<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library]]></title>
		<link>https://www.wolfssl.com/forums/topic1876-wolfssljsse-compatibility-issues-with-nimbusjose-jwt-library.html</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-topic1876.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library.]]></description>
		<lastBuildDate>Thu, 23 Jun 2022 16:58:35 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library]]></title>
			<link>https://www.wolfssl.com/forums/post6607.html#p6607</link>
			<description><![CDATA[<p>Hi Renjith,</p><p>Were you able to try the SP math build options to see if that helped improve performance?</p><p>Thanks,<br />Chris</p>]]></description>
			<author><![CDATA[null@example.com (chrisc)]]></author>
			<pubDate>Thu, 23 Jun 2022 16:58:35 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post6607.html#p6607</guid>
		</item>
		<item>
			<title><![CDATA[Re: WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library]]></title>
			<link>https://www.wolfssl.com/forums/post6593.html#p6593</link>
			<description><![CDATA[<p>Hi Renjith,</p><div class="quotebox"><blockquote><p>For ECDSA, public certificate loading had issues with wolfcrypt JCE</p></blockquote></div><p>Are you able to share more details on the error that you saw for this?&nbsp; Or, would it be easy to send over a simple sample app that reproduces the issue?&nbsp; If so, I can help look into this further.&nbsp; This may be due to a native build option that needs to change, or a higher-level JCE feature depending on the error.</p><div class="quotebox"><blockquote><p>Are there any flags to improve the signing performance(perhaps for making use of the native code)?</p></blockquote></div><p>We have several different math libraries available in native wolfSSL now that provide varying performance and features.&nbsp; We have our normal big integer library, our fastmath library, and our newest SP Math library.&nbsp; On most platforms, fastmath will be the default.&nbsp; Switching over to our newer SP Math should give you performance increases for public key operations (RSA, ECDSA).</p><p>If you are uisng configure with wolfSSL, you can try the following options:</p><div class="codebox"><pre><code>./configure --enable-sp --enable-sp-math-all &lt;other options&gt;</code></pre></div><p>Our SP Math library does also have assembly optimizations for several platforms.&nbsp; Depending on your target hardware, you may be able to add <strong>--enable-sp-asm</strong> to the above options.</p><p>Let me know if that builds OK, and what you see as far as performance goes.</p><p>Thanks!<br />Chris</p>]]></description>
			<author><![CDATA[null@example.com (chrisc)]]></author>
			<pubDate>Wed, 15 Jun 2022 15:55:27 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post6593.html#p6593</guid>
		</item>
		<item>
			<title><![CDATA[Re: WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library]]></title>
			<link>https://www.wolfssl.com/forums/post6579.html#p6579</link>
			<description><![CDATA[<p>Hi Chris,</p><p>Thank you for your response. That helped. I was able to build wolfCrypt JNI/JCE, and was able to get signing/verification working with RSA 2048. For ECDSA, public certificate loading had issues with wolfcrypt JCE, however, signing using the private key worked fine.</p><p>Regarding the performance, the signing operation was seen to be expensive with wolfcrypt JCE, while verification was faster - when compared to BCFips. Here is the output of a sample program that tested the performance differences between wolfssl and BCFips:</p><p>Signer JCA:wolfJCE version 1.0<br />nimbus-jose JWS RSA2048 with JWSAlgorithm RS256 [Sign] - 5.27 millis<br />Verifier JCA:wolfJCE version 1.0<br />nimbus-jose JWS RSA2048 with JWSAlgorithm RS256 [Validate] - 180.383 micros</p><br /><p>Signer JCA:BCFIPS version 1.0002<br />nimbus-jose JWS RSA2048 with JWSAlgorithm RS256 [Sign] - 3.55 millis<br />Verifier JCA:BCFIPS version 1.0002<br />nimbus-jose JWS RSA2048 with JWSAlgorithm RS256 [Validate] - 621.219 micros</p><br /><p>Are there any flags to improve the signing performance(perhaps for making use of the native code)?</p><p>Regards,<br />Renjith Alexander</p>]]></description>
			<author><![CDATA[null@example.com (realexan)]]></author>
			<pubDate>Tue, 07 Jun 2022 09:42:27 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post6579.html#p6579</guid>
		</item>
		<item>
			<title><![CDATA[Re: WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library]]></title>
			<link>https://www.wolfssl.com/forums/post6577.html#p6577</link>
			<description><![CDATA[<p>Hi realexan,</p><p>Thanks for reaching out.&nbsp; We have not tested wolfJSSE or wolfJCE with Nimbus JOSE + JWT before in-house.&nbsp; Can you confirm, are you are using wolfJSSE or our cryptography provider wolfJCE?&nbsp; I am not familiar enough at the moment with how Nimbus JOSE + JWT calls down into the Java Security Architecture to know if it is calling into a JCE or JSSE provider.&nbsp; If you are using wolfJSSE (wolfSSL JNI/JSSE Provider), it may be worth trying to download, build, and register our JCE provider (wolfCrypt JNI/JCE) to see if that gives Nimbus access to the algorithm primitives that it is expecting.</p><p>Native wolfSSL supports RSA 2048 and SHA-256, as does wolfJSSE (in TLS cipher suites) and wolfJCE (via Signature and MessageDigest classes).</p><p>Are you able to provide more details about the project you are working on, and why you are looking to use wolfJSSE/wolfJCE in place of the default cryptography providers?</p><p>Thanks,<br />Chris</p>]]></description>
			<author><![CDATA[null@example.com (chrisc)]]></author>
			<pubDate>Fri, 03 Jun 2022 20:53:45 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post6577.html#p6577</guid>
		</item>
		<item>
			<title><![CDATA[WolfSSL-JSSE compatibility issues with Nimbus-jose JWT library]]></title>
			<link>https://www.wolfssl.com/forums/post6576.html#p6576</link>
			<description><![CDATA[<p>Built wolfssl with jni and jsse on CentOs 7. Set the instance of WolfSSLProvider for signer/verifier&#039;s JCA provider of Nimbus jose jwt. It seems that there are compatibility issues with these two. Signing fails with the error &quot;Unsupported JWS algorithm RS256&quot;(used RSA asymmetric keys with key-length of 2048 bits). Enabling debug logs using -Dwolfssl.debug=true didn&#039;t yield any information.</p><p>Nimbus jose jwt asymmetric key token signing and verification were seen to be working fine with all the other security providers that I tested.</p><p>Note: Octet key pair with Curve Ed25519 was seen to be working fine.</p>]]></description>
			<author><![CDATA[null@example.com (realexan)]]></author>
			<pubDate>Fri, 03 Jun 2022 12:00:27 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post6576.html#p6576</guid>
		</item>
	</channel>
</rss>
