RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

Verifying TPM Endorsement Certificates with wolfTPM

We’re excited to share a new feature added to wolfTPM: a lightweight example for verifying TPM Endorsement Key (EK) Certificates without wolfCrypt. The new example, `verify_ek_cert`, retrieves and verifies the EK certificate stored in the TPM’s non-volatile memory. This supports TPMs like the Infineon SLB9672/SLB9673, STMicro ST33 series, and validates their RSA-signed EK certs using […]

Read MoreMore Tag

wolfPKCS11 Supercharged: 42 New Mechanisms and Full NSS Backend Support Unleashes FIPS Crypto

The wolfSSL team is thrilled to announce a monumental update to wolfPKCS11, now available in the master branch on GitHub. This release transforms wolfPKCS11 into a premier, high-performance PKCS#11 provider by incorporating an incredible 42 new cryptographic mechanisms and 8 new API functions. This focused engineering effort enables wolfPKCS11 to serve as a complete and […]

Read MoreMore Tag

Meet wolfSSL at Black Hat USA 2025

Join wolfSSL at Black Hat USA 2025 – August 6–7 in Las Vegas, Nevada! Visit us at Booth #2561 to explore high-performance cryptographic solutions trusted in embedded, enterprise, and cloud systems. As a leader in cryptography and protocols, wolfSSL delivers the most tested, most portable, and standards-compliant cryptography, securing over 5 billion connections across RTOS, […]

Read MoreMore Tag

ML-KEM Versus HQC KEM

ML-KEM (Module-Lattice Key Encapsulation Mechanism) and HQC (Hamming Quasi-Cyclic) are both post-quantum cryptographic key encapsulation mechanisms (KEMs) designed to provide secure key exchange in the presence of CRQCs (Cryptographically Relevant Quantum Computers). ML-KEM is based on the (M-LWE) Module Learning With Errors problem, which involves finding a short vector between two points in a high […]

Read MoreMore Tag

Coming soon: HQC KEM

Hello there! You! We know you are out there. You learned about Hamming codes in college or university, and maybe even use them in your professional career in consumer electronics or telecommunications. Now you are wondering how simple error correcting codes can be transformed into a KEM (Key Encapsulation Mechanism) for doing secure key transport. […]

Read MoreMore Tag

Live Webinar: Everything You Need to Know About Automotive Cybersecurity

Strengthen your vehicle’s defenses with proven cybersecurity solutions. Join us on July 23 at 9 AM PT for a live automotive cybersecurity webinar, “Everything You Need to Know About Automotive Cybersecurity,” presented by Senior Software Engineer Eric Blankenhorn. This session explores the growing need for secure, connected, and software-defined vehicles. You’ll learn about wolfSSL’s approach […]

Read MoreMore Tag

wolfSSL 5.8.2 Now Available

wolfSSL 5.8.2 is now available! We are excited to announce the release of wolfSSL 5.8.2, packed with significant enhancements, introducing new functionalities, and refining existing features! Important Notes for this Release GPLv3 Licensing: wolfSSL has transitioned from GPLv2 to GPLv3. Deprecated Feature: `–enable-heapmath` is now deprecated. MD5 Disabled by Default: For enhanced security, MD5 is […]

Read MoreMore Tag

ML-KEM Versus ML-DSA

ML-KEM (Module Lattice Key Encapsulation Mechanism) is for secure key exchange. ML-KEM enables two parties to establish a shared secret key over an insecure channel. ML-DSA (Module Lattice Digital Signature Algorithm) is for authentication. ML-DSA allows a signer to generate a digital signature that can be verified by others, ensuring the authenticity and integrity of […]

Read MoreMore Tag

Using ECH with curl and wolfSSL

The Server Name Indication (SNI) extension to TLS allows the client to specify the name of the server it is trying to connect to, which allows the server to select between multiple virtual servers and present the appropriate certificate for the connection. The client sends the server name as a part of a Client Hello […]

Read MoreMore Tag

Trusted by Design: How wolfSSL and Dark Sky Technology Came Together

How wolfSSL and Dark Sky Technology Secure Embedded Systems When defense systems run open-source code touched by foreign adversaries, it’s not just risky—it’s a national security threat. That’s why wolfSSL and Dark Sky Technology teamed up: to combine certifiable cryptography with provable trust. wolfSSL builds the most trusted cryptography on the market. Our lightweight, FIPS […]

Read MoreMore Tag

Posts navigation

1 2 3 8 9 10 11 12 13 14 215 216 217

Weekly updates

Archives