First Session
Introduction to wolfSSL
- Introduction to embedded security
- Embedded Security Trends
- Security policies
- Secure Embedded System Hardware/Software Architecture Overview
- Securing legacy Systems
- Cryptography Overview
- wolfSSL Products and Library overview
wolfSSL embedded SSL/TLS library (1st part)
- Building wolfSSL
- Features
- Portability
- Callbacks
- Keys and Certificates
- Library Design
- SSL/TLS History and Protocol
- WolfSSL Basic Library usage
Exercise: |
wolfSSL TLS integration |
Exercise: |
SSL/TLS Tutorial |
Exercise: |
wolfSSL Examples |
Second Session
wolfSSL embedded SSL/TLS library (2nd part)
- Debugging
- wolfSSL TLS usage
- wolfSSL DTLS Usage
- wolfSSL PSK Usage
- wolfSSL Session Resumption
- wolfSSL with Non-Blocking I/O
- wolfSSL and TLS 1.3
Exercise: |
Wireshark |
Exercise: |
Convert TCP/IP Client and Server to TLS |
Exercise: |
Extracting Certificate Fields via API |
Exercise: |
Convert simple UDP Client and Server to DTLS |
Exercise: |
Convert simple TCP client and Server to PSK |
Exercise: |
Session Resumption Client |
Exercise: |
Write a Non-Blocking Client and Server |
Exercise: |
TLS 1.3 Client and Server |
Exercise: |
TLS 1.3 Early Data |
|