The Embedded Redfish Server packages the Barracuda Web Server for rapid development of secure Redfish services on embedded devices. Cryptographic services are provided by wolfSSL, a compact TLS/SSL library optimized for embedded systems, with security functions implemented using wolfCrypt and FIPS 140-3 validated cryptography. Getting started with wolfSSL? Download the latest libraries here and start […]
Read MoreMore TagMonth: April 2026
PQC in cURL
When curl is built with wolfSSL as the TLS backend, you can get ML-KEM and ML-DSA post-quantum algorithm support in TLS 1.3, provided wolfSSL was configured with –enable-curl, –enable-mlkem and –enable-mldsa. Getting started with wolfSSL? Download the latest libraries here and start exploring. The following ML-KEM groups are available: Pure ML-KEM (post-quantum only) ML_KEM_512 ML_KEM_768 […]
Read MoreMore TagFIPS 140-3 for CMMC 2.0
In a previous blog post, we defined CMMC 2.0 in terms of NIST 800-171, DIB entities, CUI, FCI and the FIPS 140-3 program. You can find what the acronym stands for here. The bottom line is that FIPS 140-3 is the security certification foundation of CMMC 2.0. Getting started with wolfSSL? Download the latest libraries […]
Read MoreMore TagwolfHSM Support for Renesas RH850/U2A
Are you ready to secure your next-generation automotive systems? We are pleased to announce upcoming wolfHSM support for the Renesas RH850/U2A, leveraging the advanced capabilities of the ICU-M (Intelligent Cryptographic Unit Master) hardware security module. This integration delivers highly flexible security functionality through comprehensive utilization of the ICU-M’s capabilities. Getting started with wolfSSL? Download the […]
Read MoreMore TagPerformance and Portability: Post-Quantum Cryptography with wolfSSL and Vulkan
Post-quantum standards like ML-DSA introduce significant compute challenges. These lattice-based schemes rely on high-degree polynomial math that can overwhelm traditional CPUs, making GPU acceleration essential for high-volume environments. The primary bottlenecks occur during Key Generation and Signing. In ML-DSA, signature generation is particularly intensive due to rejection sampling. This process requires the algorithm to repeatedly […]
Read MoreMore TagwolfCrypt JNI/JCE 1.10.0 Now Available
wolfCrypt JNI/JCE 1.10.0 is now available for download! This release brings new JCE Cipher support for RSA OAEP padding schemes and RSA key wrapping (WRAP/UNWRAP modes), a PKIX CertPathBuilder implementation using native wolfSSL X.509 functionality, default FIPS error callback registration, new JNI utilities for hex string conversion and PEM-to-DER, enhanced WolfSSLX509StoreCtx methods, and two new […]
Read MoreMore TagIdiomatic Zig Bindings for wolfSSL
wolfSSL now has a community-maintained Zig binding—zig-wolfssl—that wraps wolfSSL and wolfCrypt behind a native Zig API. If you are building a Zig application that needs TLS, X.509, or wolfCrypt algorithms, this binding gives you type-safe access without dropping to raw C. New to Zig? Check out the official overview or visit ziglang.org. Getting started with […]
Read MoreMore TagDid you know that you can run an fTPM in ARM TrustZone?
wolfTPM now has an integrated fTPM (firmware TPM) implementation built for the purpose of running within TrustZone for maximizing security! Why run an fTPM? Late breaking requirements come in to add a TPM to the design, but you didn’t include a hardware TPM on your board. You ship in high volumes and want TPM quality […]
Read MoreMore TagwolfSSL JNI/JSSE 1.17.0 Now Available
wolfSSL JNI/JSSE 1.17.0 is now available for download! This release brings JSSE?level PSK support, Java Platform Module System (JPMS) compatibility, SSLEngine hardening, a large expansion of X.509 and CRL capabilities at the JNI layer, and two new properties for FIPS and native library loading. Along with the new functionality, 1.17.0 contains a substantial set of […]
Read MoreMore TagHow to Get CRA-Ready: Secure Devices and Simplify Compliance
The EU Cyber Resilience Act (CRA) is about to reshape how every connected device is designed, secured, and maintained. As the CRA introduces new expectations for secure development and long-term product protection, teams need a clear understanding of what will change and how to prepare. In this webinar on April 30 at 8 AM PT, […]
Read MoreMore Tag
