From b0a5b100eaf6c2c8f546c495b9dca439dba414cf Mon Sep 17 00:00:00 2001 From: gabsuren Date: Thu, 21 Jul 2022 20:12:37 +0400 Subject: [PATCH] test_apps: Removed verification of TLS v1.1 --- tools/test_apps/protocols/openssl/app_test.py | 12 +----------- .../test_apps/protocols/openssl/main/connect_test.c | 10 +--------- 2 files changed, 2 insertions(+), 20 deletions(-) diff --git a/tools/test_apps/protocols/openssl/app_test.py b/tools/test_apps/protocols/openssl/app_test.py index 1e71e52d31..dd82babd40 100644 --- a/tools/test_apps/protocols/openssl/app_test.py +++ b/tools/test_apps/protocols/openssl/app_test.py @@ -100,23 +100,13 @@ def test_app_esp_openssl(env, extra_data): return case # start test cases - start_case( - case='CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_NONE', - desc='Connect with verify_none mode using wrong certs', - negotiated_protocol=ssl.PROTOCOL_TLSv1_1, - result='SSL Connection Succeed') - start_case( - case='CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_PEER', - desc='Connect with verify_peer mode using wrong certs', - negotiated_protocol=ssl.PROTOCOL_TLSv1_1, - result='SSL Connection Failed') start_case( case='CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_NONE', desc='Connect with verify_none mode using wrong certs', negotiated_protocol=ssl.PROTOCOL_TLSv1_2, result='SSL Connection Succeed') start_case( - case='CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_PEER', + case='CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_PEER', desc='Connect with verify_peer mode using wrong certs', negotiated_protocol=ssl.PROTOCOL_TLSv1_2, result='SSL Connection Failed') diff --git a/tools/test_apps/protocols/openssl/main/connect_test.c b/tools/test_apps/protocols/openssl/main/connect_test.c index 8ba6cf0be8..f45a77f1ff 100644 --- a/tools/test_apps/protocols/openssl/main/connect_test.c +++ b/tools/test_apps/protocols/openssl/main/connect_test.c @@ -35,15 +35,7 @@ static SSL_CTX* init_ctx(const char *test_case) const unsigned int cacert_pem_bytes = cacert_pem_end - cacert_pem_start; const SSL_METHOD *method = NULL; SSL_CTX *ctx = NULL; - if (strcmp(test_case, "CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_NONE") == 0) { - method = TLSv1_1_client_method(); - ctx = SSL_CTX_new(method); /* Create new context */ - SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL); - } else if (strcmp(test_case, "CONFIG_TLSV1_1_CONNECT_WRONG_CERT_VERIFY_PEER") == 0) { - method = TLSv1_1_client_method(); - ctx = SSL_CTX_new(method); /* Create new context */ - SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL); - } else if (strcmp(test_case, "CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_NONE") == 0) { + if (strcmp(test_case, "CONFIG_TLSV1_2_CONNECT_WRONG_CERT_VERIFY_NONE") == 0) { method = TLSv1_2_client_method(); ctx = SSL_CTX_new(method); /* Create new context */ SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);