RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

Technologies and Techniques for Securing Connected Devices

wolfSSL will be presenting a session titled “Technologies and Techniques for Securing Connected Devices” at the upcoming 2014 Embedded World Conference in Nürnberg, Germany. If you are going to be attending the conference, we welcome you to come and listen to our presentation. Technologies and Techniques for Securing Connected DevicesSession: 17Day: 02.27.2014Time: 11:30am – 12:00pmSpeaker: […]

Read MoreMore Tag

Using the MIT Kerberos GSS-API with wolfSSL on Android

Are you interested on using the GSS-API with Kerberos on Android? If so, you’ll be happy to hear about wolfSSL’s port of the MIT GSS-API library to Android platform – complete with an org.ietf.jgss (RFC 5653) compatible application programming interface, CyaSSL cryptography integration, and NDK sample application. You may have read our previous blog entries […]

Read MoreMore Tag

More Dual_EC_DRBG News

It was reported yesterday in The Guardian and elsewhere that the NSA paid RSA $10M to set Dual_EC_DRBG as their default PRNG.  See the news here:  http://www.theguardian.com/world/2013/dec/20/nsa-internet-security-rsa-secret-10m-encryption.   As we have previously stated, we never implemented Dual_EC_DRBG in any of our products, much less set it as default, because of its suspect nature.  If you`re […]

Read MoreMore Tag

Dumping SSL v3 from wolfSSL

Hi!  We`re considering the elimination of SSL 3.0 support from wolfSSL.  There`s a lot of reasons to do it, including better security, cleaning up our code, and its time to move on and modernize.  Anybody have an opinion?  The code would still be available, but not mainline.

Read MoreMore Tag

Using Truncated HMAC with wolfSSL

Are you fan of TLS Extensions? We are here today to present the addition of Truncated HMAC on wolfSSL! Currently defined TLS cipher suites use the HMAC to authenticate record-layer communications. In TLS, the entire output of the hash function is used as the MAC tag. However, it may be desirable in constrained environments to […]

Read MoreMore Tag

Posts navigation

1 2 3 183 184 185 186 187 188 189 215 216 217

Weekly updates

Archives