RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

Why They Use curl

authored by Daniel Stenberg – original post: https://gist.github.com/bagder/5970df691b7cdef65e95d3d48ebd8659 You most probably already know why you would use curl and if I’m right, you’re also a fan of using the right tool for the job. But do you know why others use curl and why they switch from other solutions to relying on curl for their current […]

Read MoreMore Tag

wolfSSL Apache Port Coming Soon!

wolfSSL provides the wolfSSL embedded SSL/TLS library, which is a fast, secure, and highly portable implementation of the SSL/TLS protocols. As part of being highly portable, the wolfSSL library is frequently being ported to various other software modules and devices for users to easily implement wolfSSL’s features. One of these more recent ports that wolfSSL […]

Read MoreMore Tag

OpenSSL Compatibility Layer Expansion

Recently, wolfSSL released version 4.0.0 of the wolfSSL embedded SSL/TLS library. This new version includes many new port/feature additions, maintenance updates, and a couple bug fixes. Among those new feature additions includes multiple new API added to wolfSSL’s OpenSSL compatibility layer! The compatibility layer is a series of commonly used and essential API that users […]

Read MoreMore Tag

wolfSSH Port for µC/OS-III

At wolfSSL, we currently have a wolfSSH port to µC/OS-III in the works! µC/OS-III is a highly portable and scalable real-time kernel. Designed for ease of use on a huge number of CPU architectures, these kernels are a key component of the µC/OS real-time operating system. The features of this kernel allow it to pair […]

Read MoreMore Tag

wolfSSL’s Effective Timing Resistance

In cryptography and encryption, timing can be an unconsidered element of the security for various operations. However, if an encryption library is built without considering timing or the possible attacks that a malicious agent could execute with timing attacks, then that encryption library could be vulnerable to multiple different attacks that have occurred or can […]

Read MoreMore Tag

Posts navigation

1 2 3 135 136 137 138 139 140 141 217 218 219

Weekly updates

Archives