RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL 5.9.1 release blog

wolfSSL 5.9.1 is available with new features, post-quantum cryptography improvements, broad bug fixes, and a number of vulnerability fixes. Users are always recommended to stay up to date with wolfSSL releases. In this release, use cases that are affected by high severity reports are: PKCS7 with ORI callback set or AuthEnvelopedData with AES-GCM (–enable-pkcs7), ECDSA […]

Read MoreMore Tag

Adding SHE (Secure Hardware Extension) Support to wolfSSL

wolfSSL now includes support for the Secure Hardware Extension (SHE) key management standard (see PR #10009). This new wolfCrypt module provides software-based generation and verification of SHE key update messages (M1–M5), with built-in support for hardware offload via crypto callbacks. What is SHE? The SHE specification was developed by the Hersteller Initiative Software (HIS) consortium […]

Read MoreMore Tag

wolfIP TCP/IP Stack on the LPC54S018

wolfSSL is announcing wolfIP support for NXP LPC microcontrollers, starting with the LPCXpresso54S018M development board (LPC54S018J4M). This is the first NXP platform supported by wolfIP, extending coverage beyond the existing STM32 and VORAGO VA416xx ports. wolfIP provides DHCP, ICMP ping, and a TCP echo server on this new platform. About the LPC54S018 The LPC54S018 is […]

Read MoreMore Tag

FIPS Linux on Raspberry Pi 5 using BitBake and Yocto

Getting FIPS-validated cryptography onto an embedded Linux platform typically involves stitching together kernel modules, userspace libraries, and building system configurations by hand. Now, the meta-wolfssl layer provides a turnkey Yocto build environment that produces a fully integrated wolfSSL FIPS image, from kernel crypto to OpenSSL, GnuTLS, and libgcrypt. You can try it yourself with our […]

Read MoreMore Tag

CHERIoT Support Coming to wolfSSL

We are excited to announce that we will be working on CHERIoT support for wolfSSL! CHERIoT (Capability Hardware Extension to RISC-V for IoT) is a hardware-software platform that brings capability-based memory protection to small embedded devices. It enforces memory safety at the hardware level, catching entire classes of vulnerabilities like buffer overflows and use-after-free automatically. […]

Read MoreMore Tag

FIPS 140-3 in Rust: what it takes

Your product needs FIPS 140-3. Your stack is Rust. Until now those two facts were in tension. The pure-Rust crypto libraries are not FIPS 140-3 validated. wolfSSL’s Rust crates are different. wolfCrypt has been through FIPS 140-3 validation. The path from Rust to a validated build exists. Here’s what it actually takes. The `fips` feature […]

Read MoreMore Tag

wolfBoot Support for the NXP LPC55S69

wolfSSL announces wolfBoot support for the NXP LPC55S69, available now in PR #713. With Secure Boot, TrustZone-M, and an industry-standard cryptographic API, your non-secure application can be rapidly developed for a secure world. About the NXP LPC55S69 The LPC55S69 is a general purpose edge computing device, with dual ARM Cortex-M33 cores running up to 150 […]

Read MoreMore Tag

wolfIP TCP/IP Stack on the STM32N6

wolfSSL is announcing wolfIP support for the STM32N6 series, starting with the NUCLEO-N657X0-Q development board (STM32N657X0H). The STM32N6 is ST’s first Cortex-M55 microcontroller, designed for high-performance edge AI workloads with a dedicated Neural Processing Unit (NPU). wolfIP provides a full TCP/IP stack with ping, TCP echo, and ARP on this new platform. About the STM32N6 […]

Read MoreMore Tag

Meeting FBI CJIS Security Policy v6 with wolfGuard

The FBI’s Criminal Justice Information Services (CJIS) Security Policy v6 has sent a clear message to law enforcement and public safety agencies: the window for legacy cryptography is closing. Specifically, Control SC-13 mandates that all Criminal Justice Information (CJI) in-transit outside of physically secure locations must be protected by FIPS 140-3 validated cryptographic modules. With […]

Read MoreMore Tag

Posts navigation

1 2 3 4 234 235 236

Weekly updates

Archives