RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news.
Or sign up to receive weekly email notifications containing the latest news from wolfSSL.
In addition, wolfSSL now has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL Version 4.4.0 is Now Available!

The spring release of wolfSSL, v4.4.0, is now available! This release has many new features, optimizations, and bug fixes. Some of the new features we added to the wolfSSL embedded SSL/TLS library include:

  • Qualcomm Hexagon SDK support.
  • DSP builds to offload ECC verify operations.
  • Certificate Manager callback support.
  • New APIs for running updates to ChaCha20/Poly1305 AEAD.
  • Support for use with the Apache web server.
  • Add support for IBM s390x.
  • PKCS8 support for ED25519.
  • OpenVPN support.
  • Add P384 curve support to SP.
  • Add BIO and EVP API.
  • Add AES-OFB mode.
  • Add AES-CFB mode.
  • Add Curve448, X448, and Ed448.
  • Add Renesas Synergy S7G2 build and hardware acceleration.

Check out the README from the download for a full list, or contact us at facts@wolfssl.com with any questions.

Upcoming Webinar: Getting Started with wolfSSH

Do you want to learn more about wolfSSH? Join us for our upcoming webinar with wolfSSL engineer, John Safranek, to cover the basics of wolfSSH!

The wolfSSH library is a lightweight client and server library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments – primarily because of its small size, speed, and feature set. wolfSSH is built for maximum portability, and is generally very easy to compile on new platforms. wolfSSH supports the industry standard SSHv2 and offers progressive ciphers such as Poly1305, ChaCha20, NTRU, and SHA-3. Plus, it can be FIPS validated!

If you’re not using wolfSSH yet, join us to learn what you’re missing!

When: Aug 19, 2020 10:00 AM Pacific Time (US and Canada)
Topic: Webinar: Getting started with wolfSSH

Register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_oI29EeJcSXWhFJo4j0WA0A

After registering, you will receive a confirmation email containing information about joining the webinar.

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com or view our FAQ page. As always, there will be a Q&A session following the live presentation. We look forward to seeing you there!

Additional Resources
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL.

wolfSSL working on first embedded ACVP project

FIPS 140-2 requirements for CAVP testing have been deprecated in favor of the cutting edge ACVP test requirements! wolfSSL is currently working on (to our knowledge) the first ever embedded validation that will use the new ACVP test requirements!

References
https://csrc.nist.gov/Projects/Automated-Cryptographic-Validation-Testing
https://github.com/usnistgov/ACVP

If you would like to know more or have any questions please contact us at fips@wolfssl.com or support@wolfssl.com!

Upcoming Webinar: Why cURL is used in IoT devices

Join us for our upcoming webinar with cURL Founder and Engineer at wolfSSL Inc., Daniel Stenberg, on the use of cURL in IoT devices.

Register Here: Zoom Registration for Webinar
Date/Time: August 5, 2020 (Wednesday) 04:00 PM in Osaka, Sapporo, Tokyo

After registration, you will receive a confirmation email regarding your participation in the webinar.

cURL is used by web developers around the world and has started to play an active role in many IoT devices. Daniel Stenberg, lead developer of cURL, explains why cURL is the preferred choice for resource-constrained embedded devices. We will also talk about cURL user support provided by wolfSSL.

We look forward to seeing you there!

Contact Information
Please contact us at info@wolfssl.jp with any questions about the webinar. As always, there will be a Q&A session following the live presentation.

Additional Resources
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL. To learn more about wolfSSL support for cURL click here or check out Daniel Stenberg’s personal blog on cURL.

Upcoming Webinar: cURL: How to Make Your First Code Contribution

We are thrilled to announce our upcoming webinar on cURL: How to Make Your First Code Contribution with cURL founder and maintainer, Daniel Stenberg! Get your questions about cURL answered at this brand new webinar!

cURL is a wildly popular and well-used open source tool and library, and is the result of more than 2,200 named contributors out of which almost 800 wrote at least one commit.

In this presentation, cURL’s lead developer Daniel Stenberg talks about how any developer can proceed in order to get their first code contribution submitted and ultimately land in the curl git repository including how to approach code and commits, style, editing, pull-requests, and using GitHub etc. After you’ve seen this, you’ll know how to easily submit your improvement! To learn more about cURL, join us for this webinar!

When: Aug 13, 2020 10:00 AM Pacific Time (US and Canada)
Topic: Webinar: cURL: How to Make Your First Code Contribution

Register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_poAshmaRT0S02J7hNduE7g

After registering, you will receive a confirmation email containing information about joining the webinar.

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com or view our FAQ page. As always, there will be a Q&A session following the live presentation.

Additional Resources
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL. To learn more about wolfSSL support for cURL click here or check out Daniel Stenberg’s personal blog on cURL!

wolfSSL at Black Hat USA 2020 – Virtual Event!

wolfSSL is excited to participate as a sponsor for the first ever virtual Black Hat USA!!! Come visit wolfSSL at Black Hat USA August 1-6 in Pacific Daylight Time (UTC?07:00).

Register with the link to get your FREE Business Hall Pass:
https://www.blackhat.com/us-20/registration.html

Come and talk to one of our experts on TLS 1.3, embedded security, embedded SSL/TLS, Secure Boot, MQTT, SSH, TPM 2.0, curl + tiny-curl, FIPS, DO-178, MISRA and more. We’ve got the best-tested crypto on the market and the best security without sacrificing performance. Ask to see our benchmarks!

Stop by to hear more about the wolfSSL embedded SSL/TLS library, the wolfCrypt encryption engine, meet the wolfSSL team, and have all your crypto questions answered. We can’t wait to “see” you!

For more information about wolfSSL, our products, or future events, please contact facts@wolfssl.com.

More information about Black Hat USA 2020 can be found here: https://www.blackhat.com/us-20/

Azure Sphere partners with wolfSSL to provide premier client TLS support

Now, with the Azure Sphere OS 20.07 release, Microsoft has licensed and exposed a subset of wolfSSL, the first commercial implementation of TLS 1.3, for use on Azure Sphere devices. This strategic pairing allows software developers to create client TLS connections directly using the Azure Sphere SDK. Software developers no longer need to package their own TLS library for this purpose. Utilizing the best-tested, high-performance wolfSSL TLS support in Azure Sphere can save device memory space and programming effort, freeing developers to build new, cutting-edge IoT solutions.

Microsoft Azure Sphere and wolfSSL have been long-time partners, striving for the very best in security. The Azure Sphere OS has long used wolfSSL for TLS connections to Microsoft Azure services. Azure Sphere also uses wolfSSL’s versatile technology to enable secure interactions from developer apps to customer-owned services.

Partnerships with embedded security leaders like wolfSSL play an important role in Azure Sphere’s mission to empower every organization to connect, create, and deploy highly secured IoT devices. The unique Azure Sphere approach to security is based on years of vulnerability research, the findings of which Microsoft published in the seminal paper “Seven Properties of Highly Secure Devices.” These seven properties are the minimum requirement for any connected device to be considered highly secured. Azure Sphere implements all seven properties, providing a robust foundation for IoT devices. This level of consideration is not lost on an engineering team like wolfSSL’s, known for producing the best-tested crypto on the market and consistently supporting the latest developments in TLS protocol, like TLS 1.3.

Azure Sphere can be used with any customer cloud service, not just Microsoft’s own Azure. By providing a highly secured ecosystem, Microsoft and wolfSSL make security features more accessible and easier to use and can extend unmatched security to new frontiers in IoT where security has historically been sparse.

For information on how to use these wolfSSL APIs on Azure Sphere, please reference the Azure Sphere documentation on wolfSSL. We will be publishing a sample to go along with this, available at a later date. Check back here—we will update this post with the link to the sample once it is available.

If you have any questions, contact Microsoft at AzCommunity@microsoft.com or wolfSSL at facts@wolfSSL.com.

Upcoming Webinar: Testing and Security Vulnerability

We are excited to announce our upcoming webinar on Testing and Security Vulnerability with wolfSSL engineer, Kaleb Himes! We’ll explore vulnerabilities, why testing is a mission, the testing lifecycle and why wolfSSL is the best! This webinar may be a useful resource for learning more about how wolfSSL is tested and how security vulnerabilities are determined and addressed in record time.

When: Aug 6, 2020 09:00 AM Pacific Time (US and Canada)
Topic: Webinar: Testing and Security Vulnerability

Register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_1dGaIH8TSqC-3ioO59SyCA

After registering, you will receive a confirmation email containing information about joining the webinar.
We look forward to seeing you there!

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com or view our FAQ page. As always, there will be a Q&A session following the live presentation.

Additional Resources
In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL.

For security and vulnerability information and details, please visit our known vulnerabilities page. This page also includes details on well known CVE’s and how or if they affect wolfSSL products.

Renesas RX72N Envision Kit Supported!

We are exited to announce wolfSSL‘s support for the Renesas RX72N Envision Kit with TSIP v1.09. The RX72N MCU is the flagship model of RX series, using a 32-bit RX72N 240 MHz microcontroller. The board just entered the market this spring and wolfSSL can now support secure connections on it via TLS!

If you have an interest in using wolfSSL with this MCU or the RX72N Envision Kit, we encourage you to give it a try with one of our sample applications.

wolfSSL provides TLS source code, sample programs, and project files that make your evaluation quick and easy. Our wolfCrypt benchmark sample application shows the performance of cryptography operations accelerated by the H/W accelerator (TSIP) and allows for an easy comparison to software cryptography performance.

Sample Applications Provided

  1. Cryptography test
  2. Cryptography benchmark
  3. TLS Client
  4. TLS Sever
  5. Linux server application which can communicate with #3

Board and Environment Support

Board: Renesas RX72N Envision Kit (R5F572NNHxFB)
IDE: Renesas e2Studio v7.8.0
Compiler: CCRX Tool Chain V.3.02.00
TSIP: V.1.09

Benchmarks

Here are the benchmark results gathered during testing, comparing algorithm performance with and without TSIP.

Edit
AlgorithmPerformance (TSIP accelerated)Performance (Software-only, no TSIP)Acceleration Ratio
Random Number Generation3.826MB/s831KB/sx4.6
AES-128-CBC-Enc4.88MB/s1.62MB/sx3.0
AES-128-CBC-Dec4.67MB/s1.53MB/sx3.0
AES-256-CBC-Enc4.71MB/s1.38MB/sx3.4
AES-256-CBC-Dec4.49MB/s1.31MB/sx3.7
AES-128-GCM-Enc4.35MB/s749KB/sx5.8
AES-128-GCM-Dec4.29MB/s748KB/sx5.7
AES-256-GCM-Enc4.25MB/s692KB/sx6.1
AES-256-GCM-Dec4.21MB/s692KB/sx6.1
SHA30.08MB/s5.52MB/sx5.4
SHA25634.54MB/s1.82MB/s x18.9
HMAC-SHA29.44MB/s5.48MB/sx5.4
HMAC-SHA256 33.74MB/s1.81MB/sx18.6

Resources

wolfSSL package including this RX72N Envision Kit support, is available from the wolfssl repository on GitHub:

https://github.com/wolfSSL/wolfssl/archive/master.zip

Unzip the package then refer to “wolfssl-master/IDE/Renesas/e2studio/RX72NEnvisionKit/README” for more details.

The README describes how to build and execute the sample programs.

Support

For more information, please contact facts@wolfssl.com.

wolfSSL and MIKEY-SAKKE

wolfSSL is implementing MIKEY-SAKKE!

MIKEY-SAKKE is a standard created by the UK government’s National Cyber Security Center (NCSC). MIKEY-SAKKE is a standard designed to enable secure, cross-platform multimedia communications. It is highly scalable, requiring no prior setup between users or distribution of user certificates. It is designed to be centrally-managed, giving a domain manager full control of the security of the system. But even so, it maintains high-availability, as calling does not require interaction with centralized architecture.

wolfSSL is a lightweight TLS/SSL library that is targeted for embedded devices and systems. It has support for the TLS 1.3 protocol, which is a secure protocol for transporting data between devices and across the Internet. In addition, wolfSSL uses the wolfCrypt encryption library to handle its data encryption.

Secure communications are needed across all governments. As a result governments create policies encouraging the development of security solutions. MIKEY-SAKKE is the answer to the security requirements from the UK government to specify secure, open and patent free cryptographic methods in order to empower private industry to provide UK government interoperable secure communication solutions. As a result many private and commercial organizations perceive a sizable advantage being MIKEY-SAKKE compliant.

If there are any specific questions about how wolfSSL integrates, please contact our team at facts@wolfssl.com. If there is a desire for wolfSSL to include other cybersecurity standards, please let the wolfSSL team know!

Upcoming Webinar: Benchmarking with wolfSSL

We are excited to announce our upcoming webinar on benchmarking with wolfSSL! Get your questions on benchmarking answered by wolfSSL engineer, Jacob Barthelmeh, during our webinar on July 29th, 2020 at 12PM PT!

Many users are curious about how the wolfSSL embedded SSL/TLS library will perform on a specific hardware device or in a specific environment. Because of the wide variety of different platforms and compilers used today in embedded, enterprise, and cloud-based environments, it is hard to give generic performance calculations.

In IoT devices doing real time interactions and many enterprise applications the underlying cryptography is a very performance-critical aspect. To help wolfSSL users and customers in determining performance for TLS connections with wolfSSL and low level crypto operations with wolfCrypt, a benchmark application is bundled with wolfSSL.

To learn more about benchmarking with wolfSSL join us for this webinar!

When: July 29th, 2020 12:00 PM Pacific Time (US and Canada)
Topic: Benchmarking with wolfSSL

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_15tIndjMRiyTGTjyYsHLWw

After registering, you will receive a confirmation email containing information about joining the webinar.

Please contact us at facts@wolfssl.com with any questions about the webinar and for technical support, please contact support@wolfssl.com

In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on GitHub, and learn more about benchmarking with wolfSSL through our Documents on our website!

Posts navigation

1 2 3 4 115 116 117

Weekly updates

Archives

Latest Tweets