<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — Announcements]]></title>
		<link>https://www.wolfssl.com/forums/</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-forum6.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent topics at wolfSSL - Embedded SSL Library.]]></description>
		<lastBuildDate>Tue, 14 Apr 2026 21:03:46 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[wolfIP 1.0.0 Released: Deterministic TCP/IP for Embedded and Safety-Cr]]></title>
			<link>https://www.wolfssl.com/forums/topic2502-wolfip-100-released-deterministic-tcpip-for-embedded-and-safetycr-new-posts.html</link>
			<description><![CDATA[<p>We are excited to announce the release of <a href="https://www.wolfssl.com/products/wolfip/">wolfIP 1.0.0</a>, the first public release of wolfSSL’s lightweight TCP/IP stack for embedded, real-time, and safety-critical systems. wolfIP is built around a simple idea: networking behavior should be defined before runtime, not discovered during it. With no dynamic memory allocation, fixed socket tables, pre-allocated packet buffers, and a deterministic execution model, wolfIP gives developers a compact and analyzable network stack for systems where predictability matters. Version 1.0.0 is listed on the official wolfIP product page and changelog dated March 31, 2026.</p><p><strong>Why wolfIP</strong><br />Traditional TCP/IP stacks often bring in dynamic allocation, background processing, and broader feature sets than many embedded endpoints actually need. That flexibility can be useful in general-purpose systems, but it also makes worst-case timing, memory usage, and verification harder to bound. wolfIP takes a different approach. It is designed as a tiny, deterministic stack with compile-time configured resources, a fixed socket count, static RX/TX packet buffers, and no hidden runtime allocation. That makes it a strong fit for constrained devices, controlled deployments, and projects with demanding review, testing, or certification workflows.</p><p><strong>What is included in 1.0.0</strong><br />The 1.0.0 release delivers a solid IPv4 networking foundation for embedded endpoints. Core support includes Ethernet II, ARP, IPv4, ICMP, UDP, TCP, DHCP client, and DNS client, along with modern TCP capabilities such as MSS, timestamps, PAWS, window scaling, retransmission timeout handling, SACK, slow start, congestion avoidance, and fast retransmit. wolfIP 1.0.0 also includes HTTP/HTTPS server support, IPsec ESP transport mode, IP filtering with wolfSentry integration, native wolfGuard support, and optional IPv4 forwarding for multi-interface builds.</p><p>That combination is important because it gives developers more than just a packet pipe. wolfIP 1.0 starts with the network services many connected devices actually need, then adds security-focused integration points across the wolfSSL ecosystem. Developers can combine wolfIP with <a href="https://www.wolfssl.com/products/wolfssl/">wolfSSL</a> for TLS 1.3-protected applications, <a href="https://www.wolfssl.com/products/wolfsentry/">wolfSentry</a> for filtering and policy enforcement, and <a href="https://www.wolfssl.com/products/wolfguard/">wolfGuard</a> where a tightly integrated secure tunnel model is needed. For teams building secure connected products, that means a more cohesive networking and security story from a single vendor and codebase family.</p><p><strong>Small footprint, practical deployment model</strong><br />wolfIP is positioned as a small embedded-first stack, and the official product material describes the core as roughly <strong>4× smaller than lwIP’s core.</strong> Just as important, wolfIP’s architecture is intentionally narrow and easier to analyze: deterministic memory usage by default, fixed compile-time resources, and an endpoint-focused design rather than a broad general-purpose routing stack. For organizations thinking about code review effort, qualification scope, or long-term maintenance, reducing moving parts matters.</p><p><strong>From POSIX testing to embedded targets</strong><br />One of the most useful aspects of wolfIP 1.0 is its portability across development and deployment environments. The release includes integration layers for <a href="https://www.wolfssl.com/products/wolfssl/">wolfSSL</a>, <a href="https://www.wolfssl.com/products/wolfssh/">wolfSSH</a>, <a href="https://www.wolfssl.com/products/wolfmqtt/">wolfMQTT</a>, a POSIX LD_PRELOAD socket interception path via libwolfip.so, and a FreeRTOS BSD socket wrapper. The repo also documents host-side testing through TAP-style interfaces and lists host link driver support for Linux TAP/TUN, Darwin utun, FreeBSD TAP, and VDE2, alongside embedded ports for targets including STM32H753ZI, STM32H563, STM32N6, VA416xx, and Raspberry Pi Pico USB networking demos. That is a practical release story: developers can exercise the stack on desktop-class environments, then carry the same architecture into embedded deployment.</p><p><strong>Built to Work Naturally with wolfSSL</strong><br />wolfIP is especially compelling when paired with the rest of the wolfSSL portfolio. The product page highlights seamless TLS 1.3 integration with wolfSSL, and the repository documents HTTPS server support with wolfSSL TLS backing. For engineering teams that already trust wolfSSL in embedded and RTOS environments, wolfIP extends that same design philosophy down into the transport layer: compact code, explicit resource control, and predictable behavior. Instead of stitching together unrelated networking and crypto components, developers can build on a tightly aligned stack designed for constrained and security-conscious systems.</p><p><strong>Available Now</strong><br /><a href="https://www.wolfssl.com/products/wolfip/">wolfIP 1.0.0</a> is available now under the GPLv3 open source license. If you are building connected embedded devices and need a TCP/IP stack with bounded memory usage, deterministic behavior, and straightforward integration with wolfSSL security products, wolfIP is well worth a look. Download the latest release, review the changelog, and contact us to discuss commercial licensing, support, or how wolfIP fits into your next embedded networking design.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download </a>wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Tue, 14 Apr 2026 21:03:46 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2502-wolfip-100-released-deterministic-tcpip-for-embedded-and-safetycr-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[Announcing wolfMQTT v2.0.0: A Lightweight Built-In MQTT Broker]]></title>
			<link>https://www.wolfssl.com/forums/topic2491-announcing-wolfmqtt-v200-a-lightweight-builtin-mqtt-broker-new-posts.html</link>
			<description><![CDATA[<p>We are excited to announce the release of <a href="https://www.wolfssl.com/products/wolfmqtt/">wolfMQTT v2.0.0</a>, a major milestone that introduces a brand-new lightweight MQTT broker as its headline feature. This release represents a significant evolution of the wolfMQTT library, expanding it from a client-only library into a complete MQTT solution for embedded systems, IoT gateways, and edge computing applications.</p><p><strong>Lightweight MQTT Broker</strong><br />The centerpiece of wolfMQTT v2.0.0 is a fully featured, production-ready MQTT broker built right into the library. Designed with the same embedded-first philosophy that drives all wolfSSL products, the broker delivers a rich feature set while maintaining a small footprint suitable for resource-constrained environments.</p><p><strong>Broker Highlights</strong><br /></p><ul><li><p><strong>Full MQTT v3.1.1 and v5 Protocol Support</strong> — The broker handles both protocol versions, ensuring compatibility with a wide range of MQTT clients and devices.</p></li></ul><ul><li><p><strong>Retained Messages</strong> — The broker stores retained messages and automatically delivers them to new subscribers matching the topic filter. Message expiry intervals (MQTT v5) are supported, and retained messages can be cleared by publishing an empty payload with the retain flag set.</p></li></ul><ul><li><p><strong>Session Persistence</strong> — When clients connect with clean_session=0, subscriptions are preserved across disconnections. Reconnecting clients with the same client ID will have their previous subscriptions restored automatically.</p></li></ul><ul><li><p><strong>QoS 0, 1, and 2</strong> — Full quality-of-service support with proper packet ID management, effective QoS calculation (minimum of publish QoS and subscription QoS), and complete PUBREC/PUBREL/PUBCOMP handling for QoS 2 flows.</p></li></ul><ul><li><p><strong>Last Will and Testament (LWT)</strong> — Clients can register will messages that are published automatically upon unexpected disconnection. The broker supports will delay intervals (MQTT v5) and will retain flags.</p></li></ul><ul><li><p><strong>Wildcard Topic Matching</strong> — Full support for MQTT single-level (+) and multi-level (#) wildcard subscriptions, with proper handling of $-prefixed system topics per the MQTT specification.</p></li></ul><ul><li><p><strong>Authentication</strong> — Username/password authentication with constant-time string comparison to prevent timing attacks. Credentials are securely wiped from memory using wc_ForceZero().</p></li></ul><p><strong>TLS and Dual-Port Listening</strong><br />The broker supports simultaneous plain-text and TLS-encrypted listeners on separate ports (default 1883 and 8883). TLS configuration includes support for TLS 1.2 and 1.3, server certificates, and mutual TLS authentication with client certificate verification. A TLS-only mode is also available for environments that require encrypted connections exclusively.</p><p><strong>WebSocket Transport</strong><br />wolfMQTT v2.0.0 adds WebSocket transport support to the broker, enabling browser-based and web clients to connect using MQTT over WebSockets. This opens up new use cases for real-time dashboards, web-based device management, and hybrid IoT architectures.</p><p><strong>wolfIP Integration</strong><br />For deeply embedded systems, the broker integrates with wolfIP, wolfSSL’s lightweight embedded TCP/IP stack. This combination allows wolfMQTT to run on bare-metal systems without a full operating system or third-party networking stack. The broker provides a cooperative MqttBroker_Step() API for single-iteration execution, making it ideal for super-loop and RTOS-based embedded architectures.</p><p><strong>Designed for Embedded Systems</strong><br />The broker was built with embedded constraints in mind:<br /></p><ul><li><p><strong>Static Memory Mode</strong> — Pre-allocated arrays eliminate the need for dynamic memory allocation, with configurable limits for clients, subscriptions, retained messages, and buffer sizes.</p></li></ul><ul><li><p><strong>Dynamic Allocation Mode</strong> — For systems with more resources, dynamic allocation provides flexible sizing.</p></li></ul><ul><li><p><strong>Pluggable Network Backend</strong> — A callback-based network abstraction supports POSIX sockets, wolfIP, and custom implementations.</p></li></ul><ul><li><p><strong>Two Execution Models</strong> — Choose between a blocking MqttBroker_Run() main loop or a non-blocking MqttBroker_Step() for cooperative multitasking.</p></li></ul><p><strong>Easy to Configure</strong><br />The broker includes a command-line interface for quick setup:<br /></p><div class="codebox"><pre><code>-p       Plain port (default: 1883)
-s       TLS port (default: 8883)
-t             Enable TLS support
-V        TLS version (12 or 13)
-c       Server certificate (PEM)
-K       Server private key (PEM)
-A       CA certificate for mutual TLS
-u       Username for authentication
-P       Password for authentication
-w       WebSocket listen port
-v      Log level: 1=error, 2=info, 3=debug</code></pre></div><p>Build-time configuration is equally flexible, with granular feature toggles:<br /></p><div class="codebox"><pre><code>--enable-broker                    # Enable broker
--disable-broker-retained          # Disable retained messages
--disable-broker-will              # Disable LWT support
--disable-broker-wildcards         # Disable wildcard subscriptions
--disable-broker-auth              # Disable authentication
--disable-broker-insecure          # Disable plain-text listener</code></pre></div><p><strong>Security Hardening</strong><br />This release includes significant security improvements across the entire library:<br /></p><ul><li><p>Added overflow checks in network and socket IO</p></li></ul><ul><li><p>Added validation checks for negative return values in decode functions</p></li></ul><ul><li><p>Added encoding error checks throughout the packet processing pipeline</p></li></ul><ul><li><p>Added remaining length validation</p></li></ul><ul><li><p>Static analysis fixes across MQTT and MQTT-SN code paths</p></li></ul><ul><li><p>Added a debug warning when using VERIFY_NONE for TLS</p></li></ul><ul><li><p>Race condition fix in wm_SemLock</p></li></ul><ul><li><p>Fuzzing Infrastructure</p></li></ul><p>wolfMQTT v2.0.0 introduces a libFuzzer-based fuzzing infrastructure for the broker, enabling automated discovery of edge cases and potential security issues. This infrastructure was used during development to identify and fix multiple issues before release.</p><p><strong>Additional Improvements</strong><br /></p><ul><li><p><strong>wolfIP Client Support</strong> — In addition to the broker, wolfIP support has been added for the MQTT client, enabling client connections on bare-metal embedded systems.</p></li></ul><ul><li><p><strong>lastError Field</strong> — A new lastError field in the network context preserves TLS error codes for improved diagnostics.</p></li></ul><ul><li><p><strong>Bug Fixes</strong> — Numerous fixes for MQTT-SN encode/decode, wildcard matching, LWT handling, curl transport, and more.</p></li></ul><ul><li><p><strong>CI Enhancements</strong> — New CI workflows for codespell, multi-compiler testing, and sanitizer tests, plus expanded broker edge case testing.</p></li></ul><p><strong>About wolfMQTT</strong><br />The wolfMQTT library is a client and broker implementation of the MQTT protocol, written in C and optimized for embedded and RTOS environments. It supports MQTT v3.1.1 and v5, MQTT Sensor Network (MQTT-SN), TLS encryption via wolfSSL, QoS levels 0–2, and a wide range of platforms including FreeRTOS, ThreadX/NetX, Zephyr, ChibiOS, MQX/RTCS, Harmony, and more.\</p><p><strong>Download</strong><br />wolfMQTT v2.0.0 is available now:<br /><strong><a href="https://github.com/wolfSSL/wolfMQTT">GitHub</a></strong> — Show us some love and give the wolfMQTT project a Star!<br /><strong><a href="https://www.wolfssl.com/download/">wolfSSL Downloads</a></strong></p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Mon, 23 Mar 2026 19:18:48 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2491-announcing-wolfmqtt-v200-a-lightweight-builtin-mqtt-broker-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfSSL 5.9.0 Released]]></title>
			<link>https://www.wolfssl.com/forums/topic2490-wolfssl-590-released-new-posts.html</link>
			<description><![CDATA[<p>We are excited to announce that wolfSSL version 5.9.0 is now available! wolfSSL 5.9.0 brings a strong focus on advancing post-quantum cryptography support, an expanded Rust wrapper, new hardware platform integrations, and a number of security vulnerability fixes.</p><p><strong>Security Fixes</strong><br />wolfSSL 5.9.0 includes fixes for 15 security vulnerabilities spanning a range of severity levels, covering areas including CRL parsing, TLS 1.3 ECH extension handling, ALPN parsing, PKCS7 encoding, the packet sniffer, and side channel hardening of post-quantum implementations on ARM Cortex-M. We would like to thank all external researchers who responsibly disclosed issues to us. For full details on each vulnerability please visit the <a href="https://www.wolfssl.com/docs/security-vulnerabilities/">wolfSSL Security Vulnerabilities page</a>.</p><p><strong>Post-Quantum Cryptography: SLH-DSA and More</strong><br />Post-quantum cryptography continues to be a major area of focus in the security industry. In this release there is an addition of <strong>SLH-DSA (FIPS 205)</strong> — the Stateless Hash-Based Digital Signature Standard — rounding out wolfSSL’s coverage of all three NIST post-quantum digital signature standards alongside ML-DSA and FALCON.</p><p>SLH-DSA is a stateless, hash-based signature scheme that provides strong security guarantees without relying on the hardness of lattice problems. It offers an alternative signature foundation for deployments that want to diversify their post-quantum strategy beyond lattice-based approaches. With this addition wolfSSL now supports the full NIST PQC signature portfolio: ML-DSA (FIPS 204), FALCON, and SLH-DSA (FIPS 205), as well as the stateful hash-based schemes LMS/HSS and XMSS/XMSS^MT for specialized use cases.</p><p>Beyond SLH-DSA, this release also brings a range of improvements across the existing PQC stack:<br /></p><ul><li><p><strong>ML-DSA improvements</strong> — Several bug fixes including a fix for ML-DSA verification when using WOLFSSL_DILITHIUM_SMALL, improved no-malloc build support, and PKCS#11 integration for ML-DSA key operations.</p></li></ul><ul><li><p><strong>ML-KEM improvements</strong> — Bug fixes and hardening across no-malloc builds, static memory handling, DTLS 1.3 cookie and ClientHello fragment handling, and expanded hybrid/individual ML-KEM level test coverage.</p></li></ul><ul><li><p><strong>Fault injection hardening for PQC on Cortex-M</strong> — New protection for ML-KEM and ML-DSA implementations on ARM Cortex-M, specifically guarding against fault injection attacks targeting Keccak-based seed expansion.</p></li></ul><ul><li><p><strong>General WOLFSSL_NO_MALLOC PQC support</strong> — Broader no-malloc improvements make PQC algorithms more accessible in deeply embedded environments.</p></li></ul><ul><li><p><strong>SLH-DSA and FALCON key-type detection fixes</strong> — Corrected the key variant identification logic in both the SLH-DSA (SPHINCS+) and FALCON signature algorithm implementations.</p></li></ul><p><strong>New Features</strong><br /></p><ul><li><p><strong>OCSP Responder API</strong> — wolfSSL can now act as an OCSP responder. A new API and supporting infrastructure have been added to serve certificate status responses, enabling wolfSSL to be used in PKI infrastructure roles beyond the TLS client and server. (PR 9761)</p></li></ul><ul><li><p><strong>AES CryptoCB Key Import</strong> — Added AES key import support via the crypto callback interface, making it easier to use externally managed AES keys through wolfSSL’s callback framework. (PR 9658)</p></li></ul><ul><li><p>RNG Bank Facility — New wc_rng_new_bankref() API allows multiple wolfCrypt contexts to share a seeded RNG pool, reducing the overhead of repeated seeding at runtime — particularly useful in resource-constrained embedded systems. (PR 9616)</p></li></ul><p><strong>Rust Wrapper Expansion</strong><br />The wolfSSL Rust wrapper received significant expansion in this release, gaining FIPS support and coverage for a large number of new cryptographic primitives. New modules were added for Dilithium/ML-DSA, ChaCha20-Poly1305, Curve25519, BLAKE2, LMS, and ML-KEM. Improvements were also made for RSA, ECC, HASH-DRBG, HMAC-BLAKE2, and XChaCha20-Poly1305, along with support for optional heap and device ID parameters and conditional compilation based on underlying C build options.</p><p><strong>TLS/DTLS Improvements</strong><br />TLS 1.3 now supports Brainpool curves for key exchange (PR 9701). DTLS retransmission handling has been improved and TLS message order checking has been hardened on both client and server sides. The MAC and hash comparisons in the TLS 1.3 and TLS 1.2 Finished messages were also strengthened. Additional improvements include an extended AIA (Authority Information Access) interface, better ECH (Encrypted Client Hello) handling, and a range of smaller robustness fixes across fragmentation, session ticket lifetime validation, and QUIC transport parameter handling.</p><p><strong>Kernel Module Updates</strong><br />The Linux kernel module received various fixes and enhancements for Tegra kernels, including support for offline FIPS hash calculation. The FreeBSD kernel module gained both FIPS support and x86 hardware crypto acceleration in this release, broadening wolfCrypt’s kernel-mode footprint across operating environments.</p><p><strong>Ports and Hardware Integration</strong><br />New platform support in 5.9.0 includes the Renesas SK-S7G2 board, STM32 HMAC hardware acceleration, and STM32G0 hardware crypto. Various Thumb2 AES and SP assembly optimizations were added or fixed, and Zephyr 4.1+ compatibility was added for the wolfssl_tls_sock sample application.</p><p><strong>PKCS Improvements</strong><br />This release adds PKCS7 ECC raw sign callback support, RSA-PSS support for SignedData, and RSA-PSS certificate support for PKCS7 EnvelopedData KTRI. Several PKCS7 parsing fixes were also included, along with expanded ML-DSA support via PKCS#11.</p><p><strong>Testing and CI Improvements</strong><br />Test coverage was expanded with a particular focus on PQC and CMake builds. The CI test matrix grew to include rng-tools 6.17, openldap 2.6.9, and bind 9.20.11. A new TLS Anvil interoperability test workflow was added, and a stateful port-tracking mechanism was implemented to eliminate test port collisions during high-concurrency CI runs.</p><p>For a full list of fixes and optimizations, check out the <a href="https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md">ChangeLog.md</a> bundled with wolfSSL. Download the latest release from the <a href="https://www.wolfssl.com/download/">download page</a>. If you have any questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Mon, 23 Mar 2026 18:50:15 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2490-wolfssl-590-released-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfCrypt JNI/JCE 1.9.0 Now Available]]></title>
			<link>https://www.wolfssl.com/forums/topic2466-wolfcrypt-jnijce-190-now-available-new-posts.html</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolfcrypt-jni-jce/">wolfCrypt JNI/JCE 1.9.0</a> is now available for <a href="https://www.wolfssl.com/download/">download</a>! This release contains a number of bug fixes and expands the Java Cryptography Extension (JCE) footprint, introducing new algorithms, cipher modes, and capabilities.</p><p>wolfCrypt JNI/JCE allows for use of the native wolfCrypt cryptography library from Java. The thin JNI wrapper can be used for direct JNI calls into native wolfCrypt, or the JCE provider (wolfJCE) can be registered as a Java Security provider for integration underneath the Java Cryptography API. wolfCrypt JNI/JCE can also support running on top of the <a href="https://www.wolfssl.com/license/fips/">wolfCrypt FIPS 140-3</a> validated cryptography module.</p><p>Highlights from this release are below. See <a href="https://github.com/wolfSSL/wolfssljni/blob/master/ChangeLog.md">ChangeLog.md</a> for a full list.</p><p><strong>New JCE Functionality:</strong><br />This release adds support for several cryptographic primitives and classes:</p><ul><li><p>Add KeyGenerator implementation (AES, HmacSHA1, HmacSHA256, HmacSHA384, HmacSHA512) (PR 98)</p></li></ul><ul><li><p>Add SHA-224 support to MessageDigest, Mac, Signature, KeyGenerator (PR 104)</p></li></ul><ul><li><p>Add SHA-3 support to MessageDigest, Mac, Signature (PR 103)</p></li></ul><ul><li><p>Add utility method to convert JKS/PKCS12 KeyStore to WKS type (PR 108)</p></li></ul><ul><li><p>Add more AES mode support to Cipher class (PR 129, 163, 173):<br /></p><ul><li><p>AES/CCM/NoPadding</p></li></ul><ul><li><p>AES/CTR/NoPadding</p></li></ul><ul><li><p>AES/ECB/NoPadding</p></li></ul><ul><li><p>AES/ECB/PKCS5Padding</p></li></ul><ul><li><p>AES/OFB/NoPadding</p></li></ul><ul><li><p>AES/CTS/NoPadding</p></li></ul></li></ul><ul><li><p>Add AESCMAC (AES-CMAC), AESGMAC (AES-GMAC) to Mac class (PR 129)</p></li></ul><ul><li><p>Add RSA-PSS support to Signature class (PR 131):<br /></p><ul><li><p>RSASSA-PSS</p></li></ul><ul><li><p>SHA224withRSA/PSS</p></li></ul><ul><li><p>SHA256withRSA/PSS</p></li></ul><ul><li><p>SHA384withRSA/PSS</p></li></ul><ul><li><p>SHA512withRSA/PSS</p></li></ul></li></ul><ul><li><p>Add Cipher.engineGetParameters() support (PR 140)</p></li></ul><ul><li><p>Add Cipher generic “AES” type support (PR 142)</p></li></ul><ul><li><p>Add AES and GCM support to AlgorithmParameters class (PR 144)</p></li></ul><ul><li><p>Add HmacSHA3 support to KeyGenerator class (PR 150):<br /></p><ul><li><p>HmacSHA3-224</p></li></ul><ul><li><p>HmacSHA3-256</p></li></ul><ul><li><p>HmacSHA3-384</p></li></ul><ul><li><p>HmacSHA3-512</p></li></ul></li></ul><ul><li><p>Add toString() to WolfCryptRandom, used when printing SecureRandom object (PR 154)</p></li></ul><ul><li><p>Add additional ECC algorithm OIDs to Signature and KeyPairGenerator classes (PR 158)</p></li></ul><ul><li><p>Add EC KeyFactory support (PR 159)</p></li></ul><ul><li><p>Add P1363 ECDSA signature formats to Signature class (PR 160)</p></li></ul><ul><li><p>Add DH support to AlgorithmParameter, AlgorithmParameterGenerator, and KeyFactory classes (PR 161)</p></li></ul><ul><li><p>Add AES and 3DES support to SecretKeyFactory and SecretKey classes (PR 164)</p></li></ul><ul><li><p>Add additional AES and Hmac algorithm aliases to Cipher and Mac classes (PR 166)</p></li></ul><ul><li><p>Add Java ServiceLoader support for wolfJCE provider for Java Module System (JPMS) compatibility (PR 167)</p></li></ul><ul><li><p>Add RSA KeyFactory support (PR 169)</p></li></ul><ul><li><p>Add MessageDigest OID alias values for SHA-224/256/384/512 (PR 170)</p></li></ul><ul><li><p>Add PSS parameter encoding support in WolfCryptPSSParameters class (PR 175)</p></li></ul><ul><li><p>Add engineProbe() implementation to WolfSSLKeyStore (PR 178)</p></li></ul><ul><li><p>Add optional KEK caching to WolfSSLKeyStore for performance (PR 176)</p></li></ul><ul><li><p>Add RSASSA-PSS key support to WolfSSLKeyStore (PR 180)</p></li></ul><p><strong>Stability and Logic Improvements</strong><br />Beyond new features, version 1.9.0 includes fixes and improvements related to dynamic JNI value retrieval, build issues with older wolfSSL and wolfCrypt FIPS 140-2/140-3 packages, exception handling, PKCS#7 pad/unpad, AES-GCM edge cases, input validation, default value sizes, synchronization, and more!</p><p><strong>Modernized Debugging &amp; Testing</strong><br />To make integration easier for developers with fewer dependencies, version 1.9.0 switches to using the standard Java Logging (java.util.logging) framework for debug logs and uses the Java Instant.ofEpochMilli() for timestamps instead of java.sql.Timestamp.</p><p><strong>Improved Testing and CI Coverage</strong><br />CI coverage has been expanded to include the following additional pull request tests. JUnit test output has also been modified to include the time taken per test.</p><ul><li><p>AddressSanitizer (-fsanitize=address)</p></li></ul><ul><li><p>Clang scan-build static analysis</p></li></ul><ul><li><p>Visual Studio Windows builds</p></li></ul><ul><li><p>Android emulator unit test runs</p></li></ul><ul><li><p>Builds against the last 5 stable wolfSSL versions for backwards compatibility testing</p></li></ul><p>wolfCrypt JNI/JCE 1.9.0 can be downloaded from the <a href="https://www.wolfssl.com/download/">wolfSSL download page</a>, and an updated version of the wolfCrypt JNI/JCE User Manual can be found <a href="https://www.wolfssl.com/documentation/manuals/wolfcryptjni/">here</a>. For any questions, or to get help using wolfSSL products in your projects, contact us at <a href="mailto:support@wolfssl.com">support@wolfssl.com</a>.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Fri, 23 Jan 2026 21:56:04 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2466-wolfcrypt-jnijce-190-now-available-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfSSL JNI/JSSE 1.16.0 Now Available]]></title>
			<link>https://www.wolfssl.com/forums/topic2459-wolfssl-jnijsse-1160-now-available-new-posts.html</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolfssl-jni-jsse/">wolfSSL JNI/JSSE 1.16.0</a> is now available for <a href="https://www.wolfssl.com/download/">download</a>!&nbsp; This release contains a number of bug fixes and changes to the JNI and JSSE layers.</p><p>wolfSSL JNI/JSSE allows for use of the native wolfSSL SSL/TLS library from Java. The thin JNI wrapper can be used for direct JNI calls into native wolfSSL, or the JSSE provider (wolfJSSE) can be registered as a Java Security provider for integration underneath the Java Security API. wolfSSL JNI/JSSE provides <a href="https://www.wolfssl.com/docs/tls13/">TLS 1.3</a> support and can also support running on top of the <a href="https://www.wolfssl.com/license/fips/">wolfCrypt FIPS 140-3</a> validated cryptographic module.</p><p>Highlights from this release are below. See <a href="https://github.com/wolfSSL/wolfssljni/blob/master/ChangeLog.md">ChangeLog.md</a> for a full list.</p><p><strong>Java System and Security Property Support:</strong><br />This release improves alignment with Java JSSE behavior and improves drop-in compatibility for applications migrating from other JSSE providers.</p><ul><li><p>New <strong>wolfjsse.autoSNI</strong> security property for controlling automatic SNI behavior with automatic SNI configuration for HttpsURLConnection</p></li></ul><ul><li><p>Partial support for <strong>jdk.tls.client.SignatureSchemes</strong> and <strong>jdk.tls.server.SignatureSchemes</strong></p></li></ul><ul><li><p>Java Module System (JPMS) compatibility via ServiceLoader support</p></li></ul><ul><li><p>Added X509Certificate getSubjectX500Principal() and getIssuerX500Principal() implementations</p></li></ul><ul><li><p>Added Android non-standard checkServerTrusted() in X509TrustManager</p></li></ul><p><strong>DTLS 1.3 and Session Enhancements</strong><br />This release adds DTLS 1.3 support in SSLContext and SSLEngine classes, along with:</p><ul><li><p>DTLS Connection ID (CID) support</p></li></ul><ul><li><p>New DTLS 1.3 example client and server applications</p></li></ul><ul><li><p>Session serialization and persistence support via wrapped native APIs</p></li></ul><p>These enhancements enable secure datagram-based applications with session resumption.</p><p><strong>Performance Improvements</strong><br />Several changes focus on reducing overhead in high-throughput and highly concurrent environments:</p><ul><li><p>20–30% SSLEngine send/receive performance improvement</p></li></ul><ul><li><p>Reduced synchronization and contention in JSSE components</p></li></ul><ul><li><p>Cached system and security properties to avoid repeated lookups</p></li></ul><ul><li><p>ByteBuffer pooling and improved ByteBuffer handling in JNI paths</p></li></ul><ul><li><p>Cached KeyStore entries for improved scalability under load</p></li></ul><p><strong>Correctness, Stability, and Security Fixes</strong></p><ul><li><p>Fixes for potential use-after-free conditions and memory leaks</p></li></ul><ul><li><p>Improved protection of native WOLFSSL sessions during concurrent I/O</p></li></ul><ul><li><p>Correct certificate chain ordering and improved handling of cross-signed certificates</p></li></ul><ul><li><p>Enhanced SNI handling for session resumption and server-side matching</p></li></ul><ul><li><p>Improved ALPN handling, including non-ASCII protocol names</p></li></ul><ul><li><p>Expanded X.509 API coverage, including Extended Key Usage and X500 principals</p></li></ul><ul><li><p>Added support for honoring client cipher suite preference ordering</p></li></ul><ul><li><p>Rename wolfCrypt JNI helper classes to avoid namespace conflicts with wolfcrypt-jni</p></li></ul><p><strong>Improved Debugging, Testing, and CI Coverage</strong><br />Debug logging now uses Java’s standard logging framework (java.util.logging) with improved timestamps. CI coverage has also been expanded to include GitHub Actions for:</p><ul><li><p>AddressSanitizer (-fsanitize=address)</p></li></ul><ul><li><p>Clang scan-build static analysis</p></li></ul><ul><li><p>Windows (Visual Studio) builds</p></li></ul><ul><li><p>Android emulator unit tests</p></li></ul><ul><li><p>ARM (--enable-armasm) builds</p></li></ul><ul><li><p>Compatibility testing against the last five stable wolfSSL releases</p></li></ul><p>wolfSSL JNI/JSSE 1.16.0 can be downloaded from the <a href="https://www.wolfssl.com/download/">wolfSSL download page</a>, and an updated version of the wolfSSL JNI/JSSE User Manual can be found <a href="https://www.wolfssl.com/documentation/manuals/wolfssljni">here</a>. For any questions or to get help using wolfSSL products in your projects, contact us at <a href="mailto:support@wolfssl.com">support@wolfssl.com</a>.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Mon, 19 Jan 2026 18:25:42 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2459-wolfssl-jnijsse-1160-now-available-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfSSH v1.4.22 Release]]></title>
			<link>https://www.wolfssl.com/forums/topic2455-wolfssh-v1422-release-new-posts.html</link>
			<description><![CDATA[<p>Look at that! wolfSSH had another release. New year, new version. Welcome to <a href="https://www.wolfssl.com/products/wolfssh/">wolfSSH v1.4.22</a>. This is mainly a bug fix release. We’ve improved interoperability with other implementations of SSH. We’ve improved the build process with several IDEs, Zephyr, and LwIP. We also added an SFTP client example for the Renesas RX72N platform.</p><p>There is also a critical vulnerability; please refer to CVE-2025-14942. The handshaking state machine can be manipulated to leak the user’s password in the clear or to release a bogus signature. Also, user authentication may be bypassed. This has been fixed with improved message checking. There are no known specific attacks, but it is recommended to upgrade.</p><p>There is also a medium vulnerability; please refer to CVE-2025-15382. When cleaning up a file path in SCP and with SFTP, there is the potential for the code to read off the end of the file path by one byte.</p><p>Please see the attached <a href="https://github.com/wolfSSL/wolfssh/blob/master/ChangeLog.md">change log</a> for more information.</p><p><strong>Vulnerabilities</strong><br /></p><ul><li><p>[Critical] CVE-2025-14942. wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report. (<a href="https://github.com/wolfSSL/wolfssh/pull/855">PR 855</a>)</p></li></ul><ul><li><p>[Medium] CVE-2025-15382. The function used to clean up a path string may read one byte off the end of the bounds of the string. The function is used by the SCP handling in wolfSSH. This affects server applications with wolfSSH versions 1.4.12 through 1.4.21, inclusive. Thanks to Luigino Camastra from Aisle Research for the report. (<a href="https://github.com/wolfSSL/wolfssh/pull/859">PR 859</a>)</p></li></ul><p><strong>New Features</strong><br /></p><ul><li><p>Added a complete SFTP client example for the Renesas RX72N platform. (<a href="https://github.com/wolfSSL/wolfssh/pull/847">PR 847</a>)</p></li></ul><ul><li><p>Enabled TSIP support and provided cleaned-up configuration headers for the RX72N example. (<a href="https://github.com/wolfSSL/wolfssh/pull/847">PR 847</a>)</p></li></ul><ul><li><p>Added FIPS-enabled build configurations to the Visual Studio project files. (<a href="https://github.com/wolfSSL/wolfssh/pull/851">PR 851</a>)</p></li></ul><ul><li><p>Added documentation describing how to build and use the new FIPS Visual Studio configurations. (<a href="https://github.com/wolfSSL/wolfssh/pull/851">PR 851</a>)</p></li></ul><ul><li><p>Introduced regression tests covering SSH agent signing, including error paths and successful operation. (<a href="https://github.com/wolfSSL/wolfssh/pull/856">PR 856</a>)</p></li></ul><ul><li><p>Added regression tests that explicitly exercise WANT_READ / WANT_WRITE paths to guard against deadlocks. (<a href="https://github.com/wolfSSL/wolfssh/pull/856">PR 856</a>)</p></li></ul><p><strong>Improvements</strong></p><ul><li><p>Refactored SSH string parsing by unifying GetString() and GetStringAlloc() around GetStringRef(), simplifying maintenance and reducing duplication. (<a href="https://github.com/wolfSSL/wolfssh/pull/857">PR 857</a>)</p></li></ul><ul><li><p>Enhanced SSH message-order validation by introducing explicit expected-message tracking and clearer message ID range macros. (<a href="https://github.com/wolfSSL/wolfssh/pull/855">PR 855</a>)</p></li></ul><ul><li><p>Improved server-side out-of-order message checking to align behavior with the stricter client implementation. (<a href="https://github.com/wolfSSL/wolfssh/pull/855">PR 855</a>)</p></li></ul><ul><li><p>Improved worker thread behavior under window backpressure by prioritizing receive handling, preventing stalls with small-window SFTP clients. (<a href="https://github.com/wolfSSL/wolfssh/pull/856">PR 856</a>)</p></li></ul><ul><li><p>Hardened SSH agent handling logic by validating response types, tracking message IDs, and enforcing strict buffer size limits. (<a href="https://github.com/wolfSSL/wolfssh/pull/845">PR 845</a>)</p></li></ul><ul><li><p>Improved SCP path handling by canonicalizing client-supplied base paths before filesystem access. (<a href="https://github.com/wolfSSL/wolfssh/pull/845">PR 845</a>)</p></li></ul><ul><li><p>Improved portability by replacing non-standard includes with standard . (<a href="https://github.com/wolfSSL/wolfssh/pull/852">PR 852</a>)</p></li></ul><ul><li><p>Reduced logging overhead by defining WLOG as a no-op when debugging is disabled. (<a href="https://github.com/wolfSSL/wolfssh/pull/839">PR 839</a>)</p></li></ul><ul><li><p>Updated documentation to better reflect current features, examples, and build options. (<a href="https://github.com/wolfSSL/wolfssh/pull/851">PR 851</a>)</p></li></ul><p><strong>Fixes</strong><br /></p><ul><li><p>Fix off-by-1 read error when cleaning the file path for SCP. (<a href="https://github.com/wolfSSL/wolfssh/pull/859">PR 859</a>)</p></li></ul><ul><li><p>Fixed incorrect handling of zero-length SSH strings in packet parsing. (<a href="https://github.com/wolfSSL/wolfssh/pull/857">PR 857</a>)</p></li></ul><ul><li><p>Fixed a worker-thread deadlock caused by blocked sends preventing window-adjust processing. (<a href="https://github.com/wolfSSL/wolfssh/pull/856">PR 856</a>)</p></li></ul><ul><li><p>Fixed a double-free crash and eliminated a socket-close spin loop under error conditions. (<a href="https://github.com/wolfSSL/wolfssh/pull/855">PR 855</a>)</p></li></ul><ul><li><p>Fixed uninitialized authentication data that could lead to undefined behavior during authentication. (<a href="https://github.com/wolfSSL/wolfssh/pull/854">PR 854</a>)</p></li></ul><ul><li><p>Fixed SFTP connection interoperability issues discovered through cross-implementation testing. SFTP fix for init to handle channel data which resolves a potential interoperability SFTP connection issue. (<a href="https://github.com/wolfSSL/wolfssh/pull/846">PR 846</a>)</p></li></ul><ul><li><p>Fixed SCP receive handling to reject traversal filenames containing path separators or “dot” components. (<a href="https://github.com/wolfSSL/wolfssh/pull/845">PR 845</a>)</p></li></ul><ul><li><p>Fixed missing declaration of wc_SSH_KDF that caused build failures under strict compiler warnings. (<a href="https://github.com/wolfSSL/wolfssh/pull/848">PR 848</a>)</p></li></ul><ul><li><p>Fixed SSH agent test setup so regression tests exercise the intended code paths. (<a href="https://github.com/wolfSSL/wolfssh/pull/845">PR 845</a>)</p></li></ul><ul><li><p>Excluded a standalone regression test from Zephyr builds where it was incompatible with the Zephyr test model. (<a href="https://github.com/wolfSSL/wolfssh/pull/855">PR 855</a>)</p></li></ul><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.<br /><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Mon, 12 Jan 2026 23:38:51 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2455-wolfssh-v1422-release-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfBoot v2.7.0 Available]]></title>
			<link>https://www.wolfssl.com/forums/topic2443-wolfboot-v270-available-new-posts.html</link>
			<description><![CDATA[<p>The wolfSSL team is pleased to announce the release of <a href="https://www.wolfssl.com/products/wolfboot/">wolfBoot 2.7.0</a>, the latest version of our portable secure bootloader for embedded systems. This release focuses on three main areas:<br /></p><ul><li><p>Expanding hardware coverage to <strong>radiation-hardened platforms</strong></p></li></ul><ul><li><p>Unifying and hardening <strong>TrustZone-M and dual-bank update flows</strong></p></li></ul><ul><li><p>Making <strong>update state tracking and integration</strong> easier with filesystem and MTD-backed helpers</p></li></ul><p>As always, the full changelog is available in the wolfBoot repository and on the <a href="https://github.com/wolfSSL/wolfBoot">github v2.7.0 release page</a>.<br />_________________________________________________________________________________________________________</p><p><span class="bbu"><strong>New Platform Support</strong></span></p><p><strong>Vorago VA416x0: Secure Boot in Radiation-Hardened Systems</strong><br />See also <a href="https://www.wolfssl.com/how-to-use-wolfboot-with-the-vorago-va41630-and-va41620/">our recent blog post about it</a></p><p>wolfBoot 2.7.0 adds full support for <strong>Vorago’s VA416x0</strong> series (VA41620 / VA41630), bringing our secure boot and firmware update flow to radiation-hardened Cortex-M4 microcontrollers. </p><p>The new port includes:<br /></p><ul><li><p>A dedicated HAL implementation (hal/va416x0.c) integrated with the Vorago SDK</p></li></ul><ul><li><p>Example configuration (config/examples/vorago_va416x0.config) with ECC384/SHA384 as the default signing and hashing combination</p></li></ul><ul><li><p>Test application and <strong>factory image</strong> helpers that build wolfBoot, the test firmware, sign it, and assemble a flashable image for VA416x0 boards</p></li></ul><p>On these devices, wolfBoot leverages the external SPI FRAM configuration and the board’s radiation-tolerant design to provide a robust secure boot chain for <strong>space and high-reliability applications</strong>, where authenticated updates and rollback-safe behavior are essential.</p><p><strong>Nordic nRF5340 with TrustZone-M</strong></p><p>Support for the <strong>Nordic nRF5340</strong> dual-core SoC was introduced in earlier wolfBoot releases; version 2.7.0 extends this further with a dedicated <strong>TrustZone build and configuration</strong> for the application core. </p><p>Highlights include:<br /></p><ul><li><p>TrustZone-aware build options for the nRF5340 application core (Cortex-M33 with TrustZone)</p></li></ul><ul><li><p>Improved configuration for pairing secure and non-secure firmware images in a wolfBoot managed update flow</p></li></ul><p>Combined with wolfBoot’s existing support for ML-DSA, LMS/XMSS, and hybrid authentication, this makes the nRF5340 a strong platform for <strong>post-quantum aware secure boot</strong> in IoT and wireless devices.<br />_________________________________________________________________________________________________________</p><p><strong><span class="bbu">Unified TrustZone-M and Dual-Bank Behavior</span></strong><br />In 2.7.0, we’ve taken another step in making TrustZone-M support <strong>consistent across all ARMv8-M targets</strong>:<br /></p><ul><li><p><strong>Unified TrustZone-M handling</strong> across supported ARMv8-M platforms, so you get the same high-level behavior on devices like STM32H5, RP2350, nRF5340, and others.</p></li></ul><ul><li><p>A <strong>TrustZone-aware dual-bank configuration</strong>, where redundant-slot updates respect secure/non-secure boundaries and provide better isolation between the running image and the candidate update.</p></li></ul><p>For STM32H5 specifically, wolfBoot 2.7.0 brings:<br /></p><ul><li><p>An improved SPI driver path</p></li></ul><ul><li><p>Integration of <strong>TPM-based secure storage</strong> with updated TrustZone Non-Secure Callable (NSC) APIs</p></li></ul><ul><li><p>Multiple fixes for dual-bank and TPM-enabled builds to make them more predictable and robust during updates</p></li></ul><p>The <strong>simulator target</strong> has also been updated with dual-bank flow and a new bank-swap test script, so you can validate redundant-slot update scenarios and rollback logic without touching hardware. Adding features to the simulated platform allows us to test more scenarios in CI.</p><p>On the <strong>RP2350</strong> (Raspberry Pi Pico 2), wolfBoot now uses a <strong>RAM cache for flash writes</strong>, increasing robustness against partial writes and power faults during updates.</p><p>For <strong>Infineon AURIX TC3xx</strong>, we’ve moved away from an IDE-centric example to a cleaner <strong>HAL module integration</strong>, fixing UART and boot-flag handling along the way. This brings the TriCore port in line with other wolfBoot HAL-based targets.<br />_________________________________________________________________________________________________________</p><p><strong><span class="bbu">Filesystem-Backed and MTD-Backed Update State Management</span></strong></p><p>A key theme in 2.7.0 is better <strong>visibility and control</strong> over boot partition state, especially when integrating wolfBoot into larger systems and CI pipelines.</p><p><strong>library_fs target and CLI tools</strong></p><p>wolfBoot now exposes <strong>filesystem-backed partition state access</strong> via the new library_fs target and a companion CLI application often referred to as <strong>lib-fs</strong>. </p><p>With this setup, you can:<br /></p><ul><li><p>Build libwolfboot as a library with a backend that maps partitions onto regular files</p></li></ul><ul><li><p>Use the CLI to <strong>query boot partitions</strong>, inspect active/inactive slots, and track which image is pending or confirmed</p></li></ul><ul><li><p>Trigger update operations and simulate swaps without hardware, which is ideal for automated testing and offline integration flows</p></li></ul><p>This is particularly useful when you want to exercise wolfBoot’s state machine and update logic in a <strong>host-driven environment</strong>, for example, in a CI job that signs images and verifies that rollback and confirmation flows behave as expected.</p><p><strong>MTD-backed update status in libwolfboot</strong></p><p>For systems that use libwolfboot inside an OS and rely on <strong>raw flash / MTD devices</strong>, 2.7.0 introduces <strong>MTD-backed tracking of update status</strong>.</p><p>At a high level, this allows libwolfboot to:<br /></p><ul><li><p>Store update state directly on MTD-backed partitions, so progress and status survive resets</p></li></ul><ul><li><p>Integrate with standard MTD layers often found in Linux and RTOS-based designs (e.g. raw NOR/NAND layouts)</p></li></ul><p>This makes it easier to build robust OTA flows where the application or an update agent interacts with libwolfboot to coordinate staged images and confirmation logic on raw flash devices.<br />_________________________________________________________________________________________________________</p><p><strong><span class="bbu">Build System, Tools, and Configuration Improvements</span></strong></p><p><strong>CMake presets and out-of-tree builds</strong><br />Continuing the build system work from previous releases, wolfBoot 2.7.0 adds <strong>CMake presets</strong>, improves list handling, and further stabilizes <strong>out-of-tree builds</strong>, particularly for multi-target configurations.</p><p>The goal here is straightforward: make it easier for teams to:<br /></p><ul><li><p>Maintain a <strong>single CMake-based project</strong> that targets multiple boards or SoCs</p></li></ul><ul><li><p>Keep a clean source tree by building in separate directories</p></li></ul><ul><li><p>Automate builds in CI with reproducible preset configurations</p></li></ul><p><strong>Key tools and post-quantum test coverage</strong><br />The <strong>key generation and signing tools</strong> have also been refined:<br /></p><ul><li><p>keygen --no-overwrite lets you protect existing key material by refusing to overwrite files, a small but important safety feature in production build pipelines.</p></li></ul><ul><li><p>Stricter checks on image header and sector size help catch misconfigurations earlier in the build process instead of at boot time.</p></li></ul><ul><li><p><strong>Expanded ML-DSA test configurations</strong> improve coverage for post-quantum signatures, building on the PQC support introduced in earlier wolfBoot releases (ML-DSA, LMS, XMSS, and hybrids).</p></li></ul><p><strong>WOLFBOOT_RESTORE_CLOCK configuration</strong></p><p>A new configuration option, <strong>WOLFBOOT_RESTORE_CLOCK</strong>, gives integrators more fine-grained control over clock behavior around the boot process. When enabled, the HAL can explicitly restore or adjust system clocks as part of its wake-up/exit path, improving compatibility with platforms that expect a particular clock tree configuration before the application starts. </p><p>This is especially useful on STM32 and Nordic devices where the clock configuration during boot ROM execution might differ from what the application expects.<br />_________________________________________________________________________________________________________</p><p><strong><span class="bbu">Security and Reliability Fixes</span></strong><br />As usual, 2.7.0 includes important hardening and bug fixes across the code base: <br /></p><ul><li><p><strong>Encrypted and delta updates</strong><br /></p><ul><li><p>Additional protection against IV reuse in encrypted update flows</p></li></ul><ul><li><p>Fallback and regression fixes</p></li></ul><ul><li><p>Expanded unit test coverage around encrypted and delta path handling</p></li></ul></li></ul><ul><li><p><strong>Flash and STM32 improvements</strong><br /></p><ul><li><p>Fixed SPI flash protocol edge cases and strengthened write verification</p></li></ul><ul><li><p>Corrected STM32 internal flash page erase masks</p></li></ul><ul><li><p>Multiple fixes in STM32H5 update paths, including dual-bank and TPM-enabled builds</p></li></ul></li></ul><ul><li><p><strong>PowerPC / NXP P1021</strong><br /></p><ul><li><p>Resolved stage1 and MMU build issues to keep the PowerPC port aligned with modern toolchains</p></li></ul></li></ul><ul><li><p><strong>Warning cleanup and quality-of-life improvements</strong><br /></p><ul><li><p>Cleanup of compiler warnings across several targets, including STM32WB55 PKA and non-TrustZone nRF5340 builds</p></li></ul></li></ul><p>These changes improve reliability across a wide range of configurations and reduce friction when enabling more advanced features like dual-bank updates, encrypted delivery, and TPM-based boot flows.<br />_________________________________________________________________________________________________________</p><p><strong><span class="bbu">Updated Module Versions</span></strong><br />wolfBoot 2.7.0 aligns with the latest wolfSSL ecosystem components, pulling in updated versions of the underlying crypto and HSM libraries:<br /></p><ul><li><p><strong>wolfSSL</strong>: v5.8.4-stable (59f4fa568)</p></li></ul><ul><li><p><strong>wolfTPM</strong>: v2.4.0-594-g6d5df60</p></li></ul><ul><li><p><strong>wolfPKCS11</strong>: v2.0.0-stable-33-g81af264</p></li></ul><ul><li><p><strong>wolfHSM</strong>: v1.3.0 (8ac56d7)</p></li></ul><p>By being in sync with the latest version of the components, wolfBoot benefits from the latest performance optimizations, algorithm updates, and security fixes shipped in the wolfSSL family.<br />_________________________________________________________________________________________________________</p><p><strong><span class="bbu">Getting wolfBoot 2.7.0 and Next Steps</span></strong><br />wolfBoot 2.7.0 is available <strong>today</strong>:<br /></p><ul><li><p>Download the release package from the <a href="https://www.wolfssl.com/download/">wolfSSL download page</a> (select wolfBoot 2.7.0).</p></li></ul><ul><li><p>Clone the latest tag from the <a href="https://github.com/wolfSSL/wolfBoot">wolfBoot GitHub repository</a> for direct source access and integration.</p></li></ul><ul><li><p>Refer to the updated documentation and docs/lib.md for details on the library/library_fs targets, libwolfboot integration, and example flows.</p></li></ul><p>If you’d like help integrating wolfBoot 2.7.0 with your platform—whether it’s a Vorago VA416x0 design, a TrustZone-enabled MCU like nRF5340 or STM32H5, or an architecture such as PowerPC or x86—reach out to the wolfSSL team at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a>. We’re happy to assist with design reviews, custom ports, and compliance-driven secure boot deployments.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com.download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Tue, 16 Dec 2025 00:13:01 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2443-wolfboot-v270-available-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfTPM 3.10.0 Release]]></title>
			<link>https://www.wolfssl.com/forums/topic2438-wolftpm-3100-release-new-posts.html</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolftpm/"><strong>wolfTPM 3.10.0</strong></a> delivers a critical security fix, expanded embedded platform support, and enterprise-grade TPM resource management—empowering developers to build secure, scalable IoT and edge computing solutions with hardware-backed cryptography.</p><p><span class="bbu"><strong>Password Handling Fix</strong></span><br />A bug in the wolfTPM2_SetKeyAuthPassword() function introduced in v3.9.2 has been resolved. This API, primarily used by the C# wrapper, was incorrectly truncating passwords to 2 bytes.</p><ul><li><p><strong> Impact</strong>: Users of the wolfTPM2_SetKeyAuthPassword API or C# wrapper on v3.9.2</p></li></ul><ul><li><p><strong>Resolution</strong>: Password handling now correctly stores the full authentication credential, with regression tests added</p></li></ul><ul><li><p><strong> PR</strong>: <a href="https://github.com/wolfSSL/wolfTPM/pull/439">#439</a></p></li></ul><p><strong>Note</strong>: If you are using this API or the C# wrapper with v3.9.2, we recommend updating.</p><br /><p><span class="bbu"><strong>Espressif ESP32 HAL Support</strong></span><br />wolfTPM now natively supports <strong>ESP32-S3</strong>, <strong>ESP32-C6</strong>, and other ESP32 variants via SPI and I2C interfaces—bringing TPM 2.0 security to millions of IoT devices.</p><p><strong>Key Features</strong><br /></p><ul><li><p>Native ESP-IDF integration with pre-configured pin mappings</p></li></ul><ul><li><p>SPI speeds up to 22 MHz for high-performance cryptographic operations</p></li></ul><ul><li><p>I2C support for Infineon SLB9673 TPM modules</p></li></ul><ul><li><p>Hardware-backed key storage, secure boot, and device attestation</p></li></ul><ul><li><p><strong>PR</strong>: <a href="https://github.com/wolfSSL/wolfTPM/pull/386">#386</a></p></li></ul><p><span class="bbu"><strong>Enhanced CMake Build System &amp; TPM Module Selection</strong></span><br />Streamlined build configuration with new TPM hardware targeting:</p><p>| <strong>Option</strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | <strong>Supported Hardware</strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />--------------------------------------------------------------------------------<br />| WOLFTPM_MODULE=slb9672&nbsp; &nbsp;| Infineon OPTIGA™ TPM&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />--------------------------------------------------------------------------------<br />| WOLFTPM_MODULE=st33&nbsp; &nbsp; &nbsp; &nbsp; |&nbsp; STMicro STSAFE-TPM&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />--------------------------------------------------------------------------------<br />| WOLFTPM_MODULE=microchip | Microchip ATTPM20&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br />--------------------------------------------------------------------------------<br />| WOLFTPM_MODULE=nuvoton&nbsp; &nbsp;| Nuvoton NPCT75x&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br />--------------------------------------------------------------------------------</p><p><strong>Interface Options</strong>: SPI, I2C, MMIO, Linux devtpm, Windows TBS, Software TPM</p><div class="codebox"><pre><code>cmake .. -DWOLFTPM_MODULE=slb9672 -DWOLFTPM_INTERFACE=DEVTPM</code></pre></div><ul><li><p><strong>PR</strong>: <a href="https://github.com/wolfSSL/wolfTPM/pull/438">#438</a>, <a href="https://github.com/wolfSSL/wolfTPM/pull/430">#430</a></p></li></ul><p><span class="bbu"><strong>Linux TPM Resource Manager Support</strong></span><br />New support for /dev/tpmrm0 enables automatic TPM session virtualization and multi-process coordination.</p><p><strong>Enable with</strong>: WOLFTPM_USE_TPMRM</p><p>| <strong>Feature</strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| <strong>Raw Device (/dev/tpm0)</strong>&nbsp; &nbsp; &nbsp; &nbsp; | <strong>Resource Manager (/dev/tpmrm0)</strong>&nbsp; &nbsp;|<br />------------------------------------------------------------------------------------------------------------------------<br />| Multi-process access&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | Manual coordination&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| Automatic isolation&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br />------------------------------------------------------------------------------------------------------------------------<br />| Session management&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| Application handles&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | Kernel manages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br />------------------------------------------------------------------------------------------------------------------------<br />| Cleanup on exit&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| Must be explicit&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | Automatic&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br />------------------------------------------------------------------------------------------------------------------------</p><ul><li><p><strong>PR</strong>: <a href="https://github.com/wolfSSL/wolfTPM/pull/435">#435</a>, <a href="https://github.com/wolfSSL/wolfTPM/pull/434">#434</a></p></li></ul><p><span class="bbu"><strong>Additional Improvements</strong></span></p><p>| <strong>Feature</strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | <strong>PR</strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />-----------------------------------------------------------------------------------------------<br />| Fixed crypto callback hash algorithm selection&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | <a href="https://github.com/wolfSSL/wolfTPM/pull/433">#433</a>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />-----------------------------------------------------------------------------------------------<br />| Improved signature verification hash detection&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| <a href="https://github.com/wolfSSL/wolfTPM/pull/432">#432</a>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />-----------------------------------------------------------------------------------------------<br />| Improved TLS bidirectional shutdown&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| <a href="https://github.com/wolfSSL/wolfTPM/pull/431">#431</a>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />-----------------------------------------------------------------------------------------------<br />| Coverity static analysis fixes&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; | <a href="https://github.com/wolfSSL/wolfTPM/pull/441">#441</a>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;|<br />-----------------------------------------------------------------------------------------------<br />| Added make cppcheck option&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;| Various&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; |<br />-----------------------------------------------------------------------------------------------</p><p><span class="bbu"><strong>Why wolfTPM?</strong></span><br /></p><ul><li><p><strong> Portable</strong>: Runs on bare-metal RTOS, Linux, Windows, and macOS</p></li></ul><ul><li><p><strong> Lightweight</strong>: Small footprint for resource-constrained embedded systems</p></li></ul><ul><li><p><strong>Standards-compliant</strong>: Full TPM 2.0 specification support</p></li></ul><ul><li><p><strong>Production-ready</strong>: Trusted by automotive, aerospace, and industrial customers</p></li></ul><ul><li><p><strong>Open source</strong>: GPLv3 with commercial licensing available</p></li></ul><p><strong>Supported TPM Hardware</strong><br />Infineon OPTIGA™ SLB9670/9672/9673 • STMicro ST33 • Microchip ATTPM20 • Nuvoton NPCT75x • Nations Tech Z32H330/NS350 • Software TPM simulators</p><p><span class="bbu"><strong>Get Started</strong></span><br /></p><div class="codebox"><pre><code>git clone https://github.com/wolfSSL/wolfTPM.git
cd wolfTPM &amp;&amp; ./autogen.sh &amp;&amp; ./configure &amp;&amp; make</code></pre></div><p><strong>Resources</strong><br /></p><ul><li><p><a href="https://github.com/wolfSSL/wolfTPM">GitHub Repository</a></p></li></ul><ul><li><p><a href="https://github.com/wolfSSL/wolfTPM/blob/master/ChangeLog.md">Full Changes</a></p></li></ul><ul><li><p><a href="https://www.wolfssl.com/documentation/wolfTPM-Manual.pdf">Documentation</a></p></li></ul><ul><li><p><a href="https://www.wolfssl.com/contact/">Support</a></p></li></ul><p>wolfTPM is developed by wolfSSL Inc., the leading provider of lightweight, portable security solutions for embedded systems, IoT, automotive, and enterprise applications.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 424 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Tue, 09 Dec 2025 16:57:53 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2438-wolftpm-3100-release-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[Announcing wolfMQTT v1.21.0: NetX and ThreadX RTOS Support]]></title>
			<link>https://www.wolfssl.com/forums/topic2435-announcing-wolfmqtt-v1210-netx-and-threadx-rtos-support-new-posts.html</link>
			<description><![CDATA[<p>We are excited to announce the release of <a href="https://www.wolfssl.com/products/wolfmqtt/">wolfMQTT v1.21.0</a>, which introduces support for NetX and ThreadX RTOS platforms as its headline feature. This release continues our commitment to providing a lightweight, secure, and feature-rich MQTT client implementation for embedded systems and IoT applications.</p><p><strong>What&#039;s New in v1.21.0</strong><br />The wolfMQTT v1.21.0 release includes several significant enhancements:</p><p><span class="bbu">NetX and ThreadX RTOS Support</span><br />The most notable addition in this release is support for NetX networking stack and ThreadX RTOS. This enables wolfMQTT to be used on a wider range of embedded platforms, particularly those using Azure RTOS (formerly ThreadX) environments. These additions make wolfMQTT an excellent choice for industrial IoT applications and real-time embedded systems.</p><p><span class="bbu">License Update to GPLv3</span><br />Starting with this release, wolfMQTT is now available under the GPLv3 license. This update aligns wolfMQTT with the broader wolfSSL product family licensing model, providing clearer terms for open source usage while commercial licensing remains available for proprietary applications.</p><p><span class="bbu">Security Improvements</span><br />This release includes important security enhancements:<br /></p><ul><li><p>Fixed a heap buffer overflow vulnerability in MqttDecode_Num with improved bounds checking</p></li></ul><ul><li><p>Enhanced MQTT v5 property-packet protocol validation and decode safety</p></li></ul><ul><li><p>Corrected state transition checks in MqttClient_Auth for more robust authentication handling</p></li></ul><p><span class="bbu">Post-Quantum Cryptography Updates</span><br />The ML-KEM hybrid key exchange names have been updated to match the latest IETF Draft specifications. This ensures compatibility with evolving post-quantum cryptography standards and maintains interoperability with other implementations following the IETF naming conventions.</p><p><span class="bbu">ESP-IDF v5.5 Support</span><br />The Espressif ESP-IDF examples have been updated and pinned to ESP-IDF v5.5, ensuring compatibility with the latest Espressif development framework. This update also includes workflow improvements and line ending fixes for better cross-platform development.</p><p><span class="bbu">Additional Improvements</span><br /></p><ul><li><p>Updated test certificates to replace expired ones</p></li></ul><ul><li><p>Restored instructions for testing against OQS Mosquitto integration</p></li></ul><ul><li><p>Added fflush to mqtt-sub example for improved output handling</p></li></ul><ul><li><p>Various bug fixes for MQTT property decode error checks</p></li></ul><p><strong>About wolfMQTT</strong><br />wolfMQTT is a lightweight, embedded MQTT client implementation written in C that supports SSL/TLS via the wolfSSL library. It was built from the ground up to be multi-platform, space conscious, and extensible. The library supports:<br /></p><ul><li><p>MQTT v3.1.1 and v5.0 protocols</p></li></ul><ul><li><p>MQTT-SN (MQTT for Sensor Networks)</p></li></ul><ul><li><p>Quality of Service (QoS) levels 0-2</p></li></ul><ul><li><p>TLS encryption via wolfSSL</p></li></ul><ul><li><p>Non-blocking communications</p></li></ul><ul><li><p>Multithreading for parallel operations</p></li></ul><ul><li><p>Integration with popular IoT platforms (AWS IoT, Azure IoT Hub, IBM Watson IoT)</p></li></ul><p><strong>Getting wolfMQTT v1.21.0</strong><br />The wolfMQTT v1.21.0 release is available now on our <a href="https://www.wolfssl.com/download/">download page</a> and <a href="https://github.com/wolfSSL/wolfMQTT/releases/tag/v1.21.0">GitHub</a>.</p><p>Release 1.21.0 has been developed according to <a href="https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance">wolfSSL&#039;s development and QA process</a> and successfully passed the quality criteria.</p><p>Check out the <a href="https://github.com/wolfSSL/wolfMQTT/blob/master/ChangeLog.md">ChangeLog</a> for a full list of features and fixes, or contact us at <a href="mailto:facts@wolfSSL.com">facts@wolfSSL.com</a> with any questions.</p><p>While you&#039;re there, show us some love and give the wolfMQTT project a Star!</p><p>You can <a href="https://www.wolfssl.com/download/">download</a> the latest wolfMQTT release from our website or <a href="https://github.com/wolfSSL/wolfMQTT">clone</a> directly from our GitHub repository.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfSSL.com">facts@wolfSSL.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Thu, 04 Dec 2025 18:00:02 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2435-announcing-wolfmqtt-v1210-netx-and-threadx-rtos-support-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfSSL 5.8.4 Now Available]]></title>
			<link>https://www.wolfssl.com/forums/topic2424-wolfssl-584-now-available-new-posts.html</link>
			<description><![CDATA[<p>wolfSSL 5.8.4 introduces several updates, including the addition of a GPLv3 exceptions list. This allows specific GPLv3-licensed codebases linking against wolfSSL to continue using wolfSSL under GPLv2.</p><br /><p><strong>Current GPLv3 Exception:</strong><br /></p><ul><li><p>MariaDB Server</p></li></ul><ul><li><p>MariaDB Client Libraries</p></li></ul><ul><li><p>OpenVPN-NL</p></li></ul><ul><li><p>Fetchmail</p></li></ul><ul><li><p>OpenVPN</p></li></ul><br /><p><strong>Security Fixes</strong></p><p>This release includes multiple fixes across TLS 1.2, TLS 1.3, X25519, XChaCha20-Poly1305, and PSK processing. Highlights include:<br /></p><ul><li><p>A timing-side-channel issue in X25519 specifically affecting Xtensa-based ESP32 devices. Low-memory X25519 implementations are now the default for Xtensa.</p></li></ul><ul><li><p>A medium-severity TLS 1.3 server-side DoS risk from repeated KeyShareEntry values in malicious ClientHello messages.</p></li></ul><ul><li><p>Several TLS 1.3 downgrade-related issues (PFS downgrades, signature algorithm downgrades, and duplicate extension parsing).</p></li></ul><ul><li><p>A memory leak risk in TLS 1.2 certificate digest handling.</p></li></ul><ul><li><p>XChaCha20-Poly1305 decryption bounds-check fix and constant-time improvements in PSK binder verification.</p></li></ul><p>Special thanks to Adrian Cinal, Jaehun Lee, and Kyungmin Bae (POSTECH), Luigino Camastra (Aisle Research), and all researchers who contributed.</p><br /><p><strong>New Features</strong></p><p>This release includes focused improvements and additions:<br /></p><ul><li><p><strong>ML-KEM / ML-DSA</strong>: new APIs, PKCS8 seed/import support, and improved key management.</p></li></ul><ul><li><p><strong>FreeBSD kernel module</strong>: initial support for wolfCrypt in the FreeBSD kernel.</p></li></ul><ul><li><p><strong>PKCS7/CMS</strong>: expanded decoding capabilities, additional callbacks, and more flexible builds.</p></li></ul><ul><li><p><strong>Rust wrapper enhancements</strong>: broader algorithm coverage, optional heap/dev_id support, and conditional compilation based on C build options.</p></li></ul><ul><li><p><strong>Hardware platform update</strong>s: STM32 and PSoC6 improvements, including STM32U5 SAES support.</p></li></ul><ul><li><p>New –enable-curl=tiny option for smaller cURL-linked builds.</p></li></ul><br /><p><strong>Improvements &amp; Optimizations</strong></p><p>Key improvements include:<br /></p><ul><li><p>Broader and more consistent testing across TLS 1.3/1.2, libssh2, Arduino, ESP-IDF, and nightly workflows.</p></li></ul><ul><li><p>Documentation updates, expanded crypto-callback support, and improved AES/HW offload functionality.</p></li></ul><ul><li><p>ESP32, Renesas FSP/RA, and SGX build enhancements.</p></li></ul><ul><li><p>Build-system refinements across Autotools, CMake, Apple platforms, and Debian packaging.</p></li></ul><ul><li><p>RISC-V and PPC32 assembly introspection helpers and benchmarking updates.</p></li></ul><br /><p><strong>Bug Fixes</strong></p><p>Notable fixes:<br /></p><ul><li><p>C# wrapper correction for Ed25519 raw public-key import.</p></li></ul><ul><li><p>Sniffer stability fixes and X.509 path-length and certificate-chain improvements.</p></li></ul><ul><li><p>DTLS ordering, cookie handling, and replay protection updates.</p></li></ul><ul><li><p>Kernel-mode, FIPS, and PIE-related build fixes.</p></li></ul><ul><li><p>ML-KEM/ML-DSA correctness and safety fixes.</p></li></ul><ul><li><p>Various static-analysis, warning cleanup, memory-management, and undefined-behavior fixes.</p></li></ul><br /><p>For a more detailed list of changes, check out the <a href="https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md">ChangeLog.md</a> bundled with wolfSSL. To download the latest release, go to the <a href="https://www.wolfssl.com/download/">download page</a>. For any questions, reach out to us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Fri, 21 Nov 2025 22:26:16 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2424-wolfssl-584-now-available-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfProvider 1.1.0: Major Release with Enhanced Features and Extensive]]></title>
			<link>https://www.wolfssl.com/forums/topic2409-wolfprovider-110-major-release-with-enhanced-features-and-extensive-new-posts.html</link>
			<description><![CDATA[<p>wolfSSL is proud to announce the release of <a href="https://github.com/wolfSSL/wolfProvider/releases/tag/v1.1.0">wolfProvider 1.1.0</a>. This major release represents a significant milestone in our commitment to providing robust OpenSSL 3.x compatibility with FIPS 140-3 validated cryptography. wolfProvider 1.1.0 has been developed according to wolfSSL’s rigorous development and QA process and has successfully passed our quality criteria.</p><p>wolfProvider is designed for customers who want FIPS-validated cryptography but are already invested in using OpenSSL. The provider delivers drop-in replacements for cryptographic algorithms used by OpenSSL, leveraging the wolfCrypt engine underneath, which is FIPS 140-3 certified.</p><p><span class="bbu"><strong>New Cryptographic Features</strong></span><br />This release introduces several important cryptographic capabilities:<br /></p><ul><li><p><strong>KBKDF (Key-Based Key Derivation Function)</strong>: Implementation of NIST SP 800-108 key derivation for secure key generation from existing key material.</p></li></ul><ul><li><p><strong>KRB5KDF (Kerberos 5 Key Derivation Function)</strong>: Support for Kerberos cryptographic operations, enabling enterprise authentication scenarios.</p></li></ul><ul><li><p><strong>AES-CTS (Ciphertext Stealing)</strong>: Additional AES cipher mode for applications requiring specific padding behavior.</p></li></ul><ul><li><p><strong>RSA No-Padding Operations</strong>: Raw RSA encrypt/decrypt operations for applications with custom padding schemes.</p></li></ul><p><span class="bbu"><strong>Replace-Default Provider Mode</strong></span><br />A groundbreaking feature in this release is the ability to replace OpenSSL’s default provider entirely with wolfProvider. This mode makes wolfProvider the primary cryptographic implementation system-wide, allowing existing OpenSSL applications to transparently use wolfSSL’s FIPS-validated cryptography without any code modifications. This feature includes comprehensive testing to ensure the default swap works as expected across various scenarios.</p><p><span class="bbu"><strong>Enhanced Testing and Quality Assurance</strong></span><br />wolfProvider 1.1.0 significantly expands our integration testing with real-world open-source applications. We’ve added automated CI/CD workflows for over 40 popular applications, ensuring wolfProvider works seamlessly with:</p><p><strong>Network Infrastructure</strong>: gRPC, OpenSSH, libssh2, OpenSC/PKCS11, OpenLDAP, IPMItool, Stunnel, socat, SSSD, net-snmp, liboauth2, tnftp, systemd, X11VNC, sscep, TPM2 tools, libcryptsetup, libtss2, KRB5, bind9, hostap<br /><strong>Development Tools</strong>: Python3 NTP, libeac, xmlsec, Qt5 Network, rsync, libwebsockets, tcpdump, cjose, iperf, libfido2, ppp, pam-pkcs11, kmod, libnice</p><p>This extensive testing demonstrates wolfProvider’s production-readiness and compatibility with the broader OpenSSL ecosystem.</p><p><span class="bbu"><strong>Command-Line Integration</strong></span><br />New command-line integration tests validate wolfProvider’s compatibility with OpenSSL command-line tools for AES, RSA, RSA-PSS, Hash, and ECC operations. This ensures that scripts and automation tools using OpenSSL commands work correctly with wolfProvider.</p><p><span class="bbu"><strong>Debian Package Support</strong></span><br />This release includes comprehensive Debian packaging support, making deployment on Debian-based systems straightforward. The packaging includes proper dependency management and integration with the system OpenSSL configurations.</p><p><span class="bbu"><strong>Bug Fixes and Stability Improvements</strong></span><br />wolfProvider 1.1.0 includes over 100 bug fixes addressing issues across all cryptographic operations:<br />AES Improvements: Fixed AES-GCM streaming bugs, authentication tag handling, IV management, and CBC consecutive call handling.<br /><strong>RSA Enhancements</strong>: Resolved RSA PSS decoding issues, key import edge cases, keygen retry logic, certificate display formatting, and parameter handling.<br /><strong>ECC Fixes</strong>: Corrected public key validation, parameter handling, private key operations, signing restrictions, and encoding issues.<br /><strong>DH Corrections</strong>: Fixed FIPS build compatibility, parameter handling, private key operations, and decoder registrations.<br /><strong>General Stability</strong>: Improved locking around signature operations, NULL reinit handling, core libctx management, and OpenSSL patching detection.</p><p><span class="bbu"><strong>Looking Forward</strong></span><br />wolfProvider 1.1.0 represents a major step forward in providing FIPS-validated cryptography to the OpenSSL ecosystem. The extensive integration testing, new cryptographic features, and replace-default mode make this release suitable for production deployment in enterprise environments requiring FIPS compliance.</p><p>Refer to the <a href="https://github.com/wolfSSL/wolfProvider/blob/master/README.md">README.md</a> found in the release for usage instructions. We also maintain a <a href="https://github.com/wolfSSL/wolfProvider/blob/master/ChangeLog.md">ChangeLog.md</a> for a complete list of changes in each release.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Tue, 04 Nov 2025 21:20:57 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2409-wolfprovider-110-major-release-with-enhanced-features-and-extensive-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfSSH 1.4.21 Released]]></title>
			<link>https://www.wolfssl.com/forums/topic2399-wolfssh-1421-released-new-posts.html</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolfssh/">Version 1.4.21 of wolfSSH</a> is now available! This update includes a critical security fix, improved interoperability, and enhancements for embedded and hardware-backed key use cases.</p><p><strong>Security Updates</strong><br />This release addresses two security issues:<br /></p><ul><li><p><strong>CVE-2025-11625</strong>: Fixed a client-side host verification bypass that could expose credentials. (<a href="https://github.com/wolfSSL/wolfssh/pull/840">PR#840</a>)</p></li></ul><ul><li><p><strong>CVE-2025-11624</strong>: Fixed an SFTP server stack overflow triggered by malformed input. Thanks to Stanislav Fort of Aisle Research for the report</p></li></ul><p><strong>Feature Additions</strong><br /></p><ul><li><p><strong>TPM key authentication</strong> for hardware-based identity protection.</p></li></ul><ul><li><p><strong>ED25519 key generation</strong> support added to the API.</p></li></ul><ul><li><p><strong>Curve25519 alias compatibility</strong> with <span style="color: #188038">curve25519-sha256@libssh.org</span> for improved interoperability.</p></li></ul><ul><li><p><strong>Keyboard-interactive authentication</strong> can now be enabled at build time (<span style="color: #188038">--enable-keyboard-interactive</span>).</p></li></ul><ul><li><p><strong>AES-CBC</strong> is now disabled by default, shifting focus toward stronger default cipher suites.</p></li></ul><ul><li><p>Added <strong>Microchip ATSAMV71Q21B</strong> example with harmony filesystem integration.</p></li></ul><p>This version refines FATFS support, enhances user authentication handling, and improves SFTP and rekeying operations. Post quantum hybrid support was also touched up along with numerous Coverity findings, warning cleanups, and minor API consistency fixes.</p><p>Users of the wolfSSH client code or SFTP server should upgrade, particularly those relying on host verification.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download </a>wolfSSL Now</strong></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Thu, 23 Oct 2025 22:35:32 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2399-wolfssh-1421-released-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfBoot v2.6.0 Now Available]]></title>
			<link>https://www.wolfssl.com/forums/topic2370-wolfboot-v260-now-available-new-posts.html</link>
			<description><![CDATA[<p>The wolfSSL team has released <a href="https://www.wolfssl.com/products/wolfboot/">version 2.6.0 of wolfBoot</a>, the lightweight and portable secure bootloader for embedded systems. This update expands platform coverage, improves support for external memory layouts, and adds key performance optimizations for a range of architectures. It also includes critical fixes and brings updated module integration across the wolfSSL ecosystem.</p><p><span class="bbu"><strong>New Platform Support</strong></span><br /><strong>PIC32CZ CA (Cortex-M7)</strong> and <strong>PIC32CK (Cortex-M33)</strong> devices from Microchip are now supported. The PIC32CZ family targets high-performance secure connected applications with integrated HSM and extended memory. The PIC32CK line brings TrustZone support for secure partitioning on Armv8-M systems. wolfBoot can now provide verified secure boot and firmware updates across both families.</p><p><strong><span class="bbu">External Flash Support with ELF Scattering</span></strong><br />wolfBoot now supports <strong>external flash configurations</strong> when using ELF scattering mode. This enables firmware sections to be distributed between internal and external flash, useful in scenarios where internal flash is limited or where larger applications are split across multiple memory regions.</p><p><strong><span class="bbu">Encrypted Updates on Renesas RX</span></strong><br />Encrypted firmware updates are now supported for the <strong>Renesas RX</strong> family. When paired with Renesas TSIP (Trusted Secure IP), wolfBoot can handle encrypted update packages, with decryption performed securely on-chip using hardware-managed keys. This provides strong protection for sensitive firmware in the field.</p><p><strong><span class="bbu">PowerPC 32-bit Optimizations</span></strong><br />New assembly-level optimizations for <strong>SHA</strong> and <strong>AES</strong> are now available on <strong>32-bit PowerPC</strong> platforms. These improvements reduce boot-time cryptographic processing overhead and improve performance during image verification and decryption operations.</p><p><strong><span class="bbu">STM32F4 Enhancements</span></strong><br />wolfBoot v2.6.0 includes updated <strong>clock configuration logic</strong> for the STM32F4 series, ensuring compatibility across the full device family. In addition, support has been added for the <strong>STM32F411</strong> variant, commonly used in development and prototyping platforms.</p><p><strong><span class="bbu">Fixes and Improvements</span></strong><br />This release includes several important bug fixes:<br /></p><ul><li><p>Fixed unaligned memory access on Cortex-A5</p></li></ul><ul><li><p>Corrected compile flags to allow execution from RAM on ARM targets</p></li></ul><ul><li><p>Proper handling of VTOR_NS when staging non-secure images in TrustZone-M mode</p></li></ul><ul><li><p>Removed redundant flash write-after-erase cycle in wolfBoot_update_trigger</p></li></ul><ul><li><p>Multiple TrustZone-related fixes for STM32H5 devices</p></li></ul><p>These changes improve stability, reduce flash wear, and ensure correct behavior on secure platforms.</p><p><strong><span class="bbu">Updated Module Versions</span></strong><br />The following components have been updated in this release:<br /></p><ul><li><p><a href="https://www.wolfssl.com/products/wolfssl/">wolfSSL version 5.8.2</a> or later</p></li></ul><ul><li><p><a href="https://www.wolfssl.com/products/wolftpm/">wolfTPM version 3.9.1</a> or later</p></li></ul><ul><li><p><a href="https://github.com/wolfSSL/wolfPKCS11"><strong>wolfPKCS11</strong></a> latest revision</p></li></ul><ul><li><p><a href="https://www.wolfssl.com/products/wolfhsm/">wolfHSM</a> latest revision</p></li></ul><p><strong><span class="bbu">More Information</span></strong><br />To download the latest version of wolfBoot, visit our <a href="https://www.wolfssl.com/download/&quot;">download page</a> or clone it from the <a href="https://github.com/wolfSSL/wolfBoot">wolfBoot GitHub repository</a>. For questions about commercial support, licensing, or integration assistance, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or +1 425 245 8247.</p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Mon, 18 Aug 2025 17:19:56 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2370-wolfboot-v260-now-available-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfCLU 0.1.9 Available Now]]></title>
			<link>https://www.wolfssl.com/forums/topic2356-wolfclu-019-available-now-new-posts.html</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolfclu/">wolfCLU version 0.1.9</a> is now available! This command-line utility, built on the wolfSSL embedded TLS library, helps with admin tasks and common use cases such as key generation and certificate parsing to human human-readable form.</p><p>Among the most notable changes to this release is the addition of support for PKCS8 and Base64 commands, introduced in <a href="https://github.com/wolfSSL/wolfclu/pull/178">PR #178</a>. These features make it easier to handle common encoding formats and key conversions directly from the command line, streamlining workflows involving PEM or DER-encoded data.</p><p>The update also includes important fixes to macro definitions related to client and server Key Encapsulation Mechanisms (KEM), as noted in <a href="https://github.com/wolfSSL/wolfclu/pull/177">PR #177</a>. These corrections ensure proper configuration and usage when working with post-quantum cryptographic modes and hybrid TLS key exchange scenarios.</p><p>To support users working in FIPS-approved environments, wolfCLU now better aligns with FIPS 140-3 expectations. In <a href="https://github.com/wolfSSL/wolfclu/pull/183">PR #183</a>, tests were adjusted to reflect the removal of DES in FIPS mode, and new output was added to indicate when FIPS is enabled. These changes help clarify operational state and support auditability during validation efforts.</p><p>This release also updates the license from GPLv2 to GPLv3 (<a href="https://github.com/wolfSSL/wolfclu/pull/184">PR #184</a>).</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p><br /><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong><br /><span style="color: #fafafa">wolfSSL is the best tested TLS library.</span></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Tue, 29 Jul 2025 21:22:41 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2356-wolfclu-019-available-now-new-posts.html</guid>
		</item>
		<item>
			<title><![CDATA[wolfSSL 5.8.2 Now Available]]></title>
			<link>https://www.wolfssl.com/forums/topic2345-wolfssl-582-now-available-new-posts.html</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolfssl/">wolfSSL 5.8.2</a> is now available! We are excited to announce the release of wolfSSL 5.8.2, packed with significant enhancements, introducing new functionalities, and refining existing features!</p><p><span class="bbu"><strong>Important Notes for this Release</strong></span></p><ul><li><p><strong>GPLv3 Licensing:</strong> wolfSSL has transitioned from GPLv2 to GPLv3.</p></li></ul><ul><li><p><strong>Deprecated Feature:</strong> `–enable-heapmath` is now deprecated.</p></li></ul><ul><li><p><strong>MD5 Disabled by Default:</strong> For enhanced security, MD5 is now disabled by default.</p></li></ul><p><span class="bbu"><strong>Key Highlights of wolfSSL 5.8.2</strong></span></p><p><strong>Vulnerability Mitigations:</strong><br /></p><ul><li><p><strong>ECC and Ed25519 Fault Injection Mitigation (Low):</strong> (Thanks to Kevin from Fraunhofer AISEC)</p></li></ul><ul><li><p><strong>Apple Native Cert Validation Override (High – CVE-2025-7395):</strong> (Thanks to Thomas Leong from ExpressVPN)</p></li></ul><ul><li><p><strong>Predictable `RAND_bytes()` after `fork()` (Medium – CVE-2025-7394):</strong> (Thanks to Per Allansson from Appgate)</p></li></ul><ul><li><p><strong>Curve25519 Blinding Enabled by Default (Low – CVE-2025-7396):</strong> (Thanks to Arnaud Varillon, Laurent Sauvage, and Allan Delautre from Telecom Paris)</p></li></ul><p><strong>New Features:</strong><br /></p><ul><li><p><strong>Sniffer Enhancements:</strong> Support for multiple sessions and a new `ssl_RemoveSession()` API for cleanup.</p></li></ul><ul><li><p><strong>New ASN.1 X509 API:</strong> `wc_GetSubjectPubKeyInfoDerFromCert` for retrieving public key information.</p></li></ul><ul><li><p><strong>PKCS#12 Improvements:</strong> `wc_PKCS12_create()` now supports PBE_AES(256|128)_CBC key and certificate encryptions.</p></li></ul><ul><li><p><strong>PKCS#7 Decoding:</strong> Added `wc_PKCS7_DecodeEncryptedKeyPackage()` for decoding encrypted key packages.</p></li></ul><ul><li><p><strong>Linux Kernel Module Expansion:</strong> All AES, SHA, and HMAC functionality now implemented within the Linux Kernel Module.</p></li></ul><ul><li><p><strong>OpenSSL Compatibility Layer Additions:</strong> New APIs for X.509 extensions and RSA PSS: `i2d_PrivateKey_bio`, `BN_ucmp`, and `X509v3_get_ext_by_NID`.</p></li></ul><ul><li><p><strong>Platform Support:</strong> Added support for STM32N6.</p></li></ul><ul><li><p><strong>Assembly Optimizations:</strong> Implemented SHA-256 for PPC 32 assembly.</p></li></ul><p><span class="bbu"><strong>Improvements &amp; Optimizations</strong></span></p><p>This release includes a wide range of improvements across various categories, including:<br /></p><ul><li><p><strong>Extensive Linux Kernel Module (LinuxKM) Enhancements:</strong> Numerous minor fixes, registrations, and optimizations for cryptography operations within the Linux Kernel Module.</p></li></ul><ul><li><p><strong>Post-Quantum Cryptography (PQC) &amp; Asymmetric Algorithms:</strong> Updates to Kyber, backward compatibility for ML_KEM IDs, fixes for LMS building and parameters, and OpenSSL format support for ML-DSA/Dilithium.</p></li></ul><ul><li><p><strong>Build System &amp; Portability:</strong> General build configuration fixes, improvements for older GCC versions, new CMakePresets, and default MD5 disabling.</p></li></ul><ul><li><p><strong>Testing &amp; Debugging:</strong> Enhanced debugging output, additional unit tests for increased code coverage, and improved benchmark help options.</p></li></ul><ul><li><p><strong>Certificates &amp; ASN.1:</strong> Improved handling of X509 extensions, fixed printing of empty names, and better error handling.</p></li></ul><ul><li><p><strong>TLS/DTLS &amp; Handshake:</strong> Corrected group handling, improved DTLS record processing, and refined TLS 1.3 key derivation.</p></li></ul><ul><li><p><strong>Memory Management &amp; Optimizations:</strong> Stack refactors, improved stack size with MLKEM and Dilithium, and heap math improvements.</p></li></ul><ul><li><p><strong>Cryptography &amp; Hash Functions:</strong> Added options to disable assembly optimizations for SipHash and SHA3, and improved Aarch64 XFENCE.</p></li></ul><ul><li><p><strong>Platform-Specific &amp; Hardware Integration:</strong> Explicit support for ESP32P4, public `wc_tsip_*` APIs, and enhanced PlatformIO certificate bundle support.</p></li></ul><ul><li><p><strong>General Improvements &amp; Refactoring:</strong> Updated libspdm, fixed PEM key formatting, and improved API accessibility for certificate failure callbacks.</p></li></ul><p>wolfSSL 5.8.2 also includes some nice bug fixes, addressing issues across various modules, ensuring greater stability and reliability. For a complete and detailed list of all changes, please refer to the <a href="https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md">full release notes</a>.</p><p>We encourage all users to upgrade to wolfSSL 5.8.2 to take advantage of these important security updates, new features, and performance enhancements. <a href="https://www.wolfssl.com/download/">Download</a> the latest release.</p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfSSL.com">facts@wolfSSL.com</a> or call us at +1 425 245 8247.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL Now</strong><br /><span style="color: #fafafa">wolfSSL is the best tested TLS</span></p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Fri, 18 Jul 2025 20:11:22 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/topic2345-wolfssl-582-now-available-new-posts.html</guid>
		</item>
	</channel>
</rss>
