PRODUCTS
wolfProvider wolfCrypt FIPS provider for OpenSSL
wolfProvider is an OpenSSL 3.x provider powered by wolfSSL’s FIPS-validated wolfCrypt cryptography library. It enables applications to use wolfCrypt for all cryptographic operations through the OpenSSL provider framework. No OpenSSL code modifications required.
Designed as a standalone library, wolfProvider links against wolfSSL (libwolfssl) and integrates seamlessly into OpenSSL-based environments. Algorithm support aligns with wolfCrypt's FIPS 140-3 validated certificates (#4718 & #5041).
For additional information, visit the wolfCrypt FIPS FAQ or contact fips@wolfSSL.com.
Download Now
Get the latest open source GPLv3 version now!
Version: 1.1.0
Release Date: 10/29/2025
View ChangeLog
Highlights
- FIPS-backed cryptography via wolfCrypt
- Dynamic and static provider initialization options
- Optional replacement of OpenSSL's default provider
- Environment-variable–based logging
- Debian packaging support
- OS-agnostic integration and flexible build options
- Command-line testing tools for AES, RSA, ECC, Hash, and RSA-PSS
- Comprehensive application interoperability across widely used software, continuously tested in CI with FIPS mode enabled
Default Provider Replacement
wolfProvider offers an optional mode that replaces OpenSSL’s default provider, ensuring that all cryptographic operations, ciphers, hashes, key exchange, key derivation, and key generation, are handled by wolfCrypt. This provides a straightforward path to FIPS-validated cryptography without the need to modify existing OpenSSL-based applications.
Why Choose wolfProvider
wolfProvider provides several advantages over OpenSSL’s FIPS module, including:
- Immediately enable FIPS crypto for even the largest application with no modifications
- Full provider-level compatibility, allowing OpenSSL applications to switch to wolfCrypt-backed FIPS crypto without disrupting existing workflows
- Commercial-grade support and direct access to the core developers for smooth integration and ongoing assistance
To learn more about the advantages of choosing wolfProvider, contact facts@wolfssl.com.
OpenSSL Version Support
wolfProvider supports all OpenSSL releases that implement the provider framework.
Initialization modes can be used with any provider-capable OpenSSL build. For OpenSSL 1.x., wolfSSL offers wolfEngine, an engine backed by wolfCrypt. If you’re interested in evaluating wolfEngine, please contact facts@wolfssl.com if you’re interested in evaluating the wolfSSL engine.
Application Interoperability & Continuous Testing
wolfProvider is continuously tested in CI against a wide range of applications to ensure seamless interoperability and reliable FIPS-backed operation. Our automated workflows include testing with the FIPS-validated wolfCrypt library, ensuring all supported applications function correctly under FIPS requirements.
Supported applications under continuous CI testing include: BIND9, CJOSE, curl, gRPC, hostap and wpa supplicant, iperf, KRB5, Libcryptsetup, libeac3, libfido2, libhashkit2, libnice, liboauth2, librelp, libssh2, libwebsocketslibtss2, Net-SNMP, Nginx, OpenLDAP, OpenSC, OpenSSH, OpenSSL, OpenVPN, pam-pkcs11, PPP, python3-ntp, Qt5 Network, Rsync, Socat, sscep, SSSD, Stunnel, systemd, tcpdump, tnftp, TPM2 tools, X11vnc, xmlsec
Supported Operating Environments
- Win32/64, Linux, Mac OS X, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, Yocto Linux, OpenEmbedded, WinCE, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and Gamecube through DevKitPro, QNX, MontaVista, PetaLinux, Apache Mynewt, PikeOS, Azure Sphere OS
- If you would like to test wolfSSL in another environment, let us know and we’ll be happy to support you.
Features
- Multiple Hash Functions
- SHA-1, SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512), SHA3 (SHA3-224, SHA3-256, SHA3-384, SHA3-512), SHAKE256
- Block, Stream and Authenticated Cipher
- AES (128, 192, 256, ECB, CBC, CTR, CTS, GCM, CCM), GMAC, CMAC, 3DES-CBC
- Deterministic Random Bit Generator (DRBG)
- Public Key Algorithms
- RSA (X9.31, RSA-PSS, no-padding mode)
- DH
- ECC (ECDSA, ECDH on P-192, P-256, P-384, P-521)
- Key Derivation
- HMAC, PBKDF2, HKDF, KBKDF, KRB5KDF, TLS PRF, PBKDF2, PKCS12 PBKDF2
- Key Generation
- RSA and ECC keypair generation

