We are excited to announce the release of wolfIP 1.0.0, the first public release of wolfSSL’s lightweight TCP/IP stack for embedded, real-time, and safety-critical systems. wolfIP is built around a simple idea: networking behavior should be defined before runtime, not discovered during it. With no dynamic memory allocation, fixed socket tables, pre-allocated packet buffers, and […]
Read MoreMore TagMonth: April 2026
curl Roadmap 2026 with Daniel Stenberg
Understand upcoming curl changes before they impact your builds, integrations, and security posture. Join us for an exclusive live webinar with Daniel Stenberg, founder and lead developer of curl, as he shares his vision for the future of one of the world’s most widely used open-source data transfer tools. Register Now: curl Roadmap 2026 with […]
Read MoreMore TagwolfIP: Deterministic TCP/IP for Safety-Critical Embedded Systems
Many TCP/IP stacks rely on dynamic memory allocation, background threads, and unpredictable resource usage, making them difficult to analyze, certify, and deploy in constrained embedded systems. Join us for the first official webinar introducing wolfIP, a compact and deterministic TCP/IP stack designed specifically for embedded, real-time, and safety-critical environments. Register now: wolfIP: Deterministic TCP/IP for […]
Read MoreMore TagwolfSSH 1.4.22: Enhanced Security and Reliability Through User Feedback
wolfSSH 1.4.22 is now available, featuring important security hardening and stability improvements driven by valuable feedback from our users. This release demonstrates our commitment to continuous improvement and responsive support, with key bug fixes that also led to expanded test coverage, making wolfSSH more robust than ever for embedded SSH, SFTP, and SCP deployments. User-Reported […]
Read MoreMore TagwolfBoot adds DICE and Measured boot via PSA Initial Attestation
Secure boot establishes authenticity (“this image is signed by a trusted key”). But many modern deployments also need attestation: a portable, verifiable way to prove what actually booted to a relying party: during onboarding, after updates, and throughout a device’s lifetime. That’s where DICE (Device Identifier Composition Engine) comes in. DICE composes a device identity […]
Read MoreMore TagTLS 1.3 Brainpool Curve Support in wolfSSL
As cryptographic standards and regulatory requirements continue to evolve, the ability to adopt modern security protocols without sacrificing compliance is increasingly important. TLS 1.3 plays a critical role in this evolution — not only as today’s baseline for secure communications but also as the foundation for the ongoing transition toward Post-Quantum Cryptography (PQC). With recent […]
Read MoreMore TagIntroducing wolfIP: a tiny, safe TCP/IP stack for embedded and safety critical systems
If you have ever tried to drop a full networking stack into a deeply embedded target, you know the drill: memory budgets get tight, timing gets unpredictable, and dynamic allocation can turn certification efforts into a slog. wolfIP is our answer: a compact TCP/IP stack that favors determinism over surprise, and standard interfaces over complex […]
Read MoreMore TagwolfSSL Inc. Announces wolfIP, a Tiny, Deterministic TCP/IP Stack for Embedded and Safety-Critical Systems
wolfIP is a deterministic TCP/IP stack designed for embedded and safety-critical systems where memory usage, timing, and behavior must be defined before runtime. By eliminating dynamic allocation and fixing system resources up front, it enables predictable operation that supports verification and certification efforts. Edmonds, Washington – April 7, 2026 – wolfSSL Inc. today announced wolfIP, […]
Read MoreMore TagwolfBoot Cipher and Hash Algorithm Benchmarks on STM32H5
About wolfBoot wolfBoot is a portable, OS-agnostic secure bootloader designed for embedded systems. It provides secure boot capabilities with support for a wide range of cryptographic signature algorithms, from traditional RSA and ECDSA to post-quantum algorithms like ML-DSA, LMS, and XMSS. wolfBoot is built on top of the wolfCrypt cryptography library and is designed to […]
Read MoreMore TagLive Webinar: Designing Secure Satellite Systems with FIPS 140-3, CNSA 2.0, and PQC
Satellites, rockets, and ground stations face unique cybersecurity challenges, from communication interception to firmware tampering. Protecting these systems requires lightweight, space-grade cryptography designed for long lifecycles and constrained embedded environments. Register now: Designing Secure Satellite Systems with FIPS 140-3, CNSA 2.0, and PQCDate: April 8 | 9 AM PT These challenges directly impact system design, […]
Read MoreMore Tag
