RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

Dumping SSL v3 from wolfSSL

Hi!  We`re considering the elimination of SSL 3.0 support from wolfSSL.  There`s a lot of reasons to do it, including better security, cleaning up our code, and its time to move on and modernize.  Anybody have an opinion?  The code would still be available, but not mainline.

Read MoreMore Tag

Using Truncated HMAC with wolfSSL

Are you fan of TLS Extensions? We are here today to present the addition of Truncated HMAC on wolfSSL! Currently defined TLS cipher suites use the HMAC to authenticate record-layer communications. In TLS, the entire output of the hash function is used as the MAC tag. However, it may be desirable in constrained environments to […]

Read MoreMore Tag

Updated wolfSSL Porting Guide Available

As a large number of our users port wolfSSL to new platforms and environments, we’ve put some time into updating our wolfSSL Porting Guide and have made it available both online and in PDF version. The updated guide covers areas in the wolfSSL code which typically need modification when porting wolfSSL to a new environment, […]

Read MoreMore Tag

wolfSSL JNI 1.0 Now Available

wolfSSL is happy to announce that the first release of the wolfSSL JNI wrapper is now available for download. wolfSSL JNI provides Java applications with SSL/TLS support up to the current industry standards of TLS 1.2 and DTLS 1.2.  Current Java implementations have lacked DTLS support, causing Java developers to write their own custom JNI […]

Read MoreMore Tag

Considering OAuth for Devices

Hi!  We are currently considering implementing Oauth for devices.   OAuth, first defined by RFC 5849 (1.0), and revised with RFC 6749 (2.0) specifies an authorization framework to allow third party applications to obtain limited access to HTTP services.  From RFC 6749: “In the traditional client-server authentication model, the client requests an access-restricted resource (protected […]

Read MoreMore Tag

Posts navigation

1 2 3 183 184 185 186 187 188 189 214 215 216

Weekly updates

Archives