diff --git a/communicationScripts/client.py b/communicationScripts/client.py index 7c4a4de2d13f230e90614b969f3689059fc59c5a..abf637944bd3a0fba1d492165abae20f9a35705c 100644 --- a/communicationScripts/client.py +++ b/communicationScripts/client.py @@ -3,15 +3,11 @@ import socket import wolfssl def run_client(file_path): - # CA-Zertifikat laden - ca_cert = "../certificates/ca-cert.pem" - # Festlegen der Cipher Suite und TLS-Version cipher_suite = "TLS_AES_128_GCM_SHA256" # Sichere Cipher Suite context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3) # TLS 1.3 verwenden - context.load_verify_locations(ca_cert) context.set_ciphers(cipher_suite) - + print(f"TLS-Kontext mit Cipher Suite '{cipher_suite}' erfolgreich initialisiert.") # Sichere Verbindung mit dem Server herstellen diff --git a/communicationScripts/server.py b/communicationScripts/server.py index 7959d9b7d8375db97df2d319ded35bc6a20cf720..8a0380d19893c153d07315ee12d8968646397389 100644 --- a/communicationScripts/server.py +++ b/communicationScripts/server.py @@ -1,18 +1,15 @@ import socket import wolfssl -# SERVER-SKRIPT def run_server(): # Server-Zertifikat und Schlüssel cert_file = "../certificates/server-cert.pem" key_file = "../certificates/server-key.pem" - ca_cert = "../certificates/ca-cert.pem" # CA Zertifikat, um Client zu verifizieren # Festlegen der Cipher Suite und TLS-Version cipher_suite = "TLS_AES_128_GCM_SHA256" # Sichere Cipher Suite context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3) # TLS 1.3 verwenden context.load_cert_chain(certfile=cert_file, keyfile=key_file) - context.load_verify_locations(ca_cert) # Zertifikate des CA hinzufügen context.set_ciphers(cipher_suite) # Server-Socket erstellen