A lightweight, portable TLS/SSL library written in ANSI C for embedded systems, RTOS, and cloud applications.
wolfSSL is a lightweight, portable SSL/TLS library written in ANSI C, designed for embedded systems, RTOS, and resource-constrained environments. It provides secure communication with support for up to TLS 1.3 and DTLS 1.3, offering a small footprint and high performance compared to alternatives like OpenSSL.
Embedded systems engineers, IoT developers, and anyone needing a small, fast, and portable TLS/SSL library for constrained environments or applications requiring FIPS-validated cryptography.
Developers choose wolfSSL for its minimal size, superior performance, and comprehensive support for modern cryptographic standards, including post-quantum algorithms, all while being royalty-free and offering an OpenSSL-compatible API for easy integration.
The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3 and DTLS 1.3! Update to wolfSSL 5.9.1 for the latest CVE fixes.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
With a typical size of 20-100 kB, wolfSSL is optimized for embedded and IoT devices, as highlighted in the README for resource-constrained environments.
Supports TLS 1.3, DTLS 1.3, and post-quantum cryptography groups, ensuring compliance with the latest protocols as stated in the feature list.
User benchmarks report significantly faster performance compared to OpenSSL, making it suitable for high-throughput applications like enterprise servers.
wolfCrypt is FIPS 140-2 and 140-3 validated, providing certified security for compliance-sensitive deployments, as noted in the README.
Runs on embedded systems, RTOS, desktop, and cloud platforms, with extensive hardware integration support shown in release notes for STM32 and Renesas.
Requires manual compile-time defines (e.g., WOLFSSL_STATIC_DH) for legacy features, and security defaults like disabled MD5 can break existing code without adjustments.
Release 5.9.0 lists multiple high-severity CVEs (e.g., buffer overflows in CRL parsing), indicating that despite fixes, the library requires vigilant updates and auditing.
The OpenSSL compatibility API has behavioral differences, such as stricter certificate verification by default, which can cause migration headaches without code changes.
Compared to OpenSSL, wolfSSL has a smaller ecosystem, which may result in fewer third-party tools, plugins, and community-driven resources for troubleshooting.
wolfssl is an open-source alternative to the following products: