Hi jacob.andersen,

My name is Anthony and I am a member of the wolfSSL team.

I don't think I understand enough about your use case.  Is there any reason both the server and client would need to share the same context and ssl structs? 

I'd also need to know more about your system and platform.  For example, if this were linux then you have processes and it would be easy to set this up as separate applications. I think it would even be simple if your system only had threads.  I realize I am asking for information that you might not want to reveal on a public forum.  If you would like to talk about this in a more confidential medium, please send an email message to support@wolfssl.com referencing this post.

Warm regards, Anthony

Hi tonyjosi,

Note that reproducing and diagnosing this could take a bit of time. In the meantime, we quite often find that defining `WOLFSSL_ALT_CERT_CHAINS` often fixes this problem.  Can you please trying adding it your defines in your `user_settings.h` and then rebuilding everything?

Please let me know how it goes.

Warm regards, Anthony

Hi tonyjosi,
My name is Anthony and I am a member of the wolfSSL team.  Let me see if I can look into this for you. I will start by trying to reproduce this.
Warm regards, Anthony

Hi Sayeed,

My name is Anthony and I am a member of the wolfSSL team.  I'm not sure I understand your issue.  Can you give more details such as the compiler error message?

Warm regards, Anthony

55

(3 replies, posted in wolfSSL)

Hi, Thanks for reaching otu Michael.  This appears to be a memory issue.  Can you please try repeating these procedures with Valgrind and then showing us the output?
Warm regards, Anthony

56

(3 replies, posted in wolfSSL)

Hi,
Have you tried using wolfSSH? It can be found at  https://github.com/wolfSSL/wolfssh or from our download page.
Warm regards, Anthony

57

(5 replies, posted in wolfSSL)

Thanks philipm,
We can continue the conversation there.  The short answer is it is not supported yet.  Please stay tuned to email for a response from support@wolfssl.com.
Warm regards, Anthony

58

(5 replies, posted in wolfSSL)

Hi philipm,

Thank you so much for reaching out.  My name is Anthony and I am a member of the wolfSSL team.  Can you please send this request to support@wolfssl.com? This will allow us to better track your issue.

Warm regards, Anthony

59

(4 replies, posted in wolfSSL)

Hi,

As we say in https://github.com/wolfSSL/wolfssl/blob/master/INSTALL:

Use the Visual Studio Solution wolfssl64.sln

Can you tell us a bit about your project?  What are you trying to achieve?

Warm regards, Anthony

I'm so glad I was able to provide helpful information.  Please feel free to use our technical support service at support@wolfssl.com should you prefer more private interactions. 

Warm regards, Anthony

Hi Paul,
Please have a look at https://github.com/wolfSSL/wolfssl/tree … DE/ARDUINO .

Can you please let us know a bit about your project?  Is it out of professional, personal or academic interest?  Is there any organization associated with your efforts?

Warm regards, Anthony

62

(3 replies, posted in wolfCrypt)

Hi Dien,

I understand. Would you like to register your interest in CBC and CCM mode stream APIs as an official feature request?  It will only take a few minutes of your time.  If so, please send an email to support@wolfssl.com referencing this forum thread.

Warm regards, Anthony

63

(3 replies, posted in wolfCrypt)

Hello dientc.511,
We also have streaming for Gmac and AES-EAX. You can search for the following API

wc_AesEaxInit()
wc_AesEaxEncryptUpdate()
wc_AesEaxEncryptFinal()

What other modes were you looking for?

Warm regards, Anthony

64

(3 replies, posted in wolfSSL)

Hi Ja1999,
Yes I suspect that would work.
Warm regards, Anthony

65

(3 replies, posted in wolfSSL)

Hi  ja1999,

Thanks for your interest in wolfSSL.  4.8.1 is a very old version.  I suspect you are bumping into expired certificates in our testing directory.

Have you tried a more recent version of wolfSSL-fips-ready?   5.6.4 is the most recent version and it is available at https://wolfssl.com/download . I tested it recently and it works as expected.

Warm regards, Anthony

Mattia,

The easiest way to confirm my theory is to define WOLFSSL_DEBUG_TLS to see what the server gets.

Warm regards, Anthony

Hello Again Mattia,

I have successfully imported your ClientHello into wireshark.  It looks to be a compliant TLS 1.3 client hello handshake message.  I see no problems with it.  But then the server sends a DECODE_ERROR alert message. Can you please confirm that the server received the same client hello that you pasted above? I suspect that there is some sort of I/O mishap here.

Warm regards, Anthony

Hello Mattia,

Thank you for reaching out to us here at wolfSSL.  I will need some time to analyze the handshake data that you have shown.  It might be more efficient if you could turn on debugging (define WOLFSSL_DEBUG and call wolfSSL_Debugging_ON() ) on both sides and paste the logs in a message here.

Warm regards, Anthony

Hi Henrik,

My name is Anthony Hu and I am a member of the wolfSSL team. I see you are using the STM32CubeIDE but do not have wolfSSL.I-CUBE-wolfSSL_conf.h.  In that case you need to enable wolfSSL in the project's .ioc file. Also, when you close the .ioc file, please make sure you tell the IDE to generate code. 

I'm not sure how our zephyr integration works with STM32CubeIDE.  I will consult with my colleagues to learn about this and get back to you.

Warm regards, Anthony

Hi shanoaice,

my name is Anthony and I am a member of the wolfSSL team. I am looking at the error output and the line numbers and content do not line up with what I am seeing in the wolfSSL repo on github.

If its not the newest, please consider using the newest code.

Please let me know your version and where you obtain your code for wolfSSL.

Warm regard, Anthony

Hello andrea.raiola,

I'm glad to know that you have resolved this on your own.  I have enlisted our cmake expert to have a look at this thread and the stackoverflow link to better understand the issue you are seeing.

Thank you so much for pointing this out to us.

Warm regards, Anthony

Hi, I understand you cannot share the host address nor the certificate and that is fine. Can you make a certificate chain that reproduces this ?

Warm regards, Anthony

Hi Andrea,

My name is Anthony Hu and I am a member of the wolfSSL team.

>  in particulare i get 8368 but in my main.cpp i get 8432.

This is a very big hint.  You can see the definition of

struct RsaKey

in

wolfssl/wolfcrypt/rsa.h 

It varies greatly based on what macros are defined. I noticed you have the following in your C file:


#include <wolfssl/options.h>


Can you please make sure it is exactly the same as the wolfssl/options.h  file in your wolfssl source build directory?

If you would like to further discuss this issue, please open a ticket on our Technical Support system by sending a message to support@wolfssl.com

Warm regards, Anthony

Hi,

` -A certs/server_cert.pem` suggests it is a server certificate; not a root CA certificate.

Can yo please let us know a bit about yourself and your project.  This helps us classify your inquiry.

Warm regards, Anthony

Hi Bahadirmaktav,

How are you today? My name is Anthony Hu and I am a member of the wolfSSL team. I have checked, and we do not support this particular flag in our OpenSSL compatibility layer. However, I will query my colleagues to see if there is a simple way for you to do this. Please stay tuned.

Warm Regards, Anthony