Hi Kelvin,

Thanks again for your excellent report on this issue. I created a fix here:
https://github.com/wolfSSL/wolfMQTT/pull/240

Please let me know if this also fixes the problem from your perspective.

Thanks,
Eric @wolfSSL Support

Hi Kelvin,

I will check this out. I created a github issue to better track the report here:
https://github.com/wolfSSL/wolfMQTT/issues/239

Hi Kelvin,

Thanks for living on the bleeding edge of wolfMQTT development! We try to synchronize wolfMQTT releases with wolfSSL, and wolfSSL is currently in testing for a release. Best guess for a wolfMQTT release would be sometime in the next 6 weeks.

Hello Kelvin,

Are you testing with the latest master copy from https://github.com/wolfSSL/wolfMQTT/ ?

This issue should have been fixed with:
https://github.com/wolfSSL/wolfMQTT/pull/231

If there is still an issue, please open a ticket with support@wolfssl.com or in https://github.com/wolfSSL/wolfMQTT/issues

Thanks,
Eric @wolfSSL Support

230

(1 replies, posted in wolfMQTT)

Hi Kelvin,

Thanks for your post. We did fix a chunked publish issue since the v1.9.0 release:
https://github.com/wolfSSL/wolfMQTT/pull/230

Would you mind checking with the latest revision from GitHub? If the issue persists, we can open an issue for better tracking.

Thanks,
Eric @ wolfSSL Support

Hello Kelvin

That is an excellent suggestion! I've copied your post to a new GitHub issue in our repository:
https://github.com/wolfSSL/wolfMQTT/issues/237

Thanks,
Eric @ wolfSSL Support

Hi Rusty,

We definitely can help you with a port. Please send a request to facts@wolfssl.com

Thanks,
Eric @ wolfSSL Support

We also have an E2 example here:
https://github.com/wolfSSL/wolfssl/tree … s/e2studio

Hi Rusty81,

If you do not need the TLS stack, please try enabling `WOLFCRYPT_ONLY`

From the server side, yes, the callback allows the server to handle the incoming SNI extension form the client.

Hello raghu,

Have you reviewed the instructions for building wolfSSL with cmake?
https://github.com/wolfSSL/wolfssl/blob … NSTALL#L80

Thanks,
Eric @ wolfSSL Support

Hello emre,

Welcome to the forums. This is likely to be a feature request. Please send an email to support@wolfssl.com and mention this post to get the feature request process started.

Thanks,
Eric @ wolfSSL Support

Hello beaveryoga,

Thanks for joining the forums. This functionality was added to enable openSSL compatibility. It looks like the proper API is `wolfSSL_CTX_set_tlsext_servername_callback`, which is nearly identical to `wolfSSL_CTX_set_servername_callback`.

I could not find any openSSL examples of using `SSL_CTX_set_servername_callback`. I'll check with the n team to see if there is more info to share.

Thanks,
Eric @ wolfSSL Support

Hi Davide,

wolfMQTT is mostly platform agnostic C code, unless your platform is using non-POSIX APIs, in which case you will have to override calls like send, recv, etc. wolfMQTT should compile on any platform.
wolfMQTT does not currently have .NET bindings. If compiled as a C++ application, there should be no restrictions on your VC++ library version.

240

(3 replies, posted in wolfMQTT)

Does your application call `wolfSSL_check_domain_name`? Verifying the common name in the cert is fine, but not necessary if you also have a trusted CA that signed the server's certificate.

241

(3 replies, posted in wolfSSL)

Hi Mohannad,

Looks like you are building a shared library. Please try building as a static lib:
`./configure --enable-static --disable-shared`

Thanks,
Eric @ wolfSSL Support

242

(2 replies, posted in wolfCrypt)

Hello a7v7

Could you please send an email referencing this issue to support@wolfssl.com ?

Kind regards,
Eric @ wolfSSL Support

Hi hablutzel1

Thanks for sending your request to support@wolfssl.com.

Hi @hablutzel1


Thanks for joining the forum. Would you please send an email to support@wolfssl.com referencing this post? We'd like to get some more information about the issue you are seeing.

Thanks,
Eric @ wolfSSL Support

245

(3 replies, posted in wolfMQTT)

Hi Gil,

Are you using a pre-shared key cert or public key for the authentication? You could use a CA that signs any new broker's cert to allow the clients to verify the new broker's cert.

Thanks,
Eric @ wolfSSL Support

246

(9 replies, posted in wolfSSL)

Okay, there is some issue with filesystem access from the wolfSSL test scripts in MSYS. I can get around it with

#define USE_CERT_BUFFERS_256
#define USE_CERT_BUFFERS_4096
#define NO_WRITE_TEMP_FILES

...added to options.h (or added as CFLAGS during configure).

That allows testsuite.test.exe to pass, but there is a similar issue with unit.test

247

(9 replies, posted in wolfSSL)

I can reproduce the issue on my MSYS2 install. I'll let you know what I find out.

Thanks,
Eric

248

(9 replies, posted in wolfSSL)

Thanks for that. By chance do you have any folder names with spaces in the path to the the wolfssl install? MSYS can be finicky with absolute paths.

249

(9 replies, posted in wolfSSL)

I don't see the attachment. Is it the same error?

250

(9 replies, posted in wolfSSL)

Hi a7v7

Are you in the root wolfssl directory when trying to execute the test script? Could you try "make check" and report the results?

The latest version of wolfSSL is v4.8.1 and is available from https://github.com/wolfSSL/wolfssl

Thanks,
Eric @ wolfSSL Support