Skip to content

Conversation

@JacobBarthelmeh
Copy link
Contributor

No description provided.

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds TLS transport support to wolfHSM for secure client-server communication. The implementation extends the existing TCP transport with TLS encryption using wolfSSL, supporting both certificate-based and PSK (Pre-Shared Key) authentication methods.

Key Changes:

  • New TLS transport layer built on top of TCP transport with wolfSSL integration
  • Support for both mutual TLS authentication and PSK modes
  • Configuration changes to enable TLS/PSK in the build system

Reviewed Changes

Copilot reviewed 10 out of 10 changed files in this pull request and generated 10 comments.

Show a summary per file
File Description
port/posix/posix_transport_tls.h Header defining TLS transport structures and function declarations
port/posix/posix_transport_tls.c Implementation of TLS transport client/server functions
port/posix/posix_transport_tcp.c Exposed HandleConnect function and fixed null pointer check
examples/posix/wh_posix_server/wh_posix_server_cfg.h Added TLS and PSK configuration function declarations
examples/posix/wh_posix_server/wh_posix_server_cfg.c Implemented TLS and PSK server configuration with certificate loading
examples/posix/wh_posix_server/wh_posix_server.c Added TLS/PSK transport options to CLI
examples/posix/wh_posix_server/user_settings.h Enabled TLS, TLS12, PSK, and debug settings
examples/posix/wh_posix_client/wh_posix_client_cfg.h Added TLS and PSK client configuration declarations
examples/posix/wh_posix_client/wh_posix_client_cfg.c Implemented TLS and PSK client configuration with certificate loading
examples/posix/wh_posix_client/wh_posix_client.c Added TLS/PSK transport options to client CLI

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@JacobBarthelmeh JacobBarthelmeh self-assigned this Oct 29, 2025
@JacobBarthelmeh JacobBarthelmeh force-pushed the auth branch 2 times, most recently from e9a4e7e to fcb0a97 Compare October 30, 2025 20:43
@JacobBarthelmeh JacobBarthelmeh marked this pull request as ready for review October 30, 2025 21:10
Copy link
Contributor

@bigbrett bigbrett left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

quick initial skim - I'd like to see test coverage added to this before diving much deeper. Looks very promising though, I'm super excited about this !!!

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

Copilot reviewed 18 out of 18 changed files in this pull request and generated 4 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

Copilot reviewed 18 out of 18 changed files in this pull request and generated 4 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@JacobBarthelmeh
Copy link
Contributor Author

Investigating SHE tests with TLS.

bigbrett
bigbrett previously approved these changes Nov 4, 2025
@bigbrett bigbrett assigned billphipps and unassigned bigbrett Nov 4, 2025
@bigbrett bigbrett requested a review from billphipps November 4, 2025 19:59
@bigbrett
Copy link
Contributor

bigbrett commented Nov 4, 2025

Random thoughts for future work: It would be really cool to have a built-in way to initialize and setup the WOLFSSL_CTX, perhaps even following the config/context paradigm we use elsewhere. Is there any way we can absolve the user from needing to directly manage the context? Or is that a dangerous road to go down? I envision a basic set of wolfSSL configuration options (keys, certs, basic modes) just being supplied in the transport config struct and us taking care of everything else internally.

@JacobBarthelmeh
Copy link
Contributor Author

JacobBarthelmeh commented Nov 24, 2025

Rebased on top of recent examples and yaml changes. Assigning back to me until CI tests are passing

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 22 out of 22 changed files in this pull request and generated 7 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

billphipps
billphipps previously approved these changes Jan 20, 2026
Copy link
Contributor

@billphipps billphipps left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great! Let me know when you want me to merge it!

Thank you!

@JacobBarthelmeh
Copy link
Contributor Author

Force pushed to resolve merge conflict.

@billphipps billphipps merged commit 7eaba42 into wolfSSL:main Jan 21, 2026
100 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants