The wolfSSL OpenSSL compatibility layer is a means to switch applications designed for OpenSSL over to use wolfSSL. In addition to this, it is constantly expanded and currently has more than 500 commonly used OpenSSL functions. wolfSSL also provides Crypto API support to enable easier migration of projects. We recently added some more in our […]
Read MoreMore TagMonth: February 2021
wolfSSL 4.7.0 Supports user_settings.h for CMake Builds
wolfSSL is happy to announce support for user_settings.h in CMake builds in wolfSSL 4.7.0. To enable this feature, add -DWOLFSSL_USER_SETTINGS=yes to your cmake command and proceed to use user_settings.h as you normally would. For more about user_settings.h, continue reading below. When building for embedded devices the best way to configure the wolfSSL library is to […]
Read MoreMore TagstrongSwan + wolfSSL + FIPS!
As some may be aware, wolfSSL added support for strongSwan in April of 2019. The upstream commit can be reviewed here: https://github.com/strongswan/strongswan/pull/133 Users can test the latest development master of wolfSSL with the latest version of strongSwan using the following setup: wolfSSL Build and Installation Steps $ git clone https://github.com/wolfSSL/wolfssl.git $ cd wolfssl $ ./autogen.sh […]
Read MoreMore TagWho’s testing that cryptography on your platform? With your hardware encryption? With your secure element?
Three of our biggest engineering investments at wolfSSL are testing, testing, and testing. We invest heavily in testing, so that you don’t have to. We develop and test with 30+ operating systems, 10+ compilers, 50+ chipsets, 20+ hardware encryption IP schemes, and 15+ secure enclaves. We add more of the above to our Jenkins based […]
Read MoreMore TagwolfSSL Supports Stunnel 5.57
wolfSSL is happy to announce support for the latest stable version of stunnel, version 5.57. Per the stunnel website, “Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs’ code.” wolfSSL also supports version 5.40 of stunnel. If you’re in need of a fast, […]
Read MoreMore TagwolfMQTT Release v1.8.0
The winter release of wolfMQTT, v1.8.0, is now available! This release has several bug fixes and optimizations including: Fixes for non-blocking in WIN32 and large payload (PR #202) Make TLS IO callback functions public (PR #201) Bug fixes (PR #186, 188, 189, 193, 196, 199, 200) Update default test broker (PR #194) MQTT-SN fixes for […]
Read MoreMore TagWondering how well the Apple M1 will run cryptography? Us too!
Hi! We’ve been wondering how well the M1 will perform in our standard cryptographic benchmarks, just like you! We’ll also be bring FIPS 140-2 to the M1. Watch this space, as we’ll be releasing them in the next few weeks. If you have any questions or run into any issues, contact us at facts@wolfssl.com, or […]
Read MoreMore TagwolfSSL ARMv8 Support
Did you know that the wolfSSL embedded SSL/TLS library supports ARMv8 as well as the Cryptography Extensions that it provides? wolfSSL is more than 10 times faster with AES and SHA256 operations the ARMv8 board we have been testing on (HiKey LeMaker) when using hardware acceleration versus software crypto! ARMv8 Benchmark Data comparing Software and […]
Read MoreMore TagwolfSSL Version 4.7.0 Is Available!
Version 4.7.0 of wolfSSL has general fixes and optimizations, a few excellent feature additions, and some vulnerability fixes. Some of the new features added are support for S/MIME bundles which are commonly used with email traffic, an –enable-reproducable-build flag to help out with inspecting the wolfSSL library created, expansion to the OpenSSL compatibility layer, and […]
Read MoreMore TagFIPS certificate #2425 is being added to NIST sunset list: wolfSSL customers can achieve effortless transition to FIPS cert #3389
FIPS 140-2 requires the use of validated cryptography in the security systems implemented by federal agencies to protect sensitive information. The wolfCrypt Module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency. The National Institute of Standards and Technology (NIST) is sending FIPS […]
Read MoreMore Tag
