“Hey wolfSSL, care to show us Europeans some post-quantum love?” Of course! Here at wolfSSL we were founded in the USA and most of our team is American. Naturally, we have been following NIST (National Institute of Standards and Technology) standards. That said, we love and cherish our European customers and community as well. Cryptography […]
Read MoreMore TagCategory: Uncategorized
Live Webinar: New and Updated: Getting Started with wolfSSH
Start 2025 with insights into the latest in SSH technology! Join us on January 23rd at 10 AM PT for an exclusive webinar, “New and Updated: Getting Started with wolfSSH.” Presented by Jacob Barthelmeh, Senior Software Engineer at wolfSSL, this session will cover the essential topics to help you harness the full potential of wolfSSH. […]
Read MoreMore TagA slice of security for the Raspberry Pi Pico
Pretty much everyone knows what a Raspberry Pi board is, a very budget-friendly ARM board which runs Linux. What you might not know is that Raspberry Pi also created a very small, cheap, embedded ARM microcontroller range and development board as well. The board is known as the Raspberry Pi Pico and the chip is […]
Read MoreMore TagwolfCrypt FIPS 140-3 Operating Environments
wolfSSL’s crypto library, wolfCrypt, has obtained a 5-year FIPS 140-3 Validated Certificate #4718. wolfCrypt FIPS is known for its unmatched portability, runs on everything, and is highly optimized for dozens of hardware targets. WolfCrypt is commonly utilized in standard operating environments due to its royalty-free pricing model and exceptional support across multiple platforms. The wolfCrypt […]
Read MoreMore TagwolfSSL FIDO Compliance: Implementing FIDO Authentication Standards with wolfCrypt
wolfSSL FIDO Compliance As organizations move away from traditional password-based authentication, FIDO (Fast Identity Online) has emerged as one of the leading standards for strong authentication. wolfSSL is positioned to support this transition with our robust cryptography library, wolfCrypt, which implements many of the core algorithms required for FIDO compliance. This blog outlines how wolfSSL […]
Read MoreMore TagDilithium Support in wolfCLU
We have added the Dilithium command to wolfCLU. Dilithium (referred to as ML-DSA by NIST) is a post-quantam cryptography (PQC) algorithm for signing and verification. This blog post provides an overview of how to use the Dilithium command in wolfCLU. To use the Dilithium command, you must first build wolfSSL with the appropriate configuration options: […]
Read MoreMore TagRenesas RX TSIP with ECDSA and Crypto Callbacks
wolfSSL now has support for Renesas RX TSIP with ECDSA and crypto callbacks. This update provides broader flexibility and security for embedded systems with Renesas RX TSIP. Below is a summary of the key changes and updates that were added in PR# 7685: Key Changes and Features Renesas RX TSIP with ECDSA SupportWolfSSL now fully […]
Read MoreMore TagwolfSSL Enhances PowerPC Support on Darwin
At wolfSSL, we are committed to supporting a wide range of platforms and architectures, ensuring that our SSL/TLS library can be used across various environments. One of the platforms we continue to support is PowerPC, both in 32-bit and 64-bit configurations. The latest updates to our PowerPC support primarily focus on resolving compatibility issues with […]
Read MoreMore TagExtended Key Update for Transport Layer Security (TLS) 1.3
The Extended Key Update extension for (D)TLS 1.3 is a draft proposal for a new key update mechanism. (D)TLS 1.3 lacks perfect forward secrecy (PFS) for long-lived sessions, leaving them vulnerable to key exfiltration attacks. The proposed Extended Key Update mechanism addresses this by incorporating minimal key exchanges during key updates. This safeguards connections by […]
Read MoreMore TagwolfSSL DTLS 1.2 Connection ID
wolfSSL release 5.7.4 includes an exciting new feature. We have implemented Connection ID (CID) support for DTLS 1.2 (RFC 9146). CID is a new feature in DTLS 1.2 that allows for better handling of connection migration. Without it, DTLS connections are tied to the IP 5-tuple making it unable to recover the connection if one […]
Read MoreMore Tag
