Upcoming Webinar: cURL: How to Make Your First Code Contribution

We are thrilled to announce our upcoming webinar on cURL: How to Make Your First Code Contribution with cURL founder and maintainer, Daniel Stenberg! Get your questions about cURL answered at this brand new webinar!

cURL is a wildly popular and well-used open source tool and library, and is the result of more than 2,200 named contributors out of which almost 800 wrote at least one commit.

In this presentation, cURL’s lead developer Daniel Stenberg talks about how any developer can proceed in order to get their first code contribution submitted and ultimately land in the curl git repository including how to approach code and commits, style, editing, pull-requests, and using GitHub etc. After you’ve seen this, you’ll know how to easily submit your improvement! To learn more about cURL, join us for this webinar!

When: Aug 13, 2020 10:00 AM Pacific Time (US and Canada)
Topic: Webinar: cURL: How to Make Your First Code Contribution

Register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_poAshmaRT0S02J7hNduE7g

After registering, you will receive a confirmation email containing information about joining the webinar.

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com or view our FAQ page. As always, there will be a Q&A session following the live presentation.

Additional Resources
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL. To learn more about wolfSSL support for cURL click here or check out Daniel Stenberg’s personal blog on cURL!

wolfSSL at Black Hat USA 2020 – Virtual Event!

wolfSSL is excited to participate as a sponsor for the first ever virtual Black Hat USA!!! Come visit wolfSSL at Black Hat USA August 1-6 in Pacific Daylight Time (UTC?07:00).

Register with the link to get your FREE Business Hall Pass:
https://www.blackhat.com/us-20/registration.html

Come and talk to one of our experts on TLS 1.3, embedded security, embedded SSL/TLS, Secure Boot, MQTT, SSH, TPM 2.0, curl + tiny-curl, FIPS, DO-178, MISRA and more. We’ve got the best-tested crypto on the market and the best security without sacrificing performance. Ask to see our benchmarks!

Stop by to hear more about the wolfSSL embedded SSL/TLS library, the wolfCrypt encryption engine, meet the wolfSSL team, and have all your crypto questions answered. We can’t wait to “see” you!

For more information about wolfSSL, our products, or future events, please contact facts@wolfssl.com.

More information about Black Hat USA 2020 can be found here: https://www.blackhat.com/us-20/

Azure Sphere partners with wolfSSL to provide premier client TLS support

Now, with the Azure Sphere OS 20.07 release, Microsoft has licensed and exposed a subset of wolfSSL, the first commercial implementation of TLS 1.3, for use on Azure Sphere devices. This strategic pairing allows software developers to create client TLS connections directly using the Azure Sphere SDK. Software developers no longer need to package their own TLS library for this purpose. Utilizing the best-tested, high-performance wolfSSL TLS support in Azure Sphere can save device memory space and programming effort, freeing developers to build new, cutting-edge IoT solutions.

Microsoft Azure Sphere and wolfSSL have been long-time partners, striving for the very best in security. The Azure Sphere OS has long used wolfSSL for TLS connections to Microsoft Azure services. Azure Sphere also uses wolfSSL’s versatile technology to enable secure interactions from developer apps to customer-owned services.

Partnerships with embedded security leaders like wolfSSL play an important role in Azure Sphere’s mission to empower every organization to connect, create, and deploy highly secured IoT devices. The unique Azure Sphere approach to security is based on years of vulnerability research, the findings of which Microsoft published in the seminal paper “Seven Properties of Highly Secure Devices.” These seven properties are the minimum requirement for any connected device to be considered highly secured. Azure Sphere implements all seven properties, providing a robust foundation for IoT devices. This level of consideration is not lost on an engineering team like wolfSSL’s, known for producing the best-tested crypto on the market and consistently supporting the latest developments in TLS protocol, like TLS 1.3.

Azure Sphere can be used with any customer cloud service, not just Microsoft’s own Azure. By providing a highly secured ecosystem, Microsoft and wolfSSL make security features more accessible and easier to use and can extend unmatched security to new frontiers in IoT where security has historically been sparse.

For information on how to use these wolfSSL APIs on Azure Sphere, please reference the Azure Sphere documentation on wolfSSL. We will be publishing a sample to go along with this, available at a later date. Check back here—we will update this post with the link to the sample once it is available.

If you have any questions, contact Microsoft at AzCommunity@microsoft.com or wolfSSL at facts@wolfSSL.com.

Upcoming Webinar: Testing and Security Vulnerability

We are excited to announce our upcoming webinar on Testing and Security Vulnerability with wolfSSL engineer, Kaleb Himes! We’ll explore vulnerabilities, why testing is a mission, the testing lifecycle and why wolfSSL is the best! This webinar may be a useful resource for learning more about how wolfSSL is tested and how security vulnerabilities are determined and addressed in record time.

When: Aug 6, 2020 09:00 AM Pacific Time (US and Canada)
Topic: Webinar: Testing and Security Vulnerability

Register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_1dGaIH8TSqC-3ioO59SyCA

After registering, you will receive a confirmation email containing information about joining the webinar.
We look forward to seeing you there!

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com or view our FAQ page. As always, there will be a Q&A session following the live presentation.

Additional Resources
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL.

For security and vulnerability information and details, please visit our known vulnerabilities page. This page also includes details on well known CVE’s and how or if they affect wolfSSL products.

Renesas RX72N Envision Kit Supported!

We are exited to announce wolfSSL‘s support for the Renesas RX72N Envision Kit with TSIP v1.09. The RX72N MCU is the flagship model of RX series, using a 32-bit RX72N 240 MHz microcontroller. The board just entered the market this spring and wolfSSL can now support secure connections on it via TLS!

If you have an interest in using wolfSSL with this MCU or the RX72N Envision Kit, we encourage you to give it a try with one of our sample applications.

wolfSSL provides TLS source code, sample programs, and project files that make your evaluation quick and easy. Our wolfCrypt benchmark sample application shows the performance of cryptography operations accelerated by the H/W accelerator (TSIP) and allows for an easy comparison to software cryptography performance.

Sample Applications Provided

  1. Cryptography test
  2. Cryptography benchmark
  3. TLS Client
  4. TLS Sever
  5. Linux server application which can communicate with #3

Board and Environment Support

Board: Renesas RX72N Envision Kit (R5F572NNHxFB)
IDE: Renesas e2Studio v7.8.0
Compiler: CCRX Tool Chain V.3.02.00
TSIP: V.1.09

Benchmarks

Here are the benchmark results gathered during testing, comparing algorithm performance with and without TSIP.

AlgorithmPerformance (TSIP accelerated)Performance (Software-only, no TSIP)Acceleration Ratio
Random Number Generation3.826MB/s831KB/sx4.6
AES-128-CBC-Enc4.88MB/s1.62MB/sx3.0
AES-128-CBC-Dec4.67MB/s1.53MB/sx3.0
AES-256-CBC-Enc4.71MB/s1.38MB/sx3.4
AES-256-CBC-Dec4.49MB/s1.31MB/sx3.7
AES-128-GCM-Enc4.35MB/s749KB/sx5.8
AES-128-GCM-Dec4.29MB/s748KB/sx5.7
AES-256-GCM-Enc4.25MB/s692KB/sx6.1
AES-256-GCM-Dec4.21MB/s692KB/sx6.1
SHA30.08MB/s5.52MB/sx5.4
SHA25634.54MB/s1.82MB/s x18.9
HMAC-SHA29.44MB/s5.48MB/sx5.4
HMAC-SHA256 33.74MB/s1.81MB/sx18.6

Resources

wolfSSL package including this RX72N Envision Kit support, is available from the wolfssl repository on GitHub:

https://github.com/wolfSSL/wolfssl/archive/master.zip

Unzip the package then refer to “wolfssl-master/IDE/Renesas/e2studio/RX72NEnvisionKit/README” for more details.

The README describes how to build and execute the sample programs.

Support

For more information, please contact facts@wolfssl.com.

wolfSSL and MIKEY-SAKKE

wolfSSL is implementing MIKEY-SAKKE!

MIKEY-SAKKE is a standard created by the UK government’s National Cyber Security Center (NCSC). MIKEY-SAKKE is a standard designed to enable secure, cross-platform multimedia communications. It is highly scalable, requiring no prior setup between users or distribution of user certificates. It is designed to be centrally-managed, giving a domain manager full control of the security of the system. But even so, it maintains high-availability, as calling does not require interaction with centralized architecture.

wolfSSL is a lightweight TLS/SSL library that is targeted for embedded devices and systems. It has support for the TLS 1.3 protocol, which is a secure protocol for transporting data between devices and across the Internet. In addition, wolfSSL uses the wolfCrypt encryption library to handle its data encryption.

Secure communications are needed across all governments. As a result governments create policies encouraging the development of security solutions. MIKEY-SAKKE is the answer to the security requirements from the UK government to specify secure, open and patent free cryptographic methods in order to empower private industry to provide UK government interoperable secure communication solutions. As a result many private and commercial organizations perceive a sizable advantage being MIKEY-SAKKE compliant.

If there are any specific questions about how wolfSSL integrates, please contact our team at facts@wolfssl.com. If there is a desire for wolfSSL to include other cybersecurity standards, please let the wolfSSL team know!

Upcoming Webinar: Benchmarking with wolfSSL

We are excited to announce our upcoming webinar on benchmarking with wolfSSL! Get your questions on benchmarking answered by wolfSSL engineer, Jacob Barthelmeh, during our webinar on July 29th, 2020 at 12PM PT!

Many users are curious about how the wolfSSL embedded SSL/TLS library will perform on a specific hardware device or in a specific environment. Because of the wide variety of different platforms and compilers used today in embedded, enterprise, and cloud-based environments, it is hard to give generic performance calculations.

In IoT devices doing real time interactions and many enterprise applications the underlying cryptography is a very performance-critical aspect. To help wolfSSL users and customers in determining performance for TLS connections with wolfSSL and low level crypto operations with wolfCrypt, a benchmark application is bundled with wolfSSL.

To learn more about benchmarking with wolfSSL join us for this webinar!

When: July 29th, 2020 12:00 PM Pacific Time (US and Canada)
Topic: Benchmarking with wolfSSL

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_15tIndjMRiyTGTjyYsHLWw

After registering, you will receive a confirmation email containing information about joining the webinar.

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com

In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on GitHub, and learn more about benchmarking with wolfSSL through our Documents on our website!

Upcoming Webinar: wolfSSL: Tavola Rotonda in Italiano

Ciao amici italiani!

wolfSSL is hosting a special webinar exclusively for our Italian audience! Join us for our upcoming webinar on July 23rd, 2020 with wolfSSL Engineer, Daniele Lacamera. For the presentation, we will be giving a company overview on the basics of wolfSSL. Additionally, we will review best practices for compile options, build process, examples and testing to ensure your wolfSSL implementation achieves the best possible results for your project. Don’t miss out on the chance to ask questions in your native tongue for the Q&A session to follow.

When: July 23rd, 2020 3:00 PM CET
Topic: wolfSSL: Tavola Rotonda in Italiano

If you are new to wolfSSL, here are some of our key differentiators:

  • wolfSSL is up to 20x smaller than OpenSSL
  • First commercial implementation of TLS 1.3
  • Best tested, most secure, fastest crypto on the market with incomparable certifications and highly customizable modularity
  • Access to 24×7 support from a real team of Engineers
  • Support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3, DTLS 1.0, and DTLS 1.2, + DTLS 1.3 forthcoming)
  • Multi-platform, royalty free, with an OpenSSL compatibility API to ease porting into existing applications which have previously used the OpenSSL package
  • The CMVP has issued FIPS 140-2 Certificates #3389 and #2425 for the wolfCrypt Module developed by wolfSSL Inc. For more information, see our FIPS FAQ

For additional support, please contact support@wolfssl.com or check out our user manual.

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_wi6hDTUbQESg3kDbUA-6JQ

After registering, you will receive a confirmation email containing information about joining the webinar.

A presto!

Please contact us at facts@wolfssl.com with any questions about the webinar.

In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL.

wolfSSL and Safety Critical RTOS

Are you a user of Deos? If so, you will be happy to know that wolfSSL supports the Deos Safety Critical RTOS for FAA Certifiable Avionics Applications and has added TLS client/server examples to the wolfSSL embedded SSL/TLS library for Deos!

Deos is an embedded RTOS used for safety-critical avionics applications on commercial and military aircraft. Certified to DO-178C DAL A, the time and space partitioned RTOS features deterministic real-time response and employs patented “slack scheduling” to deliver higher CPU utilization. DO-178C DAL A refers to a specification that is required for software to be used in aerospace software systems.

The Deos port in wolfSSL is activated by using the “WOLFSSL_DEOS” macro. For instructions on how to build and run the examples on your projects, please see the “/IDE/ECLIPSE/DEOS/README” file.

wolfSSL provides support for the latest and greatest version of the TLS protocol, TLS 1.3! Using the wolfSSL port with your device running Deos will allow your device to connect to the Internet in one of the most secure ways possible.

For more information, please contact facts@wolfssl.com.

Resources:

Upcoming Webinar: What you need to know about TLS 1.3

Did you miss our previous webinars on TLS 1.3 or just want to learn more? Check out our upcoming webinar on July 16th, 2020 with wolfSSL engineer Sean Parkinson on what you need to know about TLS 1.3. There will be a Q&A session that follows so please tune in!

The wolfSSL lightweight SSL/TLS library supports TLS 1.3 (RFC 8446, previously Draft 28) on both the client and server side! A few of the advantages the newest version of TLS 1.3 include:

  • Faster handshake times as there is only one RTT instead of two which enables clients to send data immediately after the first reply from the server
  • Full session encryption achieved through the use of a variety of encryption algorithms to secure data
  • Brand new cipher suites considered to be stronger than before

To learn more about the advantages of TLS 1.3 tune in to our webinar!

Registration

When: July 16th, 2020 2 PM Pacific Time (US and Canada)
Topic: TLS 1.3

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_V535mNL2TB2klFWrttppAw
After registering, you will receive a confirmation email containing information about joining the webinar.

Looking forward to seeing you there! Not able to attend? No problem, all our webinars are recorded and uploaded to our Youtube Channel! Please contact us at facts@wolfssl.com with any questions about the webinar.

Learn More About TLS 1.3
Learn more about TLS 1.3 from the RFC. The most recent version can be found here:
https://tools.ietf.org/html/rfc8446

Or, browse some of our recent blog posts on TLS 1.3:

Support
Please direct any questions about using wolfSSL with TLS 1.3, or about our current TLS 1.3 support to support@wolfssl.com. We also appreciate any comments or feedback. Thanks!

Posts navigation

1 2