Is there any way to bypass the client's verification of the server's certificate in NetX Duo?
Describe the bug A clear and concise description of what the bug is.
Please also mention any information which could help others to understand the problem you're facing:
- What target device are you using?
- Which version of Eclipse ThreadX?
- What toolchain and environment?
- What have you tried to diagnose or workaround this issue?
To Reproduce Steps to reproduce the behavior:
- Build my project in IAR Workbench.
- See error
Expected behavior A clear and concise description of what you expected to happen.
Impact What impact does this issue have on your progress (e.g., annoyance, showstopper)
Logs and console output
If applicable, add console logs or other types of debug information like Wireshark capture as .zip file.
Additional context Add any other context about the problem here.
Hi,
Server verification against CA can be disabled by modifying nx_secure_tls_remote_certificate_verify.c.
From line: status = tls_session -> nx_secure_remote_certificate_verify(store, remote_certificate, current_time);
to: if (tls_session->nx_secure_tls_credentials.nx_secure_tls_certificate_store.nx_secure_x509_trusted_certificates != NULL) { status = tls_session -> nx_secure_remote_certificate_verify(store, remote_certificate, current_time); }
Jan
@vscodeenv Does @Hnz2's suggestion work for you?