RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL 5.8.2 Now Available

wolfSSL 5.8.2 is now available! We are excited to announce the release of wolfSSL 5.8.2, packed with significant enhancements, introducing new functionalities, and refining existing features!

Important Notes for this Release

  • GPLv3 Licensing: wolfSSL has transitioned from GPLv2 to GPLv3.
  • Deprecated Feature: `–enable-heapmath` is now deprecated.
  • MD5 Disabled by Default: For enhanced security, MD5 is now disabled by default.

Key Highlights of wolfSSL 5.8.2

Vulnerability Mitigations:

  • ECC and Ed25519 Fault Injection Mitigation (Low): (Thanks to Kevin from Fraunhofer AISEC)
  • Apple Native Cert Validation Override (High – CVE-2025-7395): (Thanks to Thomas Leong from ExpressVPN)
  • Predictable `RAND_bytes()` after `fork()` (Medium – CVE-2025-7394): (Thanks to Per Allansson from Appgate)
  • Curve25519 Blinding Enabled by Default (Low – CVE-2025-7396): (Thanks to Arnaud Varillon, Laurent Sauvage, and Allan Delautre from Telecom Paris)

New Features:

  • Sniffer Enhancements: Support for multiple sessions and a new `ssl_RemoveSession()` API for cleanup.
  • New ASN.1 X509 API: `wc_GetSubjectPubKeyInfoDerFromCert` for retrieving public key information.
  • PKCS#12 Improvements: `wc_PKCS12_create()` now supports PBE_AES(256|128)_CBC key and certificate encryptions.
  • PKCS#7 Decoding: Added `wc_PKCS7_DecodeEncryptedKeyPackage()` for decoding encrypted key packages.
  • Linux Kernel Module Expansion: All AES, SHA, and HMAC functionality now implemented within the Linux Kernel Module.
  • OpenSSL Compatibility Layer Additions: New APIs for X.509 extensions and RSA PSS: `i2d_PrivateKey_bio`, `BN_ucmp`, and `X509v3_get_ext_by_NID`.
  • Platform Support: Added support for STM32N6.
  • Assembly Optimizations: Implemented SHA-256 for PPC 32 assembly.

Improvements & Optimizations:

This release includes a wide range of improvements across various categories, including:

  • Extensive Linux Kernel Module (LinuxKM) Enhancements: Numerous minor fixes, registrations, and optimizations for cryptography operations within the Linux Kernel Module.
  • Post-Quantum Cryptography (PQC) & Asymmetric Algorithms: Updates to Kyber, backward compatibility for ML_KEM IDs, fixes for LMS building and parameters, and OpenSSL format support for ML-DSA/Dilithium.
  • Build System & Portability: General build configuration fixes, improvements for older GCC versions, new CMakePresets, and default MD5 disabling.
  • Testing & Debugging: Enhanced debugging output, additional unit tests for increased code coverage, and improved benchmark help options.
  • Certificates & ASN.1: Improved handling of X509 extensions, fixed printing of empty names, and better error handling.
  • TLS/DTLS & Handshake: Corrected group handling, improved DTLS record processing, and refined TLS 1.3 key derivation.
  • Memory Management & Optimizations: Stack refactors, improved stack size with MLKEM and Dilithium, and heap math improvements.
  • Cryptography & Hash Functions: Added options to disable assembly optimizations for SipHash and SHA3, and improved Aarch64 XFENCE.
  • Platform-Specific & Hardware Integration: Explicit support for ESP32P4, public `wc_tsip_*` APIs, and enhanced PlatformIO certificate bundle support.
  • General Improvements & Refactoring: Updated libspdm, fixed PEM key formatting, and improved API accessibility for certificate failure callbacks.

wolfSSL 5.8.2 also includes some nice bug fixes, addressing issues across various modules, ensuring greater stability and reliability. For a complete and detailed list of all changes, please refer to the full release notes.

We encourage all users to upgrade to wolfSSL 5.8.2 to take advantage of these important security updates, new features, and performance enhancements. Download the latest release.

If you have questions about any of the above, please contact us at facts@wolfSSL.com or call us at +1 425 245 8247.

Download wolfSSL Now

wolfCrypt Examples for Renesas RH850

The RH850 Family of 32-bit automotive microcontrollers (MCUs) is an automotive microcontroller equipped with an integrated Hardware Security Module (HSM). It ensures fast and secure key management, cryptographic processing, and authentication at the hardware level. Designed for next-generation ECUs, it combines functional safety with advanced security.

wolfSSL has now provided a wolfCrypt use case on Renesas RH850 using Renesas CS+ in our wolfSSL Examples GitHub repository. The Github repository contains client and server examples that set up and test various types of connections. In addition to these clients/servers, we have included examples that demonstrate how to build wolfSSL with specific real time operating systems and TCP/IP stacks for embedded systems and devices, and how to use some features of the library like the certificate manager or wolfCrypt’s public-key functionality.

This time, we added the RSAPSS-Sign-Verify program to the repository. You can find <wolfssl-examples>/Renesas/cs+/RH850/rsapss_sign_verify in the repository. The program is a ready-to-run Renesas CS+ program for RH850. Please follow REAME in <wolfssl-examples>/Renesas/cs+/RH850/, then you can easily enjoy RSA Sign/Verify on your device. We will add more examples in the future.

If you have questions about any of the above, please contact us at facts@wolfSSL.com or call us at +1 425 245 8247.

Download wolfSSL Now

MD5 Disabled by Default in wolfSSL: What You Need to Know

As part of our ongoing effort to deliver secure-by-default cryptography, wolfSSL has disabled the MD5 hash algorithm by default in the latest release. Don’t worry, it isn’t going away completely, but just disabled at compile time, by default.

Why Disable MD5?

MD5 has been considered cryptographically broken for many years due to known collision attacks. While it’s still used in legacy systems for non-security-critical purposes, it no longer meets modern security standards. Disabling MD5 by default aligns wolfSSL with best practices and further hardens applications that rely on us for secure communications, and has already been done in FIPS builds of wolfSSL.

What Changed?

MD5 is now disabled by default in the master branch of wolfSSL. We expect this default behavior to be in release 5.8.2 and up. If your application or any third-party dependency attempts to use MD5 without explicitly enabling it, you may encounter build or runtime issues such as:

  • Compilation errors involving wc_InitMd5() or other MD5 functions
  • Protocol negotiation failures if MD5 is assumed as a supported digest (e.g., in TLS 1.0/1.1 or some legacy certificate chains)
  • Unexpected behavior in libraries that rely on MD5 internally but don’t check if it’s available

You can check if MD5 is disabled in your configuration by seeing if NO_MD5 is set at compile time.

How to Re-Enable MD5 (If Needed)

If you’re working in a legacy environment or need MD5 for interoperability reasons, you can explicitly re-enable MD5 support by doing the following.

Builds using autotools:

./configure --enable-md5

Builds using cmake:

mkdir -p build
cd build
cmake .. -DNO_MD5=OFF

We strongly encourage you to audit any use of MD5 in your project before re-enabling it. If it’s being used for digital signatures or certificate verification, consider updating to SHA-256 or stronger algorithms.

If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.

Download wolfSSL Now

Live Webinar: How to Determine FIPS Compliance for Government Buyers

Cut through the confusion of FIPS 140-3 compliance and learn how to verify it with confidence.

Join us on August 6th at 9 AM PT for a focused webinar presented by wolfSSL Senior Software Engineer Kaleb Himes. This session will break down the complexity of FIPS?140?3 compliance and help government buyers and contributors accurately evaluate solutions.

Register today: How to Determine FIPS Compliance for Government Buyers
Date: August 6th | 9 AM PT

wolfSSL maintains FIPS 140-3 validated certificate #4718 and #5401 and brings unmatched portability, running on everything and well optimized for dozens of Hardware targets. In this webinar, we will walk through exactly how to verify FIPS compliance and avoid common mistakes when reviewing vendor claims.

This webinar will cover:

  • Key FIPS terms and why FIPS matters
  • Why it’s important for your Operating Environment (OE) to appear on the certificate
  • How to looking up and interpret a FIPS certificate (SP800-140Br1 automated FIPS certs vs traditional FIPS certs included)
  • How to locate and read the module’s Security Policy
  • How to determine if an OE was actually tested or only vendor affirmed (SP800-140Br1 vs traditional included)
  • How to check algorithm (CAVP) certificates
  • How to spot fake or misleading FIPS claims

Register today and gain a clear understanding of how to assess FIPS compliance before making procurement decisions.

As always, our webinar will include Q&A throughout. If you have questions about any of the above, please contact us at facts@wolfSSL.com or call us at +1 425 245 8247.

Download wolfSSL Now

A2A and wolfSSL

Here at wolfSSL, we are seeing a lot of interest in AI. Some of the most fascinating developments that are happening are around letting different AI agents communicate with each other. Do those communications need to be secured, authenticated, and integrity checked? Of course!

Enter the A2A (Agent2Agent) protocol, which uses HTTPS as its primary transport layer.

Check out the official A2A protocol implementation links:

How can wolfSSL help in this endeavor? Well, it is looking like the government is going to be one of the biggest consumers of AI technology, with a fast and agile uptake of AI technology. If they are going to need cryptography to protect this protocol, it had better be FIPS 140-3 certified! Did we mention our FIPS 140-3 certificate #4718?

This shows the chain of dependencies from the A2A reference library down to the OpenSSL library, which provides the underlying cryptographic functionality:

A2A Reference Library → httpx → httpcore → ssl (Python module) → OpenSSL

We can add wolfProvider and wolfCrypt FIPS to that to bring it into compliance so the government can use it! It would look like this:

A2A Reference Library → httpx → httpcore → ssl (Python module) → OpenSSL → wolfProviderwolfCrypt FIPS

For extra performance, another option would be to do an integration with wolfssl-py; our python wrapper for wolfSSL.

Interested in seeing this happen? We are! Let us know if you’re interested!

If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.

Download wolfSSL Now

wolfSSL Expands Embedded Security with HighTec Compiler and RTOS Support

The embedded systems landscape continues to evolve rapidly, with developers demanding robust security solutions that seamlessly integrate with their preferred development tools and real-time operating systems. Today, we’re excited to announce that wolfSSL’s comprehensive security suite will support the HighTec compiler and RTOS, bringing enterprise-grade cryptographic capabilities to even more embedded applications.

Comprehensive Security for HighTec Environments

This new support will encompass our complete security ecosystem:

  • wolfSSL – Our flagship TLS/SSL library can compile cleanly with HighTec’s advanced optimization features, ensuring minimal memory footprint while maintaining maximum security. Whether you’re building IoT devices, industrial controllers, or automotive systems, wolfSSL delivers the cryptographic protocols you need with the performance HighTec users expect.
  • wolfBoot – Secure boot has never been more critical for embedded systems. Our wolfBoot secure bootloader will integrate seamlessly with HighTec-compiled applications, providing verified boot processes that protect against firmware tampering and ensure only authenticated code executes on your devices. The combination of HighTec’s efficient code generation and wolfBoot’s security features creates a powerful foundation for trustworthy embedded systems.
  • wolfHSM – Hardware Security Module functionality comes to HighTec environments through wolfHSM, enabling secure key storage, cryptographic operations, and hardware-based root of trust. This integration will allow developers to leverage dedicated security hardware while maintaining the development workflow they know and trust.

Why This Matters

The HighTec compiler family has long been trusted by embedded developers for its superior code optimization and comprehensive target support. By adding native wolfSSL support, we’re eliminating the integration barriers that previously required custom porting efforts. This means:

  • Faster Time to Market: No more wrestling with compiler-specific adaptations
  • Optimized Performance: HighTec’s advanced optimizations will work seamlessly with our security libraries
  • Reduced Risk: Proven security implementations without the uncertainty of custom ports
  • Future-Proof: Ongoing support ensures compatibility with future HighTec releases

Real-World Impact

Consider an industrial automation system running on a HighTec-supported microcontroller. With this new support, developers can now implement:

  • Secure communication channels using wolfSSL’s TLS 1.3 implementation
  • Verified boot sequences through wolfBoot integration
  • Hardware-backed key management via wolfHSM

All while leveraging HighTec’s industry-leading code optimization and debugging capabilities.

Looking Forward

This expansion represents more than just another compiler target – it’s part of our ongoing commitment to making robust security accessible across the entire embedded ecosystem. As embedded systems become increasingly connected and critical to our daily lives, having trusted security solutions that work with your preferred tools becomes essential.

The combination of HighTec’s development excellence and wolfSSL’s security expertise opens new possibilities for secure embedded applications. Whether you’re protecting industrial control systems, securing IoT deployments, or building the next generation of connected devices, this integration provides the foundation you need.

Ready to explore what wolfSSL can do in your HighTec environment? Contact our team to learn more about implementation strategies, performance optimizations, and best practices for your specific use case.

If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.

Download wolfSSL Now

wolfCrypt FIPS 140-3 Certificate #5041 Now Validated

We’re proud to announce that our copy of wolfCrypt has officially again received FIPS 140-3 validation, listed under certificate #5041, posted on July 18, 2025 by NIST. This validation reflects our continued commitment to building secure, standards-compliant products using rigorously tested cryptography.

This FIPS 140-3 version of wolfCrypt improves on the earlier 140-2 validation in several key ways:

  • Faster boot times: Self-tests are deferred until the first use of each algorithm, rather than running all at startup.
  • Optimized for embedded systems: Minimal footprint, low power consumption, and efficient performance for real-time and resource-constrained environments.
  • Expanded algorithm support, including:
    • AES-OFB mode
    • RSA 3072, 4096, and PSS
    • TLS 1.2 and TLS 1.3 key derivation functions (KDF)
    • SSH KDF
  • New degraded mode: If an algorithm self-test fails, others can remain available, improving system resilience.

We selected Acumen Security as our FIPS lab partner for this effort and sincerely appreciate their professionalism and expertise throughout the validation process.

wolfCrypt’s FIPS-validated module can be used as a drop-in OpenSSL engine or provider, making it easy to integrate into existing applications. It’s ideally suited for embedded use cases like secure networking, medical devices, and industrial control systems.

Certificate #5041 offers all the same algorithms as certificate #4718, but will sunset on July 17, 2030. After that, continued use will require revalidation or transition to a newer certificate.

To learn more about FIPS 140-3 and the transition from 140-2, wolfSSL has published helpful resources:

For questions or integration support for FIPS, contact us at fips@wolfssl.com

If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.

Download wolfSSL Now

wolfCLU 0.1.9 Available Now

wolfCLU version 0.1.9 is now available! This command-line utility, built on the wolfSSL embedded TLS library, helps with admin tasks and common use cases such as key generation and certificate parsing to human human-readable form.

Among the most notable changes to this release is the addition of support for PKCS8 and Base64 commands, introduced in PR #178. These features make it easier to handle common encoding formats and key conversions directly from the command line, streamlining workflows involving PEM or DER-encoded data.

The update also includes important fixes to macro definitions related to client and server Key Encapsulation Mechanisms (KEM), as noted in PR #177. These corrections ensure proper configuration and usage when working with post-quantum cryptographic modes and hybrid TLS key exchange scenarios.

To support users working in FIPS-approved environments, wolfCLU now better aligns with FIPS 140-3 expectations. In PR #183, tests were adjusted to reflect the removal of DES in FIPS mode, and new output was added to indicate when FIPS is enabled. These changes help clarify operational state and support auditability during validation efforts.

This release also updates the license from GPLv2 to GPLv3 (PR #184).

If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.

Download wolfSSL Now

What We Talk About When We Talk About Support

Here at wolfSSL, we are usually very humble about how we help our customers. Today, that ends as we go loud and proud, letting you know what our customers are saying about our technical support!

“Super fast and helpful support. Was able to help quickly unblock my progress.”

– Top 5 Prime Government Contractor

“I sincerely appreciate your outstanding support in resolving the HTTPS implementation challenges with WolfSSL. Your expertise, prompt responses, and clear guidance were invaluable in addressing certificate handling, configuration, and performance optimizations. Thanks to your help, WolfSSL is now functioning perfectly in our system. With this issue fully resolved, I am marking the ticket as solved. Your dedication and professionalism made a significant difference, thank you for your patience and support!”

– Medical Devices Subcontractor

“It was great to know the support extended by the team to answer all our queries. We had good interaction with Rich and Antony on the coming integration of wolfSSL with our product.”

– European Manufacturing Automation Company

“Very quick, very friendly and very helpful – thanks!”

– German Car Sharing Pioneer

“Support is much appreciated, got the work around very quick and it was useful.”

– Emergency First Responder Communications Equipment Manufacturer

“This was great; a lot of work by David G. and Eric B. It involved hearing our issue, providing suggestions, looking through our code, providing solutions. Solutions provided ended up being exactly what we needed. Thanks for all your help!”

– Aerospace, Healthcare and Industrial Industry Technology Integrator

“I want to sincerely thank the wolfSSL support team for their excellent, insightful, and patient assistance throughout my recent experience. I was working on a complex FIPS-Ready build for Apple Silicon (M1/M2), and ran into several architecture-specific challenges involving ASM optimizations, test suite errors, and toolchain compatibility on macOS. The wolfSSL team — especially Kaleb and others — went above and beyond to help me troubleshoot the issues, offering not only technical solutions, but also clear explanations behind them. Their responsiveness, deep knowledge, and willingness to guide me through each step (including subtle configuration and environment nuances) made a huge difference. Thanks to their support, I was able to successfully build, test, and benchmark wolfSSL in my development environment. It’s rare to find a support team that’s this technically strong and genuinely helpful. Hats off to wolfSSL — you’ve earned my respect and recommendation.”

– Academic Research Institution

“First class support. Fast, reliable!”

– Top Tier European Satellite Vendor

“Bill has excellent knowledge about wolfHSM. Really satisfied with his responses and help. Great to work with Bill.”

– Tier 1 Big 3 Automotive Subcontractor

“Kareem was super helpful. He worked with me through all the issues that I had and kept after it throughout all my questions. I really appreciate his knowledge and ability to help me get the answers.”

– American Cloud Collaboration Software Company

“The bug fix was pulled into the master branch within 2 hours of reporting it. Can’t get much faster than that!”

– Largest American Medical Devices Manufacturer

“I am very happy with the support I got and I was able to resolve the issue. Marco has answered all the questions I had and I am very satisfied with the technical support. Thank you.”

– German Academic Post-Graduate Institution

“I was very satisfied with the support I received. The answers were prompt and very detailed. Thanks!”

– Top Tier German Aerospace Company

If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.

Download wolfSSL Now

Live Webinar: Everything You Need to Know About Automotive Cybersecurity – Tailored for the Asia-Pacific Time Zone

Strengthen your vehicle’s defenses with proven cybersecurity solutions.

Join us on July 31 at 5 PM PT / August 1 at 9 AM JST for a live automotive cybersecurity webinar, “Everything You Need to Know About Automotive Cybersecurity,” presented by Senior Software Engineer Eric Blankenhorn. This session explores the growing need for secure, connected, and software-defined vehicles. You’ll learn about wolfSSL’s approach to automotive cybersecurity, backed by real-world examples and practical integration strategies.

Register Now: Everything You Need to Know About Automotive Cybersecurity – Tailored for the Asia-Pacific Time Zone
Date: July 30 | 5 PM PT / Aug 1 | 9 AM JST

(This webinar is tailored for the Asia-Pacific Time Zone)

wolfSSL is a trusted provider of automotive-grade cybersecurity used by leading OEMs and Tier 1 suppliers. A key focus of this webinar is wolfHSM, our Hardware Security Module framework. Designed to support automotive-grade requirements, including AUTOSAR, PKCS11, and SHE, wolfHSM enables secure key storage, cryptographic operations, and secure boot, all while meeting the strict performance and safety demands of embedded automotive systems.

This webinar will cover:

  • How wolfSSL supports modern automotive cybersecurity across global markets
  • What sets wolfHSM apart, and why it’s ideal for embedded applications
  • Best practices for implementing secure firmware updates in vehicles
  • How TLS 1.3 enables safe communication from the vehicle to the cloud
  • Approaches to securing ADAS and autonomous driving systems
  • Real-world guidance on running TLS over CAN
  • How wolfSSL ensures the highest code quality through industry-leading test coverage and validation

Register now to gain practical insights into securing next-generation automotive systems with wolfSSL!

As always, our webinar will include Q&A throughout. If you have questions about any of the above, please contact us at facts@wolfSSL.com or call us at +1 425 245 8247.

Download wolfSSL Now

Live Webinar: Cybersecurity Solutions for the Satellite Industry

Secure satellite communication and boot integrity with wolfSSL: FIPS 140-3, Post-Quantum, and Embedded Optimization

Join us on July 30th at 9 AM PT for the ‘Cybersecurity Solutions for the Satellite Industry’ webinar. As the industry leader in space-grade cybersecurity, wolfSSL products are deployed across satellites, delivery / rocket systems, and ground stations. Our software provides lightweight cryptographic and (D)TLS solutions optimized for satellite and aerospace systems. wolfSSL solutions also feature robust quantum-resistant cryptography, FIPS 140-3 certification, and CNSA 2.0 compliance.

Register Now: Cybersecurity Solutions for the Satellite Industry
Date: July 30 | 9 AM PT

Learn about how our companion products, such as wolfBoot, wolfTPM, and our other open source libraries, can be used to secure satellites and related systems.

This webinar will cover key areas such as integration with embedded systems, cryptographic library optimization, securing high-value projects, and addressing specialized security requirements. You’ll gain insights into military use cases, including FIPS-compliant deployments for the U.S. military, Space Force, rocket systems, and safety-critical space stations, aligned with DO-178 certification requirements.

Register now to enhance your satellite missions with wolfSSL’s trusted, industry-leading cryptographic security.

As always, our webinar will include Q&A throughout. If you have questions about any of the above, please contact us at facts@wolfSSL.com or call us at +1 425 245 8247.

Download wolfSSL Now

Posts navigation

1 2 3 4 206 207 208

Weekly updates

Archives