1. wolfTPM can run on resource constrained MCU, Embedded Systems and devices (IoT, Edge)
2. wolfTPM can be used in Trusted Execution Environments(TEE) and ARM TrustZone
3. wolfTPM does not have external dependencies
4. wolfTPM is the only open-source TPM2.0 stack that can be used in bare metal firmware
4.1 For industrial products using superloop architecture
4.2 For medical devices using state machines
4.3 For safety critical systems that use time scheduler
4.4 In any Real-Time-Operating-System
5. wolfTPM offers high-level wrapper functions to remove the knowledge barrier for newcomers to TPMs
6. wolfTPM maintains backward API compatibility
7. wolfTPM offers wrappers of TPM functions to accelerate development for professionals who want to add more security to their Secure Boot process, such as attestation and TPM seal/unseal
8. wolfTPM cuts R&D cost and time for development thanks to small code base and rich set of examples
9. wolfTPM offers many ready to use examples, like Certificate Signing Request example, Time attestation, and PCR attestation examples
10. wolfTPM is open-source and project development happens completely on GitHub
Extra. wolfTPM is the TPM stack chosen for the tutorial series on Attestation for newcomers at TPM.dev – https://developers.tpm.dev/posts/attestation-part-1
We are so excited for our upcoming webinar with wolfSSL Engineer David Garske! Tune in tomorrow to watch David demonstrate our asynchronous cryptography support for Intel QuickAssist and Marvell/Cavium Nitrox V and other benchmarks!
Topic: Webinar: Asynchronous Crypto
When: Nov 18, 2020 10:00 AM Pacific Time (US and Canada)
Register in advance for this webinar:
After registering, you will receive a confirmation email containing information about joining the webinar.
Can’t wait to see you there!
Please contact us at email@example.com with any questions about the webinar. For technical support, please contact firstname.lastname@example.org or view our FAQ page. As always, there will be a Q&A session following the live presentation.
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL.
Our very own Daniel Stenberg will be speaking about HTTP/3 at GoTopia today and tomorrow! Daniel Stenberg is the cURL founder and maintainer and also a wolfSSL engineer! Check out how to register for this awesome talk here: https://gotopia.eu/november-2020/sessions/1626/http-3-is-next-generation-http-is-it-quic-enough
HTTP/3 is the designated name for the coming next version of the protocol that is currently under development within the QUIC working group in the IETF.
HTTP/3 is designed to improve in areas where HTTP/2 still has some shortcomings, primarily by changing the transport layer. HTTP/3 is the first major protocol to step away from TCP and instead it uses QUIC.
Daniel Stenberg will present on HTTP/3 and QUIC, specifically why the new protocols are deemed necessary, how they work, how they change how things are sent over the network and what some of the coming deployment challenges will be.
What will the audience learn from this talk? They will learn some of the fundamental features of and differences between HTTP/3 and previous HTTP versions and why those changes are coming.
About Daniel Stenberg
Daniel Stenberg is the founder and lead developer of the curl project and recipient of the Polhem Prize 2017. He has worked on HTTP implementations for over twenty years. He has been involved in the HTTPbis working group in IETF for ten years and he worked on the HTTP stack in Firefox for several years at Mozilla. He participates in the QUIC working group and is the author of the widely read documents “HTTP2 explained” and “HTTP/3 explained”.
For more events wolfSSL is participating in, check out our Events page!
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL. To learn more about wolfSSL support for cURL click here or check out Daniel Stenberg’s personal blog on cURL!
wolfCrypt has been listed on the CMVP IUT List for FIPS 140-3! We are currently working with our testing lab to get validated as quickly as possible with the new FIPS standard from the NIST.
Among the changes for FIPS 140-3 are conditional algorithm self-tests, where the algorithm self-tests are only performed if used. The pre-operational self-test is now faster, as all the algorithms are not tested until needed. This helps with startup times as the public key self-testing can be time consuming. The self tests can be run at appropriate times for your application startup. Also, there is additional testing of the DRBG entropy sources.
wolfSSL is the first software library on the FIPS 140-3 IUT list for embedded development. We are leaving our competition in the dust.
For more information on licensing and pricing, please contact email@example.com.