RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfMQTT Release v1.10.0

The fall release of wolfMQTT, v1.10.0, is now available! This release has several bug fixes and optimizations including: Improve FALL_THROUGH macro logic for XC32. (PR #227) Fix potential NULL printf in MqttSocket_Connect with verbose debug enabled. (PR #229) Fix non-block chunked transfer. (PR #230) Fix QoS responses (PR #231, 240) Fix MQTTv5 property handling (PR […]

Read MoreMore Tag

wolfSSL Cisco CJOSE Port

The wolfSSL embedded SSL/TLS library has maintained support for the Cisco CJOSE library since version 4.4.0. CJOSE implements Javascript Object Signing and Encryption (JOSE) in C/C++. JOSE is a framework that allows parties to exchange transfer claims in a secure way. The CJOSE library has been ported to work with wolfSSL, the best tested crypto […]

Read MoreMore Tag

Open Source Project Ports: OpenLDAP

Because of the exceptional portability of our wolfCrypt library, plus our fantastic team of engineers, we’re able to frequently add new ports. We’ll continue showcasing a few of the latest open-source project ports over the next few weeks! wolfSSL has been integrated with the OpenLDAP project, which is one of the most popular open-source implementations of […]

Read MoreMore Tag

wolfSSL and MIKEY-SAKKE

wolfSSL is implementing MIKEY-SAKKE! MIKEY-SAKKE is a standard created by the UK government’s National Cyber Security Center (NCSC) designed to enable secure, cross-platform multimedia communications. It is highly scalable, requiring no prior setup between users or distribution of user certificates. It is designed to be centrally-managed, giving a domain manager full control of the security […]

Read MoreMore Tag

Q&A with wolfSSL’s Engineers

Where do you see crypto heading in the next 10 years? What’s currently on wolfSSL’s roadmap? Post-Quantum Computing (PQC) cryptographic algorithms are the biggest thing on our radar (See our updates on post-quantum wolfSSH and post-quantum cURL!). We have started with adding the Key Exchange algorithms from liboqs into our TLS implementation, as well as […]

Read MoreMore Tag

wolfSSL Quality Assurance

The wolfSSL ecosystem consists of several software modules and components, each with specific goals and purposes. We make sure all our software products are engineered using the quality standards required by our process. Each step in the software lifetime is regulated by strict rules and testing criteria (including stringent fuzz based testing) that ensure the […]

Read MoreMore Tag

wolfSSL Software Development Process

The wolfSSL ecosystem consists of several software modules and components, each with specific goals and purposes. We make sure all our software products are engineered using the quality standards required by our process. Each step in the software lifetime is regulated by strict rules and testing criteria (including stringent fuzz based testing) that ensure the […]

Read MoreMore Tag

wolfSSL support for the ATECC608 Crypto Coprocessor

wolfSSL embedded SSL/TLS support the latest Microchip ATECC508 and ATECC608 I2C cryptographic coprocessors. Prerequisites: Requires the Microchip CryptoAuthLib (https://github.com/MicrochipTech/cryptoauthlib.git) Examples: wolfSSL uses PK (Public Key) callbacks for the TLS crypto operations wolfCrypt uses the WOLFSSL_ATECC508A or WOLFSSL_ATECC608A macros to enable native `wc_ecc_*` API support The README.md and reference PK callbacks can be found here: https://github.com/wolfSSL/wolfssl/tree/master/wolfcrypt/src/port/atmel […]

Read MoreMore Tag

Posts navigation

1 2 3 90 91 92 93 94 95 96 215 216 217

Weekly updates

Archives