All too often, security software vendors resort to fear-mongering as a sales and marketing method. At wolfSSL, we consciously avoid this tactic. We recognize that our competitors use it. They tell customers to be afraid of open source. They tell customers to be afraid of breaches. Unfortunately, they use the fear mongering approach to their […]
Read MoreMore TagCategory: Uncategorized
Minimizing Resource Consumption on Devices with Embedded SSL using the Swapper
Hi! IoT engineers everywhere are battling with software resource usage. TCP/IP and SSL can be fairly consumptive of resources. One of the old school techniques for minimizing resource consumption is swapping one app for another on a device. Taking that concept to an extreme can be tricky, and the extreme we`ve been working with is […]
Read MoreMore TagUpdated wolfSSL Porting Guide Available
As a large number of our users port wolfSSL to new platforms and environments, we’ve put some time into updating our wolfSSL Porting Guide and have made it available both online and in PDF version. The updated guide covers areas in the wolfSSL code which typically need modification when porting wolfSSL to a new environment, […]
Read MoreMore TagwolfSSL Embedded SSL Integrated with Keil MDK5
If you are a Keil MDK-ARM user, we’re happy to announce that the wolfSSL embedded SSL library is now integrated into the Keil MDK5 as an easy-to-use software pack. This integration means that MDK5 users can easily pull in SSL/TLS support directly to their Keil projects without going out to the web to do a […]
Read MoreMore TagwolfSSL JNI 1.0 Now Available
wolfSSL is happy to announce that the first release of the wolfSSL JNI wrapper is now available for download. wolfSSL JNI provides Java applications with SSL/TLS support up to the current industry standards of TLS 1.2 and DTLS 1.2. Current Java implementations have lacked DTLS support, causing Java developers to write their own custom JNI […]
Read MoreMore TagConsidering OAuth for Devices
Hi! We are currently considering implementing Oauth for devices. OAuth, first defined by RFC 5849 (1.0), and revised with RFC 6749 (2.0) specifies an authorization framework to allow third party applications to obtain limited access to HTTP services. From RFC 6749: “In the traditional client-server authentication model, the client requests an access-restricted resource (protected […]
Read MoreMore TagAbout Open Source
Hi! This is just a reminder. We are still all about open source. We believe that Open Source Software is the best way to conceive, share, deliver, support and build software. We believe in open source for all of the right and well documented reasons. If you can`t work with open source then tell us […]
Read MoreMore TagwolfSSL Embedded SSL on ColdFire 547X/548X with Hardware Encryption Acceleration
Hi! The CyaSSL Embedded SSL engine, wolfCrypt cryptography library, and the wolfSSL Embedded Web Server now support Freescale`s ColdFire hardware encryption. Our initial benchmarks show that AES and 3DES cryptography operations are up to 10 times faster when done with ColdFire`s hardware acceleration. If you would like to use one of our products with ColdFire, […]
Read MoreMore TagSSL/TLS Programming Tutorial
Are you just learning about SSL/TLS, or interested in learning how to layer it into an existing application? If so, we include an SSL tutorial in Chapter 11 of our wolfSSL Manual which provides a good introduction to integrating wolfSSL into a typical TCP socket-based application. Our SSL/TLS Tutorial uses base examples found in the […]
Read MoreMore TagSerpent Cipher in wolfSSL Embedded SSL
Hi! One of the alternative ciphers we`ve considered implementing in wolfSSL is the Serpent Cipher. Not only does it have a cool sounding alliterative name, but it is theoretically more secure than Rijndael/AES. In fact, it was a finalist for AES. An overview of the Serpent Cipher can be found here: http://en.wikipedia.org/wiki/Serpent_(cipher). If you think […]
Read MoreMore Tag
