wolfssl
wolfssl copied to clipboard
The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3!
Added test_apps apps directory
When I compile wolfCrypt with SP math using these commands: https://github.com/guidovranken/cryptofuzz/blob/master/docs/wolfcrypt.md#sp-math The following program compiles but fails to link: ```c #include #include int main(void) { printf("%p, %p\n", ecc_projective_add_point_safe, ecc_map); return...
# Update Check the comment below as the message sequence numbers may be generated by conforming clients in rare scenarios. This relates to both this and [issue 4031](https://github.com/wolfSSL/wolfssl/issues/4031). ### Description...
I'm trying to run a client with wolfssl on ESP8266. I've configured my callback functions to send and receive data, but when I call the wolfSSL_connect(), I send the CLIENT_HELLO_SENT,...
I want a user_settings.h template with full description.
### Description - Type: Bug - Priority: Minor ## Non-conformance Bug **OS** Linux, Ubuntu 20 **WolfSSL build:** Version: 4.7.1r **Affected Versions** DTLS 1.2 **Expected behavior** The client should reject the...
# Update Check the comment below as the message sequence numbers may be generated by conforming clients in rare scenarios. This relates to both this and [issue 4029](https://github.com/wolfSSL/wolfssl/issues/4029). Description -...
Tl;Dr: The tls_client example for ESP-IDF does not compile. The suggested procedures to get the cryptoauthlib to work under ESP-IDF with WOLFSSL are outdated and non-applicable (but this fact is...
Tried to compile https://github.com/ZerBea/hcxtools and https://github.com/ZerBea/hcxdumptool against wolfssl through openssl compatibility layer. There are some unimplemented functions and consts: For hcxtools: `EVP_PKEY_new_CMAC_key()` For hcxdumptool: ``` ERR_FATAL_ERROR SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC SSL_OP_NO_SSLv2 SSL_OP_NO_SSLv3 EVP_PKEY_new_CMAC_key()...
wolfSSL accepts a cert whose basicConstraints.cA==False and keyUsage.keyCertSign is set. According to RFC 5280, basicConstraints.cA indicates whether the public key can be used to verify cert. Here, cA is set...