@@ -4364,14 +4364,14 @@ def test_session_handling(self):
4364
4364
def test_psk (self ):
4365
4365
psk = bytes .fromhex ('deadbeef' )
4366
4366
4367
- client_context = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
4367
+ client_context , server_context , _ = testing_context ()
4368
+
4368
4369
client_context .check_hostname = False
4369
4370
client_context .verify_mode = ssl .CERT_NONE
4370
4371
client_context .maximum_version = ssl .TLSVersion .TLSv1_2
4371
4372
client_context .set_ciphers ('PSK' )
4372
4373
client_context .set_psk_client_callback (lambda hint : (None , psk ))
4373
4374
4374
- server_context = ssl .SSLContext (ssl .PROTOCOL_TLS_SERVER )
4375
4375
server_context .maximum_version = ssl .TLSVersion .TLSv1_2
4376
4376
server_context .set_ciphers ('PSK' )
4377
4377
server_context .set_psk_server_callback (lambda identity : psk )
@@ -4443,14 +4443,14 @@ def server_callback(identity):
4443
4443
self .assertEqual (identity , client_identity )
4444
4444
return psk
4445
4445
4446
- client_context = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
4446
+ client_context , server_context , _ = testing_context ()
4447
+
4447
4448
client_context .check_hostname = False
4448
4449
client_context .verify_mode = ssl .CERT_NONE
4449
4450
client_context .minimum_version = ssl .TLSVersion .TLSv1_3
4450
4451
client_context .set_ciphers ('PSK' )
4451
4452
client_context .set_psk_client_callback (client_callback )
4452
4453
4453
- server_context = ssl .SSLContext (ssl .PROTOCOL_TLS_SERVER )
4454
4454
server_context .minimum_version = ssl .TLSVersion .TLSv1_3
4455
4455
server_context .set_ciphers ('PSK' )
4456
4456
server_context .set_psk_server_callback (server_callback , identity_hint )
0 commit comments