wolfSSL 3.6.6 is Now Available

Version 3.6.6 of the wolfSSL embedded SSL/TLS library has been released and is now available for download. Release 3.6.6 of wolfSSL has bug fixes and new features including: – OpenSSH, stunnel, and lighttpd Compatibility OpenSSH compatibility with “–enable-openssh” stunnel compatibility with “–enable-stunnel” lighttpd web server compatibility with “–enable-lighttpd” – SSL 3.0 is now disabled by […]

Read MoreMore Tag

wolfCrypt Receives FIPS 140-2 Certificate #2425

The Cryptographic Module Validation Program (CMVP) has issued FIPS 140-2 Certificate #2425 (most up-to-date certificate: #3389) for the wolfCrypt Module developed by wolfSSL Inc. The CMVP was established by the National Institute of Standards and Technology (NIST) to validate FIPS 140-2 cryptographic modules and oversee the independent laboratories performing the cryptographic module testing. FIPS 140-2 […]

Read MoreMore Tag

Using a Custom Logging Function with wolfSSL

If you are working on integrating wolfSSL into an application that already has existing logging functionality, but still want access wolfSSL`s built-in debug messaging, you can register a custom logging callback with wolfSSL to output wolfSSL`s detailed debug messaging. To enable this functionality, add the configure option “–enable-debug” to wolfSSL. Then, in your application simply: […]

Read MoreMore Tag

Fixed Point ECC with wolfSSL Embedded SSL/TLS

On applications using ECC with wolfSSL where total memory footprint is a secondary factor to performance, consider enabling fixed point ECC with wolfSSL. This configure option generates a large lookup table for use with ECC that can increase performance time by as much as 5 times. This comes at the cost of runtime memory, but […]

Read MoreMore Tag

wolfSSL Not Vulnerable to Pandora’s Box Attack

Researchers Clemens Hlauschek, Markus Gruber, Florian Fankhauser, and Christian Schanes of Germany`s Research Industrial Systems Engineering are presenting a TLS Man in the Middle attack at this week’s USENIX conference in Washington D.C: https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf .  This is a protocol level attack that has a few requirements; a static (EC)DH cipher suite, client authentication with a […]

Read MoreMore Tag

wolfCrypt now Supports Secure Remote Password

We are pleased to announce that wolfCrypt now has support for SRP6a (Secure Remote Password Protocol version 6a). SRP is a password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network designed by Thomas Wu at the Computer Science Department of Stanford University. The SRP implementation can be enabled […]

Read MoreMore Tag