The new release of wolfSSL, v2.9.0, is now ready to download from our website. New features include: Platforms: – Freescale Kinetis * RNGB support (K53 Sub-Family Reference Manual, Chapter 33) * mmCAU support (ColdFire/ColdFire+ CAU and Kinetis mmCAU Software Library User Guide) – Microchip * MPLAB Harmony support TLS Extensions: – Supported Curves – Secure […]
Read MoreMore TagCategory: Uncategorized
Using Supported Elliptic Curves Extension with wolfSSL
We are back to talk about TLS extensions again. Today we present the addition of Supported Elliptic Curves on wolfSSL! RFC 4492 introduces five new ECC-based key exchange algorithms for TLS: ECDH_ECDSA, ECDHE_ECDSA, ECDH_RSA, ECDHE_RSA and ECDH_anon. However, it may be desirable in constrained environments to only support a limited number of curves. When a […]
Read MoreMore TagOCSP in wolfSSL Embedded SSL
Hi! Do you need OCSP (Online Certificate Status Protocol) in wolfSSL? We added OCSP as a wolfSSL feature back in 2011. At this point it is well tested by our users and well into the deployment phase. More information on the protocol is available here: http://www.ietf.org/rfc/rfc2560.txt. The gist of the feature is that a client […]
Read MoreMore TagInteresting SmartGrid use case for wolfSSL: ISO 15118
Hi! If you`re interested in smart grid security, and specifically the security required when connecting an electric car to the smart grid, this post is for you! wolfSSL has recently been supporting the development efforts of eNterop (as of 26 March 2018 at 9:30m MDT, this link no longer works and has no alternative), which is […]
Read MoreMore TagwolfSSL 2013 Annual Report
2013 was an interesting year in the world of cryptography and computer security. We have seen and mitigated against attacks such as Lucky13 and watched with interest as existing technologies such as Dual_EC_DRBG have become widely regarded as insecure. wolfSSL has been happy to provide our users with timely fixes, suggestions, and new technologies to […]
Read MoreMore TagSoftware Defined Networking and CyaSSL
Hi! Someone told us the other day that Software Defined Networking (SDN) is stupid. No way will SDN ever replace the high end networking gear, we were told. We were reminded of a scientific study that proved unequivocally that babies are stupid, courtesy of The Onion. But of course babies grow, and eventually have much greater […]
Read MoreMore TagTechnologies and Techniques for Securing Connected Devices
wolfSSL will be presenting a session titled “Technologies and Techniques for Securing Connected Devices” at the upcoming 2014 Embedded World Conference in Nürnberg, Germany. If you are going to be attending the conference, we welcome you to come and listen to our presentation. Technologies and Techniques for Securing Connected DevicesSession: 17Day: 02.27.2014Time: 11:30am – 12:00pmSpeaker: […]
Read MoreMore TagUsing the MIT Kerberos GSS-API with wolfSSL on Android
Are you interested on using the GSS-API with Kerberos on Android? If so, you’ll be happy to hear about wolfSSL’s port of the MIT GSS-API library to Android platform – complete with an org.ietf.jgss (RFC 5653) compatible application programming interface, CyaSSL cryptography integration, and NDK sample application. You may have read our previous blog entries […]
Read MoreMore TagMore Dual_EC_DRBG News
It was reported yesterday in The Guardian and elsewhere that the NSA paid RSA $10M to set Dual_EC_DRBG as their default PRNG. See the news here: http://www.theguardian.com/world/2013/dec/20/nsa-internet-security-rsa-secret-10m-encryption. As we have previously stated, we never implemented Dual_EC_DRBG in any of our products, much less set it as default, because of its suspect nature. If you`re […]
Read MoreMore TagSSL/TLS and Cryptography Benchmarks
Some of our users have been wondering if we were doing benchmarks of our SSL and cryptography performance. Here are the results we have gathered so far: wolfSSL / CTaoCrypt Benchmarking.Let us know if we should do a different kind of benchmark at facts@wolfssl.com
Read MoreMore Tag
