We’re pleased to announce the addition of automated interoperability testing between wolfSSH and Paramiko. This GitHub Actions workflow validates that wolfSSH’s SFTP server implementation works seamlessly with Paramiko, one of the most widely used Python SSH/SFTP client libraries. Download wolfSSL → About Paramiko Paramiko is a pure-Python implementation of SSHv2 that provides both client and […]
Read MoreMore TagCategory: Uncategorized
Enhanced Windows CE Support in wolfSSL
We’re pleased to announce improvements to wolfSSL’s Windows CE support through PR #8709, which addresses critical compatibility issues when building with Visual Studio 2008 for Windows CE 6.0 and 7.0 platforms. Download wolfSSL → Background Windows CE (Windows Embedded Compact) remains an important platform for many embedded and industrial applications, particularly in legacy systems requiring […]
Read MoreMore TagVulnerability Disclosure: wolfSSL CVE-2025-7396
Affected Users: Users of wolfSSL builds that use the C implementation of Curve25519 for private key operations. This does not affect builds using assembly-optimized implementations (ARM or Intel), the small footprint Curve25519 build, or hardware offload implementations. Summary: A potential side-channel vulnerability was identified in the C implementation of Curve25519 private key operations in wolfSSL. […]
Read MoreMore TagPKCS#12 Support Enhancement: AES Encryption for Keys and Certificates
wolfSSL 5.8.2 has enhanced the wc_PKCS12_create() function to support modern AES encryption algorithms for PKCS#12 files. This update enables stronger security for protecting private keys and certificates. What Changed PKCS#12 files are commonly used to store cryptographic objects like private keys, certificates, and certificate chains. wolfSSL 5.8.2 supports modern AES encryptions for PKCS#12 instead of […]
Read MoreMore TagwolfSSL JNI/JSSE 1.16.0 Now Available
wolfSSL JNI/JSSE 1.16.0 is now available for download! This release contains a number of bug fixes and changes to the JNI and JSSE layers. wolfSSL JNI/JSSE allows for use of the native wolfSSL SSL/TLS library from Java. The thin JNI wrapper can be used for direct JNI calls into native wolfSSL, or the JSSE provider […]
Read MoreMore TagGetting Started with wolfSSH
Join us on January 21 at 9:00 AM PT for Getting Started with wolfSSH, a technical webinar presented by Jacob Barthelmeh, Senior Software Engineer at wolfSSL. This session introduces the SSH protocol and explains how wolfSSH provides a secure, lightweight SSH implementation designed for performance, portability, and resource-constrained embedded systems. Register Now: Getting Started with […]
Read MoreMore TagML-DSA OpenSSL Interoperability
The latest enhancement to wolfSSL’s ML-DSA (Module-Lattice-Based Digital Signature Algorithm) implementation solidifies interoperability with OpenSSL-generated cryptographic keys. This update introduces support for importing ML-DSA private keys that have been encoded using OpenSSL’s DER format. The new functionality extends the ASN.1 parsing logic to recognize and correctly decode an ASN.1 encoding structure that OpenSSL uses for […]
Read MoreMore TagwolfTPM – Add TPM 2.0 v1.85 PQC Post-Quantum Support
As the cybersecurity landscape prepares for the advent of quantum computing, the Trusted Platform Module (TPM) ecosystem is evolving to meet these new challenges. wolfSSL is proud to announce that wolfTPM now includes initial support for the TPM 2.0 Library Specification v1.85, bringing Post-Quantum Cryptography (PQC) capabilities to your hardware-backed security workflows. This update introduces […]
Read MoreMore TagVulnerability Disclosure: wolfSSL CVE-2025-7394
Affected Users: Applications using wolfSSL’s OpenSSL compatibility layer before wolfSSL version 5.8.2 that call both RAND_bytes() and fork() operations. This does not affect internal TLS operations or applications that do not explicitly use RAND_bytes(). Summary: A vulnerability was discovered in wolfSSL’s OpenSSL compatibility layer where the RAND_poll() function was not behaving as expected, leading to […]
Read MoreMore TagVulnerability Disclosure: wolfSSL Fault Injection Attack on ECC and Ed25519 Verify Operations
Affected Users: Users performing ECC or Ed25519 signature verification operations on devices that may be susceptible to fault injection attacks, particularly in security-critical applications such as secure boot implementations. Summary: A potential vulnerability to fault injection attacks was identified in wolfSSL’s ECC and Ed25519 signature verification operations. Fault injection is a sophisticated physical attack technique […]
Read MoreMore Tag
