<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
		<link>https://www.wolfssl.com/forums/topic1248-solved-wolfssl-3153-tlsv13-and-ecpointformats-extensions.html</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-topic1248.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions.]]></description>
		<lastBuildDate>Mon, 27 Aug 2018 21:38:18 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4112.html#p4112</link>
			<description><![CDATA[<p>SamSam,</p><p>It was our pleasure! Thanks for sharing the project details, that is very exciting to see! Thank you also for using the wolfSSL forums to address your issue. If anything else comes up in the future please reach out to us anytime, you can use the public forums here or you can shoot us an email at support@wolfssl.com for quicker response times!</p><p>Cheers,</p><p>Kaleb</p>]]></description>
			<author><![CDATA[null@example.com (Kaleb J. Himes)]]></author>
			<pubDate>Mon, 27 Aug 2018 21:38:18 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4112.html#p4112</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4111.html#p4111</link>
			<description><![CDATA[<p>Hello Kaleb,</p><p>No I don&#039;t have any timelines. I am using wolfSSL as a TLS backed for PyCurl (Python curl wrapper).<br />The project is OpenSource plugin for Set-Top-Boxes with Engima2 software.</p><p>Here is the link to the repository of this project:<br /><a href="https://gitlab.com/iptvplayer-for-e2/iptvplayer-for-e2">https://gitlab.com/iptvplayer-for-e2/iptvplayer-for-e2</a></p><p>Thank you very much for all information and fix.</p><p>Best Regards,<br />SamSam</p>]]></description>
			<author><![CDATA[null@example.com (SamSam)]]></author>
			<pubDate>Mon, 27 Aug 2018 21:36:24 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4111.html#p4111</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4109.html#p4109</link>
			<description><![CDATA[<p>Hi SamSam,</p><p>wolfSSL targets a release every 3 months. Our last release was on June 20th of 2018 so our next target date would be sometime around Sep 20th give or take. We do not have a hard release date at this time but it could be anytime between now and the beginning of October.</p><p>Do you have any timelines you are facing and if so can you share what your timelines are and what is driving the effort on your side?</p><br /><p>Warm Regards,</p><p>Kaleb</p>]]></description>
			<author><![CDATA[null@example.com (Kaleb J. Himes)]]></author>
			<pubDate>Mon, 27 Aug 2018 21:26:19 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4109.html#p4109</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4108.html#p4108</link>
			<description><![CDATA[<p>Hello @embhorn,</p><p>Thank you for the update and for the fix. </p><p>These is my test results:<br /></p><div class="codebox"><pre><code>mkdir /mnt/work/wolfsssl_test/
cd /mnt/work/wolfsssl_test/
git clone https://github.com/wolfSSL/wolfssl.git
mkdir rootfs
cd wolfssl/
./autogen.sh

export CC=&quot;gcc -Wno-error=overflow&quot;
./configure --enable-all --prefix=/mnt/work/wolfsssl_test/rootfs
make
make install
# TEST 1 - with wolfSSL_CTX_UseSupportedCurve call
./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -t
# PASS

# TEST 2 - wolfSSLv23_client_method_ex
./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -v d
# PASS

cd ..
wget https://curl.haxx.se/download/curl-7.61.0.tar.gz
tar -xvf curl-7.61.0.tar.gz
cd curl-7.61.0
./configure --prefix=/mnt/work/wolfsssl_test/rootfs --without-ssl --with-wolfssl=/mnt/work/wolfsssl_test/rootfs
make
make install

export LD_LIBRARY_PATH=/mnt/work/wolfsssl_test/rootfs/lib
# TEST 3 curl
/mnt/work/wolfsssl_test/rootfs/bin/curl https://www.tvnow.de/
# PASS</code></pre></div><p>Thank you very much. What is the expected date when official release will be deployed with this patch?</p><p>Best Regards,<br />SamSam</p>]]></description>
			<author><![CDATA[null@example.com (SamSam)]]></author>
			<pubDate>Mon, 27 Aug 2018 20:39:42 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4108.html#p4108</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4104.html#p4104</link>
			<description><![CDATA[<p>Hi @SamSam</p><p>This issue was due to a bug in the wolfSSL library. The code changes are available for you to review here:<br /><a href="https://github.com/wolfSSL/wolfssl/pull/1772">https://github.com/wolfSSL/wolfssl/pull/1772</a></p><p>The two use cases are both passing now.</p><p>Please let us know when you have had an opportunity to test the changes.</p><p>Best regards,</p><p>Eric Blankenhorn<br />wolfSSL Support</p>]]></description>
			<author><![CDATA[null@example.com (embhorn)]]></author>
			<pubDate>Tue, 21 Aug 2018 13:50:55 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4104.html#p4104</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4101.html#p4101</link>
			<description><![CDATA[<p>@embhorn</p><p>Your question is strange because in the first post you can find these informations.</p><p>As you can see the problem is with commands:<br /></p><div class="codebox"><pre><code>./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -v d</code></pre></div><p>and </p><div class="codebox"><pre><code>./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -t</code></pre></div><br /><p>So, the problem is when wolfSSLv23_client_method_ex&nbsp; is used or when method wolfSSL_CTX_UseSupportedCurve was called.<br />In such situation wwolfSSL does not send information about elliptic_curves extension and this is a problem.<br />I checked this using wireshark.</p><p>I already wrote this two times. So, your question is really strange. Did you read my posts?</p><p>Regards,<br />SamSam</p>]]></description>
			<author><![CDATA[null@example.com (SamSam)]]></author>
			<pubDate>Sun, 19 Aug 2018 20:12:34 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4101.html#p4101</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4100.html#p4100</link>
			<description><![CDATA[<p>Hi Sam Sam,</p><p>I am trying to reproduce the issues you have reported. For now I would like to try using only wolfSSL, we can add CURL in later.</p><p>I have configured wolfSSL using:</p><div class="codebox"><pre><code>$ ./configure --enable-all</code></pre></div><p>I am able to connect to the &quot;<a href="http://www.tvnow.de">www.tvnow.de</a>&quot; host using the example client:</p><div class="codebox"><pre><code>$ ./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i
peer&#039;s cert info:
 issuer : /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA
 subject: /OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.tvnow.de
 altname = tvnow.de
 altname = *.tvnow.de
 serial number:1c:6b:0d:e8:9a:44:80:03:c3:a1:0e:03:bd:8e:6a:92 
SSL version is TLSv1.2
SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SSL curve name is SECP256R1
Client Random : C70D72DD1A0B6FD211139FF47EF63367DB43A16D7A3AC3807CF5C8649B4B1021
SSL connect ok, sending GET...
HTTP/1.0 302 Found
Location: https://www.tvnow.de/index.html
Server: BigIP
C
onnection: close
Content-Length: 0</code></pre></div><p>Also, I can specify the SSL version with the &quot;-v &lt;num&gt;&quot; option:<br /></p><div class="codebox"><pre><code>./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -v 2
./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -v 3</code></pre></div><p>Only the values 2 and 3 for SSL version are successful with that host.</p><p>Does this match your results so far?</p><p>Thanks,<br />Eric Blankenhorn<br />wolfSSL Support</p>]]></description>
			<author><![CDATA[null@example.com (embhorn)]]></author>
			<pubDate>Fri, 17 Aug 2018 16:31:25 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4100.html#p4100</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4099.html#p4099</link>
			<description><![CDATA[<p>@SamSam,</p><br /><p>Just letting you know I have asked @embhorn to take a look at your report as a possible maintenance item. He is reviewing and will post an update when he has a solution.</p><p>- Kaleb</p>]]></description>
			<author><![CDATA[null@example.com (Kaleb J. Himes)]]></author>
			<pubDate>Thu, 16 Aug 2018 21:42:18 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4099.html#p4099</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4089.html#p4089</link>
			<description><![CDATA[<p>@Kaleb J. Himes</p><p>Thank you for the update.</p><p>I did not modify the client source code. </p><p>In provided by me examples I do use TLS1.3 nowhere. I used parameter &quot;-t&quot; because with this option function wolfSSL_CTX_UseSupportedCurve&nbsp; is called.</p><p>The problem is when wolfSSL_CTX_UseSupportedCurve is called, as it is done by the libcurl or when you use method wolfSSLv23_client_method_ex&nbsp; then wwolfSSL does not send information about elliptic_curves extension.</p><p>I gave step by step scenario how to reproduce the problem.</p><p>At now there is no possible to connect to <a href="http://www.tvnow.de/">http://www.tvnow.de/</a> via curl when the wolfSSL 3.15.3 (./configure --enable-all) is used as SSL backend and this is the main problem, all others are only my own investigation.</p><p>Best regards,<br />Sam Sam</p>]]></description>
			<author><![CDATA[null@example.com (SamSam)]]></author>
			<pubDate>Tue, 07 Aug 2018 12:15:43 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4089.html#p4089</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4085.html#p4085</link>
			<description><![CDATA[<p>Hi SamSam,</p><p>Thank you for using the wolfSSL forums!</p><div class="quotebox"><blockquote><p>2. default method wolfTLSv1_2_client_method_ex with wolfSSL_CTX_UseSupportedCurve call <br />examples/client/.libs/client -S HOST_NAME e -h HOST_NAME&nbsp; -p 443 -d -x -C -g -i -t<br />client use wolfTLSv1_2_client_method_ex method and in the &quot;Client Hello&quot; message wolfSSL send information about following extensions:<br />- signature_algorithms<br />- elliptic_curves<br />- SessionTicket TLS<br />- server_name<br />- Unknown 23<br />Information about ec_point_formats is missed.<br />result: SSL handshake failed with error wolfSSL_connect error -313, revcd alert fatal error</p></blockquote></div><p>Unless you modified the client manually this is not using TLS 1.3. This is TLS 1.2. Use argument &quot;-v 4&quot; to set TLS 1.3.<br />The -t option does NOT need ec_point format, instead this sends the &quot;key_share&quot; extension indicating a desire to use x25519 for key exchange.</p><br /><div class="quotebox"><blockquote><p>3. method wolfSSLv23_client_method_ex <br />examples/client/.libs/client -S HOST_NAME&nbsp; -h HOST_NAME&nbsp; -p 443 -d -x -C -g -i -v d<br />client use wolfSSLv23_client_method_ex method and in the &quot;Client Hello&quot; message wolfSSL send information about following extensions:<br />- Unknown 43<br />- signature_algorithms<br />- elliptic_curves<br />- Unknown 51<br />- SessionTicket TLS<br />- server_name<br />Information about ec_point_formats is missed.<br />result: SSL handshake failed with error wolfSSL_connect error -313, revcd alert fatal error<br />Summary:<br />The wolfSSL does not send information about elliptic_curves extension when:<br />- method wolfSSLv23_client_method_ex <br />or<br />- wolfSSL_CTX_UseSupportedCurve was call</p></blockquote></div><p>I&#039;ll look into this one and get back to you on what I find!</p><p>Warm Regards,</p><p>Kaleb</p>]]></description>
			<author><![CDATA[null@example.com (Kaleb J. Himes)]]></author>
			<pubDate>Mon, 06 Aug 2018 23:13:10 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4085.html#p4085</guid>
		</item>
		<item>
			<title><![CDATA[[SOLVED] wolfSSL 3.15.3, TLSv1.3 and ec_point_formats  extensions]]></title>
			<link>https://www.wolfssl.com/forums/post4081.html#p4081</link>
			<description><![CDATA[<p>Hello,</p><p>Build wolfSSL 3.15.3 <br />./configure --enable-all<br />make</p><p>Use wolfSSL client to connect to host </p><div class="quotebox"><blockquote><p>ww.tvnow.de</p></blockquote></div><p>1. default method wolfTLSv1_2_client_method_ex without wolfSSL_CTX_UseSupportedCurve call <br /></p><div class="codebox"><pre><code>examples/client/.libs/client -S HOST_NAME -h HOST_NAME -p 443 -d -x -C -g -i </code></pre></div><p>client use wolfTLSv1_2_client_method_ex method and in the &quot;Client Hello&quot; message wolfSSL send information about following extensions:<br />- signature_algorithms<br />- <strong>ec_point_formats</strong><br />- <strong>elliptic_curves</strong><br />- SessionTicket TLS<br />- server_name<br />- Unknown 23</p><p>result: SSL handshake successful</p><p>2. default method wolfTLSv1_2_client_method_ex with wolfSSL_CTX_UseSupportedCurve call <br /></p><div class="codebox"><pre><code>examples/client/.libs/client -S HOST_NAME -h HOST_NAME  -p 443 -d -x -C -g -i -t</code></pre></div><p>client use wolfTLSv1_2_client_method_ex method and in the &quot;Client Hello&quot; message wolfSSL send information about following extensions:<br />- signature_algorithms<br />- <strong>elliptic_curves</strong><br />- SessionTicket TLS<br />- server_name<br />- Unknown 23<br />Information about <strong>ec_point_formats</strong> is missed.<br />result: SSL handshake failed with error <strong>wolfSSL_connect error -313, revcd alert fatal error</strong></p><p>3. method wolfSSLv23_client_method_ex <br /></p><div class="codebox"><pre><code>examples/client/.libs/client -S HOST_NAME  -h HOST_NAME  -p 443 -d -x -C -g -i -v d</code></pre></div><p>client use wolfSSLv23_client_method_ex method and in the &quot;Client Hello&quot; message wolfSSL send information about following extensions:<br />- Unknown 43<br />- signature_algorithms<br />- <strong>elliptic_curves</strong><br />- Unknown 51<br />- SessionTicket TLS<br />- server_name<br />Information about <strong>ec_point_formats</strong> is missed.<br />result: SSL handshake failed with error <strong>wolfSSL_connect error -313, revcd alert fatal error</strong></p><p>Summary:<br />The wolfSSL does not send information about <strong>elliptic_curves</strong> extension when:<br />- method wolfSSLv23_client_method_ex <br />or<br />- wolfSSL_CTX_UseSupportedCurve was call</p><p>It causes&nbsp; SSL handshake failed.</p><p>It looks that host <a href="http://www.tvnow.de">www.tvnow.de</a> need information about&nbsp; <strong>ec_point_formats</strong> extension, but the wolfSSL in describad cases does not send it?<br />Can you explain why? It is posible to call some function to add this extension to &quot;Client Hello&quot; message?</p><p>Please note that libcurl always call wolfSSL_CTX_UseSupportedCurve<br /><a href="https://github.com/curl/curl/blob/10d8f3f1344b958a9bea3b3d9f607bc624bce410/lib/vtls/cyassl.c">https://github.com/curl/curl/blob/10d8f … s/cyassl.c</a><br /></p><div class="codebox"><pre><code>  CyaSSL_CTX_UseSupportedCurve(BACKEND-&gt;ctx, 0x17); /* secp256r1 */
  CyaSSL_CTX_UseSupportedCurve(BACKEND-&gt;ctx, 0x19); /* secp521r1 */
  CyaSSL_CTX_UseSupportedCurve(BACKEND-&gt;ctx, 0x18); /* secp384r1 */</code></pre></div><p>and also use wolfSSLv23_client_method as default.</p><p>This results to make impossible to connect to some host using libcurl + wolfSSL.</p><p>It looks like bug in the wolfSSL library.<br />Can you please take a look on this and give solution for this problem, please? </p><p>Regards,<br />Sam Sam</p>]]></description>
			<author><![CDATA[null@example.com (SamSam)]]></author>
			<pubDate>Sat, 04 Aug 2018 10:44:40 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post4081.html#p4081</guid>
		</item>
	</channel>
</rss>
