As part of our ongoing effort to deliver secure-by-default cryptography, wolfSSL has disabled the MD5 hash algorithm by default in the latest release. Don’t worry, it isn’t going away completely, but just disabled at compile time, by default. Why Disable MD5? MD5 has been considered cryptographically broken for many years due to known collision attacks. […]
Read MoreMore TagCategory: Uncategorized
Live Webinar: How to Determine FIPS Compliance for Government Buyers
Cut through the confusion of FIPS 140-3 compliance and learn how to verify it with confidence. Join us on August 6th at 9 AM PT for a focused webinar presented by wolfSSL Senior Software Engineer Kaleb Himes. This session will break down the complexity of FIPS?140?3 compliance and help government buyers and contributors accurately evaluate […]
Read MoreMore TagA2A and wolfSSL
Here at wolfSSL, we are seeing a lot of interest in AI. Some of the most fascinating developments that are happening are around letting different AI agents communicate with each other. Do those communications need to be secured, authenticated, and integrity checked? Of course! Enter the A2A (Agent2Agent) protocol, which uses HTTPS as its primary […]
Read MoreMore TagwolfSSL Expands Embedded Security with HighTec Compiler and RTOS Support
The embedded systems landscape continues to evolve rapidly, with developers demanding robust security solutions that seamlessly integrate with their preferred development tools and real-time operating systems. Today, we’re excited to announce that wolfSSL’s comprehensive security suite will support the HighTec compiler and RTOS, bringing enterprise-grade cryptographic capabilities to even more embedded applications. Comprehensive Security for […]
Read MoreMore TagwolfCrypt FIPS 140-3 Certificate #5041 Now Validated
We’re proud to announce that our copy of wolfCrypt has officially again received FIPS 140-3 validation, listed under certificate #5041, posted on July 18, 2025 by NIST. This validation reflects our continued commitment to building secure, standards-compliant products using rigorously tested cryptography. This FIPS 140-3 version of wolfCrypt improves on the earlier 140-2 validation in […]
Read MoreMore TagwolfCLU 0.1.9 Available Now
wolfCLU version 0.1.9 is now available! This command-line utility, built on the wolfSSL embedded TLS library, helps with admin tasks and common use cases such as key generation and certificate parsing to human human-readable form. Among the most notable changes to this release is the addition of support for PKCS8 and Base64 commands, introduced in […]
Read MoreMore TagWhat We Talk About When We Talk About Support
Here at wolfSSL, we are usually very humble about how we help our customers. Today, that ends as we go loud and proud, letting you know what our customers are saying about our technical support! “Super fast and helpful support. Was able to help quickly unblock my progress.” – Top 5 Prime Government Contractor “I […]
Read MoreMore TagLive Webinar: Everything You Need to Know About Automotive Cybersecurity – Tailored for the Asia-Pacific Time Zone
Strengthen your vehicle’s defenses with proven cybersecurity solutions. Join us on July 31 at 5 PM PT / August 1 at 9 AM JST for a live automotive cybersecurity webinar, “Everything You Need to Know About Automotive Cybersecurity,” presented by Senior Software Engineer Eric Blankenhorn. This session explores the growing need for secure, connected, and […]
Read MoreMore TagLive Webinar: Cybersecurity Solutions for the Satellite Industry
Secure satellite communication and boot integrity with wolfSSL: FIPS 140-3, Post-Quantum, and Embedded Optimization Join us on July 30th at 9 AM PT for the ‘Cybersecurity Solutions for the Satellite Industry’ webinar. As the industry leader in space-grade cybersecurity, wolfSSL products are deployed across satellites, delivery / rocket systems, and ground stations. Our software provides […]
Read MoreMore TagVerifying TPM Endorsement Certificates with wolfTPM
We’re excited to share a new feature added to wolfTPM: a lightweight example for verifying TPM Endorsement Key (EK) Certificates without wolfCrypt. The new example, `verify_ek_cert`, retrieves and verifies the EK certificate stored in the TPM’s non-volatile memory. This supports TPMs like the Infineon SLB9672/SLB9673, STMicro ST33 series, and validates their RSA-signed EK certs using […]
Read MoreMore Tag
