OpenSSL released a security advisory on July 9th 2015: https://www.openssl.org/news/secadv_20150709.txt . Some wolfSSL embedded TLS users are probably wondering if similar security fixes are required in wolfSSL. The answer to that is no. Specifically, Alternative chains certificate forgery (CVE-2015-1793) is an OpenSSL implementation bug. Faulty logic allowed untrusted certificates to appear as trusted. Since wolfSSL, CyaSSL, and yaSSL […]
Read MoreMore TagCategory: Uncategorized
wolfSSL Inc. scores 100% in support satisfaction
Hi! As many of our users know, we use Zendesk to track our support tickets. Zendesk includes some sweet tools that we enjoy, including an automated user satisfaction tool. The tool surveys users after they have submitted a support case to us. Upon review of our support statistics for the first half of this year, […]
Read MoreMore TagwolfCrypt API Reference Now Available
For those who want to use wolfCrypt separately to do cryptography operations, we are happy to announce that the first version of the wolfCrypt API documentation is now available. The wolfCrypt API Reference is available to browse online and also available for download in PDF format. Link: wolfCrypt API Reference wolfCrypt has a broad range […]
Read MoreMore TagMemory Optimized Curve25519 and Ed25519
If working on a memory constrained device we now have memory optimized Ed25519 and Curve25519 options. This can be enabled with using the configure setting “./configure –enable-ed25519=small –enable-curve25519=small –enable-sha512”. The new feature allows for a trade off in memory usage versus speed. All of the operations in the memory optimized build, except for SHA-512, use […]
Read MoreMore TagwolfSSL Inc Partners with Freescale to Deliver Advanced, High Performance IoT Security Solutions, Complete with Embedded SSL and Hardware Based Encryption
“wolfSSL enables Freescale`s hardware encryption for embedded tls, embedded cryptography, and the IoT” wolfSSL Inc, the most popular embedded SSL, cryptography, and FIPS 140-2 provider for the IoT, has partnered with Freescale to deliver high performance, hardware enabled cryptography for Freescale`s MQX RTOS on the Kinetis platform. The hardware cryptography is enabled through wolfSSL`s well […]
Read MoreMore TagExpert Interview: Is the future of wearables now?
Larry Stefonic, our CEO, was recently interviewed by TechnologyAdvice on the future of wearables: an important space for embedded SSL/TLS and cryptography. With the advent of the Internet of Things we are increasingly using connected devices throughout our day. Unsecured, these devices leave us vulnerable in ways not even imaginable 20 years ago. Larry talks […]
Read MoreMore TagwolfSSL 3.6.0 Released
The new release of the wolfSSL embedded SSL library has bug fixes and new features including: – Max Strength build that only allows TLSv1.2, AEAD ciphers, and PFS (Perfect Forward Secrecy). With –enable-maxstrength.– Server side session ticket support, the example server and echoserver use the example callback myTicketEncCb(), see wolfSSL_CTX_set_TicketEncCb().– FIPS version submitted for iOS.– […]
Read MoreMore TagLevel of Security provided in ChaCha20-Poly1305 AEAD
Have you heard about the recent ChaCha20-Poly1305 AEAD and are wondering about how secure it is? It`s comprised of two ciphers, ChaCha20 and Poly1305, that are designed to be constant time, making it naturally resistant to timing attacks. The AEAD is being used by many notable companies that also trust it for their security – […]
Read MoreMore TagwolfSSL Unaffected by Recent OpenSSL Security Fixes
OpenSSL released a security advisory on June 11th 2015: https://www.openssl.org/news/secadv_20150611.txt. Some wolfSSL embedded TLS users are probably wondering if similar security fixes are needed in wolfSSL. The answer to that is no. Specifically, CVE-2015-1788 – 1792 and CVE-2014-8176 are OpenSSL implementation bugs. Since wolfSSL and CyaSSL embedded SSL libraries have a completely different code base […]
Read MoreMore TagFIPS 186-4 KeyGen
To support our customers pursuing FIPS 140-2 validations or Common Criteria evaluations, wolfSSL is adding FIPS 186-4 KeyGen to our next FIPS 140-2 validation. We are scheduled to complete CAVP algorithm testing in June and testing with our FIPS Laboratory in July. Please contact wolfSSL at fips@wolfssl.com if you need a tested implementation of FIPS […]
Read MoreMore Tag
