We are thrilled to recognize Dr. Jon Durrant (@DrJonEA) for his exceptional work highlighting wolfSSL across multiple platforms. His dedication to showcasing wolfSSL’s capabilities in real-world IoT and embedded systems projects has been truly outstanding. Jon has 25+ years as an IT professional. With a PhD in Object Oriented Development and Distributed System Design from […]
Read MoreMore TagCategory: Uncategorized
Securing BoringTun with wolfSSL’s FIPS 140-3 Cryptography
We’re excited to announce that wolfSSL is taking the next step in its journey to bring FIPS 140-3 compliance to the WireGuard ecosystem. Following our successful ports of our FIPS crypto into both WireGuard-linux and Wireguard-GO, we are setting our sights on a new target: BoringTun. BoringTun is a popular, high-performance implementation of the WireGuard […]
Read MoreMore TagCRL vs OCSP: Secure Certificate Revocation with wolfSSL
Ensuring your TLS certificates are still valid and haven’t been revoked is critical for secure communications. Two methods exist for this: Certificate Revocation Lists (CRLs) are signed lists published by Certificate Authorities that clients download and check offline. They contain serial numbers of revoked certificates and must be regularly updated and cached by clients to […]
Read MoreMore TagProtect TLS Secrets After the Handshake — Only with wolfSSL
Most TLS libraries leave your certificates and private keys sitting in RAM long after they’re used — a jackpot for attackers with memory access. wolfSSL is the only TLS library that gives you the power to erase them completely with the wolfSSL_UnloadCertsKeys API. This function doesn’t just free memory — it securely zeroes out every […]
Read MoreMore TagLive Webinar: An introduction to Stateful Hash-Based Signature Schemes
Unlock the Next Era of Cybersecurity with Stateful Hash-Based Signatures! Join “An Introduction to Stateful Hash-Based Signature Schemes” on September 11 at 9:00 AM PT, presented by Senior Software Developer Anthony Hu. Learn the fundamentals of these quantum-resistant signatures and their role in securing long-lived systems. Stateful hash-based signature schemes use one-time signatures and Merkle […]
Read MoreMore TagKeystores and Secure Elements supported by wolfSSL
When looking to store your cryptographic secrets, it is important to have a good platform to store them on. Even more important is the ease of accessing and using those secrets. With wolfTPM, we have support for all TPM 2.0 APIs. Additionally we provide the following wrappers: Key Generation/Loading RSA encrypt/decrypt ECC sign/verify ECDH NV […]
Read MoreMore TagDeprecation Notice: TLS 1.3 Draft 18
The wolfSSL team is deprecating the following: WOLFSSL_TLS13_DRAFT preprocessor macro –enable-tls13-draft18 configure option These components were originally introduced during the TLS 1.3 standardization process to support interoperability with implementations based on Draft 18 of the TLS 1.3 specification. During the multi-year standardization process (2014-2018), multiple draft versions were published before the final RFC 8446 was […]
Read MoreMore TagSLIM: Securing AI Agent Communication with MLS
As artificial intelligence continues to evolve and transform industries, here at wolfSSL we are closely monitoring developments in Agent to Agent communication protocols such as A2A and SLIM. We recently wrote our blog post “A2A and wolfSSL” talking about how it is secured via TLS. One particularly interesting development in this space is SLIM (Secure […]
Read MoreMore TagDICE Boot Chain Via wolfCrypt’s Minimal Binary Footprint
Device Identifier Composition Engine (DICE) represents a fairly simple approach to hardware-based device identity and secure boot. DICE creates Cryptographic Device Identities (CDIs) through a blockchain-like verification process, where each boot stage measures the next component and derives unique Compound Device Identifiers using the following formula: CDI_n = HMAC(CDI_n-1, Hash(program)) CDI_0 = UDS The formulas […]
Read MoreMore TagLive Webinar: Everything You Need to Know About Medical Device Cybersecurity – Tailored for the Asia-Pacific Time Zone
Elevate your cybersecurity strategy with proven solutions built for connected care. Join us on September 4th at 5 PM PT / September 5th at 9 AM JST for a live webinar led by wolfSSL Senior Software Engineer Eric Blankenhorn. We’ll cover how to strengthen cybersecurity across the entire medical device ecosystem from implantables and patient […]
Read MoreMore Tag
