The NXP Memory-Mapped Cryptographic Acceleration Unit (mmCAU) is on many Kinetis microcontrollers. It improves symmetric AES and SHA performance as compared to our software based implementation. wolfSSL version 4.2.0 enhanced mmCAU support to use multiple blocks against hardware and optimize to avoid memory copies (memcpy) when possible. This resulted in a 20-78% improvement in performance! […]
Read MoreMore TagCategory: Uncategorized
CMS/PKCS #7 RSA Sign Callback for Raw Digest Signature Generation
We have added many new features in our new release of wolfSSL 4.3.0. One new feature we have added is a CMS/PKCS #7 callback for signing SignedData raw digests – enabled with the macro HAVE_PKCS7_RSA_RAW_SIGN_CALLBACK and call to function wc_PKCS7_SetRsaSignRawDigestCb(). For those who are unaware PKCS #7 is used to sign and/or encrypt messages under […]
Read MoreMore TagUpdates to RSA-PSS salt lengths
In our new release of wolfSSL 4.3.0 we have added updates to RSA-PSS salt lengths. The macro WOLFSSL_PSS_SALT_LEN_DISCOVER value into wc_RsaPSS_Verify_ex() attempts to discover salt length and can use larger salt lengths. RSA-PSS is a probabilistic signature scheme (PSS) with appendix. A signature scheme with appendix requires the message itself to verify the signature (i.e. […]
Read MoreMore TagCheck out our Webinar on TLS 1.3, OpenSSL COMPARISON!
wolfSSL: TLS 1.3, OpenSSL comparison wolfSSL’s open-source SSL/TLS library is constantly updated to maintain a mature code base and adapts quickly to any standard changes. One recent change is the release of TLS 1.3 (successor of TLS 1.2 which was out for 10 years). What is new in TLS 1.3? TLS 1.3 brought forth numerous […]
Read MoreMore TagwolfMQTT Client Supports Secure AWS
The wolfMQTT client library has an Amazon Web Services example that demonstrates securely connecting over TLS provided by the wolfSSL embedded SSL/TLS library. We setup an AWS IoT endpoint and testing device certificate. The AWS server uses a TLS client certificate for authentication. The example is located in `/examples/aws/`. It subscribes to `$aws/things/”AWSIOT_DEVICE_ID”/shadow/update/delta` and publishes […]
Read MoreMore TagwolfSSL Conforms to MISRA-C:2012 Guidelines
The team at wolfSSL has taken the core functionality of the wolfSSL embedded SSL/TLS library to the next level and implemented changes to conform to the Required and Mandatory rules from the MISRA-C:2012 Guidelines. Currently a subset of the wolfCrypt files are checked (sha256.c, aes.c (CBC/GCM), rsa.c, random.c, sp_c64.c), let us know if your project […]
Read MoreMore TagwolfSSL Java JSSE Provider Now Available
The Java Secure Socket Extension (JSSE) framework supports the installation of security providers. These providers can implement a subset of the functionality used by the Java JSSE security APIs, including SSL/TLS. We are happy to announce the availability of the wolfJSSE Provider, which wraps the native wolfSSL SSL/TLS library. With this provider, users can leverage […]
Read MoreMore TagSupport for STM32_PKA Accelerator
wolfSSL is a proud partner of STMicroelectronics, and we support a great many of their products. Now we have added support for the STM32_PKA accelerator found in the STM32WB55 module. The STM32WB55 module is is a heterogeneous dual-core MCU with a Cortex-M4 for the end-user application and a Cortex-M0 for the BLE stack. This PKA […]
Read MoreMore TagwolfSSL Support for DO-178 DAL A
wolfSSL now provides support for complete RTCA DO-178C level A certification! wolfSSL will offer DO-178 wolfCrypt as a commercial off -the-shelf (COTS) solution for connected avionics applications. Adherence to DO-178C level A will be supported through the first wolfCrypt COTS DO-178C certification kit release that includes traceable artifacts for the following encryption algorithms: SHA-256 for […]
Read MoreMore TagwolfSSL FIPS Ready and curl (#wolfSSL #wolfCrypt #curl)
wolfSSL FIPS Ready Along with the recent release of wolfSSL v4.1.0, wolfSSL has updated its support for the wolfCrypt FIPS Ready version of the wolfSSL library. wolfCrypt FIPS Ready is our FIPS enabled cryptography layer included in the wolfSSL source tree that can be enabled and built. To elaborate on what FIPS Ready really means: you do […]
Read MoreMore Tag
