The wolfMQTT client library has a Microsoft Azure IoT Hub example that demonstrates securely connecting over TLS provided by the wolfSSL embedded SSL/TLS library.
We setup a wolfMQTT IoT Hub on the Azure server for testing. We added a device called `demoDevice`, which you can connect and publish to. The example demonstrates the creation of a SasToken, which is used as the password for the MQTT connect packet. It also shows the topic names for publishing events and listening to `devicebound` messages.
Everyone deserves to have their IoT data secure, and wolfSSL provides the best libraries to accomplish that! Secure-IoT-Love from the wolfSSL team!
Is your team looking for a 32-bit MCU that boasts advanced security, performance, and connectivity for your next project in industrial / building automation, automotive or IoT?
Would you like peace of mind knowing that your product solution incorporates the best tested TLS / Cryptography libraries with blazing fast speeds on bare-metal and Amazon FreeRTOS environments?
If so, then check out the embedded-C wolfSSL TLS and wolfCrypt cryptography libraries on the Renesas RA Family of 32-bit MCUs with Arm Cortex-M Core.
wolfSSL is delighted to partner with Renesas to offer examples and solutions for Renesas RA devices. Quickly get started with a Renesas EK-RA6M3G kit and the wolfSSL example projects.
The team at wolfSSL is excited to help you hit the ground running on your next project. We can also provide additional support through your product development and release cycle. Please feel free to ask us any questions.
More to come…
Progress is being made to support the Renesas RA cryptography accelerators within the wolfCrypt library. The hardware acceleration support will include ECC, RSA, AES, TRNG, and SHA-256 operations with the possibility of more in the future. We will announce support for hardware cryptography and benchmark results soon.
Why wolfSSL?
wolfSSL is a team that has passion and dedication to creating the best supported and best tested secure communication software products with outstanding performance on a host of operating environments.
We want you to focus your product development efforts on your core-features that your customers crave.
wolfSSL ensures peace of mind for your product development team; that their cutting-edge, disruptive innovations won’t be disrupted by malicious hackers.
Allow us to help guide and expedite the necessary process of securing your device and communications.
[wolfSSL General Questions]
Email: facts@wolfssl.com
Phone: +1 (425) 245-8247
There are many reasons why a user might want to switch from OpenSSL to wolfSSL. In order to facilitate this transition, wolfSSL has an accessible compatibility layer.
Why Migrate?
Why might one want to make this migration and turn on this compatibility in the first place? To start, wolfSSL has numerous benefits over its counterpart, OpenSSL. Some of these include hardware acceleration implementations, progressive adoptions of TLS 1.3 as well as a reduced footprint size. In addition to this, there is the potential to use wolfSSL FIPS. wolfSSL maintains current FIPS support and is used in numerous applications and provides FIPS Ready builds to help get projects ready for FIPS verification. All of this is supported by a team of trained wolfSSL engineers.
What is the wolfSSL OpenSSL compatibility layer?
The wolfSSL OpenSSL compatibility layer is a means to switch applications designed for OpenSSL to wolfSSL. In addition to this, it is constantly expanded with more than 500 commonly used OpenSSL functions. wolfSSL also provides Crypto API support to enable easier migration of projects.
wolfSSL now supports OpenVPN through the OpenSSL compatibility layer. This support has resulted in an expansion of wolfSSL’s OpenSSL compatibility layer, adding the following API:
wolfSSL strives to the best-tested SSL/TLS and cryptography implementation available today. We are happy to bring wolfSSL support to OpenVPN and excited to help users and customers get going quickly. The wolfSSL lightweight SSL/TLS library supports TLS 1.3, FIPS 140-2, DO-178, and more! Contact us at facts@wolfssl.com with any questions or feedback.
wolfSSL will be exhibiting at the Embedded World conference again this year in Nuremberg, Germany! With over 1,100 exhibitors, the Embedded World conference focuses on all things related to embedded systems, offering the embedded community the opportunity to obtain information about new products and innovations, enter into an exchange, and to maintain and develop valuable contacts.
wolfSSL will be located in booth 4-421, specifically:
Hall: Hall 4
Booth #: 4-421
When: February 25-27, 2020
Stop by our booth hear more about the wolfSSL embedded SSL/TLS library, the wolfCrypt encryption engine, wolfSSH, wolfBoot, and wolfTPM. Learn about our new progress in the last year with TLS 1.3, FIPS 140-2, DO-178, secure boot and more! This is also a good opportunity to meet the wolfSSL team, ask your questions, and get some free stickers and swag!
For more information about wolfSSL, our products, and future events, please contact facts@wolfssl.com.
wolfSSL will be exhibiting at the RSA Conference again this year in San Francisco, CA! With over 500 sessions scheduled and 650 exhibitors, RSA Conference 2020 brings together the world’s top cybersecurity professionals and business leaders to discuss emerging trends and formulate the best strategies for tackling current and future threats.
wolfSSL will be located in booth 6371, specifically:
Building: North Hall
Booth #: 6371
When: February 24-28, 2020
Stop by our booth hear more about the wolfSSL embedded SSL/TLS library, the wolfCrypt encryption engine, wolfSSH, wolfBoot, and wolfTPM. Learn about our new progress in the last year with TLS 1.3, FIPS 140-2, DO-178, secure boot and more! This is also a good opportunity to meet the wolfSSL team, ask your questions, and get some free stickers and swag!
For more information about wolfSSL, our products, and future events, please contact facts@wolfssl.com.
With wolfSSL’s updated support for OpenSSH v8.1 comes new OpenSSL compatibility layer functionality!
The list of API added to the compatibility layer is:
EVP_CIPHER_CTX_ctrl is expanded to include the following commands:
EVP_CTRL_AEAD_SET_IV_FIXED
EVP_CTRL_GCM_SET_IV_FIXED
EVP_CTRL_GCM_IV_GEN
BN_clear
BN_clear_bit
OpenSSL_version_num
ERR_GET_LIB
SSL_CTX_set1_groups_list
SSL_set1_groups_list
DSA_SIG support was added:
DSA_SIG_new
DSA_SIG_free
DSA_do_sign
DSA_do_verify
ECDSA_size
ECDSA_sign
EC_GROUP_method_of
EC_METHOD_get_field_type
EC_POINT_set_affine_coordinates_GFp
ECPoint_i2d
ECPoint_d2i
EC_POINT_point2oct
EC_POINT_oct2point
EC_POINT_point2bn
Added reference counter to RSA structure
RSA_up_ref
RSAPublicKey_dup
RSA_get_ex_data
RSA_set_ex_data
RSA_get_ex_new_index
Changes made and bug fixed:
EC_POINT_get_affine_coordinates_GFp now checks if internal coordinates are in Jacobian format and converts to affine coordinates when needed
Singleton allocated by BN_value_one is now freed in wolfSSL_Cleanup
Entire EVP_CIPHER_CTX and DH structures are now correctly zeroed at initialization
Improved initialization vector handling in EVP_CipherInit
In addition to the above, there was also some refactorization done on existing OpenSSL compatibility layer code. Functions have been streamlined to allow for easier maintenance and tests added to ensure the correct functionality of the compatibility layer. Contact us at facts@wolfssl.com with any questions about the wolfSSL embedded SSL/TLS library. wolfSSL supports TLS 1.3, FIPS 140-2, DO-178, and more!
Do you need SSH support for an embedded device running VxWorks and you have a FIPS 140-2 requirement? wolfSSL has what you need: wolfSSH, an embedded SSH library running on top of our wolfCrypt FIPS library with support for VxWorks. Email us today at fips@wolfssl.com and we will help you integrate wolfSSH into your VxWorks application and walk you through the FIPS process.
The performance of public key algorithms regularly comes up with customers – they are after all the most costly operations.
wolfSSL has you covered with the Single Precision (SP) big number maths library that brings you the best implementations.
But how does it compare to OpenSSL?
Intel x86 64-bit assembly optimised implementations are as fast or faster than OpenSSL for RSA 2048-bit, EC P-256 and X25519.
One major drawback with OpenSSL is the lack of choice if not using assembly code. The C code is significantly slower, especially the elliptic curve operations which can be 15-40 times slower!
wolfSSL has the option to compile in optimised C code. This code is significantly faster and can be configured to meet your resource profile. Lots of memory, the default build is optimised for maximum speed and handily beats OpenSSL C code. Not so much memory, try the small build, it has similar performance to OpensSSL but half the size!
If you don’t have space for specialised code then good news is coming! Later this year a new implementation of MP, our big number math API, will be released that will be faster than the OpenSSL C code and it’s still smaller.
wolfSSL is looking for a high-energy, motivated individual to drive sales and impact revenue growth in the Midwest region. The primary goal of the Midwest Sales Director is to expand our customer base and grow current customers into larger accounts. This position is remote, preferably close to a major hub such as Chicago, Detroit, Dallas or Austin. You will travel at least once a month to customer meetings, industry meet-ups and relevant conferences (more if you like or if needed for prospective client opportunities).
Responsibilities
Must be a winner with a great attitude
Develop and implement sales strategies
Directly coordinate cross-selling and joint marketing initiatives to maximize exposure and profitability
Qualifications
Self-motivated, driven and persistent work-ethic
Excellent written and verbal communication skills
5+ years’ software sales experience
Ability to exercise decisive, agile thinking in a fast-paced industry