RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL 5.8.4 Now Available

wolfSSL 5.8.4 introduces several updates, including the addition of a GPLv3 exceptions list. This allows specific GPLv3-licensed codebases linking against wolfSSL to continue using wolfSSL under GPLv2. Current GPLv3 Exceptions: MariaDB Server MariaDB Client Libraries OpenVPN-NL Fetchmail OpenVPN Security Fixes This release includes multiple fixes across TLS 1.2, TLS 1.3, X25519, XChaCha20-Poly1305, and PSK processing. […]

Read MoreMore Tag

Direct Entropy Injection in ML-KEM: Understanding MakeKeyWithRandom and DRBG Bypass

At Crypta Labs, we are interested in direct applications of quantum random number generators (QRNG). This interest led us to explore how we can use our QRNG entropy directly in cryptographic operations, without intermediate processing layers. As we transition to post-quantum cryptography (PQC), it’s important to understand the need for randomness in these new algorithms. […]

Read MoreMore Tag

wolfHSM Keystore Enhancements: Global Keys, Wrapped Keys, and Extended Usage Policies

wolfSSL is excited to announce major enhancements to wolfHSM’s keystore capabilities, introducing three powerful features that significantly expand key management flexibility and security: global keys, wrapped keys, and comprehensive key usage policies. Global Keys: Shared Security Across Clients The new global keys feature (WOLFHSM_CFG_GLOBAL_KEYS) enables cryptographic keys to be shared across multiple wolfHSM clients while […]

Read MoreMore Tag

Enhancing wolfSSL’s Security with Fil-C: Finding Buffer Bugs Before They Bite

At wolfSSL, we’re constantly looking for ways to improve the security and reliability of our cryptographic library. Recently, we integrated the Fil-C compiler into our continuous integration (CI) pipeline, and it’s already paying dividends. Within the first runs, Fil-C caught a subtle but important buffer size validation bug that could have led to buffer overflows […]

Read MoreMore Tag

wolfBoot v2.7.0: Unified TrustZone-M support, New Hardware Platforms, easier integration with CMake

The wolfSSL team is pleased to announce the release of wolfBoot 2.7.0, the latest version of our portable secure bootloader for embedded systems. This release focuses on three main areas: Expanding hardware coverage to radiation-hardened platforms Unifying and hardening TrustZone-M and dual-bank update flows Making update state tracking and integration easier with filesystem and MTD-backed […]

Read MoreMore Tag

wolfHSM Image Manager

wolfSSL is pleased to introduce the wolfHSM Image Manager, a new module for authenticated firmware verification in automotive and industrial systems. It provides a flexible, callback-based architecture for cryptographically verifying firmware before execution, complementing wolfBoot to form a secure chain of trust anchored in HSM hardware. Features Hardware-backed verification: All cryptographic operations use HSM-protected keys […]

Read MoreMore Tag

wolfHSM-infineon-tc3xx-v2.0.0

wolfSSL is proud to announce a major milestone: wolfHSM v2.0.0 for the Infineon AURIX TC3xx platform now features full integration with the wolfBoot secure bootloader, delivering a comprehensive hardware-backed security solution for automotive and industrial applications. Complete Root of Trust for AURIX This release represents the first complete integration of wolfSSL’s security ecosystem on Infineon’s […]

Read MoreMore Tag

wolfHSM Adds Support for TI TDA4VH Platform

We heard you, everybody! After immense customer demand, we’re excited to announce that wolfHSM now supports the Texas Instruments TDA4VH platform — bringing our lightweight, embedded Hardware Security Module (HSM) framework to one of the most in-demand automotive SoCs on the market. The TDA4VH integrates advanced security and real-time processing capabilities, making it an ideal […]

Read MoreMore Tag

Posts navigation

1 2 3 4 216 217 218

Weekly updates

Archives