Live Webinar: Advanced libcurl

Are you ready to elevate your libcurl expertise? Join us on December 12th at 10 AM PT for an exclusive webinar led by Daniel Stenberg, the creator and lead developer of curl. This session will delve into advanced libcurl techniques, from debugging to mastering APIs, providing practical insights you can immediately apply to your projects. […]

Read MoreMore Tag

wolfCLU Initial s_server Support

We have added initial support for the s_server command to wolfCLU! This exciting new feature supports handling basic TLS connections leveraging the best tested cryptography from the wolfSSL library. It is a quick way to set up simple TLS connection tests. So far the arguments available are : “` ./wolfssl s_server -help -port Port to […]

Read MoreMore Tag

wolfCLU Tests

Throughout the last development cycle, we have increased the test coverage for wolfCLU. This includes many different types of tests done with continuous integration. One of the tests expanded was involving -fsanitize=address builds on every code addition by updating the GitHub actions used. Another was expanding the unit test for the new features added including […]

Read MoreMore Tag

wolfCLU dgst Command

The `dgst` command of wolfCLU saw support for some new arguments with the latest release. Support for `-inform` was added, giving the flexibility to choose if the incoming file is in DER or PEM format. Before only PEM formatted inputs were handled and the application would gracefully error out if a DER input had been […]

Read MoreMore Tag

wolfCLU RSA Command

The `rsa` command with wolfCLU just got better! Now there is support for `-pubin` and `-pubout` options. This facilitates loading in a RSA public key only and printing out just the public version of the key. Very useful for cases such as signature verification where you may only have the public part of the key, […]

Read MoreMore Tag

Post-Quantum Cryptography on an Automotive HSM??

Quantum computers are not a far-off dream anymore—they are increasingly becoming a reality, and that brings challenges for the future of secure communications. Traditional public-key cryptosystems like RSA and ECC are vulnerable to quantum attacks, making the transition to post-quantum cryptography (PQC) a vital consideration for businesses planning long-term security solutions, especially those in the […]

Read MoreMore Tag

SM Ciphers on an HSM??

In recent years, China’s cryptographic standards have gained significant traction on the global stage, with algorithms like SM2, SM3, and SM4 setting the standard for secure communications within Chinese regulatory frameworks. Companies operating in or doing business with China must support these ciphers to meet compliance requirements and to ensure secure interoperability. However, until now, […]

Read MoreMore Tag

Posts navigation

1 2 3 25 26 27 28 29 30 31 215 216 217