Did you know that wolfSSL is transport agnostic, and can run on bare metal? Did you know that we have DO-178 artifacts for our software? Are you aware of MITM attacks or spoofing attacks that could compromise your network? Let us know if you need help with security for your ARINC 664 transmissions. We can […]
Read MoreMore TagCategory: Uncategorized
Introducing wolfSentry
wolfSSL has a major new product in development — wolfSentry, the universal, dynamic, embeddable IDPS (intrusion detection and prevention system). At a high level, wolfSentry is a dynamically configurable logic hub, arbitrarily associating user-defined events with user-defined actions, contextualized by connection attributes, tracking the evolution of the client-server relationship. At a low level, wolfSentry is […]
Read MoreMore TagAre you using an Off Brand TLS?
It is not always easy to tell if your TLS vendor is legitimate. They might have great slide decks, a list of supported ciphers, and a smooth talking salesperson, but do they have what it takes to keep you secure? Here’s how you tell: Ask them if they do fuzz testing. If you get a […]
Read MoreMore TagI-CUBE-WOLFSSL is MadeForSTM32 Certified
wolfSSL software expansion package for STM32Cube is among the first to be MadeForSTM32 certified with V2 label! Having gone through the evaluation process, we’re pleased to announce that I-CUBE-WOLFSSL V4.6.0 is granted MadeForSTM32 V2, a new quality label introduced by STMicroelectronics for the STM32 microcontrollers ecosystem. wolfSSL offers support for STM32Cube Expansion Package enhanced […]
Read MoreMore TagXilinx “Zynq UltraScale+ MPSoC’s” Benchmarking with wolfSSL
Benchmark values of the wolfSSL embedded SSL/TLS library running on Xilinx boards, including the ZCU102, have been collected and are up for viewing. Our friends over at Xilinx have a white paper posted that goes into detail about the benchmark values here: https://www.xilinx.com/support/documentation/white_papers/wp512-accel-crypto.pdf. This shows how much faster applications can perform secure operations when incorporating the hardware acceleration […]
Read MoreMore TagEmbedded Bootloader with hardware acceleration and cryptography
Most bootloaders do not use hardware acceleration and cryptography. wolfSSL’s wolfBoot is an exception. wolfBoot can use Secure Elements, such as ATECC508A. Thanks to integration with wolfTPM, wolfBoot can also leverage TPM 2.0, such as STMicroelectronics ST33, Infineon SLB9670, Nuvoton NPC750 and other TPM modules. Thanks to wolfSSL’s cryptographic engine, wolfBoot can take advantage of […]
Read MoreMore TagwolfCrypt FIPS 140-3 status update!
Hi! We continue to make progress on our upcoming FIPS 140-3 certification. We have now completed code review, and are working with our lab on operational testing. The process will be in NIST’s hands after that. Our goal is to be the first software cryptographic library with a FIPS 140-3 certification, and that looks like […]
Read MoreMore TagLeveraging Virtual Memory in the Linux Kernel
In wolfSSL release 4.7, the Linux kernel module implementation has been enhanced to use kvmalloc() and kvfree() for heap-based storage. The typical approach using kmalloc() allocates physically contiguous memory, with meaningful limitations on the maximum size of allocation and the impact of those allocations on other system components. kvmalloc(), by contrast, uses vmalloc() internally to […]
Read MoreMore TagReproducible Builds for Confident Testing and Release Engineering
wolfSSL release 4.7 includes –enable-reproducible-build, a new configuration option that suppresses the binary jitter (timestamps and other non-functional metadata) that is otherwise common in various build processes. With –enable-reproducible-build, test and release engineers can carefully align build environments, then generate bitwise-identical binary packages with identical hashes. Using –enable-reproducible-build, FOSS binary distributors can publish their build […]
Read MoreMore TagwolfBoot support for ARM TrustZone
Since version 1.7.1, wolfBoot provides support for secure boot on systems with a Trusted Execution Environment (TEE). wolfBoot provides embedded developers with a code base that complies with the specification for the separation between secure and non-secure world, on those CPUs and microcontrollers that support it. On ARMv8 Cortex-A CPU and Cortex-M microcontrollers it is […]
Read MoreMore Tag
