In a previous blog post, we defined CMMC 2.0 in terms of NIST 800-171, DIB entities, CUI, FCI and the FIPS 140-3 program. You can find what the acronym stands for here. The bottom line is that FIPS 140-3 is the security certification foundation of CMMC 2.0. Getting started with wolfSSL? Download the latest libraries […]
Read MoreMore TagCategory: Uncategorized
wolfHSM Support for Renesas RH850/U2A
Are you ready to secure your next-generation automotive systems? We are pleased to announce upcoming wolfHSM support for the Renesas RH850/U2A, leveraging the advanced capabilities of the ICU-M (Intelligent Cryptographic Unit Master) hardware security module. This integration delivers highly flexible security functionality through comprehensive utilization of the ICU-M’s capabilities. Getting started with wolfSSL? Download the […]
Read MoreMore TagPerformance and Portability: Post-Quantum Cryptography with wolfSSL and Vulkan
Post-quantum standards like ML-DSA introduce significant compute challenges. These lattice-based schemes rely on high-degree polynomial math that can overwhelm traditional CPUs, making GPU acceleration essential for high-volume environments. The primary bottlenecks occur during Key Generation and Signing. In ML-DSA, signature generation is particularly intensive due to rejection sampling. This process requires the algorithm to repeatedly […]
Read MoreMore TagwolfCrypt JNI/JCE 1.10.0 Now Available
wolfCrypt JNI/JCE 1.10.0 is now available for download! This release brings new JCE Cipher support for RSA OAEP padding schemes and RSA key wrapping (WRAP/UNWRAP modes), a PKIX CertPathBuilder implementation using native wolfSSL X.509 functionality, default FIPS error callback registration, new JNI utilities for hex string conversion and PEM-to-DER, enhanced WolfSSLX509StoreCtx methods, and two new […]
Read MoreMore TagIdiomatic Zig Bindings for wolfSSL
wolfSSL now has a community-maintained Zig binding—zig-wolfssl—that wraps wolfSSL and wolfCrypt behind a native Zig API. If you are building a Zig application that needs TLS, X.509, or wolfCrypt algorithms, this binding gives you type-safe access without dropping to raw C. New to Zig? Check out the official overview or visit ziglang.org. Getting started with […]
Read MoreMore TagDid you know that you can run an fTPM in ARM TrustZone?
wolfTPM now has an integrated fTPM (firmware TPM) implementation built for the purpose of running within TrustZone for maximizing security! Why run an fTPM? Late breaking requirements come in to add a TPM to the design, but you didn’t include a hardware TPM on your board. You ship in high volumes and want TPM quality […]
Read MoreMore TagwolfSSL JNI/JSSE 1.17.0 Now Available
wolfSSL JNI/JSSE 1.17.0 is now available for download! This release brings JSSE?level PSK support, Java Platform Module System (JPMS) compatibility, SSLEngine hardening, a large expansion of X.509 and CRL capabilities at the JNI layer, and two new properties for FIPS and native library loading. Along with the new functionality, 1.17.0 contains a substantial set of […]
Read MoreMore TagHow to Get CRA-Ready: Secure Devices and Simplify Compliance
The EU Cyber Resilience Act (CRA) is about to reshape how every connected device is designed, secured, and maintained. As the CRA introduces new expectations for secure development and long-term product protection, teams need a clear understanding of what will change and how to prepare. In this webinar on April 30 at 8 AM PT, […]
Read MoreMore TagGuidance for FIPS Customers: Auditing Direct Calls to wc_ecc_verify_hash()
The fix for CVE-2026-5194 is available in wolfSSL 5.9.1. Upgrading to the new version resolves the issue for TLS, DTLS, and X.509 users. FIPS customers need to take a closer look. FIPS users who call wc_ecc_verify_hash() or wc_ecc_verify_hash_ex() directly may remain exposed until they add a small check at their call sites. The required check […]
Read MoreMore TagFortifying Mission-Critical Systems: Where Cybersecurity Meets Radiation Protection
Secure boot in space isn’t just about signing firmware. It has to survive radiation faults, long-mission lifecycles and limited update windows. Join VORAGO Technologies and wolfSSL on April 29 at 9 AM PT for a technical session on implementing secure boot in real satellite environments. In orbit, your hardware and software are under constant assault. […]
Read MoreMore Tag
