Business and Company Progress • We doubled our customer base again this year and dramatically increased revenues, confirming the usefulness of our technology, our open source strategy, and our relevance in the emerging device security and BYOD markets. • We have further penetrated key vertical markets, including home appliances, smart metering, sensors, M2M, gaming, VoIP, […]
Read MoreMore TagAuthor: wolfSSL
wolfSSL support for Green Hills INTEGRITY RTOS
Are you interested in using the wolfSSL lightweight SSL library on the Green Hills INTEGRITY RTOS? Although wolfSSL doesn’t currently have INTEGRITY support, we would like to gauge user and community interest to help us plan our schedule for the upcoming year. If you would like to see INTEGRITY support added to wolfSSL, please let […]
Read MoreMore TagwolfSSL Lightweight SSL in 20 kB with Lean PSK
Are you interested in using the wolfSSL embedded SSL library in an extremely resource constrained environment? If so, you may be interested to hear that we have recently implemented a wolfSSL “Lean PSK” build which enables the wolfSSL library to be built with a footprint size of 20kB! The “Lean PSK” build requires the use […]
Read MoreMore TagCyaSSL Competitive Upgrade Program
One of the services that yaSSL provides is the CyaSSL Competitive Upgrade Program. With this program, yaSSL offers competitive upgrade pricing for those who wish move from an outdated, orphaned, or overpriced SSL library to the CyaSSL embedded SSL library with low cost and minimal disturbance to their code base. Here’s an outline of the […]
Read MoreMore TagECC Support Comes to the wolfSSL Embedded SSL Library
Although ECC support for the wolfSSL lightweight SSL library has been available in our GitHub repository for the past several weeks, we wanted to officially announce it to our users and customers. An official download of wolfSSL with ECC will be available on the www.yassl.com website with the next official release of wolfSSL. wolfSSL’s ECC […]
Read MoreMore TagMIT Kerberos GSS-API with wolfSSL Now Available for Android
Support for the MIT GSS-API library is now available for the Android platform – complete with an org.ietf.jgss (RFC 5653) compatible application programming interface, wolfSSL cryptography integration, and NDK sample application. You may have read our previous blog entry announcing the initial phases of our effort to port the MIT Kerberos libraries and wolfSSL embedded […]
Read MoreMore TagSecurity on Freescale Kinetis MQX with wolfSSL
Hello Kinetis users! Our team has now ported and released wolfSSL lightweight SSL for Freescale Kinetis. The newest work is for MQX/RTCS/MFS on Kinetis tower systems. Check our Github repository for the most recent source code: https://github.com/cyassl/cyassl If you are a Kinetis user, you will also be pleased to know that we support FreeRTOS, […]
Read MoreMore TagyaSSL Embedded Web Server SafeRTOS Port
Have you been searching for a web server that runs on SafeRTOS? We recently ported the yaSSL Embedded Web Server and wolfSSL embedded SSL library to the SafeRTOS operating system. This means that you can easily serve up HTTPS content from your SafeRTOS-enabled project. The yaSSL Embedded Web Server offers a very small footprint, with […]
Read MoreMore TagGood article on potential SHA-3 (aka Keccak) use in embedded systems
Here`s a good article if you`re wondering how SHA-3 will be used: http://community.embeddedswstore.com/t5/Embedded-Connection/Why-Does-Embedded-Security-Get-Overlooked/ba-p/286 From the article: “What then will SHA-3 be good for? While Polk says it may take years to identify all the possibilities for Keccak, it immediately provides an essential insurance policy in case SHA-2 is ever broken. He also speculates that the […]
Read MoreMore TagSome Android apps found to have serious SSL vulnerabilities
Researchers from two German universities have found that a large number of Android applications available today in the Google Play store have vulnerabilities related to SSL usage which may open the door for malicious man-in-the-middle attacks. You can find several blog posts explaining the vulnerabilities including one from Network World and the H Online. The […]
Read MoreMore Tag
