wolfSSL - Product Downloads

DOWNLOADS

(View More Downloads)

Please Contact Us if you are downloading this as an evaluation and need evaluation support. For additional downloads, including yaSSL (C++), and our Java SSL Provider, see the More Downloads page. If you need the COMMERCIALLY LICENSED versions, please contact us at info@wolfssl.com.

Step 1: INFORMATION

(Letters allowed)

(Letters and Numbers allowed)

(Letters and Numbers allowed)

(Ex: name@company.com)

(Ex: +X XXX-XXX-XXXX)

Allowed characters include: letters, numbers, and [.,;:&"?!'()-] (max. character count: 300)

  Do you need evaluation support or assistance from wolfSSL?




Step 2: SELECT DOWNLOAD

[Please select your desired download]


This form allows you to download the most recent stable open source (GPLv2) versions of both wolfSSL and wolfSSL JNI. If your project cannot tolerate the terms of the GPLv2, please contact us to learn more about our commercial license.

For users looking to download the wolfCrypt embedded crypto engine, this is included in the wolfSSL package below.


wolfssl-3.15.5.zip 

(SHA256: f6c04c25355b340373931f43f8041b3cef78b61122e8a8edf9ee63c07b7a58be)


This release contains many new exciting additions to the wolfSSL embedded IoT library and some fixes to existing features. One of the changes with TLS 1.3 was addining in the capability of doing a TLS 1.3 only build. In addition to having the TLS 1.3 only build, OCSP stapling support with TLS 1.3 was added along with some fixes for asynchronous crypto use with the TLS 1.3 implementation.

Release Date: 11/07/2018

wolfssl-3.13.0.zip 

(SHA256: 196a3256a9044ecb89504ce77850342c82e676e7f2cad77f5584be3516b6060e)


MYSQL COMPATIBILITY VERSION
This release includes one vulnerability fix, bug fixes, fixes to TLS 1.3 including support for Draft 21, disables TLS 1.0 by default, new options for memory reduction, Intel AVX1/AVX2 performance improvements, SHA-3 size and performance improvements, assembly optimizations for Curve25519 and Ed25519, expanded OpenSSL compatibility layer, updated project files for Visual Studio, TI-RTOS, STM32 CubeMX, IAR EWARM, Apple Xcode, and more!

Release Date: 12/21/2017

wolftpm-1.3.0.zip 

(SHA256: 5bb3261af28c48c40127393954100938c085ee4a30adc34acb4418364127c8dd)


wolfTPM is a portable TPM 2.0 project, designed for embedded use. It is highly portable, due to having been written in native C, having a single IO callback for SPI hardware interface, no external dependencies, and its compacted code with low resource usage.

Release Date: 07/20/2018

wolfmqtt-1.1.0.zip 

(SHA256: 4a987c6156422c45733bcfaf4c029c4c91e088ae7fdb0a2f186631d7a7bed6d3)


Release 1.1.0 includes bug fixes and new features including fixes for non-blocking I/O, Arduino example updates, support for FreeRTOS+TCP, updated README, more verbose logging, disconnect callback support, API visibility changes, include for wolfmqtt/options.h header, IBM Watson IoT example, updated Autoconf M4 files, updated message callback, and more!

Release Date: 06/21/2018

wolfssh-1.3.0.zip 

(SHA256: ff2179bbcdc77e0b446c765e71294a208ab71949cd74fb46986e20644e3e7e5f)


wolfSSH 1.3.0 includes SCP and SFTP support, improvements, and small bug fixes.

Release Date: 08/15/2018

wolfssl-jni-1.4.0.zip 

(SHA256: 452408f8a39b26ca566b9758b64ca33e41eebc9fb3f47ad1f70efcc166efc7ba)


wolfSSL JNI 1.4.0 includes bug fixes and new features including better conditional support for native wolfSSL feature dependencies, native feature detection functions, method for loading JNI library from a specific path, TLS 1.0 compiled out by default, wrapper for native ECC shared secret public key callback, other HmacSHA* hash types allowed in Atomic User callback examples, and more.

Release Date: 11/16/2018

wolfcrypt-jni-1.0.0.zip 

(SHA256: f3ab7bf27b65689ca71da1d2460090d018ea3a01dc8b720ae27051f18b8b026c)


Initial release of the wolfCrypt JNI wrapper and wolfCrypt JCE Provider.

Release Date: 07/10/2017



Step 3: LICENSE AGREEMENT

The wolfSSL source code is subject to the U.S. Export Administration Regulations and other U.S. law, and may not be exported or re-exported to certain countries (currently Afghanistan, Cuba, Iran, Iraq, Libya, North Korea, Sudan and Syria) or to persons or entities prohibited from receiving U.S. exports (including Denied Parties, entities on the Bureau of Export Administration Entity List, and Specially Designated Nationals).



  I have read and agree to the GNU license agreement. (required)