RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL 5.8.4 Now Available

wolfSSL 5.8.4 introduces several updates, including the addition of a GPLv3 exceptions list. This allows specific GPLv3-licensed codebases linking against wolfSSL to continue using wolfSSL under GPLv2. Current GPLv3 Exceptions: MariaDB Server MariaDB Client Libraries OpenVPN-NL Fetchmail OpenVPN Security Fixes This release includes multiple fixes across TLS 1.2, TLS 1.3, X25519, XChaCha20-Poly1305, and PSK processing. […]

Read MoreMore Tag

wolfHSM Support for Renesas RH850 F1KM

wolfHSM provides a hardware security module framework optimized for embedded systems, with continuous enhancements for the Renesas RH850 platform. Download wolfSSL → The RH850 F1KM port is designed to align closely with upstream wolfHSM and wolfSSL development while taking advantage of RH850 hardware cryptographic acceleration. Ongoing improvements focus on performance, reliability, and maintainability. Key technical […]

Read MoreMore Tag

Rust support for post-quantum cryptography

wolfSSL is excited to announce the addition of post-quantum cryptographic algorithms in Rust to the wolfSSL 2026 roadmap! The planned additions to the wolfSSL Rust API include the ML-KEM, ML-DSA, LMS, XMSS, Falcon, and SPHINCS+ algorithms. These additions will bring direct support to Rust projects for the robust wolfSSL implementations of the most future-proof post-quantum […]

Read MoreMore Tag

Replacing TF-M on ARMv8-M: wolfBoot Secure Domain & wolfPSA, now integrated with Zephyr for CRA compliance

ARMv8-M TrustZone (TrustZone-M) gives Cortex-M23, Cortex-M33, Cortex-M35P and related MCUs a clean, hardware-enforced way to split a system into two execution environments: Secure world: the hardware root of trust, key material, security services, and the code that configures isolation. Non-secure world: the main RTOS and application logic, kept away from secrets by hardware boundaries. In […]

Read MoreMore Tag

wolfSSH Memory Size Reduction

Reducing wolfSSH Footprint: Logging Optimization and Other Size-Saving Options Embedded and resource-constrained systems often demand tight control over code size, memory usage, and runtime overhead. A recent improvement to wolfSSH directly addresses this need by reducing logging overhead when debugging is disabled. Eliminating Logging Overhead with a No-Op WLOG Historically, even when debugging was disabled, […]

Read MoreMore Tag

Posts navigation

1 2 3 4 223 224 225

Weekly updates

Archives