From d9f980d090bcf1bad47e911ffe3f9253aafc2ec9 Mon Sep 17 00:00:00 2001
From: Dominik Fuhrmann <dominik.fuhrmann1@gmail.com>
Date: Tue, 24 Dec 2024 13:14:15 +0100
Subject: [PATCH] removed certificate validation

---
 communicationScripts/client.py | 6 +-----
 communicationScripts/server.py | 3 ---
 2 files changed, 1 insertion(+), 8 deletions(-)

diff --git a/communicationScripts/client.py b/communicationScripts/client.py
index 7c4a4de..abf6379 100644
--- a/communicationScripts/client.py
+++ b/communicationScripts/client.py
@@ -3,15 +3,11 @@ import socket
 import wolfssl
 
 def run_client(file_path):
-    # CA-Zertifikat laden
-    ca_cert = "../certificates/ca-cert.pem"
-
     # Festlegen der Cipher Suite und TLS-Version
     cipher_suite = "TLS_AES_128_GCM_SHA256"  # Sichere Cipher Suite
     context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3)  # TLS 1.3 verwenden
-    context.load_verify_locations(ca_cert)
     context.set_ciphers(cipher_suite)
-
+    
     print(f"TLS-Kontext mit Cipher Suite '{cipher_suite}' erfolgreich initialisiert.")
 
     # Sichere Verbindung mit dem Server herstellen
diff --git a/communicationScripts/server.py b/communicationScripts/server.py
index 7959d9b..8a0380d 100644
--- a/communicationScripts/server.py
+++ b/communicationScripts/server.py
@@ -1,18 +1,15 @@
 import socket
 import wolfssl
 
-# SERVER-SKRIPT
 def run_server():
     # Server-Zertifikat und Schlüssel
     cert_file = "../certificates/server-cert.pem"
     key_file = "../certificates/server-key.pem"
-    ca_cert = "../certificates/ca-cert.pem"  # CA Zertifikat, um Client zu verifizieren
 
     # Festlegen der Cipher Suite und TLS-Version
     cipher_suite = "TLS_AES_128_GCM_SHA256"  # Sichere Cipher Suite
     context = wolfssl.SSLContext(wolfssl.PROTOCOL_TLSv1_3)  # TLS 1.3 verwenden
     context.load_cert_chain(certfile=cert_file, keyfile=key_file)
-    context.load_verify_locations(ca_cert)  # Zertifikate des CA hinzufügen
     context.set_ciphers(cipher_suite)
 
     # Server-Socket erstellen
-- 
GitLab