|
3 | 3 | from typing import Optional |
4 | 4 |
|
5 | 5 | from checks import scoring |
6 | | -from checks.models import TLSClientInitiatedRenegotiationStatus, KexRSAPKCSStatus, TLSExtendedMasterSecretStatus |
| 6 | +from checks.models import TLSClientInitiatedRenegotiationStatus, TLSExtendedMasterSecretStatus |
7 | 7 | from checks.scoring import ( |
8 | 8 | ORDERED_STATUSES, |
9 | 9 | STATUS_ERROR, |
@@ -185,7 +185,6 @@ def __init__(self, name="web-tls"): |
185 | 185 | WebTlsZeroRTT, |
186 | 186 | WebTlsOCSPStapling, |
187 | 187 | WebTlsKexHashFunc, |
188 | | - WebTlsKexRSAPKCSStatus, |
189 | 188 | WebTLSExtendedMasterSecret, |
190 | 189 | # WebTlsDaneRollover, |
191 | 190 | ] |
@@ -259,7 +258,6 @@ def __init__(self, name="mail-tls"): |
259 | 258 | MailTlsDaneRollover, |
260 | 259 | MailTlsZeroRTT, |
261 | 260 | MailTlsKexHashFunc, |
262 | | - MailTlsKexRSAPKCSStatus, |
263 | 261 | MailTLSExtendedMasterSecret, |
264 | 262 | # MailTlsOCSPStapling, # Disabled for mail. |
265 | 263 | ] |
@@ -1536,42 +1534,6 @@ def result_phase_out(self, tech_data): |
1536 | 1534 | self.tech_data = tech_data |
1537 | 1535 |
|
1538 | 1536 |
|
1539 | | -class WebTlsKexRSAPKCSStatus(Subtest): |
1540 | | - def __init__(self): |
1541 | | - super().__init__( |
1542 | | - name="key_exchange_rsa_pkcs", |
1543 | | - label="detail web tls key-exchange-rsa-pkcs label", |
1544 | | - explanation="detail web tls key-exchange-rsa-pkcs exp", |
1545 | | - tech_string="detail web tls key-exchange-rsa-pkcs tech table", |
1546 | | - worst_status=scoring.STATUS_INFO, |
1547 | | - full_score=scoring.TLS_KEX_RSA_PKCS_GOOD, |
1548 | | - model_score_field="key_exchange_rsa_pkcs_score", |
1549 | | - ) |
1550 | | - |
1551 | | - def save_result(self, status: KexRSAPKCSStatus): |
1552 | | - handlers = { |
1553 | | - KexRSAPKCSStatus.good: self.result_good, |
1554 | | - KexRSAPKCSStatus.bad: self.result_bad, |
1555 | | - KexRSAPKCSStatus.unknown: self.result_unknown, |
1556 | | - } |
1557 | | - return handlers[status]() |
1558 | | - |
1559 | | - def result_good(self): |
1560 | | - self._status(STATUS_SUCCESS) |
1561 | | - self.verdict = "detail web tls key-exchange-rsa-pkcs verdict good" |
1562 | | - self.tech_data = "detail tech data good" |
1563 | | - |
1564 | | - def result_bad(self): |
1565 | | - self._status(STATUS_FAIL) |
1566 | | - self.verdict = "detail web tls key-exchange-rsa-pkcs verdict bad" |
1567 | | - self.tech_data = "detail tech data insufficient" |
1568 | | - |
1569 | | - def result_unknown(self): |
1570 | | - self._status(STATUS_INFO) |
1571 | | - self.verdict = "detail web tls key-exchange-rsa-pkcs verdict other" |
1572 | | - self.tech_data = "detail tech data not-applicable" |
1573 | | - |
1574 | | - |
1575 | 1537 | class WebTLSExtendedMasterSecret(Subtest): |
1576 | 1538 | def __init__(self): |
1577 | 1539 | super().__init__( |
@@ -2205,42 +2167,6 @@ def result_phase_out(self, tech_data): |
2205 | 2167 | self.tech_data = tech_data |
2206 | 2168 |
|
2207 | 2169 |
|
2208 | | -class MailTlsKexRSAPKCSStatus(Subtest): |
2209 | | - def __init__(self): |
2210 | | - super().__init__( |
2211 | | - name="key_exchange_rsa_pkcs", |
2212 | | - label="detail mail tls key-exchange-rsa-pkcs label", |
2213 | | - explanation="detail mail tls key-exchange-rsa-pkcs exp", |
2214 | | - tech_string="detail mail tls key-exchange-rsa-pkcs tech table", |
2215 | | - worst_status=scoring.STATUS_INFO, |
2216 | | - full_score=scoring.TLS_KEX_RSA_PKCS_GOOD, |
2217 | | - model_score_field="key_exchange_rsa_pkcs_score", |
2218 | | - ) |
2219 | | - |
2220 | | - def save_result(self, status: KexRSAPKCSStatus): |
2221 | | - handlers = { |
2222 | | - KexRSAPKCSStatus.good: self.result_good, |
2223 | | - KexRSAPKCSStatus.bad: self.result_bad, |
2224 | | - KexRSAPKCSStatus.unknown: self.result_unknown, |
2225 | | - } |
2226 | | - return handlers[status]() |
2227 | | - |
2228 | | - def result_good(self): |
2229 | | - self._status(STATUS_SUCCESS) |
2230 | | - self.verdict = "detail mail tls key-exchange-rsa-pkcs verdict good" |
2231 | | - self.tech_data = "detail tech data good" |
2232 | | - |
2233 | | - def result_bad(self): |
2234 | | - self._status(STATUS_FAIL) |
2235 | | - self.verdict = "detail mail tls key-exchange-rsa-pkcs verdict bad" |
2236 | | - self.tech_data = "detail tech data insufficient" |
2237 | | - |
2238 | | - def result_unknown(self): |
2239 | | - self._status(STATUS_INFO) |
2240 | | - self.verdict = "detail mail tls key-exchange-rsa-pkcs verdict unknown" |
2241 | | - self.tech_data = "detail tech data not-applicable" |
2242 | | - |
2243 | | - |
2244 | 2170 | class MailTLSExtendedMasterSecret(Subtest): |
2245 | 2171 | def __init__(self): |
2246 | 2172 | super().__init__( |
|
0 commit comments