Hi! Have you ever wanted to use wolfSSL in WASM? We’ve been thinking about bringing our project over to WebAssembly, and would welcome feedback. If you’re interested in wolfSSL for WASM, then please contact us, and if you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 […]
Read MoreMore TagAuthor: Kajal Sapkota
wolfSSL Inc. Positioning on OE tested configuration listings
Doing FIPS responsibly since 2014! wolfSSL Inc. Stance: OE Descriptions for software module “tested configurations” should include the toolchain used to compile the code and the OS the toolchain was employed on to allow for cross-compilation scenarios. OLD: <OS> running on <platform> with <processor> NEW: Compiled with <toolchain> on <OS> running on <OS> running on […]
Read MoreMore TagwolfSSL Inc. Positioning on Vendor Affirmation for Software Modules
Doing FIPS responsibly since 2014! wolfSSL Inc has been made aware of concerning practices in the FIPS space by certain software module vendors. The wolfSSL team feels these practices are to the detriment of the FIPS community and trust in the FIPS program. CLAIM 1: One does not need an operating environment (OE) listed on […]
Read MoreMore TagwolfEngine 1.2.0 Released
We’re happy to announce that wolfEngine 1.2.0 has been released! wolfEngine is an OpenSSL engine that helps users migrate to a FIPS-validated cryptography library (wolfCrypt) all while continuing to use OpenSSL. This new version includes some improvements to our RNG and RSA code as well as support for our FIPS 140-3 candidate code on Windows. […]
Read MoreMore TagWhat is FIPS (long version)
Doing FIPS responsibly since 2014! INTRO (wolfSSL FIPS service(s)): (skip to next paragraph for “What is FIPS”) FIPS is rightly viewed as a complex process with a steep entry learning curve. Lucky for customers of wolfSSL Inc. our management and engineering team have taken the time to learn the documentation surrounding the topic and developed […]
Read MoreMore TagWhat is FIPS (short version)
Doing FIPS responsibly since 2014! FIPS is a set of standards, detailed in Special Publications, that need to be met in order to be awarded a FIPS validation/certification published on the NIST website. A FIPS certificate, with the product listed in the certificate, is required to sell product(s) to medical, federal or military agencies and […]
Read MoreMore TagwolfSSL at XSWG (Xilinx Security Working Group) this Week!
wolfSSL is at XSWIG (Xilinx working group) Oct 4th – 5th and demo’ing running on a Versal board. Showing off how fast XilSecure (Xilinxs hardened crypto) is on the new hardware! Come check out the demo and see us at XSWIG. We will also be showing the demo in the DC event too in Nov. […]
Read MoreMore TagwolfSSL 5.5.1 Release
wolfSSL 5.5.1 is released! wolfSSL 5.5.1 contains some fixes, feature additions, and one vulnerability fix. The vulnerability fix in this minor release was thanks to a report from Max at the trail of bits, and the team working on tlspuffin. It involved TLS 1.3 on the server side with –enable-session-tickets turned on. Our recommendation is […]
Read MoreMore TagNext Level Interop Testing in QUIC
As TrueNuff.tv demonstrated in their “Does it blend?” series, by using a blender you will find out what things are really made of. Inspired by this, wolfSSL sponsored a new QUIC related test suite for the ngtcp2 project. What does it do and how does it help you in using wolfSSL? Ngtcp2 is the leading […]
Read MoreMore TagwolfMQTT Release v1.14.1
The fall release of wolfMQTT, v1.14.1, is now available! This is a point release that updates support for the vcpkg integration: Fix cmake builds #307 Fix for Vcpkg on Windows not getting wolfssl/options.h included #305 The Microsoft vcpkg project allows applications to easily build, use, and update C libraries. You can download and install wolfMQTT […]
Read MoreMore Tag
