Developing robust, secure networking for embedded systems just got a whole lot smoother. We are excited to announce that wolfIP now features official STM32CubeMX Pack support. Manual integration of networking stacks can be a headache, often requiring tedious porting and configuration. By introducing this CubePack, we’ve bridged the gap between the wolfIP stack and the […]
Read MoreMore TagCategory: Uncategorized
From TLS Blindness to Full Visibility: How eBPF Changes Observability
The Visibility Problem No One Likes to Admit Over the past decade, systems have become more secure, more distributed, and more encrypted. That’s a good thing. But it has also made observability harder than ever. With TLS 1.3 now standard, most production traffic is fully encrypted end-to-end. Traditional packet capture tools, network taps, and middleboxes […]
Read MoreMore TagIs GRPC on Zephyr the Right Choice for You
On Zephyr, which is best for you? GRPC or MQTT You might be wondering if MQTT or GRPC would be best for your use case. Here are 3 questions you might want to ask yourself: Do you have a request-response use case? For example, are you asking for the temperature and then sending a command […]
Read MoreMore TagTLS vs. SSH: When To Use Which (2026 Edition)
TLS and SSH are both widely used protocols for creating secure connections between two systems over an untrusted network. Although they share some fundamental goals, they are designed for different use cases. In this updated guide, we will explore when you should use which, along with a look at the latest developments in both protocols. […]
Read MoreMore TagA Second Helping of Security for the Raspberry Pi Pico
Last year, we wrote about the support we added for the Raspberry Pi Pico in wolfSSL. Since then, we haven’t been sitting idle. The wolf pack has been busy adding even more security goodness to the Pico ecosystem. If you thought TLS on a $1 microcontroller was impressive, wait until you see what we’ve been […]
Read MoreMore Tagcurl up 2026 Registration Closing Soon — Join Us in Prague
Spend a weekend with the people behind curl! Join us for curl up 2026, a highly interactive meetup for developers, users, and contributors of curl. Meet in Prague with the engineers behind curl to discuss real-world use, current challenges, and what’s coming next. May 23-24 | Prague, Czechia What is curl up? curl up is […]
Read MoreMore TagPost-Quantum Cryptography Is Coming to wolfTPM
ML-DSA and ML-KEM Support for TPM 2.0 Library Specification v1.85 Quantum-Safe TPM Operations Are on the Way wolfSSL is excited to announce that post-quantum cryptography (PQC) support is coming to wolfTPM. wolfTPM will be among the first TPM 2.0 libraries to implement the newly-published TCG TPM 2.0 Library Specification v1.85, which adds the NIST-standardized post-quantum […]
Read MoreMore TagwolfTPM Firmware TPM (fwTPM) Post-Quantum Release: Portable Software TPM 2.0 with ML-DSA and ML-KEM Support
Post-Quantum Firmware TPM Is Here wolfTPM’s firmware TPM (fwTPM) is available with post-quantum cryptography support added through the TCG TPM 2.0 Library Specification v1.85. fwTPM is wolfSSL’s portable software TPM 2.0 implementation, built on wolfCrypt and intended for products that need a TPM 2.0 interface without a discrete TPM chip. The post-quantum work merged in […]
Read MoreMore TagRSA-PSS Support for PKCS#7 SignedData in wolfSSL
PKCS#7, standardized as Cryptographic Message Syntax (CMS) in RFC 5652, is a common format for signing structured data. Signed firmware updates, signed configuration packages, and certificate-based authentication workflows all rely on PKCS#7 SignedData to ensure integrity and authenticity.wolfSSL now supports RSA-PSS (RSASSA-PSS) signatures in PKCS#7 SignedData, for both generation and verification. This lets applications move […]
Read MoreMore TagTPM 2.0 Sealing Policies with wolfTPM: PCR Policies, Policy Authorize, and NV Storage for TPM 2.0 Secrets
Background: TPM 2.0 Sealing and PCR Policies TPM 2.0 sealing binds a secret to a set of Platform Configuration Register (PCR) values. The TPM will only release the secret when the current PCR state matches what was recorded at seal time. This is the foundation for measured boot, disk encryption key protection, and platform attestation. […]
Read MoreMore Tag
