For a while now, wolfSSL has supported post-quantum algorithms in the TLS 1.3 protocol. Now, we also support it in the SSH v2.0 protocol as well!
Our wolfSSH library has long had support for SSH v2.0 both as a client and server. Recently, we integrated the SABER NIST Level 1 KEM into wolfSSH allowing you to start experimenting with a post-quantum algorithm with wolfSSH. For instruction on how to try it out on Linux, please see the Post-Quantum section of wolfSSH’s README.md file which can be found at https://github.com/wolfSSL/wolfssh#post-quantum . This is done via an integration with the OpenQuantumSafe project’s liboqs.
Want other post-quantum algorithms? Want other security levels? Want to us hybridize with other algorithms? Then please get in contact with your local wolfSSL business director or reach out to firstname.lastname@example.org.
Join us Thursday, May 26th at 9AM Pacific Time.
wolfSSL Engineer, Eric, talks about the top reasons why people migrate from Mocana to wolfSSL as well as how to get started.
As always bring your questions for the live Q&A at the end of the presentation!
We have added support for RISC-V hardware in our wolfBoot library. The reference example uses the SiFive HiFive1 FE310 board to demonstrate a secure bootloader and firmware upgrade.
The HiFive1 is a 32-bit E31 RISC-V core capable of running at 320MHz. It includes 4MB of external flash and 16KB of internal RAM.
The wolfBoot library provides:
- Boot validation of the firmware image using hash and signature
- Reliable firmware update (power fail safe).
- Rollback support if application does not report “success”
- Version checking to prevent downgrade attack
- Support for external flash on updates
This adds support for:
- RV32 Hardware Access Layer (HAL) support for:
- PLL Clock configuration
- Flash eSPI
- Firmware update example using the serial interface
Full setup and installation instructions can be found in “docs/Targets.md”.
These new features can be found on GitHub here:
For questions please email us at email@example.com.
wolfSSH release version 1.4.10 is available! It includes many useful code additions including some fixes. To name a few the ESP–IDF use has been expanded on, small stack improvements made, some SFTP use fixes, fixes for warnings with older GCC compilers and more….
For information about wolfSSH contact firstname.lastname@example.org.
Welcome to European Webinar Week! Thank you to all our viewers who attended our first session today about DO-178 – check out the rest of this week’s schedule to learn more and register in advance!
- 5PM Central European Time, Tuesday, May 17th : Testing wolfBoot with Renode (register here)
- 2PM Central European Time, Wednesday, May 18th: Looking Under the Hood – Everything you need to know about Automotive security (register here)
- 2PM Central European Time, Friday, May 20th: How to Get Started with wolfSSL in Italian (register here)
We can’t wait to see you and answer all of your questions!
wolfSSL has released version 5.3.0 of the Python wrappers for wolfCrypt and wolfSSL called wolfCrypt-py and wolfSSL-py.
This is a significant release because the build system has been completely refactored to make it easier to build and install the Python wrappers.
In addition, wolfCrypt-py now works in Windows and has several new APIs to support some of the newer features of wolfCrypt.
For more information the release notes for wolfCrypt-py can be found here, and wolfSSL-py can be found here. In addition the releases can be found on PyPi to be installed using `pip` here for wolfCrypt-py and here for wolfSSL-py. Contact email@example.com for more information about using the wolfSSL embedded SSL/TLS library in your Python applications!
It’s a BUSY week! Check out all the trade shows we are attending below:
Cyber Physical Systems Security Summit in Troy, Michigan
IoT Solutions World Congress in Barcelona, Spain
Forum 78 in Fort Worth, Texas
CyberLEO in Los Angeles, California
Join Daniel Stenberg, founder and maintainer of cURL and libcurl, as he goes through some basic curl fundamentals about what cURL is, who uses cURL, why use cURL etc. As well as giving information on how to customize your configuration, and other features that may be useful.
As always bring your questions for the Q&A following the presentation.
When: 9AM Pacific, May 12th, 2022
Register in advance here.
We are excited to announce our wolfTPM v2.4 release. This includes improvements for Windows including support for cmake, C# wrappers, and c++ compiler fixes. This expands the wolfTPM cross platform API that is easy to use and supports Linux, Windows and embedded platforms. C# wrappers have been tested on Linux and Windows. These changes enable support for vcpkg for wolfSSL, wolfTPM, and wolfMQTT (see PR).
- Fixes for c++ compiler (PR #206)
- Adding a C# wrappers (PR #203)
- CMake support (PR #202, #204, #205)
- Add support for ST33 vendor specific command TPM_CC_GetRandom2 (PR #200)
- Fix writing PEM in wolfTPM2_RsaKey_TpmToPemPub (PR #201)
- Improve TPM2_SetupPCRSel (multiple calls) (PR #198)
- Fix for a few spelling errors and whitespace cleanup (PR #199)
- v2.3.1 updates (PR #197)
- Fix make install by renaming pcr example read.c (PR #196)
For a full list of changes, check out the updated ChangeLog.md bundled with wolfSSL or view our page on GitHub here. For questions please email firstname.lastname@example.org
wolfBoot 1.11 has been released. This release introduces new algorithms for signature verification (Ed448, Ecc384), for integrity check (Sha2-384) and for external storage encryption (Aes128 and 256). Encryption support for external storage has been improved.
Our team introduced mitigation against glitching attacks. Find out more in this post.
Support for new targets has been included: NXP i.MX-RT1050 and STM32U5.
For the full list of changes, please see our Github page.
You can download the latest release here: https://www.wolfssl.com/download/
Or clone directly from our GitHub repository: https://github.com/wolfSSL/wolfBoot
Contact us at email@example.com with any questions!