FIPS 140-3 Enabled Linux Network Infrastructure with GnuTLS-wolfSSL

wolfSSL is thrilled to announce that core network infrastructure applications can now achieve FIPS 140-3 compliance through our GnuTLS-wolfSSL integration. This breakthrough comes from our ongoing work integrating wolfSSL’s FIPS 140-3 certified cryptography (wolfCrypt) into GnuTLS, enabling a true drop-in solution for Linux applications. For developers and system administrators in government, defense, finance, healthcare, and […]

Read MoreMore Tag

FIPS 140-3 Enabled Linux Desktop & Media Applications with GnuTLS-wolfSSL

wolfSSL is thrilled to announce that desktop, development, and media applications can now achieve FIPS 140-3 compliance through our GnuTLS-wolfSSL integration. This breakthrough comes from our ongoing work integrating wolfSSL’s FIPS 140-3 certified cryptography (wolfCrypt) into GnuTLS, enabling a true drop-in solution for Linux applications. For developers and organizations in government, defense, finance, healthcare, and […]

Read MoreMore Tag

New Keystores and Secure Elements Added to wolfSSL (5.8.2)

wolfSSL continues to expand its hardware security ecosystem with significant new additions over the past year. Here are the latest keystores and secure elements now supported by our cryptographic library: New Secure Element Support TROPIC01 Secure Element wolfSSL now includes dedicated crypto callback functions for the TROPIC01 secure element, providing seamless hardware-backed cryptographic operations for […]

Read MoreMore Tag

Live webinar: Clarinox Wi-Fi and Bluetooth Integration with wolfSSL

Unlock secure, reliable wireless communication for your embedded devices. In this webinar, wolfSSL and Clarinox will show how developers can integrate lightweight TLS 1.3 security with embedded wireless stacks to build safer, standards-compliant devices. You’ll learn how Clarinox Wireless Stacks leverage wolfSSL for FIPS 140-3 validated cryptography and post-quantum support. You’ll also learn how ClarinoxBlue […]

Read MoreMore Tag

FIPS 140-3 Enabled WebKit2GTK with wolfSSL

wolfSSL is thrilled to announce that it is now possible to build FIPS 140-3 compliant applications using WebKit2GTK. This achievement comes from our recent porting efforts, integrating wolfSSL’s FIPS 140-3 certified cryptography (wolfCrypt) into core cryptographic libraries: GnuTLS, OpenSSL, and Gcrypt. For developers in government, defense, finance, healthcare, and other regulated industries, this eliminates a […]

Read MoreMore Tag

CRA Compliant curl

As the Cyber Resilience Act (CRA) is getting closer and companies wanting to sell digital services in goods within the EU need to step up, tighten their procedures, improve their documentation and get control over their dependencies I feel it could be timely to remind everyone: We of course offer full support and fully CRA […]

Read MoreMore Tag

wolfSSL giving Libgcrypt FIPS 140-3 cryptography

The wolfSSL-libgcrypt integration demonstrates how a shim layer architecture can bridge two large, independently developed cryptographic libraries while maintaining API compatibility and achieving FIPS 140-3 compliance. This project specifically targets libgcrypt version 1.11.0 and the current and future work of the port can be viewed in the wolfSSL/libgcrypt-wolfssl repo. Architecture: The Shim Layer Approach The […]

Read MoreMore Tag

Live Webinar: WolfGuard: FIPS 140-3 Enabled WireGuard

WireGuard is known for its simplicity, speed, and modern cryptography, but what if your deployment requires FIPS 140-3 validated security? That’s where WolfGuard comes in. Join wolfSSL Software Engineer Lealem Amedie as he introduces WolfGuard, a FIPS 140-3 enabled WireGuard solution optimized for speed and cryptographic agility. Built on the FIPS-certified wolfCrypt library, WolfGuard delivers […]

Read MoreMore Tag

Every hardware cryptography scheme wolfSSL has ever enabled

At wolfSSL we support hardware cryptography for a wide range of platforms. The benefits of hardware cryptography include reduced code footprint size, improved security, acceleration of cryptographic operations, and utilization of . For example, this allows everything from wolfBoot to TLS cipher suites to enjoy acceleration of cryptographic operations. Furthermore, we have deep partnerships with […]

Read MoreMore Tag

Posts navigation

1 2 3