Enterprise Distribution for Flux CD
-
Updated
Apr 16, 2026 - CUE
Enterprise Distribution for Flux CD
Lean cryptographic library usable for bare-metal environments
wolfCrypt and wolfCrypt FIPS engine for OpenSSL
wolfCrypt and wolfCrypt FIPS provider for OpenSSL
wolfSSL Dockerfiles for demo usage
Port of FreeRTOS to use wolfSSL
crypto; from kruptein to hide or conceal
Fast, lightweight COSE + CBOR implementation for embedded systems. Supports PQC, FIPS 140-3, and MISRA C. Powered by wolfSSL.
Lightweight SPDM 1.2+ requester implementation using wolfSSL/wolfCrypt with no dynamic memory allocations
Hardened, FIPS 140-3 compliant OpenSSL container on Wolfi OS. Features hermetic SLSA L3 builds, Zero-CVE distroless images, and a rigorous automated audit engine (50+ Tests & Benchmarks).
Wolfi Java FIPS is an enterprise-grade cryptographic foundation for modern containerized applications. By combining the zero-vulnerability baseline of Wolfi OS, the performance of Eclipse Temurin (Adoptium), and the strict cryptographic boundaries of Bouncy Castle FIPS, this project delivers a truly secure
Hardened Java buildpack for FIPS 140-3 compliance featuring BouncyCastle integration, strict security policies, and enterprise-grade observability.
Quantum-resistant VPN encryption library for Go. Hybrid KEM (ML-KEM-1024 + X25519), FIPS 140-3 build mode.
A partial Go implementation of NSA's Commercial National Security Algorithm Suite (CNSA)
A static analysis tool for detecting non-FIPS-compliant cryptographic API usage in Java applications.
Automated Windows MSI installer for OpenSSL 3.x with FIPS 140-3 Provider Module. Cryptographically verified builds with complete supply chain security.
Terraform module for FIPS-enabled Rocky Linux 9 EC2 instances on AWS
Vantis Mail - Profesjonalny, bezpieczny system pocztowy zbudowany zgodnie z normami wojskowymi i wywiadowczymi (Zero Trust). Hybrydowe szyfrowanie X25519 + Kyber-1024, system aliasów Phantom, samoniszczenie wiadomości.
Government-grade Zero Trust API for .NET 10. A post-quantum ready implementation of FAPI 2.0, SD-JWT (Selective Disclosure), DPoP, and real-time SSF/CAE signals, hardened with ML-DSA signatures for maximum-security identity architectures.
Add a description, image, and links to the fips-140-3 topic page so that developers can more easily learn about it.
To associate your repository with the fips-140-3 topic, visit your repo's landing page and select "manage topics."