Hi! We`re considering the elimination of SSL 3.0 support from wolfSSL. There`s a lot of reasons to do it, including better security, cleaning up our code, and its time to move on and modernize. Anybody have an opinion? The code would still be available, but not mainline.
Read MoreMore TagAuthor: wolfSSL
Using Truncated HMAC with wolfSSL
Are you fan of TLS Extensions? We are here today to present the addition of Truncated HMAC on wolfSSL! Currently defined TLS cipher suites use the HMAC to authenticate record-layer communications. In TLS, the entire output of the hash function is used as the MAC tag. However, it may be desirable in constrained environments to […]
Read MoreMore TagSSL Termination and SSL Inspection with wolfSSL SNI
If you`re working with SSL Termination and/or SSL Inspection we have good news for you! wolfSSL now has a new feature in its Server Name Indication API: wolfSSL_SNI_GetFromBuffer() This function is capable of retrieving the server name of a given type indicated by the client from the raw bytes of a ClientHello message. This way, […]
Read MoreMore TagAvoiding Fear Mongering as a Security Software Vendor and a Security Software Buyer
All too often, security software vendors resort to fear-mongering as a sales and marketing method. At wolfSSL, we consciously avoid this tactic. We recognize that our competitors use it. They tell customers to be afraid of open source. They tell customers to be afraid of breaches. Unfortunately, they use the fear mongering approach to their […]
Read MoreMore TagMinimizing Resource Consumption on Devices with Embedded SSL using the Swapper
Hi! IoT engineers everywhere are battling with software resource usage. TCP/IP and SSL can be fairly consumptive of resources. One of the old school techniques for minimizing resource consumption is swapping one app for another on a device. Taking that concept to an extreme can be tricky, and the extreme we`ve been working with is […]
Read MoreMore TagUpdated wolfSSL Porting Guide Available
As a large number of our users port wolfSSL to new platforms and environments, we’ve put some time into updating our wolfSSL Porting Guide and have made it available both online and in PDF version. The updated guide covers areas in the wolfSSL code which typically need modification when porting wolfSSL to a new environment, […]
Read MoreMore TagwolfSSL Embedded SSL Integrated with Keil MDK5
If you are a Keil MDK-ARM user, we’re happy to announce that the wolfSSL embedded SSL library is now integrated into the Keil MDK5 as an easy-to-use software pack. This integration means that MDK5 users can easily pull in SSL/TLS support directly to their Keil projects without going out to the web to do a […]
Read MoreMore TagwolfSSL JNI 1.0 Now Available
wolfSSL is happy to announce that the first release of the wolfSSL JNI wrapper is now available for download. wolfSSL JNI provides Java applications with SSL/TLS support up to the current industry standards of TLS 1.2 and DTLS 1.2. Current Java implementations have lacked DTLS support, causing Java developers to write their own custom JNI […]
Read MoreMore TagConsidering OAuth for Devices
Hi! We are currently considering implementing Oauth for devices. OAuth, first defined by RFC 5849 (1.0), and revised with RFC 6749 (2.0) specifies an authorization framework to allow third party applications to obtain limited access to HTTP services. From RFC 6749: “In the traditional client-server authentication model, the client requests an access-restricted resource (protected […]
Read MoreMore TagAbout Open Source
Hi! This is just a reminder. We are still all about open source. We believe that Open Source Software is the best way to conceive, share, deliver, support and build software. We believe in open source for all of the right and well documented reasons. If you can`t work with open source then tell us […]
Read MoreMore Tag
