mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
test_apps: Removed verification of TLS v1.1
This commit is contained in:
parent
25c968ec65
commit
b0a5b100ea
@ -100,23 +100,13 @@ def test_app_esp_openssl(env, extra_data):
|
||||
return case
|
||||
|
||||
# start test cases
|
||||
start_case(
|
||||
case='CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_NONE',
|
||||
desc='Connect with verify_none mode using wrong certs',
|
||||
negotiated_protocol=ssl.PROTOCOL_TLSv1_1,
|
||||
result='SSL Connection Succeed')
|
||||
start_case(
|
||||
case='CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_PEER',
|
||||
desc='Connect with verify_peer mode using wrong certs',
|
||||
negotiated_protocol=ssl.PROTOCOL_TLSv1_1,
|
||||
result='SSL Connection Failed')
|
||||
start_case(
|
||||
case='CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_NONE',
|
||||
desc='Connect with verify_none mode using wrong certs',
|
||||
negotiated_protocol=ssl.PROTOCOL_TLSv1_2,
|
||||
result='SSL Connection Succeed')
|
||||
start_case(
|
||||
case='CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_PEER',
|
||||
case='CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_PEER',
|
||||
desc='Connect with verify_peer mode using wrong certs',
|
||||
negotiated_protocol=ssl.PROTOCOL_TLSv1_2,
|
||||
result='SSL Connection Failed')
|
||||
|
@ -35,15 +35,7 @@ static SSL_CTX* init_ctx(const char *test_case)
|
||||
const unsigned int cacert_pem_bytes = cacert_pem_end - cacert_pem_start;
|
||||
const SSL_METHOD *method = NULL;
|
||||
SSL_CTX *ctx = NULL;
|
||||
if (strcmp(test_case, "CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_NONE") == 0) {
|
||||
method = TLSv1_1_client_method();
|
||||
ctx = SSL_CTX_new(method); /* Create new context */
|
||||
SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
|
||||
} else if (strcmp(test_case, "CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_PEER") == 0) {
|
||||
method = TLSv1_1_client_method();
|
||||
ctx = SSL_CTX_new(method); /* Create new context */
|
||||
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
|
||||
} else if (strcmp(test_case, "CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_NONE") == 0) {
|
||||
if (strcmp(test_case, "CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_NONE") == 0) {
|
||||
method = TLSv1_2_client_method();
|
||||
ctx = SSL_CTX_new(method); /* Create new context */
|
||||
SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
|
||||
|
Loading…
x
Reference in New Issue
Block a user