The wolfSSL lightweight SSL/TLS library and underlying wolfCrypt cryptography library have included support for the NXP SE050 secure element as of November 2021. Since that time we have been increasing compatibility with SE050 along with usage of SCP03 (Secure Channel Protocol 03) authentication. We recently made a few fixes for usage of the NXP SE050 […]
Read MoreMore TagCategory: Uncategorized
Join us at Fosdem 2023
In a matter of days, hundreds of Open Source developers will gather in Brussels, Belgium for FOSDEM 2023. FOSDEM is a two day event organized by volunteers to promote the widespread use of Open Source software, and is considered by many to be the best open source conference in Europe [1]. wolfSSL will be attending […]
Read MoreMore TagwolfBoot support for the STM32C0
We are adding wolfBoot support for the new STM32C0. This is a low cost MCU similar to the STM32G0 based on a Cortex-M0 (48MHz). It is a very low cost general purpose 32-bit MCU with up to 32KB flash and 12KB RAM. Our wolfBoot secure bootloader is the only solution available for this platform thanks […]
Read MoreMore TagKEMTLS Experimentation Via wolfSSL
A new, exciting paper has been released by Ruben Gonzalez from Neodyme AG and Thom Wiggers from Radboud University. They compare post-quantum algorithms in TLS 1.3 and KEMTLS. KEMTLS is a newly proposed modification to the TLS 1.3 protocol that would eliminate the need for signing operations during a handshake protocol. Note that a long […]
Read MoreMore TagwolfEngine 1.3.0 Released
We’re happy to announce that wolfEngine 1.3.0 has been released! wolfEngine is an OpenSSL engine implementation that helps users migrate to a FIPS-validated cryptography library (wolfCrypt) all while continuing to use OpenSSL. Version 1.3.0 includes support for RPM packaging, support and tests for OpenSSL HMAC operations to be called with a -1 key length, and […]
Read MoreMore TagRust Crate for Post-Quantum TLS 1.3 and wolfSSL
Are you on the bleeding edge of software development and cryptographic protocols? Then you’ll appreciate the work that our friends at ExpressVPN have done by creating a rust crate for wolfSSL with bindings into our API. They have even created a special feature flag called “postquantum” which enables our integration with liboqs. In fact, this […]
Read MoreMore TagDTLS 1.3 support for Post-Quantum Cryptography
Do you want to start using wolfSSL’s DTLS 1.3 implementation? Want to go even further? A great reason to start using our DTLS 1.3 stack is that it also supports post-quantum KEMs, Hybrid KEMs and post-quantum signature schemes. When it comes time to move to post-quantum standards, support for them will likely come in […]
Read MoreMore TagwolfSSL: Hardened By Default
In cryptography when we talk about hardening a library, we mean enabling resistance to timing attacks and cache attacks, using RSA blinding and protecting against glitching. Enabling and Disabling Our code has many related macros which can be controlled via configure script flags such as the harden flag and maxstrength flag. When hardening is enabled, […]
Read MoreMore TagwolfSSL + nuttX initial testing success!
wolfSSL is pleased to announce initial run-time testing of wolfCrypt + NuttX was successfully completed (Crypto algorithm tests and benchmarking) on both BL602 (RISC-V) and NUCLEO-L552ZE-Q (Cortex-M33) targets! wolfSSL engineers are now working on making a publically available drop-in for the NuttX-apps directory that users can take for a spin! The wolfSSL team is very […]
Read MoreMore Tag“Get Up to Speed with WolfSSL in 2023: Join Our Webinar Series”
Happy New Year! As we kick off 2023, wolfSSL is excited to announce a series of webinars to help you get started with our software. First up is our webinar on January 5th at 10 AM (PST) on getting started with the wolfSSL TLS library. This webinar will cover a range of topics including an […]
Read MoreMore Tag
