The wolfSSL embedded SSL/TLS library has added the option for using ECDHE-PSK cipher suites. This opens up using the small memory size ECC keys with PSK on embedded devices. PSK (pre shared keys) is a viable option when controlling both ends of the connection. It allows for saving memory and computation time when performing a […]
Read MoreMore TagCategory: Uncategorized
wolfSSL announces wolfCLU (a command line utility)
wolfSSL has laid the groundwork for a portable command line utility. We wanted our community to be aware so you have the opportunity to begin using it with the wolfSSL embedded SSL/TLS library! wolfCLU currently has the following features: – Autoconf for portability – Encrypt a file and store it locally on your computer – […]
Read MoreMore TagwolfSSL with the Atmel Hardware-TLS Platform
wolfSSL has partnered with Atmel to provide users of the wolfSSL embedded SSL/TLS library the ability to take advantage of the Atmel ATECC508A crypto element. From the Atmel page: “Due to lack of better alternatives, TLS implementations have historically stored private keys and authentication credentials in software where they are more vulnerable to attack. In […]
Read MoreMore TagwolfSSL Version 3.9.0 Released
A new release of wolfSSL is now available. Version 3.9.0 of the industry leading embedded SSL/TLS library has a number of additions, updates, and fixes. With the addition of ports to both Arduino boards and to the Nordic nRF51 board wolfSSL is adding to its ever increasing IoT use. This release version also has an […]
Read MoreMore TagwolfSSL and CyaSSL are Not Vulnerable to DROWN Attack
The recently-announced DROWN attack allows attackers to decrypt TLS sessions by taking advantage of servers that support SSLv2 and EXPORT cipher suites. SSL 2.0 was the first version of the SSL/TLS protocol standard released, and has been known to be insecure for many years now. wolfSSL has never supported SSL 2.0 and has never had […]
Read MoreMore TagFree Early Warning on Breaches
Hi! Please email us if you want to join our Free Early Warning list. We will put you on our list of people to tell when there is a breach or vulnerability. Email us at facts@wolfssl.com with the subject Free Early Warning in the subject, and we’ll add you to the list.
Read MoreMore TagTransport-level security tradeoffs using MQTT
By Todd Ouska, wolfSSL The Message Queuing Telemetry Transport protocol, or MQTT, has become a favorite of Internet of Things (IoT) developers, and why not? It’s incredibly lightweight (on the order of a couple Kb for client implementations), has easy-to-use APIs, and is available for free under the Eclipse Public License (EPL). If your connected […]
Read MoreMore TagwolfSSL Adds Secure SSL/TLS Encryption to MQTT IoT Protocol in Lightweight wolfMQTT Library
wolfSSL recently published a press released talking about the release of wolfMQTT, and its use with the wolfSSL embedded SSL/TLS library: “3.6 kB MQTT client implementation easily integrates with the wolfSSL embedded SSL library for resource-constrained Internet of Things devices and connected applications. wolfSSL, a leading provider of security and connectivity solutions for the embedded, […]
Read MoreMore TagSecure Email Client with Freescale KSDK + wolfSSL + FRDM-K64F
Are you interested in having a secure email client on your Freescale Kinetis device? How about one that uses wolfSSL too! A member of the Freescale/NXP community (Denis Shimizu) recently adapted the original SMTP protocol implementation that is included with KSDK 1.3 to add in secure connections using the wolfSSL lightweight SSL/TLS library. The example […]
Read MoreMore TagOverview of Testing in wolfSSL
The security of wolfSSL products is always on our mind and holds high importance. Conducting regular, diligent, and well-planned testing helps maintain wolfSSL’s robustness and security. We strive to write and maintain clean, readable, and understandable code. Like the halting problem, we know it is impossible to test every single possible path through the software, […]
Read MoreMore Tag
