New Feature: Copy and Free Callbacks for Hardware Acceleration

wolfSSL 5.8.4 (PR#9309) has expanded the crypto callback api to include support for copy and free operations. This addition addresses a lifecycle management challenge for developers integrating hardware security modules (HSM) or hardware accelerators. Download wolfSSL → The Capability Previously, wolfSSL’s default behavior for duplicating a hash context was a standard memory copy. While efficient […]

Read MoreMore Tag

Expanded Rust API for wolfSSL

Rust is a modern programming language known for its focus on memory safety and performance, making it a powerful choice for systems programming, including security-sensitive applications. To bridge the gap between Rust’s strong guarantees and the mature, high-performance cryptography provided by the wolfSSL library, we have developed and are continuing to improve a comprehensive set […]

Read MoreMore Tag

ML-KEM and ML-DSA Improvements in wolfSSL 5.8.4

Version 5.8.4 improves wolfSSL’s implementation of ML-KEM (formerly Kyber) and ML-DSA (formerly Dilithium) post-quantum algorithms. Download wolfSSL → Bug Fixes The ML-KEM derive secret operation was corrected to properly compute shared secrets; there was a miscalculation of an offset in a buffer. An out-of-bounds read was fixed in the ML-KEM/Kyber 5-bit value decomposition code, where […]

Read MoreMore Tag

Getting Started with wolfMQTT

Build secure, scalable IoT messaging with confidence using wolfMQTT. Join us for a live webinar on February 4 at 9 AM PT, where we’ll walk through the fundamentals of MQTT and show how to get started with wolfMQTT in real-world embedded and IoT applications. This session highlights practical implementation details, security tradeoffs, and architectural decisions […]

Read MoreMore Tag

Posts navigation

1 2