Version 2.2.0 of the wolfSSL embedded SSL/TLS library has been released and is now available for download. This release contains bug fixes, feature enhancements, and is a recommended update for all users. Changes include: – Initial CRL (Certificate Revocation Lists) support with –enable-crl– Initial OCSP (Online Certificate Status Protocol) support with –enable-ocsp – Static ECDH […]
Read MoreMore TagAuthor: wolfSSL
Porting wolfSSL into OpenSSH
Hi! This is a short note to let you know that we have ported wolfSSL into the sshd sources. This effort was done for a customer of the wolfSSL embedded SSL product. This particular customer of ours was looking for a version of OpenSSH with a smaller footprint, TLS 1.2 and some specialized ciphers. Alpha […]
Read MoreMore TagNew features coming to wolfSSL in May
We`ve added some new features to wolfSSL that will go into the general release this month. The features are: 1. Support for SHA-3842. Client ECC certificates3. Static ECDH4. GCM With the addition of SHA-384 and GCM, wolfSSL will become NSA Suite B compliant. If you need access to these features right away, contact us at info@yassl.com […]
Read MoreMore TagwolfSSL Supports SPDY
Hi yaSSL users! See the following link for an explanation on SPDY: https://readwrite.com/2012/04/19/what-web-users-need-to-know-ab/ SPDY is a new protocol for web use proposed by Google and supported by many of the large web companies. It is based on HTTP, but it is faster and more suited to modern web usage. You will note that SPDY […]
Read MoreMore TagSecure Communication: Usability & Necessity of SSL/TLS
Network-related applications and devices often use secure communication. Although keeping network communications safe should be a top priority to all developers and engineers, it often gets left behind due to lack of understanding, insufficient funding, or looming deadlines. Securing a project with SSL shouldn’t have to include a steep learning curve, deep pockets, or an […]
Read MoreMore TagGreat Article on SSL Interception Proxies and Transitive Trust
We recently found a great article on SSL/TLS interception proxies and transitive trust from Jeff Jarmoc at Dell SecureWorks. In his article, Jeff provides a brief introduction, background, and history of the SSL and TLS protocols, then dives into talking about SSL interception proxies. Reading through the article gives insights into how and why these […]
Read MoreMore TagArticle on Security Fundamentals for Embedded Software
We recently read a good article from EE Times about security fundamentals for embedded software. This article points out that embedded software and device developers should take security precautions into consideration, as many developers assume that their applications or devices are not vulnerable to attack. Topics covered in the article include doing a “threat analysis” […]
Read MoreMore TagGCM Encryption Mode Coming Soon to wolfSSL
A while back, we posted that the wolfSSL embedded SSL library would be getting support for Galois/Counter Mode (GCM) encryption in the near future. This is still true! If everything goes as planned, GCM support should be generally available for wolfSSL in June of this year. Specifically, GCM will be used in wolfSSL with AES […]
Read MoreMore TagFeedback Requested on wolfSSL and Qt Integration
Would you like to see the wolfSSL embedded SSL library integrated into the popular Qt framework? We’ve been throwing around the idea of adding wolfSSL support to Qt and want to hear your feedback. If wolfSSL was integrated into Qt, it would be available as a build option and alternative to using Qt with OpenSSL. […]
Read MoreMore TagArticle on Wireless Sensor Networks
We would like to recommend an article from EE Times that we recently read which talks about the design and challenges of wireless sensor networks. This article explains some of the challenges faced when implementing a wireless sensor network and the different architectures which can be used, including both clustered sensor architectures and layered architectures. […]
Read MoreMore Tag
