Fact-checked by Grok 2 weeks ago

wolfSSL

wolfSSL is a , portable, C-language-based designed primarily for embedded systems, (IoT) devices, real-time operating systems (RTOS), and resource-constrained environments, providing protocols such as TLS 1.3 and DTLS 1.3. Developed by wolfSSL Inc., it offers an alternative to larger libraries like , being up to 20 times smaller in footprint while maintaining high performance, standards compliance, and features like OCSP/CRL support, validation (certificates #4718 and #5041), and DAL-A certification for applications. The is dual-licensed under the GPLv2 for open-source use and commercial licenses for proprietary applications, and it includes compatibility layers for APIs to ease integration. Originally released as CyaSSL, the library was renamed to wolfSSL in 2015 to align with the company's product naming conventions, with no changes to its core structure, licensing, or functionality during the transition. Founded in 2004 by Larry Stefonic and Todd Ouska in the United States, wolfSSL Inc. aimed to address the need for a secure, open-source SSL/TLS solution optimized for embedded use, featuring a modern API, clear commercial support, and portability across platforms. Today, wolfSSL secures over 5 billion devices and applications worldwide, with integrations in major projects such as MySQL, OpenWRT, cURL, and Ubuntu, and it extends beyond core TLS to related products like wolfCrypt for cryptography, wolfMQTT for messaging, and wolfSSH for secure shell access.

Overview

Description

wolfSSL is an open-source implementation of the SSL/TLS protocols, written in and designed as a lightweight library optimized for minimal size, high speed, and broad portability across diverse hardware and software environments. It primarily serves developers building embedded systems, (IoT) devices, and (RTOS) applications, where resource constraints demand efficient security solutions without compromising on standards compliance or performance. The library includes core client and server components for establishing secure connections, along with an OpenSSL API compatibility layer that enables seamless integration as a for larger libraries in existing codebases. With a typical binary footprint of 30-50 KB, wolfSSL achieves up to 20 times smaller size than , making it ideal for memory-limited deployments. Developed by wolfSSL Inc., a founded by Todd Ouska and Larry Stefonic, the library evolved from the earlier yaSSL project to address the need for embedded-friendly .

Key Features

wolfSSL is renowned for its high portability, implemented in to ensure seamless compilation across diverse architectures and platforms without requiring platform-specific code modifications. This design allows developers to integrate the library into embedded systems, desktops, and cloud environments with minimal adjustments, supporting abstraction layers for operating systems, custom I/O, and standard C libraries. The library maintains strict standards compliance, providing full support for TLS 1.3 as outlined in RFC 8446, along with related extensions such as RFC 6066 for secure renegotiation, RFC 5246 for TLS 1.2, RFC 7301 for , and RFC 8446 for post-handshake authentication. It incorporates progressive cipher suites, enabling the use of modern algorithms like and while allowing configurable enablement of legacy options for . Security is a core strength, with built-in support for fuzz testing through integration with tools like OSS-Fuzz to identify vulnerabilities via automated input mutation. The library includes resistance to side-channel attacks through configurable options such as ECC_TIMING_RESISTANT for operations, TFM_TIMING_RESISTANT for math library timing, and WC_RSA_BLINDING for blinding to prevent timing-based leaks. Progressive enablement further enhances security by defaulting to contemporary, audited primitives while permitting selective activation of others. Performance optimizations are tailored for resource-constrained environments, featuring assembly-optimized routines for critical operations like encryption on / processors, which can yield up to 5-10x speedups via AES-NI instructions. Stream ciphers such as and block ciphers like are implemented with efficient, low-memory footprints, typically ranging from 20-100 in size and 1-36 in runtime memory. Interoperability is facilitated by the wolfSSL API, which offers a lightweight alternative to more verbose libraries, and a dedicated that enables wolfSSL to serve as a for in applications like and . This layer supports equivalent cipher suites, such as TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, ensuring smooth migration without extensive code changes. Additional tools bolster development and analysis, including built-in benchmarking utilities to measure throughput and across configurations, an SSL sniffer for protocol inspection supporting ciphers like AES-GCM and , and comprehensive and parsing APIs for handling certificates and keys in PEM and DER formats.

History

Origins and Early Development

wolfSSL originated in 2004 when Todd Ouska and Larry Stefonic founded the project as yaSSL, motivated by the absence of a , open-source SSL suitable for systems. At the time, was the dominant option but suffered from limitations in portability, code size, performance, and commercial licensing clarity, making it unsuitable for resource-constrained environments. yaSSL was designed as a compact alternative, initially implemented in C++ to provide SSL 3.0 and TLS 1.0 support while prioritizing efficiency and ease of integration. A significant early milestone came in 2005 with yaSSL's integration into , the world's most popular open-source database, enabling secure connections without relying on heavier libraries like . This bundling marked the project's first major adoption, highlighting its value in production environments and contributing to widespread distribution. MySQL's inclusion of yaSSL addressed licensing compatibility issues, as both projects shared a dual-licensing model under GPLv2 and commercial terms, allowing use in both open-source and proprietary applications. The project evolved with the initial public release of CyaSSL on February 19, 2006, a pure-C reimplementation that maintained yaSSL's core goals but improved portability and reduced footprint for embedded use. CyaSSL retained the dual-licensing approach (GPLv2 with commercial options) to facilitate adoption in products, emphasizing a modern and commercial support. Key to its early success was robust support for SSL 3.0 and TLS 1.0 protocols in low-resource settings, including an that eased migration for developers. This foundational period established wolfSSL's (then CyaSSL) niche in embedded security, setting the stage for broader ecosystem integration while avoiding the bloat of contemporaries.

Major Milestones and Recent Advances

In , the library was renamed from CyaSSL to wolfSSL to better reflect its expanded capabilities beyond just SSL, encompassing broader TLS implementations and cryptographic functionalities for systems. The wolfCrypt library was introduced in 2012 as a standalone, FIPS-ready provider, separating core cryptographic operations from the SSL/TLS protocol layer to enable modular use in various applications. Key releases have marked significant advancements in protocol support and security. Version 3.11.0, released in May 2017, introduced TLS 1.3 support for both client and server sides. In June 2022, with version 5.4.0, wolfSSL added DTLS 1.3 support, aligning with the RFC 9147 standard published in April 2022. The most recent stable release, version 5.8.2 on July 17, 2025, includes mitigations for several vulnerabilities—such as , Apple certificate validation overrides (CVE-2025-7395), predictable RAND_bytes after fork (CVE-2025-7394), and blinding (CVE-2025-7396)—and disables by default to enhance security. Adoption has grown through integrations with major open-source projects, including Apache HTTPd (supported since version 4.2.0 in 2020), (with dedicated backend and consulting support), and (enabling hardware-accelerated cryptography). Partnerships with hardware vendors like NXP, , and have facilitated optimized implementations, such as NXP CAAM support for offloading cryptographic operations. In 2025, wolfSSL advanced its FIPS compliance with the FIPS strategy, a subscription model for continuous validation under (certificate #5041), eliminating expiration gaps and ensuring ongoing security updates. Enhanced integrations, including algorithms like and , were showcased at Embedded World 2025, demonstrating hybrid TLS 1.3 implementations for resource-constrained devices.

Supported Platforms

Operating Systems

wolfSSL offers comprehensive support for major general-purpose operating systems, enabling seamless integration into desktop, server, and mobile environments. It provides full compatibility with across modern versions on 32-bit and 64-bit architectures, as well as legacy embedded variants like , allowing developers to build and deploy secure applications without platform-specific modifications. For Linux distributions, wolfSSL features native integration with standard kernels, supporting a wide range of distributions such as and , and includes dedicated recipes for the to facilitate embedded Linux builds within broader Linux ecosystems. Additionally, it integrates with through the Android Open Source Project (), providing TLS/SSL functionality via JSSE providers for system-wide secure communications. On Apple platforms, wolfSSL is fully compatible with macOS and , with optimizations for including ARM-based processors like the and chips, ensuring high performance in native applications. This support extends to app development, adhering to platform requirements for . To streamline development, wolfSSL incorporates multiple build systems, including for cross-platform configuration, Autotools for environments, and native integration for Windows, which supports DLL and static library builds in debug and release modes. These tools enable straightforward compilation and customization across supported operating systems. Quality assurance is maintained through automated testing processes, including and (CI/CD) pipelines via Actions that validate builds on Windows, , and macOS, alongside configuration and unit tests to ensure reliability.

Embedded and RTOS Environments

wolfSSL is specifically adapted for resource-constrained systems and operating systems (RTOS), emphasizing portability, minimal usage, and deterministic to meet the demands of , industrial, and automotive applications. The library's implementation avoids platform-specific dependencies, enabling seamless integration into environments with limited RAM and flash , often as low as 20-100 KB code size and 1-36 KB runtime stack. wolfSSL provides native support for several prominent RTOS platforms, including , , , μITRON (across all versions under the framework), and . These integrations leverage wolfSSL's abstraction layers for threading, timers, and entropy sources, ensuring compatibility without requiring custom modifications. For instance, support includes validations (certificate #4718), while integration extends to wolfSSH for operations in embedded networks. On the hardware side, wolfSSL targets popular microcontroller families such as Espressif's series, STMicroelectronics' lineup, and NXP's MCX series, particularly for (IIoT) edge devices. These platforms benefit from wolfSSL's , allowing efficient use of on-chip peripherals while maintaining a small footprint suitable for battery-powered or low-power applications. To optimize for embedded constraints, wolfSSL offers configurable options to eliminate dynamic memory allocation, replacing malloc/ with static buffers via the --enable-staticmemory build or wolfSSL_CTX_load_static_memory() API. This ensures predictable behavior in systems and reduces vulnerability to fragmentation. Additionally, static control is achieved through compile-time tuning, such as disabling unused features or versions, depending on the . For safety-critical embedded deployments, wolfSSL complies with MISRA C guidelines, facilitating automotive applications under standards like by enforcing coding rules that enhance code reliability and reduce defects. A key example of wolfSSL's embedded utility is its integration with wolfBoot, a secure that supports both bare-metal and RTOS environments for and updates. wolfBoot uses wolfCrypt for cryptographic verification, enabling secure boot chains on platforms like and NXP MCX without an underlying OS, or alongside RTOS like for dynamic updates over TLS. This combination provides end-to-end security for device provisioning in IIoT scenarios.

Protocols

TLS and SSL Support

wolfSSL provides comprehensive support for the (TLS) protocol and its predecessor, the Secure Sockets Layer (SSL), enabling secure communication in and resource-constrained environments. The implements SSL 3.0, though it has been disabled by default since version 3.6.6 due to vulnerabilities, and is considered deprecated in modern deployments. TLS versions 1.0 through 1.3 are fully supported, with TLS 1.0 and 1.1 disabled by default since versions 3.13.0 (2017) and 5.6.6 (2023), respectively, due to deprecation per 8996 and concerns; TLS 1.3 offering compliance to 8446, including streamlined handshakes reduced to a single round-trip time and enhanced features like integrated key derivation. In both client and server modes, wolfSSL facilitates full handshake processes, including , , and negotiation, while supporting session resumption via session tickets for efficient reconnections without full re-authentication. Certificate verification is integrated, allowing customizable checks for chain validation, revocation status, and trust anchors to ensure peer authenticity. These modes are selectable through dedicated methods, such as wolfTLSv1_3_client_method() for clients and wolfTLSv1_3_server_method() for servers, promoting across diverse network endpoints. The library supports a range of cipher suites aligned with progressive security standards, including authenticated encryption with associated data (AEAD) modes like AES-GCM (e.g., TLS_AES_128_GCM_SHA256) and (e.g., TLS_CHACHA20_POLY1305_SHA256), which provide , , and replay protection. Weak suites, such as those using stream ciphers or static key exchanges without ephemeral Diffie-Hellman (e.g., non-PFS ), are deprecated and disabled by default to enforce perfect , though they can be re-enabled via build options if legacy compatibility is required. This selective inclusion prioritizes modern, efficient algorithms while maintaining compatibility with older systems through configurable lists. Key TLS extensions enhance wolfSSL's flexibility, including (SNI) for on shared IP addresses (RFC 6066), (ALPN) for multiplexing protocols like over TLS (RFC 7301), and for efficient certificate revocation checking without additional client-side queries. These extensions are enabled at compile time and can be negotiated during the to optimize and security in multi-protocol environments. Configuration of TLS and SSL support in wolfSSL occurs primarily at compile time through options like --enable-tls13 for TLS 1.3 or --enable-ssl for legacy SSL, generating an options.h header that defines availability and cipher preferences. Runtime enforcement is available via calls, such as wolfSSL_CTX_set_min_proto_version() to restrict minimum versions or wolfSSL_CTX_set_cipher_list() to specify allowed suites, allowing dynamic policy adjustments based on deployment needs without recompilation. This dual approach ensures tailored security postures for embedded applications.

DTLS Support

wolfSSL provides robust support for (DTLS), adapting the TLS protocol for unreliable datagram transports like to secure communications in environments prone to and reordering. The library implements DTLS versions 1.0 as specified in 4347, 1.2 as specified in 6347, and 1.3 as defined in 9147, enabling both client and server operations with features tailored to handle the challenges of connectionless protocols. To address the inherent issues of datagram networks, wolfSSL's DTLS implementation incorporates mechanisms for retransmission of lost messages using a timer-based approach and reordering of out-of-sequence packets during the and data transfer phases. These adaptations ensure reliable and secure session establishment despite network unreliability, with the library buffering incoming packets to reconstruct ordered sequences. DTLS in wolfSSL is particularly suited for (IoT) applications, such as securing the (CoAP) over , and real-time media streaming scenarios where low latency is critical, like in WebRTC-based communications. Key features include cookie exchange during the to mitigate denial-of-service () attacks by verifying client reachability without full resource commitment, and Path Maximum Transmission Unit (PMTU) to optimize packet sizing and avoid fragmentation. Integration with wolfSSL's TLS APIs is seamless, allowing developers to use familiar functions like wolfSSL_CTX_new and wolfSSL_connect by selecting DTLS methods such as wolfDTLSv1_2_client_method, with added internal buffering to manage during application data exchange. Performance optimizations in wolfSSL make DTLS suitable for resource-constrained embedded devices, including configurable anti-replay windows to prevent replay attacks as per 9147, reduced round trips in DTLS 1.3 for lower , and minimal through static buffer options.

Cryptographic Algorithms

wolfCrypt Library

The wolfCrypt library serves as the core cryptographic engine for the wolfSSL embedded SSL/TLS library, providing a lightweight, portable implementation of standard in . Designed for resource-constrained environments such as embedded systems and RTOS, it emphasizes small footprint, high performance, and compliance with security standards, including validation (certificates #4718 and #5041). While integrated internally by wolfSSL to handle protocol-level encryption and authentication, wolfCrypt can also operate as a standalone library for general-purpose cryptographic operations. wolfCrypt supports a range of symmetric encryption algorithms suitable for and . Key implementations include in modes such as CBC, GCM, CTR, CCM, and others, with key sizes ranging from 128 to 256 bits; ChaCha20 as a ; and Poly1305 for message authentication, often combined with ChaCha20 in AEAD constructions. These algorithms adhere to FIPS-approved where applicable, enabling secure data protection in bandwidth-limited scenarios. For hashing and message authentication, wolfCrypt includes (though deprecated in modern use), variants (224, 256, 384, and 512 bits), and for digest computation up to 512 bits, alongside for keyed hashing and for key derivation. These functions support integrity verification and key expansion in cryptographic protocols, with FIPS validation ensuring reliability for approved variants. Classical public-key algorithms in wolfCrypt facilitate secure and digital signatures. RSA supports keys up to 8192 bits for encryption and signing, operates over NIST P-521 and Brainpool curves up to 521 bits for efficient operations, and Ed25519 provides high-speed signatures on the . These primitives enable asymmetric without relying on quantum-resistant methods. Random number generation in wolfCrypt relies on a deterministic random bit generator (DRBG) compliant with , incorporating hash-based or HMAC-based mechanisms for reproducible yet secure randomness. It also integrates hardware sources, such as or device-specific RNGs, to seed the DRBG and meet requirements for and nonces. This ensures cryptographic strength across diverse hardware platforms. The library exposes a straightforward C API with high-level functions for ease of integration, such as wc_AesEncrypt for direct block encryption and wc_Sha256Update for incremental hashing, alongside lower-level primitives like key setup routines (e.g., wc_AesSetKey). These APIs include runtime checks for FIPS mode and support compatibility layers, allowing developers to abstract cryptographic details while maintaining portability.

Post-Quantum Cryptography

wolfSSL integrates (PQC) into its wolfCrypt library to protect against threats from quantum computers capable of breaking classical cryptographic algorithms like and . This support emphasizes NIST-standardized algorithms, including ML-KEM (formerly ) for key encapsulation mechanisms (KEMs) in variants such as ML-KEM-512, ML-KEM-768, and ML-KEM-1024, and ML-DSA (formerly ) for digital signatures in variants ML-DSA-44, ML-DSA-65, and ML-DSA-87. Additionally, wolfSSL supports stateful hash-based signature (HBS) schemes like LMS, HSS, XMSS, and XMSS^MT, as well as the stateless SLH-DSA (SPHINCS+), to provide quantum-resistant authentication options. A key aspect of wolfSSL's PQC implementation is its modes for TLS 1.3 , which combine classical algorithms with PQC ones to ensure backward compatibility and gradual migration. For example, groups like P256_ML_KEM_512 pair Diffie-Hellman with ML-KEM-512, allowing secure handshakes that resist both current and future quantum attacks. These are fully integrated into wolfSSL's TLS 1.3 and DTLS 1.3 implementations, extending to protocols like MQTTv5 and MQTT-SN for applications. Historically, wolfSSL supported the KEM algorithm during NIST's post-quantum competition but removed it after NIST's 2022 standardization announcement, which favored lattice-based alternatives like ML-KEM. Similarly, earlier integrations with the liboqs library included and other candidates, but these were phased out post-standardization to focus on approved schemes; future reintroduction of remains under consideration for enhanced signature performance. Performance-wise, wolfSSL's software implementations of PQC algorithms are optimized for platforms like x86_64 and , with hardware acceleration paths available via code. Benchmarks on an i7-1185G7 show ML-KEM-512 achieving at approximately 293,900 operations per second, encapsulation at 271,900 ops/s, and decapsulation at 237,300 ops/s, representing a 2-5x overhead compared to classical ECDH on similar . For signatures, ML-DSA-44 verifies at around 150,000 ops/s, suitable for systems, though stateful HBS schemes like XMSS offer faster verification at the cost of . Looking ahead, wolfSSL's roadmap targets full CNSA 2.0 by 2030, aligning with NSA timelines for migrating systems to PQC algorithms, including phased adoption of stateful HBS schemes for long-lived keys. As of November 2025, wolfSSL is pursuing validation for its PQC implementations to further support needs. This positions wolfSSL for use cases requiring long-term security, such as quantum-safe deployments and government communications, where hybrid PQC protects against "" threats.

Hardware Integration

Secure Element and HSM Support

wolfSSL provides integration with various secure elements to enable hardware-based key storage and cryptographic operations, enhancing security in resource-constrained environments. These integrations leverage wolfCrypt's API for abstraction, allowing developers to offload sensitive tasks such as key generation, signing, and storage to dedicated hardware without altering application code. For secure elements, wolfSSL supports the TriCore TC3xx series through wolfBoot, its secure , which authenticates firmware and utilizes the 's isolated environment for root-of-trust establishment. Additionally, wolfSSL has integrated support for the TROPIC01 secure element from Tropic Square, incorporating dedicated crypto callback functions in wolfCrypt version 5.8.2 to facilitate -backed operations like and during secure boot processes. wolfBoot further extends this capability by serving as a root-of-trust mechanism with the TROPIC01, ensuring integrity and secure updates in embedded systems. In the realm of hardware security modules (HSMs), wolfSSL offers wolfHSM, a portable, open-source designed primarily for automotive and enterprise applications, which abstracts , , and isolated processing to protect cryptographic keys and operations. wolfHSM supports offloading , signing, and secure to HSMs, providing a unified that integrates seamlessly with wolfCrypt for tasks like signing and . Complementing this, wolfSSL's interface enables standardized access to HSMs for key handling, allowing compatibility with devices such as Infineon TriCore AURIX, Renesas RH850, and ST SPC58, thereby facilitating secure token operations in diverse setups. With a strong automotive focus, wolfSSL's solutions align with ISO 21434 cybersecurity standards, emphasizing secure boot as a to verify software integrity, as highlighted in UN R155 regulations. This includes integration with NXP's S32 platform, where wolfCrypt and wolfBoot enable hardware-secured cryptographic acceleration and firmware protection on automotive microcontrollers. For space applications, wolfSSL announced a 2025 collaboration with Frontgrade Gaisler to integrate its security libraries, including wolfCrypt, with radiation-hardened electronics, aiming to bolster cybersecurity in harsh environments by combining hardware resilience with software-based key protection and authentication.

Cryptographic Accelerator Support

wolfSSL integrates hardware cryptographic accelerators to enhance the performance of cryptographic operations within its wolfCrypt library, offloading computations from the CPU to specialized hardware for faster execution and improved efficiency. This support targets both general-purpose processors and embedded system-on-chip (SoC) designs, enabling seamless utilization of hardware capabilities where available. For CPU extensions, wolfSSL leverages AES-NI instructions on and processor families to accelerate AES operations in modes such as GCM, CCM, , ECB, and CTR for 128-256 bit keys, providing significant performance gains over pure software implementations. Similarly, ARMv8 Crypto extensions are supported, including AES in , CTR, and GCM modes (128-256 bits), SHA-256 hashing, and GHASH for , allowing runtime optimization on compatible ARM-based devices. Additional x86 extensions like AVX1/AVX2 enable acceleration of SHA-256, SHA-384, SHA-512, ChaCha20, and Poly1305, while /RDSEED instructions from and provide hardware-based . In integrations, wolfSSL supports NXP's Cryptographic Accelerator and Assurance Module (CAAM) on series processors, accelerating encryption and hashing operations to reduce processing overhead in embedded environments. TrustZone CryptoCell 310 is integrated for secure cryptographic acceleration, including and SHA algorithms, often via partnerships with vendors like Renesas. microcontrollers from utilize built-in hardware for RNG, /3DES in /ECB modes, and in CBC/CTR (128-256 bits), enhancing security in resource-constrained devices. As an example, Espressif's benefits from wolfSSL's support for hardware RNG and acceleration, streamlining TLS implementations in wireless applications. Recent expansions include () Zynq UltraScale+ and Versal platforms, which accelerate -GCM (128/256 bits), (2048/4096 bits), , (384 bits), and true , with performance improvements noted for and automotive use cases as of 2025. Implementation in wolfCrypt involves runtime detection of hardware availability through compile-time options like --enable-cryptocb or the WOLF_CRYPTO_CB , which registers hardware callbacks via wc_CryptoCb_RegisterDevice for dynamic offloading of operations such as , SHA-256, , and . If is unavailable or unsupported, the library automatically falls back to optimized software implementations, ensuring portability across diverse platforms. This approach can deliver up to 10x speedup for -GCM , as demonstrated in benchmarks on supported . wolfSSL provides broad with over 50 cryptographic schemes across these accelerators, including various modes, SHA variants, curves, key sizes, and RNG sources, reflecting ongoing updates through 2025. The primary benefits of this hardware support include reduced CPU load in embedded systems, which is critical for applications, and enhanced power efficiency for battery-powered devices by minimizing computational cycles dedicated to . These optimizations make wolfSSL particularly suitable for , networking, and secure boot scenarios where performance and energy constraints are paramount.

Certifications

FIPS Validations

wolfSSL's wolfCrypt cryptographic library has achieved multiple validations under the (FIPS) 140, administered by the National Institute of Standards and Technology (NIST) Cryptographic Module Validation Program (CMVP). For , the library received Certificate #2425 in 2015 and Certificate #3389 in 2019, both covering the core software modules of wolfCrypt. Transitioning to the updated standard, wolfCrypt obtained Certificate #4718 in 2024, followed by Certificate #5041 in July 2025, which remains valid through July 17, 2030. These validations support an "" subscription model, allowing non-expiring updates to the certified module without requiring full revalidation for minor changes. The scope of these validations encompasses wolfCrypt software modules deployable across more than 80 operating environments, including various embedded systems, distributions, and real-time operating systems, with operational environment caveats specifying supported platforms and configurations. Approved algorithms within the FIPS boundary include AES-256 (in and GCM modes), SHA-384, ECDSA, , , , DRBG, and SHA-512, ensuring compliance for symmetric, asymmetric, and hashing operations. Compliance with NIST CMVP involves rigorous testing of the module's design, implementation, and security features, including power-up self-tests for cryptographic algorithms and conditional self-tests during operation to verify integrity. The FIPS boundary is drawn around wolfCrypt's core functions, enabling seamless integration into broader applications like TLS while maintaining certification. In 2025, wolfSSL advanced FIPS integration by incorporating the validated wolfCrypt into , providing FIPS-compliant networking for , system services, and media applications without modifying end-user code. Additionally, the company released WolfGuard, a enabled version of VPN, leveraging wolfCrypt for certified cryptography in high-performance tunneling.

Other Compliance Standards

wolfSSL's wolfCrypt library supports Common Criteria evaluations at EAL4+ and higher through certified integrations, enabling deployment in European markets where rigorous security assurances are mandated for IT products. These validations ensure that cryptographic operations meet international standards for protection against intentional tampering and high-level threats, as demonstrated in partnerships with hardware providers like NSING Technologies' NS350 TPM devices. For avionics applications, wolfCrypt supports RTCA DAL-A certification, providing traceable artifacts and certification kits for key cryptographic algorithms to facilitate compliance in safety-critical airborne systems. For industry-specific applications, wolfSSL adheres to :2012 guidelines, which promote safe and secure coding practices essential for automotive . This compliance facilitates integration into vehicle systems requiring and reliability, such as secure bootloaders and embedded TLS implementations. Additionally, wolfSSL aligns with ISO/SAE 21434, the international standard for automotive cybersecurity engineering, by providing tools like wolfSentry intrusion detection and supporting validation processes through automated to identify and mitigate vulnerabilities in connected vehicle ecosystems. In the United States, wolfSSL demonstrates readiness for the Cyber Trust Mark labeling program, an FCC initiative for devices that enforces baseline cybersecurity requirements including secure boot and firmware updates. Solutions like wolfBoot enable manufacturers to meet these criteria by providing verifiable secure boot mechanisms compliant with emerging federal procurement regulations. Regarding post-quantum compliance, wolfCrypt aligns with the Agency's Commercial National Security Algorithm Suite (CNSA) 2.0, which outlines a migration timeline to quantum-resistant by 2033 to protect systems from threats. wolfSSL was the first provider to fully support CNSA 2.0 algorithms, including ML-KEM for key encapsulation and ML-DSA for signatures, integrated into TLS 1.3 for hybrid classical-post-quantum security. As of November 2025, wolfSSL is pursuing validation for post-quantum algorithms. As an open-source project, wolfSSL undergoes regular security audits, including extensive fuzzing efforts via OSS-Fuzz integration and third-party tools like those from Code Intelligence and Trail of Bits, which have uncovered and resolved issues such as heap-based use-after-free vulnerabilities. Vulnerabilities are transparently disclosed through the CVE process, with a dedicated tracking page listing all known issues in wolfSSL products to maintain community trust and rapid remediation. In 2025, wolfSSL partnered with IGEL to integrate its cryptographic libraries into the IGEL OS, creating zero-trust endpoint solutions that enhance secure for enterprise environments. This collaboration sets a for cryptographic in endpoint operating systems, supporting policy-enforced connections and high-assurance data protection.

Licensing

Open Source Options

wolfSSL provides open-source licensing options under the GNU General Public License (GPL), enabling free use, modification, and distribution for compatible projects. The core wolfSSL library and its wolfCrypt engine are licensed under GPLv3 or any later version, following a transition from GPLv2 in July 2025 with version 5.8.2. Meanwhile, wolfSSH, the SSH implementation, uses GPLv3. The GPL licenses impose copyleft requirements, mandating that the source code of wolfSSL, wolfCrypt, and wolfSSH be made available to users and that any derivative works or integrated software also be released under the same GPL version. This ensures ongoing openness but restricts integration into without a commercial license. Source code availability promotes transparency and allows users to verify security implementations. The open-source versions are freely downloadable from the official GitHub repository at github.com/wolfSSL, which includes comprehensive build examples, unit tests, performance benchmarks, and documentation to facilitate development and integration. Users can compile the libraries for various platforms, including systems, with configuration options via the provided files and scripts. Key limitations apply under the open-source model: the FIPS-validated modules, essential for in regulated environments, cannot be used in applications without a commercial license due to GPL restrictions. Additionally, the licenses disclaim any warranty, holding users responsible for suitability and maintenance. The wolfSSL community actively supports open-source development through pull requests for contributions, bug fixes, and feature enhancements, fostering collaborative improvements. The libraries are integrated into prominent open-source projects, such as for secure data transfers, demonstrating their compatibility and adoption in the ecosystem.

Commercial Licensing

wolfSSL offers commercial licensing options designed for enterprises and organizations developing or closed-source applications, enabling integration without the requirements of the GPL license. These licenses provide flexibility for commercial software products, appliances, and systems where open-source obligations are undesirable. The licensing model includes perpetual licenses priced at $7,500 USD per end product or stock-keeping unit (SKU), granting unlimited royalty-free distribution for that product. Subscription-based models are also available, such as the Evergreen FIPS subscription, which delivers ongoing updates and compliance maintenance. Royalties are optional and typically not required, with custom terms negotiable for specific needs like extended support or tailored features. Key benefits encompass the elimination of GPL copyleft restrictions, allowing closed-source redistribution; access to premium , including dedicated engineers, unlimited incidents, optimization assistance, and priority response times; custom integrations via professional consulting services; and full source code availability for modifications. In contrast to the free GPL alternative covered elsewhere, these options prioritize enterprise-grade reliability and customization. Access to FIPS 140-validated configurations for proprietary deployments necessitates a commercial , as the open-source version does not support certified closed-source use. The subscription specifically addresses this by automating transitions between validation certificates (e.g., from #4718 to #5041), ensuring uninterrupted compliance through at least July 2030 without expiration gaps or manual re-certifications. Pricing is contact-based and scales with deployment size, accommodating factors like the number of SKUs, user seats, or global distribution volume, while including access as standard. Typical use cases include and defense systems requiring secure communications, automotive applications such as (V2X) and advanced driver-assistance systems compliant with , and medical devices handling sensitive data under regulatory standards, all benefiting from compliance without open-source mandates.

References

  1. [1]
    wolfSSL Embedded SSL/TLS Library - wolfSSL
    The wolfSSL embedded TLS library is a lightweight, portable, C-language-based SSL/TLS library targeted at standard, embedded, and RTOS environments.About UsLicenseDocumentationwolfSSL embedded SSL/TLSDownload
  2. [2]
    CyaSSL name is changing to wolfSSL!
    Mar 4, 2015 · We currently in the process of changing the name of our embedded SSL/TLS library from CyaSSL to wolfSSL. This name change benefits our users and us.Missing: history formerly<|control11|><|separator|>
  3. [3]
    About - wolfSSL
    ### Summary of wolfSSL History, Founding, and Key Milestones
  4. [4]
    wolfSSL Embedded SSL/TLS Library | Products
    The wolfSSL embedded SSL library is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments.Highlights · Portable · Works Well With
  5. [5]
    The wolfSSL library is a small, fast, portable implementation of TLS ...
    The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained ...
  6. [6]
    wolfSSL Quickstart Guide | Documentation
    The wolfSSL embedded SSL library is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments ...Introduction To Wolfssl · Hello, World! Server/client... · Mini Api
  7. [7]
    13. OpenSSL Compatibility - wolfSSL Manual
    The OpenSSL Compatibility Layer maps a subset of the most commonly-used OpenSSL commands to wolfSSL's native API functions.Differences Between wolfSSL... · Supported OpenSSL Functions
  8. [8]
    wolfSSL vs. OpenSSL | Documentation
    The compatibility layer is a series of commonly used and essential API that users can utilize to transition from OpenSSL to wolfSSL.Standards Support · Progressive Ciphers · License
  9. [9]
    How Does wolfSSL Compare to OpenSSL?
    Nov 18, 2011 · Size: With a 30-100kB build size and runtime memory usage between 3-36kB, wolfSSL can be up to 20 times smaller than OpenSSL. In an embedded ...
  10. [10]
    Benchmarking wolfSSL and wolfCrypt | Documentation
    Footprint sizes (compiled binary size) for wolfSSL range between 20-100kB depending on build options and the compiler being used. Typically on an embedded ...
  11. [11]
    Todd Ouska - Founder and CTO @ wolfSSL Inc. - Crunchbase
    Todd Ouska is the Founder and Chief Technology Officer at wolfSSL Inc. Jobs. Edit Jobs Section. Number of Current Jobs 1 · Todd Ouska is the Founder and CTO ...
  12. [12]
    4. Features - wolfSSL Manual
    wolfSSL (formerly CyaSSL) supports the C programming language as a primary interface, but also supports several other host languages, including Java, PHP ...
  13. [13]
    Overview of Testing in wolfSSL
    Feb 2, 2024 · Fuzz Testing: wolfSSL tests using several different software fuzzers ... testing on multiple platforms with multiple compilers, and extended fuzz ...
  14. [14]
    wolfSSL in MySQL
    Mar 30, 2015 · Currently MySQL comes bundled with yaSSL to provide an option for SSL/TLS connections when using a database. An update for MySQL to use the most recent wolfSSL ...Missing: integrated 2005
  15. [15]
    cyassl/cyassl: Please use wolfSSL now instead: https ... - GitHub
    CyaSSL version 0.2.0 (02/19/2006). This is the first release of CyaSSL and its crypt brother, CTaoCrypt. CyaSSL is written in ANSI C with the idea of a small ...
  16. [16]
    yaSSL Embedded SSL Library | Products - wolfSSL
    The yaSSL software package is a fast, open source, dual licensed implementation of SSL (SSL 3, TLS 1.0, and TLS 1.1) built in C++.Missing: predecessor CyaSSL history
  17. [17]
    License - wolfSSL
    wolfSSL's software is available under two distinct licensing models: open source and standard commercial licensing.
  18. [18]
    September 2010 – wolfSSL
    wolfSSL is a popular tool for digitally signing applications, libraries or files prior to loading them on embedded devices. As such, it is ideal for signing ...
  19. [19]
    wolfSSL FIPS-Ready | Products
    The wolfCrypt cryptography engine is a lightweight crypto library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments.Missing: 2012 | Show results with:2012
  20. [20]
    wolfSSL 3.11.0 Now Available
    May 4, 2017 · This release contains bug fixes, exciting new features, and includes fixes for several security vulnerabilities (5 low and 1 medium level).
  21. [21]
    What's new in DTLS 1.3 - wolfSSL
    Nov 17, 2022 · The DTLS 1.3 standard has recently been published in April 2022 ... support for DTLS 1.3 was merged in June and appeared in wolfSSL release 5.4.
  22. [22]
    wolfSSL 5.8.2 Now Available
    Jul 18, 2025 · wolfSSL 5.8.2 Now Available. July 18, 2025 July 30, 2025 · wolfSSL 5.8.2 is now available! We are excited to announce the release of wolfSSL 5.8 ...
  23. [23]
    wolfSSL + Apache httpd
    Jan 9, 2020 · We are excited to announce that as of version 4.2.0, wolfSSL now provides support for the Apache web server with the enable option --enable- ...Missing: integration | Show results with:integration
  24. [24]
    wolfSSL Integration with cURL
    Feb 1, 2019 · With this integration and Daniel Stenberg joining wolfSSL, wolfSSL will now also be providing support and consulting for the cURL library.Missing: Apache OpenVPN
  25. [25]
    wolfSSL OpenVPN Upstream Support
    Mar 26, 2021 · Using OpenVPN with wolfSSL, you can take advantage of our hardware cryptography and acceleration on many platforms. To use OpenVPN with wolfSSL:.Missing: Apache | Show results with:Apache
  26. [26]
    wolfSSL-NXP Partnership Roundup
    Sep 28, 2020 · NXP® Semiconductors N.V. is one of the wolfSSL partner network members. wolfSSL ships with support for offloading cryptographic operations ...Missing: ARM Intel
  27. [27]
    Every hardware cryptography scheme wolfSSL has ever enabled
    Oct 3, 2025 · Furthermore, we have deep partnerships with industry leaders such as Intel, NXP, and Renesas. We support standard Intel instruction ...
  28. [28]
    wolfSSL Advances FIPS Leadership with New Certificate #5041 and ...
    wolfSSL's Evergreen Certificate Subscription eliminates expiration gaps for FIPS 140-3 validations. Customers purchasing an Evergreen FIPS Subscription ...
  29. [29]
    wolfSSL Unveils Post Quantum Cryptography and Security Solutions ...
    Mar 4, 2025 · Expanded Hardware Support – Now compatible with NXP Layerscape LS1028A, with updates for ARMv7-M/ARMv8-M, x86-FSP, Xilinx UltraScale+, and Intel ...
  30. [30]
    5. Portability - wolfSSL Manual
    As such, wolfSSL has support for a long list of operating systems out-of-the-box. Currently-supported operating systems include: Win32/64; Linux; Mac OS X ...Abstraction Layers · Standard Library Abstraction... · Custom Input/Output...
  31. [31]
    wolfSSL Support for DO-178C DAL A
    ... support you. Supported Operating Environments. Win32/64, Linux, Mac OS X, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, WinCE, Haiku ...
  32. [32]
    wolfSSL Getting Started for Yocto and OpenEmbedded
    wolfSSL maintains a Yocto and OpenEmbedded (OE) layer including recipes for wolfSSL products (wolfSSL, wolfSSH, wolfMQTT, wolfTPM), examples, and support.
  33. [33]
    Installing a JSSE Provider in Android OSP | wolfSSL Documentation
    This document explains how to install wolfSSL's JSSE provider (wolfJSSE) into the Android OSP to provide default SSL/TLS functionality for the system and ...
  34. [34]
    What We Talk About When We Talk About Support - wolfSSL
    I was working on a complex FIPS-Ready build for Apple Silicon (M1/M2), and ran into several architecture-specific challenges involving ASM optimizations ...
  35. [35]
    What Operating Systems has wolfSSL been ported to?
    Aug 15, 2023 · Linux (embedded Linux, Yocto Linux, PetaLinux, Debian, and more) · Windows · MacOS · FreeBSD, NetBSD, OpenBSD · Android · iOS · QNX · FreeRTOS, ...
  36. [36]
    wolfSSL Embedded SSL for Bare Metal and No OS Environments
    May 14, 2013 · wolfSSL is designed for bare metal/no-OS environments with portability, abstraction layers, and low memory usage (20-100kB build size, 1-36kB ...Missing: RTOS | Show results with:RTOS
  37. [37]
    wolfSSL Supports FreeRTOS
    Oct 27, 2016 · The wolfSSL embedded SSL library supports FreeRTOS and OpenRTOS, and have also done several FIPS 140-2 validations on both.Missing: RTOS | Show results with:RTOS
  38. [38]
    wolfSSH Adds Support for Zephyr RTOS
    Feb 7, 2024 · The wolfSSH 1.4.15 release includes brand new support for the Zephyr RTOS. wolfSSH is a lightweight SSH library designed for embedded systems.
  39. [39]
    wolfSSL Espressif Support
    In addition to the portability and memory advantages to using wolfSSL on ESP32, wolfSSL supports the hardware cryptography module on ESP32-WROOM-32 device.
  40. [40]
    wolfSSL STM32 Support | Documentation
    The wolfSSL embedded SSL/TLS library has support for several of the STM32 microcontrollers and for the hardware-based cryptography and random number generator ...
  41. [41]
    wolfBoot Now Supports NXP's New MCX A and MCX W ... - wolfSSL
    Apr 29, 2025 · wolfSSL is excited to announce that wolfBoot, our secure bootloader, now supports NXP's MCX A and MCX W microcontroller families.
  42. [42]
    wolfSSL ESP32 Hardware Acceleration Support
    Mar 13, 2019 · wolfSSL's support for the onboard hardware cryptography of the ESP32 and ATECC608A gives users code size reductions and performance advantages.
  43. [43]
    Announcing STM32WBA Support in wolfSSL
    May 15, 2025 · We're excited to announce that wolfSSL now officially supports the STM32WBA series of microcontrollers from STMicroelectronics!
  44. [44]
    wolfSSL Static Buffer Allocation Option | Documentation
    To avoid using dynamic memory wolfSSL_CTX_load_static_memory() can take a ctx set as NULL and a static method function (ending in _ex) to use only memory from ...
  45. [45]
    Doing Crypto Without Malloc's - wolfSSL
    Apr 21, 2022 · wolfSSL has easy options for building and running without any malloc's! Avoiding the use of all dynamic memory can be important in many environments.
  46. [46]
    wolfSSL Tuning Guide | Documentation
    For those users, this section describes methods to reduce the footprint size of wolfSSL. Limit supported protocol versions to only those required, for example ...Considerations · Recipe #2: Maximum Speed · Recipe #3: Maximum Security
  47. [47]
    How to use the wolfSSL staticmemory feature
    Oct 1, 2025 · For resource-constrained devices or safety-critical applications, dynamic memory allocation via malloc and free system calls may be unavailable.
  48. [48]
    wolfSSL support for STM32 hardware
    May 30, 2023 · We've expanded our STM32 support for wolfSSL to include the STM32H5 and G0. The STM32WL is also coming soon. Using STM32 hardware and development boards are ...
  49. [49]
    Addressing wolfSSL TLS 1.3 Server Concerns In Record Time
    Sep 4, 2020 · wolfSSL supports high security designs in the automotive (MISRA-C capabilities), avionics (complete RTCA DO-178C level A certification), and ...
  50. [50]
    wolfBoot Secure Bootloader | Products - wolfSSL
    OS-agnostic, can run along side RTOS, Linux or bare-metal application · Supports ARM TrustZone-M, can operate in both Secure and Normal world · Multi-slot ...
  51. [51]
    Secure Boot and TLS 1.3 Firmware Update with FreeRTOS and ...
    Apr 14, 2020 · Unlike our gaggle of competitors, we also support multiple traditional, RTOS, and bare metal environments. ... https://github.com/wolfSSL/wolfBoot ...
  52. [52]
    wolfBoot support for the STM32C0 in 2024 - wolfSSL
    Feb 14, 2024 · We have added wolfBoot support for the new STM32C0. This is a low cost MCU similar to the STM32G0 based on a Cortex-M0 (48MHz).
  53. [53]
    TLS 1.3 Protocol Support | Documentation - wolfSSL
    The wolfSSL lightweight SSL/TLS library supports TLS 1.3 (RFC 8446, previously Draft 28) on both the client and server side! This page provides an overview.Missing: 3.11.0 2017
  54. [54]
    RFC 4347 - Datagram Transport Layer Security - IETF Datatracker
    This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram ...
  55. [55]
    How wolfSSL Protects Your Data - TLS Overview
    Jun 29, 2023 · wolfSSL DTLS 1.3 additionally includes a full implementation of RFC 9147 replay prevention, so that even in connectionless sessions, an ...Missing: 4347 | Show results with:4347
  56. [56]
    wolfSSL Enhances DTLS with Easier Connection ID Handling and ...
    Feb 25, 2025 · The wolfSSL lightweight TLS library supports TLS 1.3 and DTLS 1.3 on both client and server sides, features progressive algorithm support, is ...Missing: RFC 4347 9147
  57. [57]
    internet of things (iot) security - wolfSSL
    wolfSSL secures IoT devices using the latest protocols, cryptography, and methodologies, with a lightweight SSL/TLS library and a crypto engine.
  58. [58]
    DTLS 1.2 RFC6520 support - heart beat (Page 1) - wolfSSL
    May 20, 2019 · The heart beat would keep the session alive through the NAT traversal of most firewalls. This could be handled at the CoAP layer with additional ...Missing: cookie exchange PMTU discovery
  59. [59]
    Skipping the Cookie Exchange in DTLS 1.3 - wolfSSL
    Feb 6, 2024 · wolfSSL 5.6.6 introduces the option for DTLS 1.3 servers to skip the cookie exchange on a session resumption.Missing: heartbeat PMTU discovery
  60. [60]
    DTLS 1.3 Examples and Use Cases - wolfSSL
    Nov 18, 2022 · The wolfSSL lightweight TLS library supports TLS 1.3 and DTLS 1.3 on both client and server sides, features progressive algorithm support, is ...
  61. [61]
    WOLFSSL_DTLS_MTU (Page 1) — wolfSSL
    Nov 8, 2024 · To enable a DTLS MTU you will need to define WOLFSSL_DTLS and WOLFSSL_DTLS_MTU. These defines enable DTLS and enable setting the DTLS MTU.Missing: discovery | Show results with:discovery
  62. [62]
    ssl.h - wolfSSL Manual
    Either there was alert history or there wasn't, either way, the return value is SSL_SUCCESS. Example WOLFSSL_CTX* ctx = wolfSSL_CTX_new(protocol method); ...
  63. [63]
    DTLS 1.3 Benchmarks - wolfSSL
    Nov 19, 2022 · In this post we will compare some benchmarks between DTLS 1.2 and 1.3. The biggest differentiators will be the decreased round trips and the use of ...Missing: embedded anti- replay window
  64. [64]
    [PDF] Chapter 18: wolfCrypt API Reference - wolfSSL
    The wolfCrypt API includes functions for AES, Arc4, ASN, Blake2, Camellia, ChaCha, and more, including RSA, SHA, and MD5.
  65. [65]
    wolfCrypt Post Quantum | Products - wolfSSL
    wolfSSL, the world's first cryptography provider supporting CNSA 2.0 compliance, leads in robust post-quantum cryptography solutions, including ML-KEM (Kyber)
  66. [66]
    G. Experimenting with Post-Quantum Cryptography - wolfSSL Manual
    Post-quantum cryptography is important due to quantum computer threats. It uses algorithms like ML-DSA and ML-KEM to replace vulnerable algorithms. These are ...
  67. [67]
    Integration of the Falcon Signature Scheme into wolfSSL
    Nov 3, 2021 · wolfSSL has integrated FALCON, we can use it for authentication. We can use any one of our new KEMs and just in case, we can hybridize it with NIST-approved ...
  68. [68]
    Post-Quantum Benchmark Comparison: ML-KEM wolfSSL 5.8.0 vs ...
    May 13, 2025 · It can be observed that wolfSSL is faster than OpenSSL by a wide margin at every operation and parameter set. Here at wolfSSL, we are extremely ...
  69. [69]
    [PDF] Performance Evaluation of Post-Quantum TLS 1.3 on Resource ...
    For the sake of completeness, we measure the standalone performance of the adopted PQC algorithms by using a modified version of the wolfSSL's benchmark program ...
  70. [70]
    [PDF] Announcing the Commercial National Security Algorithm Suite 2.0
    May 30, 2025 · 2. New software and firmware use CNSA 2.0 signing algorithms by 2025. 3. Transitioning deployed software and firmware not CNSA 1.0 compliant to ...Missing: wolfSSL | Show results with:wolfSSL
  71. [71]
    Post-Quantum - wolfSSL
    Optimizing Post-Quantum Algorithm Memory Usage on Embedded Systems · August 7, 2025 July 25, 2025. Here at wolfSSL, we are intimately aware of the needs of our ...
  72. [72]
    Keystores and Secure Elements supported by wolfSSL
    Sep 5, 2025 · Zephyr Project RTOS – Real-time operating system with TPM integration; Microchip Harmony (MPLABX) – Complete development ecosystem support.
  73. [73]
    2. Overview - wolfHSM Manual - wolfSSL
    Features. Secure non-volatile object storage with user-based permissions; Cryptographic key management with support for hardware keys; Hardware cryptographic ...
  74. [74]
    wolfBoot Supports the Infineon AURIX TriCore TC3xx - wolfSSL
    Aug 2, 2024 · wolfBoot now supports Infineon's AURIX TriCore TC3xx, providing a secure bootloader with enhanced security, reliability, and flexibility for ...Missing: element TROPIC01
  75. [75]
    New Keystores and Secure Elements Added to wolfSSL (5.8.2)
    Oct 14, 2025 · wolfSSL now includes dedicated crypto callback functions for the TROPIC01 secure element, providing seamless hardware-backed cryptographic ...Missing: Aurix | Show results with:Aurix
  76. [76]
    Announcing wolfBoot Integration with TROPIC01 Secure Element
    Jun 17, 2025 · We are excited to announce our new partnership with Tropic Square and the integration of wolfBoot with their TROPIC01 secure element.Missing: Infineon Aurix Tricore TC3XX<|separator|>
  77. [77]
    wolfHSM | Products - wolfSSL
    Automotive HSMs (Hardware Security Modules) dramatically improve the security of cryptographic keys and cryptographic processing by isolating signature.Missing: enterprise | Show results with:enterprise
  78. [78]
    wolfSSL/wolfHSM: HSM library that uses wolfCrypt as it's ... - GitHub
    wolfHSM is a software framework that provides a portable and open-source client-server abstraction for hardware cryptography, non-volatile memory, and isolated ...
  79. [79]
    wolfSSL PKCS#11 support
    Nov 28, 2018 · Using wolfSSL on your application or your device will now allow you to utilize PKCS#11 for access to hardware security modules, smart cards, and other ...Missing: automotive enterprise
  80. [80]
    Meeting Secure Boot Compliance Requirements - wolfSSL
    Jun 4, 2025 · In fact, ISO 21434 (which UN R155 references) explicitly highlights “establishing trust anchors (Secure Boot) to ensure the integrity of initial ...Missing: NXP S32
  81. [81]
    wolfSSL NXP Support | Documentation
    The wolfSSL embedded SSL/TLS library and wolfCrypt embedded crypto engine fully support running on NXP platforms including Kinetis, Coldfire, and i.MX6.Missing: ISO 21434 S32
  82. [82]
    Frontgrade Gaisler and wolfSSL Collaborate to Enhance ...
    This joint effort will combine Frontgrade Gaisler's radiation-hardened electronics with wolfSSL's security software libraries.
  83. [83]
    Hardware Cryptography Support | Documentation - wolfSSL
    WOLFSSL HARDWARE CRYPTOGRAPHY SUPPORT. The following is a list of all hardware acceleration/cryptography platforms currently supported by wolfSSL.<|separator|>
  84. [84]
    Every hardware cryptography scheme wolfSSL has ever enabled
    Sep 1, 2023 · We also support NXP's Cryptographic Accelerator and Assurance Module (CAAM), and have leveraged this for hardware acceleration on a number ...
  85. [85]
    wolfSSL Accelerates Cryptography on Xilinx Hardware—With More ...
    Mar 20, 2025 · wolfSSL's integration with Xilinx hardware accelerators increases performance with AES-GCM, ECC, RSA and SHA3 operations.
  86. [86]
    Implementing Hardware Cryptographic Support in wolfCrypt - wolfSSL
    This guide describes how to add support for cryptographic offloading to hardware. It will go over the design of wolfCrypt and the various ways users can add ...Missing: ANSI | Show results with:ANSI
  87. [87]
    wolfCrypt FIPS Operating Environments - wolfSSL
    Jun 22, 2021 · Operating System, Processor, Platform. Linux 3.13 (Ubuntu), Intel® Core™ i7-3720QM CPU @2.60GHz x 8, HP EliteBook. iOS 8.1, Apple™ A8, iPhone™ 6.
  88. [88]
    Certificate #3389 - Cryptographic Module Validation Program | CSRC
    Certificate #3389 is for the historical wolfCrypt module, a suite of FIPS algorithms, that should not be used in new procurements. It has a caveat about ...
  89. [89]
    wolfCrypt FIPS 140-2 and FIPS 140-3 | Licensing - wolfSSL
    wolfCrypt FIPS Ready is our FIPS enabled cryptography layer code included in the wolfSSL source tree that you can enable and build. You do not get a FIPS ...Missing: standalone | Show results with:standalone
  90. [90]
    wolfCrypt FIPS 140-3 Certificate #5041 Now Validated - wolfSSL
    Jul 31, 2025 · We're proud to announce that our copy of wolfCrypt has officially again received FIPS 140-3 validation, listed under certificate #5041, ...Missing: list | Show results with:list
  91. [91]
    wolfCrypt FIPS 140-3 Operating Environments - wolfSSL
    Jan 16, 2025 · The current list of planned OEs for the wolfCrypt FIPS 140-3 certificate (#4718) is listed here for reference. wolfSSL can easily add additional ...
  92. [92]
    Cryptographic Algorithm Validation Program | CSRC
    wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, ...
  93. [93]
    [PDF] wolfSSL FIPS Ready
    The wolfCrypt FIPS API provides wrappers for all the approved algorithm functions that are within the FIPS boundary. The FIPS wrappers can be called directly, ...Missing: standalone 2012<|control11|><|separator|>
  94. [94]
    FIPS 140-3 Enabled Linux Authentication & System Services with ...
    Oct 17, 2025 · By integrating wolfSSL's FIPS 140-3 certified wolfCrypt module into GnuTLS, we deliver a true drop-in solution. Depending on the algorithms your ...
  95. [95]
    FIPS-Certified WireGuard - wolfSSL
    Jul 11, 2025 · For those using the C version of WireGuard, wolfCrypt can also be directly employed in kernel space via the wolfSSL kernel module. So by ...
  96. [96]
    wolfTPM supports NSING Technologies NS350 - wolfSSL
    Apr 1, 2025 · The NS350 devices are all Common Criteria (EAL4+) certified. The users of NS350 can take advantage of wolfTPM's API wrappers to help with ...
  97. [97]
    wolfSSL Conforms to MISRA-C:2012 Guidelines
    Feb 5, 2020 · The wolfSSL lightweight TLS library supports TLS 1.3 and DTLS 1.3 on both client and server sides, features progressive algorithm support, is ...Missing: compliance automotive
  98. [98]
    Need a Secure Bootloader with MISRA C? - wolfSSL
    May 24, 2019 · MISRA C is a set of rules and guidelines for C code targeting Automotive applications. The focus of the guidelines is on security and safety ...
  99. [99]
    Considerations in Implementing Cyber Security Industry Standards
    Jan 22, 2021 · Cyber Security industry standards such as ISO-21434 (Automotive) seems to be somewhat ahead of DO-326A (Airworthiness Security Process ...Missing: NXP S32
  100. [100]
    [PDF] Automotive - Security - wolfSSL組み込みSSL/TLSライブラリ
    ○ Some misra c work was done on specific files. Page 25. NTP (network time protocol) for Autosar. Page 26. Timestamping Events for smart cars. ○ Ecosystem Time ...
  101. [101]
    CNSA 2.0 Update Part 2: NIAP - wolfSSL
    24 may 2024 · On April 18th, 2024, the NSA released updates and clarifications to their CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) advisory in the form of ...
  102. [102]
    wolfSSL Security Vulnerabilities | Documentation
    Users that have applications with client side code and have TLS 1.3 turned on, should update to the latest version of wolfSSL. Users that do not have TLS 1.3 ...
  103. [103]
    AI-automated fuzz testing uncovered a vulnerability in wolfSSL
    Jan 6, 2025 · Code Intelligence is happy to announce the discovery of a heap-based use-after-free vulnerability in wolfSSL, identified through a fuzz test automatically ...
  104. [104]
    wolfSSL/oss-fuzz-targets - GitHub
    The files in this repository are fuzzing targets for wolfSSL. They follow the LLVM libFuzzer API and have a very specific naming scheme for integration with ...Missing: audits CVE
  105. [105]
    Keeping the wolves out of wolfSSL - The Trail of Bits Blog
    Jan 12, 2023 · Trail of Bits is publicly disclosing four vulnerabilities that affect wolfSSL: CVE-2022-38152, CVE-2022-38153, CVE-2022-39173, and CVE-2022-42905.Missing: audits | Show results with:audits
  106. [106]
    Strengthening Zero Trust: IGEL Partners with wolfSSL to Set New ...
    Mar 26, 2025 · MIAMI– March 26, 2025 – IGEL, the global leader in secure endpoint OS solutions for now and next, has partnered with wolfSSL, a premier ...
  107. [107]
  108. [108]
  109. [109]
    cURL | Products - wolfSSL
    Packages provide integration with security technologies and applications, and make available special features not available in mainline cURL. Subscription ...Missing: OpenVPN | Show results with:OpenVPN
  110. [110]
    wolfSSL Premium Support
    Mar 20, 2023 · The Premium Support package includes these benefits: Optimization Assistance; Unlimited Support Incidents; Contact via email, phone, and shared ...
  111. [111]
    Consulting Services | Documentation - wolfSSL
    wolfSSL has a wealth of experience in IoT and network appliance security which can be shared through professional consulting services.Missing: benefits indemnification
  112. [112]
    How wolfSSL Secures Safe Data Communication in the Drone Space
    Apr 2, 2025 · wolfSSL serves industries such as aerospace, defense, automotive, industrial, medical devices ... automotive, aerospace, and satellite use cases.
  113. [113]
    wolfSSL expands capabilities with ISO 26262 documentation for ...
    Dec 16, 2024 · wolfSSL has taken a significant step to support developers: the library now includes ISO 26262 documentation to aid in certification.Missing: 21434 | Show results with:21434
  114. [114]
    Everything you need to know about Securing Medical Devices!
    Apr 26, 2022 · Join us for a comprehensive presentation on how to leverage wolfSSL for all of your Medical Device needs as we go through a variety of different use cases and ...Missing: commercial government automotive