretesting.internal.NettyTestClient
41
25
import net.corda.coretesting.internal.NettyTestHandler
42
26
import net.corda.coretesting.internal.NettyTestServer
43
- import net.corda.testing.internal.createDevIntermediateCaCertPath
44
27
import net.corda.coretesting.internal.stubs.CertificateStoreStubs
28
+ import net.corda.nodeapi.internal.config.MutualSslConfiguration
29
+ import net.corda.nodeapi.internal.createDevNodeCa
45
30
import net.corda.nodeapi.internal.crypto.CertificateType
46
31
import net.corda.nodeapi.internal.crypto.X509CertificateFactory
47
32
import net.corda.nodeapi.internal.crypto.X509Utilities
33
+ import net.corda.nodeapi.internal.crypto.X509Utilities.DEFAULT_IDENTITY_SIGNATURE_SCHEME
34
+ import net.corda.nodeapi.internal.crypto.X509Utilities.DEFAULT_TLS_SIGNATURE_SCHEME
48
35
import net.corda.nodeapi.internal.crypto.checkValidity
49
36
import net.corda.nodeapi.internal.crypto.getSupportedKey
50
37
import net.corda.nodeapi.internal.crypto.loadOrCreateKeyStore
51
38
import net.corda.nodeapi.internal.crypto.save
52
39
import net.corda.nodeapi.internal.crypto.toBc
53
40
import net.corda.nodeapi.internal.crypto.x509
54
41
import net.corda.nodeapi.internal.crypto.x509Certificates
42
+ import net.corda.nodeapi.internal.installDevNodeCaCertPath
43
+ import net.corda.nodeapi.internal.protonwrapper.netty.keyManagerFactory
44
+ import net.corda.nodeapi.internal.protonwrapper.netty.trustManagerFactory
45
+ import net.corda.nodeapi.internal.registerDevP2pCertificates
46
+ import net.corda.nodeapi.internal.serialization.amqp.AMQPServerSerializationScheme
47
+ import net.corda.serialization.internal.AllWhitelist
48
+ import net.corda.serialization.internal.SerializationContextImpl
49
+ import net.corda.serialization.internal.SerializationFactoryImpl
50
+ import net.corda.serialization.internal.amqp.amqpMagic
51
+ import net.corda.testing.core.ALICE_NAME
52
+ import net.corda.testing.core.BOB_NAME
53
+ import net.corda.testing.core.TestIdentity
54
+ import net.corda.testing.driver.internal.incrementalPortAllocation
55
55
import net.corda.testing.internal.IS_OPENJ9
56
+ import net.corda.testing.internal.createDevIntermediateCaCertPath
56
57
import net.i2p.crypto.eddsa.EdDSAPrivateKey
57
58
import org.assertj.core.api.Assertions.assertThat
58
- import org.bouncycastle.asn1.x509.*
59
+ import org.bouncycastle.asn1.x509.AuthorityKeyIdentifier
60
+ import org.bouncycastle.asn1.x509.BasicConstraints
61
+ import org.bouncycastle.asn1.x509.CRLDistPoint
62
+ import org.bouncycastle.asn1.x509.Extension
63
+ import org.bouncycastle.asn1.x509.KeyUsage
64
+ import org.bouncycastle.asn1.x509.SubjectKeyIdentifier
59
65
import org.bouncycastle.jcajce.provider.asymmetric.edec.BCEdDSAPrivateKey
60
66
import org.bouncycastle.pqc.jcajce.provider.sphincs.BCSphincs256PrivateKey
61
67
import org.junit.Assume
@@ -74,10 +80,19 @@ import java.security.PrivateKey
74
80
import java.security.cert.CertPath
75
81
import java.security.cert.X509Certificate
76
82
import java.util.*
77
- import javax.net.ssl.*
83
+ import javax.net.ssl.SSLContext
84
+ import javax.net.ssl.SSLParameters
85
+ import javax.net.ssl.SSLServerSocket
86
+ import javax.net.ssl.SSLSocket
78
87
import javax.security.auth.x500.X500Principal
79
88
import kotlin.concurrent.thread
80
- import kotlin.test.*
89
+ import kotlin.test.assertEquals
90
+ import kotlin.test.assertFailsWith
91
+ import kotlin.test.assertFalse
92
+ import kotlin.test.assertNotNull
93
+ import kotlin.test.assertNull
94
+ import kotlin.test.assertTrue
95
+ import kotlin.test.fail
81
96
82
97
class X509UtilitiesTest {
83
98
private companion object {
@@ -295,15 +310,10 @@ class X509UtilitiesTest {
295
310
sslConfig.keyStore.get(true ).registerDevP2pCertificates(MEGA_CORP .name, rootCa.certificate, intermediateCa)
296
311
sslConfig.createTrustStore(rootCa.certificate)
297
312
298
- val keyStore = sslConfig.keyStore.get()
299
- val trustStore = sslConfig.trustStore.get()
300
-
301
313
val context = SSLContext .getInstance(" TLS" )
302
- val keyManagerFactory = KeyManagerFactory .getInstance(KeyManagerFactory .getDefaultAlgorithm())
303
- keyManagerFactory.init (keyStore)
314
+ val keyManagerFactory = keyManagerFactory(sslConfig.keyStore.get())
304
315
val keyManagers = keyManagerFactory.keyManagers
305
- val trustMgrFactory = TrustManagerFactory .getInstance(TrustManagerFactory .getDefaultAlgorithm())
306
- trustMgrFactory.init (trustStore)
316
+ val trustMgrFactory = trustManagerFactory(sslConfig.trustStore.get())
307
317
val trustManagers = trustMgrFactory.trustManagers
308
318
context.init (keyManagers, trustManagers, newSecureRandom())
309
319
@@ -388,15 +398,8 @@ class X509UtilitiesTest {
388
398
sslConfig.keyStore.get(true ).registerDevP2pCertificates(MEGA_CORP .name, rootCa.certificate, intermediateCa)
389
399
sslConfig.createTrustStore(rootCa.certificate)
390
400
391
- val keyStore = sslConfig.keyStore.get()
392
- val trustStore = sslConfig.trustStore.get()
393
-
394
- val keyManagerFactory = KeyManagerFactory .getInstance(KeyManagerFactory .getDefaultAlgorithm())
395
- keyManagerFactory.init (keyStore)
396
-
397
- val trustManagerFactory = TrustManagerFactory .getInstance(TrustManagerFactory .getDefaultAlgorithm())
398
- trustManagerFactory.init (trustStore)
399
-
401
+ val keyManagerFactory = keyManagerFactory(sslConfig.keyStore.get())
402
+ val trustManagerFactory = trustManagerFactory(sslConfig.trustStore.get())
400
403
401
404
val sslServerContext = SslContextBuilder
402
405
.forServer(keyManagerFactory)
0 commit comments