RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL 5.9.1 release blog

wolfSSL 5.9.1 is available with new features, post-quantum cryptography improvements, broad bug fixes, and a number of vulnerability fixes. Users are always recommended to stay up to date with wolfSSL releases. In this release, use cases that are affected by high severity reports are: PKCS7 with ORI callback set or AuthEnvelopedData with AES-GCM (–enable-pkcs7), ECDSA […]

Read MoreMore Tag

wolfSSL as a Cryptographic Service Provider for VPP

The engineering team at wolfSSL is working on integrating wolfCrypt as a cryptographic service provider for FD.io’s Vector Packet Processing framework. This will give VPP deployments access to FIPS 140-3 validated cryptography, hardware acceleration support, and wolfSSL’s battle-tested implementations directly within the high-performance data plane. This work targets network packet workloads demanding both regulatory compliance […]

Read MoreMore Tag

wolfProvider: Drop-In FIPS 140 Compliance for OpenSSL Applications

Do you have a Linux application, service, container, or distribution that depends on OpenSSL and must meet FIPS 140 requirements, or interoperate with systems operating in FIPS-approved mode? wolfProvider is an OpenSSL provider module that enables OpenSSL-based applications to use wolfSSL’s FIPS-validated cryptographic implementations. wolfProvider replaces OpenSSL’s cryptographic engine as the provider layer. Existing OpenSSL […]

Read MoreMore Tag

Securing wolfHSM POSIX Transport with TLS

The recent addition of a TLS transport to the wolfHSM project provides improved transport-level protection for POSIX-based communications and was included with the latest release. Previously, when wolfHSM was used over POSIX transports (such as TCP sockets on a local system), security largely depended on controlling access to that transport. If an attacker could access […]

Read MoreMore Tag

New X.509 Certificate Extension APIs in wolfSSL and wolfSSL JNI

wolfSSL now adds new public X.509 certificate-generation APIs for key identifiers, CRL distribution points, and Netscape certificate type handling. wolfSSL JNI builds on top of these APIs and now exposes matching Java methods in WolfSSLCertificate. New public wolfSSL APIs (C) int wolfSSL_X509_set_subject_key_id(WOLFSSL_X509* x509, const unsigned char* skid, int skidSz); int wolfSSL_X509_set_subject_key_id_ex(WOLFSSL_X509* x509); int wolfSSL_X509_set_authority_key_id(WOLFSSL_X509* x509, […]

Read MoreMore Tag

Migrating CRL Workflows from Bouncy Castle to wolfSSL JNI

If your Java stack currently uses Bouncy Castle for certificate tooling, moving CRL generation to wolfSSL’s JNI is straightforward once you map the flow correctly. wolfSSL JNI/JSSE uses wolfSSL’s native C crypto/TLS library, so projects can share one crypto implementation across Java and non-Java components. In environments that require validated cryptography, wolfSSL has significant experience […]

Read MoreMore Tag

Expanded CRL Support: Generating a CRL

wolfSSL has long provided solid CRL decode and validation support. This update builds on that foundation by adding CRL generation and signing capabilities, along with certificate extension helpers that improve revocation-aware certificate creation workflows. What is a CRL? A Certificate Revocation List (CRL) is a signed list published by a certificate authority (CA) that identifies […]

Read MoreMore Tag

New! wolfSSL Launches User-Space FIPS VPN Client in Rust

wolfSSL is excited to announce the release of its new user-space VPN client. This client is written entirely in Rust, leveraging the language’s safety and performance characteristics. The implementation is based on the popular open-source boringtun project. Crucially, this new client incorporates FIPS-validated cryptography through the use of the wolfGuard protocol. This solution ensures a […]

Read MoreMore Tag

wolfSSL’s OCSP and OCSP-Stapling Support

Sometimes, X.509 certificates need to be revoked. One way that can happen is via CRL (Certificate Revocation List), but that’s a topic for another time. Today we’ll focus on OCSP (Online Certificate Status Protocol). The OCSP protocol is designed to allow a client to send a real-time query to a certificate authority’s OCSP responder, which […]

Read MoreMore Tag

Keeping TLS 1.3 AES-GCM Session Keys Out of RAM

Secure Element Offload via Crypto Callbacks in wolfSSL Modern embedded and security-critical systems increasingly rely on Secure Elements, TPMs, and hardware cryptographic accelerators to protect private keys. In wolfSSL, asymmetric keys such as ECC private keys can already reside entirely inside hardware using Crypto Callbacks. Until now, however, TLS 1.3 AES-GCM session keys were still […]

Read MoreMore Tag

Posts navigation

1 2 3 4 232 233 234

Weekly updates

Archives