wolfSSL
Embedded TLS/crypto library provider for IoT, RTOS, and resource-constrained devices.

wolfSSL
Embedded TLS/crypto library provider for IoT, RTOS, and resource-constrained devices.
The Entire Cybersecurity Market, One Prompt Away
Connect your AI assistant to 10,000+ tools and 5,000+ vendors. Ask anything about the cybersecurity market.
wolfSSL Description
wolfSSL Inc. develops embedded SSL/TLS libraries and cryptographic software primarily targeting resource-constrained, embedded, and real-time operating system (RTOS) environments. The company's flagship product, the wolfSSL embedded TLS library, is a lightweight, portable, C-language-based library supporting TLS 1.3 and DTLS 1.3 on both client and server sides. It is designed to be significantly smaller than OpenSSL and includes an OpenSSL compatibility layer, OCSP and CRL support, and progressive algorithm support optimized for footprint and runtime memory use. The wolfCrypt cryptographic engine underpins the wolfSSL library and is available with FIPS 140-3 validation (Certificates #4718 and #5041 issued by the CMVP) and DO-178C DAL-A certification for avionics use cases. Beyond the core TLS and crypto libraries, wolfSSL offers a broad suite of embedded security products: wolfTPM (portable TPM 2.0 library), wolfMQTT (MQTT client library), wolfSSH (SSH library), wolfBoot (secure bootloader), wolfSentry (embedded intrusion detection and prevention), wolfHSM (hardware security module support), curl/tinycurl, and Java JSSE/JCE providers via wolfSSL JNI and wolfCrypt JNI. wolfSSL products are deployed across diverse markets including automotive, aviation, industrial automation, smart grid, connected home, M2M, military, government, cloud services, mobile, routers, and gaming. The company reports over 5 billion applications and devices secured with its products. wolfSSL distributes most of its software under a dual-license model: open-source GPLv3 and commercial licensing. The company is based in the United States and also operates a Japanese regional presence.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox