Hi! Are you a user of Arch Linux? wolfSSL 3.12.0 is now available as a package in the Arch User Repository! https://aur.archlinux.org/packages/wolfssl wolfSSL, written in C, supports industry protocol standards up to TLS 1.3 and DTLS 1.2 and progressive ciphers including ChaCha20, Poly1305, Curve25519, Ed25519, and SHA-3. We encourage you to give our package a try and let […]
Read MoreMore TagCategory: Uncategorized
wolfSSL FIPS with Intel® SGX
wolfSSL supports use with Intel® SGX on both Windows and Linux. In addition to being available on both operating systems the Linux example includes running a full TLS connection in a secure Enclave. Examples can be found on GitHub under wolfssl/wolfssl-examples located here (https://github.com/wolfSSL/wolfssl-examples). One of the exciting upcoming features this year, is that wolfSSL […]
Read MoreMore TagwolfCrypt FIPS 140-2 on ARM
Do you need a FIPS 140-2 validated cryptography library for your ARM-based platform? wolfCrypt has been FIPS 140-2 validated on several different operating environments to date, some of which have been on resource-constrained ARM-based devices. FIPS validating a crypto library on a resource-constrained device can be more involved than doing a validation on a standard […]
Read MoreMore TagwolfSSL FIPS – A Year in Review (Part 2 of a 3 Part Series)
Greetings! In this post we are covering Operational Environment’s (OE’s) we worked with this past year. These OE’s were validated under an OEM relationship where the company validating is licensed to resell the wolfCrypt FIPS product under their own brand name. wolfSSL was particularly excited about both of these projects as they display the great […]
Read MoreMore TagwolfSSL 3.12.0 Now Available
wolfSSL 3.12.0 is now available for download! This release contains bug fixes, new features, and includes fixes for one security vulnerability (low level). The one low level vulnerability fix included in this release is in relation to a potential DoS attack on a wolfSSL client. Previously a client would accept many warning alert messages without […]
Read MoreMore TagwolfSSL and libFuzzer
libFuzzer, a fuzzing engine created by LLVM, is now being used to test the wolfSSL library. Below is a short description of libFuzzer, taken from LLVM’s website here. LibFuzzer is linked with the library under test, and feeds fuzzed inputs to the library via a specific fuzzing entrypoint (aka “target function”); the fuzzer then tracks […]
Read MoreMore TagwolfSSL FIPS – A Year in Review (Part 1 of a 3 Part Series)
wolfSSL is pleased to bring our community a report of the past years FIPS activities. In part one of this three-part series we will cover the new Operating Environments (OEs) added to the wolfSSL certificate in the past year + CAVP algorithm testing done by wolfSSL. Part two of this series will cover OEs tested […]
Read MoreMore TagTLS 1.3 Reducing Latency
As we’ve mentioned in a previous blog post one of the key advantages of TLS 1.3 is the reduction in round-trips. Older versions of the TLS protocol require two complete round-trips before the client sends the application data. With TLS v1.3 only 1 round-trip is required! This means network latency has less impact on the […]
Read MoreMore TagwolfCrypt JNI Wrapper and JCE Provider
The wolfCrypt cryptography library is now available to Java developers! wolfSSL recently released a JNI wrapper and JCE provider that wraps the native C wolfCrypt library. The JCE (Java Cryptographic Extension) framework supports the installation of custom Cryptographic Service Providers which can in turn implement a subset of the underlying cryptographic functionality used by the […]
Read MoreMore TagNXP Kinetis K8X LTC support for PKI (RSA/ECC) with #TLS13
As our readers have seen us post about in the past, NXP has a new LP Trusted Crypto (LTC) core which accelerates RSA/ECC PKI in their Kinetis K8x line. The LTC hardware accelerator improves: * RSA performance by 12-17X * ECC performance by 18-23X * Ed/Curve25519 performance by 2-3X. wolfSSL now provides support for TLS […]
Read MoreMore Tag
