Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ECDHE-PSK with x25519 #7132

Merged
merged 1 commit into from
Jan 17, 2024
Merged

ECDHE-PSK with x25519 #7132

merged 1 commit into from
Jan 17, 2024

Conversation

ejohnstown
Copy link
Contributor

Description

  1. Add missing assignment of the WOLFSSL object's ecdhCurveOid value. It is set correctly in the previous cases, but got missed for ECDHE-PSK.
  2. Add test cases to the unit testing.
    (ZD 17289)

Testing

./configure --enable-all
./examples/server/server -l ECDHE-PSK-CHACHA20-POLY1305 -s -t
./examples/client/client -l ECDHE-PSK-CHACHA20-POLY1305 -s -t

Checklist

  • added tests
  • updated/added doxygen
  • updated appropriate READMEs
  • Updated manual and documentation

1. Add missing assignment of the WOLFSSL object's ecdhCurveOid value. It
   is set correctly in the previous cases, but got missed for ECDHE-PSK.
2. Add test cases to the unit testing.
@dgarske dgarske merged commit 089468f into wolfSSL:master Jan 17, 2024
106 checks passed
@ejohnstown ejohnstown deleted the x25519-ecdhe-psk branch January 17, 2024 06:45
mrdeep1 added a commit to mrdeep1/libcoap that referenced this pull request Apr 1, 2024
Includes some porting ideas from qursa-uc3m libcoap-wolfssl work.

Some common ASN1 code moved from coap_gnutls.c to coap_asn1.c to support RPK.

Interoperability requirements

DTLS1.3 downgrade requires
eclipse/tinydtls#230
wolfSSL/wolfssl#7367

TLS1.3 downgrade requires
wolfSSL/wolfssl#7367

(D)TLS1.2 use of RPK requires
wolfSSL/wolfssl#7375

MbedTLS using TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 requires
wolfSSL/wolfssl#7132
mrdeep1 added a commit to mrdeep1/libcoap that referenced this pull request Apr 10, 2024
Includes some porting ideas from qursa-uc3m libcoap-wolfssl work.

Some common ASN1 code moved from coap_gnutls.c to coap_asn1.c to support RPK.

WolfSSL build
$ ./configure --enable-all --enable-dtls13 CFLAGS="-DBUILD_TLS_PSK_WITH_AES_128_CCM -DHAVE_RPK"

Interoperability requirements

DTLS1.3 downgrade requires
eclipse/tinydtls#230
wolfSSL/wolfssl#7367

TLS1.3 downgrade requires
wolfSSL/wolfssl#7367

(D)TLS1.2 use of RPK requires
wolfSSL/wolfssl#7375

MbedTLS using TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 requires
wolfSSL/wolfssl#7132

GnuTLS using PSK and TLS1.3 requires
wolfSSL/wolfssl#7407
mrdeep1 added a commit to mrdeep1/libcoap that referenced this pull request Apr 10, 2024
Includes some porting ideas from qursa-uc3m libcoap-wolfssl work.

Some common ASN1 code moved from coap_gnutls.c to coap_asn1.c to support RPK.

WolfSSL build
$ ./configure --enable-all --enable-dtls13 CFLAGS="-DBUILD_TLS_PSK_WITH_AES_128_CCM -DHAVE_RPK"

Interoperability requirements

DTLS1.3 downgrade requires
eclipse/tinydtls#230
wolfSSL/wolfssl#7367

TLS1.3 downgrade requires
wolfSSL/wolfssl#7367

(D)TLS1.2 use of RPK requires
wolfSSL/wolfssl#7375

MbedTLS using TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 requires
wolfSSL/wolfssl#7132

GnuTLS using PSK and TLS1.3 requires
wolfSSL/wolfssl#7407
mrdeep1 added a commit to obgm/libcoap that referenced this pull request Apr 16, 2024
Includes some porting ideas from qursa-uc3m libcoap-wolfssl work.

Some common ASN1 code moved from coap_gnutls.c to coap_asn1.c to support RPK.

WolfSSL build
$ ./configure --enable-all --enable-dtls13 CFLAGS="-DBUILD_TLS_PSK_WITH_AES_128_CCM -DHAVE_RPK"

Interoperability requirements

DTLS1.3 downgrade requires
eclipse/tinydtls#230
wolfSSL/wolfssl#7367

TLS1.3 downgrade requires
wolfSSL/wolfssl#7367

(D)TLS1.2 use of RPK requires
wolfSSL/wolfssl#7375

MbedTLS using TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 requires
wolfSSL/wolfssl#7132

GnuTLS using PSK and TLS1.3 requires
wolfSSL/wolfssl#7407
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants