Hi! Our Java-based SSL provider has been in alpha for two months now, and we’re actively preparing a beta release. Please contact us at info@yassl.com if you have identified bugs, want to request a feature, or think you’ve spotted potential optimizations. Thanks!Team yaSSL
Read MoreMore TagMonth: September 2010
wolfSSL SSL Sniffer Support
Do you have a need to analyze SSL traffic? Beginning with the wolfSSL 1.5.0 release, we have provided a build option allowing the wolfSSL embedded SSL library to be built with SSL Sniffer functionality. This means that you can collect SSL traffic packets and with the correct key file, are able to decrypt them as […]
Read MoreMore TagwolfSSL Build Sizes for the QNX Embedded RTOS
wolfSSL embedded ssl has been available for QNX since the first source release of the product. We have compared wolfSSL’s current build size on QNX against OpenSSL and the results surprised us. A standard wolfSSL build for QNX is 80k. This compares to a standard OpenSSL build size of 2M. The wolfSSL embedded implementation is […]
Read MoreMore TagUsing the wolfSSL Embedded SSL Library for Secure Firmware Updates
wolfSSL is a popular tool for digitally signing applications, libraries or files prior to loading them on embedded devices. As such, it is ideal for signing firmware updates. The reason that embedded RTOS environments do not include digital signature functionality is because it has historically not been a requirement for most embedded applications. However, in […]
Read MoreMore TagUsing AES-NI in the wolfSSL embedded ssl library version 1.6.5
Hi! Most of our readers will already know that AES is a key encryption standard used by governments worldwide, and that wolfSSL has always supported AES. Intel has released a new set of instructions that is a faster way to implement AES, and wolfSSL is currently the first ssl library to fully support the new instruction […]
Read MoreMore TagCyaSSL 1.6.5 is now available
Release 1.6.5 for CyaSSL adds bug fixes and x509 v3 self signed certificate generation. For general build instructions see doc/Building_CyaSSL.pdf. For details on how to use certificate generation, refer to section 11 in the wolfSSL manual. To enable certificate generation support, add this option to ./configure ./configure –enable-certgen An example is included in ctaocrypt/test/test.c and documentation […]
Read MoreMore TagTimothy Stapko – Top Ten Considerations for embedded Wi-Fi device security
Here’s a nice article for embedded designers faced with securing an 802.11 device: https://www.embedded.com/design/prototyping-and-development/4206409/10-things-to-consider-when-securing-an-embedded-802-11-Wi-Fi-device. Stapko’s item 8 on the list caught our attention. He correctly states that “Wi-Fi security protocols are big and slow.” However, the article is an overview, and is not intended to discuss which ones are bigger and slower, and which ones are […]
Read MoreMore TagMore good commentary on exposed devices
John Sawyer of Dark Reading has put out another great blog post on using SHODAN to find exposed network devices like “printers, routers, fiber channel switches and industrial control systems” on a corporate network, and provides some useful advice for discovering those devices. See: https://www.darkreading.com/risk/finding-exposed-devices-on-your-network/d/d-id/1134269? for the full post.
Read MoreMore TagReasoning Behind the Wolf in Our Logo
Have you ever wondered if there is a reason for the wolf in our logo? Why does a security company that focuses on embedded SSL products choose a wolf over any number of possible logo designs? We chose a wolf to be part of our logo for several reasons: • Wolves like to live in […]
Read MoreMore Tag
