]> git.sur5r.net Git - freertos/blobdiff - FreeRTOS-Plus/Source/WolfSSL/src/ssl.c
Update WolfSSL library to the latest version.
[freertos] / FreeRTOS-Plus / Source / WolfSSL / src / ssl.c
index 9f1a5f10770650798ce0b568e7b9aac6f2b9933f..139e343f9a8e2eabab311d19d16e53c4c1b4b599 100644 (file)
@@ -1,15 +1,15 @@
 /* ssl.c
  *
- * Copyright (C) 2006-2014 wolfSSL Inc.
+ * Copyright (C) 2006-2015 wolfSSL Inc.
  *
- * This file is part of CyaSSL.
+ * This file is part of wolfSSL. (formerly known as CyaSSL)
  *
- * CyaSSL is free software; you can redistribute it and/or modify
+ * wolfSSL is free software; you can redistribute it and/or modify
  * it under the terms of the GNU General Public License as published by
  * the Free Software Foundation; either version 2 of the License, or
  * (at your option) any later version.
  *
- * CyaSSL is distributed in the hope that it will be useful,
+ * wolfSSL is distributed in the hope that it will be useful,
  * but WITHOUT ANY WARRANTY; without even the implied warranty of
  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  * GNU General Public License for more details.
     #include <config.h>
 #endif
 
-#include <cyassl/ctaocrypt/settings.h>
+#include <wolfssl/wolfcrypt/settings.h>
 
 #ifdef HAVE_ERRNO_H
     #include <errno.h>
 #endif
 
-
-#include <cyassl/ssl.h>
-#include <cyassl/internal.h>
-#include <cyassl/error-ssl.h>
-#include <cyassl/ctaocrypt/coding.h>
+#include <wolfssl/internal.h>
+#include <wolfssl/error-ssl.h>
+#include <wolfssl/wolfcrypt/coding.h>
 
 #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
-    #include <cyassl/openssl/evp.h>
+    #include <wolfssl/openssl/evp.h>
 #endif
 
 #ifdef OPENSSL_EXTRA
     /* openssl headers begin */
-    #include <cyassl/openssl/hmac.h>
-    #include <cyassl/openssl/crypto.h>
-    #include <cyassl/openssl/des.h>
-    #include <cyassl/openssl/bn.h>
-    #include <cyassl/openssl/dh.h>
-    #include <cyassl/openssl/rsa.h>
-    #include <cyassl/openssl/pem.h>
-    /* openssl headers end, cyassl internal headers next */
-    #include <cyassl/ctaocrypt/hmac.h>
-    #include <cyassl/ctaocrypt/random.h>
-    #include <cyassl/ctaocrypt/des3.h>
-    #include <cyassl/ctaocrypt/md4.h>
-    #include <cyassl/ctaocrypt/md5.h>
-    #include <cyassl/ctaocrypt/arc4.h>
-    #ifdef CYASSL_SHA512
-        #include <cyassl/ctaocrypt/sha512.h>
+    #include <wolfssl/openssl/hmac.h>
+    #include <wolfssl/openssl/crypto.h>
+    #include <wolfssl/openssl/des.h>
+    #include <wolfssl/openssl/bn.h>
+    #include <wolfssl/openssl/dh.h>
+    #include <wolfssl/openssl/rsa.h>
+    #include <wolfssl/openssl/pem.h>
+    /* openssl headers end, wolfssl internal headers next */
+    #include <wolfssl/wolfcrypt/hmac.h>
+    #include <wolfssl/wolfcrypt/random.h>
+    #include <wolfssl/wolfcrypt/des3.h>
+    #include <wolfssl/wolfcrypt/md4.h>
+    #include <wolfssl/wolfcrypt/md5.h>
+    #include <wolfssl/wolfcrypt/arc4.h>
+    #ifdef WOLFSSL_SHA512
+        #include <wolfssl/wolfcrypt/sha512.h>
     #endif
 #endif
 
 #ifndef NO_FILESYSTEM
-    #if !defined(USE_WINDOWS_API) && !defined(NO_CYASSL_DIR) \
+    #if !defined(USE_WINDOWS_API) && !defined(NO_WOLFSSL_DIR) \
             && !defined(EBSNET)
         #include <dirent.h>
         #include <sys/stat.h>
     #define FALSE 0
 #endif
 
-#ifndef min
+#ifndef WOLFSSL_HAVE_MIN
+#define WOLFSSL_HAVE_MIN
 
     static INLINE word32 min(word32 a, word32 b)
     {
         return a > b ? b : a;
     }
 
-#endif /* min */
+#endif /* WOLFSSSL_HAVE_MIN */
+
+#ifndef WOLFSSL_HAVE_MAX
+#define WOLFSSL_HAVE_MAX
 
-#ifndef max
-#ifdef CYASSL_DTLS
+#ifdef WOLFSSL_DTLS
     static INLINE word32 max(word32 a, word32 b)
     {
         return a > b ? a : b;
     }
-#endif
-#endif /* min */
+#endif /* WOLFSSL_DTLS */
+
+#endif /* WOLFSSL_HAVE_MAX */
 
 
-#ifndef CYASSL_LEANPSK
+#ifndef WOLFSSL_LEANPSK
 char* mystrnstr(const char* s1, const char* s2, unsigned int n)
 {
     unsigned int s2_len = (unsigned int)XSTRLEN(s2);
@@ -121,90 +123,100 @@ char* mystrnstr(const char* s1, const char* s2, unsigned int n)
 
 /* prevent multiple mutex initializations */
 static volatile int initRefCount = 0;
-static CyaSSL_Mutex count_mutex;   /* init ref count mutex */
+static wolfSSL_Mutex count_mutex;   /* init ref count mutex */
 
 
-CYASSL_CTX* CyaSSL_CTX_new(CYASSL_METHOD* method)
+WOLFSSL_CTX* wolfSSL_CTX_new(WOLFSSL_METHOD* method)
 {
-    CYASSL_CTX* ctx = NULL;
+    WOLFSSL_CTX* ctx = NULL;
 
-    CYASSL_ENTER("CYASSL_CTX_new");
+    WOLFSSL_ENTER("WOLFSSL_CTX_new");
 
     if (initRefCount == 0)
-        CyaSSL_Init(); /* user no longer forced to call Init themselves */
+        wolfSSL_Init(); /* user no longer forced to call Init themselves */
 
     if (method == NULL)
         return ctx;
 
-    ctx = (CYASSL_CTX*) XMALLOC(sizeof(CYASSL_CTX), 0, DYNAMIC_TYPE_CTX);
+    ctx = (WOLFSSL_CTX*) XMALLOC(sizeof(WOLFSSL_CTX), 0, DYNAMIC_TYPE_CTX);
     if (ctx) {
         if (InitSSL_Ctx(ctx, method) < 0) {
-            CYASSL_MSG("Init CTX failed");
-            CyaSSL_CTX_free(ctx);
+            WOLFSSL_MSG("Init CTX failed");
+            wolfSSL_CTX_free(ctx);
             ctx = NULL;
         }
     }
     else {
-        CYASSL_MSG("Alloc CTX failed, method freed");
+        WOLFSSL_MSG("Alloc CTX failed, method freed");
         XFREE(method, NULL, DYNAMIC_TYPE_METHOD);
     }
 
-    CYASSL_LEAVE("CYASSL_CTX_new", 0);
+    WOLFSSL_LEAVE("WOLFSSL_CTX_new", 0);
     return ctx;
 }
 
 
-void CyaSSL_CTX_free(CYASSL_CTX* ctx)
+void wolfSSL_CTX_free(WOLFSSL_CTX* ctx)
 {
-    CYASSL_ENTER("SSL_CTX_free");
+    WOLFSSL_ENTER("SSL_CTX_free");
     if (ctx)
         FreeSSL_Ctx(ctx);
-    CYASSL_LEAVE("SSL_CTX_free", 0);
+    WOLFSSL_LEAVE("SSL_CTX_free", 0);
 }
 
 
-CYASSL* CyaSSL_new(CYASSL_CTX* ctx)
+WOLFSSL* wolfSSL_new(WOLFSSL_CTX* ctx)
 {
-    CYASSL* ssl = NULL;
+    WOLFSSL* ssl = NULL;
     int ret = 0;
 
     (void)ret;
-    CYASSL_ENTER("SSL_new");
+    WOLFSSL_ENTER("SSL_new");
 
     if (ctx == NULL)
         return ssl;
 
-    ssl = (CYASSL*) XMALLOC(sizeof(CYASSL), ctx->heap,DYNAMIC_TYPE_SSL);
+    ssl = (WOLFSSL*) XMALLOC(sizeof(WOLFSSL), ctx->heap,DYNAMIC_TYPE_SSL);
     if (ssl)
         if ( (ret = InitSSL(ssl, ctx)) < 0) {
             FreeSSL(ssl);
             ssl = 0;
         }
 
-    CYASSL_LEAVE("SSL_new", ret);
+    WOLFSSL_LEAVE("SSL_new", ret);
     return ssl;
 }
 
 
-void CyaSSL_free(CYASSL* ssl)
+void wolfSSL_free(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_free");
+    WOLFSSL_ENTER("SSL_free");
     if (ssl)
         FreeSSL(ssl);
-    CYASSL_LEAVE("SSL_free", 0);
+    WOLFSSL_LEAVE("SSL_free", 0);
 }
 
+#ifdef HAVE_POLY1305
+/* set if to use old poly 1 for yes 0 to use new poly */
+int wolfSSL_use_old_poly(WOLFSSL* ssl, int value)
+{
+    WOLFSSL_ENTER("SSL_use_old_poly");
+    ssl->options.oldPoly = value;
+    WOLFSSL_LEAVE("SSL_use_old_poly", 0);
+    return 0;
+}
+#endif
 
-int CyaSSL_set_fd(CYASSL* ssl, int fd)
+int wolfSSL_set_fd(WOLFSSL* ssl, int fd)
 {
-    CYASSL_ENTER("SSL_set_fd");
+    WOLFSSL_ENTER("SSL_set_fd");
     ssl->rfd = fd;      /* not used directly to allow IO callbacks */
     ssl->wfd = fd;
 
     ssl->IOCB_ReadCtx  = &ssl->rfd;
     ssl->IOCB_WriteCtx = &ssl->wfd;
 
-    #ifdef CYASSL_DTLS
+    #ifdef WOLFSSL_DTLS
         if (ssl->options.dtls) {
             ssl->IOCB_ReadCtx = &ssl->buffers.dtlsCtx;
             ssl->IOCB_WriteCtx = &ssl->buffers.dtlsCtx;
@@ -212,46 +224,95 @@ int CyaSSL_set_fd(CYASSL* ssl, int fd)
         }
     #endif
 
-    CYASSL_LEAVE("SSL_set_fd", SSL_SUCCESS);
+    WOLFSSL_LEAVE("SSL_set_fd", SSL_SUCCESS);
+    return SSL_SUCCESS;
+}
+
+
+/**
+  * Get the name of cipher at priotity level passed in.
+  */
+char* wolfSSL_get_cipher_list(int priority)
+{
+    const char* const* ciphers = GetCipherNames();
+
+    if (priority >= GetCipherNamesSize() || priority < 0) {
+        return 0;
+    }
+
+    return (char*)ciphers[priority];
+}
+
+
+int wolfSSL_get_ciphers(char* buf, int len)
+{
+    const char* const* ciphers = GetCipherNames();
+    int  totalInc = 0;
+    int  step     = 0;
+    char delim    = ':';
+    int  size     = GetCipherNamesSize();
+    int  i;
+
+    if (buf == NULL || len <= 0)
+        return BAD_FUNC_ARG;
+
+    /* Add each member to the buffer delimitted by a : */
+    for (i = 0; i < size; i++) {
+        step = (int)(XSTRLEN(ciphers[i]) + 1);  /* delimiter */
+        totalInc += step;
+
+        /* Check to make sure buf is large enough and will not overflow */
+        if (totalInc < len) {
+            XSTRNCPY(buf, ciphers[i], XSTRLEN(ciphers[i]));
+            buf += XSTRLEN(ciphers[i]);
+
+            if (i < size - 1)
+                *buf++ = delim;
+        }
+        else
+            return BUFFER_E;
+    }
     return SSL_SUCCESS;
 }
 
 
-int CyaSSL_get_fd(const CYASSL* ssl)
+int wolfSSL_get_fd(const WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_get_fd");
-    CYASSL_LEAVE("SSL_get_fd", ssl->rfd);
+    WOLFSSL_ENTER("SSL_get_fd");
+    WOLFSSL_LEAVE("SSL_get_fd", ssl->rfd);
     return ssl->rfd;
 }
 
 
-int CyaSSL_get_using_nonblock(CYASSL* ssl)
+int wolfSSL_get_using_nonblock(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("CyaSSL_get_using_nonblock");
-    CYASSL_LEAVE("CyaSSL_get_using_nonblock", ssl->options.usingNonblock);
+    WOLFSSL_ENTER("wolfSSL_get_using_nonblock");
+    WOLFSSL_LEAVE("wolfSSL_get_using_nonblock", ssl->options.usingNonblock);
     return ssl->options.usingNonblock;
 }
 
 
-int CyaSSL_dtls(CYASSL* ssl)
+int wolfSSL_dtls(WOLFSSL* ssl)
 {
     return ssl->options.dtls;
 }
 
 
-#ifndef CYASSL_LEANPSK
-void CyaSSL_set_using_nonblock(CYASSL* ssl, int nonblock)
+#ifndef WOLFSSL_LEANPSK
+void wolfSSL_set_using_nonblock(WOLFSSL* ssl, int nonblock)
 {
-    CYASSL_ENTER("CyaSSL_set_using_nonblock");
+    WOLFSSL_ENTER("wolfSSL_set_using_nonblock");
     ssl->options.usingNonblock = (nonblock != 0);
 }
 
 
-int CyaSSL_dtls_set_peer(CYASSL* ssl, void* peer, unsigned int peerSz)
+int wolfSSL_dtls_set_peer(WOLFSSL* ssl, void* peer, unsigned int peerSz)
 {
-#ifdef CYASSL_DTLS
+#ifdef WOLFSSL_DTLS
     void* sa = (void*)XMALLOC(peerSz, ssl->heap, DYNAMIC_TYPE_SOCKADDR);
     if (sa != NULL) {
+        if (ssl->buffers.dtlsCtx.peer.sa != NULL)
+            XFREE(ssl->buffers.dtlsCtx.peer.sa,ssl->heap,DYNAMIC_TYPE_SOCKADDR);
         XMEMCPY(sa, peer, peerSz);
         ssl->buffers.dtlsCtx.peer.sa = sa;
         ssl->buffers.dtlsCtx.peer.sz = peerSz;
@@ -266,9 +327,9 @@ int CyaSSL_dtls_set_peer(CYASSL* ssl, void* peer, unsigned int peerSz)
 #endif
 }
 
-int CyaSSL_dtls_get_peer(CYASSL* ssl, void* peer, unsigned int* peerSz)
+int wolfSSL_dtls_get_peer(WOLFSSL* ssl, void* peer, unsigned int* peerSz)
 {
-#ifdef CYASSL_DTLS
+#ifdef WOLFSSL_DTLS
     if (peer != NULL && peerSz != NULL
             && *peerSz >= ssl->buffers.dtlsCtx.peer.sz) {
         *peerSz = ssl->buffers.dtlsCtx.peer.sz;
@@ -283,34 +344,34 @@ int CyaSSL_dtls_get_peer(CYASSL* ssl, void* peer, unsigned int* peerSz)
     return SSL_NOT_IMPLEMENTED;
 #endif
 }
-#endif /* CYASSL_LEANPSK */
+#endif /* WOLFSSL_LEANPSK */
 
 
 /* return underlyig connect or accept, SSL_SUCCESS on ok */
-int CyaSSL_negotiate(CYASSL* ssl)
+int wolfSSL_negotiate(WOLFSSL* ssl)
 {
     int err = SSL_FATAL_ERROR;
 
-    CYASSL_ENTER("CyaSSL_negotiate");
-#ifndef NO_CYASSL_SERVER
-    if (ssl->options.side == CYASSL_SERVER_END)
-        err = CyaSSL_accept(ssl);
+    WOLFSSL_ENTER("wolfSSL_negotiate");
+#ifndef NO_WOLFSSL_SERVER
+    if (ssl->options.side == WOLFSSL_SERVER_END)
+        err = wolfSSL_accept(ssl);
 #endif
 
-#ifndef NO_CYASSL_CLIENT
-    if (ssl->options.side == CYASSL_CLIENT_END)
-        err = CyaSSL_connect(ssl);
+#ifndef NO_WOLFSSL_CLIENT
+    if (ssl->options.side == WOLFSSL_CLIENT_END)
+        err = wolfSSL_connect(ssl);
 #endif
 
-    CYASSL_LEAVE("CyaSSL_negotiate", err);
+    WOLFSSL_LEAVE("wolfSSL_negotiate", err);
 
     return err;
 }
 
 
-#ifndef CYASSL_LEANPSK
+#ifndef WOLFSSL_LEANPSK
 /* object size based on build */
-int CyaSSL_GetObjectSize(void)
+int wolfSSL_GetObjectSize(void)
 {
 #ifdef SHOW_SIZES
     printf("sizeof suites           = %lu\n", sizeof(Suites));
@@ -324,6 +385,9 @@ int CyaSSL_GetObjectSize(void)
 #endif
 #ifndef NO_RABBIT
     printf("    sizeof rabbit       = %lu\n", sizeof(Rabbit));
+#endif
+#ifdef HAVE_CHACHA
+    printf("    sizeof chacha       = %lu\n", sizeof(Chacha));
 #endif
     printf("sizeof cipher specs     = %lu\n", sizeof(CipherSpecs));
     printf("sizeof keys             = %lu\n", sizeof(Keys));
@@ -337,10 +401,10 @@ int CyaSSL_GetObjectSize(void)
 #ifndef NO_SHA256
     printf("    sizeof SHA256       = %lu\n", sizeof(Sha256));
 #endif
-#ifdef CYASSL_SHA384
+#ifdef WOLFSSL_SHA384
     printf("    sizeof SHA384       = %lu\n", sizeof(Sha384));
 #endif
-#ifdef CYASSL_SHA384
+#ifdef WOLFSSL_SHA384
     printf("    sizeof SHA512       = %lu\n", sizeof(Sha512));
 #endif
     printf("sizeof Buffers          = %lu\n", sizeof(Buffers));
@@ -352,29 +416,32 @@ int CyaSSL_GetObjectSize(void)
 #ifdef HAVE_ECC
     printf("sizeof ecc_key          = %lu\n", sizeof(ecc_key));
 #endif
-    printf("sizeof CYASSL_CIPHER    = %lu\n", sizeof(CYASSL_CIPHER));
-    printf("sizeof CYASSL_SESSION   = %lu\n", sizeof(CYASSL_SESSION));
-    printf("sizeof CYASSL           = %lu\n", sizeof(CYASSL));
-    printf("sizeof CYASSL_CTX       = %lu\n", sizeof(CYASSL_CTX));
+    printf("sizeof WOLFSSL_CIPHER    = %lu\n", sizeof(WOLFSSL_CIPHER));
+    printf("sizeof WOLFSSL_SESSION   = %lu\n", sizeof(WOLFSSL_SESSION));
+    printf("sizeof WOLFSSL           = %lu\n", sizeof(WOLFSSL));
+    printf("sizeof WOLFSSL_CTX       = %lu\n", sizeof(WOLFSSL_CTX));
 #endif
 
-    return sizeof(CYASSL);
+    return sizeof(WOLFSSL);
 }
 #endif
 
 
 #ifndef NO_DH
 /* server Diffie-Hellman parameters, SSL_SUCCESS on ok */
-int CyaSSL_SetTmpDH(CYASSL* ssl, const unsigned char* p, int pSz,
+int wolfSSL_SetTmpDH(WOLFSSL* ssl, const unsigned char* p, int pSz,
                     const unsigned char* g, int gSz)
 {
     byte havePSK = 0;
     byte haveRSA = 1;
 
-    CYASSL_ENTER("CyaSSL_SetTmpDH");
+    WOLFSSL_ENTER("wolfSSL_SetTmpDH");
     if (ssl == NULL || p == NULL || g == NULL) return BAD_FUNC_ARG;
 
-    if (ssl->options.side != CYASSL_SERVER_END)
+    if (pSz < ssl->options.minDhKeySz)
+        return DH_KEY_SIZE_E;
+
+    if (ssl->options.side != WOLFSSL_SERVER_END)
         return SIDE_ERROR;
 
     if (ssl->buffers.serverDH_P.buffer && ssl->buffers.weOwnDH)
@@ -412,17 +479,53 @@ int CyaSSL_SetTmpDH(CYASSL* ssl, const unsigned char* p, int pSz,
                ssl->options.haveNTRU, ssl->options.haveECDSAsig,
                ssl->options.haveStaticECC, ssl->options.side);
 
-    CYASSL_LEAVE("CyaSSL_SetTmpDH", 0);
+    WOLFSSL_LEAVE("wolfSSL_SetTmpDH", 0);
     return SSL_SUCCESS;
 }
+
+/* server ctx Diffie-Hellman parameters, SSL_SUCCESS on ok */
+int wolfSSL_CTX_SetTmpDH(WOLFSSL_CTX* ctx, const unsigned char* p, int pSz,
+                         const unsigned char* g, int gSz)
+{
+    WOLFSSL_ENTER("wolfSSL_CTX_SetTmpDH");
+    if (ctx == NULL || p == NULL || g == NULL) return BAD_FUNC_ARG;
+
+    if (pSz < ctx->minDhKeySz)
+        return DH_KEY_SIZE_E;
+
+    XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH);
+    XFREE(ctx->serverDH_G.buffer, ctx->heap, DYNAMIC_TYPE_DH);
+
+    ctx->serverDH_P.buffer = (byte*)XMALLOC(pSz, ctx->heap,DYNAMIC_TYPE_DH);
+    if (ctx->serverDH_P.buffer == NULL)
+       return MEMORY_E;
+
+    ctx->serverDH_G.buffer = (byte*)XMALLOC(gSz, ctx->heap,DYNAMIC_TYPE_DH);
+    if (ctx->serverDH_G.buffer == NULL) {
+        XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH);
+        return MEMORY_E;
+    }
+
+    ctx->serverDH_P.length = pSz;
+    ctx->serverDH_G.length = gSz;
+
+    XMEMCPY(ctx->serverDH_P.buffer, p, pSz);
+    XMEMCPY(ctx->serverDH_G.buffer, g, gSz);
+
+    ctx->haveDH = 1;
+
+    WOLFSSL_LEAVE("wolfSSL_CTX_SetTmpDH", 0);
+    return SSL_SUCCESS;
+}
+
 #endif /* !NO_DH */
 
 
-int CyaSSL_write(CYASSL* ssl, const void* data, int sz)
+int wolfSSL_write(WOLFSSL* ssl, const void* data, int sz)
 {
     int ret;
 
-    CYASSL_ENTER("SSL_write()");
+    WOLFSSL_ENTER("SSL_write()");
 
     if (ssl == NULL || data == NULL || sz < 0)
         return BAD_FUNC_ARG;
@@ -433,7 +536,7 @@ int CyaSSL_write(CYASSL* ssl, const void* data, int sz)
 
     ret = SendData(ssl, data, sz);
 
-    CYASSL_LEAVE("SSL_write()", ret);
+    WOLFSSL_LEAVE("SSL_write()", ret);
 
     if (ret < 0)
         return SSL_FATAL_ERROR;
@@ -442,11 +545,11 @@ int CyaSSL_write(CYASSL* ssl, const void* data, int sz)
 }
 
 
-static int CyaSSL_read_internal(CYASSL* ssl, void* data, int sz, int peek)
+static int wolfSSL_read_internal(WOLFSSL* ssl, void* data, int sz, int peek)
 {
     int ret;
 
-    CYASSL_ENTER("CyaSSL_read_internal()");
+    WOLFSSL_ENTER("wolfSSL_read_internal()");
 
     if (ssl == NULL || data == NULL || sz < 0)
         return BAD_FUNC_ARG;
@@ -454,7 +557,7 @@ static int CyaSSL_read_internal(CYASSL* ssl, void* data, int sz, int peek)
 #ifdef HAVE_ERRNO_H
         errno = 0;
 #endif
-#ifdef CYASSL_DTLS
+#ifdef WOLFSSL_DTLS
     if (ssl->options.dtls)
         ssl->dtls_expected_rx = max(sz + 100, MAX_MTU);
 #endif
@@ -466,7 +569,7 @@ static int CyaSSL_read_internal(CYASSL* ssl, void* data, int sz, int peek)
     ret = ReceiveData(ssl, (byte*)data, min(sz, OUTPUT_RECORD_SIZE), peek);
 #endif
 
-    CYASSL_LEAVE("CyaSSL_read_internal()", ret);
+    WOLFSSL_LEAVE("wolfSSL_read_internal()", ret);
 
     if (ret < 0)
         return SSL_FATAL_ERROR;
@@ -475,26 +578,26 @@ static int CyaSSL_read_internal(CYASSL* ssl, void* data, int sz, int peek)
 }
 
 
-int CyaSSL_peek(CYASSL* ssl, void* data, int sz)
+int wolfSSL_peek(WOLFSSL* ssl, void* data, int sz)
 {
-    CYASSL_ENTER("CyaSSL_peek()");
+    WOLFSSL_ENTER("wolfSSL_peek()");
 
-    return CyaSSL_read_internal(ssl, data, sz, TRUE);
+    return wolfSSL_read_internal(ssl, data, sz, TRUE);
 }
 
 
-int CyaSSL_read(CYASSL* ssl, void* data, int sz)
+int wolfSSL_read(WOLFSSL* ssl, void* data, int sz)
 {
-    CYASSL_ENTER("CyaSSL_read()");
+    WOLFSSL_ENTER("wolfSSL_read()");
 
-    return CyaSSL_read_internal(ssl, data, sz, FALSE);
+    return wolfSSL_read_internal(ssl, data, sz, FALSE);
 }
 
 
 #ifdef HAVE_CAVIUM
 
 /* let's use cavium, SSL_SUCCESS on ok */
-int CyaSSL_UseCavium(CYASSL* ssl, int devId)
+int wolfSSL_UseCavium(WOLFSSL* ssl, int devId)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -506,7 +609,7 @@ int CyaSSL_UseCavium(CYASSL* ssl, int devId)
 
 
 /* let's use cavium, SSL_SUCCESS on ok */
-int CyaSSL_CTX_UseCavium(CYASSL_CTX* ctx, int devId)
+int wolfSSL_CTX_UseCavium(WOLFSSL_CTX* ctx, int devId)
 {
     if (ctx == NULL)
         return BAD_FUNC_ARG;
@@ -521,15 +624,15 @@ int CyaSSL_CTX_UseCavium(CYASSL_CTX* ctx, int devId)
 
 #ifdef HAVE_SNI
 
-int CyaSSL_UseSNI(CYASSL* ssl, byte type, const void* data, word16 size)
+int wolfSSL_UseSNI(WOLFSSL* ssl, byte type, const void* data, word16 size)
 {
-       if (ssl == NULL)
-               return BAD_FUNC_ARG;
+    if (ssl == NULL)
+        return BAD_FUNC_ARG;
 
     return TLSX_UseSNI(&ssl->extensions, type, data, size);
 }
 
-int CyaSSL_CTX_UseSNI(CYASSL_CTX* ctx, byte type, const void* data, word16 size)
+int wolfSSL_CTX_UseSNI(WOLFSSL_CTX* ctx, byte type, const void* data, word16 size)
 {
     if (ctx == NULL)
         return BAD_FUNC_ARG;
@@ -537,26 +640,26 @@ int CyaSSL_CTX_UseSNI(CYASSL_CTX* ctx, byte type, const void* data, word16 size)
     return TLSX_UseSNI(&ctx->extensions, type, data, size);
 }
 
-#ifndef NO_CYASSL_SERVER
+#ifndef NO_WOLFSSL_SERVER
 
-void CyaSSL_SNI_SetOptions(CYASSL* ssl, byte type, byte options)
+void wolfSSL_SNI_SetOptions(WOLFSSL* ssl, byte type, byte options)
 {
     if (ssl && ssl->extensions)
         TLSX_SNI_SetOptions(ssl->extensions, type, options);
 }
 
-void CyaSSL_CTX_SNI_SetOptions(CYASSL_CTX* ctx, byte type, byte options)
+void wolfSSL_CTX_SNI_SetOptions(WOLFSSL_CTX* ctx, byte type, byte options)
 {
     if (ctx && ctx->extensions)
         TLSX_SNI_SetOptions(ctx->extensions, type, options);
 }
 
-byte CyaSSL_SNI_Status(CYASSL* ssl, byte type)
+byte wolfSSL_SNI_Status(WOLFSSL* ssl, byte type)
 {
     return TLSX_SNI_Status(ssl ? ssl->extensions : NULL, type);
 }
 
-word16 CyaSSL_SNI_GetRequest(CYASSL* ssl, byte type, void** data)
+word16 wolfSSL_SNI_GetRequest(WOLFSSL* ssl, byte type, void** data)
 {
     if (data)
         *data = NULL;
@@ -567,7 +670,7 @@ word16 CyaSSL_SNI_GetRequest(CYASSL* ssl, byte type, void** data)
     return 0;
 }
 
-int CyaSSL_SNI_GetFromBuffer(const byte* clientHello, word32 helloSz, byte type,
+int wolfSSL_SNI_GetFromBuffer(const byte* clientHello, word32 helloSz, byte type,
                                                      byte* sni, word32* inOutSz)
 {
     if (clientHello && helloSz > 0 && sni && inOutSz && *inOutSz > 0)
@@ -576,14 +679,14 @@ int CyaSSL_SNI_GetFromBuffer(const byte* clientHello, word32 helloSz, byte type,
     return BAD_FUNC_ARG;
 }
 
-#endif /* NO_CYASSL_SERVER */
+#endif /* NO_WOLFSSL_SERVER */
 
 #endif /* HAVE_SNI */
 
 
 #ifdef HAVE_MAX_FRAGMENT
-#ifndef NO_CYASSL_CLIENT
-int CyaSSL_UseMaxFragment(CYASSL* ssl, byte mfl)
+#ifndef NO_WOLFSSL_CLIENT
+int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -591,19 +694,19 @@ int CyaSSL_UseMaxFragment(CYASSL* ssl, byte mfl)
     return TLSX_UseMaxFragment(&ssl->extensions, mfl);
 }
 
-int CyaSSL_CTX_UseMaxFragment(CYASSL_CTX* ctx, byte mfl)
+int wolfSSL_CTX_UseMaxFragment(WOLFSSL_CTX* ctx, byte mfl)
 {
     if (ctx == NULL)
         return BAD_FUNC_ARG;
 
     return TLSX_UseMaxFragment(&ctx->extensions, mfl);
 }
-#endif /* NO_CYASSL_CLIENT */
+#endif /* NO_WOLFSSL_CLIENT */
 #endif /* HAVE_MAX_FRAGMENT */
 
 #ifdef HAVE_TRUNCATED_HMAC
-#ifndef NO_CYASSL_CLIENT
-int CyaSSL_UseTruncatedHMAC(CYASSL* ssl)
+#ifndef NO_WOLFSSL_CLIENT
+int wolfSSL_UseTruncatedHMAC(WOLFSSL* ssl)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -611,32 +714,32 @@ int CyaSSL_UseTruncatedHMAC(CYASSL* ssl)
     return TLSX_UseTruncatedHMAC(&ssl->extensions);
 }
 
-int CyaSSL_CTX_UseTruncatedHMAC(CYASSL_CTX* ctx)
+int wolfSSL_CTX_UseTruncatedHMAC(WOLFSSL_CTX* ctx)
 {
     if (ctx == NULL)
         return BAD_FUNC_ARG;
 
     return TLSX_UseTruncatedHMAC(&ctx->extensions);
 }
-#endif /* NO_CYASSL_CLIENT */
+#endif /* NO_WOLFSSL_CLIENT */
 #endif /* HAVE_TRUNCATED_HMAC */
 
 /* Elliptic Curves */
 #ifdef HAVE_SUPPORTED_CURVES
-#ifndef NO_CYASSL_CLIENT
+#ifndef NO_WOLFSSL_CLIENT
 
-int CyaSSL_UseSupportedCurve(CYASSL* ssl, word16 name)
+int wolfSSL_UseSupportedCurve(WOLFSSL* ssl, word16 name)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
 
     switch (name) {
-        case CYASSL_ECC_SECP160R1:
-        case CYASSL_ECC_SECP192R1:
-        case CYASSL_ECC_SECP224R1:
-        case CYASSL_ECC_SECP256R1:
-        case CYASSL_ECC_SECP384R1:
-        case CYASSL_ECC_SECP521R1:
+        case WOLFSSL_ECC_SECP160R1:
+        case WOLFSSL_ECC_SECP192R1:
+        case WOLFSSL_ECC_SECP224R1:
+        case WOLFSSL_ECC_SECP256R1:
+        case WOLFSSL_ECC_SECP384R1:
+        case WOLFSSL_ECC_SECP521R1:
             break;
 
         default:
@@ -646,18 +749,18 @@ int CyaSSL_UseSupportedCurve(CYASSL* ssl, word16 name)
     return TLSX_UseSupportedCurve(&ssl->extensions, name);
 }
 
-int CyaSSL_CTX_UseSupportedCurve(CYASSL_CTX* ctx, word16 name)
+int wolfSSL_CTX_UseSupportedCurve(WOLFSSL_CTX* ctx, word16 name)
 {
     if (ctx == NULL)
         return BAD_FUNC_ARG;
 
     switch (name) {
-        case CYASSL_ECC_SECP160R1:
-        case CYASSL_ECC_SECP192R1:
-        case CYASSL_ECC_SECP224R1:
-        case CYASSL_ECC_SECP256R1:
-        case CYASSL_ECC_SECP384R1:
-        case CYASSL_ECC_SECP521R1:
+        case WOLFSSL_ECC_SECP160R1:
+        case WOLFSSL_ECC_SECP192R1:
+        case WOLFSSL_ECC_SECP224R1:
+        case WOLFSSL_ECC_SECP256R1:
+        case WOLFSSL_ECC_SECP384R1:
+        case WOLFSSL_ECC_SECP521R1:
             break;
 
         default:
@@ -667,17 +770,211 @@ int CyaSSL_CTX_UseSupportedCurve(CYASSL_CTX* ctx, word16 name)
     return TLSX_UseSupportedCurve(&ctx->extensions, name);
 }
 
-#endif /* NO_CYASSL_CLIENT */
+#endif /* NO_WOLFSSL_CLIENT */
 #endif /* HAVE_SUPPORTED_CURVES */
 
+/* Secure Renegotiation */
+#ifdef HAVE_SECURE_RENEGOTIATION
+
+/* user is forcing ability to use secure renegotiation, we discourage it */
+int wolfSSL_UseSecureRenegotiation(WOLFSSL* ssl)
+{
+    int ret = BAD_FUNC_ARG;
+
+    if (ssl)
+        ret = TLSX_UseSecureRenegotiation(&ssl->extensions);
+
+    if (ret == SSL_SUCCESS) {
+        TLSX* extension = TLSX_Find(ssl->extensions, SECURE_RENEGOTIATION);
+        
+        if (extension)
+            ssl->secure_renegotiation = (SecureRenegotiation*)extension->data;
+    }
+
+    return ret;
+}
+
+
+/* do a secure renegotiation handshake, user forced, we discourage */
+int wolfSSL_Rehandshake(WOLFSSL* ssl)
+{
+    int ret;
+
+    if (ssl == NULL)
+        return BAD_FUNC_ARG;
+
+    if (ssl->secure_renegotiation == NULL) {
+        WOLFSSL_MSG("Secure Renegotiation not forced on by user");
+        return SECURE_RENEGOTIATION_E;
+    }
+
+    if (ssl->secure_renegotiation->enabled == 0) {
+        WOLFSSL_MSG("Secure Renegotiation not enabled at extension level");
+        return SECURE_RENEGOTIATION_E;
+    }
+
+    if (ssl->options.handShakeState != HANDSHAKE_DONE) {
+        WOLFSSL_MSG("Can't renegotiate until previous handshake complete");
+        return SECURE_RENEGOTIATION_E;
+    }
+
+#ifndef NO_FORCE_SCR_SAME_SUITE
+    /* force same suite */
+    if (ssl->suites) {
+        ssl->suites->suiteSz = SUITE_LEN;
+        ssl->suites->suites[0] = ssl->options.cipherSuite0;
+        ssl->suites->suites[1] = ssl->options.cipherSuite;
+    }
+#endif
+
+    /* reset handshake states */
+    ssl->options.serverState = NULL_STATE;
+    ssl->options.clientState = NULL_STATE;
+    ssl->options.connectState  = CONNECT_BEGIN;
+    ssl->options.acceptState   = ACCEPT_BEGIN;
+    ssl->options.handShakeState = NULL_STATE;
+    ssl->options.processReply  = 0;  /* TODO, move states in internal.h */
+
+    XMEMSET(&ssl->msgsReceived, 0, sizeof(ssl->msgsReceived));
+
+    ssl->secure_renegotiation->cache_status = SCR_CACHE_NEEDED;
+
+#ifndef NO_OLD_TLS
+#ifndef NO_MD5
+    wc_InitMd5(&ssl->hsHashes->hashMd5);
+#endif
+#ifndef NO_SHA
+    ret = wc_InitSha(&ssl->hsHashes->hashSha);
+    if (ret !=0)
+        return ret;
+#endif
+#endif /* NO_OLD_TLS */
+#ifndef NO_SHA256
+    ret = wc_InitSha256(&ssl->hsHashes->hashSha256);
+    if (ret !=0)
+        return ret;
+#endif
+#ifdef WOLFSSL_SHA384
+    ret = wc_InitSha384(&ssl->hsHashes->hashSha384);
+    if (ret !=0)
+        return ret;
+#endif
+#ifdef WOLFSSL_SHA512
+    ret = wc_InitSha512(&ssl->hsHashes->hashSha512);
+    if (ret !=0)
+        return ret;
+#endif
+
+    ret = wolfSSL_negotiate(ssl);
+    return ret;
+}
+
+#endif /* HAVE_SECURE_RENEGOTIATION */
+
+/* Session Ticket */
+#if !defined(NO_WOLFSSL_SERVER) && defined(HAVE_SESSION_TICKET)
+/* SSL_SUCCESS on ok */
+int wolfSSL_CTX_set_TicketEncCb(WOLFSSL_CTX* ctx, SessionTicketEncCb cb)
+{
+    if (ctx == NULL)
+        return BAD_FUNC_ARG;
+
+    ctx->ticketEncCb = cb;
+
+    return SSL_SUCCESS;
+}
+
+/* set hint interval, SSL_SUCCESS on ok */
+int wolfSSL_CTX_set_TicketHint(WOLFSSL_CTX* ctx, int hint)
+{
+    if (ctx == NULL)
+        return BAD_FUNC_ARG;
+
+    ctx->ticketHint = hint;
+
+    return SSL_SUCCESS;
+}
+
+/* set user context, SSL_SUCCESS on ok */
+int wolfSSL_CTX_set_TicketEncCtx(WOLFSSL_CTX* ctx, void* userCtx)
+{
+    if (ctx == NULL)
+        return BAD_FUNC_ARG;
+
+    ctx->ticketEncCtx = userCtx;
+
+    return SSL_SUCCESS;
+}
+
+#endif /* !defined(NO_WOLFSSL_CLIENT) && defined(HAVE_SESSION_TICKET) */
+
+/* Session Ticket */
+#if !defined(NO_WOLFSSL_CLIENT) && defined(HAVE_SESSION_TICKET)
+int wolfSSL_UseSessionTicket(WOLFSSL* ssl)
+{
+    if (ssl == NULL)
+        return BAD_FUNC_ARG;
+
+    return TLSX_UseSessionTicket(&ssl->extensions, NULL);
+}
+
+int wolfSSL_CTX_UseSessionTicket(WOLFSSL_CTX* ctx)
+{
+    if (ctx == NULL)
+        return BAD_FUNC_ARG;
+
+    return TLSX_UseSessionTicket(&ctx->extensions, NULL);
+}
+
+WOLFSSL_API int wolfSSL_get_SessionTicket(WOLFSSL* ssl, byte* buf, word32* bufSz)
+{
+    if (ssl == NULL || buf == NULL || bufSz == NULL || *bufSz == 0)
+        return BAD_FUNC_ARG;
+
+    if (ssl->session.ticketLen <= *bufSz) {
+        XMEMCPY(buf, ssl->session.ticket, ssl->session.ticketLen);
+        *bufSz = ssl->session.ticketLen;
+    }
+    else
+        *bufSz = 0;
+
+    return SSL_SUCCESS;
+}
+
+WOLFSSL_API int wolfSSL_set_SessionTicket(WOLFSSL* ssl, byte* buf, word32 bufSz)
+{
+    if (ssl == NULL || (buf == NULL && bufSz > 0))
+        return BAD_FUNC_ARG;
+
+    if (bufSz > 0)
+        XMEMCPY(ssl->session.ticket, buf, bufSz);
+    ssl->session.ticketLen = (word16)bufSz;
+
+    return SSL_SUCCESS;
+}
+
+
+WOLFSSL_API int wolfSSL_set_SessionTicket_cb(WOLFSSL* ssl,
+                                            CallbackSessionTicket cb, void* ctx)
+{
+    if (ssl == NULL)
+        return BAD_FUNC_ARG;
+
+    ssl->session_ticket_cb = cb;
+    ssl->session_ticket_ctx = ctx;
+
+    return SSL_SUCCESS;
+}
+#endif
+
+#ifndef WOLFSSL_LEANPSK
 
-#ifndef CYASSL_LEANPSK
-int CyaSSL_send(CYASSL* ssl, const void* data, int sz, int flags)
+int wolfSSL_send(WOLFSSL* ssl, const void* data, int sz, int flags)
 {
     int ret;
     int oldFlags;
 
-    CYASSL_ENTER("CyaSSL_send()");
+    WOLFSSL_ENTER("wolfSSL_send()");
 
     if (ssl == NULL || data == NULL || sz < 0)
         return BAD_FUNC_ARG;
@@ -685,21 +982,21 @@ int CyaSSL_send(CYASSL* ssl, const void* data, int sz, int flags)
     oldFlags = ssl->wflags;
 
     ssl->wflags = flags;
-    ret = CyaSSL_write(ssl, data, sz);
+    ret = wolfSSL_write(ssl, data, sz);
     ssl->wflags = oldFlags;
 
-    CYASSL_LEAVE("CyaSSL_send()", ret);
+    WOLFSSL_LEAVE("wolfSSL_send()", ret);
 
     return ret;
 }
 
 
-int CyaSSL_recv(CYASSL* ssl, void* data, int sz, int flags)
+int wolfSSL_recv(WOLFSSL* ssl, void* data, int sz, int flags)
 {
     int ret;
     int oldFlags;
 
-    CYASSL_ENTER("CyaSSL_recv()");
+    WOLFSSL_ENTER("wolfSSL_recv()");
 
     if (ssl == NULL || data == NULL || sz < 0)
         return BAD_FUNC_ARG;
@@ -707,10 +1004,10 @@ int CyaSSL_recv(CYASSL* ssl, void* data, int sz, int flags)
     oldFlags = ssl->rflags;
 
     ssl->rflags = flags;
-    ret = CyaSSL_read(ssl, data, sz);
+    ret = wolfSSL_read(ssl, data, sz);
     ssl->rflags = oldFlags;
 
-    CYASSL_LEAVE("CyaSSL_recv()", ret);
+    WOLFSSL_LEAVE("wolfSSL_recv()", ret);
 
     return ret;
 }
@@ -718,15 +1015,17 @@ int CyaSSL_recv(CYASSL* ssl, void* data, int sz, int flags)
 
 
 /* SSL_SUCCESS on ok */
-int CyaSSL_shutdown(CYASSL* ssl)
+int wolfSSL_shutdown(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_shutdown()");
+    int  ret = SSL_FATAL_ERROR;
+    byte tmp;
+    WOLFSSL_ENTER("SSL_shutdown()");
 
     if (ssl == NULL)
         return SSL_FATAL_ERROR;
 
     if (ssl->options.quietShutdown) {
-        CYASSL_MSG("quiet shutdown, no close notify sent");
+        WOLFSSL_MSG("quiet shutdown, no close notify sent");
         return SSL_SUCCESS;
     }
 
@@ -735,30 +1034,47 @@ int CyaSSL_shutdown(CYASSL* ssl)
                                   !ssl->options.sentNotify) {
         ssl->error = SendAlert(ssl, alert_warning, close_notify);
         if (ssl->error < 0) {
-            CYASSL_ERROR(ssl->error);
+            WOLFSSL_ERROR(ssl->error);
             return SSL_FATAL_ERROR;
         }
         ssl->options.sentNotify = 1;  /* don't send close_notify twice */
+        if (ssl->options.closeNotify)
+            ret = SSL_SUCCESS;
+        else
+            ret = SSL_SHUTDOWN_NOT_DONE;
+
+        WOLFSSL_LEAVE("SSL_shutdown()", ret);
+        return ret;
     }
 
-    CYASSL_LEAVE("SSL_shutdown()", ssl->error);
+    /* call wolfSSL_shutdown again for bidirectional shudown */
+    if (ssl->options.sentNotify && !ssl->options.closeNotify) {
+        ret = wolfSSL_read(ssl, &tmp, 0);
+        if (ret < 0) {
+            WOLFSSL_ERROR(ssl->error);
+            ret = SSL_FATAL_ERROR;
+        } else if (ssl->options.closeNotify) {
+            ssl->error = SSL_ERROR_SYSCALL;   /* simulate OpenSSL behavior */
+            ret = SSL_SUCCESS;
+        }
+    }
 
-    ssl->error = SSL_ERROR_SYSCALL;   /* simulate OpenSSL behavior */
+    WOLFSSL_LEAVE("SSL_shutdown()", ret);
 
-    return SSL_SUCCESS;
+    return ret;
 }
 
 
-int CyaSSL_get_error(CYASSL* ssl, int ret)
+int wolfSSL_get_error(WOLFSSL* ssl, int ret)
 {
-    CYASSL_ENTER("SSL_get_error");
+    WOLFSSL_ENTER("SSL_get_error");
 
     if (ret > 0)
         return SSL_ERROR_NONE;
     if (ssl == NULL)
         return BAD_FUNC_ARG;
 
-    CYASSL_LEAVE("SSL_get_error", ssl->error);
+    WOLFSSL_LEAVE("SSL_get_error", ssl->error);
 
     /* make sure converted types are handled in SetErrorString() too */
     if (ssl->error == WANT_READ)
@@ -772,7 +1088,7 @@ int CyaSSL_get_error(CYASSL* ssl, int ret)
 
 
 /* retrive alert history, SSL_SUCCESS on ok */
-int CyaSSL_get_alert_history(CYASSL* ssl, CYASSL_ALERT_HISTORY *h)
+int wolfSSL_get_alert_history(WOLFSSL* ssl, WOLFSSL_ALERT_HISTORY *h)
 {
     if (ssl && h) {
         *h = ssl->alert_history;
@@ -782,9 +1098,9 @@ int CyaSSL_get_alert_history(CYASSL* ssl, CYASSL_ALERT_HISTORY *h)
 
 
 /* return TRUE if current error is want read */
-int CyaSSL_want_read(CYASSL* ssl)
+int wolfSSL_want_read(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_want_read");
+    WOLFSSL_ENTER("SSL_want_read");
     if (ssl->error == WANT_READ)
         return 1;
 
@@ -793,9 +1109,9 @@ int CyaSSL_want_read(CYASSL* ssl)
 
 
 /* return TRUE if current error is want write */
-int CyaSSL_want_write(CYASSL* ssl)
+int wolfSSL_want_write(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_want_write");
+    WOLFSSL_ENTER("SSL_want_write");
     if (ssl->error == WANT_WRITE)
         return 1;
 
@@ -803,11 +1119,11 @@ int CyaSSL_want_write(CYASSL* ssl)
 }
 
 
-char* CyaSSL_ERR_error_string(unsigned long errNumber, char* data)
+char* wolfSSL_ERR_error_string(unsigned long errNumber, char* data)
 {
     static const char* msg = "Please supply a buffer for error string";
 
-    CYASSL_ENTER("ERR_error_string");
+    WOLFSSL_ENTER("ERR_error_string");
     if (data) {
         SetErrorString((int)errNumber, data);
         return data;
@@ -817,17 +1133,17 @@ char* CyaSSL_ERR_error_string(unsigned long errNumber, char* data)
 }
 
 
-void CyaSSL_ERR_error_string_n(unsigned long e, char* buf, unsigned long len)
+void wolfSSL_ERR_error_string_n(unsigned long e, char* buf, unsigned long len)
 {
-    CYASSL_ENTER("CyaSSL_ERR_error_string_n");
-    if (len >= CYASSL_MAX_ERROR_SZ)
-        CyaSSL_ERR_error_string(e, buf);
+    WOLFSSL_ENTER("wolfSSL_ERR_error_string_n");
+    if (len >= WOLFSSL_MAX_ERROR_SZ)
+        wolfSSL_ERR_error_string(e, buf);
     else {
-        char tmp[CYASSL_MAX_ERROR_SZ];
+        char tmp[WOLFSSL_MAX_ERROR_SZ];
 
-        CYASSL_MSG("Error buffer too short, truncating");
+        WOLFSSL_MSG("Error buffer too short, truncating");
         if (len) {
-            CyaSSL_ERR_error_string(e, tmp);
+            wolfSSL_ERR_error_string(e, tmp);
             XMEMCPY(buf, tmp, len-1);
             buf[len-1] = '\0';
         }
@@ -836,7 +1152,7 @@ void CyaSSL_ERR_error_string_n(unsigned long e, char* buf, unsigned long len)
 
 
 /* don't free temporary arrays at end of handshake */
-void CyaSSL_KeepArrays(CYASSL* ssl)
+void wolfSSL_KeepArrays(WOLFSSL* ssl)
 {
     if (ssl)
         ssl->options.saveArrays = 1;
@@ -844,7 +1160,7 @@ void CyaSSL_KeepArrays(CYASSL* ssl)
 
 
 /* user doesn't need temporary arrays anymore, Free */
-void CyaSSL_FreeArrays(CYASSL* ssl)
+void wolfSSL_FreeArrays(WOLFSSL* ssl)
 {
     if (ssl && ssl->options.handShakeState == HANDSHAKE_DONE) {
         ssl->options.saveArrays = 0;
@@ -853,13 +1169,13 @@ void CyaSSL_FreeArrays(CYASSL* ssl)
 }
 
 
-const byte* CyaSSL_GetMacSecret(CYASSL* ssl, int verify)
+const byte* wolfSSL_GetMacSecret(WOLFSSL* ssl, int verify)
 {
     if (ssl == NULL)
         return NULL;
 
-    if ( (ssl->options.side == CYASSL_CLIENT_END && !verify) ||
-         (ssl->options.side == CYASSL_SERVER_END &&  verify) )
+    if ( (ssl->options.side == WOLFSSL_CLIENT_END && !verify) ||
+         (ssl->options.side == WOLFSSL_SERVER_END &&  verify) )
         return ssl->keys.client_write_MAC_secret;
     else
         return ssl->keys.server_write_MAC_secret;
@@ -868,21 +1184,21 @@ const byte* CyaSSL_GetMacSecret(CYASSL* ssl, int verify)
 
 #ifdef ATOMIC_USER
 
-void  CyaSSL_CTX_SetMacEncryptCb(CYASSL_CTX* ctx, CallbackMacEncrypt cb)
+void  wolfSSL_CTX_SetMacEncryptCb(WOLFSSL_CTX* ctx, CallbackMacEncrypt cb)
 {
     if (ctx)
         ctx->MacEncryptCb = cb;
 }
 
 
-void  CyaSSL_SetMacEncryptCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetMacEncryptCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->MacEncryptCtx = ctx;
 }
 
 
-void* CyaSSL_GetMacEncryptCtx(CYASSL* ssl)
+void* wolfSSL_GetMacEncryptCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->MacEncryptCtx;
@@ -891,21 +1207,21 @@ void* CyaSSL_GetMacEncryptCtx(CYASSL* ssl)
 }
 
 
-void  CyaSSL_CTX_SetDecryptVerifyCb(CYASSL_CTX* ctx, CallbackDecryptVerify cb)
+void  wolfSSL_CTX_SetDecryptVerifyCb(WOLFSSL_CTX* ctx, CallbackDecryptVerify cb)
 {
     if (ctx)
         ctx->DecryptVerifyCb = cb;
 }
 
 
-void  CyaSSL_SetDecryptVerifyCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetDecryptVerifyCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->DecryptVerifyCtx = ctx;
 }
 
 
-void* CyaSSL_GetDecryptVerifyCtx(CYASSL* ssl)
+void* wolfSSL_GetDecryptVerifyCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->DecryptVerifyCtx;
@@ -914,7 +1230,7 @@ void* CyaSSL_GetDecryptVerifyCtx(CYASSL* ssl)
 }
 
 
-const byte* CyaSSL_GetClientWriteKey(CYASSL* ssl)
+const byte* wolfSSL_GetClientWriteKey(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->keys.client_write_key;
@@ -923,7 +1239,7 @@ const byte* CyaSSL_GetClientWriteKey(CYASSL* ssl)
 }
 
 
-const byte* CyaSSL_GetClientWriteIV(CYASSL* ssl)
+const byte* wolfSSL_GetClientWriteIV(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->keys.client_write_IV;
@@ -932,7 +1248,7 @@ const byte* CyaSSL_GetClientWriteIV(CYASSL* ssl)
 }
 
 
-const byte* CyaSSL_GetServerWriteKey(CYASSL* ssl)
+const byte* wolfSSL_GetServerWriteKey(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->keys.server_write_key;
@@ -941,7 +1257,7 @@ const byte* CyaSSL_GetServerWriteKey(CYASSL* ssl)
 }
 
 
-const byte* CyaSSL_GetServerWriteIV(CYASSL* ssl)
+const byte* wolfSSL_GetServerWriteIV(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->keys.server_write_IV;
@@ -950,7 +1266,7 @@ const byte* CyaSSL_GetServerWriteIV(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetKeySize(CYASSL* ssl)
+int wolfSSL_GetKeySize(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->specs.key_size;
@@ -959,7 +1275,7 @@ int CyaSSL_GetKeySize(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetIVSize(CYASSL* ssl)
+int wolfSSL_GetIVSize(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->specs.iv_size;
@@ -968,7 +1284,7 @@ int CyaSSL_GetIVSize(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetBulkCipher(CYASSL* ssl)
+int wolfSSL_GetBulkCipher(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->specs.bulk_cipher_algorithm;
@@ -977,23 +1293,23 @@ int CyaSSL_GetBulkCipher(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetCipherType(CYASSL* ssl)
+int wolfSSL_GetCipherType(WOLFSSL* ssl)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
 
     if (ssl->specs.cipher_type == block)
-        return CYASSL_BLOCK_TYPE;
+        return WOLFSSL_BLOCK_TYPE;
     if (ssl->specs.cipher_type == stream)
-        return CYASSL_STREAM_TYPE;
+        return WOLFSSL_STREAM_TYPE;
     if (ssl->specs.cipher_type == aead)
-        return CYASSL_AEAD_TYPE;
+        return WOLFSSL_AEAD_TYPE;
 
     return -1;
 }
 
 
-int CyaSSL_GetCipherBlockSize(CYASSL* ssl)
+int wolfSSL_GetCipherBlockSize(WOLFSSL* ssl)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -1002,7 +1318,7 @@ int CyaSSL_GetCipherBlockSize(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetAeadMacSize(CYASSL* ssl)
+int wolfSSL_GetAeadMacSize(WOLFSSL* ssl)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -1011,7 +1327,7 @@ int CyaSSL_GetAeadMacSize(CYASSL* ssl)
 }
 
 
-int CyaSSL_IsTLSv1_1(CYASSL* ssl)
+int wolfSSL_IsTLSv1_1(WOLFSSL* ssl)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -1023,7 +1339,7 @@ int CyaSSL_IsTLSv1_1(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetSide(CYASSL* ssl)
+int wolfSSL_GetSide(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->options.side;
@@ -1032,7 +1348,7 @@ int CyaSSL_GetSide(CYASSL* ssl)
 }
 
 
-int CyaSSL_GetHmacSize(CYASSL* ssl)
+int wolfSSL_GetHmacSize(WOLFSSL* ssl)
 {
     /* AEAD ciphers don't have HMAC keys */
     if (ssl)
@@ -1045,20 +1361,20 @@ int CyaSSL_GetHmacSize(CYASSL* ssl)
 
 #ifndef NO_CERTS
 
-CYASSL_CERT_MANAGER* CyaSSL_CertManagerNew(void)
+WOLFSSL_CERT_MANAGER* wolfSSL_CertManagerNew(void)
 {
-    CYASSL_CERT_MANAGER* cm = NULL;
+    WOLFSSL_CERT_MANAGER* cm = NULL;
 
-    CYASSL_ENTER("CyaSSL_CertManagerNew");
+    WOLFSSL_ENTER("wolfSSL_CertManagerNew");
 
-    cm = (CYASSL_CERT_MANAGER*) XMALLOC(sizeof(CYASSL_CERT_MANAGER), 0,
+    cm = (WOLFSSL_CERT_MANAGER*) XMALLOC(sizeof(WOLFSSL_CERT_MANAGER), 0,
                                         DYNAMIC_TYPE_CERT_MANAGER);
     if (cm) {
-        XMEMSET(cm, 0, sizeof(CYASSL_CERT_MANAGER));
+        XMEMSET(cm, 0, sizeof(WOLFSSL_CERT_MANAGER));
 
         if (InitMutex(&cm->caLock) != 0) {
-            CYASSL_MSG("Bad mutex init");
-            CyaSSL_CertManagerFree(cm);
+            WOLFSSL_MSG("Bad mutex init");
+            wolfSSL_CertManagerFree(cm);
             return NULL;
         }
     }
@@ -1067,9 +1383,9 @@ CYASSL_CERT_MANAGER* CyaSSL_CertManagerNew(void)
 }
 
 
-void CyaSSL_CertManagerFree(CYASSL_CERT_MANAGER* cm)
+void wolfSSL_CertManagerFree(WOLFSSL_CERT_MANAGER* cm)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerFree");
+    WOLFSSL_ENTER("wolfSSL_CertManagerFree");
 
     if (cm) {
         #ifdef HAVE_CRL
@@ -1089,9 +1405,9 @@ void CyaSSL_CertManagerFree(CYASSL_CERT_MANAGER* cm)
 
 
 /* Unload the CA signer list */
-int CyaSSL_CertManagerUnloadCAs(CYASSL_CERT_MANAGER* cm)
+int wolfSSL_CertManagerUnloadCAs(WOLFSSL_CERT_MANAGER* cm)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerUnloadCAs");
+    WOLFSSL_ENTER("wolfSSL_CertManagerUnloadCAs");
 
     if (cm == NULL)
         return BAD_FUNC_ARG;
@@ -1109,35 +1425,51 @@ int CyaSSL_CertManagerUnloadCAs(CYASSL_CERT_MANAGER* cm)
 
 
 /* Return bytes written to buff or < 0 for error */
-int CyaSSL_CertPemToDer(const unsigned char* pem, int pemSz,
+int wolfSSL_CertPemToDer(const unsigned char* pem, int pemSz,
                         unsigned char* buff, int buffSz,
                         int type)
 {
-    EncryptedInfo info;
-    int           eccKey = 0;
-    int           ret;
-    buffer        der;
+    int            eccKey = 0;
+    int            ret;
+    buffer         der;
+#ifdef WOLFSSL_SMALL_STACK
+    EncryptedInfo* info = NULL;
+#else
+    EncryptedInfo  info[1];
+#endif
 
-    CYASSL_ENTER("CyaSSL_CertPemToDer");
+    WOLFSSL_ENTER("wolfSSL_CertPemToDer");
 
     if (pem == NULL || buff == NULL || buffSz <= 0) {
-        CYASSL_MSG("Bad pem der args");
+        WOLFSSL_MSG("Bad pem der args");
         return BAD_FUNC_ARG;
     }
 
     if (type != CERT_TYPE && type != CA_TYPE && type != CERTREQ_TYPE) {
-        CYASSL_MSG("Bad cert type");
+        WOLFSSL_MSG("Bad cert type");
         return BAD_FUNC_ARG;
     }
 
-    info.set       = 0;
-    info.ctx      = NULL;
-    info.consumed = 0;
-    der.buffer    = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (info == NULL)
+        return MEMORY_E;
+#endif
+
+    info->set      = 0;
+    info->ctx      = NULL;
+    info->consumed = 0;
+    der.buffer     = NULL;
+
+    ret = PemToDer(pem, pemSz, type, &der, NULL, info, &eccKey);
+
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-    ret = PemToDer(pem, pemSz, type, &der, NULL, &info, &eccKey);
     if (ret < 0) {
-        CYASSL_MSG("Bad Pem To Der");
+        WOLFSSL_MSG("Bad Pem To Der");
     }
     else {
         if (der.length <= (word32)buffSz) {
@@ -1145,7 +1477,7 @@ int CyaSSL_CertPemToDer(const unsigned char* pem, int pemSz,
             ret = der.length;
         }
         else {
-            CYASSL_MSG("Bad der length");
+            WOLFSSL_MSG("Bad der length");
             ret = BAD_FUNC_ARG;
         }
     }
@@ -1174,41 +1506,65 @@ static INLINE int OurPasswordCb(char* passwd, int sz, int rw, void* userdata)
 
 
 /* Return bytes written to buff or < 0 for error */
-int CyaSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff,
+int wolfSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff,
                        int buffSz, const char* pass)
 {
-    EncryptedInfo info;
-    int           eccKey = 0;
-    int           ret;
-    buffer        der;
+    int            eccKey = 0;
+    int            ret;
+    buffer         der;
+#ifdef WOLFSSL_SMALL_STACK
+    EncryptedInfo* info = NULL;
+#else
+    EncryptedInfo  info[1];
+#endif
 
     (void)pass;
 
-    CYASSL_ENTER("CyaSSL_KeyPemToDer");
+    WOLFSSL_ENTER("wolfSSL_KeyPemToDer");
 
     if (pem == NULL || buff == NULL || buffSz <= 0) {
-        CYASSL_MSG("Bad pem der args");
+        WOLFSSL_MSG("Bad pem der args");
         return BAD_FUNC_ARG;
     }
 
-    info.set       = 0;
-    info.ctx      = NULL;
-    info.consumed = 0;
-    der.buffer    = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (info == NULL)
+        return MEMORY_E;
+#endif
+
+    info->set      = 0;
+    info->ctx      = NULL;
+    info->consumed = 0;
+    der.buffer     = NULL;
 
 #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
     if (pass) {
-        info.ctx = CyaSSL_CTX_new(CyaSSLv23_client_method());
-        if (info.ctx == NULL)
+        info->ctx = wolfSSL_CTX_new(wolfSSLv23_client_method());
+        if (info->ctx == NULL) {
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
             return MEMORY_E;
-        CyaSSL_CTX_set_default_passwd_cb(info.ctx, OurPasswordCb);
-        CyaSSL_CTX_set_default_passwd_cb_userdata(info.ctx, (void*)pass);
+        }
+
+        wolfSSL_CTX_set_default_passwd_cb(info->ctx, OurPasswordCb);
+        wolfSSL_CTX_set_default_passwd_cb_userdata(info->ctx, (void*)pass);
     }
 #endif
 
-    ret = PemToDer(pem, pemSz, PRIVATEKEY_TYPE, &der, NULL, &info, &eccKey);
+    ret = PemToDer(pem, pemSz, PRIVATEKEY_TYPE, &der, NULL, info, &eccKey);
+
+    if (info->ctx)
+        wolfSSL_CTX_free(info->ctx);
+
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
+
     if (ret < 0) {
-        CYASSL_MSG("Bad Pem To Der");
+        WOLFSSL_MSG("Bad Pem To Der");
     }
     else {
         if (der.length <= (word32)buffSz) {
@@ -1216,16 +1572,13 @@ int CyaSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff,
             ret = der.length;
         }
         else {
-            CYASSL_MSG("Bad der length");
+            WOLFSSL_MSG("Bad der length");
             ret = BAD_FUNC_ARG;
         }
     }
 
     XFREE(der.buffer, NULL, DYNAMIC_TYPE_KEY);
 
-    if (info.ctx)
-        CyaSSL_CTX_free(info.ctx);
-
     return ret;
 }
 
@@ -1236,11 +1589,11 @@ int CyaSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff,
 
 #if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
 
-void CyaSSL_ERR_print_errors_fp(FILE* fp, int err)
+void wolfSSL_ERR_print_errors_fp(FILE* fp, int err)
 {
-    char data[CYASSL_MAX_ERROR_SZ + 1];
+    char data[WOLFSSL_MAX_ERROR_SZ + 1];
 
-    CYASSL_ENTER("CyaSSL_ERR_print_errors_fp");
+    WOLFSSL_ENTER("wolfSSL_ERR_print_errors_fp");
     SetErrorString(err, data);
     fprintf(fp, "%s", data);
 }
@@ -1248,16 +1601,16 @@ void CyaSSL_ERR_print_errors_fp(FILE* fp, int err)
 #endif
 
 
-int CyaSSL_pending(CYASSL* ssl)
+int wolfSSL_pending(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_pending");
+    WOLFSSL_ENTER("SSL_pending");
     return ssl->buffers.clearOutputBuffer.length;
 }
 
 
-#ifndef CYASSL_LEANPSK
+#ifndef WOLFSSL_LEANPSK
 /* trun on handshake group messages for context */
-int CyaSSL_CTX_set_group_messages(CYASSL_CTX* ctx)
+int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx)
 {
     if (ctx == NULL)
        return BAD_FUNC_ARG;
@@ -1269,9 +1622,9 @@ int CyaSSL_CTX_set_group_messages(CYASSL_CTX* ctx)
 #endif
 
 
-#ifndef NO_CYASSL_CLIENT
+#ifndef NO_WOLFSSL_CLIENT
 /* connect enough to get peer cert chain */
-int CyaSSL_connect_cert(CYASSL* ssl)
+int wolfSSL_connect_cert(WOLFSSL* ssl)
 {
     int  ret;
 
@@ -1279,7 +1632,7 @@ int CyaSSL_connect_cert(CYASSL* ssl)
         return SSL_FAILURE;
 
     ssl->options.certOnly = 1;
-    ret = CyaSSL_connect(ssl);
+    ret = wolfSSL_connect(ssl);
     ssl->options.certOnly   = 0;
 
     return ret;
@@ -1287,9 +1640,9 @@ int CyaSSL_connect_cert(CYASSL* ssl)
 #endif
 
 
-#ifndef CYASSL_LEANPSK
+#ifndef WOLFSSL_LEANPSK
 /* trun on handshake group messages for ssl object */
-int CyaSSL_set_group_messages(CYASSL* ssl)
+int wolfSSL_set_group_messages(WOLFSSL* ssl)
 {
     if (ssl == NULL)
        return BAD_FUNC_ARG;
@@ -1300,42 +1653,104 @@ int CyaSSL_set_group_messages(CYASSL* ssl)
 }
 
 
-int CyaSSL_SetVersion(CYASSL* ssl, int version)
+/* make minVersion the internal equivilant SSL version */
+static int SetMinVersionHelper(byte* minVersion, int version)
+{
+    switch (version) {
+#ifndef NO_OLD_TLS
+        case WOLFSSL_SSLV3:
+            *minVersion = SSLv3_MINOR;
+            break;
+#endif
+
+#ifndef NO_TLS
+    #ifndef NO_OLD_TLS
+        case WOLFSSL_TLSV1:
+            *minVersion = TLSv1_MINOR;
+            break;
+
+        case WOLFSSL_TLSV1_1:
+            *minVersion = TLSv1_1_MINOR;
+            break;
+    #endif
+        case WOLFSSL_TLSV1_2:
+            *minVersion = TLSv1_2_MINOR;
+            break;
+#endif
+
+        default:
+            WOLFSSL_MSG("Bad function argument");
+            return BAD_FUNC_ARG;
+    }
+
+    return SSL_SUCCESS;
+}
+
+
+/* Set minimum downgrade version allowed, SSL_SUCCESS on ok */
+int wolfSSL_CTX_SetMinVersion(WOLFSSL_CTX* ctx, int version)
+{
+    WOLFSSL_ENTER("wolfSSL_CTX_SetMinVersion");
+
+    if (ctx == NULL) {
+        WOLFSSL_MSG("Bad function argument");
+        return BAD_FUNC_ARG;
+    }
+
+    return SetMinVersionHelper(&ctx->minDowngrade, version);
+}
+
+
+/* Set minimum downgrade version allowed, SSL_SUCCESS on ok */
+int wolfSSL_SetMinVersion(WOLFSSL* ssl, int version)
+{
+    WOLFSSL_ENTER("wolfSSL_SetMinVersion");
+
+    if (ssl == NULL) {
+        WOLFSSL_MSG("Bad function argument");
+        return BAD_FUNC_ARG;
+    }
+
+    return SetMinVersionHelper(&ssl->options.minDowngrade, version);
+}
+
+
+int wolfSSL_SetVersion(WOLFSSL* ssl, int version)
 {
     byte haveRSA = 1;
     byte havePSK = 0;
 
-    CYASSL_ENTER("CyaSSL_SetVersion");
+    WOLFSSL_ENTER("wolfSSL_SetVersion");
 
     if (ssl == NULL) {
-        CYASSL_MSG("Bad function argument");
+        WOLFSSL_MSG("Bad function argument");
         return BAD_FUNC_ARG;
     }
 
     switch (version) {
 #ifndef NO_OLD_TLS
-        case CYASSL_SSLV3:
+        case WOLFSSL_SSLV3:
             ssl->version = MakeSSLv3();
             break;
 #endif
 
 #ifndef NO_TLS
     #ifndef NO_OLD_TLS
-        case CYASSL_TLSV1:
+        case WOLFSSL_TLSV1:
             ssl->version = MakeTLSv1();
             break;
 
-        case CYASSL_TLSV1_1:
+        case WOLFSSL_TLSV1_1:
             ssl->version = MakeTLSv1_1();
             break;
     #endif
-        case CYASSL_TLSV1_2:
+        case WOLFSSL_TLSV1_2:
             ssl->version = MakeTLSv1_2();
             break;
 #endif
 
         default:
-            CYASSL_MSG("Bad function argument");
+            WOLFSSL_MSG("Bad function argument");
             return BAD_FUNC_ARG;
     }
 
@@ -1377,7 +1792,7 @@ static INLINE word32 HashSigner(const byte* hash)
 
 
 /* does CA already exist on signer list */
-int AlreadySigner(CYASSL_CERT_MANAGER* cm, byte* hash)
+int AlreadySigner(WOLFSSL_CERT_MANAGER* cm, byte* hash)
 {
     Signer* signers;
     int     ret = 0;
@@ -1393,7 +1808,7 @@ int AlreadySigner(CYASSL_CERT_MANAGER* cm, byte* hash)
         #else
             subjectHash = signers->subjectNameHash;
         #endif
-        if (XMEMCMP(hash, subjectHash, SHA_DIGEST_SIZE) == 0) {
+        if (XMEMCMP(hash, subjectHash, SIGNER_DIGEST_SIZE) == 0) {
             ret = 1;
             break;
         }
@@ -1408,7 +1823,7 @@ int AlreadySigner(CYASSL_CERT_MANAGER* cm, byte* hash)
 /* return CA if found, otherwise NULL */
 Signer* GetCA(void* vp, byte* hash)
 {
-    CYASSL_CERT_MANAGER* cm = (CYASSL_CERT_MANAGER*)vp;
+    WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp;
     Signer* ret = NULL;
     Signer* signers;
     word32  row = HashSigner(hash);
@@ -1427,7 +1842,7 @@ Signer* GetCA(void* vp, byte* hash)
         #else
             subjectHash = signers->subjectNameHash;
         #endif
-        if (XMEMCMP(hash, subjectHash, SHA_DIGEST_SIZE) == 0) {
+        if (XMEMCMP(hash, subjectHash, SIGNER_DIGEST_SIZE) == 0) {
             ret = signers;
             break;
         }
@@ -1443,7 +1858,7 @@ Signer* GetCA(void* vp, byte* hash)
 /* return CA if found, otherwise NULL. Walk through hash table. */
 Signer* GetCAByName(void* vp, byte* hash)
 {
-    CYASSL_CERT_MANAGER* cm = (CYASSL_CERT_MANAGER*)vp;
+    WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp;
     Signer* ret = NULL;
     Signer* signers;
     word32  row;
@@ -1457,7 +1872,8 @@ Signer* GetCAByName(void* vp, byte* hash)
     for (row = 0; row < CA_TABLE_SIZE && ret == NULL; row++) {
         signers = cm->caTable[row];
         while (signers && ret == NULL) {
-            if (XMEMCMP(hash, signers->subjectNameHash, SHA_DIGEST_SIZE) == 0) {
+            if (XMEMCMP(hash,
+                           signers->subjectNameHash, SIGNER_DIGEST_SIZE) == 0) {
                 ret = signers;
             }
             signers = signers->next;
@@ -1473,40 +1889,52 @@ Signer* GetCAByName(void* vp, byte* hash)
 /* owns der, internal now uses too */
 /* type flag ids from user or from chain received during verify
    don't allow chain ones to be added w/o isCA extension */
-int AddCA(CYASSL_CERT_MANAGER* cm, buffer der, int type, int verify)
+int AddCA(WOLFSSL_CERT_MANAGER* cm, buffer der, int type, int verify)
 {
     int         ret;
-    DecodedCert cert;
     Signer*     signer = 0;
     word32      row;
     byte*       subjectHash;
+#ifdef WOLFSSL_SMALL_STACK
+    DecodedCert* cert = NULL;
+#else
+    DecodedCert  cert[1];
+#endif
 
-    CYASSL_MSG("Adding a CA");
-    InitDecodedCert(&cert, der.buffer, der.length, cm->heap);
-    ret = ParseCert(&cert, CA_TYPE, verify, cm);
-    CYASSL_MSG("    Parsed new CA");
+    WOLFSSL_MSG("Adding a CA");
 
-    #ifndef NO_SKID
-        subjectHash = cert.extSubjKeyId;
-    #else
-        subjectHash = cert.subjectHash;
-    #endif
+#ifdef WOLFSSL_SMALL_STACK
+    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (cert == NULL)
+        return MEMORY_E;
+#endif
+
+    InitDecodedCert(cert, der.buffer, der.length, cm->heap);
+    ret = ParseCert(cert, CA_TYPE, verify, cm);
+    WOLFSSL_MSG("    Parsed new CA");
+
+#ifndef NO_SKID
+    subjectHash = cert->extSubjKeyId;
+#else
+    subjectHash = cert->subjectHash;
+#endif
 
-    if (ret == 0 && cert.isCA == 0 && type != CYASSL_USER_CA) {
-        CYASSL_MSG("    Can't add as CA if not actually one");
+    if (ret == 0 && cert->isCA == 0 && type != WOLFSSL_USER_CA) {
+        WOLFSSL_MSG("    Can't add as CA if not actually one");
         ret = NOT_CA_ERROR;
     }
-    #ifndef ALLOW_INVALID_CERTSIGN
-        else if (ret == 0 && cert.isCA == 1 && type != CYASSL_USER_CA &&
-                               (cert.extKeyUsage & KEYUSE_KEY_CERT_SIGN) == 0) {
-            /* Intermediate CA certs are required to have the keyCertSign
-            * extension set. User loaded root certs are not. */
-            CYASSL_MSG("    Doesn't have key usage certificate signing");
-            ret = NOT_CA_ERROR;
-        }
-    #endif
+#ifndef ALLOW_INVALID_CERTSIGN
+    else if (ret == 0 && cert->isCA == 1 && type != WOLFSSL_USER_CA &&
+                              (cert->extKeyUsage & KEYUSE_KEY_CERT_SIGN) == 0) {
+        /* Intermediate CA certs are required to have the keyCertSign
+        * extension set. User loaded root certs are not. */
+        WOLFSSL_MSG("    Doesn't have key usage certificate signing");
+        ret = NOT_CA_ERROR;
+    }
+#endif
     else if (ret == 0 && AlreadySigner(cm, subjectHash)) {
-        CYASSL_MSG("    Already have this CA, not adding again");
+        WOLFSSL_MSG("    Already have this CA, not adding again");
         (void)ret;
     }
     else if (ret == 0) {
@@ -1515,36 +1943,36 @@ int AddCA(CYASSL_CERT_MANAGER* cm, buffer der, int type, int verify)
         if (!signer)
             ret = MEMORY_ERROR;
         else {
-            signer->keyOID     = cert.keyOID;
-            signer->publicKey  = cert.publicKey;
-            signer->pubKeySize = cert.pubKeySize;
-            signer->nameLen    = cert.subjectCNLen;
-            signer->name       = cert.subjectCN;
-            #ifndef IGNORE_NAME_CONSTRAINTS
-                signer->permittedNames = cert.permittedNames;
-                signer->excludedNames = cert.excludedNames;
-            #endif
-            #ifndef NO_SKID
-                XMEMCPY(signer->subjectKeyIdHash,
-                                            cert.extSubjKeyId, SHA_DIGEST_SIZE);
-            #endif
-            XMEMCPY(signer->subjectNameHash, cert.subjectHash, SHA_DIGEST_SIZE);
-            signer->keyUsage = cert.extKeyUsageSet ? cert.extKeyUsage : 0xFFFF;
-                                   /* If Key Usage not set, all uses valid. */
-            signer->next = NULL;   /* in case lock fails */
-
-            cert.publicKey = 0;  /* don't free here */
-            cert.subjectCN = 0;
-            #ifndef IGNORE_NAME_CONSTRAINTS
-                cert.permittedNames = NULL;
-                cert.excludedNames = NULL;
-            #endif
+            signer->keyOID         = cert->keyOID;
+            signer->publicKey      = cert->publicKey;
+            signer->pubKeySize     = cert->pubKeySize;
+            signer->nameLen        = cert->subjectCNLen;
+            signer->name           = cert->subjectCN;
+        #ifndef IGNORE_NAME_CONSTRAINTS
+            signer->permittedNames = cert->permittedNames;
+            signer->excludedNames  = cert->excludedNames;
+        #endif
+        #ifndef NO_SKID
+            XMEMCPY(signer->subjectKeyIdHash, cert->extSubjKeyId,
+                                                            SIGNER_DIGEST_SIZE);
+        #endif
+            XMEMCPY(signer->subjectNameHash, cert->subjectHash,
+                                                            SIGNER_DIGEST_SIZE);
+            signer->keyUsage = cert->extKeyUsageSet ? cert->extKeyUsage
+                                                    : 0xFFFF;
+            signer->next    = NULL; /* If Key Usage not set, all uses valid. */
+            cert->publicKey = 0;    /* in case lock fails don't free here.   */
+            cert->subjectCN = 0;
+        #ifndef IGNORE_NAME_CONSTRAINTS
+            cert->permittedNames = NULL;
+            cert->excludedNames = NULL;
+        #endif
 
-            #ifndef NO_SKID
-                row = HashSigner(signer->subjectKeyIdHash);
-            #else
-                row = HashSigner(signer->subjectNameHash);
-            #endif
+        #ifndef NO_SKID
+            row = HashSigner(signer->subjectKeyIdHash);
+        #else
+            row = HashSigner(signer->subjectNameHash);
+        #endif
 
             if (LockMutex(&cm->caLock) == 0) {
                 signer->next = cm->caTable[row];
@@ -1554,22 +1982,25 @@ int AddCA(CYASSL_CERT_MANAGER* cm, buffer der, int type, int verify)
                     cm->caCacheCallback(der.buffer, (int)der.length, type);
             }
             else {
-                CYASSL_MSG("    CA Mutex Lock failed");
+                WOLFSSL_MSG("    CA Mutex Lock failed");
                 ret = BAD_MUTEX_E;
                 FreeSigner(signer, cm->heap);
             }
         }
     }
 
-    CYASSL_MSG("    Freeing Parsed CA");
-    FreeDecodedCert(&cert);
-    CYASSL_MSG("    Freeing der CA");
+    WOLFSSL_MSG("    Freeing Parsed CA");
+    FreeDecodedCert(cert);
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
+    WOLFSSL_MSG("    Freeing der CA");
     XFREE(der.buffer, cm->heap, DYNAMIC_TYPE_CA);
-    CYASSL_MSG("        OK Freeing der CA");
+    WOLFSSL_MSG("        OK Freeing der CA");
 
-    CYASSL_LEAVE("AddCA", ret);
-    if (ret == 0) return SSL_SUCCESS;
-    return ret;
+    WOLFSSL_LEAVE("AddCA", ret);
+
+    return ret == 0 ? SSL_SUCCESS : ret;
 }
 
 #endif /* !NO_CERTS */
@@ -1615,12 +2046,16 @@ int AddCA(CYASSL_CERT_MANAGER* cm, buffer der, int type, int verify)
     typedef struct SessionRow {
         int nextIdx;                           /* where to place next one   */
         int totalCount;                        /* sessions ever on this row */
-        CYASSL_SESSION Sessions[SESSIONS_PER_ROW];
+        WOLFSSL_SESSION Sessions[SESSIONS_PER_ROW];
     } SessionRow;
 
     static SessionRow SessionCache[SESSION_ROWS];
 
-    static CyaSSL_Mutex session_mutex;   /* SessionCache mutex */
+    #if defined(WOLFSSL_SESSION_STATS) && defined(WOLFSSL_PEAK_SESSIONS)
+        static word32 PeakSessions;
+    #endif
+
+    static wolfSSL_Mutex session_mutex;   /* SessionCache mutex */
 
     #ifndef NO_CLIENT_CACHE
 
@@ -1642,11 +2077,11 @@ int AddCA(CYASSL_CERT_MANAGER* cm, buffer der, int type, int verify)
 #endif /* NO_SESSION_CACHE */
 
 
-int CyaSSL_Init(void)
+int wolfSSL_Init(void)
 {
     int ret = SSL_SUCCESS;
 
-    CYASSL_ENTER("CyaSSL_Init");
+    WOLFSSL_ENTER("wolfSSL_Init");
 
     if (initRefCount == 0) {
 #ifndef NO_SESSION_CACHE
@@ -1658,7 +2093,7 @@ int CyaSSL_Init(void)
     }
     if (ret == SSL_SUCCESS) {
         if (LockMutex(&count_mutex) != 0) {
-            CYASSL_MSG("Bad Lock Mutex count");
+            WOLFSSL_MSG("Bad Lock Mutex count");
             return BAD_MUTEX_E;
         }
         initRefCount++;
@@ -1671,101 +2106,94 @@ int CyaSSL_Init(void)
 
 #ifndef NO_CERTS
 
-    /* Remove PEM header/footer, convert to ASN1, store any encrypted data
-       info->consumed tracks of PEM bytes consumed in case multiple parts */
-    int PemToDer(const unsigned char* buff, long longSz, int type,
-                      buffer* der, void* heap, EncryptedInfo* info, int* eccKey)
-    {
-        char  header[PEM_LINE_LEN];
-        char  footer[PEM_LINE_LEN];
-        char* headerEnd;
-        char* footerEnd;
-        char* consumedEnd;
-        char* bufferEnd = (char*)(buff + longSz);
-        long  neededSz;
-        int   ret      = 0;
-        int   pkcs8    = 0;
-        int   pkcs8Enc = 0;
-        int   dynamicType = 0;
-        int   sz = (int)longSz;
-
-        (void)heap;
-        (void)dynamicType;
-
-        if (type == CERT_TYPE || type == CA_TYPE)  {
-            XSTRNCPY(header, "-----BEGIN CERTIFICATE-----", sizeof(header));
-            XSTRNCPY(footer, "-----END CERTIFICATE-----", sizeof(footer));
-            dynamicType = (type == CA_TYPE) ? DYNAMIC_TYPE_CA :
-                                              DYNAMIC_TYPE_CERT;
-        } else if (type == CERTREQ_TYPE) {
-            XSTRNCPY(header, "-----BEGIN CERTIFICATE REQUEST-----",
-                     sizeof(header));
-            XSTRNCPY(footer, "-----END CERTIFICATE REQUEST-----",
-                     sizeof(footer));
-            dynamicType = DYNAMIC_TYPE_KEY;
-        } else if (type == DH_PARAM_TYPE) {
-            XSTRNCPY(header, "-----BEGIN DH PARAMETERS-----", sizeof(header));
-            XSTRNCPY(footer, "-----END DH PARAMETERS-----", sizeof(footer));
-            dynamicType = DYNAMIC_TYPE_KEY;
-        } else if (type == CRL_TYPE) {
-            XSTRNCPY(header, "-----BEGIN X509 CRL-----", sizeof(header));
-            XSTRNCPY(footer, "-----END X509 CRL-----", sizeof(footer));
-            dynamicType = DYNAMIC_TYPE_CRL;
-        } else {
-            XSTRNCPY(header, "-----BEGIN RSA PRIVATE KEY-----", sizeof(header));
-            XSTRNCPY(footer, "-----END RSA PRIVATE KEY-----", sizeof(footer));
-            dynamicType = DYNAMIC_TYPE_KEY;
-        }
+static const char* BEGIN_CERT         = "-----BEGIN CERTIFICATE-----";
+static const char* END_CERT           = "-----END CERTIFICATE-----";
+static const char* BEGIN_CERT_REQ     = "-----BEGIN CERTIFICATE REQUEST-----";
+static const char* END_CERT_REQ       = "-----END CERTIFICATE REQUEST-----";
+static const char* BEGIN_DH_PARAM     = "-----BEGIN DH PARAMETERS-----";
+static const char* END_DH_PARAM       = "-----END DH PARAMETERS-----";
+static const char* BEGIN_X509_CRL     = "-----BEGIN X509 CRL-----";
+static const char* END_X509_CRL       = "-----END X509 CRL-----";
+static const char* BEGIN_RSA_PRIV     = "-----BEGIN RSA PRIVATE KEY-----";
+static const char* END_RSA_PRIV       = "-----END RSA PRIVATE KEY-----";
+static const char* BEGIN_PRIV_KEY     = "-----BEGIN PRIVATE KEY-----";
+static const char* END_PRIV_KEY       = "-----END PRIVATE KEY-----";
+static const char* BEGIN_ENC_PRIV_KEY = "-----BEGIN ENCRYPTED PRIVATE KEY-----";
+static const char* END_ENC_PRIV_KEY   = "-----END ENCRYPTED PRIVATE KEY-----";
+static const char* BEGIN_EC_PRIV      = "-----BEGIN EC PRIVATE KEY-----";
+static const char* END_EC_PRIV        = "-----END EC PRIVATE KEY-----";
+static const char* BEGIN_DSA_PRIV     = "-----BEGIN DSA PRIVATE KEY-----";
+static const char* END_DSA_PRIV       = "-----END DSA PRIVATE KEY-----";
+
+/* Remove PEM header/footer, convert to ASN1, store any encrypted data
+   info->consumed tracks of PEM bytes consumed in case multiple parts */
+int PemToDer(const unsigned char* buff, long longSz, int type,
+                  buffer* der, void* heap, EncryptedInfo* info, int* eccKey)
+{
+    const char* header      = NULL;
+    const char* footer      = NULL;
+    char*       headerEnd;
+    char*       footerEnd;
+    char*       consumedEnd;
+    char*       bufferEnd   = (char*)(buff + longSz);
+    long        neededSz;
+    int         ret         = 0;
+    int         dynamicType = 0;
+    int         sz          = (int)longSz;
+
+    switch (type) {
+        case CA_TYPE:       /* same as below */
+        case CERT_TYPE:     header= BEGIN_CERT;     footer= END_CERT;     break;
+        case CRL_TYPE:      header= BEGIN_X509_CRL; footer= END_X509_CRL; break;
+        case DH_PARAM_TYPE: header= BEGIN_DH_PARAM; footer= END_DH_PARAM; break;
+        case CERTREQ_TYPE:  header= BEGIN_CERT_REQ; footer= END_CERT_REQ; break;
+        default:            header= BEGIN_RSA_PRIV; footer= END_RSA_PRIV; break;
+    }
+    
+    switch (type) {
+        case CA_TYPE:   dynamicType = DYNAMIC_TYPE_CA;   break;
+        case CERT_TYPE: dynamicType = DYNAMIC_TYPE_CERT; break;
+        case CRL_TYPE:  dynamicType = DYNAMIC_TYPE_CRL;  break;
+        default:        dynamicType = DYNAMIC_TYPE_KEY;  break;
+    }
 
-        /* find header */
+    /* find header */
+    for (;;) {
         headerEnd = XSTRNSTR((char*)buff, header, sz);
-        if (!headerEnd && type == PRIVATEKEY_TYPE) {  /* may be pkcs8 */
-            XSTRNCPY(header, "-----BEGIN PRIVATE KEY-----", sizeof(header));
-            XSTRNCPY(footer, "-----END PRIVATE KEY-----", sizeof(footer));
+        
+        if (headerEnd || type != PRIVATEKEY_TYPE) {
+            break;
+        } else if (header == BEGIN_RSA_PRIV) {
+                   header =  BEGIN_PRIV_KEY;       footer = END_PRIV_KEY;
+        } else if (header == BEGIN_PRIV_KEY) {
+                   header =  BEGIN_ENC_PRIV_KEY;   footer = END_ENC_PRIV_KEY;
+        } else if (header == BEGIN_ENC_PRIV_KEY) {
+                   header =  BEGIN_EC_PRIV;        footer = END_EC_PRIV;
+        } else if (header == BEGIN_EC_PRIV) {
+                   header =  BEGIN_DSA_PRIV;       footer = END_DSA_PRIV;
+        } else
+            break;
+    }
 
-            headerEnd = XSTRNSTR((char*)buff, header, sz);
-            if (headerEnd)
-                pkcs8 = 1;
-            else {
-                XSTRNCPY(header, "-----BEGIN ENCRYPTED PRIVATE KEY-----",
-                        sizeof(header));
-                XSTRNCPY(footer, "-----END ENCRYPTED PRIVATE KEY-----",
-                        sizeof(footer));
-
-                headerEnd = XSTRNSTR((char*)buff, header, sz);
-                if (headerEnd) {
-                    pkcs8Enc = 1;
-                    (void)pkcs8Enc;  /* only opensslextra will read */
-                }
-            }
-        }
-        if (!headerEnd && type == PRIVATEKEY_TYPE) {  /* may be ecc */
-            XSTRNCPY(header, "-----BEGIN EC PRIVATE KEY-----", sizeof(header));
-            XSTRNCPY(footer, "-----END EC PRIVATE KEY-----", sizeof(footer));
+    if (!headerEnd) {
+        WOLFSSL_MSG("Couldn't find PEM header");
+        return SSL_NO_PEM_HEADER;
+    }
 
-            headerEnd = XSTRNSTR((char*)buff, header, sz);
-            if (headerEnd)
-                *eccKey = 1;
-        }
-        if (!headerEnd && type == PRIVATEKEY_TYPE) {  /* may be dsa */
-            XSTRNCPY(header, "-----BEGIN DSA PRIVATE KEY-----", sizeof(header));
-            XSTRNCPY(footer, "-----END DSA PRIVATE KEY-----", sizeof(footer));
+    headerEnd += XSTRLEN(header);
 
-            headerEnd = XSTRNSTR((char*)buff, header, sz);
-        }
-        if (!headerEnd) {
-            CYASSL_MSG("Couldn't find PEM header");
-            return SSL_NO_PEM_HEADER;
-        }
-        headerEnd += XSTRLEN(header);
+    /* eat end of line */
+    if (headerEnd[0] == '\n')
+        headerEnd++;
+    else if (headerEnd[1] == '\n')
+        headerEnd += 2;
+    else
+        return SSL_BAD_FILE;
 
-        /* eat end of line */
-        if (headerEnd[0] == '\n')
-            headerEnd++;
-        else if (headerEnd[1] == '\n')
-            headerEnd += 2;
-        else
-            return SSL_BAD_FILE;
+    if (type == PRIVATEKEY_TYPE) {
+        if (eccKey)
+            *eccKey = header == BEGIN_EC_PRIV;      
+    }
 
 #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
     {
@@ -1811,440 +2239,544 @@ int CyaSSL_Init(void)
     }
 #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */
 
-        /* find footer */
-        footerEnd = XSTRNSTR((char*)buff, footer, sz);
-        if (!footerEnd) return SSL_BAD_FILE;
+    /* find footer */
+    footerEnd = XSTRNSTR((char*)buff, footer, sz);
+    if (!footerEnd)
+        return SSL_BAD_FILE;
 
-        consumedEnd = footerEnd + XSTRLEN(footer);
+    consumedEnd = footerEnd + XSTRLEN(footer);
 
-        if (consumedEnd < bufferEnd) {  /* handle no end of line on last line */
-            /* eat end of line */
-            if (consumedEnd[0] == '\n')
-                consumedEnd++;
-            else if (consumedEnd[1] == '\n')
-                consumedEnd += 2;
-            else
-                return SSL_BAD_FILE;
-        }
+    if (consumedEnd < bufferEnd) {  /* handle no end of line on last line */
+        /* eat end of line */
+        if (consumedEnd[0] == '\n')
+            consumedEnd++;
+        else if (consumedEnd[1] == '\n')
+            consumedEnd += 2;
+        else
+            return SSL_BAD_FILE;
+    }
 
-        if (info)
-            info->consumed = (long)(consumedEnd - (char*)buff);
+    if (info)
+        info->consumed = (long)(consumedEnd - (char*)buff);
 
-        /* set up der buffer */
-        neededSz = (long)(footerEnd - headerEnd);
-        if (neededSz > sz || neededSz < 0) return SSL_BAD_FILE;
-        der->buffer = (byte*) XMALLOC(neededSz, heap, dynamicType);
-        if (!der->buffer) return MEMORY_ERROR;
-        der->length = (word32)neededSz;
+    /* set up der buffer */
+    neededSz = (long)(footerEnd - headerEnd);
+    if (neededSz > sz || neededSz < 0)
+        return SSL_BAD_FILE;
 
-        if (Base64_Decode((byte*)headerEnd, (word32)neededSz, der->buffer,
-                          &der->length) < 0)
-            return SSL_BAD_FILE;
+    der->buffer = (byte*)XMALLOC(neededSz, heap, dynamicType);
+    if (!der->buffer)
+        return MEMORY_ERROR;
 
-        if (pkcs8) {
-            /* convert and adjust length */
-            if ( (ret = ToTraditional(der->buffer, der->length)) < 0 ) {
-                return ret;
-            } else {
-                der->length = ret;
-                return 0;
-            }
-        }
+    der->length = (word32)neededSz;
+
+    if (Base64_Decode((byte*)headerEnd, (word32)neededSz, der->buffer,
+                                                              &der->length) < 0)
+        return SSL_BAD_FILE;
+
+    if (header == BEGIN_PRIV_KEY) {
+        /* pkcs8 key, convert and adjust length */
+        if ((ret = ToTraditional(der->buffer, der->length)) < 0)
+            return ret;
+
+        der->length = ret;
+        return 0;
+    }
 
 #if (defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)) && !defined(NO_PWDBASED)
-         if (pkcs8Enc) {
-            int  passwordSz;
-            char password[80];
-
-            if (!info || !info->ctx || !info->ctx->passwd_cb)
-                return SSL_BAD_FILE;  /* no callback error */
-            passwordSz = info->ctx->passwd_cb(password, sizeof(password), 0,
-                                              info->ctx->userdata);
-            /* convert and adjust length */
-            if ( (ret = ToTraditionalEnc(der->buffer, der->length, password,
-                                         passwordSz)) < 0 ) {
-                return ret;
-            } else {
-                der->length = ret;
-                return 0;
-            }
-         }
-#endif
+    if (header == BEGIN_ENC_PRIV_KEY) {
+        int   passwordSz;
+    #ifdef WOLFSSL_SMALL_STACK
+        char* password = NULL;
+    #else
+        char  password[80];
+    #endif
+
+        if (!info || !info->ctx || !info->ctx->passwd_cb)
+            return SSL_BAD_FILE;  /* no callback error */
+
+    #ifdef WOLFSSL_SMALL_STACK
+        password = (char*)XMALLOC(80, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (password == NULL)
+            return MEMORY_E;
+    #endif
+        passwordSz = info->ctx->passwd_cb(password, sizeof(password), 0,
+                                                           info->ctx->userdata);
+        /* convert and adjust length */
+        ret = ToTraditionalEnc(der->buffer, der->length, password, passwordSz);
+
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(password, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+
+        if (ret < 0)
+            return ret;
 
+        der->length = ret;
         return 0;
     }
+#endif
 
+    return 0;
+}
 
-    /* process the buffer buff, legnth sz, into ctx of format and type
-       used tracks bytes consumed, userChain specifies a user cert chain
-       to pass during the handshake */
-    static int ProcessBuffer(CYASSL_CTX* ctx, const unsigned char* buff,
-                             long sz, int format, int type, CYASSL* ssl,
-                             long* used, int userChain)
-    {
-        EncryptedInfo info;
-        buffer        der;        /* holds DER or RAW (for NTRU) */
-        int           ret;
-        int           dynamicType = 0;
-        int           eccKey = 0;
-        int           rsaKey = 0;
-        void*         heap = ctx ? ctx->heap : NULL;
 
-        info.set      = 0;
-        info.ctx      = ctx;
-        info.consumed = 0;
-        der.buffer    = 0;
+/* process the buffer buff, legnth sz, into ctx of format and type
+   used tracks bytes consumed, userChain specifies a user cert chain
+   to pass during the handshake */
+static int ProcessBuffer(WOLFSSL_CTX* ctx, const unsigned char* buff,
+                         long sz, int format, int type, WOLFSSL* ssl,
+                         long* used, int userChain)
+{
+    buffer        der;        /* holds DER or RAW (for NTRU) */
+    int           ret;
+    int           dynamicType = 0;
+    int           eccKey = 0;
+    int           rsaKey = 0;
+    void*         heap = ctx ? ctx->heap : NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    EncryptedInfo* info = NULL;
+#else
+    EncryptedInfo  info[1];
+#endif
 
-        (void)dynamicType;
-        (void)rsaKey;
+    (void)dynamicType;
+    (void)rsaKey;
 
-        if (used)
-            *used = sz;     /* used bytes default to sz, PEM chain may shorten*/
+    if (used)
+        *used = sz;     /* used bytes default to sz, PEM chain may shorten*/
 
-        if (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM
-                                        && format != SSL_FILETYPE_RAW)
-            return SSL_BAD_FILETYPE;
+    if (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM
+                                    && format != SSL_FILETYPE_RAW)
+        return SSL_BAD_FILETYPE;
 
-        if (ctx == NULL && ssl == NULL)
-            return BAD_FUNC_ARG;
+    if (ctx == NULL && ssl == NULL)
+        return BAD_FUNC_ARG;
 
-        if (type == CA_TYPE)
-            dynamicType = DYNAMIC_TYPE_CA;
-        else if (type == CERT_TYPE)
-            dynamicType = DYNAMIC_TYPE_CERT;
-        else
-            dynamicType = DYNAMIC_TYPE_KEY;
+    if (type == CA_TYPE)
+        dynamicType = DYNAMIC_TYPE_CA;
+    else if (type == CERT_TYPE)
+        dynamicType = DYNAMIC_TYPE_CERT;
+    else
+        dynamicType = DYNAMIC_TYPE_KEY;
 
-        if (format == SSL_FILETYPE_PEM) {
-            ret = PemToDer(buff, sz, type, &der, heap, &info, &eccKey);
-            if (ret < 0) {
-                XFREE(der.buffer, heap, dynamicType);
-                return ret;
-            }
-            if (used)
-                *used = info.consumed;
-            /* we may have a user cert chain, try to consume */
-            if (userChain && type == CERT_TYPE && info.consumed < sz) {
-                byte   staticBuffer[FILE_BUFFER_SIZE];  /* tmp chain buffer */
-                byte*  chainBuffer = staticBuffer;
-                byte*  shrinked    = NULL;   /* shrinked to size chainBuffer
-                                              * or staticBuffer */
-                int    dynamicBuffer = 0;
-                word32 bufferSz = sizeof(staticBuffer);
-                long   consumed = info.consumed;
-                word32 idx = 0;
-                int    gotOne = 0;
-
-                if ( (sz - consumed) > (int)bufferSz) {
-                    CYASSL_MSG("Growing Tmp Chain Buffer");
-                    bufferSz = (word32)(sz - consumed);
-                               /* will shrink to actual size */
-                    chainBuffer = (byte*)XMALLOC(bufferSz, heap,
-                                                 DYNAMIC_TYPE_FILE);
-                    if (chainBuffer == NULL) {
-                        XFREE(der.buffer, heap, dynamicType);
-                        return MEMORY_E;
-                    }
-                    dynamicBuffer = 1;
-                }
+#ifdef WOLFSSL_SMALL_STACK
+    info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (info == NULL)
+        return MEMORY_E;
+#endif
 
-                CYASSL_MSG("Processing Cert Chain");
-                while (consumed < sz) {
-                    buffer part;
-                    info.consumed = 0;
-                    part.buffer = 0;
-
-                    ret = PemToDer(buff + consumed, sz - consumed, type, &part,
-                                   heap, &info, &eccKey);
-                    if (ret == 0) {
-                        gotOne = 1;
-                        if ( (idx + part.length) > bufferSz) {
-                            CYASSL_MSG("   Cert Chain bigger than buffer");
-                            ret = BUFFER_E;
-                        }
-                        else {
-                            c32to24(part.length, &chainBuffer[idx]);
-                            idx += CERT_HEADER_SZ;
-                            XMEMCPY(&chainBuffer[idx], part.buffer,part.length);
-                            idx += part.length;
-                            consumed  += info.consumed;
-                            if (used)
-                                *used += info.consumed;
-                        }
-                    }
+    info->set      = 0;
+    info->ctx      = ctx;
+    info->consumed = 0;
+    der.buffer     = 0;
 
-                    XFREE(part.buffer, heap, dynamicType);
+    if (format == SSL_FILETYPE_PEM) {
+        ret = PemToDer(buff, sz, type, &der, heap, info, &eccKey);
+        if (ret < 0) {
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
+            XFREE(der.buffer, heap, dynamicType);
+            return ret;
+        }
 
-                    if (ret == SSL_NO_PEM_HEADER && gotOne) {
-                        CYASSL_MSG("We got one good PEM so stuff at end ok");
-                        break;
-                    }
+        if (used)
+            *used = info->consumed;
 
-                    if (ret < 0) {
-                        CYASSL_MSG("   Error in Cert in Chain");
-                        if (dynamicBuffer)
-                            XFREE(chainBuffer, heap, DYNAMIC_TYPE_FILE);
-                        XFREE(der.buffer, heap, dynamicType);
-                        return ret;
-                    }
-                    CYASSL_MSG("   Consumed another Cert in Chain");
-                }
-                CYASSL_MSG("Finished Processing Cert Chain");
-
-                /* only retain actual size used */
-                shrinked = (byte*)XMALLOC(idx, heap, dynamicType);
-                if (shrinked) {
-                    if (ssl) {
-                        if (ssl->buffers.certChain.buffer &&
-                                         ssl->buffers.weOwnCertChain) {
-                            XFREE(ssl->buffers.certChain.buffer, heap,
-                                  dynamicType);
-                        }
-                        ssl->buffers.certChain.buffer = shrinked;
-                        ssl->buffers.certChain.length = idx;
-                        XMEMCPY(ssl->buffers.certChain.buffer, chainBuffer,idx);
-                        ssl->buffers.weOwnCertChain = 1;
-                    } else if (ctx) {
-                        if (ctx->certChain.buffer)
-                            XFREE(ctx->certChain.buffer, heap, dynamicType);
-                        ctx->certChain.buffer = shrinked;
-                        ctx->certChain.length = idx;
-                        XMEMCPY(ctx->certChain.buffer, chainBuffer, idx);
-                    }
-                }
-                if (dynamicBuffer)
-                    XFREE(chainBuffer, heap, DYNAMIC_TYPE_FILE);
-                if (shrinked == NULL) {
+        /* we may have a user cert chain, try to consume */
+        if (userChain && type == CERT_TYPE && info->consumed < sz) {
+        #ifdef WOLFSSL_SMALL_STACK
+            byte   staticBuffer[1];                 /* force heap usage */
+        #else
+            byte   staticBuffer[FILE_BUFFER_SIZE];  /* tmp chain buffer */
+        #endif
+            byte*  chainBuffer = staticBuffer;
+            byte*  shrinked    = NULL;   /* shrinked to size chainBuffer
+                                          * or staticBuffer */
+            int    dynamicBuffer = 0;
+            word32 bufferSz = sizeof(staticBuffer);
+            long   consumed = info->consumed;
+            word32 idx = 0;
+            int    gotOne = 0;
+
+            if ( (sz - consumed) > (int)bufferSz) {
+                WOLFSSL_MSG("Growing Tmp Chain Buffer");
+                bufferSz = (word32)(sz - consumed);
+                           /* will shrink to actual size */
+                chainBuffer = (byte*)XMALLOC(bufferSz, heap, DYNAMIC_TYPE_FILE);
+                if (chainBuffer == NULL) {
+                #ifdef WOLFSSL_SMALL_STACK
+                    XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+                #endif
                     XFREE(der.buffer, heap, dynamicType);
                     return MEMORY_E;
                 }
+                dynamicBuffer = 1;
             }
-        }
-        else {  /* ASN1 (DER) or RAW (NTRU) */
-            der.buffer = (byte*) XMALLOC(sz, heap, dynamicType);
-            if (!der.buffer) return MEMORY_ERROR;
-            XMEMCPY(der.buffer, buff, sz);
-            der.length = (word32)sz;
-        }
 
-#if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
-        if (info.set) {
-            /* decrypt */
-            char password[80];
-            int  passwordSz;
+            WOLFSSL_MSG("Processing Cert Chain");
+            while (consumed < sz) {
+                buffer part;
+                info->consumed = 0;
+                part.buffer = 0;
+
+                ret = PemToDer(buff + consumed, sz - consumed, type, &part,
+                                                           heap, info, &eccKey);
+                if (ret == 0) {
+                    gotOne = 1;
+                    if ( (idx + part.length) > bufferSz) {
+                        WOLFSSL_MSG("   Cert Chain bigger than buffer");
+                        ret = BUFFER_E;
+                    }
+                    else {
+                        c32to24(part.length, &chainBuffer[idx]);
+                        idx += CERT_HEADER_SZ;
+                        XMEMCPY(&chainBuffer[idx], part.buffer,part.length);
+                        idx += part.length;
+                        consumed  += info->consumed;
+                        if (used)
+                            *used += info->consumed;
+                    }
+                }
 
-            byte key[AES_256_KEY_SIZE];
-            byte  iv[AES_IV_SIZE];
+                XFREE(part.buffer, heap, dynamicType);
 
-            if (!ctx || !ctx->passwd_cb) {
-                XFREE(der.buffer, heap, dynamicType);
-                return NO_PASSWORD;
-            }
+                if (ret == SSL_NO_PEM_HEADER && gotOne) {
+                    WOLFSSL_MSG("We got one good PEM so stuff at end ok");
+                    break;
+                }
 
-            /* use file's salt for key derivation, hex decode first */
-            if (Base16_Decode(info.iv, info.ivSz, info.iv, &info.ivSz) != 0) {
-                XFREE(der.buffer, heap, dynamicType);
-                return ASN_INPUT_E;
+                if (ret < 0) {
+                    WOLFSSL_MSG("   Error in Cert in Chain");
+                    if (dynamicBuffer)
+                        XFREE(chainBuffer, heap, DYNAMIC_TYPE_FILE);
+                #ifdef WOLFSSL_SMALL_STACK
+                    XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+                #endif
+                    XFREE(der.buffer, heap, dynamicType);
+                    return ret;
+                }
+                WOLFSSL_MSG("   Consumed another Cert in Chain");
+            }
+            WOLFSSL_MSG("Finished Processing Cert Chain");
+
+            /* only retain actual size used */
+            shrinked = (byte*)XMALLOC(idx, heap, dynamicType);
+            if (shrinked) {
+                if (ssl) {
+                    if (ssl->buffers.certChain.buffer &&
+                                                  ssl->buffers.weOwnCertChain) {
+                        XFREE(ssl->buffers.certChain.buffer, heap,
+                              dynamicType);
+                    }
+                    ssl->buffers.certChain.buffer = shrinked;
+                    ssl->buffers.certChain.length = idx;
+                    XMEMCPY(ssl->buffers.certChain.buffer, chainBuffer,idx);
+                    ssl->buffers.weOwnCertChain = 1;
+                } else if (ctx) {
+                    if (ctx->certChain.buffer)
+                        XFREE(ctx->certChain.buffer, heap, dynamicType);
+                    ctx->certChain.buffer = shrinked;
+                    ctx->certChain.length = idx;
+                    XMEMCPY(ctx->certChain.buffer, chainBuffer, idx);
+                }
             }
 
-            passwordSz = ctx->passwd_cb(password, sizeof(password), 0,
-                                    ctx->userdata);
-            if ( (ret = EVP_BytesToKey(info.name, "MD5", info.iv,
-                            (byte*)password, passwordSz, 1, key, iv)) <= 0) {
+            if (dynamicBuffer)
+                XFREE(chainBuffer, heap, DYNAMIC_TYPE_FILE);
+
+            if (shrinked == NULL) {
+            #ifdef WOLFSSL_SMALL_STACK
+                XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            #endif
                 XFREE(der.buffer, heap, dynamicType);
-                return ret;
+                return MEMORY_E;
             }
+        }
+    }
+    else {  /* ASN1 (DER) or RAW (NTRU) */
+        der.buffer = (byte*) XMALLOC(sz, heap, dynamicType);
+        if (!der.buffer) {
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
+            return MEMORY_ERROR;
+        }
 
-            if (XSTRNCMP(info.name, "DES-CBC", 7) == 0) {
-                Des enc;
+        XMEMCPY(der.buffer, buff, sz);
+        der.length = (word32)sz;
+    }
 
-                ret = Des_SetKey(&enc, key, info.iv, DES_DECRYPTION);
-                if (ret != 0)
-                    return ret;
+#if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
+    if (info->set) {
+        /* decrypt */
+        int   passwordSz;
+#ifdef WOLFSSL_SMALL_STACK
+        char* password = NULL;
+        byte* key      = NULL;
+        byte* iv       = NULL;
+#else
+        char  password[80];
+        byte  key[AES_256_KEY_SIZE];
+        #ifndef NO_MD5
+        byte  iv[AES_IV_SIZE];
+        #endif
+#endif
 
-                Des_CbcDecrypt(&enc, der.buffer, der.buffer, der.length);
-            }
-            else if (XSTRNCMP(info.name, "DES-EDE3-CBC", 13) == 0) {
-                Des3 enc;
+    #ifdef WOLFSSL_SMALL_STACK
+        password = (char*)XMALLOC(80, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        key      = (byte*)XMALLOC(AES_256_KEY_SIZE, NULL,
+                                                   DYNAMIC_TYPE_TMP_BUFFER);
+        iv       = (byte*)XMALLOC(AES_IV_SIZE, NULL, 
+                                                   DYNAMIC_TYPE_TMP_BUFFER);
 
-                ret = Des3_SetKey(&enc, key, info.iv, DES_DECRYPTION);
-                if (ret != 0)
-                    return ret;
+        if (password == NULL || key == NULL || iv == NULL) {
+            XFREE(password, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            XFREE(key,      NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            XFREE(iv,       NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            ret = MEMORY_E;
+        }
+        else
+    #endif
+        if (!ctx || !ctx->passwd_cb) {
+            ret = NO_PASSWORD;
+        }
+        else {
+            passwordSz = ctx->passwd_cb(password, sizeof(password), 0,
+                                                             ctx->userdata);
 
-                ret = Des3_CbcDecrypt(&enc, der.buffer, der.buffer, der.length);
-                if (ret != 0)
-                    return ret;
+            /* use file's salt for key derivation, hex decode first */
+            if (Base16_Decode(info->iv, info->ivSz, info->iv, &info->ivSz)
+                                                                         != 0) {
+                ret = ASN_INPUT_E;
+            }
+#ifndef NO_MD5
+            else if ((ret = EVP_BytesToKey(info->name, "MD5", info->iv,
+                           (byte*)password, passwordSz, 1, key, iv)) <= 0) {
+                /* empty */
+            }
+#endif
+#ifndef NO_DES3
+            else if (XSTRNCMP(info->name, "DES-CBC", 7) == 0) {
+                ret = wc_Des_CbcDecryptWithKey(der.buffer, der.buffer, der.length,
+                                                                 key, info->iv);
             }
-            else if (XSTRNCMP(info.name, "AES-128-CBC", 13) == 0) {
-                Aes enc;
-                ret = AesSetKey(&enc, key, AES_128_KEY_SIZE, info.iv,
-                                AES_DECRYPTION);
-                if (ret == 0)
-                    ret = AesCbcDecrypt(&enc, der.buffer,der.buffer,der.length);
+            else if (XSTRNCMP(info->name, "DES-EDE3-CBC", 13) == 0) {
+                ret = wc_Des3_CbcDecryptWithKey(der.buffer, der.buffer, der.length,
+                                                                 key, info->iv);
             }
-            else if (XSTRNCMP(info.name, "AES-192-CBC", 13) == 0) {
-                Aes enc;
-                ret = AesSetKey(&enc, key, AES_192_KEY_SIZE, info.iv,
-                                AES_DECRYPTION);
-                if (ret == 0)
-                    ret = AesCbcDecrypt(&enc, der.buffer,der.buffer,der.length);
+#endif
+#ifndef NO_AES
+            else if (XSTRNCMP(info->name, "AES-128-CBC", 13) == 0) {
+                ret = wc_AesCbcDecryptWithKey(der.buffer, der.buffer, der.length,
+                                               key, AES_128_KEY_SIZE, info->iv);
+            }
+            else if (XSTRNCMP(info->name, "AES-192-CBC", 13) == 0) {
+                ret = wc_AesCbcDecryptWithKey(der.buffer, der.buffer, der.length,
+                                               key, AES_192_KEY_SIZE, info->iv);
             }
-            else if (XSTRNCMP(info.name, "AES-256-CBC", 13) == 0) {
-                Aes enc;
-                ret = AesSetKey(&enc, key, AES_256_KEY_SIZE, info.iv,
-                                AES_DECRYPTION);
-                if (ret == 0)
-                    ret = AesCbcDecrypt(&enc, der.buffer,der.buffer,der.length);
+            else if (XSTRNCMP(info->name, "AES-256-CBC", 13) == 0) {
+                ret = wc_AesCbcDecryptWithKey(der.buffer, der.buffer, der.length,
+                                               key, AES_256_KEY_SIZE, info->iv);
             }
+#endif
             else {
-                XFREE(der.buffer, heap, dynamicType);
-                return SSL_BAD_FILE;
+                ret = SSL_BAD_FILE;
             }
+        }
 
-            if (ret != 0) {
-                XFREE(der.buffer, heap, dynamicType);
-                return ret;
-            }
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(password, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(key,      NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(iv,       NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+
+        if (ret != 0) {
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
+            XFREE(der.buffer, heap, dynamicType);
+            return ret;
         }
+    }
 #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */
 
-        if (type == CA_TYPE) {
-            if (ctx == NULL) {
-                CYASSL_MSG("Need context for CA load");
-                XFREE(der.buffer, heap, dynamicType);
-                return BAD_FUNC_ARG;
-            }
-            return AddCA(ctx->cm, der, CYASSL_USER_CA, ctx->verifyPeer);
-                                                          /* takes der over */
-        }
-        else if (type == CERT_TYPE) {
-            if (ssl) {
-                if (ssl->buffers.weOwnCert && ssl->buffers.certificate.buffer)
-                    XFREE(ssl->buffers.certificate.buffer, heap,
-                          dynamicType);
-                ssl->buffers.certificate = der;
-                ssl->buffers.weOwnCert = 1;
-            }
-            else if (ctx) {
-                if (ctx->certificate.buffer)
-                    XFREE(ctx->certificate.buffer, heap, dynamicType);
-                ctx->certificate = der;     /* takes der over */
-            }
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
+
+    if (type == CA_TYPE) {
+        if (ctx == NULL) {
+            WOLFSSL_MSG("Need context for CA load");
+            XFREE(der.buffer, heap, dynamicType);
+            return BAD_FUNC_ARG;
         }
-        else if (type == PRIVATEKEY_TYPE) {
-            if (ssl) {
-                if (ssl->buffers.weOwnKey && ssl->buffers.key.buffer)
-                    XFREE(ssl->buffers.key.buffer, heap, dynamicType);
-                ssl->buffers.key = der;
-                ssl->buffers.weOwnKey = 1;
-            }
-            else if (ctx) {
-                if (ctx->privateKey.buffer)
-                    XFREE(ctx->privateKey.buffer, heap, dynamicType);
-                ctx->privateKey = der;      /* takes der over */
-            }
+        return AddCA(ctx->cm, der, WOLFSSL_USER_CA, ctx->verifyPeer);
+                                                      /* takes der over */
+    }
+    else if (type == CERT_TYPE) {
+        if (ssl) {
+            if (ssl->buffers.weOwnCert && ssl->buffers.certificate.buffer)
+                XFREE(ssl->buffers.certificate.buffer, heap, dynamicType);
+            ssl->buffers.certificate = der;
+            ssl->buffers.weOwnCert = 1;
         }
-        else {
-            XFREE(der.buffer, heap, dynamicType);
-            return SSL_BAD_CERTTYPE;
+        else if (ctx) {
+            if (ctx->certificate.buffer)
+                XFREE(ctx->certificate.buffer, heap, dynamicType);
+            ctx->certificate = der;     /* takes der over */
+        }
+    }
+    else if (type == PRIVATEKEY_TYPE) {
+        if (ssl) {
+            if (ssl->buffers.weOwnKey && ssl->buffers.key.buffer)
+                XFREE(ssl->buffers.key.buffer, heap, dynamicType);
+            ssl->buffers.key = der;
+            ssl->buffers.weOwnKey = 1;
+        }
+        else if (ctx) {
+            if (ctx->privateKey.buffer)
+                XFREE(ctx->privateKey.buffer, heap, dynamicType);
+            ctx->privateKey = der;      /* takes der over */
         }
+    }
+    else {
+        XFREE(der.buffer, heap, dynamicType);
+        return SSL_BAD_CERTTYPE;
+    }
 
-        if (type == PRIVATEKEY_TYPE && format != SSL_FILETYPE_RAW) {
-#ifndef NO_RSA
-            if (!eccKey) {
-                /* make sure RSA key can be used */
-                RsaKey key;
-                word32 idx = 0;
-
-                ret = InitRsaKey(&key, 0);
-                if (ret != 0) return ret;
-                if (RsaPrivateKeyDecode(der.buffer,&idx,&key,der.length) != 0) {
-#ifdef HAVE_ECC
+    if (type == PRIVATEKEY_TYPE && format != SSL_FILETYPE_RAW) {
+    #ifndef NO_RSA
+        if (!eccKey) {
+            /* make sure RSA key can be used */
+            word32 idx = 0;
+        #ifdef WOLFSSL_SMALL_STACK
+            RsaKey* key = NULL;
+        #else
+            RsaKey  key[1];
+        #endif
+
+        #ifdef WOLFSSL_SMALL_STACK
+            key = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+            if (key == NULL)
+                return MEMORY_E;
+        #endif
+
+            ret = wc_InitRsaKey(key, 0);
+            if (ret == 0) {
+                if (wc_RsaPrivateKeyDecode(der.buffer, &idx, key, der.length) !=
+                                                                            0) {
+                #ifdef HAVE_ECC
                     /* could have DER ECC (or pkcs8 ecc), no easy way to tell */
                     eccKey = 1;  /* so try it out */
-#endif
-                    if (!eccKey) {
-                        FreeRsaKey(&key);
-                        return SSL_BAD_FILE;
-                    }
+                #endif
+                    if (!eccKey)
+                        ret = SSL_BAD_FILE;
                 } else {
                     rsaKey = 1;
                     (void)rsaKey;  /* for no ecc builds */
                 }
-                FreeRsaKey(&key);
-            }
-#endif
-#ifdef HAVE_ECC
-            if (!rsaKey) {
-                /* make sure ECC key can be used */
-                word32  idx = 0;
-                ecc_key key;
-
-                ecc_init(&key);
-                if (EccPrivateKeyDecode(der.buffer,&idx,&key,der.length) != 0) {
-                    ecc_free(&key);
-                    return SSL_BAD_FILE;
-                }
-                ecc_free(&key);
-                eccKey = 1;
-                if (ctx)
-                    ctx->haveStaticECC = 1;
-                if (ssl)
-                    ssl->options.haveStaticECC = 1;
             }
-#endif /* HAVE_ECC */
-        }
-        else if (type == CERT_TYPE) {
-            DecodedCert cert;
 
-            CYASSL_MSG("Checking cert signature type");
-            InitDecodedCert(&cert, der.buffer, der.length, heap);
+            wc_FreeRsaKey(key);
+
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(key, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
 
-            if (DecodeToKey(&cert, 0) < 0) {
-                CYASSL_MSG("Decode to key failed");
+            if (ret != 0)
+                return ret;
+        }
+    #endif
+    #ifdef HAVE_ECC
+        if (!rsaKey) {
+            /* make sure ECC key can be used */
+            word32  idx = 0;
+            ecc_key key;
+
+            wc_ecc_init(&key);
+            if (wc_EccPrivateKeyDecode(der.buffer,&idx,&key,der.length) != 0) {
+                wc_ecc_free(&key);
                 return SSL_BAD_FILE;
             }
-            switch (cert.signatureOID) {
-                case CTC_SHAwECDSA:
-                case CTC_SHA256wECDSA:
-                case CTC_SHA384wECDSA:
-                case CTC_SHA512wECDSA:
-                    CYASSL_MSG("ECDSA cert signature");
-                    if (ctx)
-                        ctx->haveECDSAsig = 1;
-                    if (ssl)
-                        ssl->options.haveECDSAsig = 1;
-                    break;
-                default:
-                    CYASSL_MSG("Not ECDSA cert signature");
-                    break;
-            }
-
-#ifdef HAVE_ECC
+            wc_ecc_free(&key);
+            eccKey = 1;
             if (ctx)
-                ctx->pkCurveOID = cert.pkCurveOID;
+                ctx->haveStaticECC = 1;
             if (ssl)
-                ssl->pkCurveOID = cert.pkCurveOID;
-#endif
-
-            FreeDecodedCert(&cert);
+                ssl->options.haveStaticECC = 1;
         }
-
-        return SSL_SUCCESS;
+    #endif /* HAVE_ECC */
     }
+    else if (type == CERT_TYPE) {
+    #ifdef WOLFSSL_SMALL_STACK
+        DecodedCert* cert = NULL;
+    #else
+        DecodedCert  cert[1];
+    #endif
 
+    #ifdef WOLFSSL_SMALL_STACK
+        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (cert == NULL)
+            return MEMORY_E;
+    #endif
 
+        WOLFSSL_MSG("Checking cert signature type");
+        InitDecodedCert(cert, der.buffer, der.length, heap);
 
+        if (DecodeToKey(cert, 0) < 0) {
+            WOLFSSL_MSG("Decode to key failed");
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
+            return SSL_BAD_FILE;
+        }
+        switch (cert->signatureOID) {
+            case CTC_SHAwECDSA:
+            case CTC_SHA256wECDSA:
+            case CTC_SHA384wECDSA:
+            case CTC_SHA512wECDSA:
+                WOLFSSL_MSG("ECDSA cert signature");
+                if (ctx)
+                    ctx->haveECDSAsig = 1;
+                if (ssl)
+                    ssl->options.haveECDSAsig = 1;
+                break;
+            default:
+                WOLFSSL_MSG("Not ECDSA cert signature");
+                break;
+        }
 
-/* CA PEM file for verification, may have multiple/chain certs to process */
-static int ProcessChainBuffer(CYASSL_CTX* ctx, const unsigned char* buff,
-                            long sz, int format, int type, CYASSL* ssl)
+    #ifdef HAVE_ECC
+        if (ctx)
+            ctx->pkCurveOID = cert->pkCurveOID;
+        if (ssl)
+            ssl->pkCurveOID = cert->pkCurveOID;
+    #endif
+
+        FreeDecodedCert(cert);
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+    }
+
+    return SSL_SUCCESS;
+}
+
+
+/* CA PEM file for verification, may have multiple/chain certs to process */
+static int ProcessChainBuffer(WOLFSSL_CTX* ctx, const unsigned char* buff,
+                            long sz, int format, int type, WOLFSSL* ssl)
 {
     long used   = 0;
     int  ret    = 0;
     int  gotOne = 0;
 
-    CYASSL_MSG("Processing CA PEM file");
+    WOLFSSL_MSG("Processing CA PEM file");
     while (used < sz) {
         long consumed = 0;
 
@@ -2252,7 +2784,7 @@ static int ProcessChainBuffer(CYASSL_CTX* ctx, const unsigned char* buff,
                             &consumed, 0);
 
         if (ret == SSL_NO_PEM_HEADER && gotOne) {
-            CYASSL_MSG("We got one good PEM file so stuff at end ok");
+            WOLFSSL_MSG("We got one good PEM file so stuff at end ok");
             ret = SSL_SUCCESS;
             break;
         }
@@ -2260,7 +2792,7 @@ static int ProcessChainBuffer(CYASSL_CTX* ctx, const unsigned char* buff,
         if (ret < 0)
             break;
 
-        CYASSL_MSG("   Processed a CA");
+        WOLFSSL_MSG("   Processed a CA");
         gotOne = 1;
         used += consumed;
     }
@@ -2270,84 +2802,119 @@ static int ProcessChainBuffer(CYASSL_CTX* ctx, const unsigned char* buff,
 
 
 /* Verify the ceritficate, SSL_SUCCESS for ok, < 0 for error */
-int CyaSSL_CertManagerVerifyBuffer(CYASSL_CERT_MANAGER* cm, const byte* buff,
+int wolfSSL_CertManagerVerifyBuffer(WOLFSSL_CERT_MANAGER* cm, const byte* buff,
                                    long sz, int format)
 {
     int ret = 0;
-    int eccKey = 0;  /* not used */
+    buffer der;
+#ifdef WOLFSSL_SMALL_STACK
+    DecodedCert* cert = NULL;
+#else
+    DecodedCert  cert[1];
+#endif
 
-    DecodedCert cert;
-    buffer      der;
+    WOLFSSL_ENTER("wolfSSL_CertManagerVerifyBuffer");
 
-    CYASSL_ENTER("CyaSSL_CertManagerVerifyBuffer");
+#ifdef WOLFSSL_SMALL_STACK
+    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (cert == NULL)
+        return MEMORY_E;
+#endif
 
     der.buffer = NULL;
     der.length = 0;
 
     if (format == SSL_FILETYPE_PEM) {
-        EncryptedInfo info;
+        int eccKey = 0; /* not used */
+    #ifdef WOLFSSL_SMALL_STACK
+        EncryptedInfo* info = NULL;
+    #else
+        EncryptedInfo  info[1];
+    #endif
+
+    #ifdef WOLFSSL_SMALL_STACK
+        info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (info == NULL) {
+            XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            return MEMORY_E;
+        }
+    #endif
 
-        info.set      = 0;
-        info.ctx      = NULL;
-        info.consumed = 0;
-        ret = PemToDer(buff, sz, CERT_TYPE, &der, cm->heap, &info, &eccKey);
-        InitDecodedCert(&cert, der.buffer, der.length, cm->heap);
+        info->set      = 0;
+        info->ctx      = NULL;
+        info->consumed = 0;
+
+        ret = PemToDer(buff, sz, CERT_TYPE, &der, cm->heap, info, &eccKey);
+
+        if (ret == 0)
+            InitDecodedCert(cert, der.buffer, der.length, cm->heap);
+
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
     }
     else
-        InitDecodedCert(&cert, (byte*)buff, (word32)sz, cm->heap);
+        InitDecodedCert(cert, (byte*)buff, (word32)sz, cm->heap);
 
     if (ret == 0)
-        ret = ParseCertRelative(&cert, CERT_TYPE, 1, cm);
+        ret = ParseCertRelative(cert, CERT_TYPE, 1, cm);
+
 #ifdef HAVE_CRL
     if (ret == 0 && cm->crlEnabled)
-        ret = CheckCertCRL(cm->crl, &cert);
+        ret = CheckCertCRL(cm->crl, cert);
 #endif
 
-    FreeDecodedCert(&cert);
+    FreeDecodedCert(cert);
+
     XFREE(der.buffer, cm->heap, DYNAMIC_TYPE_CERT);
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-    if (ret == 0)
-        return SSL_SUCCESS;
-    return ret;
+    return ret == 0 ? SSL_SUCCESS : ret;
 }
 
 
 /* turn on OCSP if off and compiled in, set options */
-int CyaSSL_CertManagerEnableOCSP(CYASSL_CERT_MANAGER* cm, int options)
+int wolfSSL_CertManagerEnableOCSP(WOLFSSL_CERT_MANAGER* cm, int options)
 {
     int ret = SSL_SUCCESS;
 
     (void)options;
 
-    CYASSL_ENTER("CyaSSL_CertManagerEnableOCSP");
+    WOLFSSL_ENTER("wolfSSL_CertManagerEnableOCSP");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
     #ifdef HAVE_OCSP
         if (cm->ocsp == NULL) {
-            cm->ocsp = (CYASSL_OCSP*)XMALLOC(sizeof(CYASSL_OCSP), cm->heap,
+            cm->ocsp = (WOLFSSL_OCSP*)XMALLOC(sizeof(WOLFSSL_OCSP), cm->heap,
                                                              DYNAMIC_TYPE_OCSP);
             if (cm->ocsp == NULL)
                 return MEMORY_E;
 
             if (InitOCSP(cm->ocsp, cm) != 0) {
-                CYASSL_MSG("Init OCSP failed");
+                WOLFSSL_MSG("Init OCSP failed");
                 FreeOCSP(cm->ocsp, 1);
                 cm->ocsp = NULL;
                 return SSL_FAILURE;
             }
         }
         cm->ocspEnabled = 1;
-        if (options & CYASSL_OCSP_URL_OVERRIDE)
+        if (options & WOLFSSL_OCSP_URL_OVERRIDE)
             cm->ocspUseOverrideURL = 1;
-        if (options & CYASSL_OCSP_NO_NONCE)
+        if (options & WOLFSSL_OCSP_NO_NONCE)
             cm->ocspSendNonce = 0;
         else
             cm->ocspSendNonce = 1;
-        #ifndef CYASSL_USER_IO
+        if (options & WOLFSSL_OCSP_CHECKALL)
+            cm->ocspCheckAll = 1;
+        #ifndef WOLFSSL_USER_IO
             cm->ocspIOCb = EmbedOcspLookup;
             cm->ocspRespFreeCb = EmbedOcspRespFree;
-        #endif /* CYASSL_USER_IO */
+        #endif /* WOLFSSL_USER_IO */
     #else
         ret = NOT_COMPILED_IN;
     #endif
@@ -2356,9 +2923,9 @@ int CyaSSL_CertManagerEnableOCSP(CYASSL_CERT_MANAGER* cm, int options)
 }
 
 
-int CyaSSL_CertManagerDisableOCSP(CYASSL_CERT_MANAGER* cm)
+int wolfSSL_CertManagerDisableOCSP(WOLFSSL_CERT_MANAGER* cm)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerDisableOCSP");
+    WOLFSSL_ENTER("wolfSSL_CertManagerDisableOCSP");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
@@ -2372,12 +2939,16 @@ int CyaSSL_CertManagerDisableOCSP(CYASSL_CERT_MANAGER* cm)
 
 
 /* check CRL if enabled, SSL_SUCCESS  */
-int CyaSSL_CertManagerCheckOCSP(CYASSL_CERT_MANAGER* cm, byte* der, int sz)
+int wolfSSL_CertManagerCheckOCSP(WOLFSSL_CERT_MANAGER* cm, byte* der, int sz)
 {
-    int         ret;
-    DecodedCert cert;
+    int ret;
+#ifdef WOLFSSL_SMALL_STACK
+    DecodedCert* cert = NULL;
+#else
+    DecodedCert  cert[1];
+#endif
 
-    CYASSL_ENTER("CyaSSL_CertManagerCheckOCSP");
+    WOLFSSL_ENTER("wolfSSL_CertManagerCheckOCSP");
 
     if (cm == NULL)
         return BAD_FUNC_ARG;
@@ -2385,33 +2956,35 @@ int CyaSSL_CertManagerCheckOCSP(CYASSL_CERT_MANAGER* cm, byte* der, int sz)
     if (cm->ocspEnabled == 0)
         return SSL_SUCCESS;
 
-    InitDecodedCert(&cert, der, sz, NULL);
+#ifdef WOLFSSL_SMALL_STACK
+    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (cert == NULL)
+        return MEMORY_E;
+#endif
+
+    InitDecodedCert(cert, der, sz, NULL);
 
-    ret = ParseCertRelative(&cert, CERT_TYPE, NO_VERIFY, cm);
-    if (ret != 0) {
-        CYASSL_MSG("ParseCert failed");
-        return ret;
+    if ((ret = ParseCertRelative(cert, CERT_TYPE, NO_VERIFY, cm)) != 0) {
+        WOLFSSL_MSG("ParseCert failed");
     }
-    else {
-        ret = CheckCertOCSP(cm->ocsp, &cert);
-        if (ret != 0) {
-            CYASSL_MSG("CheckCertOCSP failed");
-        }
+    else if ((ret = CheckCertOCSP(cm->ocsp, cert)) != 0) {
+        WOLFSSL_MSG("CheckCertOCSP failed");
     }
 
-    FreeDecodedCert(&cert);
-
-    if (ret == 0)
-        return SSL_SUCCESS;  /* convert */
+    FreeDecodedCert(cert);
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-    return ret;
+    return ret == 0 ? SSL_SUCCESS : ret;
 }
 
 
-int CyaSSL_CertManagerSetOCSPOverrideURL(CYASSL_CERT_MANAGER* cm,
+int wolfSSL_CertManagerSetOCSPOverrideURL(WOLFSSL_CERT_MANAGER* cm,
                                                                 const char* url)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerSetOCSPOverrideURL");
+    WOLFSSL_ENTER("wolfSSL_CertManagerSetOCSPOverrideURL");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
@@ -2432,10 +3005,10 @@ int CyaSSL_CertManagerSetOCSPOverrideURL(CYASSL_CERT_MANAGER* cm,
 }
 
 
-int CyaSSL_CertManagerSetOCSP_Cb(CYASSL_CERT_MANAGER* cm,
+int wolfSSL_CertManagerSetOCSP_Cb(WOLFSSL_CERT_MANAGER* cm,
                         CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerSetOCSP_Cb");
+    WOLFSSL_ENTER("wolfSSL_CertManagerSetOCSP_Cb");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
@@ -2447,84 +3020,84 @@ int CyaSSL_CertManagerSetOCSP_Cb(CYASSL_CERT_MANAGER* cm,
 }
 
 
-int CyaSSL_EnableOCSP(CYASSL* ssl, int options)
+int wolfSSL_EnableOCSP(WOLFSSL* ssl, int options)
 {
-    CYASSL_ENTER("CyaSSL_EnableOCSP");
+    WOLFSSL_ENTER("wolfSSL_EnableOCSP");
     if (ssl)
-        return CyaSSL_CertManagerEnableOCSP(ssl->ctx->cm, options);
+        return wolfSSL_CertManagerEnableOCSP(ssl->ctx->cm, options);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_DisableOCSP(CYASSL* ssl)
+int wolfSSL_DisableOCSP(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("CyaSSL_DisableOCSP");
+    WOLFSSL_ENTER("wolfSSL_DisableOCSP");
     if (ssl)
-        return CyaSSL_CertManagerDisableOCSP(ssl->ctx->cm);
+        return wolfSSL_CertManagerDisableOCSP(ssl->ctx->cm);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_SetOCSP_OverrideURL(CYASSL* ssl, const char* url)
+int wolfSSL_SetOCSP_OverrideURL(WOLFSSL* ssl, const char* url)
 {
-    CYASSL_ENTER("CyaSSL_SetOCSP_OverrideURL");
+    WOLFSSL_ENTER("wolfSSL_SetOCSP_OverrideURL");
     if (ssl)
-        return CyaSSL_CertManagerSetOCSPOverrideURL(ssl->ctx->cm, url);
+        return wolfSSL_CertManagerSetOCSPOverrideURL(ssl->ctx->cm, url);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_SetOCSP_Cb(CYASSL* ssl,
+int wolfSSL_SetOCSP_Cb(WOLFSSL* ssl,
                         CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx)
 {
-    CYASSL_ENTER("CyaSSL_SetOCSP_Cb");
+    WOLFSSL_ENTER("wolfSSL_SetOCSP_Cb");
     if (ssl)
-        return CyaSSL_CertManagerSetOCSP_Cb(ssl->ctx->cm,
+        return wolfSSL_CertManagerSetOCSP_Cb(ssl->ctx->cm,
                                                      ioCb, respFreeCb, ioCbCtx);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_EnableOCSP(CYASSL_CTX* ctx, int options)
+int wolfSSL_CTX_EnableOCSP(WOLFSSL_CTX* ctx, int options)
 {
-    CYASSL_ENTER("CyaSSL_CTX_EnableOCSP");
+    WOLFSSL_ENTER("wolfSSL_CTX_EnableOCSP");
     if (ctx)
-        return CyaSSL_CertManagerEnableOCSP(ctx->cm, options);
+        return wolfSSL_CertManagerEnableOCSP(ctx->cm, options);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_DisableOCSP(CYASSL_CTX* ctx)
+int wolfSSL_CTX_DisableOCSP(WOLFSSL_CTX* ctx)
 {
-    CYASSL_ENTER("CyaSSL_CTX_DisableOCSP");
+    WOLFSSL_ENTER("wolfSSL_CTX_DisableOCSP");
     if (ctx)
-        return CyaSSL_CertManagerDisableOCSP(ctx->cm);
+        return wolfSSL_CertManagerDisableOCSP(ctx->cm);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_SetOCSP_OverrideURL(CYASSL_CTX* ctx, const char* url)
+int wolfSSL_CTX_SetOCSP_OverrideURL(WOLFSSL_CTX* ctx, const char* url)
 {
-    CYASSL_ENTER("CyaSSL_SetOCSP_OverrideURL");
+    WOLFSSL_ENTER("wolfSSL_SetOCSP_OverrideURL");
     if (ctx)
-        return CyaSSL_CertManagerSetOCSPOverrideURL(ctx->cm, url);
+        return wolfSSL_CertManagerSetOCSPOverrideURL(ctx->cm, url);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_SetOCSP_Cb(CYASSL_CTX* ctx,
+int wolfSSL_CTX_SetOCSP_Cb(WOLFSSL_CTX* ctx,
                         CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx)
 {
-    CYASSL_ENTER("CyaSSL_CTX_SetOCSP_Cb");
+    WOLFSSL_ENTER("wolfSSL_CTX_SetOCSP_Cb");
     if (ctx)
-        return CyaSSL_CertManagerSetOCSP_Cb(ctx->cm, ioCb, respFreeCb, ioCbCtx);
+        return wolfSSL_CertManagerSetOCSP_Cb(ctx->cm, ioCb, respFreeCb, ioCbCtx);
     else
         return BAD_FUNC_ARG;
 }
@@ -2535,19 +3108,23 @@ int CyaSSL_CTX_SetOCSP_Cb(CYASSL_CTX* ctx,
 
 #ifndef NO_FILESYSTEM
 
-    #if defined(CYASSL_MDK_ARM)
-        extern FILE * CyaSSL_fopen(const char *name, const char *mode) ;
-        #define XFOPEN     CyaSSL_fopen
+    #if defined(WOLFSSL_MDK_ARM)
+        extern FILE * wolfSSL_fopen(const char *name, const char *mode) ;
+        #define XFOPEN     wolfSSL_fopen
     #else
         #define XFOPEN     fopen
     #endif
 
 /* process a file with name fname into ctx of format and type
    userChain specifies a user certificate chain to pass during handshake */
-int ProcessFile(CYASSL_CTX* ctx, const char* fname, int format, int type,
-                CYASSL* ssl, int userChain, CYASSL_CRL* crl)
+int ProcessFile(WOLFSSL_CTX* ctx, const char* fname, int format, int type,
+                WOLFSSL* ssl, int userChain, WOLFSSL_CRL* crl)
 {
+#ifdef WOLFSSL_SMALL_STACK
+    byte   staticBuffer[1]; /* force heap usage */
+#else
     byte   staticBuffer[FILE_BUFFER_SIZE];
+#endif
     byte*  myBuffer = staticBuffer;
     int    dynamic = 0;
     int    ret;
@@ -2567,7 +3144,7 @@ int ProcessFile(CYASSL_CTX* ctx, const char* fname, int format, int type,
     XREWIND(file);
 
     if (sz > (long)sizeof(staticBuffer)) {
-        CYASSL_MSG("Getting dynamic buffer");
+        WOLFSSL_MSG("Getting dynamic buffer");
         myBuffer = (byte*)XMALLOC(sz, heapHint, DYNAMIC_TYPE_FILE);
         if (myBuffer == NULL) {
             XFCLOSE(file);
@@ -2595,19 +3172,20 @@ int ProcessFile(CYASSL_CTX* ctx, const char* fname, int format, int type,
     }
 
     XFCLOSE(file);
-    if (dynamic) XFREE(myBuffer, heapHint, DYNAMIC_TYPE_FILE);
+    if (dynamic)
+        XFREE(myBuffer, heapHint, DYNAMIC_TYPE_FILE);
 
     return ret;
 }
 
 
 /* loads file then loads each file in path, no c_rehash */
-int CyaSSL_CTX_load_verify_locations(CYASSL_CTX* ctx, const char* file,
+int wolfSSL_CTX_load_verify_locations(WOLFSSL_CTX* ctx, const char* file,
                                      const char* path)
 {
     int ret = SSL_SUCCESS;
 
-    CYASSL_ENTER("CyaSSL_CTX_load_verify_locations");
+    WOLFSSL_ENTER("wolfSSL_CTX_load_verify_locations");
     (void)path;
 
     if (ctx == NULL || (file == NULL && path == NULL) )
@@ -2621,15 +3199,28 @@ int CyaSSL_CTX_load_verify_locations(CYASSL_CTX* ctx, const char* file,
     #ifdef USE_WINDOWS_API
         WIN32_FIND_DATAA FindFileData;
         HANDLE hFind;
+    #ifdef WOLFSSL_SMALL_STACK
+        char*  name = NULL;
+    #else
         char   name[MAX_FILENAME_SZ];
+    #endif
+
+    #ifdef WOLFSSL_SMALL_STACK
+        name = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (name == NULL)
+            return MEMORY_E;
+    #endif
 
-        XMEMSET(name, 0, sizeof(name));
+        XMEMSET(name, 0, MAX_FILENAME_SZ);
         XSTRNCPY(name, path, MAX_FILENAME_SZ - 4);
         XSTRNCAT(name, "\\*", 3);
 
         hFind = FindFirstFileA(name, &FindFileData);
         if (hFind == INVALID_HANDLE_VALUE) {
-            CYASSL_MSG("FindFirstFile for path verify locations failed");
+            WOLFSSL_MSG("FindFirstFile for path verify locations failed");
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(name, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
             return BAD_PATH_ERROR;
         }
 
@@ -2640,38 +3231,55 @@ int CyaSSL_CTX_load_verify_locations(CYASSL_CTX* ctx, const char* file,
                 XSTRNCAT(name, FindFileData.cFileName, MAX_FILENAME_SZ/2);
 
                 ret = ProcessFile(ctx, name, SSL_FILETYPE_PEM, CA_TYPE, NULL,0,
-                                  NULL);
+                                                                          NULL);
             }
         } while (ret == SSL_SUCCESS && FindNextFileA(hFind, &FindFileData));
 
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(name, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+
         FindClose(hFind);
-    #elif !defined(NO_CYASSL_DIR)
+    #elif !defined(NO_WOLFSSL_DIR)
         struct dirent* entry;
         DIR*   dir = opendir(path);
+    #ifdef WOLFSSL_SMALL_STACK
+        char*  name = NULL;
+    #else
+        char   name[MAX_FILENAME_SZ];
+    #endif
 
         if (dir == NULL) {
-            CYASSL_MSG("opendir path verify locations failed");
+            WOLFSSL_MSG("opendir path verify locations failed");
             return BAD_PATH_ERROR;
         }
+
+    #ifdef WOLFSSL_SMALL_STACK
+        name = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (name == NULL)
+            return MEMORY_E;
+    #endif
+
         while ( ret == SSL_SUCCESS && (entry = readdir(dir)) != NULL) {
-            char name[MAX_FILENAME_SZ];
             struct stat s;
 
-            XMEMSET(name, 0, sizeof(name));
+            XMEMSET(name, 0, MAX_FILENAME_SZ);
             XSTRNCPY(name, path, MAX_FILENAME_SZ/2 - 2);
             XSTRNCAT(name, "/", 1);
             XSTRNCAT(name, entry->d_name, MAX_FILENAME_SZ/2);
 
             if (stat(name, &s) != 0) {
-                CYASSL_MSG("stat on name failed");
-                closedir(dir);
-                return BAD_PATH_ERROR;
-            }
-            if (s.st_mode & S_IFREG) {
+                WOLFSSL_MSG("stat on name failed");
+                ret = BAD_PATH_ERROR;
+            } else if (s.st_mode & S_IFREG)
                 ret = ProcessFile(ctx, name, SSL_FILETYPE_PEM, CA_TYPE, NULL,0,
-                                  NULL);
-            }
+                                                                          NULL);
         }
+
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(name, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+
         closedir(dir);
     #endif
     }
@@ -2681,31 +3289,35 @@ int CyaSSL_CTX_load_verify_locations(CYASSL_CTX* ctx, const char* file,
 
 
 /* Verify the ceritficate, SSL_SUCCESS for ok, < 0 for error */
-int CyaSSL_CertManagerVerify(CYASSL_CERT_MANAGER* cm, const char* fname,
+int wolfSSL_CertManagerVerify(WOLFSSL_CERT_MANAGER* cm, const char* fname,
                              int format)
 {
     int    ret = SSL_FATAL_ERROR;
+#ifdef WOLFSSL_SMALL_STACK
+    byte   staticBuffer[1]; /* force heap usage */
+#else
     byte   staticBuffer[FILE_BUFFER_SIZE];
+#endif
     byte*  myBuffer = staticBuffer;
     int    dynamic = 0;
     long   sz = 0;
     XFILE  file = XFOPEN(fname, "rb");
 
-    CYASSL_ENTER("CyaSSL_CertManagerVerify");
+    WOLFSSL_ENTER("wolfSSL_CertManagerVerify");
 
     if (file == XBADFILE) return SSL_BAD_FILE;
     XFSEEK(file, 0, XSEEK_END);
     sz = XFTELL(file);
     XREWIND(file);
 
-    if (sz > MAX_CYASSL_FILE_SIZE || sz < 0) {
-        CYASSL_MSG("CertManagerVerify file bad size");
+    if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
+        WOLFSSL_MSG("CertManagerVerify file bad size");
         XFCLOSE(file);
         return SSL_BAD_FILE;
     }
 
     if (sz > (long)sizeof(staticBuffer)) {
-        CYASSL_MSG("Getting dynamic buffer");
+        WOLFSSL_MSG("Getting dynamic buffer");
         myBuffer = (byte*) XMALLOC(sz, cm->heap, DYNAMIC_TYPE_FILE);
         if (myBuffer == NULL) {
             XFCLOSE(file);
@@ -2717,28 +3329,29 @@ int CyaSSL_CertManagerVerify(CYASSL_CERT_MANAGER* cm, const char* fname,
     if ( (ret = (int)XFREAD(myBuffer, sz, 1, file)) < 0)
         ret = SSL_BAD_FILE;
     else
-        ret = CyaSSL_CertManagerVerifyBuffer(cm, myBuffer, sz, format);
+        ret = wolfSSL_CertManagerVerifyBuffer(cm, myBuffer, sz, format);
 
     XFCLOSE(file);
-    if (dynamic) XFREE(myBuffer, cm->heap, DYNAMIC_TYPE_FILE);
+    if (dynamic)
+        XFREE(myBuffer, cm->heap, DYNAMIC_TYPE_FILE);
 
     return ret;
 }
 
 
-static INLINE CYASSL_METHOD* cm_pick_method(void)
+static INLINE WOLFSSL_METHOD* cm_pick_method(void)
 {
-    #ifndef NO_CYASSL_CLIENT
+    #ifndef NO_WOLFSSL_CLIENT
         #ifdef NO_OLD_TLS
-            return CyaTLSv1_2_client_method();
+            return wolfTLSv1_2_client_method();
         #else
-            return CyaSSLv3_client_method();
-        #endif
-    #elif !defined(NO_CYASSL_SERVER)
+            return wolfSSLv3_client_method();
+        #endif      
+    #elif !defined(NO_WOLFSSL_SERVER)
         #ifdef NO_OLD_TLS
-            return CyaTLSv1_2_server_method();
+            return wolfTLSv1_2_server_method();
         #else
-            return CyaSSLv3_server_method();
+            return wolfSSLv3_server_method();
         #endif
     #else
         return NULL;
@@ -2747,34 +3360,34 @@ static INLINE CYASSL_METHOD* cm_pick_method(void)
 
 
 /* like load verify locations, 1 for success, < 0 for error */
-int CyaSSL_CertManagerLoadCA(CYASSL_CERT_MANAGER* cm, const char* file,
+int wolfSSL_CertManagerLoadCA(WOLFSSL_CERT_MANAGER* cm, const char* file,
                              const char* path)
 {
     int ret = SSL_FATAL_ERROR;
-    CYASSL_CTX* tmp;
+    WOLFSSL_CTX* tmp;
 
-    CYASSL_ENTER("CyaSSL_CertManagerLoadCA");
+    WOLFSSL_ENTER("wolfSSL_CertManagerLoadCA");
 
     if (cm == NULL) {
-        CYASSL_MSG("No CertManager error");
+        WOLFSSL_MSG("No CertManager error");
         return ret;
     }
-    tmp = CyaSSL_CTX_new(cm_pick_method());
+    tmp = wolfSSL_CTX_new(cm_pick_method());
 
     if (tmp == NULL) {
-        CYASSL_MSG("CTX new failed");
+        WOLFSSL_MSG("CTX new failed");
         return ret;
     }
 
     /* for tmp use */
-    CyaSSL_CertManagerFree(tmp->cm);
+    wolfSSL_CertManagerFree(tmp->cm);
     tmp->cm = cm;
 
-    ret = CyaSSL_CTX_load_verify_locations(tmp, file, path);
+    ret = wolfSSL_CTX_load_verify_locations(tmp, file, path);
 
     /* don't loose our good one */
     tmp->cm = NULL;
-    CyaSSL_CTX_free(tmp);
+    wolfSSL_CTX_free(tmp);
 
     return ret;
 }
@@ -2782,32 +3395,32 @@ int CyaSSL_CertManagerLoadCA(CYASSL_CERT_MANAGER* cm, const char* file,
 
 
 /* turn on CRL if off and compiled in, set options */
-int CyaSSL_CertManagerEnableCRL(CYASSL_CERT_MANAGER* cm, int options)
+int wolfSSL_CertManagerEnableCRL(WOLFSSL_CERT_MANAGER* cm, int options)
 {
     int ret = SSL_SUCCESS;
 
     (void)options;
 
-    CYASSL_ENTER("CyaSSL_CertManagerEnableCRL");
+    WOLFSSL_ENTER("wolfSSL_CertManagerEnableCRL");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
     #ifdef HAVE_CRL
         if (cm->crl == NULL) {
-            cm->crl = (CYASSL_CRL*)XMALLOC(sizeof(CYASSL_CRL), cm->heap,
+            cm->crl = (WOLFSSL_CRL*)XMALLOC(sizeof(WOLFSSL_CRL), cm->heap,
                                            DYNAMIC_TYPE_CRL);
             if (cm->crl == NULL)
                 return MEMORY_E;
 
             if (InitCRL(cm->crl, cm) != 0) {
-                CYASSL_MSG("Init CRL failed");
+                WOLFSSL_MSG("Init CRL failed");
                 FreeCRL(cm->crl, 1);
                 cm->crl = NULL;
                 return SSL_FAILURE;
             }
         }
         cm->crlEnabled = 1;
-        if (options & CYASSL_CRL_CHECKALL)
+        if (options & WOLFSSL_CRL_CHECKALL)
             cm->crlCheckAll = 1;
     #else
         ret = NOT_COMPILED_IN;
@@ -2817,9 +3430,9 @@ int CyaSSL_CertManagerEnableCRL(CYASSL_CERT_MANAGER* cm, int options)
 }
 
 
-int CyaSSL_CertManagerDisableCRL(CYASSL_CERT_MANAGER* cm)
+int wolfSSL_CertManagerDisableCRL(WOLFSSL_CERT_MANAGER* cm)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerDisableCRL");
+    WOLFSSL_ENTER("wolfSSL_CertManagerDisableCRL");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
@@ -2829,11 +3442,11 @@ int CyaSSL_CertManagerDisableCRL(CYASSL_CERT_MANAGER* cm)
 }
 
 
-int CyaSSL_CTX_check_private_key(CYASSL_CTX* ctx)
+int wolfSSL_CTX_check_private_key(WOLFSSL_CTX* ctx)
 {
     /* TODO: check private against public for RSA match */
     (void)ctx;
-    CYASSL_ENTER("SSL_CTX_check_private_key");
+    WOLFSSL_ENTER("SSL_CTX_check_private_key");
     return SSL_SUCCESS;
 }
 
@@ -2842,12 +3455,16 @@ int CyaSSL_CTX_check_private_key(CYASSL_CTX* ctx)
 
 
 /* check CRL if enabled, SSL_SUCCESS  */
-int CyaSSL_CertManagerCheckCRL(CYASSL_CERT_MANAGER* cm, byte* der, int sz)
+int wolfSSL_CertManagerCheckCRL(WOLFSSL_CERT_MANAGER* cm, byte* der, int sz)
 {
-    int         ret;
-    DecodedCert cert;
+    int ret = 0;
+#ifdef WOLFSSL_SMALL_STACK
+    DecodedCert* cert = NULL;
+#else
+    DecodedCert  cert[1];
+#endif
 
-    CYASSL_ENTER("CyaSSL_CertManagerCheckCRL");
+    WOLFSSL_ENTER("wolfSSL_CertManagerCheckCRL");
 
     if (cm == NULL)
         return BAD_FUNC_ARG;
@@ -2855,32 +3472,34 @@ int CyaSSL_CertManagerCheckCRL(CYASSL_CERT_MANAGER* cm, byte* der, int sz)
     if (cm->crlEnabled == 0)
         return SSL_SUCCESS;
 
-    InitDecodedCert(&cert, der, sz, NULL);
+#ifdef WOLFSSL_SMALL_STACK
+    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+    if (cert == NULL)
+        return MEMORY_E;
+#endif
 
-    ret = ParseCertRelative(&cert, CERT_TYPE, NO_VERIFY, cm);
-    if (ret != 0) {
-        CYASSL_MSG("ParseCert failed");
-        return ret;
+    InitDecodedCert(cert, der, sz, NULL);
+
+    if ((ret = ParseCertRelative(cert, CERT_TYPE, NO_VERIFY, cm)) != 0) {
+        WOLFSSL_MSG("ParseCert failed");
     }
-    else {
-        ret = CheckCertCRL(cm->crl, &cert);
-        if (ret != 0) {
-            CYASSL_MSG("CheckCertCRL failed");
-        }
+    else if ((ret = CheckCertCRL(cm->crl, cert)) != 0) {
+        WOLFSSL_MSG("CheckCertCRL failed");
     }
 
-    FreeDecodedCert(&cert);
-
-    if (ret == 0)
-        return SSL_SUCCESS;  /* convert */
+    FreeDecodedCert(cert);
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-    return ret;
+    return ret == 0 ? SSL_SUCCESS : ret;
 }
 
 
-int CyaSSL_CertManagerSetCRL_Cb(CYASSL_CERT_MANAGER* cm, CbMissingCRL cb)
+int wolfSSL_CertManagerSetCRL_Cb(WOLFSSL_CERT_MANAGER* cm, CbMissingCRL cb)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerSetCRL_Cb");
+    WOLFSSL_ENTER("wolfSSL_CertManagerSetCRL_Cb");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
@@ -2890,16 +3509,16 @@ int CyaSSL_CertManagerSetCRL_Cb(CYASSL_CERT_MANAGER* cm, CbMissingCRL cb)
 }
 
 
-int CyaSSL_CertManagerLoadCRL(CYASSL_CERT_MANAGER* cm, const char* path,
+int wolfSSL_CertManagerLoadCRL(WOLFSSL_CERT_MANAGER* cm, const char* path,
                               int type, int monitor)
 {
-    CYASSL_ENTER("CyaSSL_CertManagerLoadCRL");
+    WOLFSSL_ENTER("wolfSSL_CertManagerLoadCRL");
     if (cm == NULL)
         return BAD_FUNC_ARG;
 
     if (cm->crl == NULL) {
-        if (CyaSSL_CertManagerEnableCRL(cm, 0) != SSL_SUCCESS) {
-            CYASSL_MSG("Enable CRL failed");
+        if (wolfSSL_CertManagerEnableCRL(cm, 0) != SSL_SUCCESS) {
+            WOLFSSL_MSG("Enable CRL failed");
             return SSL_FATAL_ERROR;
         }
     }
@@ -2908,81 +3527,81 @@ int CyaSSL_CertManagerLoadCRL(CYASSL_CERT_MANAGER* cm, const char* path,
 }
 
 
-int CyaSSL_EnableCRL(CYASSL* ssl, int options)
+int wolfSSL_EnableCRL(WOLFSSL* ssl, int options)
 {
-    CYASSL_ENTER("CyaSSL_EnableCRL");
+    WOLFSSL_ENTER("wolfSSL_EnableCRL");
     if (ssl)
-        return CyaSSL_CertManagerEnableCRL(ssl->ctx->cm, options);
+        return wolfSSL_CertManagerEnableCRL(ssl->ctx->cm, options);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_DisableCRL(CYASSL* ssl)
+int wolfSSL_DisableCRL(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("CyaSSL_DisableCRL");
+    WOLFSSL_ENTER("wolfSSL_DisableCRL");
     if (ssl)
-        return CyaSSL_CertManagerDisableCRL(ssl->ctx->cm);
+        return wolfSSL_CertManagerDisableCRL(ssl->ctx->cm);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_LoadCRL(CYASSL* ssl, const char* path, int type, int monitor)
+int wolfSSL_LoadCRL(WOLFSSL* ssl, const char* path, int type, int monitor)
 {
-    CYASSL_ENTER("CyaSSL_LoadCRL");
+    WOLFSSL_ENTER("wolfSSL_LoadCRL");
     if (ssl)
-        return CyaSSL_CertManagerLoadCRL(ssl->ctx->cm, path, type, monitor);
+        return wolfSSL_CertManagerLoadCRL(ssl->ctx->cm, path, type, monitor);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_SetCRL_Cb(CYASSL* ssl, CbMissingCRL cb)
+int wolfSSL_SetCRL_Cb(WOLFSSL* ssl, CbMissingCRL cb)
 {
-    CYASSL_ENTER("CyaSSL_SetCRL_Cb");
+    WOLFSSL_ENTER("wolfSSL_SetCRL_Cb");
     if (ssl)
-        return CyaSSL_CertManagerSetCRL_Cb(ssl->ctx->cm, cb);
+        return wolfSSL_CertManagerSetCRL_Cb(ssl->ctx->cm, cb);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_EnableCRL(CYASSL_CTX* ctx, int options)
+int wolfSSL_CTX_EnableCRL(WOLFSSL_CTX* ctx, int options)
 {
-    CYASSL_ENTER("CyaSSL_CTX_EnableCRL");
+    WOLFSSL_ENTER("wolfSSL_CTX_EnableCRL");
     if (ctx)
-        return CyaSSL_CertManagerEnableCRL(ctx->cm, options);
+        return wolfSSL_CertManagerEnableCRL(ctx->cm, options);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_DisableCRL(CYASSL_CTX* ctx)
+int wolfSSL_CTX_DisableCRL(WOLFSSL_CTX* ctx)
 {
-    CYASSL_ENTER("CyaSSL_CTX_DisableCRL");
+    WOLFSSL_ENTER("wolfSSL_CTX_DisableCRL");
     if (ctx)
-        return CyaSSL_CertManagerDisableCRL(ctx->cm);
+        return wolfSSL_CertManagerDisableCRL(ctx->cm);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_LoadCRL(CYASSL_CTX* ctx, const char* path, int type, int monitor)
+int wolfSSL_CTX_LoadCRL(WOLFSSL_CTX* ctx, const char* path, int type, int monitor)
 {
-    CYASSL_ENTER("CyaSSL_CTX_LoadCRL");
+    WOLFSSL_ENTER("wolfSSL_CTX_LoadCRL");
     if (ctx)
-        return CyaSSL_CertManagerLoadCRL(ctx->cm, path, type, monitor);
+        return wolfSSL_CertManagerLoadCRL(ctx->cm, path, type, monitor);
     else
         return BAD_FUNC_ARG;
 }
 
 
-int CyaSSL_CTX_SetCRL_Cb(CYASSL_CTX* ctx, CbMissingCRL cb)
+int wolfSSL_CTX_SetCRL_Cb(WOLFSSL_CTX* ctx, CbMissingCRL cb)
 {
-    CYASSL_ENTER("CyaSSL_CTX_SetCRL_Cb");
+    WOLFSSL_ENTER("wolfSSL_CTX_SetCRL_Cb");
     if (ctx)
-        return CyaSSL_CertManagerSetCRL_Cb(ctx->cm, cb);
+        return wolfSSL_CertManagerSetCRL_Cb(ctx->cm, cb);
     else
         return BAD_FUNC_ARG;
 }
@@ -2991,13 +3610,13 @@ int CyaSSL_CTX_SetCRL_Cb(CYASSL_CTX* ctx, CbMissingCRL cb)
 #endif /* HAVE_CRL */
 
 
-#ifdef CYASSL_DER_LOAD
+#ifdef WOLFSSL_DER_LOAD
 
 /* Add format parameter to allow DER load of CA files */
-int CyaSSL_CTX_der_load_verify_locations(CYASSL_CTX* ctx, const char* file,
+int wolfSSL_CTX_der_load_verify_locations(WOLFSSL_CTX* ctx, const char* file,
                                          int format)
 {
-    CYASSL_ENTER("CyaSSL_CTX_der_load_verify_locations");
+    WOLFSSL_ENTER("wolfSSL_CTX_der_load_verify_locations");
     if (ctx == NULL || file == NULL)
         return SSL_FAILURE;
 
@@ -3007,74 +3626,98 @@ int CyaSSL_CTX_der_load_verify_locations(CYASSL_CTX* ctx, const char* file,
     return SSL_FAILURE;
 }
 
-#endif /* CYASSL_DER_LOAD */
+#endif /* WOLFSSL_DER_LOAD */
 
 
-#ifdef CYASSL_CERT_GEN
+#ifdef WOLFSSL_CERT_GEN
 
 /* load pem cert from file into der buffer, return der size or error */
-int CyaSSL_PemCertToDer(const char* fileName, unsigned char* derBuf, int derSz)
+int wolfSSL_PemCertToDer(const char* fileName, unsigned char* derBuf, int derSz)
 {
+#ifdef WOLFSSL_SMALL_STACK
+    EncryptedInfo* info = NULL;
+    byte   staticBuffer[1]; /* force XMALLOC */
+#else
+    EncryptedInfo info[1];
     byte   staticBuffer[FILE_BUFFER_SIZE];
+#endif
     byte*  fileBuf = staticBuffer;
     int    dynamic = 0;
-    int    ret;
-    int    ecc = 0;
-    long   sz = 0;
-    XFILE  file = XFOPEN(fileName, "rb");
-    EncryptedInfo info;
-    buffer        converted;
+    int    ret     = 0;
+    int    ecc     = 0;
+    long   sz      = 0;
+    XFILE  file    = XFOPEN(fileName, "rb");
+    buffer converted;
 
-    CYASSL_ENTER("CyaSSL_PemCertToDer");
-    converted.buffer = 0;
+    WOLFSSL_ENTER("wolfSSL_PemCertToDer");
 
-    if (file == XBADFILE) return SSL_BAD_FILE;
-    XFSEEK(file, 0, XSEEK_END);
-    sz = XFTELL(file);
-    XREWIND(file);
+    if (file == XBADFILE)
+        ret = SSL_BAD_FILE;
+    else {
+        XFSEEK(file, 0, XSEEK_END);
+        sz = XFTELL(file);
+        XREWIND(file);
 
-    if (sz > (long)sizeof(staticBuffer)) {
-        fileBuf = (byte*) XMALLOC(sz, 0, DYNAMIC_TYPE_FILE);
-        if (fileBuf == NULL) {
-            XFCLOSE(file);
-            return SSL_BAD_FILE;
+        if (sz < 0) {
+            ret = SSL_BAD_FILE;
+        }
+        else if (sz > (long)sizeof(staticBuffer)) {
+            fileBuf = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_FILE);
+            if (fileBuf == NULL)
+                ret = MEMORY_E;
+            else
+                dynamic = 1;
         }
-        dynamic = 1;
-    }
-    else if (sz < 0) {
-        XFCLOSE(file);
-        return SSL_BAD_FILE;
-    }
 
-    if ( (ret = (int)XFREAD(fileBuf, sz, 1, file)) < 0)
-        ret = SSL_BAD_FILE;
-    else
-        ret = PemToDer(fileBuf, sz, CA_TYPE, &converted, 0, &info, &ecc);
+        converted.buffer = 0;
+
+        if (ret == 0) {
+            if ( (ret = (int)XFREAD(fileBuf, sz, 1, file)) < 0)
+                ret = SSL_BAD_FILE;
+            else {
+            #ifdef WOLFSSL_SMALL_STACK
+                info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+                if (info == NULL)
+                    ret = MEMORY_E;
+                else
+            #endif
+                {
+                    ret = PemToDer(fileBuf, sz, CA_TYPE, &converted, 0, info,
+                                                                          &ecc);
+                #ifdef WOLFSSL_SMALL_STACK
+                    XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+                #endif
+                }
+            }
+
+            if (ret == 0) {
+                if (converted.length < (word32)derSz) {
+                    XMEMCPY(derBuf, converted.buffer, converted.length);
+                    ret = converted.length;
+                }
+                else
+                    ret = BUFFER_E;
+            }
 
-    if (ret == 0) {
-        if (converted.length < (word32)derSz) {
-            XMEMCPY(derBuf, converted.buffer, converted.length);
-            ret = converted.length;
+            XFREE(converted.buffer, 0, DYNAMIC_TYPE_CA);
         }
-        else
-            ret = BUFFER_E;
-    }
 
-    XFREE(converted.buffer, 0, DYNAMIC_TYPE_CA);
-    if (dynamic)
-        XFREE(fileBuf, 0, DYNAMIC_TYPE_FILE);
-    XFCLOSE(file);
+        XFCLOSE(file);
+        if (dynamic)
+            XFREE(fileBuf, 0, DYNAMIC_TYPE_FILE);
+    }
 
     return ret;
 }
 
-#endif /* CYASSL_CERT_GEN */
+#endif /* WOLFSSL_CERT_GEN */
 
 
-int CyaSSL_CTX_use_certificate_file(CYASSL_CTX* ctx, const char* file,
+int wolfSSL_CTX_use_certificate_file(WOLFSSL_CTX* ctx, const char* file,
                                     int format)
 {
-    CYASSL_ENTER("CyaSSL_CTX_use_certificate_file");
+    WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_file");
     if (ProcessFile(ctx, file, format, CERT_TYPE, NULL, 0, NULL) == SSL_SUCCESS)
         return SSL_SUCCESS;
 
@@ -3082,9 +3725,9 @@ int CyaSSL_CTX_use_certificate_file(CYASSL_CTX* ctx, const char* file,
 }
 
 
-int CyaSSL_CTX_use_PrivateKey_file(CYASSL_CTX* ctx, const char* file,int format)
+int wolfSSL_CTX_use_PrivateKey_file(WOLFSSL_CTX* ctx, const char* file,int format)
 {
-    CYASSL_ENTER("CyaSSL_CTX_use_PrivateKey_file");
+    WOLFSSL_ENTER("wolfSSL_CTX_use_PrivateKey_file");
     if (ProcessFile(ctx, file, format, PRIVATEKEY_TYPE, NULL, 0, NULL)
                     == SSL_SUCCESS)
         return SSL_SUCCESS;
@@ -3093,10 +3736,30 @@ int CyaSSL_CTX_use_PrivateKey_file(CYASSL_CTX* ctx, const char* file,int format)
 }
 
 
-int CyaSSL_CTX_use_certificate_chain_file(CYASSL_CTX* ctx, const char* file)
+/* get cert chaining depth using ssl struct */
+long wolfSSL_get_verify_depth(WOLFSSL* ssl)
+{
+    if(ssl == NULL) {
+        return BAD_FUNC_ARG;
+    }
+    return MAX_CHAIN_DEPTH;
+}
+
+
+/* get cert chaining depth using ctx struct */
+long wolfSSL_CTX_get_verify_depth(WOLFSSL_CTX* ctx)
+{
+    if(ctx == NULL) {
+        return BAD_FUNC_ARG;
+    }
+    return MAX_CHAIN_DEPTH;
+}
+
+
+int wolfSSL_CTX_use_certificate_chain_file(WOLFSSL_CTX* ctx, const char* file)
 {
    /* procces up to MAX_CHAIN_DEPTH plus subject cert */
-   CYASSL_ENTER("CyaSSL_CTX_use_certificate_chain_file");
+   WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_chain_file");
    if (ProcessFile(ctx, file, SSL_FILETYPE_PEM,CERT_TYPE,NULL,1, NULL)
                    == SSL_SUCCESS)
        return SSL_SUCCESS;
@@ -3108,70 +3771,92 @@ int CyaSSL_CTX_use_certificate_chain_file(CYASSL_CTX* ctx, const char* file)
 #ifndef NO_DH
 
 /* server wrapper for ctx or ssl Diffie-Hellman parameters */
-static int CyaSSL_SetTmpDH_buffer_wrapper(CYASSL_CTX* ctx, CYASSL* ssl,
+static int wolfSSL_SetTmpDH_buffer_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
                                   const unsigned char* buf, long sz, int format)
 {
     buffer der;
-    int    ret;
+    int    ret      = 0;
     int    weOwnDer = 0;
+    word32 pSz = MAX_DH_SIZE;
+    word32 gSz = MAX_DH_SIZE;
+#ifdef WOLFSSL_SMALL_STACK
+    byte*  p = NULL;
+    byte*  g = NULL;
+#else
     byte   p[MAX_DH_SIZE];
     byte   g[MAX_DH_SIZE];
-    word32 pSz = sizeof(p);
-    word32 gSz = sizeof(g);
+#endif
 
     der.buffer = (byte*)buf;
     der.length = (word32)sz;
 
-    if (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM)
-        return SSL_BAD_FILETYPE;
+#ifdef WOLFSSL_SMALL_STACK
+    p = (byte*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    g = (byte*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 
-    if (format == SSL_FILETYPE_PEM) {
-        der.buffer = NULL;
-        ret = PemToDer(buf, sz, DH_PARAM_TYPE, &der, ctx->heap, NULL,NULL);
-        if (ret < 0) {
-            XFREE(der.buffer, ctx->heap, DYNAMIC_TYPE_KEY);
-            return ret;
-        }
-        weOwnDer = 1;
+    if (p == NULL || g == NULL) {
+        XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        return MEMORY_E;
     }
+#endif
 
-    if (DhParamsLoad(der.buffer, der.length, p, &pSz, g, &gSz) < 0)
+    if (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM)
         ret = SSL_BAD_FILETYPE;
     else {
-        if (ssl)
-            ret = CyaSSL_SetTmpDH(ssl, p, pSz, g, gSz);
-        else
-            ret = CyaSSL_CTX_SetTmpDH(ctx, p, pSz, g, gSz);
+        if (format == SSL_FILETYPE_PEM) {
+            der.buffer = NULL;
+            ret = PemToDer(buf, sz, DH_PARAM_TYPE, &der, ctx->heap, NULL,NULL);
+            weOwnDer = 1;
+        }
+        
+        if (ret == 0) {
+            if (wc_DhParamsLoad(der.buffer, der.length, p, &pSz, g, &gSz) < 0)
+                ret = SSL_BAD_FILETYPE;
+            else if (ssl)
+                ret = wolfSSL_SetTmpDH(ssl, p, pSz, g, gSz);
+            else
+                ret = wolfSSL_CTX_SetTmpDH(ctx, p, pSz, g, gSz);
+        }
     }
 
     if (weOwnDer)
         XFREE(der.buffer, ctx->heap, DYNAMIC_TYPE_KEY);
 
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
+
     return ret;
 }
 
 
 /* server Diffie-Hellman parameters, SSL_SUCCESS on ok */
-int CyaSSL_SetTmpDH_buffer(CYASSL* ssl, const unsigned char* buf, long sz,
+int wolfSSL_SetTmpDH_buffer(WOLFSSL* ssl, const unsigned char* buf, long sz,
                            int format)
 {
-    return CyaSSL_SetTmpDH_buffer_wrapper(ssl->ctx, ssl, buf, sz, format);
+    return wolfSSL_SetTmpDH_buffer_wrapper(ssl->ctx, ssl, buf, sz, format);
 }
 
 
 /* server ctx Diffie-Hellman parameters, SSL_SUCCESS on ok */
-int CyaSSL_CTX_SetTmpDH_buffer(CYASSL_CTX* ctx, const unsigned char* buf,
+int wolfSSL_CTX_SetTmpDH_buffer(WOLFSSL_CTX* ctx, const unsigned char* buf,
                                long sz, int format)
 {
-    return CyaSSL_SetTmpDH_buffer_wrapper(ctx, NULL, buf, sz, format);
+    return wolfSSL_SetTmpDH_buffer_wrapper(ctx, NULL, buf, sz, format);
 }
 
 
 /* server Diffie-Hellman parameters */
-static int CyaSSL_SetTmpDH_file_wrapper(CYASSL_CTX* ctx, CYASSL* ssl,
+static int wolfSSL_SetTmpDH_file_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
                                         const char* fname, int format)
 {
+#ifdef WOLFSSL_SMALL_STACK
+    byte   staticBuffer[1]; /* force heap usage */
+#else
     byte   staticBuffer[FILE_BUFFER_SIZE];
+#endif
     byte*  myBuffer = staticBuffer;
     int    dynamic = 0;
     int    ret;
@@ -3184,7 +3869,7 @@ static int CyaSSL_SetTmpDH_file_wrapper(CYASSL_CTX* ctx, CYASSL* ssl,
     XREWIND(file);
 
     if (sz > (long)sizeof(staticBuffer)) {
-        CYASSL_MSG("Getting dynamic buffer");
+        WOLFSSL_MSG("Getting dynamic buffer");
         myBuffer = (byte*) XMALLOC(sz, ctx->heap, DYNAMIC_TYPE_FILE);
         if (myBuffer == NULL) {
             XFCLOSE(file);
@@ -3201,71 +3886,70 @@ static int CyaSSL_SetTmpDH_file_wrapper(CYASSL_CTX* ctx, CYASSL* ssl,
         ret = SSL_BAD_FILE;
     else {
         if (ssl)
-            ret = CyaSSL_SetTmpDH_buffer(ssl, myBuffer, sz, format);
+            ret = wolfSSL_SetTmpDH_buffer(ssl, myBuffer, sz, format);
         else
-            ret = CyaSSL_CTX_SetTmpDH_buffer(ctx, myBuffer, sz, format);
+            ret = wolfSSL_CTX_SetTmpDH_buffer(ctx, myBuffer, sz, format);
     }
 
     XFCLOSE(file);
-    if (dynamic) XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE);
+    if (dynamic)
+        XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE);
 
     return ret;
 }
 
 /* server Diffie-Hellman parameters */
-int CyaSSL_SetTmpDH_file(CYASSL* ssl, const char* fname, int format)
+int wolfSSL_SetTmpDH_file(WOLFSSL* ssl, const char* fname, int format)
 {
-    return CyaSSL_SetTmpDH_file_wrapper(ssl->ctx, ssl, fname, format);
+    return wolfSSL_SetTmpDH_file_wrapper(ssl->ctx, ssl, fname, format);
 }
 
 
 /* server Diffie-Hellman parameters */
-int CyaSSL_CTX_SetTmpDH_file(CYASSL_CTX* ctx, const char* fname, int format)
+int wolfSSL_CTX_SetTmpDH_file(WOLFSSL_CTX* ctx, const char* fname, int format)
 {
-    return CyaSSL_SetTmpDH_file_wrapper(ctx, NULL, fname, format);
+    return wolfSSL_SetTmpDH_file_wrapper(ctx, NULL, fname, format);
 }
 
 
-    /* server ctx Diffie-Hellman parameters, SSL_SUCCESS on ok */
-    int CyaSSL_CTX_SetTmpDH(CYASSL_CTX* ctx, const unsigned char* p, int pSz,
-                            const unsigned char* g, int gSz)
-    {
-        CYASSL_ENTER("CyaSSL_CTX_SetTmpDH");
-        if (ctx == NULL || p == NULL || g == NULL) return BAD_FUNC_ARG;
+int wolfSSL_CTX_SetMinDhKey_Sz(WOLFSSL_CTX* ctx, word16 keySz)
+{
+    if (ctx == NULL || keySz > 16000 || keySz % 8 != 0)
+        return BAD_FUNC_ARG;
 
-        XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH);
-        XFREE(ctx->serverDH_G.buffer, ctx->heap, DYNAMIC_TYPE_DH);
+    ctx->minDhKeySz = keySz / 8;
+    return SSL_SUCCESS;
+}
 
-        ctx->serverDH_P.buffer = (byte*)XMALLOC(pSz, ctx->heap,DYNAMIC_TYPE_DH);
-        if (ctx->serverDH_P.buffer == NULL)
-            return MEMORY_E;
 
-        ctx->serverDH_G.buffer = (byte*)XMALLOC(gSz, ctx->heap,DYNAMIC_TYPE_DH);
-        if (ctx->serverDH_G.buffer == NULL) {
-            XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH);
-            return MEMORY_E;
-        }
+int wolfSSL_SetMinDhKey_Sz(WOLFSSL* ssl, word16 keySz)
+{
+    if (ssl == NULL || keySz > 16000 || keySz % 8 != 0)
+        return BAD_FUNC_ARG;
+
+    ssl->options.minDhKeySz = keySz / 8;
+    return SSL_SUCCESS;
+}
 
-        ctx->serverDH_P.length = pSz;
-        ctx->serverDH_G.length = gSz;
 
-        XMEMCPY(ctx->serverDH_P.buffer, p, pSz);
-        XMEMCPY(ctx->serverDH_G.buffer, g, gSz);
+int wolfSSL_GetDhKey_Sz(WOLFSSL* ssl)
+{
+    if (ssl == NULL)
+        return BAD_FUNC_ARG;
+
+    return (ssl->options.dhKeySz * 8);
+}
 
-        ctx->haveDH = 1;
 
-        CYASSL_LEAVE("CyaSSL_CTX_SetTmpDH", 0);
-        return SSL_SUCCESS;
-    }
 #endif /* NO_DH */
 
 
 #ifdef OPENSSL_EXTRA
 /* put SSL type in extra for now, not very common */
 
-int CyaSSL_use_certificate_file(CYASSL* ssl, const char* file, int format)
+int wolfSSL_use_certificate_file(WOLFSSL* ssl, const char* file, int format)
 {
-    CYASSL_ENTER("CyaSSL_use_certificate_file");
+    WOLFSSL_ENTER("wolfSSL_use_certificate_file");
     if (ProcessFile(ssl->ctx, file, format, CERT_TYPE, ssl, 0, NULL)
                     == SSL_SUCCESS)
         return SSL_SUCCESS;
@@ -3274,9 +3958,9 @@ int CyaSSL_use_certificate_file(CYASSL* ssl, const char* file, int format)
 }
 
 
-int CyaSSL_use_PrivateKey_file(CYASSL* ssl, const char* file, int format)
+int wolfSSL_use_PrivateKey_file(WOLFSSL* ssl, const char* file, int format)
 {
-    CYASSL_ENTER("CyaSSL_use_PrivateKey_file");
+    WOLFSSL_ENTER("wolfSSL_use_PrivateKey_file");
     if (ProcessFile(ssl->ctx, file, format, PRIVATEKEY_TYPE, ssl, 0, NULL)
                                                                  == SSL_SUCCESS)
         return SSL_SUCCESS;
@@ -3285,10 +3969,10 @@ int CyaSSL_use_PrivateKey_file(CYASSL* ssl, const char* file, int format)
 }
 
 
-int CyaSSL_use_certificate_chain_file(CYASSL* ssl, const char* file)
+int wolfSSL_use_certificate_chain_file(WOLFSSL* ssl, const char* file)
 {
    /* procces up to MAX_CHAIN_DEPTH plus subject cert */
-   CYASSL_ENTER("CyaSSL_use_certificate_chain_file");
+   WOLFSSL_ENTER("wolfSSL_use_certificate_chain_file");
    if (ProcessFile(ssl->ctx, file, SSL_FILETYPE_PEM, CERT_TYPE, ssl, 1, NULL)
                                                                  == SSL_SUCCESS)
        return SSL_SUCCESS;
@@ -3301,7 +3985,7 @@ int CyaSSL_use_certificate_chain_file(CYASSL* ssl, const char* file)
 #ifdef HAVE_ECC
 
 /* Set Temp CTX EC-DHE size in octets, should be 20 - 66 for 160 - 521 bit */
-int CyaSSL_CTX_SetTmpEC_DHE_Sz(CYASSL_CTX* ctx, word16 sz)
+int wolfSSL_CTX_SetTmpEC_DHE_Sz(WOLFSSL_CTX* ctx, word16 sz)
 {
     if (ctx == NULL || sz < ECC_MINSIZE || sz > ECC_MAXSIZE)
         return BAD_FUNC_ARG;
@@ -3313,7 +3997,7 @@ int CyaSSL_CTX_SetTmpEC_DHE_Sz(CYASSL_CTX* ctx, word16 sz)
 
 
 /* Set Temp SSL EC-DHE size in octets, should be 20 - 66 for 160 - 521 bit */
-int CyaSSL_SetTmpEC_DHE_Sz(CYASSL* ssl, word16 sz)
+int wolfSSL_SetTmpEC_DHE_Sz(WOLFSSL* ssl, word16 sz)
 {
     if (ssl == NULL || sz < ECC_MINSIZE || sz > ECC_MAXSIZE)
         return BAD_FUNC_ARG;
@@ -3328,29 +4012,29 @@ int CyaSSL_SetTmpEC_DHE_Sz(CYASSL* ssl, word16 sz)
 
 
 
-int CyaSSL_CTX_use_RSAPrivateKey_file(CYASSL_CTX* ctx,const char* file,
+int wolfSSL_CTX_use_RSAPrivateKey_file(WOLFSSL_CTX* ctx,const char* file,
                                    int format)
 {
-    CYASSL_ENTER("SSL_CTX_use_RSAPrivateKey_file");
+    WOLFSSL_ENTER("SSL_CTX_use_RSAPrivateKey_file");
 
-    return CyaSSL_CTX_use_PrivateKey_file(ctx, file, format);
+    return wolfSSL_CTX_use_PrivateKey_file(ctx, file, format);
 }
 
 
-int CyaSSL_use_RSAPrivateKey_file(CYASSL* ssl, const char* file, int format)
+int wolfSSL_use_RSAPrivateKey_file(WOLFSSL* ssl, const char* file, int format)
 {
-    CYASSL_ENTER("CyaSSL_use_RSAPrivateKey_file");
+    WOLFSSL_ENTER("wolfSSL_use_RSAPrivateKey_file");
 
-    return CyaSSL_use_PrivateKey_file(ssl, file, format);
+    return wolfSSL_use_PrivateKey_file(ssl, file, format);
 }
 
 #endif /* OPENSSL_EXTRA */
 
 #ifdef HAVE_NTRU
 
-int CyaSSL_CTX_use_NTRUPrivateKey_file(CYASSL_CTX* ctx, const char* file)
+int wolfSSL_CTX_use_NTRUPrivateKey_file(WOLFSSL_CTX* ctx, const char* file)
 {
-    CYASSL_ENTER("CyaSSL_CTX_use_NTRUPrivateKey_file");
+    WOLFSSL_ENTER("wolfSSL_CTX_use_NTRUPrivateKey_file");
     if (ctx == NULL)
         return SSL_FAILURE;
 
@@ -3369,9 +4053,9 @@ int CyaSSL_CTX_use_NTRUPrivateKey_file(CYASSL_CTX* ctx, const char* file)
 #endif /* NO_FILESYSTEM */
 
 
-void CyaSSL_CTX_set_verify(CYASSL_CTX* ctx, int mode, VerifyCallback vc)
+void wolfSSL_CTX_set_verify(WOLFSSL_CTX* ctx, int mode, VerifyCallback vc)
 {
-    CYASSL_ENTER("CyaSSL_CTX_set_verify");
+    WOLFSSL_ENTER("wolfSSL_CTX_set_verify");
     if (mode & SSL_VERIFY_PEER) {
         ctx->verifyPeer = 1;
         ctx->verifyNone = 0;  /* in case perviously set */
@@ -3389,9 +4073,9 @@ void CyaSSL_CTX_set_verify(CYASSL_CTX* ctx, int mode, VerifyCallback vc)
 }
 
 
-void CyaSSL_set_verify(CYASSL* ssl, int mode, VerifyCallback vc)
+void wolfSSL_set_verify(WOLFSSL* ssl, int mode, VerifyCallback vc)
 {
-    CYASSL_ENTER("CyaSSL_set_verify");
+    WOLFSSL_ENTER("wolfSSL_set_verify");
     if (mode & SSL_VERIFY_PEER) {
         ssl->options.verifyPeer = 1;
         ssl->options.verifyNone = 0;  /* in case perviously set */
@@ -3410,16 +4094,16 @@ void CyaSSL_set_verify(CYASSL* ssl, int mode, VerifyCallback vc)
 
 
 /* store user ctx for verify callback */
-void CyaSSL_SetCertCbCtx(CYASSL* ssl, void* ctx)
+void wolfSSL_SetCertCbCtx(WOLFSSL* ssl, void* ctx)
 {
-    CYASSL_ENTER("CyaSSL_SetCertCbCtx");
+    WOLFSSL_ENTER("wolfSSL_SetCertCbCtx");
     if (ssl)
         ssl->verifyCbCtx = ctx;
 }
 
 
 /* store context CA Cache addition callback */
-void CyaSSL_CTX_SetCACb(CYASSL_CTX* ctx, CallbackCACache cb)
+void wolfSSL_CTX_SetCACb(WOLFSSL_CTX* ctx, CallbackCACache cb)
 {
     if (ctx && ctx->cm)
         ctx->cm->caCacheCallback = cb;
@@ -3431,9 +4115,9 @@ void CyaSSL_CTX_SetCACb(CYASSL_CTX* ctx, CallbackCACache cb)
 #if !defined(NO_FILESYSTEM)
 
 /* Persist cert cache to file */
-int CyaSSL_CTX_save_cert_cache(CYASSL_CTX* ctx, const char* fname)
+int wolfSSL_CTX_save_cert_cache(WOLFSSL_CTX* ctx, const char* fname)
 {
-    CYASSL_ENTER("CyaSSL_CTX_save_cert_cache");
+    WOLFSSL_ENTER("wolfSSL_CTX_save_cert_cache");
 
     if (ctx == NULL || fname == NULL)
         return BAD_FUNC_ARG;
@@ -3443,9 +4127,9 @@ int CyaSSL_CTX_save_cert_cache(CYASSL_CTX* ctx, const char* fname)
 
 
 /* Persist cert cache from file */
-int CyaSSL_CTX_restore_cert_cache(CYASSL_CTX* ctx, const char* fname)
+int wolfSSL_CTX_restore_cert_cache(WOLFSSL_CTX* ctx, const char* fname)
 {
-    CYASSL_ENTER("CyaSSL_CTX_restore_cert_cache");
+    WOLFSSL_ENTER("wolfSSL_CTX_restore_cert_cache");
 
     if (ctx == NULL || fname == NULL)
         return BAD_FUNC_ARG;
@@ -3456,9 +4140,9 @@ int CyaSSL_CTX_restore_cert_cache(CYASSL_CTX* ctx, const char* fname)
 #endif /* NO_FILESYSTEM */
 
 /* Persist cert cache to memory */
-int CyaSSL_CTX_memsave_cert_cache(CYASSL_CTX* ctx, void* mem, int sz, int* used)
+int wolfSSL_CTX_memsave_cert_cache(WOLFSSL_CTX* ctx, void* mem, int sz, int* used)
 {
-    CYASSL_ENTER("CyaSSL_CTX_memsave_cert_cache");
+    WOLFSSL_ENTER("wolfSSL_CTX_memsave_cert_cache");
 
     if (ctx == NULL || mem == NULL || used == NULL || sz <= 0)
         return BAD_FUNC_ARG;
@@ -3468,9 +4152,9 @@ int CyaSSL_CTX_memsave_cert_cache(CYASSL_CTX* ctx, void* mem, int sz, int* used)
 
 
 /* Restore cert cache from memory */
-int CyaSSL_CTX_memrestore_cert_cache(CYASSL_CTX* ctx, const void* mem, int sz)
+int wolfSSL_CTX_memrestore_cert_cache(WOLFSSL_CTX* ctx, const void* mem, int sz)
 {
-    CYASSL_ENTER("CyaSSL_CTX_memrestore_cert_cache");
+    WOLFSSL_ENTER("wolfSSL_CTX_memrestore_cert_cache");
 
     if (ctx == NULL || mem == NULL || sz <= 0)
         return BAD_FUNC_ARG;
@@ -3480,9 +4164,9 @@ int CyaSSL_CTX_memrestore_cert_cache(CYASSL_CTX* ctx, const void* mem, int sz)
 
 
 /* get how big the the cert cache save buffer needs to be */
-int CyaSSL_CTX_get_cert_cache_memsize(CYASSL_CTX* ctx)
+int wolfSSL_CTX_get_cert_cache_memsize(WOLFSSL_CTX* ctx)
 {
-    CYASSL_ENTER("CyaSSL_CTX_get_cert_cache_memsize");
+    WOLFSSL_ENTER("wolfSSL_CTX_get_cert_cache_memsize");
 
     if (ctx == NULL)
         return BAD_FUNC_ARG;
@@ -3496,9 +4180,9 @@ int CyaSSL_CTX_get_cert_cache_memsize(CYASSL_CTX* ctx)
 
 #ifndef NO_SESSION_CACHE
 
-CYASSL_SESSION* CyaSSL_get_session(CYASSL* ssl)
+WOLFSSL_SESSION* wolfSSL_get_session(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("SSL_get_session");
+    WOLFSSL_ENTER("SSL_get_session");
     if (ssl)
         return GetSession(ssl, 0);
 
@@ -3506,9 +4190,9 @@ CYASSL_SESSION* CyaSSL_get_session(CYASSL* ssl)
 }
 
 
-int CyaSSL_set_session(CYASSL* ssl, CYASSL_SESSION* session)
+int wolfSSL_set_session(WOLFSSL* ssl, WOLFSSL_SESSION* session)
 {
-    CYASSL_ENTER("SSL_set_session");
+    WOLFSSL_ENTER("SSL_set_session");
     if (session)
         return SetSession(ssl, session);
 
@@ -3521,11 +4205,11 @@ int CyaSSL_set_session(CYASSL* ssl, CYASSL_SESSION* session)
 /* Associate client session with serverID, find existing or store for saving
    if newSession flag on, don't reuse existing session
    SSL_SUCCESS on ok */
-int CyaSSL_SetServerID(CYASSL* ssl, const byte* id, int len, int newSession)
+int wolfSSL_SetServerID(WOLFSSL* ssl, const byte* id, int len, int newSession)
 {
-    CYASSL_SESSION* session = NULL;
+    WOLFSSL_SESSION* session = NULL;
 
-    CYASSL_ENTER("CyaSSL_SetServerID");
+    WOLFSSL_ENTER("wolfSSL_SetServerID");
 
     if (ssl == NULL || id == NULL || len <= 0)
         return BAD_FUNC_ARG;
@@ -3534,14 +4218,14 @@ int CyaSSL_SetServerID(CYASSL* ssl, const byte* id, int len, int newSession)
         session = GetSessionClient(ssl, id, len);
         if (session) {
             if (SetSession(ssl, session) != SSL_SUCCESS) {
-                CYASSL_MSG("SetSession failed");
+                WOLFSSL_MSG("SetSession failed");
                 session = NULL;
             }
         }
     }
 
     if (session == NULL) {
-        CYASSL_MSG("Valid ServerID not cached already");
+        WOLFSSL_MSG("Valid ServerID not cached already");
 
         ssl->session.idLen = (word16)min(SERVER_ID_LEN, (word32)len);
         XMEMCPY(ssl->session.serverID, id, ssl->session.idLen);
@@ -3556,14 +4240,14 @@ int CyaSSL_SetServerID(CYASSL* ssl, const byte* id, int len, int newSession)
 
 /* for persistance, if changes to layout need to increment and modify
    save_session_cache() and restore_session_cache and memory versions too */
-#define CYASSL_CACHE_VERSION 2
+#define WOLFSSL_CACHE_VERSION 2
 
 /* Session Cache Header information */
 typedef struct {
     int version;     /* cache layout version id */
     int rows;        /* session rows */
     int columns;     /* session columns */
-    int sessionSz;   /* sizeof CYASSL_SESSION */
+    int sessionSz;   /* sizeof WOLFSSL_SESSION */
 } cache_header_t;
 
 /* current persistence layout is:
@@ -3572,13 +4256,13 @@ typedef struct {
    2) SessionCache
    3) ClientCache
 
-   update CYASSL_CACHE_VERSION if change layout for the following
+   update WOLFSSL_CACHE_VERSION if change layout for the following
    PERSISTENT_SESSION_CACHE functions
 */
 
 
 /* get how big the the session cache save buffer needs to be */
-int CyaSSL_get_session_cache_memsize(void)
+int wolfSSL_get_session_cache_memsize(void)
 {
     int sz  = (int)(sizeof(SessionCache) + sizeof(cache_header_t));
 
@@ -3591,7 +4275,7 @@ int CyaSSL_get_session_cache_memsize(void)
 
 
 /* Persist session cache to memory */
-int CyaSSL_memsave_session_cache(void* mem, int sz)
+int wolfSSL_memsave_session_cache(void* mem, int sz)
 {
     int i;
     cache_header_t cache_header;
@@ -3600,21 +4284,21 @@ int CyaSSL_memsave_session_cache(void* mem, int sz)
     ClientRow*     clRow;
 #endif
 
-    CYASSL_ENTER("CyaSSL_memsave_session_cache");
+    WOLFSSL_ENTER("wolfSSL_memsave_session_cache");
 
-    if (sz < CyaSSL_get_session_cache_memsize()) {
-        CYASSL_MSG("Memory buffer too small");
+    if (sz < wolfSSL_get_session_cache_memsize()) {
+        WOLFSSL_MSG("Memory buffer too small");
         return BUFFER_E;
     }
 
-    cache_header.version   = CYASSL_CACHE_VERSION;
+    cache_header.version   = WOLFSSL_CACHE_VERSION;
     cache_header.rows      = SESSION_ROWS;
     cache_header.columns   = SESSIONS_PER_ROW;
-    cache_header.sessionSz = (int)sizeof(CYASSL_SESSION);
+    cache_header.sessionSz = (int)sizeof(WOLFSSL_SESSION);
     XMEMCPY(mem, &cache_header, sizeof(cache_header));
 
     if (LockMutex(&session_mutex) != 0) {
-        CYASSL_MSG("Session cache mutex lock failed");
+        WOLFSSL_MSG("Session cache mutex lock failed");
         return BAD_MUTEX_E;
     }
 
@@ -3629,14 +4313,14 @@ int CyaSSL_memsave_session_cache(void* mem, int sz)
 
     UnLockMutex(&session_mutex);
 
-    CYASSL_LEAVE("CyaSSL_memsave_session_cache", SSL_SUCCESS);
+    WOLFSSL_LEAVE("wolfSSL_memsave_session_cache", SSL_SUCCESS);
 
     return SSL_SUCCESS;
 }
 
 
 /* Restore the persistant session cache from memory */
-int CyaSSL_memrestore_session_cache(const void* mem, int sz)
+int wolfSSL_memrestore_session_cache(const void* mem, int sz)
 {
     int    i;
     cache_header_t cache_header;
@@ -3645,25 +4329,25 @@ int CyaSSL_memrestore_session_cache(const void* mem, int sz)
     ClientRow*     clRow;
 #endif
 
-    CYASSL_ENTER("CyaSSL_memrestore_session_cache");
+    WOLFSSL_ENTER("wolfSSL_memrestore_session_cache");
 
-    if (sz < CyaSSL_get_session_cache_memsize()) {
-        CYASSL_MSG("Memory buffer too small");
+    if (sz < wolfSSL_get_session_cache_memsize()) {
+        WOLFSSL_MSG("Memory buffer too small");
         return BUFFER_E;
     }
 
     XMEMCPY(&cache_header, mem, sizeof(cache_header));
-    if (cache_header.version   != CYASSL_CACHE_VERSION ||
+    if (cache_header.version   != WOLFSSL_CACHE_VERSION ||
         cache_header.rows      != SESSION_ROWS ||
         cache_header.columns   != SESSIONS_PER_ROW ||
-        cache_header.sessionSz != (int)sizeof(CYASSL_SESSION)) {
+        cache_header.sessionSz != (int)sizeof(WOLFSSL_SESSION)) {
 
-        CYASSL_MSG("Session cache header match failed");
+        WOLFSSL_MSG("Session cache header match failed");
         return CACHE_MATCH_ERROR;
     }
 
     if (LockMutex(&session_mutex) != 0) {
-        CYASSL_MSG("Session cache mutex lock failed");
+        WOLFSSL_MSG("Session cache mutex lock failed");
         return BAD_MUTEX_E;
     }
 
@@ -3678,7 +4362,7 @@ int CyaSSL_memrestore_session_cache(const void* mem, int sz)
 
     UnLockMutex(&session_mutex);
 
-    CYASSL_LEAVE("CyaSSL_memrestore_session_cache", SSL_SUCCESS);
+    WOLFSSL_LEAVE("wolfSSL_memrestore_session_cache", SSL_SUCCESS);
 
     return SSL_SUCCESS;
 }
@@ -3687,7 +4371,7 @@ int CyaSSL_memrestore_session_cache(const void* mem, int sz)
 
 /* Persist session cache to file */
 /* doesn't use memsave because of additional memory use */
-int CyaSSL_save_session_cache(const char *fname)
+int wolfSSL_save_session_cache(const char *fname)
 {
     XFILE  file;
     int    ret;
@@ -3695,28 +4379,28 @@ int CyaSSL_save_session_cache(const char *fname)
     int    i;
     cache_header_t cache_header;
 
-    CYASSL_ENTER("CyaSSL_save_session_cache");
+    WOLFSSL_ENTER("wolfSSL_save_session_cache");
 
     file = XFOPEN(fname, "w+b");
     if (file == XBADFILE) {
-        CYASSL_MSG("Couldn't open session cache save file");
+        WOLFSSL_MSG("Couldn't open session cache save file");
         return SSL_BAD_FILE;
     }
-    cache_header.version   = CYASSL_CACHE_VERSION;
+    cache_header.version   = WOLFSSL_CACHE_VERSION;
     cache_header.rows      = SESSION_ROWS;
     cache_header.columns   = SESSIONS_PER_ROW;
-    cache_header.sessionSz = (int)sizeof(CYASSL_SESSION);
+    cache_header.sessionSz = (int)sizeof(WOLFSSL_SESSION);
 
     /* cache header */
     ret = (int)XFWRITE(&cache_header, sizeof cache_header, 1, file);
     if (ret != 1) {
-        CYASSL_MSG("Session cache header file write failed");
+        WOLFSSL_MSG("Session cache header file write failed");
         XFCLOSE(file);
         return FWRITE_ERROR;
     }
 
     if (LockMutex(&session_mutex) != 0) {
-        CYASSL_MSG("Session cache mutex lock failed");
+        WOLFSSL_MSG("Session cache mutex lock failed");
         XFCLOSE(file);
         return BAD_MUTEX_E;
     }
@@ -3725,7 +4409,7 @@ int CyaSSL_save_session_cache(const char *fname)
     for (i = 0; i < cache_header.rows; ++i) {
         ret = (int)XFWRITE(SessionCache + i, sizeof(SessionRow), 1, file);
         if (ret != 1) {
-            CYASSL_MSG("Session cache member file write failed");
+            WOLFSSL_MSG("Session cache member file write failed");
             rc = FWRITE_ERROR;
             break;
         }
@@ -3736,7 +4420,7 @@ int CyaSSL_save_session_cache(const char *fname)
     for (i = 0; i < cache_header.rows; ++i) {
         ret = (int)XFWRITE(ClientCache + i, sizeof(ClientRow), 1, file);
         if (ret != 1) {
-            CYASSL_MSG("Client cache member file write failed");
+            WOLFSSL_MSG("Client cache member file write failed");
             rc = FWRITE_ERROR;
             break;
         }
@@ -3746,7 +4430,7 @@ int CyaSSL_save_session_cache(const char *fname)
     UnLockMutex(&session_mutex);
 
     XFCLOSE(file);
-    CYASSL_LEAVE("CyaSSL_save_session_cache", rc);
+    WOLFSSL_LEAVE("wolfSSL_save_session_cache", rc);
 
     return rc;
 }
@@ -3754,7 +4438,7 @@ int CyaSSL_save_session_cache(const char *fname)
 
 /* Restore the persistant session cache from file */
 /* doesn't use memstore because of additional memory use */
-int CyaSSL_restore_session_cache(const char *fname)
+int wolfSSL_restore_session_cache(const char *fname)
 {
     XFILE  file;
     int    rc = SSL_SUCCESS;
@@ -3762,32 +4446,32 @@ int CyaSSL_restore_session_cache(const char *fname)
     int    i;
     cache_header_t cache_header;
 
-    CYASSL_ENTER("CyaSSL_restore_session_cache");
+    WOLFSSL_ENTER("wolfSSL_restore_session_cache");
 
     file = XFOPEN(fname, "rb");
     if (file == XBADFILE) {
-        CYASSL_MSG("Couldn't open session cache save file");
+        WOLFSSL_MSG("Couldn't open session cache save file");
         return SSL_BAD_FILE;
     }
     /* cache header */
     ret = (int)XFREAD(&cache_header, sizeof cache_header, 1, file);
     if (ret != 1) {
-        CYASSL_MSG("Session cache header file read failed");
+        WOLFSSL_MSG("Session cache header file read failed");
         XFCLOSE(file);
         return FREAD_ERROR;
     }
-    if (cache_header.version   != CYASSL_CACHE_VERSION ||
+    if (cache_header.version   != WOLFSSL_CACHE_VERSION ||
         cache_header.rows      != SESSION_ROWS ||
         cache_header.columns   != SESSIONS_PER_ROW ||
-        cache_header.sessionSz != (int)sizeof(CYASSL_SESSION)) {
+        cache_header.sessionSz != (int)sizeof(WOLFSSL_SESSION)) {
 
-        CYASSL_MSG("Session cache header match failed");
+        WOLFSSL_MSG("Session cache header match failed");
         XFCLOSE(file);
         return CACHE_MATCH_ERROR;
     }
 
     if (LockMutex(&session_mutex) != 0) {
-        CYASSL_MSG("Session cache mutex lock failed");
+        WOLFSSL_MSG("Session cache mutex lock failed");
         XFCLOSE(file);
         return BAD_MUTEX_E;
     }
@@ -3796,7 +4480,7 @@ int CyaSSL_restore_session_cache(const char *fname)
     for (i = 0; i < cache_header.rows; ++i) {
         ret = (int)XFREAD(SessionCache + i, sizeof(SessionRow), 1, file);
         if (ret != 1) {
-            CYASSL_MSG("Session cache member file read failed");
+            WOLFSSL_MSG("Session cache member file read failed");
             XMEMSET(SessionCache, 0, sizeof SessionCache);
             rc = FREAD_ERROR;
             break;
@@ -3808,7 +4492,7 @@ int CyaSSL_restore_session_cache(const char *fname)
     for (i = 0; i < cache_header.rows; ++i) {
         ret = (int)XFREAD(ClientCache + i, sizeof(ClientRow), 1, file);
         if (ret != 1) {
-            CYASSL_MSG("Client cache member file read failed");
+            WOLFSSL_MSG("Client cache member file read failed");
             XMEMSET(ClientCache, 0, sizeof ClientCache);
             rc = FREAD_ERROR;
             break;
@@ -3820,7 +4504,7 @@ int CyaSSL_restore_session_cache(const char *fname)
     UnLockMutex(&session_mutex);
 
     XFCLOSE(file);
-    CYASSL_LEAVE("CyaSSL_restore_session_cache", rc);
+    WOLFSSL_LEAVE("wolfSSL_restore_session_cache", rc);
 
     return rc;
 }
@@ -3830,26 +4514,46 @@ int CyaSSL_restore_session_cache(const char *fname)
 #endif /* NO_SESSION_CACHE */
 
 
-void CyaSSL_load_error_strings(void)   /* compatibility only */
+void wolfSSL_load_error_strings(void)   /* compatibility only */
 {}
 
 
-int CyaSSL_library_init(void)
+int wolfSSL_library_init(void)
 {
-    CYASSL_ENTER("SSL_library_init");
-    if (CyaSSL_Init() == SSL_SUCCESS)
+    WOLFSSL_ENTER("SSL_library_init");
+    if (wolfSSL_Init() == SSL_SUCCESS)
         return SSL_SUCCESS;
     else
         return SSL_FATAL_ERROR;
 }
 
 
+#ifdef HAVE_SECRET_CALLBACK
+
+int wolfSSL_set_session_secret_cb(WOLFSSL* ssl, SessionSecretCb cb, void* ctx)
+{
+    WOLFSSL_ENTER("wolfSSL_set_session_secret_cb");
+    if (ssl == NULL)
+        return SSL_FATAL_ERROR;
+
+    ssl->sessionSecretCb = cb;
+    ssl->sessionSecretCtx = ctx;
+    /* If using a pre-set key, assume session resumption. */
+    ssl->session.sessionIDSz = 0;
+    ssl->options.resuming = 1;
+
+    return SSL_SUCCESS;
+}
+
+#endif
+
+
 #ifndef NO_SESSION_CACHE
 
 /* on by default if built in but allow user to turn off */
-long CyaSSL_CTX_set_session_cache_mode(CYASSL_CTX* ctx, long mode)
+long wolfSSL_CTX_set_session_cache_mode(WOLFSSL_CTX* ctx, long mode)
 {
-    CYASSL_ENTER("SSL_CTX_set_session_cache_mode");
+    WOLFSSL_ENTER("SSL_CTX_set_session_cache_mode");
     if (mode == SSL_SESS_CACHE_OFF)
         ctx->sessionCacheOff = 1;
 
@@ -3866,7 +4570,7 @@ long CyaSSL_CTX_set_session_cache_mode(CYASSL_CTX* ctx, long mode)
 #if defined(PERSIST_CERT_CACHE)
 
 
-#define CYASSL_CACHE_CERT_VERSION 1
+#define WOLFSSL_CACHE_CERT_VERSION 1
 
 typedef struct {
     int version;                 /* cache cert layout version id */
@@ -3880,7 +4584,7 @@ typedef struct {
    1) CertCacheHeader
    2) caTable
 
-   update CYASSL_CERT_CACHE_VERSION if change layout for the following
+   update WOLFSSL_CERT_CACHE_VERSION if change layout for the following
    PERSIST_CERT_CACHE functions
 */
 
@@ -3918,7 +4622,7 @@ static INLINE int GetCertCacheRowMemory(Signer* row)
 
 
 /* get the size of persist cert cache, have lock */
-static INLINE int GetCertCacheMemSize(CYASSL_CERT_MANAGER* cm)
+static INLINE int GetCertCacheMemSize(WOLFSSL_CERT_MANAGER* cm)
 {
     int sz;
     int i;
@@ -3933,7 +4637,7 @@ static INLINE int GetCertCacheMemSize(CYASSL_CERT_MANAGER* cm)
 
 
 /* Store cert cache header columns with number of items per list, have lock */
-static INLINE void SetCertHeaderColumns(CYASSL_CERT_MANAGER* cm, int* columns)
+static INLINE void SetCertHeaderColumns(WOLFSSL_CERT_MANAGER* cm, int* columns)
 {
     int     i;
     Signer* row;
@@ -3953,13 +4657,13 @@ static INLINE void SetCertHeaderColumns(CYASSL_CERT_MANAGER* cm, int* columns)
 
 /* Restore whole cert row from memory, have lock, return bytes consumed,
    < 0 on error, have lock */
-static INLINE int RestoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current,
+static INLINE int RestoreCertRow(WOLFSSL_CERT_MANAGER* cm, byte* current,
                                  int row, int listSz, const byte* end)
 {
     int idx = 0;
 
     if (listSz < 0) {
-        CYASSL_MSG("Row header corrupted, negative value");
+        WOLFSSL_MSG("Row header corrupted, negative value");
         return PARSE_ERROR;
     }
 
@@ -3973,7 +4677,7 @@ static INLINE int RestoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current,
         #endif
 
         if (start + minSz > end) {
-            CYASSL_MSG("Would overread restore buffer");
+            WOLFSSL_MSG("Would overread restore buffer");
             return BUFFER_E;
         }
         signer = MakeSigner(cm->heap);
@@ -3990,7 +4694,7 @@ static INLINE int RestoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current,
 
         /* pulicKey */
         if (start + minSz + signer->pubKeySize > end) {
-            CYASSL_MSG("Would overread restore buffer");
+            WOLFSSL_MSG("Would overread restore buffer");
             FreeSigner(signer, cm->heap);
             return BUFFER_E;
         }
@@ -4010,7 +4714,7 @@ static INLINE int RestoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current,
 
         /* name */
         if (start + minSz + signer->pubKeySize + signer->nameLen > end) {
-            CYASSL_MSG("Would overread restore buffer");
+            WOLFSSL_MSG("Would overread restore buffer");
             FreeSigner(signer, cm->heap);
             return BUFFER_E;
         }
@@ -4045,7 +4749,7 @@ static INLINE int RestoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current,
 
 
 /* Store whole cert row into memory, have lock, return bytes added */
-static INLINE int StoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current, int row)
+static INLINE int StoreCertRow(WOLFSSL_CERT_MANAGER* cm, byte* current, int row)
 {
     int     added  = 0;
     Signer* list   = cm->caTable[row];
@@ -4082,24 +4786,24 @@ static INLINE int StoreCertRow(CYASSL_CERT_MANAGER* cm, byte* current, int row)
 
 
 /* Persist cert cache to memory, have lock */
-static INLINE int DoMemSaveCertCache(CYASSL_CERT_MANAGER* cm, void* mem, int sz)
+static INLINE int DoMemSaveCertCache(WOLFSSL_CERT_MANAGER* cm, void* mem, int sz)
 {
     int realSz;
     int ret = SSL_SUCCESS;
     int i;
 
-    CYASSL_ENTER("DoMemSaveCertCache");
+    WOLFSSL_ENTER("DoMemSaveCertCache");
 
     realSz = GetCertCacheMemSize(cm);
     if (realSz > sz) {
-        CYASSL_MSG("Mem output buffer too small");
+        WOLFSSL_MSG("Mem output buffer too small");
         ret = BUFFER_E;
     }
     else {
         byte*           current;
         CertCacheHeader hdr;
 
-        hdr.version  = CYASSL_CACHE_CERT_VERSION;
+        hdr.version  = WOLFSSL_CACHE_CERT_VERSION;
         hdr.rows     = CA_TABLE_SIZE;
         SetCertHeaderColumns(cm, hdr.columns);
         hdr.signerSz = (int)sizeof(Signer);
@@ -4118,23 +4822,23 @@ static INLINE int DoMemSaveCertCache(CYASSL_CERT_MANAGER* cm, void* mem, int sz)
 #if !defined(NO_FILESYSTEM)
 
 /* Persist cert cache to file */
-int CM_SaveCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
+int CM_SaveCertCache(WOLFSSL_CERT_MANAGER* cm, const char* fname)
 {
     XFILE file;
     int   rc = SSL_SUCCESS;
     int   memSz;
     byte* mem;
 
-    CYASSL_ENTER("CM_SaveCertCache");
+    WOLFSSL_ENTER("CM_SaveCertCache");
 
     file = XFOPEN(fname, "w+b");
     if (file == XBADFILE) {
-       CYASSL_MSG("Couldn't open cert cache save file");
+       WOLFSSL_MSG("Couldn't open cert cache save file");
        return SSL_BAD_FILE;
     }
 
     if (LockMutex(&cm->caLock) != 0) {
-        CYASSL_MSG("LockMutex on caLock failed");
+        WOLFSSL_MSG("LockMutex on caLock failed");
         XFCLOSE(file);
         return BAD_MUTEX_E;
     }
@@ -4142,14 +4846,14 @@ int CM_SaveCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
     memSz = GetCertCacheMemSize(cm);
     mem   = (byte*)XMALLOC(memSz, cm->heap, DYNAMIC_TYPE_TMP_BUFFER);
     if (mem == NULL) {
-        CYASSL_MSG("Alloc for tmp buffer failed");
+        WOLFSSL_MSG("Alloc for tmp buffer failed");
         rc = MEMORY_E;
     } else {
         rc = DoMemSaveCertCache(cm, mem, memSz);
         if (rc == SSL_SUCCESS) {
             int ret = (int)XFWRITE(mem, memSz, 1, file);
             if (ret != 1) {
-                CYASSL_MSG("Cert cache file write failed");
+                WOLFSSL_MSG("Cert cache file write failed");
                 rc = FWRITE_ERROR;
             }
         }
@@ -4164,7 +4868,7 @@ int CM_SaveCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
 
 
 /* Restore cert cache from file */
-int CM_RestoreCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
+int CM_RestoreCertCache(WOLFSSL_CERT_MANAGER* cm, const char* fname)
 {
     XFILE file;
     int   rc = SSL_SUCCESS;
@@ -4172,11 +4876,11 @@ int CM_RestoreCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
     int   memSz;
     byte* mem;
 
-    CYASSL_ENTER("CM_RestoreCertCache");
+    WOLFSSL_ENTER("CM_RestoreCertCache");
 
     file = XFOPEN(fname, "rb");
     if (file == XBADFILE) {
-       CYASSL_MSG("Couldn't open cert cache save file");
+       WOLFSSL_MSG("Couldn't open cert cache save file");
        return SSL_BAD_FILE;
     }
 
@@ -4185,26 +4889,26 @@ int CM_RestoreCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
     XREWIND(file);
 
     if (memSz <= 0) {
-        CYASSL_MSG("Bad file size");
+        WOLFSSL_MSG("Bad file size");
         XFCLOSE(file);
         return SSL_BAD_FILE;
     }
 
     mem = (byte*)XMALLOC(memSz, cm->heap, DYNAMIC_TYPE_TMP_BUFFER);
     if (mem == NULL) {
-        CYASSL_MSG("Alloc for tmp buffer failed");
+        WOLFSSL_MSG("Alloc for tmp buffer failed");
         XFCLOSE(file);
         return MEMORY_E;
     }
 
     ret = (int)XFREAD(mem, memSz, 1, file);
     if (ret != 1) {
-        CYASSL_MSG("Cert file read error");
+        WOLFSSL_MSG("Cert file read error");
         rc = FREAD_ERROR;
     } else {
         rc = CM_MemRestoreCertCache(cm, mem, memSz);
         if (rc != SSL_SUCCESS) {
-            CYASSL_MSG("Mem restore cert cache failed");
+            WOLFSSL_MSG("Mem restore cert cache failed");
         }
     }
 
@@ -4218,14 +4922,14 @@ int CM_RestoreCertCache(CYASSL_CERT_MANAGER* cm, const char* fname)
 
 
 /* Persist cert cache to memory */
-int CM_MemSaveCertCache(CYASSL_CERT_MANAGER* cm, void* mem, int sz, int* used)
+int CM_MemSaveCertCache(WOLFSSL_CERT_MANAGER* cm, void* mem, int sz, int* used)
 {
     int ret = SSL_SUCCESS;
 
-    CYASSL_ENTER("CM_MemSaveCertCache");
+    WOLFSSL_ENTER("CM_MemSaveCertCache");
 
     if (LockMutex(&cm->caLock) != 0) {
-        CYASSL_MSG("LockMutex on caLock failed");
+        WOLFSSL_MSG("LockMutex on caLock failed");
         return BAD_MUTEX_E;
     }
 
@@ -4240,7 +4944,7 @@ int CM_MemSaveCertCache(CYASSL_CERT_MANAGER* cm, void* mem, int sz, int* used)
 
 
 /* Restore cert cache from memory */
-int CM_MemRestoreCertCache(CYASSL_CERT_MANAGER* cm, const void* mem, int sz)
+int CM_MemRestoreCertCache(WOLFSSL_CERT_MANAGER* cm, const void* mem, int sz)
 {
     int ret = SSL_SUCCESS;
     int i;
@@ -4248,23 +4952,23 @@ int CM_MemRestoreCertCache(CYASSL_CERT_MANAGER* cm, const void* mem, int sz)
     byte*            current = (byte*)mem + sizeof(CertCacheHeader);
     byte*            end     = (byte*)mem + sz;  /* don't go over */
 
-    CYASSL_ENTER("CM_MemRestoreCertCache");
+    WOLFSSL_ENTER("CM_MemRestoreCertCache");
 
     if (current > end) {
-        CYASSL_MSG("Cert Cache Memory buffer too small");
+        WOLFSSL_MSG("Cert Cache Memory buffer too small");
         return BUFFER_E;
     }
 
-    if (hdr->version  != CYASSL_CACHE_CERT_VERSION ||
+    if (hdr->version  != WOLFSSL_CACHE_CERT_VERSION ||
         hdr->rows     != CA_TABLE_SIZE ||
         hdr->signerSz != (int)sizeof(Signer)) {
 
-        CYASSL_MSG("Cert Cache Memory header mismatch");
+        WOLFSSL_MSG("Cert Cache Memory header mismatch");
         return CACHE_MATCH_ERROR;
     }
 
     if (LockMutex(&cm->caLock) != 0) {
-        CYASSL_MSG("LockMutex on caLock failed");
+        WOLFSSL_MSG("LockMutex on caLock failed");
         return BAD_MUTEX_E;
     }
 
@@ -4273,7 +4977,7 @@ int CM_MemRestoreCertCache(CYASSL_CERT_MANAGER* cm, const void* mem, int sz)
     for (i = 0; i < CA_TABLE_SIZE; ++i) {
         int added = RestoreCertRow(cm, current, i, hdr->columns[i], end);
         if (added < 0) {
-            CYASSL_MSG("RestoreCertRow error");
+            WOLFSSL_MSG("RestoreCertRow error");
             ret = added;
             break;
         }
@@ -4287,14 +4991,14 @@ int CM_MemRestoreCertCache(CYASSL_CERT_MANAGER* cm, const void* mem, int sz)
 
 
 /* get how big the the cert cache save buffer needs to be */
-int CM_GetCertCacheMemSize(CYASSL_CERT_MANAGER* cm)
+int CM_GetCertCacheMemSize(WOLFSSL_CERT_MANAGER* cm)
 {
     int sz;
 
-    CYASSL_ENTER("CM_GetCertCacheMemSize");
+    WOLFSSL_ENTER("CM_GetCertCacheMemSize");
 
     if (LockMutex(&cm->caLock) != 0) {
-        CYASSL_MSG("LockMutex on caLock failed");
+        WOLFSSL_MSG("LockMutex on caLock failed");
         return BAD_MUTEX_E;
     }
 
@@ -4309,46 +5013,36 @@ int CM_GetCertCacheMemSize(CYASSL_CERT_MANAGER* cm)
 #endif /* NO_CERTS */
 
 
-int CyaSSL_CTX_set_cipher_list(CYASSL_CTX* ctx, const char* list)
+int wolfSSL_CTX_set_cipher_list(WOLFSSL_CTX* ctx, const char* list)
 {
-    CYASSL_ENTER("CyaSSL_CTX_set_cipher_list");
-    if (SetCipherList(&ctx->suites, list))
-        return SSL_SUCCESS;
-    else
-        return SSL_FAILURE;
-}
-
+    WOLFSSL_ENTER("wolfSSL_CTX_set_cipher_list");
 
-int CyaSSL_set_cipher_list(CYASSL* ssl, const char* list)
-{
-    CYASSL_ENTER("CyaSSL_set_cipher_list");
-    if (SetCipherList(ssl->suites, list)) {
-        byte haveRSA = 1;
-        byte havePSK = 0;
+    /* alloc/init on demand only */
+    if (ctx->suites == NULL) {
+        ctx->suites = (Suites*)XMALLOC(sizeof(Suites), ctx->heap,
+                                       DYNAMIC_TYPE_SUITES);
+        if (ctx->suites == NULL) {
+            WOLFSSL_MSG("Memory alloc for Suites failed");
+            return SSL_FAILURE;
+        }
+        XMEMSET(ctx->suites, 0, sizeof(Suites));
+    }
 
-        #ifdef NO_RSA
-            haveRSA = 0;
-        #endif
-        #ifndef NO_PSK
-            havePSK = ssl->options.havePSK;
-        #endif
+    return (SetCipherList(ctx->suites, list)) ? SSL_SUCCESS : SSL_FAILURE;
+}
 
-        InitSuites(ssl->suites, ssl->version, haveRSA, havePSK,
-                   ssl->options.haveDH, ssl->options.haveNTRU,
-                   ssl->options.haveECDSAsig, ssl->options.haveStaticECC,
-                   ssl->options.side);
 
-        return SSL_SUCCESS;
-    }
-    else
-        return SSL_FAILURE;
+int wolfSSL_set_cipher_list(WOLFSSL* ssl, const char* list)
+{
+    WOLFSSL_ENTER("wolfSSL_set_cipher_list");
+    return (SetCipherList(ssl->suites, list)) ? SSL_SUCCESS : SSL_FAILURE;
 }
 
 
-#ifndef CYASSL_LEANPSK
-#ifdef CYASSL_DTLS
+#ifndef WOLFSSL_LEANPSK
+#ifdef WOLFSSL_DTLS
 
-int CyaSSL_dtls_get_current_timeout(CYASSL* ssl)
+int wolfSSL_dtls_get_current_timeout(WOLFSSL* ssl)
 {
     (void)ssl;
 
@@ -4357,13 +5051,13 @@ int CyaSSL_dtls_get_current_timeout(CYASSL* ssl)
 
 
 /* user may need to alter init dtls recv timeout, SSL_SUCCESS on ok */
-int CyaSSL_dtls_set_timeout_init(CYASSL* ssl, int timeout)
+int wolfSSL_dtls_set_timeout_init(WOLFSSL* ssl, int timeout)
 {
     if (ssl == NULL || timeout < 0)
         return BAD_FUNC_ARG;
 
     if (timeout > ssl->dtls_timeout_max) {
-        CYASSL_MSG("Can't set dtls timeout init greater than dtls timeout max");
+        WOLFSSL_MSG("Can't set dtls timeout init greater than dtls timeout max");
         return BAD_FUNC_ARG;
     }
 
@@ -4375,13 +5069,13 @@ int CyaSSL_dtls_set_timeout_init(CYASSL* ssl, int timeout)
 
 
 /* user may need to alter max dtls recv timeout, SSL_SUCCESS on ok */
-int CyaSSL_dtls_set_timeout_max(CYASSL* ssl, int timeout)
+int wolfSSL_dtls_set_timeout_max(WOLFSSL* ssl, int timeout)
 {
     if (ssl == NULL || timeout < 0)
         return BAD_FUNC_ARG;
 
     if (timeout < ssl->dtls_timeout_init) {
-        CYASSL_MSG("Can't set dtls timeout max less than dtls timeout init");
+        WOLFSSL_MSG("Can't set dtls timeout max less than dtls timeout init");
         return BAD_FUNC_ARG;
     }
 
@@ -4391,7 +5085,7 @@ int CyaSSL_dtls_set_timeout_max(CYASSL* ssl, int timeout)
 }
 
 
-int CyaSSL_dtls_got_timeout(CYASSL* ssl)
+int wolfSSL_dtls_got_timeout(WOLFSSL* ssl)
 {
     int result = SSL_SUCCESS;
 
@@ -4408,39 +5102,42 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
 
 
 /* client only parts */
-#ifndef NO_CYASSL_CLIENT
+#ifndef NO_WOLFSSL_CLIENT
 
     #ifndef NO_OLD_TLS
-    CYASSL_METHOD* CyaSSLv3_client_method(void)
+    WOLFSSL_METHOD* wolfSSLv3_client_method(void)
     {
-        CYASSL_METHOD* method =
-                              (CYASSL_METHOD*) XMALLOC(sizeof(CYASSL_METHOD), 0,
+        WOLFSSL_METHOD* method =
+                              (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0,
                                                        DYNAMIC_TYPE_METHOD);
-        CYASSL_ENTER("SSLv3_client_method");
+        WOLFSSL_ENTER("SSLv3_client_method");
         if (method)
             InitSSL_Method(method, MakeSSLv3());
         return method;
     }
     #endif
 
-    #ifdef CYASSL_DTLS
-        CYASSL_METHOD* CyaDTLSv1_client_method(void)
+    #ifdef WOLFSSL_DTLS
+
+        #ifndef NO_OLD_TLS
+        WOLFSSL_METHOD* wolfDTLSv1_client_method(void)
         {
-            CYASSL_METHOD* method =
-                              (CYASSL_METHOD*) XMALLOC(sizeof(CYASSL_METHOD), 0,
+            WOLFSSL_METHOD* method =
+                              (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0,
                                                        DYNAMIC_TYPE_METHOD);
-            CYASSL_ENTER("DTLSv1_client_method");
+            WOLFSSL_ENTER("DTLSv1_client_method");
             if (method)
                 InitSSL_Method(method, MakeDTLSv1());
             return method;
         }
+        #endif  /* NO_OLD_TLS */
 
-        CYASSL_METHOD* CyaDTLSv1_2_client_method(void)
+        WOLFSSL_METHOD* wolfDTLSv1_2_client_method(void)
         {
-            CYASSL_METHOD* method =
-                              (CYASSL_METHOD*) XMALLOC(sizeof(CYASSL_METHOD), 0,
+            WOLFSSL_METHOD* method =
+                              (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0,
                                                        DYNAMIC_TYPE_METHOD);
-            CYASSL_ENTER("DTLSv1_2_client_method");
+            WOLFSSL_ENTER("DTLSv1_2_client_method");
             if (method)
                 InitSSL_Method(method, MakeDTLSv1_2());
             return method;
@@ -4449,22 +5146,22 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
 
 
     /* please see note at top of README if you get an error from connect */
-    int CyaSSL_connect(CYASSL* ssl)
+    int wolfSSL_connect(WOLFSSL* ssl)
     {
         int neededState;
 
-        CYASSL_ENTER("SSL_connect()");
+        WOLFSSL_ENTER("SSL_connect()");
 
         #ifdef HAVE_ERRNO_H
             errno = 0;
         #endif
 
-        if (ssl->options.side != CYASSL_CLIENT_END) {
-            CYASSL_ERROR(ssl->error = SIDE_ERROR);
+        if (ssl->options.side != WOLFSSL_CLIENT_END) {
+            WOLFSSL_ERROR(ssl->error = SIDE_ERROR);
             return SSL_FATAL_ERROR;
         }
 
-        #ifdef CYASSL_DTLS
+        #ifdef WOLFSSL_DTLS
             if (ssl->version.major == DTLS_MAJOR) {
                 ssl->options.dtls   = 1;
                 ssl->options.tls    = 1;
@@ -4472,7 +5169,7 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
 
                 if (DtlsPoolInit(ssl) != 0) {
                     ssl->error = MEMORY_ERROR;
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
             }
@@ -4481,10 +5178,10 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
         if (ssl->buffers.outputBuffer.length > 0) {
             if ( (ssl->error = SendBuffered(ssl)) == 0) {
                 ssl->options.connectState++;
-                CYASSL_MSG("connect state: Advanced from buffered send");
+                WOLFSSL_MSG("connect state: Advanced from buffered send");
             }
             else {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
         }
@@ -4494,16 +5191,16 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
         case CONNECT_BEGIN :
             /* always send client hello first */
             if ( (ssl->error = SendClientHello(ssl)) != 0) {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
             ssl->options.connectState = CLIENT_HELLO_SENT;
-            CYASSL_MSG("connect state: CLIENT_HELLO_SENT");
+            WOLFSSL_MSG("connect state: CLIENT_HELLO_SENT");
 
         case CLIENT_HELLO_SENT :
             neededState = ssl->options.resuming ? SERVER_FINISHED_COMPLETE :
                                           SERVER_HELLODONE_COMPLETE;
-            #ifdef CYASSL_DTLS
+            #ifdef WOLFSSL_DTLS
                 /* In DTLS, when resuming, we can go straight to FINISHED,
                  * or do a cookie exchange and then skip to FINISHED, assume
                  * we need the cookie exchange first. */
@@ -4513,7 +5210,7 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
             /* get response */
             while (ssl->options.serverState < neededState) {
                 if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
                 /* if resumption failed, reset needed state */
@@ -4527,50 +5224,58 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
             }
 
             ssl->options.connectState = HELLO_AGAIN;
-            CYASSL_MSG("connect state: HELLO_AGAIN");
+            WOLFSSL_MSG("connect state: HELLO_AGAIN");
 
         case HELLO_AGAIN :
             if (ssl->options.certOnly)
                 return SSL_SUCCESS;
 
-            #ifdef CYASSL_DTLS
+            #ifdef WOLFSSL_DTLS
                 if (ssl->options.dtls) {
                     /* re-init hashes, exclude first hello and verify request */
 #ifndef NO_OLD_TLS
-                    InitMd5(&ssl->hashMd5);
-                    if ( (ssl->error = InitSha(&ssl->hashSha)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                    wc_InitMd5(&ssl->hsHashes->hashMd5);
+                    if ( (ssl->error = wc_InitSha(&ssl->hsHashes->hashSha))
+                                                                         != 0) {
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
 #endif
                     if (IsAtLeastTLSv1_2(ssl)) {
                         #ifndef NO_SHA256
-                            if ( (ssl->error =
-                                           InitSha256(&ssl->hashSha256)) != 0) {
-                                CYASSL_ERROR(ssl->error);
+                            if ( (ssl->error = wc_InitSha256(
+                                            &ssl->hsHashes->hashSha256)) != 0) {
+                                WOLFSSL_ERROR(ssl->error);
+                                return SSL_FATAL_ERROR;
+                            }
+                        #endif
+                        #ifdef WOLFSSL_SHA384
+                            if ( (ssl->error = wc_InitSha384(
+                                            &ssl->hsHashes->hashSha384)) != 0) {
+                                WOLFSSL_ERROR(ssl->error);
                                 return SSL_FATAL_ERROR;
                             }
                         #endif
-                        #ifdef CYASSL_SHA384
-                            if ( (ssl->error =
-                                           InitSha384(&ssl->hashSha384)) != 0) {
-                                CYASSL_ERROR(ssl->error);
+                        #ifdef WOLFSSL_SHA512
+                            if ( (ssl->error = wc_InitSha512(
+                                            &ssl->hsHashes->hashSha512)) != 0) {
+                                WOLFSSL_ERROR(ssl->error);
                                 return SSL_FATAL_ERROR;
                             }
                         #endif
                     }
                     if ( (ssl->error = SendClientHello(ssl)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
                 }
             #endif
 
             ssl->options.connectState = HELLO_AGAIN_REPLY;
-            CYASSL_MSG("connect state: HELLO_AGAIN_REPLY");
+            WOLFSSL_MSG("connect state: HELLO_AGAIN_REPLY");
 
         case HELLO_AGAIN_REPLY :
-            #ifdef CYASSL_DTLS
+            #ifdef WOLFSSL_DTLS
                 if (ssl->options.dtls) {
                     neededState = ssl->options.resuming ?
                            SERVER_FINISHED_COMPLETE : SERVER_HELLODONE_COMPLETE;
@@ -4578,7 +5283,7 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
                     /* get response */
                     while (ssl->options.serverState < neededState) {
                         if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                                CYASSL_ERROR(ssl->error);
+                                WOLFSSL_ERROR(ssl->error);
                                 return SSL_FATAL_ERROR;
                         }
                         /* if resumption failed, reset needed state */
@@ -4590,142 +5295,156 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
             #endif
 
             ssl->options.connectState = FIRST_REPLY_DONE;
-            CYASSL_MSG("connect state: FIRST_REPLY_DONE");
+            WOLFSSL_MSG("connect state: FIRST_REPLY_DONE");
 
         case FIRST_REPLY_DONE :
             #ifndef NO_CERTS
                 if (ssl->options.sendVerify) {
                     if ( (ssl->error = SendCertificate(ssl)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
-                    CYASSL_MSG("sent: certificate");
+                    WOLFSSL_MSG("sent: certificate");
                 }
 
             #endif
             ssl->options.connectState = FIRST_REPLY_FIRST;
-            CYASSL_MSG("connect state: FIRST_REPLY_FIRST");
+            WOLFSSL_MSG("connect state: FIRST_REPLY_FIRST");
 
         case FIRST_REPLY_FIRST :
             if (!ssl->options.resuming) {
                 if ( (ssl->error = SendClientKeyExchange(ssl)) != 0) {
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
-                CYASSL_MSG("sent: client key exchange");
+                WOLFSSL_MSG("sent: client key exchange");
             }
 
             ssl->options.connectState = FIRST_REPLY_SECOND;
-            CYASSL_MSG("connect state: FIRST_REPLY_SECOND");
+            WOLFSSL_MSG("connect state: FIRST_REPLY_SECOND");
 
         case FIRST_REPLY_SECOND :
             #ifndef NO_CERTS
                 if (ssl->options.sendVerify) {
                     if ( (ssl->error = SendCertificateVerify(ssl)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
-                    CYASSL_MSG("sent: certificate verify");
+                    WOLFSSL_MSG("sent: certificate verify");
                 }
             #endif
             ssl->options.connectState = FIRST_REPLY_THIRD;
-            CYASSL_MSG("connect state: FIRST_REPLY_THIRD");
+            WOLFSSL_MSG("connect state: FIRST_REPLY_THIRD");
 
         case FIRST_REPLY_THIRD :
             if ( (ssl->error = SendChangeCipher(ssl)) != 0) {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
-            CYASSL_MSG("sent: change cipher spec");
+            WOLFSSL_MSG("sent: change cipher spec");
             ssl->options.connectState = FIRST_REPLY_FOURTH;
-            CYASSL_MSG("connect state: FIRST_REPLY_FOURTH");
+            WOLFSSL_MSG("connect state: FIRST_REPLY_FOURTH");
 
         case FIRST_REPLY_FOURTH :
             if ( (ssl->error = SendFinished(ssl)) != 0) {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
-            CYASSL_MSG("sent: finished");
+            WOLFSSL_MSG("sent: finished");
             ssl->options.connectState = FINISHED_DONE;
-            CYASSL_MSG("connect state: FINISHED_DONE");
+            WOLFSSL_MSG("connect state: FINISHED_DONE");
 
         case FINISHED_DONE :
             /* get response */
             while (ssl->options.serverState < SERVER_FINISHED_COMPLETE)
                 if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
 
             ssl->options.connectState = SECOND_REPLY_DONE;
-            CYASSL_MSG("connect state: SECOND_REPLY_DONE");
+            WOLFSSL_MSG("connect state: SECOND_REPLY_DONE");
 
         case SECOND_REPLY_DONE:
+#ifndef NO_HANDSHAKE_DONE_CB
+            if (ssl->hsDoneCb) {
+                int cbret = ssl->hsDoneCb(ssl, ssl->hsDoneCtx);
+                if (cbret < 0) {
+                    ssl->error = cbret;
+                    WOLFSSL_MSG("HandShake Done Cb don't continue error");
+                    return SSL_FATAL_ERROR;
+                }
+            }
+#endif /* NO_HANDSHAKE_DONE_CB */
             FreeHandshakeResources(ssl);
-            CYASSL_LEAVE("SSL_connect()", SSL_SUCCESS);
+            WOLFSSL_LEAVE("SSL_connect()", SSL_SUCCESS);
             return SSL_SUCCESS;
 
         default:
-            CYASSL_MSG("Unknown connect state ERROR");
+            WOLFSSL_MSG("Unknown connect state ERROR");
             return SSL_FATAL_ERROR; /* unknown connect state */
         }
     }
 
-#endif /* NO_CYASSL_CLIENT */
+#endif /* NO_WOLFSSL_CLIENT */
 
 
 /* server only parts */
-#ifndef NO_CYASSL_SERVER
+#ifndef NO_WOLFSSL_SERVER
 
     #ifndef NO_OLD_TLS
-    CYASSL_METHOD* CyaSSLv3_server_method(void)
+    WOLFSSL_METHOD* wolfSSLv3_server_method(void)
     {
-        CYASSL_METHOD* method =
-                              (CYASSL_METHOD*) XMALLOC(sizeof(CYASSL_METHOD), 0,
+        WOLFSSL_METHOD* method =
+                              (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0,
                                                        DYNAMIC_TYPE_METHOD);
-        CYASSL_ENTER("SSLv3_server_method");
+        WOLFSSL_ENTER("SSLv3_server_method");
         if (method) {
             InitSSL_Method(method, MakeSSLv3());
-            method->side = CYASSL_SERVER_END;
+            method->side = WOLFSSL_SERVER_END;
         }
         return method;
     }
     #endif
 
 
-    #ifdef CYASSL_DTLS
-        CYASSL_METHOD* CyaDTLSv1_server_method(void)
+    #ifdef WOLFSSL_DTLS
+
+        #ifndef NO_OLD_TLS
+        WOLFSSL_METHOD* wolfDTLSv1_server_method(void)
         {
-            CYASSL_METHOD* method =
-                              (CYASSL_METHOD*) XMALLOC(sizeof(CYASSL_METHOD), 0,
-                                                       DYNAMIC_TYPE_METHOD);
-            CYASSL_ENTER("DTLSv1_server_method");
+            WOLFSSL_METHOD* method =
+                              (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD),
+                                                        0, DYNAMIC_TYPE_METHOD);
+            WOLFSSL_ENTER("DTLSv1_server_method");
             if (method) {
                 InitSSL_Method(method, MakeDTLSv1());
-                method->side = CYASSL_SERVER_END;
+                method->side = WOLFSSL_SERVER_END;
             }
             return method;
         }
+        #endif /* NO_OLD_TLS */
 
-        CYASSL_METHOD* CyaDTLSv1_2_server_method(void)
+        WOLFSSL_METHOD* wolfDTLSv1_2_server_method(void)
         {
-            CYASSL_METHOD* method =
-                              (CYASSL_METHOD*) XMALLOC(sizeof(CYASSL_METHOD), 0,
-                                                       DYNAMIC_TYPE_METHOD);
-            CYASSL_ENTER("DTLSv1_2_server_method");
+            WOLFSSL_METHOD* method =
+                              (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD),
+                                                        0, DYNAMIC_TYPE_METHOD);
+            WOLFSSL_ENTER("DTLSv1_2_server_method");
             if (method) {
                 InitSSL_Method(method, MakeDTLSv1_2());
-                method->side = CYASSL_SERVER_END;
+                method->side = WOLFSSL_SERVER_END;
             }
             return method;
         }
     #endif
 
 
-    int CyaSSL_accept(CYASSL* ssl)
+    int wolfSSL_accept(WOLFSSL* ssl)
     {
         byte havePSK = 0;
-        CYASSL_ENTER("SSL_accept()");
+        byte haveAnon = 0;
+        WOLFSSL_ENTER("SSL_accept()");
 
         #ifdef HAVE_ERRNO_H
             errno = 0;
@@ -4736,36 +5455,29 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
         #endif
         (void)havePSK;
 
-        if (ssl->options.side != CYASSL_SERVER_END) {
-            CYASSL_ERROR(ssl->error = SIDE_ERROR);
+        #ifdef HAVE_ANON
+            haveAnon = ssl->options.haveAnon;
+        #endif
+        (void)haveAnon;
+
+        if (ssl->options.side != WOLFSSL_SERVER_END) {
+            WOLFSSL_ERROR(ssl->error = SIDE_ERROR);
             return SSL_FATAL_ERROR;
         }
 
         #ifndef NO_CERTS
             /* in case used set_accept_state after init */
-            if (!havePSK && (ssl->buffers.certificate.buffer == NULL ||
+            if (!havePSK && !haveAnon &&
+                            (ssl->buffers.certificate.buffer == NULL ||
                              ssl->buffers.key.buffer == NULL)) {
-                CYASSL_MSG("accept error: don't have server cert and key");
+                WOLFSSL_MSG("accept error: don't have server cert and key");
                 ssl->error = NO_PRIVATE_KEY;
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
         #endif
 
-        #ifdef HAVE_ECC
-            /* in case used set_accept_state after init */
-            if (ssl->eccTempKeyPresent == 0) {
-                if (ecc_make_key(ssl->rng, ssl->eccTempKeySz,
-                                 ssl->eccTempKey) != 0) {
-                    ssl->error = ECC_MAKEKEY_ERROR;
-                    CYASSL_ERROR(ssl->error);
-                    return SSL_FATAL_ERROR;
-                }
-                ssl->eccTempKeyPresent = 1;
-            }
-        #endif
-
-        #ifdef CYASSL_DTLS
+        #ifdef WOLFSSL_DTLS
             if (ssl->version.major == DTLS_MAJOR) {
                 ssl->options.dtls   = 1;
                 ssl->options.tls    = 1;
@@ -4773,7 +5485,7 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
 
                 if (DtlsPoolInit(ssl) != 0) {
                     ssl->error = MEMORY_ERROR;
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
             }
@@ -4782,10 +5494,10 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
         if (ssl->buffers.outputBuffer.length > 0) {
             if ( (ssl->error = SendBuffered(ssl)) == 0) {
                 ssl->options.acceptState++;
-                CYASSL_MSG("accept state: Advanced from buffered send");
+                WOLFSSL_MSG("accept state: Advanced from buffered send");
             }
             else {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
         }
@@ -4796,47 +5508,57 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
             /* get response */
             while (ssl->options.clientState < CLIENT_HELLO_COMPLETE)
                 if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
             ssl->options.acceptState = ACCEPT_CLIENT_HELLO_DONE;
-            CYASSL_MSG("accept state ACCEPT_CLIENT_HELLO_DONE");
+            WOLFSSL_MSG("accept state ACCEPT_CLIENT_HELLO_DONE");
 
         case ACCEPT_CLIENT_HELLO_DONE :
-            #ifdef CYASSL_DTLS
+            #ifdef WOLFSSL_DTLS
                 if (ssl->options.dtls)
                     if ( (ssl->error = SendHelloVerifyRequest(ssl)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
             #endif
             ssl->options.acceptState = HELLO_VERIFY_SENT;
-            CYASSL_MSG("accept state HELLO_VERIFY_SENT");
+            WOLFSSL_MSG("accept state HELLO_VERIFY_SENT");
 
         case HELLO_VERIFY_SENT:
-            #ifdef CYASSL_DTLS
+            #ifdef WOLFSSL_DTLS
                 if (ssl->options.dtls) {
                     ssl->options.clientState = NULL_STATE;  /* get again */
+                    /* reset messages received */
+                    XMEMSET(&ssl->msgsReceived, 0, sizeof(ssl->msgsReceived));
                     /* re-init hashes, exclude first hello and verify request */
 #ifndef NO_OLD_TLS
-                    InitMd5(&ssl->hashMd5);
-                    if ( (ssl->error = InitSha(&ssl->hashSha)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                    wc_InitMd5(&ssl->hsHashes->hashMd5);
+                    if ( (ssl->error = wc_InitSha(&ssl->hsHashes->hashSha))
+                                                                         != 0) {
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
 #endif
                     if (IsAtLeastTLSv1_2(ssl)) {
                         #ifndef NO_SHA256
-                            if ( (ssl->error =
-                                           InitSha256(&ssl->hashSha256)) != 0) {
-                               CYASSL_ERROR(ssl->error);
+                            if ( (ssl->error = wc_InitSha256(
+                                            &ssl->hsHashes->hashSha256)) != 0) {
+                               WOLFSSL_ERROR(ssl->error);
+                               return SSL_FATAL_ERROR;
+                            }
+                        #endif
+                        #ifdef WOLFSSL_SHA384
+                            if ( (ssl->error = wc_InitSha384(
+                                            &ssl->hsHashes->hashSha384)) != 0) {
+                               WOLFSSL_ERROR(ssl->error);
                                return SSL_FATAL_ERROR;
                             }
                         #endif
-                        #ifdef CYASSL_SHA384
-                            if ( (ssl->error =
-                                           InitSha384(&ssl->hashSha384)) != 0) {
-                               CYASSL_ERROR(ssl->error);
+                        #ifdef WOLFSSL_SHA512
+                            if ( (ssl->error = wc_InitSha512(
+                                            &ssl->hsHashes->hashSha512)) != 0) {
+                               WOLFSSL_ERROR(ssl->error);
                                return SSL_FATAL_ERROR;
                             }
                         #endif
@@ -4844,128 +5566,169 @@ int CyaSSL_dtls_got_timeout(CYASSL* ssl)
 
                     while (ssl->options.clientState < CLIENT_HELLO_COMPLETE)
                         if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                            CYASSL_ERROR(ssl->error);
+                            WOLFSSL_ERROR(ssl->error);
                             return SSL_FATAL_ERROR;
                         }
                 }
             #endif
             ssl->options.acceptState = ACCEPT_FIRST_REPLY_DONE;
-            CYASSL_MSG("accept state ACCEPT_FIRST_REPLY_DONE");
+            WOLFSSL_MSG("accept state ACCEPT_FIRST_REPLY_DONE");
 
         case ACCEPT_FIRST_REPLY_DONE :
             if ( (ssl->error = SendServerHello(ssl)) != 0) {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
             ssl->options.acceptState = SERVER_HELLO_SENT;
-            CYASSL_MSG("accept state SERVER_HELLO_SENT");
+            WOLFSSL_MSG("accept state SERVER_HELLO_SENT");
 
         case SERVER_HELLO_SENT :
             #ifndef NO_CERTS
                 if (!ssl->options.resuming)
                     if ( (ssl->error = SendCertificate(ssl)) != 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
             #endif
             ssl->options.acceptState = CERT_SENT;
-            CYASSL_MSG("accept state CERT_SENT");
+            WOLFSSL_MSG("accept state CERT_SENT");
 
         case CERT_SENT :
             if (!ssl->options.resuming)
                 if ( (ssl->error = SendServerKeyExchange(ssl)) != 0) {
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
             ssl->options.acceptState = KEY_EXCHANGE_SENT;
-            CYASSL_MSG("accept state KEY_EXCHANGE_SENT");
+            WOLFSSL_MSG("accept state KEY_EXCHANGE_SENT");
 
         case KEY_EXCHANGE_SENT :
             #ifndef NO_CERTS
                 if (!ssl->options.resuming)
                     if (ssl->options.verifyPeer)
                         if ( (ssl->error = SendCertificateRequest(ssl)) != 0) {
-                            CYASSL_ERROR(ssl->error);
+                            WOLFSSL_ERROR(ssl->error);
                             return SSL_FATAL_ERROR;
                         }
             #endif
             ssl->options.acceptState = CERT_REQ_SENT;
-            CYASSL_MSG("accept state CERT_REQ_SENT");
+            WOLFSSL_MSG("accept state CERT_REQ_SENT");
 
         case CERT_REQ_SENT :
             if (!ssl->options.resuming)
                 if ( (ssl->error = SendServerHelloDone(ssl)) != 0) {
-                    CYASSL_ERROR(ssl->error);
+                    WOLFSSL_ERROR(ssl->error);
                     return SSL_FATAL_ERROR;
                 }
             ssl->options.acceptState = SERVER_HELLO_DONE;
-            CYASSL_MSG("accept state SERVER_HELLO_DONE");
+            WOLFSSL_MSG("accept state SERVER_HELLO_DONE");
 
         case SERVER_HELLO_DONE :
             if (!ssl->options.resuming) {
                 while (ssl->options.clientState < CLIENT_FINISHED_COMPLETE)
                     if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
             }
             ssl->options.acceptState = ACCEPT_SECOND_REPLY_DONE;
-            CYASSL_MSG("accept state  ACCEPT_SECOND_REPLY_DONE");
+            WOLFSSL_MSG("accept state  ACCEPT_SECOND_REPLY_DONE");
 
         case ACCEPT_SECOND_REPLY_DONE :
+#ifdef HAVE_SESSION_TICKET
+            if (ssl->options.createTicket) {
+                if ( (ssl->error = SendTicket(ssl)) != 0) {
+                    WOLFSSL_ERROR(ssl->error);
+                    return SSL_FATAL_ERROR;
+                }
+            }
+#endif /* HAVE_SESSION_TICKET */
+            ssl->options.acceptState = TICKET_SENT;
+            WOLFSSL_MSG("accept state  TICKET_SENT");
+
+        case TICKET_SENT:
             if ( (ssl->error = SendChangeCipher(ssl)) != 0) {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
             ssl->options.acceptState = CHANGE_CIPHER_SENT;
-            CYASSL_MSG("accept state  CHANGE_CIPHER_SENT");
+            WOLFSSL_MSG("accept state  CHANGE_CIPHER_SENT");
 
         case CHANGE_CIPHER_SENT :
             if ( (ssl->error = SendFinished(ssl)) != 0) {
-                CYASSL_ERROR(ssl->error);
+                WOLFSSL_ERROR(ssl->error);
                 return SSL_FATAL_ERROR;
             }
 
             ssl->options.acceptState = ACCEPT_FINISHED_DONE;
-            CYASSL_MSG("accept state ACCEPT_FINISHED_DONE");
+            WOLFSSL_MSG("accept state ACCEPT_FINISHED_DONE");
 
         case ACCEPT_FINISHED_DONE :
             if (ssl->options.resuming)
                 while (ssl->options.clientState < CLIENT_FINISHED_COMPLETE)
                     if ( (ssl->error = ProcessReply(ssl)) < 0) {
-                        CYASSL_ERROR(ssl->error);
+                        WOLFSSL_ERROR(ssl->error);
                         return SSL_FATAL_ERROR;
                     }
 
             ssl->options.acceptState = ACCEPT_THIRD_REPLY_DONE;
-            CYASSL_MSG("accept state ACCEPT_THIRD_REPLY_DONE");
+            WOLFSSL_MSG("accept state ACCEPT_THIRD_REPLY_DONE");
 
         case ACCEPT_THIRD_REPLY_DONE :
+#ifndef NO_HANDSHAKE_DONE_CB
+            if (ssl->hsDoneCb) {
+                int cbret = ssl->hsDoneCb(ssl, ssl->hsDoneCtx);
+                if (cbret < 0) {
+                    ssl->error = cbret;
+                    WOLFSSL_MSG("HandShake Done Cb don't continue error");
+                    return SSL_FATAL_ERROR;
+                }
+            }
+#endif /* NO_HANDSHAKE_DONE_CB */
             FreeHandshakeResources(ssl);
-            CYASSL_LEAVE("SSL_accept()", SSL_SUCCESS);
+            WOLFSSL_LEAVE("SSL_accept()", SSL_SUCCESS);
             return SSL_SUCCESS;
 
         default :
-            CYASSL_MSG("Unknown accept state ERROR");
+            WOLFSSL_MSG("Unknown accept state ERROR");
             return SSL_FATAL_ERROR;
         }
     }
 
-#endif /* NO_CYASSL_SERVER */
+#endif /* NO_WOLFSSL_SERVER */
 
 
-int CyaSSL_Cleanup(void)
+#ifndef NO_HANDSHAKE_DONE_CB
+
+int wolfSSL_SetHsDoneCb(WOLFSSL* ssl, HandShakeDoneCb cb, void* user_ctx)
+{
+    WOLFSSL_ENTER("wolfSSL_SetHsDoneCb");
+
+    if (ssl == NULL)
+        return BAD_FUNC_ARG;
+
+    ssl->hsDoneCb  = cb;
+    ssl->hsDoneCtx = user_ctx;
+
+
+    return SSL_SUCCESS;
+}
+
+#endif /* NO_HANDSHAKE_DONE_CB */
+
+
+int wolfSSL_Cleanup(void)
 {
     int ret = SSL_SUCCESS;
     int release = 0;
 
-    CYASSL_ENTER("CyaSSL_Cleanup");
+    WOLFSSL_ENTER("wolfSSL_Cleanup");
 
     if (initRefCount == 0)
         return ret;  /* possibly no init yet, but not failure either way */
 
     if (LockMutex(&count_mutex) != 0) {
-        CYASSL_MSG("Bad Lock Mutex count");
+        WOLFSSL_MSG("Bad Lock Mutex count");
         return BAD_MUTEX_E;
     }
 
@@ -4986,7 +5749,7 @@ int CyaSSL_Cleanup(void)
         ret = BAD_MUTEX_E;
 
 #if defined(HAVE_ECC) && defined(FP_ECC)
-    ecc_fp_free();
+    wc_ecc_fp_free();
 #endif
 
     return ret;
@@ -4995,81 +5758,27 @@ int CyaSSL_Cleanup(void)
 
 #ifndef NO_SESSION_CACHE
 
-#ifndef NO_MD5
 
 /* some session IDs aren't random afterall, let's make them random */
-
 static INLINE word32 HashSession(const byte* sessionID, word32 len, int* error)
 {
-    byte digest[MD5_DIGEST_SIZE];
-    Md5  md5;
-
-    (void)error;
-
-    InitMd5(&md5);
-    Md5Update(&md5, sessionID, len);
-    Md5Final(&md5, digest);
-
-    return MakeWordFromHash(digest);
-}
+    byte digest[MAX_DIGEST_SIZE];
 
+#ifndef NO_MD5
+    *error =  wc_Md5Hash(sessionID, len, digest);
 #elif !defined(NO_SHA)
-
-/* 0 on failure */
-static INLINE word32 HashSession(const byte* sessionID, word32 len, int* error)
-{
-    byte digest[SHA_DIGEST_SIZE];
-    Sha  sha;
-    int  ret = 0;
-
-    ret = InitSha(&sha);
-    if (ret != 0) {
-        *error = ret;
-        return 0;
-    }
-    ShaUpdate(&sha, sessionID, len);
-    ShaFinal(&sha, digest);
-
-    return MakeWordFromHash(digest);
-}
-
+    *error =  wc_ShaHash(sessionID, len, digest);
 #elif !defined(NO_SHA256)
-
-static INLINE word32 HashSession(const byte* sessionID, word32 len, int* error)
-{
-    byte    digest[SHA256_DIGEST_SIZE];
-    Sha256  sha256;
-    int     ret;
-
-    ret = InitSha256(&sha256);
-    if (ret != 0) {
-        *error = ret;
-        return 0;
-    }
-
-    ret = Sha256Update(&sha256, sessionID, len);
-    if (ret != 0) {
-        *error = ret;
-        return 0;
-    }
-
-    ret = Sha256Final(&sha256, digest);
-    if (ret != 0) {
-        *error = ret;
-        return 0;
-    }
-
-    return MakeWordFromHash(digest);
-}
-
+    *error =  wc_Sha256Hash(sessionID, len, digest);
 #else
+    #error "We need a digest to hash the session IDs"
+#endif
 
-#error "We need a digest to hash the session IDs"
-
-#endif /* NO_MD5 */
+    return *error == 0 ? MakeWordFromHash(digest) : 0; /* 0 on failure */
+}
 
 
-void CyaSSL_flush_sessions(CYASSL_CTX* ctx, long tm)
+void wolfSSL_flush_sessions(WOLFSSL_CTX* ctx, long tm)
 {
     /* static table now, no flusing needed */
     (void)ctx;
@@ -5078,7 +5787,7 @@ void CyaSSL_flush_sessions(CYASSL_CTX* ctx, long tm)
 
 
 /* set ssl session timeout in seconds */
-int CyaSSL_set_timeout(CYASSL* ssl, unsigned int to)
+int wolfSSL_set_timeout(WOLFSSL* ssl, unsigned int to)
 {
     if (ssl == NULL)
         return BAD_FUNC_ARG;
@@ -5090,7 +5799,7 @@ int CyaSSL_set_timeout(CYASSL* ssl, unsigned int to)
 
 
 /* set ctx session timeout in seconds */
-int CyaSSL_CTX_set_timeout(CYASSL_CTX* ctx, unsigned int to)
+int wolfSSL_CTX_set_timeout(WOLFSSL_CTX* ctx, unsigned int to)
 {
     if (ctx == NULL)
         return BAD_FUNC_ARG;
@@ -5104,28 +5813,28 @@ int CyaSSL_CTX_set_timeout(CYASSL_CTX* ctx, unsigned int to)
 #ifndef NO_CLIENT_CACHE
 
 /* Get Session from Client cache based on id/len, return NULL on failure */
-CYASSL_SESSION* GetSessionClient(CYASSL* ssl, const byte* id, int len)
+WOLFSSL_SESSION* GetSessionClient(WOLFSSL* ssl, const byte* id, int len)
 {
-    CYASSL_SESSION* ret = NULL;
+    WOLFSSL_SESSION* ret = NULL;
     word32          row;
     int             idx;
     int             count;
     int             error = 0;
 
-    CYASSL_ENTER("GetSessionClient");
+    WOLFSSL_ENTER("GetSessionClient");
 
-    if (ssl->options.side == CYASSL_SERVER_END)
+    if (ssl->options.side == WOLFSSL_SERVER_END)
         return NULL;
 
     len = min(SERVER_ID_LEN, (word32)len);
     row = HashSession(id, len, &error) % SESSION_ROWS;
     if (error != 0) {
-        CYASSL_MSG("Hash session failed");
+        WOLFSSL_MSG("Hash session failed");
         return NULL;
     }
 
     if (LockMutex(&session_mutex) != 0) {
-        CYASSL_MSG("Lock session mutex failed");
+        WOLFSSL_MSG("Lock session mutex failed");
         return NULL;
     }
 
@@ -5136,11 +5845,11 @@ CYASSL_SESSION* GetSessionClient(CYASSL* ssl, const byte* id, int len)
         idx = SESSIONS_PER_ROW - 1; /* if back to front, the previous was end */
 
     for (; count > 0; --count, idx = idx ? idx - 1 : SESSIONS_PER_ROW - 1) {
-        CYASSL_SESSION* current;
+        WOLFSSL_SESSION* current;
         ClientSession   clSess;
 
         if (idx >= SESSIONS_PER_ROW || idx < 0) { /* sanity check */
-            CYASSL_MSG("Bad idx");
+            WOLFSSL_MSG("Bad idx");
             break;
         }
 
@@ -5148,16 +5857,16 @@ CYASSL_SESSION* GetSessionClient(CYASSL* ssl, const byte* id, int len)
 
         current = &SessionCache[clSess.serverRow].Sessions[clSess.serverIdx];
         if (XMEMCMP(current->serverID, id, len) == 0) {
-            CYASSL_MSG("Found a serverid match for client");
+            WOLFSSL_MSG("Found a serverid match for client");
             if (LowResTimer() < (current->bornOn + current->timeout)) {
-                CYASSL_MSG("Session valid");
+                WOLFSSL_MSG("Session valid");
                 ret = current;
                 break;
             } else {
-                CYASSL_MSG("Session timed out");  /* could have more for id */
+                WOLFSSL_MSG("Session timed out");  /* could have more for id */
             }
         } else {
-            CYASSL_MSG("ServerID not a match from client table");
+            WOLFSSL_MSG("ServerID not a match from client table");
         }
     }
 
@@ -5169,9 +5878,9 @@ CYASSL_SESSION* GetSessionClient(CYASSL* ssl, const byte* id, int len)
 #endif /* NO_CLIENT_CACHE */
 
 
-CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
+WOLFSSL_SESSION* GetSession(WOLFSSL* ssl, byte* masterSecret)
 {
-    CYASSL_SESSION* ret = 0;
+    WOLFSSL_SESSION* ret = 0;
     const byte*  id = NULL;
     word32       row;
     int          idx;
@@ -5184,6 +5893,11 @@ CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
     if (ssl->options.haveSessionId == 0)
         return NULL;
 
+#ifdef HAVE_SESSION_TICKET
+    if (ssl->options.side == WOLFSSL_SERVER_END && ssl->options.useTicket == 1)
+        return NULL;
+#endif
+
     if (ssl->arrays)
         id = ssl->arrays->sessionID;
     else
@@ -5191,7 +5905,7 @@ CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
 
     row = HashSession(id, ID_LEN, &error) % SESSION_ROWS;
     if (error != 0) {
-        CYASSL_MSG("Hash session failed");
+        WOLFSSL_MSG("Hash session failed");
         return NULL;
     }
 
@@ -5205,27 +5919,27 @@ CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
         idx = SESSIONS_PER_ROW - 1; /* if back to front, the previous was end */
 
     for (; count > 0; --count, idx = idx ? idx - 1 : SESSIONS_PER_ROW - 1) {
-        CYASSL_SESSION* current;
+        WOLFSSL_SESSION* current;
 
         if (idx >= SESSIONS_PER_ROW || idx < 0) { /* sanity check */
-            CYASSL_MSG("Bad idx");
+            WOLFSSL_MSG("Bad idx");
             break;
         }
 
         current = &SessionCache[row].Sessions[idx];
         if (XMEMCMP(current->sessionID, id, ID_LEN) == 0) {
-            CYASSL_MSG("Found a session match");
+            WOLFSSL_MSG("Found a session match");
             if (LowResTimer() < (current->bornOn + current->timeout)) {
-                CYASSL_MSG("Session valid");
+                WOLFSSL_MSG("Session valid");
                 ret = current;
                 if (masterSecret)
                     XMEMCPY(masterSecret, current->masterSecret, SECRET_LEN);
             } else {
-                CYASSL_MSG("Session timed out");
+                WOLFSSL_MSG("Session timed out");
             }
             break;  /* no more sessionIDs whether valid or not that match */
         } else {
-            CYASSL_MSG("SessionID not a match at this idx");
+            WOLFSSL_MSG("SessionID not a match at this idx");
         }
     }
 
@@ -5235,7 +5949,7 @@ CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
 }
 
 
-int SetSession(CYASSL* ssl, CYASSL_SESSION* session)
+int SetSession(WOLFSSL* ssl, WOLFSSL_SESSION* session)
 {
     if (ssl->options.sessionCacheOff)
         return SSL_FAILURE;
@@ -5256,7 +5970,12 @@ int SetSession(CYASSL* ssl, CYASSL_SESSION* session)
 }
 
 
-int AddSession(CYASSL* ssl)
+#ifdef WOLFSSL_SESSION_STATS
+static int get_locked_session_stats(word32* active, word32* total,
+                                    word32* peak);
+#endif
+
+int AddSession(WOLFSSL* ssl)
 {
     word32 row, idx;
     int    error = 0;
@@ -5267,9 +5986,14 @@ int AddSession(CYASSL* ssl)
     if (ssl->options.haveSessionId == 0)
         return 0;
 
+#ifdef HAVE_SESSION_TICKET
+    if (ssl->options.side == WOLFSSL_SERVER_END && ssl->options.useTicket == 1)
+        return 0;
+#endif
+
     row = HashSession(ssl->arrays->sessionID, ID_LEN, &error) % SESSION_ROWS;
     if (error != 0) {
-        CYASSL_MSG("Hash session failed");
+        WOLFSSL_MSG("Hash session failed");
         return error;
     }
 
@@ -5285,10 +6009,17 @@ int AddSession(CYASSL* ssl)
            ssl->arrays->masterSecret, SECRET_LEN);
     XMEMCPY(SessionCache[row].Sessions[idx].sessionID, ssl->arrays->sessionID,
            ID_LEN);
+    SessionCache[row].Sessions[idx].sessionIDSz = ssl->arrays->sessionIDSz;
 
     SessionCache[row].Sessions[idx].timeout = ssl->timeout;
     SessionCache[row].Sessions[idx].bornOn  = LowResTimer();
 
+#ifdef HAVE_SESSION_TICKET
+    SessionCache[row].Sessions[idx].ticketLen     = ssl->session.ticketLen;
+    XMEMCPY(SessionCache[row].Sessions[idx].ticket,
+                                   ssl->session.ticket, ssl->session.ticketLen);
+#endif
+
 #ifdef SESSION_CERTS
     SessionCache[row].Sessions[idx].chain.count = ssl->session.chain.count;
     XMEMCPY(SessionCache[row].Sessions[idx].chain.certs,
@@ -5304,10 +6035,10 @@ int AddSession(CYASSL* ssl)
         SessionCache[row].nextIdx = 0;
 
 #ifndef NO_CLIENT_CACHE
-    if (ssl->options.side == CYASSL_CLIENT_END && ssl->session.idLen) {
+    if (ssl->options.side == WOLFSSL_CLIENT_END && ssl->session.idLen) {
         word32 clientRow, clientIdx;
 
-        CYASSL_MSG("Adding client cache entry");
+        WOLFSSL_MSG("Adding client cache entry");
 
         SessionCache[row].Sessions[idx].idLen = ssl->session.idLen;
         XMEMCPY(SessionCache[row].Sessions[idx].serverID, ssl->session.serverID,
@@ -5316,44 +6047,58 @@ int AddSession(CYASSL* ssl)
         clientRow = HashSession(ssl->session.serverID, ssl->session.idLen,
                                 &error) % SESSION_ROWS;
         if (error != 0) {
-            CYASSL_MSG("Hash session failed");
-            return error;
-        }
-        clientIdx = ClientCache[clientRow].nextIdx++;
+            WOLFSSL_MSG("Hash session failed");
+        } else {
+            clientIdx = ClientCache[clientRow].nextIdx++;
 
-        ClientCache[clientRow].Clients[clientIdx].serverRow = (word16)row;
-        ClientCache[clientRow].Clients[clientIdx].serverIdx = (word16)idx;
+            ClientCache[clientRow].Clients[clientIdx].serverRow = (word16)row;
+            ClientCache[clientRow].Clients[clientIdx].serverIdx = (word16)idx;
 
-        ClientCache[clientRow].totalCount++;
-        if (ClientCache[clientRow].nextIdx == SESSIONS_PER_ROW)
-            ClientCache[clientRow].nextIdx = 0;
+            ClientCache[clientRow].totalCount++;
+            if (ClientCache[clientRow].nextIdx == SESSIONS_PER_ROW)
+                ClientCache[clientRow].nextIdx = 0;
+        }
     }
     else
         SessionCache[row].Sessions[idx].idLen = 0;
 #endif /* NO_CLIENT_CACHE */
 
+#if defined(WOLFSSL_SESSION_STATS) && defined(WOLFSSL_PEAK_SESSIONS)
+    if (error == 0) {
+        word32 active = 0;
+
+        error = get_locked_session_stats(&active, NULL, NULL);
+        if (error == SSL_SUCCESS) {
+            error = 0;  /* back to this function ok */
+
+            if (active > PeakSessions)
+                PeakSessions = active;
+        }
+    }
+#endif /* defined(WOLFSSL_SESSION_STATS) && defined(WOLFSSL_PEAK_SESSIONS) */
+
     if (UnLockMutex(&session_mutex) != 0)
         return BAD_MUTEX_E;
 
-    return 0;
+    return error;
 }
 
 
 #ifdef SESSION_INDEX
 
-int CyaSSL_GetSessionIndex(CYASSL* ssl)
+int wolfSSL_GetSessionIndex(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("CyaSSL_GetSessionIndex");
-    CYASSL_LEAVE("CyaSSL_GetSessionIndex", ssl->sessionIndex);
+    WOLFSSL_ENTER("wolfSSL_GetSessionIndex");
+    WOLFSSL_LEAVE("wolfSSL_GetSessionIndex", ssl->sessionIndex);
     return ssl->sessionIndex;
 }
 
 
-int CyaSSL_GetSessionAtIndex(int idx, CYASSL_SESSION* session)
+int wolfSSL_GetSessionAtIndex(int idx, WOLFSSL_SESSION* session)
 {
     int row, col, result = SSL_FAILURE;
 
-    CYASSL_ENTER("CyaSSL_GetSessionAtIndex");
+    WOLFSSL_ENTER("wolfSSL_GetSessionAtIndex");
 
     row = idx >> SESSIDX_ROW_SHIFT;
     col = idx & SESSIDX_IDX_MASK;
@@ -5365,14 +6110,14 @@ int CyaSSL_GetSessionAtIndex(int idx, CYASSL_SESSION* session)
     if (row < SESSION_ROWS &&
         col < (int)min(SessionCache[row].totalCount, SESSIONS_PER_ROW)) {
         XMEMCPY(session,
-                 &SessionCache[row].Sessions[col], sizeof(CYASSL_SESSION));
+                 &SessionCache[row].Sessions[col], sizeof(WOLFSSL_SESSION));
         result = SSL_SUCCESS;
     }
 
     if (UnLockMutex(&session_mutex) != 0)
         result = BAD_MUTEX_E;
 
-    CYASSL_LEAVE("CyaSSL_GetSessionAtIndex", result);
+    WOLFSSL_LEAVE("wolfSSL_GetSessionAtIndex", result);
     return result;
 }
 
@@ -5380,48 +6125,140 @@ int CyaSSL_GetSessionAtIndex(int idx, CYASSL_SESSION* session)
 
 #if defined(SESSION_INDEX) && defined(SESSION_CERTS)
 
-CYASSL_X509_CHAIN* CyaSSL_SESSION_get_peer_chain(CYASSL_SESSION* session)
+WOLFSSL_X509_CHAIN* wolfSSL_SESSION_get_peer_chain(WOLFSSL_SESSION* session)
 {
-    CYASSL_X509_CHAIN* chain = NULL;
+    WOLFSSL_X509_CHAIN* chain = NULL;
 
-    CYASSL_ENTER("CyaSSL_SESSION_get_peer_chain");
+    WOLFSSL_ENTER("wolfSSL_SESSION_get_peer_chain");
     if (session)
         chain = &session->chain;
 
-    CYASSL_LEAVE("CyaSSL_SESSION_get_peer_chain", chain ? 1 : 0);
+    WOLFSSL_LEAVE("wolfSSL_SESSION_get_peer_chain", chain ? 1 : 0);
     return chain;
 }
 
 #endif /* SESSION_INDEX && SESSION_CERTS */
 
 
-    #ifdef SESSION_STATS
+#ifdef WOLFSSL_SESSION_STATS
+
+/* requires session_mutex lock held, SSL_SUCCESS on ok */
+static int get_locked_session_stats(word32* active, word32* total, word32* peak)
+{
+    int result = SSL_SUCCESS;
+    int i;
+    int count;
+    int idx;
+    word32 now   = 0;
+    word32 seen  = 0;
+    word32 ticks = LowResTimer();
+
+    (void)peak;
+
+    WOLFSSL_ENTER("get_locked_session_stats");
+
+    for (i = 0; i < SESSION_ROWS; i++) {
+        seen += SessionCache[i].totalCount;
+
+        if (active == NULL)
+            continue;  /* no need to calculate what we can't set */
+
+        count = min((word32)SessionCache[i].totalCount, SESSIONS_PER_ROW);
+        idx   = SessionCache[i].nextIdx - 1;
+        if (idx < 0)
+            idx = SESSIONS_PER_ROW - 1; /* if back to front previous was end */
+
+        for (; count > 0; --count, idx = idx ? idx - 1 : SESSIONS_PER_ROW - 1) {
+            if (idx >= SESSIONS_PER_ROW || idx < 0) {  /* sanity check */
+                WOLFSSL_MSG("Bad idx");
+                break;
+            }
+
+            /* if not expried then good */
+            if (ticks < (SessionCache[i].Sessions[idx].bornOn +
+                         SessionCache[i].Sessions[idx].timeout) ) {
+                now++;
+            }
+        }
+    }
+
+    if (active)
+        *active = now;
+
+    if (total)
+        *total = seen;
+
+#ifdef WOLFSSL_PEAK_SESSIONS
+    if (peak)
+        *peak = PeakSessions;
+#endif
+
+    WOLFSSL_LEAVE("get_locked_session_stats", result);
+
+    return result;
+}
+
+
+/* return SSL_SUCCESS on ok */
+int wolfSSL_get_session_stats(word32* active, word32* total, word32* peak,
+                              word32* maxSessions)
+{
+    int result = SSL_SUCCESS;
+
+    WOLFSSL_ENTER("wolfSSL_get_session_stats");
+
+    if (maxSessions) {
+        *maxSessions = SESSIONS_PER_ROW * SESSION_ROWS;
+
+        if (active == NULL && total == NULL && peak == NULL)
+            return result;  /* we're done */
+    }
+
+    /* user must provide at least one query value */
+    if (active == NULL && total == NULL && peak == NULL)
+        return BAD_FUNC_ARG;
+
+    if (LockMutex(&session_mutex) != 0) {
+        return BAD_MUTEX_E;
+    }
+
+    result = get_locked_session_stats(active, total, peak);
+
+    if (UnLockMutex(&session_mutex) != 0)
+        result = BAD_MUTEX_E;
+
+    WOLFSSL_LEAVE("wolfSSL_get_session_stats", result);
+
+    return result;
+}
+
+#endif /* WOLFSSL_SESSION_STATS */
+
+
+    #ifdef PRINT_SESSION_STATS
 
-    CYASSL_API
-    void PrintSessionStats(void)
+    /* SSL_SUCCESS on ok */
+    int wolfSSL_PrintSessionStats(void)
     {
         word32 totalSessionsSeen = 0;
         word32 totalSessionsNow = 0;
-        word32 rowNow;
+        word32 peak = 0;
+        word32 maxSessions = 0;
         int    i;
+        int    ret;
         double E;               /* expected freq */
         double chiSquare = 0;
 
-        for (i = 0; i < SESSION_ROWS; i++) {
-            totalSessionsSeen += SessionCache[i].totalCount;
-
-            if (SessionCache[i].totalCount >= SESSIONS_PER_ROW)
-                rowNow = SESSIONS_PER_ROW;
-            else if (SessionCache[i].nextIdx == 0)
-                rowNow = 0;
-            else
-                rowNow = SessionCache[i].nextIdx;
-
-            totalSessionsNow += rowNow;
-        }
-
+        ret = wolfSSL_get_session_stats(&totalSessionsNow, &totalSessionsSeen,
+                                        &peak, &maxSessions);
+        if (ret != SSL_SUCCESS)
+            return ret;
         printf("Total Sessions Seen = %d\n", totalSessionsSeen);
         printf("Total Sessions Now  = %d\n", totalSessionsNow);
+#ifdef WOLFSSL_PEAK_SESSIONS
+        printf("Peak  Sessions      = %d\n", peak);
+#endif
+        printf("Max   Sessions      = %d\n", maxSessions);
 
         E = (double)totalSessionsSeen / SESSION_ROWS;
 
@@ -5434,17 +6271,20 @@ CYASSL_X509_CHAIN* CyaSSL_SESSION_get_peer_chain(CYASSL_SESSION* session)
         }
         printf("  chi-square = %5.1f, d.f. = %d\n", chiSquare,
                                                      SESSION_ROWS - 1);
-        if (SESSION_ROWS == 11)
+        #if (SESSION_ROWS == 11)
             printf(" .05 p value =  18.3, chi-square should be less\n");
-        else if (SESSION_ROWS == 211)
+        #elif (SESSION_ROWS == 211)
             printf(".05 p value  = 244.8, chi-square should be less\n");
-        else if (SESSION_ROWS == 5981)
+        #elif (SESSION_ROWS == 5981)
             printf(".05 p value  = 6161.0, chi-square should be less\n");
-        else if (SESSION_ROWS == 3)
+        #elif (SESSION_ROWS == 3)
             printf(".05 p value  =   6.0, chi-square should be less\n");
-        else if (SESSION_ROWS == 2861)
+        #elif (SESSION_ROWS == 2861)
             printf(".05 p value  = 2985.5, chi-square should be less\n");
+        #endif
         printf("\n");
+
+        return ret;
     }
 
     #endif /* SESSION_STATS */
@@ -5452,7 +6292,7 @@ CYASSL_X509_CHAIN* CyaSSL_SESSION_get_peer_chain(CYASSL_SESSION* session)
 #else  /* NO_SESSION_CACHE */
 
 /* No session cache version */
-CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
+WOLFSSL_SESSION* GetSession(WOLFSSL* ssl, byte* masterSecret)
 {
     (void)ssl;
     (void)masterSecret;
@@ -5465,9 +6305,9 @@ CYASSL_SESSION* GetSession(CYASSL* ssl, byte* masterSecret)
 
 /* call before SSL_connect, if verifying will add name check to
    date check and signature check */
-int CyaSSL_check_domain_name(CYASSL* ssl, const char* dn)
+int wolfSSL_check_domain_name(WOLFSSL* ssl, const char* dn)
 {
-    CYASSL_ENTER("CyaSSL_check_domain_name");
+    WOLFSSL_ENTER("wolfSSL_check_domain_name");
     if (ssl->buffers.domainName.buffer)
         XFREE(ssl->buffers.domainName.buffer, ssl->heap, DYNAMIC_TYPE_DOMAIN);
 
@@ -5487,12 +6327,12 @@ int CyaSSL_check_domain_name(CYASSL* ssl, const char* dn)
 }
 
 
-/* turn on CyaSSL zlib compression
+/* turn on wolfSSL zlib compression
    returns SSL_SUCCESS for success, else error (not built in)
 */
-int CyaSSL_set_compression(CYASSL* ssl)
+int wolfSSL_set_compression(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("CyaSSL_set_compression");
+    WOLFSSL_ENTER("wolfSSL_set_compression");
     (void)ssl;
 #ifdef HAVE_LIBZ
     ssl->options.usingCompression = 1;
@@ -5508,28 +6348,32 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
         /* simulate writev semantics, doesn't actually do block at a time though
            because of SSL_write behavior and because front adds may be small */
-        int CyaSSL_writev(CYASSL* ssl, const struct iovec* iov, int iovcnt)
+        int wolfSSL_writev(WOLFSSL* ssl, const struct iovec* iov, int iovcnt)
         {
-            byte  tmp[FILE_BUFFER_SIZE];
-            byte* myBuffer    = tmp;
+        #ifdef WOLFSSL_SMALL_STACK
+            byte   staticBuffer[1]; /* force heap usage */
+        #else
+            byte   staticBuffer[FILE_BUFFER_SIZE];
+        #endif
+            byte* myBuffer  = staticBuffer;
+            int   dynamic   = 0;
             int   sending   = 0;
-            int   newBuffer = 0;
             int   idx       = 0;
             int   i;
             int   ret;
 
-            CYASSL_ENTER("CyaSSL_writev");
+            WOLFSSL_ENTER("wolfSSL_writev");
 
             for (i = 0; i < iovcnt; i++)
                 sending += (int)iov[i].iov_len;
 
-            if (sending > (int)sizeof(tmp)) {
-                byte* tmp2 = (byte*) XMALLOC(sending, ssl->heap,
-                                             DYNAMIC_TYPE_WRITEV);
-                if (!tmp2)
+            if (sending > (int)sizeof(staticBuffer)) {
+                myBuffer = (byte*)XMALLOC(sending, ssl->heap,
+                                                           DYNAMIC_TYPE_WRITEV);
+                if (!myBuffer)
                     return MEMORY_ERROR;
-                myBuffer = tmp2;
-                newBuffer = 1;
+
+                dynamic = 1;
             }
 
             for (i = 0; i < iovcnt; i++) {
@@ -5537,9 +6381,10 @@ int CyaSSL_set_compression(CYASSL* ssl)
                 idx += (int)iov[i].iov_len;
             }
 
-            ret = CyaSSL_write(ssl, myBuffer, sending);
+            ret = wolfSSL_write(ssl, myBuffer, sending);
 
-            if (newBuffer) XFREE(myBuffer, ssl->heap, DYNAMIC_TYPE_WRITEV);
+            if (dynamic)
+                XFREE(myBuffer, ssl->heap, DYNAMIC_TYPE_WRITEV);
 
             return ret;
         }
@@ -5547,7 +6392,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
 #endif
 
 
-#ifdef CYASSL_CALLBACKS
+#ifdef WOLFSSL_CALLBACKS
 
     typedef struct itimerval Itimerval;
 
@@ -5589,7 +6434,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    static int CyaSSL_ex_wrapper(CYASSL* ssl, HandShakeCallBack hsCb,
+    static int wolfSSL_ex_wrapper(WOLFSSL* ssl, HandShakeCallBack hsCb,
                                  TimeoutCallBack toCb, Timeval timeout)
     {
         int       ret        = SSL_FATAL_ERROR;
@@ -5649,13 +6494,13 @@ int CyaSSL_set_compression(CYASSL* ssl)
         }
 
         /* do main work */
-#ifndef NO_CYASSL_CLIENT
-        if (ssl->options.side == CYASSL_CLIENT_END)
-            ret = CyaSSL_connect(ssl);
+#ifndef NO_WOLFSSL_CLIENT
+        if (ssl->options.side == WOLFSSL_CLIENT_END)
+            ret = wolfSSL_connect(ssl);
 #endif
-#ifndef NO_CYASSL_SERVER
-        if (ssl->options.side == CYASSL_SERVER_END)
-            ret = CyaSSL_accept(ssl);
+#ifndef NO_WOLFSSL_SERVER
+        if (ssl->options.side == WOLFSSL_SERVER_END)
+            ret = wolfSSL_accept(ssl);
 #endif
 
         /* do callbacks */
@@ -5701,48 +6546,48 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-#ifndef NO_CYASSL_CLIENT
+#ifndef NO_WOLFSSL_CLIENT
 
-    int CyaSSL_connect_ex(CYASSL* ssl, HandShakeCallBack hsCb,
+    int wolfSSL_connect_ex(WOLFSSL* ssl, HandShakeCallBack hsCb,
                           TimeoutCallBack toCb, Timeval timeout)
     {
-        CYASSL_ENTER("CyaSSL_connect_ex");
-        return CyaSSL_ex_wrapper(ssl, hsCb, toCb, timeout);
+        WOLFSSL_ENTER("wolfSSL_connect_ex");
+        return wolfSSL_ex_wrapper(ssl, hsCb, toCb, timeout);
     }
 
 #endif
 
 
-#ifndef NO_CYASSL_SERVER
+#ifndef NO_WOLFSSL_SERVER
 
-    int CyaSSL_accept_ex(CYASSL* ssl, HandShakeCallBack hsCb,
+    int wolfSSL_accept_ex(WOLFSSL* ssl, HandShakeCallBack hsCb,
                          TimeoutCallBack toCb,Timeval timeout)
     {
-        CYASSL_ENTER("CyaSSL_accept_ex");
-        return CyaSSL_ex_wrapper(ssl, hsCb, toCb, timeout);
+        WOLFSSL_ENTER("wolfSSL_accept_ex");
+        return wolfSSL_ex_wrapper(ssl, hsCb, toCb, timeout);
     }
 
 #endif
 
-#endif /* CYASSL_CALLBACKS */
+#endif /* WOLFSSL_CALLBACKS */
 
 
 #ifndef NO_PSK
 
-    void CyaSSL_CTX_set_psk_client_callback(CYASSL_CTX* ctx,
+    void wolfSSL_CTX_set_psk_client_callback(WOLFSSL_CTX* ctx,
                                          psk_client_callback cb)
     {
-        CYASSL_ENTER("SSL_CTX_set_psk_client_callback");
+        WOLFSSL_ENTER("SSL_CTX_set_psk_client_callback");
         ctx->havePSK = 1;
         ctx->client_psk_cb = cb;
     }
 
 
-    void CyaSSL_set_psk_client_callback(CYASSL* ssl, psk_client_callback cb)
+    void wolfSSL_set_psk_client_callback(WOLFSSL* ssl, psk_client_callback cb)
     {
         byte haveRSA = 1;
 
-        CYASSL_ENTER("SSL_set_psk_client_callback");
+        WOLFSSL_ENTER("SSL_set_psk_client_callback");
         ssl->options.havePSK = 1;
         ssl->options.client_psk_cb = cb;
 
@@ -5756,20 +6601,20 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    void CyaSSL_CTX_set_psk_server_callback(CYASSL_CTX* ctx,
+    void wolfSSL_CTX_set_psk_server_callback(WOLFSSL_CTX* ctx,
                                          psk_server_callback cb)
     {
-        CYASSL_ENTER("SSL_CTX_set_psk_server_callback");
+        WOLFSSL_ENTER("SSL_CTX_set_psk_server_callback");
         ctx->havePSK = 1;
         ctx->server_psk_cb = cb;
     }
 
 
-    void CyaSSL_set_psk_server_callback(CYASSL* ssl, psk_server_callback cb)
+    void wolfSSL_set_psk_server_callback(WOLFSSL* ssl, psk_server_callback cb)
     {
         byte haveRSA = 1;
 
-        CYASSL_ENTER("SSL_set_psk_server_callback");
+        WOLFSSL_ENTER("SSL_set_psk_server_callback");
         ssl->options.havePSK = 1;
         ssl->options.server_psk_cb = cb;
 
@@ -5783,9 +6628,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    const char* CyaSSL_get_psk_identity_hint(const CYASSL* ssl)
+    const char* wolfSSL_get_psk_identity_hint(const WOLFSSL* ssl)
     {
-        CYASSL_ENTER("SSL_get_psk_identity_hint");
+        WOLFSSL_ENTER("SSL_get_psk_identity_hint");
 
         if (ssl == NULL || ssl->arrays == NULL)
             return NULL;
@@ -5794,9 +6639,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    const char* CyaSSL_get_psk_identity(const CYASSL* ssl)
+    const char* wolfSSL_get_psk_identity(const WOLFSSL* ssl)
     {
-        CYASSL_ENTER("SSL_get_psk_identity");
+        WOLFSSL_ENTER("SSL_get_psk_identity");
 
         if (ssl == NULL || ssl->arrays == NULL)
             return NULL;
@@ -5805,9 +6650,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_CTX_use_psk_identity_hint(CYASSL_CTX* ctx, const char* hint)
+    int wolfSSL_CTX_use_psk_identity_hint(WOLFSSL_CTX* ctx, const char* hint)
     {
-        CYASSL_ENTER("SSL_CTX_use_psk_identity_hint");
+        WOLFSSL_ENTER("SSL_CTX_use_psk_identity_hint");
         if (hint == 0)
             ctx->server_hint[0] = 0;
         else {
@@ -5818,9 +6663,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_use_psk_identity_hint(CYASSL* ssl, const char* hint)
+    int wolfSSL_use_psk_identity_hint(WOLFSSL* ssl, const char* hint)
     {
-        CYASSL_ENTER("SSL_use_psk_identity_hint");
+        WOLFSSL_ENTER("SSL_use_psk_identity_hint");
 
         if (ssl == NULL || ssl->arrays == NULL)
             return SSL_FAILURE;
@@ -5837,14 +6682,31 @@ int CyaSSL_set_compression(CYASSL* ssl)
 #endif /* NO_PSK */
 
 
+#ifdef HAVE_ANON
+
+    int wolfSSL_CTX_allow_anon_cipher(WOLFSSL_CTX* ctx)
+    {
+        WOLFSSL_ENTER("wolfSSL_CTX_allow_anon_cipher");
+
+        if (ctx == NULL)
+            return SSL_FAILURE;
+
+        ctx->haveAnon = 1;
+
+        return SSL_SUCCESS;
+    }
+
+#endif /* HAVE_ANON */
+
+
 #ifndef NO_CERTS
 /* used to be defined on NO_FILESYSTEM only, but are generally useful */
 
-    /* CyaSSL extension allows DER files to be loaded from buffers as well */
-    int CyaSSL_CTX_load_verify_buffer(CYASSL_CTX* ctx, const unsigned char* in,
+    /* wolfSSL extension allows DER files to be loaded from buffers as well */
+    int wolfSSL_CTX_load_verify_buffer(WOLFSSL_CTX* ctx, const unsigned char* in,
                                       long sz, int format)
     {
-        CYASSL_ENTER("CyaSSL_CTX_load_verify_buffer");
+        WOLFSSL_ENTER("wolfSSL_CTX_load_verify_buffer");
         if (format == SSL_FILETYPE_PEM)
             return ProcessChainBuffer(ctx, in, sz, format, CA_TYPE, NULL);
         else
@@ -5852,51 +6714,51 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_CTX_use_certificate_buffer(CYASSL_CTX* ctx,
+    int wolfSSL_CTX_use_certificate_buffer(WOLFSSL_CTX* ctx,
                                  const unsigned char* in, long sz, int format)
     {
-        CYASSL_ENTER("CyaSSL_CTX_use_certificate_buffer");
+        WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_buffer");
         return ProcessBuffer(ctx, in, sz, format, CERT_TYPE, NULL, NULL, 0);
     }
 
 
-    int CyaSSL_CTX_use_PrivateKey_buffer(CYASSL_CTX* ctx,
+    int wolfSSL_CTX_use_PrivateKey_buffer(WOLFSSL_CTX* ctx,
                                  const unsigned char* in, long sz, int format)
     {
-        CYASSL_ENTER("CyaSSL_CTX_use_PrivateKey_buffer");
+        WOLFSSL_ENTER("wolfSSL_CTX_use_PrivateKey_buffer");
         return ProcessBuffer(ctx, in, sz, format, PRIVATEKEY_TYPE, NULL,NULL,0);
     }
 
 
-    int CyaSSL_CTX_use_certificate_chain_buffer(CYASSL_CTX* ctx,
+    int wolfSSL_CTX_use_certificate_chain_buffer(WOLFSSL_CTX* ctx,
                                  const unsigned char* in, long sz)
     {
-        CYASSL_ENTER("CyaSSL_CTX_use_certificate_chain_buffer");
+        WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_chain_buffer");
         return ProcessBuffer(ctx, in, sz, SSL_FILETYPE_PEM, CERT_TYPE, NULL,
                              NULL, 1);
     }
 
-    int CyaSSL_use_certificate_buffer(CYASSL* ssl,
+    int wolfSSL_use_certificate_buffer(WOLFSSL* ssl,
                                  const unsigned char* in, long sz, int format)
     {
-        CYASSL_ENTER("CyaSSL_use_certificate_buffer");
+        WOLFSSL_ENTER("wolfSSL_use_certificate_buffer");
         return ProcessBuffer(ssl->ctx, in, sz, format,CERT_TYPE,ssl,NULL,0);
     }
 
 
-    int CyaSSL_use_PrivateKey_buffer(CYASSL* ssl,
+    int wolfSSL_use_PrivateKey_buffer(WOLFSSL* ssl,
                                  const unsigned char* in, long sz, int format)
     {
-        CYASSL_ENTER("CyaSSL_use_PrivateKey_buffer");
+        WOLFSSL_ENTER("wolfSSL_use_PrivateKey_buffer");
         return ProcessBuffer(ssl->ctx, in, sz, format, PRIVATEKEY_TYPE,
                              ssl, NULL, 0);
     }
 
 
-    int CyaSSL_use_certificate_chain_buffer(CYASSL* ssl,
+    int wolfSSL_use_certificate_chain_buffer(WOLFSSL* ssl,
                                  const unsigned char* in, long sz)
     {
-        CYASSL_ENTER("CyaSSL_use_certificate_chain_buffer");
+        WOLFSSL_ENTER("wolfSSL_use_certificate_chain_buffer");
         return ProcessBuffer(ssl->ctx, in, sz, SSL_FILETYPE_PEM, CERT_TYPE,
                              ssl, NULL, 1);
     }
@@ -5904,15 +6766,15 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
     /* unload any certs or keys that SSL owns, leave CTX as is
        SSL_SUCCESS on ok */
-    int CyaSSL_UnloadCertsKeys(CYASSL* ssl)
+    int wolfSSL_UnloadCertsKeys(WOLFSSL* ssl)
     {
         if (ssl == NULL) {
-            CYASSL_MSG("Null function arg");
+            WOLFSSL_MSG("Null function arg");
             return BAD_FUNC_ARG;
         }
 
         if (ssl->buffers.weOwnCert) {
-            CYASSL_MSG("Unloading cert");
+            WOLFSSL_MSG("Unloading cert");
             XFREE(ssl->buffers.certificate.buffer, ssl->heap,DYNAMIC_TYPE_CERT);
             ssl->buffers.weOwnCert = 0;
             ssl->buffers.certificate.length = 0;
@@ -5920,7 +6782,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
         }
 
         if (ssl->buffers.weOwnCertChain) {
-            CYASSL_MSG("Unloading cert chain");
+            WOLFSSL_MSG("Unloading cert chain");
             XFREE(ssl->buffers.certChain.buffer, ssl->heap,DYNAMIC_TYPE_CERT);
             ssl->buffers.weOwnCertChain = 0;
             ssl->buffers.certChain.length = 0;
@@ -5928,7 +6790,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
         }
 
         if (ssl->buffers.weOwnKey) {
-            CYASSL_MSG("Unloading key");
+            WOLFSSL_MSG("Unloading key");
             XFREE(ssl->buffers.key.buffer, ssl->heap, DYNAMIC_TYPE_KEY);
             ssl->buffers.weOwnKey = 0;
             ssl->buffers.key.length = 0;
@@ -5939,14 +6801,14 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_CTX_UnloadCAs(CYASSL_CTX* ctx)
+    int wolfSSL_CTX_UnloadCAs(WOLFSSL_CTX* ctx)
     {
-        CYASSL_ENTER("CyaSSL_CTX_UnloadCAs");
+        WOLFSSL_ENTER("wolfSSL_CTX_UnloadCAs");
 
         if (ctx == NULL)
             return BAD_FUNC_ARG;
 
-        return CyaSSL_CertManagerUnloadCAs(ctx->cm);
+        return wolfSSL_CertManagerUnloadCAs(ctx->cm);
     }
 
 /* old NO_FILESYSTEM end */
@@ -5956,66 +6818,66 @@ int CyaSSL_set_compression(CYASSL* ssl)
 #if defined(OPENSSL_EXTRA) || defined(GOAHEAD_WS)
 
 
-    int CyaSSL_add_all_algorithms(void)
+    int wolfSSL_add_all_algorithms(void)
     {
-        CYASSL_ENTER("CyaSSL_add_all_algorithms");
-        CyaSSL_Init();
+        WOLFSSL_ENTER("wolfSSL_add_all_algorithms");
+        wolfSSL_Init();
         return SSL_SUCCESS;
     }
 
 
-    long CyaSSL_CTX_sess_set_cache_size(CYASSL_CTX* ctx, long sz)
+    long wolfSSL_CTX_sess_set_cache_size(WOLFSSL_CTX* ctx, long sz)
     {
-        /* cache size fixed at compile time in CyaSSL */
+        /* cache size fixed at compile time in wolfSSL */
         (void)ctx;
         (void)sz;
         return 0;
     }
 
 
-    void CyaSSL_CTX_set_quiet_shutdown(CYASSL_CTX* ctx, int mode)
+    void wolfSSL_CTX_set_quiet_shutdown(WOLFSSL_CTX* ctx, int mode)
     {
-        CYASSL_ENTER("CyaSSL_CTX_set_quiet_shutdown");
+        WOLFSSL_ENTER("wolfSSL_CTX_set_quiet_shutdown");
         if (mode)
             ctx->quietShutdown = 1;
     }
 
 
-    void CyaSSL_set_quiet_shutdown(CYASSL* ssl, int mode)
+    void wolfSSL_set_quiet_shutdown(WOLFSSL* ssl, int mode)
     {
-        CYASSL_ENTER("CyaSSL_CTX_set_quiet_shutdown");
+        WOLFSSL_ENTER("wolfSSL_CTX_set_quiet_shutdown");
         if (mode)
             ssl->options.quietShutdown = 1;
     }
 
 
-    void CyaSSL_set_bio(CYASSL* ssl, CYASSL_BIO* rd, CYASSL_BIO* wr)
+    void wolfSSL_set_bio(WOLFSSL* ssl, WOLFSSL_BIO* rd, WOLFSSL_BIO* wr)
     {
-        CYASSL_ENTER("SSL_set_bio");
-        CyaSSL_set_rfd(ssl, rd->fd);
-        CyaSSL_set_wfd(ssl, wr->fd);
+        WOLFSSL_ENTER("SSL_set_bio");
+        wolfSSL_set_rfd(ssl, rd->fd);
+        wolfSSL_set_wfd(ssl, wr->fd);
 
         ssl->biord = rd;
         ssl->biowr = wr;
     }
 
 
-    void CyaSSL_CTX_set_client_CA_list(CYASSL_CTX* ctx,
-                                       STACK_OF(CYASSL_X509_NAME)* names)
+    void wolfSSL_CTX_set_client_CA_list(WOLFSSL_CTX* ctx,
+                                       STACK_OF(WOLFSSL_X509_NAME)* names)
     {
         (void)ctx;
         (void)names;
     }
 
 
-    STACK_OF(CYASSL_X509_NAME)* CyaSSL_load_client_CA_file(const char* fname)
+    STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_load_client_CA_file(const char* fname)
     {
         (void)fname;
         return 0;
     }
 
 
-    int CyaSSL_CTX_set_default_verify_paths(CYASSL_CTX* ctx)
+    int wolfSSL_CTX_set_default_verify_paths(WOLFSSL_CTX* ctx)
     {
         /* TODO:, not needed in goahead */
         (void)ctx;
@@ -6024,7 +6886,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* keyblock size in bytes or -1 */
-    int CyaSSL_get_keyblock_size(CYASSL* ssl)
+    int wolfSSL_get_keyblock_size(WOLFSSL* ssl)
     {
         if (ssl == NULL)
             return SSL_FATAL_ERROR;
@@ -6035,7 +6897,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* store keys returns SSL_SUCCESS or -1 on error */
-    int CyaSSL_get_keys(CYASSL* ssl, unsigned char** ms, unsigned int* msLen,
+    int wolfSSL_get_keys(WOLFSSL* ssl, unsigned char** ms, unsigned int* msLen,
                                      unsigned char** sr, unsigned int* srLen,
                                      unsigned char** cr, unsigned int* crLen)
     {
@@ -6054,13 +6916,13 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    void CyaSSL_set_accept_state(CYASSL* ssl)
+    void wolfSSL_set_accept_state(WOLFSSL* ssl)
     {
         byte haveRSA = 1;
         byte havePSK = 0;
 
-        CYASSL_ENTER("SSL_set_accept_state");
-        ssl->options.side = CYASSL_SERVER_END;
+        WOLFSSL_ENTER("SSL_set_accept_state");
+        ssl->options.side = WOLFSSL_SERVER_END;
         /* reset suites in case user switched */
 
         #ifdef NO_RSA
@@ -6077,7 +6939,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
 #endif
 
     /* return true if connection established */
-    int CyaSSL_is_init_finished(CYASSL* ssl)
+    int wolfSSL_is_init_finished(WOLFSSL* ssl)
     {
         if (ssl == NULL)
             return 0;
@@ -6089,34 +6951,34 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 #if defined(OPENSSL_EXTRA) || defined(GOAHEAD_WS)
-    void CyaSSL_CTX_set_tmp_rsa_callback(CYASSL_CTX* ctx,
-                                      CYASSL_RSA*(*f)(CYASSL*, int, int))
+    void wolfSSL_CTX_set_tmp_rsa_callback(WOLFSSL_CTX* ctx,
+                                      WOLFSSL_RSA*(*f)(WOLFSSL*, int, int))
     {
-        /* CyaSSL verifies all these internally */
+        /* wolfSSL verifies all these internally */
         (void)ctx;
         (void)f;
     }
 
 
-    void CyaSSL_set_shutdown(CYASSL* ssl, int opt)
+    void wolfSSL_set_shutdown(WOLFSSL* ssl, int opt)
     {
         (void)ssl;
         (void)opt;
     }
 
 
-    long CyaSSL_CTX_set_options(CYASSL_CTX* ctx, long opt)
+    long wolfSSL_CTX_set_options(WOLFSSL_CTX* ctx, long opt)
     {
         /* goahead calls with 0, do nothing */
-        CYASSL_ENTER("SSL_CTX_set_options");
+        WOLFSSL_ENTER("SSL_CTX_set_options");
         (void)ctx;
         return opt;
     }
 
 
-    int CyaSSL_set_rfd(CYASSL* ssl, int rfd)
+    int wolfSSL_set_rfd(WOLFSSL* ssl, int rfd)
     {
-        CYASSL_ENTER("SSL_set_rfd");
+        WOLFSSL_ENTER("SSL_set_rfd");
         ssl->rfd = rfd;      /* not used directly to allow IO callbacks */
 
         ssl->IOCB_ReadCtx  = &ssl->rfd;
@@ -6125,9 +6987,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_set_wfd(CYASSL* ssl, int wfd)
+    int wolfSSL_set_wfd(WOLFSSL* ssl, int wfd)
     {
-        CYASSL_ENTER("SSL_set_wfd");
+        WOLFSSL_ENTER("SSL_set_wfd");
         ssl->wfd = wfd;      /* not used directly to allow IO callbacks */
 
         ssl->IOCB_WriteCtx  = &ssl->wfd;
@@ -6136,11 +6998,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    CYASSL_RSA* CyaSSL_RSA_generate_key(int len, unsigned long bits,
+    WOLFSSL_RSA* wolfSSL_RSA_generate_key(int len, unsigned long bits,
                                           void(*f)(int, int, void*), void* data)
     {
         /* no tmp key needed, actual generation not supported */
-        CYASSL_ENTER("RSA_generate_key");
+        WOLFSSL_ENTER("RSA_generate_key");
         (void)len;
         (void)bits;
         (void)f;
@@ -6150,15 +7012,15 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
 
-    CYASSL_X509* CyaSSL_X509_STORE_CTX_get_current_cert(
-                                                     CYASSL_X509_STORE_CTX* ctx)
+    WOLFSSL_X509* wolfSSL_X509_STORE_CTX_get_current_cert(
+                                                     WOLFSSL_X509_STORE_CTX* ctx)
     {
         (void)ctx;
         return 0;
     }
 
 
-    int CyaSSL_X509_STORE_CTX_get_error(CYASSL_X509_STORE_CTX* ctx)
+    int wolfSSL_X509_STORE_CTX_get_error(WOLFSSL_X509_STORE_CTX* ctx)
     {
         if (ctx != NULL)
             return ctx->error;
@@ -6166,50 +7028,50 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_X509_STORE_CTX_get_error_depth(CYASSL_X509_STORE_CTX* ctx)
+    int wolfSSL_X509_STORE_CTX_get_error_depth(WOLFSSL_X509_STORE_CTX* ctx)
     {
         (void)ctx;
         return 0;
     }
 
 
-    CYASSL_BIO_METHOD* CyaSSL_BIO_f_buffer(void)
+    WOLFSSL_BIO_METHOD* wolfSSL_BIO_f_buffer(void)
     {
-        static CYASSL_BIO_METHOD meth;
+        static WOLFSSL_BIO_METHOD meth;
 
-        CYASSL_ENTER("BIO_f_buffer");
+        WOLFSSL_ENTER("BIO_f_buffer");
         meth.type = BIO_BUFFER;
 
         return &meth;
     }
 
 
-    long CyaSSL_BIO_set_write_buffer_size(CYASSL_BIO* bio, long size)
+    long wolfSSL_BIO_set_write_buffer_size(WOLFSSL_BIO* bio, long size)
     {
-        /* CyaSSL has internal buffer, compatibility only */
-        CYASSL_ENTER("BIO_set_write_buffer_size");
+        /* wolfSSL has internal buffer, compatibility only */
+        WOLFSSL_ENTER("BIO_set_write_buffer_size");
         (void)bio;
         return size;
     }
 
 
-    CYASSL_BIO_METHOD* CyaSSL_BIO_f_ssl(void)
+    WOLFSSL_BIO_METHOD* wolfSSL_BIO_f_ssl(void)
     {
-        static CYASSL_BIO_METHOD meth;
+        static WOLFSSL_BIO_METHOD meth;
 
-        CYASSL_ENTER("BIO_f_ssl");
+        WOLFSSL_ENTER("BIO_f_ssl");
         meth.type = BIO_SSL;
 
         return &meth;
     }
 
 
-    CYASSL_BIO* CyaSSL_BIO_new_socket(int sfd, int closeF)
+    WOLFSSL_BIO* wolfSSL_BIO_new_socket(int sfd, int closeF)
     {
-        CYASSL_BIO* bio = (CYASSL_BIO*) XMALLOC(sizeof(CYASSL_BIO), 0,
+        WOLFSSL_BIO* bio = (WOLFSSL_BIO*) XMALLOC(sizeof(WOLFSSL_BIO), 0,
                                                 DYNAMIC_TYPE_OPENSSL);
 
-        CYASSL_ENTER("BIO_new_socket");
+        WOLFSSL_ENTER("BIO_new_socket");
         if (bio) {
             bio->type  = BIO_SOCKET;
             bio->close = (byte)closeF;
@@ -6225,9 +7087,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_BIO_eof(CYASSL_BIO* b)
+    int wolfSSL_BIO_eof(WOLFSSL_BIO* b)
     {
-        CYASSL_ENTER("BIO_eof");
+        WOLFSSL_ENTER("BIO_eof");
         if (b->eof)
             return 1;
 
@@ -6235,9 +7097,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    long CyaSSL_BIO_set_ssl(CYASSL_BIO* b, CYASSL* ssl, int closeF)
+    long wolfSSL_BIO_set_ssl(WOLFSSL_BIO* b, WOLFSSL* ssl, int closeF)
     {
-        CYASSL_ENTER("BIO_set_ssl");
+        WOLFSSL_ENTER("BIO_set_ssl");
         b->ssl   = ssl;
         b->close = (byte)closeF;
     /* add to ssl for bio free if SSL_free called before/instead of free_all? */
@@ -6246,11 +7108,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    CYASSL_BIO* CyaSSL_BIO_new(CYASSL_BIO_METHOD* method)
+    WOLFSSL_BIO* wolfSSL_BIO_new(WOLFSSL_BIO_METHOD* method)
     {
-        CYASSL_BIO* bio = (CYASSL_BIO*) XMALLOC(sizeof(CYASSL_BIO), 0,
+        WOLFSSL_BIO* bio = (WOLFSSL_BIO*) XMALLOC(sizeof(WOLFSSL_BIO), 0,
                                                 DYNAMIC_TYPE_OPENSSL);
-        CYASSL_ENTER("BIO_new");
+        WOLFSSL_ENTER("BIO_new");
         if (bio) {
             bio->type   = method->type;
             bio->close  = 0;
@@ -6266,7 +7128,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_BIO_get_mem_data(CYASSL_BIO* bio, const byte** p)
+    int wolfSSL_BIO_get_mem_data(WOLFSSL_BIO* bio, const byte** p)
     {
         if (bio == NULL || p == NULL)
             return SSL_FATAL_ERROR;
@@ -6277,13 +7139,13 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    CYASSL_BIO* CyaSSL_BIO_new_mem_buf(void* buf, int len)
+    WOLFSSL_BIO* wolfSSL_BIO_new_mem_buf(void* buf, int len)
     {
-        CYASSL_BIO* bio = NULL;
+        WOLFSSL_BIO* bio = NULL;
         if (buf == NULL)
             return bio;
 
-        bio = CyaSSL_BIO_new(CyaSSL_BIO_s_mem());
+        bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem());
         if (bio == NULL)
             return bio;
 
@@ -6302,21 +7164,21 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 #ifdef USE_WINDOWS_API
     #define CloseSocket(s) closesocket(s)
-#elif defined(CYASSL_MDK_ARM)
+#elif defined(WOLFSSL_MDK_ARM)
     #define CloseSocket(s) closesocket(s)
     extern int closesocket(int) ;
 #else
     #define CloseSocket(s) close(s)
 #endif
 
-    int CyaSSL_BIO_free(CYASSL_BIO* bio)
+    int wolfSSL_BIO_free(WOLFSSL_BIO* bio)
     {
         /* unchain?, doesn't matter in goahead since from free all */
-        CYASSL_ENTER("BIO_free");
+        WOLFSSL_ENTER("BIO_free");
         if (bio) {
             if (bio->close) {
                 if (bio->ssl)
-                    CyaSSL_free(bio->ssl);
+                    wolfSSL_free(bio->ssl);
                 if (bio->fd)
                     CloseSocket(bio->fd);
             }
@@ -6328,25 +7190,25 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_BIO_free_all(CYASSL_BIO* bio)
+    int wolfSSL_BIO_free_all(WOLFSSL_BIO* bio)
     {
-        CYASSL_ENTER("BIO_free_all");
+        WOLFSSL_ENTER("BIO_free_all");
         while (bio) {
-            CYASSL_BIO* next = bio->next;
-            CyaSSL_BIO_free(bio);
+            WOLFSSL_BIO* next = bio->next;
+            wolfSSL_BIO_free(bio);
             bio = next;
         }
         return 0;
     }
 
 
-    int CyaSSL_BIO_read(CYASSL_BIO* bio, void* buf, int len)
+    int wolfSSL_BIO_read(WOLFSSL_BIO* bio, void* buf, int len)
     {
         int  ret;
-        CYASSL* ssl = 0;
-        CYASSL_BIO* front = bio;
+        WOLFSSL* ssl = 0;
+        WOLFSSL_BIO* front = bio;
 
-        CYASSL_ENTER("BIO_read");
+        WOLFSSL_ENTER("BIO_read");
         /* already got eof, again is error */
         if (front->eof)
             return SSL_FATAL_ERROR;
@@ -6356,11 +7218,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
         if (ssl == 0) return BAD_FUNC_ARG;
 
-        ret = CyaSSL_read(ssl, buf, len);
+        ret = wolfSSL_read(ssl, buf, len);
         if (ret == 0)
             front->eof = 1;
         else if (ret < 0) {
-            int err = CyaSSL_get_error(ssl, 0);
+            int err = wolfSSL_get_error(ssl, 0);
             if ( !(err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) )
                 front->eof = 1;
         }
@@ -6368,13 +7230,13 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_BIO_write(CYASSL_BIO* bio, const void* data, int len)
+    int wolfSSL_BIO_write(WOLFSSL_BIO* bio, const void* data, int len)
     {
         int  ret;
-        CYASSL* ssl = 0;
-        CYASSL_BIO* front = bio;
+        WOLFSSL* ssl = 0;
+        WOLFSSL_BIO* front = bio;
 
-        CYASSL_ENTER("BIO_write");
+        WOLFSSL_ENTER("BIO_write");
         /* already got eof, again is error */
         if (front->eof)
             return SSL_FATAL_ERROR;
@@ -6384,11 +7246,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
         if (ssl == 0) return BAD_FUNC_ARG;
 
-        ret = CyaSSL_write(ssl, data, len);
+        ret = wolfSSL_write(ssl, data, len);
         if (ret == 0)
             front->eof = 1;
         else if (ret < 0) {
-            int err = CyaSSL_get_error(ssl, 0);
+            int err = wolfSSL_get_error(ssl, 0);
             if ( !(err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) )
                 front->eof = 1;
         }
@@ -6397,9 +7259,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    CYASSL_BIO* CyaSSL_BIO_push(CYASSL_BIO* top, CYASSL_BIO* append)
+    WOLFSSL_BIO* wolfSSL_BIO_push(WOLFSSL_BIO* top, WOLFSSL_BIO* append)
     {
-        CYASSL_ENTER("BIO_push");
+        WOLFSSL_ENTER("BIO_push");
         top->next    = append;
         append->prev = top;
 
@@ -6407,10 +7269,10 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_BIO_flush(CYASSL_BIO* bio)
+    int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
     {
-        /* for CyaSSL no flushing needed */
-        CYASSL_ENTER("BIO_flush");
+        /* for wolfSSL no flushing needed */
+        WOLFSSL_ENTER("BIO_flush");
         (void)bio;
         return 1;
     }
@@ -6421,58 +7283,68 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
 
-    void CyaSSL_CTX_set_default_passwd_cb_userdata(CYASSL_CTX* ctx,
+    void wolfSSL_CTX_set_default_passwd_cb_userdata(WOLFSSL_CTX* ctx,
                                                    void* userdata)
     {
-        CYASSL_ENTER("SSL_CTX_set_default_passwd_cb_userdata");
+        WOLFSSL_ENTER("SSL_CTX_set_default_passwd_cb_userdata");
         ctx->userdata = userdata;
     }
 
 
-    void CyaSSL_CTX_set_default_passwd_cb(CYASSL_CTX* ctx, pem_password_cb cb)
+    void wolfSSL_CTX_set_default_passwd_cb(WOLFSSL_CTX* ctx, pem_password_cb cb)
     {
-        CYASSL_ENTER("SSL_CTX_set_default_passwd_cb");
+        WOLFSSL_ENTER("SSL_CTX_set_default_passwd_cb");
         ctx->passwd_cb = cb;
     }
 
-    int CyaSSL_num_locks(void)
+    int wolfSSL_num_locks(void)
     {
         return 0;
     }
 
-    void CyaSSL_set_locking_callback(void (*f)(int, int, const char*, int))
+    void wolfSSL_set_locking_callback(void (*f)(int, int, const char*, int))
     {
         (void)f;
     }
 
-    void CyaSSL_set_id_callback(unsigned long (*f)(void))
+    void wolfSSL_set_id_callback(unsigned long (*f)(void))
     {
         (void)f;
     }
 
-    unsigned long CyaSSL_ERR_get_error(void)
+    unsigned long wolfSSL_ERR_get_error(void)
     {
         /* TODO: */
         return 0;
     }
 
-    int CyaSSL_EVP_BytesToKey(const CYASSL_EVP_CIPHER* type,
-                       const CYASSL_EVP_MD* md, const byte* salt,
+#ifndef NO_MD5
+
+    int wolfSSL_EVP_BytesToKey(const WOLFSSL_EVP_CIPHER* type,
+                       const WOLFSSL_EVP_MD* md, const byte* salt,
                        const byte* data, int sz, int count, byte* key, byte* iv)
     {
-        int keyLen = 0;
-        int ivLen  = 0;
-
-        Md5    myMD;
-        byte   digest[MD5_DIGEST_SIZE];
+        int  keyLen = 0;
+        int  ivLen  = 0;
+        int  j;
+        int  keyLeft;
+        int  ivLeft;
+        int  keyOutput = 0;
+        byte digest[MD5_DIGEST_SIZE];
+    #ifdef WOLFSSL_SMALL_STACK
+        Md5* md5 = NULL;
+    #else
+        Md5  md5[1];
+    #endif
 
-        int j;
-        int keyLeft;
-        int ivLeft;
-        int keyOutput = 0;
+    #ifdef WOLFSSL_SMALL_STACK
+        md5 = (Md5*)XMALLOC(sizeof(Md5), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (md5 == NULL)
+            return 0;
+    #endif
 
-        CYASSL_ENTER("EVP_BytesToKey");
-        InitMd5(&myMD);
+        WOLFSSL_ENTER("EVP_BytesToKey");
+        wc_InitMd5(md5);
 
         /* only support MD5 for now */
         if (XSTRNCMP(md, "MD5", 3) != 0) return 0;
@@ -6498,8 +7370,12 @@ int CyaSSL_set_compression(CYASSL* ssl)
             keyLen = AES_256_KEY_SIZE;
             ivLen  = AES_IV_SIZE;
         }
-        else
+        else {
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(md5, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
             return 0;
+        }
 
         keyLeft   = keyLen;
         ivLeft    = ivLen;
@@ -6508,17 +7384,17 @@ int CyaSSL_set_compression(CYASSL* ssl)
             int digestLeft = MD5_DIGEST_SIZE;
             /* D_(i - 1) */
             if (keyOutput)                      /* first time D_0 is empty */
-                Md5Update(&myMD, digest, MD5_DIGEST_SIZE);
+                wc_Md5Update(md5, digest, MD5_DIGEST_SIZE);
             /* data */
-            Md5Update(&myMD, data, sz);
+            wc_Md5Update(md5, data, sz);
             /* salt */
             if (salt)
-                Md5Update(&myMD, salt, EVP_SALT_SIZE);
-            Md5Final(&myMD, digest);
+                wc_Md5Update(md5, salt, EVP_SALT_SIZE);
+            wc_Md5Final(md5, digest);
             /* count */
             for (j = 1; j < count; j++) {
-                Md5Update(&myMD, digest, MD5_DIGEST_SIZE);
-                Md5Final(&myMD, digest);
+                wc_Md5Update(md5, digest, MD5_DIGEST_SIZE);
+                wc_Md5Final(md5, digest);
             }
 
             if (keyLeft) {
@@ -6538,337 +7414,352 @@ int CyaSSL_set_compression(CYASSL* ssl)
                 ivLeft    -= store;
             }
         }
-        if (keyOutput != (keyLen + ivLen))
-            return 0;
-        return keyOutput;
+
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(md5, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+
+        return keyOutput == (keyLen + ivLen) ? keyOutput : 0;
     }
 
+#endif /* NO_MD5 */
+
 #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */
 
 
 #ifdef OPENSSL_EXTRA
 
-    unsigned long CyaSSLeay(void)
+    unsigned long wolfSSLeay(void)
     {
         return SSLEAY_VERSION_NUMBER;
     }
 
 
-    const char* CyaSSLeay_version(int type)
+    const char* wolfSSLeay_version(int type)
     {
-        static const char* version = "SSLeay CyaSSL compatibility";
+        static const char* version = "SSLeay wolfSSL compatibility";
         (void)type;
         return version;
     }
 
 
-    void CyaSSL_MD5_Init(CYASSL_MD5_CTX* md5)
+#ifndef NO_MD5
+    void wolfSSL_MD5_Init(WOLFSSL_MD5_CTX* md5)
     {
         typedef char md5_test[sizeof(MD5_CTX) >= sizeof(Md5) ? 1 : -1];
         (void)sizeof(md5_test);
 
-        CYASSL_ENTER("MD5_Init");
-        InitMd5((Md5*)md5);
+        WOLFSSL_ENTER("MD5_Init");
+        wc_InitMd5((Md5*)md5);
     }
 
 
-    void CyaSSL_MD5_Update(CYASSL_MD5_CTX* md5, const void* input,
+    void wolfSSL_MD5_Update(WOLFSSL_MD5_CTX* md5, const void* input,
                            unsigned long sz)
     {
-        CYASSL_ENTER("CyaSSL_MD5_Update");
-        Md5Update((Md5*)md5, (const byte*)input, (word32)sz);
+        WOLFSSL_ENTER("wolfSSL_MD5_Update");
+        wc_Md5Update((Md5*)md5, (const byte*)input, (word32)sz);
     }
 
 
-    void CyaSSL_MD5_Final(byte* input, CYASSL_MD5_CTX* md5)
+    void wolfSSL_MD5_Final(byte* input, WOLFSSL_MD5_CTX* md5)
     {
-        CYASSL_ENTER("MD5_Final");
-        Md5Final((Md5*)md5, input);
+        WOLFSSL_ENTER("MD5_Final");
+        wc_Md5Final((Md5*)md5, input);
     }
+#endif /* NO_MD5 */
 
 
-    void CyaSSL_SHA_Init(CYASSL_SHA_CTX* sha)
+#ifndef NO_SHA
+    void wolfSSL_SHA_Init(WOLFSSL_SHA_CTX* sha)
     {
         typedef char sha_test[sizeof(SHA_CTX) >= sizeof(Sha) ? 1 : -1];
         (void)sizeof(sha_test);
 
-        CYASSL_ENTER("SHA_Init");
-        InitSha((Sha*)sha);  /* OpenSSL compat, no ret */
+        WOLFSSL_ENTER("SHA_Init");
+        wc_InitSha((Sha*)sha);  /* OpenSSL compat, no ret */
     }
 
 
-    void CyaSSL_SHA_Update(CYASSL_SHA_CTX* sha, const void* input,
+    void wolfSSL_SHA_Update(WOLFSSL_SHA_CTX* sha, const void* input,
                            unsigned long sz)
     {
-        CYASSL_ENTER("SHA_Update");
-        ShaUpdate((Sha*)sha, (const byte*)input, (word32)sz);
+        WOLFSSL_ENTER("SHA_Update");
+        wc_ShaUpdate((Sha*)sha, (const byte*)input, (word32)sz);
     }
 
 
-    void CyaSSL_SHA_Final(byte* input, CYASSL_SHA_CTX* sha)
+    void wolfSSL_SHA_Final(byte* input, WOLFSSL_SHA_CTX* sha)
     {
-        CYASSL_ENTER("SHA_Final");
-        ShaFinal((Sha*)sha, input);
+        WOLFSSL_ENTER("SHA_Final");
+        wc_ShaFinal((Sha*)sha, input);
     }
 
 
-    void CyaSSL_SHA1_Init(CYASSL_SHA_CTX* sha)
+    void wolfSSL_SHA1_Init(WOLFSSL_SHA_CTX* sha)
     {
-        CYASSL_ENTER("SHA1_Init");
+        WOLFSSL_ENTER("SHA1_Init");
         SHA_Init(sha);
     }
 
 
-    void CyaSSL_SHA1_Update(CYASSL_SHA_CTX* sha, const void* input,
+    void wolfSSL_SHA1_Update(WOLFSSL_SHA_CTX* sha, const void* input,
                             unsigned long sz)
     {
-        CYASSL_ENTER("SHA1_Update");
+        WOLFSSL_ENTER("SHA1_Update");
         SHA_Update(sha, input, sz);
     }
 
 
-    void CyaSSL_SHA1_Final(byte* input, CYASSL_SHA_CTX* sha)
+    void wolfSSL_SHA1_Final(byte* input, WOLFSSL_SHA_CTX* sha)
     {
-        CYASSL_ENTER("SHA1_Final");
+        WOLFSSL_ENTER("SHA1_Final");
         SHA_Final(input, sha);
     }
+#endif /* NO_SHA */
 
 
-    void CyaSSL_SHA256_Init(CYASSL_SHA256_CTX* sha256)
+    void wolfSSL_SHA256_Init(WOLFSSL_SHA256_CTX* sha256)
     {
         typedef char sha_test[sizeof(SHA256_CTX) >= sizeof(Sha256) ? 1 : -1];
         (void)sizeof(sha_test);
 
-        CYASSL_ENTER("SHA256_Init");
-        InitSha256((Sha256*)sha256);  /* OpenSSL compat, no error */
+        WOLFSSL_ENTER("SHA256_Init");
+        wc_InitSha256((Sha256*)sha256);  /* OpenSSL compat, no error */
     }
 
 
-    void CyaSSL_SHA256_Update(CYASSL_SHA256_CTX* sha, const void* input,
+    void wolfSSL_SHA256_Update(WOLFSSL_SHA256_CTX* sha, const void* input,
                               unsigned long sz)
     {
-        CYASSL_ENTER("SHA256_Update");
-        Sha256Update((Sha256*)sha, (const byte*)input, (word32)sz);
+        WOLFSSL_ENTER("SHA256_Update");
+        wc_Sha256Update((Sha256*)sha, (const byte*)input, (word32)sz);
         /* OpenSSL compat, no error */
     }
 
 
-    void CyaSSL_SHA256_Final(byte* input, CYASSL_SHA256_CTX* sha)
+    void wolfSSL_SHA256_Final(byte* input, WOLFSSL_SHA256_CTX* sha)
     {
-        CYASSL_ENTER("SHA256_Final");
-        Sha256Final((Sha256*)sha, input);
+        WOLFSSL_ENTER("SHA256_Final");
+        wc_Sha256Final((Sha256*)sha, input);
         /* OpenSSL compat, no error */
     }
 
 
-    #ifdef CYASSL_SHA384
+    #ifdef WOLFSSL_SHA384
 
-    void CyaSSL_SHA384_Init(CYASSL_SHA384_CTX* sha)
+    void wolfSSL_SHA384_Init(WOLFSSL_SHA384_CTX* sha)
     {
         typedef char sha_test[sizeof(SHA384_CTX) >= sizeof(Sha384) ? 1 : -1];
         (void)sizeof(sha_test);
 
-        CYASSL_ENTER("SHA384_Init");
-        InitSha384((Sha384*)sha);   /* OpenSSL compat, no error */
+        WOLFSSL_ENTER("SHA384_Init");
+        wc_InitSha384((Sha384*)sha);   /* OpenSSL compat, no error */
     }
 
 
-    void CyaSSL_SHA384_Update(CYASSL_SHA384_CTX* sha, const void* input,
+    void wolfSSL_SHA384_Update(WOLFSSL_SHA384_CTX* sha, const void* input,
                            unsigned long sz)
     {
-        CYASSL_ENTER("SHA384_Update");
-        Sha384Update((Sha384*)sha, (const byte*)input, (word32)sz);
+        WOLFSSL_ENTER("SHA384_Update");
+        wc_Sha384Update((Sha384*)sha, (const byte*)input, (word32)sz);
         /* OpenSSL compat, no error */
     }
 
 
-    void CyaSSL_SHA384_Final(byte* input, CYASSL_SHA384_CTX* sha)
+    void wolfSSL_SHA384_Final(byte* input, WOLFSSL_SHA384_CTX* sha)
     {
-        CYASSL_ENTER("SHA384_Final");
-        Sha384Final((Sha384*)sha, input);
+        WOLFSSL_ENTER("SHA384_Final");
+        wc_Sha384Final((Sha384*)sha, input);
         /* OpenSSL compat, no error */
     }
 
-    #endif /* CYASSL_SHA384 */
+    #endif /* WOLFSSL_SHA384 */
 
 
-   #ifdef CYASSL_SHA512
+   #ifdef WOLFSSL_SHA512
 
-    void CyaSSL_SHA512_Init(CYASSL_SHA512_CTX* sha)
+    void wolfSSL_SHA512_Init(WOLFSSL_SHA512_CTX* sha)
     {
         typedef char sha_test[sizeof(SHA512_CTX) >= sizeof(Sha512) ? 1 : -1];
         (void)sizeof(sha_test);
 
-        CYASSL_ENTER("SHA512_Init");
-        InitSha512((Sha512*)sha);  /* OpenSSL compat, no error */
+        WOLFSSL_ENTER("SHA512_Init");
+        wc_InitSha512((Sha512*)sha);  /* OpenSSL compat, no error */
     }
 
 
-    void CyaSSL_SHA512_Update(CYASSL_SHA512_CTX* sha, const void* input,
+    void wolfSSL_SHA512_Update(WOLFSSL_SHA512_CTX* sha, const void* input,
                            unsigned long sz)
     {
-        CYASSL_ENTER("SHA512_Update");
-        Sha512Update((Sha512*)sha, (const byte*)input, (word32)sz);
+        WOLFSSL_ENTER("SHA512_Update");
+        wc_Sha512Update((Sha512*)sha, (const byte*)input, (word32)sz);
         /* OpenSSL compat, no error */
     }
 
 
-    void CyaSSL_SHA512_Final(byte* input, CYASSL_SHA512_CTX* sha)
+    void wolfSSL_SHA512_Final(byte* input, WOLFSSL_SHA512_CTX* sha)
     {
-        CYASSL_ENTER("SHA512_Final");
-        Sha512Final((Sha512*)sha, input);
+        WOLFSSL_ENTER("SHA512_Final");
+        wc_Sha512Final((Sha512*)sha, input);
         /* OpenSSL compat, no error */
     }
 
-    #endif /* CYASSL_SHA512 */
+    #endif /* WOLFSSL_SHA512 */
 
 
-    const CYASSL_EVP_MD* CyaSSL_EVP_md5(void)
+    #ifndef NO_MD5
+
+    const WOLFSSL_EVP_MD* wolfSSL_EVP_md5(void)
     {
         static const char* type = "MD5";
-        CYASSL_ENTER("EVP_md5");
+        WOLFSSL_ENTER("EVP_md5");
         return type;
     }
 
+    #endif /* NO_MD5 */
+
 
-    const CYASSL_EVP_MD* CyaSSL_EVP_sha1(void)
+#ifndef NO_SHA
+    const WOLFSSL_EVP_MD* wolfSSL_EVP_sha1(void)
     {
         static const char* type = "SHA";
-        CYASSL_ENTER("EVP_sha1");
+        WOLFSSL_ENTER("EVP_sha1");
         return type;
     }
+#endif /* NO_SHA */
 
 
-    const CYASSL_EVP_MD* CyaSSL_EVP_sha256(void)
+    const WOLFSSL_EVP_MD* wolfSSL_EVP_sha256(void)
     {
         static const char* type = "SHA256";
-        CYASSL_ENTER("EVP_sha256");
+        WOLFSSL_ENTER("EVP_sha256");
         return type;
     }
 
-    #ifdef CYASSL_SHA384
+    #ifdef WOLFSSL_SHA384
 
-    const CYASSL_EVP_MD* CyaSSL_EVP_sha384(void)
+    const WOLFSSL_EVP_MD* wolfSSL_EVP_sha384(void)
     {
         static const char* type = "SHA384";
-        CYASSL_ENTER("EVP_sha384");
+        WOLFSSL_ENTER("EVP_sha384");
         return type;
     }
 
-    #endif /* CYASSL_SHA384 */
+    #endif /* WOLFSSL_SHA384 */
 
-    #ifdef CYASSL_SHA512
+    #ifdef WOLFSSL_SHA512
 
-    const CYASSL_EVP_MD* CyaSSL_EVP_sha512(void)
+    const WOLFSSL_EVP_MD* wolfSSL_EVP_sha512(void)
     {
         static const char* type = "SHA512";
-        CYASSL_ENTER("EVP_sha512");
+        WOLFSSL_ENTER("EVP_sha512");
         return type;
     }
 
-    #endif /* CYASSL_SHA512 */
+    #endif /* WOLFSSL_SHA512 */
 
 
-    void CyaSSL_EVP_MD_CTX_init(CYASSL_EVP_MD_CTX* ctx)
+    void wolfSSL_EVP_MD_CTX_init(WOLFSSL_EVP_MD_CTX* ctx)
     {
-        CYASSL_ENTER("EVP_CIPHER_MD_CTX_init");
+        WOLFSSL_ENTER("EVP_CIPHER_MD_CTX_init");
         (void)ctx;
         /* do nothing */
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_aes_128_cbc(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_cbc(void)
     {
         static const char* type = "AES128-CBC";
-        CYASSL_ENTER("CyaSSL_EVP_aes_128_cbc");
+        WOLFSSL_ENTER("wolfSSL_EVP_aes_128_cbc");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_aes_192_cbc(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_cbc(void)
     {
         static const char* type = "AES192-CBC";
-        CYASSL_ENTER("CyaSSL_EVP_aes_192_cbc");
+        WOLFSSL_ENTER("wolfSSL_EVP_aes_192_cbc");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_aes_256_cbc(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_cbc(void)
     {
         static const char* type = "AES256-CBC";
-        CYASSL_ENTER("CyaSSL_EVP_aes_256_cbc");
+        WOLFSSL_ENTER("wolfSSL_EVP_aes_256_cbc");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_aes_128_ctr(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_ctr(void)
     {
         static const char* type = "AES128-CTR";
-        CYASSL_ENTER("CyaSSL_EVP_aes_128_ctr");
+        WOLFSSL_ENTER("wolfSSL_EVP_aes_128_ctr");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_aes_192_ctr(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_ctr(void)
     {
         static const char* type = "AES192-CTR";
-        CYASSL_ENTER("CyaSSL_EVP_aes_192_ctr");
+        WOLFSSL_ENTER("wolfSSL_EVP_aes_192_ctr");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_aes_256_ctr(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_ctr(void)
     {
         static const char* type = "AES256-CTR";
-        CYASSL_ENTER("CyaSSL_EVP_aes_256_ctr");
+        WOLFSSL_ENTER("wolfSSL_EVP_aes_256_ctr");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_des_cbc(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_cbc(void)
     {
         static const char* type = "DES-CBC";
-        CYASSL_ENTER("CyaSSL_EVP_des_cbc");
+        WOLFSSL_ENTER("wolfSSL_EVP_des_cbc");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_des_ede3_cbc(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ede3_cbc(void)
     {
         static const char* type = "DES-EDE3-CBC";
-        CYASSL_ENTER("CyaSSL_EVP_des_ede3_cbc");
+        WOLFSSL_ENTER("wolfSSL_EVP_des_ede3_cbc");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_rc4(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_rc4(void)
     {
         static const char* type = "ARC4";
-        CYASSL_ENTER("CyaSSL_EVP_rc4");
+        WOLFSSL_ENTER("wolfSSL_EVP_rc4");
         return type;
     }
 
 
-    const CYASSL_EVP_CIPHER* CyaSSL_EVP_enc_null(void)
+    const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_enc_null(void)
     {
         static const char* type = "NULL";
-        CYASSL_ENTER("CyaSSL_EVP_enc_null");
+        WOLFSSL_ENTER("wolfSSL_EVP_enc_null");
         return type;
     }
 
 
-    int CyaSSL_EVP_MD_CTX_cleanup(CYASSL_EVP_MD_CTX* ctx)
+    int wolfSSL_EVP_MD_CTX_cleanup(WOLFSSL_EVP_MD_CTX* ctx)
     {
-        CYASSL_ENTER("EVP_MD_CTX_cleanup");
+        WOLFSSL_ENTER("EVP_MD_CTX_cleanup");
         (void)ctx;
         return 0;
     }
 
 
 
-    void CyaSSL_EVP_CIPHER_CTX_init(CYASSL_EVP_CIPHER_CTX* ctx)
+    void wolfSSL_EVP_CIPHER_CTX_init(WOLFSSL_EVP_CIPHER_CTX* ctx)
     {
-        CYASSL_ENTER("EVP_CIPHER_CTX_init");
+        WOLFSSL_ENTER("EVP_CIPHER_CTX_init");
         if (ctx) {
             ctx->cipherType = 0xff;   /* no init */
             ctx->keyLen     = 0;
@@ -6878,9 +7769,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_CIPHER_CTX_cleanup(CYASSL_EVP_CIPHER_CTX* ctx)
+    int wolfSSL_EVP_CIPHER_CTX_cleanup(WOLFSSL_EVP_CIPHER_CTX* ctx)
     {
-        CYASSL_ENTER("EVP_CIPHER_CTX_cleanup");
+        WOLFSSL_ENTER("EVP_CIPHER_CTX_cleanup");
         if (ctx) {
             ctx->cipherType = 0xff;  /* no more init */
             ctx->keyLen     = 0;
@@ -6891,188 +7782,200 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int  CyaSSL_EVP_CipherInit(CYASSL_EVP_CIPHER_CTX* ctx,
-                               const CYASSL_EVP_CIPHER* type, byte* key,
+    int  wolfSSL_EVP_CipherInit(WOLFSSL_EVP_CIPHER_CTX* ctx,
+                               const WOLFSSL_EVP_CIPHER* type, byte* key,
                                byte* iv, int enc)
     {
+#if defined(NO_AES) && defined(NO_DES3)
+        (void)iv;
+        (void)enc;
+#else
         int ret = 0;
+#endif
 
-        CYASSL_ENTER("CyaSSL_EVP_CipherInit");
+        WOLFSSL_ENTER("wolfSSL_EVP_CipherInit");
         if (ctx == NULL) {
-            CYASSL_MSG("no ctx");
+            WOLFSSL_MSG("no ctx");
             return 0;   /* failure */
         }
 
         if (type == NULL && ctx->cipherType == 0xff) {
-            CYASSL_MSG("no type set");
+            WOLFSSL_MSG("no type set");
             return 0;   /* failure */
         }
 
+#ifndef NO_AES
         if (ctx->cipherType == AES_128_CBC_TYPE || (type &&
                                        XSTRNCMP(type, "AES128-CBC", 10) == 0)) {
-            CYASSL_MSG("AES-128-CBC");
+            WOLFSSL_MSG("AES-128-CBC");
             ctx->cipherType = AES_128_CBC_TYPE;
             ctx->keyLen     = 16;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
+                ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
                                 ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION);
                 if (ret != 0)
                     return ret;
             }
             if (iv && key == NULL) {
-                ret = AesSetIV(&ctx->cipher.aes, iv);
+                ret = wc_AesSetIV(&ctx->cipher.aes, iv);
                 if (ret != 0)
                     return ret;
             }
         }
         else if (ctx->cipherType == AES_192_CBC_TYPE || (type &&
                                        XSTRNCMP(type, "AES192-CBC", 10) == 0)) {
-            CYASSL_MSG("AES-192-CBC");
+            WOLFSSL_MSG("AES-192-CBC");
             ctx->cipherType = AES_192_CBC_TYPE;
             ctx->keyLen     = 24;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
+                ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
                                 ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION);
                 if (ret != 0)
                     return ret;
             }
             if (iv && key == NULL) {
-                ret = AesSetIV(&ctx->cipher.aes, iv);
+                ret = wc_AesSetIV(&ctx->cipher.aes, iv);
                 if (ret != 0)
                     return ret;
             }
         }
         else if (ctx->cipherType == AES_256_CBC_TYPE || (type &&
                                        XSTRNCMP(type, "AES256-CBC", 10) == 0)) {
-            CYASSL_MSG("AES-256-CBC");
+            WOLFSSL_MSG("AES-256-CBC");
             ctx->cipherType = AES_256_CBC_TYPE;
             ctx->keyLen     = 32;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
+                ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
                                 ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION);
                 if (ret != 0)
                     return ret;
             }
             if (iv && key == NULL) {
-                ret = AesSetIV(&ctx->cipher.aes, iv);
+                ret = wc_AesSetIV(&ctx->cipher.aes, iv);
                 if (ret != 0)
                     return ret;
             }
         }
-#ifdef CYASSL_AES_COUNTER
+#ifdef WOLFSSL_AES_COUNTER
         else if (ctx->cipherType == AES_128_CTR_TYPE || (type &&
                                        XSTRNCMP(type, "AES128-CTR", 10) == 0)) {
-            CYASSL_MSG("AES-128-CTR");
+            WOLFSSL_MSG("AES-128-CTR");
             ctx->cipherType = AES_128_CTR_TYPE;
             ctx->keyLen     = 16;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
+                ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
                                 AES_ENCRYPTION);
                 if (ret != 0)
                     return ret;
             }
             if (iv && key == NULL) {
-                ret = AesSetIV(&ctx->cipher.aes, iv);
+                ret = wc_AesSetIV(&ctx->cipher.aes, iv);
                 if (ret != 0)
                     return ret;
             }
         }
         else if (ctx->cipherType == AES_192_CTR_TYPE || (type &&
                                        XSTRNCMP(type, "AES192-CTR", 10) == 0)) {
-            CYASSL_MSG("AES-192-CTR");
+            WOLFSSL_MSG("AES-192-CTR");
             ctx->cipherType = AES_192_CTR_TYPE;
             ctx->keyLen     = 24;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
+                ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
                                 AES_ENCRYPTION);
                 if (ret != 0)
                     return ret;
             }
             if (iv && key == NULL) {
-                ret = AesSetIV(&ctx->cipher.aes, iv);
+                ret = wc_AesSetIV(&ctx->cipher.aes, iv);
                 if (ret != 0)
                     return ret;
             }
         }
         else if (ctx->cipherType == AES_256_CTR_TYPE || (type &&
                                        XSTRNCMP(type, "AES256-CTR", 10) == 0)) {
-            CYASSL_MSG("AES-256-CTR");
+            WOLFSSL_MSG("AES-256-CTR");
             ctx->cipherType = AES_256_CTR_TYPE;
             ctx->keyLen     = 32;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
+                ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv,
                                 AES_ENCRYPTION);
                 if (ret != 0)
                     return ret;
             }
             if (iv && key == NULL) {
-                ret = AesSetIV(&ctx->cipher.aes, iv);
+                ret = wc_AesSetIV(&ctx->cipher.aes, iv);
                 if (ret != 0)
                     return ret;
             }
         }
-#endif /* CYASSL_AES_CTR */
+#endif /* WOLFSSL_AES_CTR */
+#endif /* NO_AES */
+
+#ifndef NO_DES3
         else if (ctx->cipherType == DES_CBC_TYPE || (type &&
                                        XSTRNCMP(type, "DES-CBC", 7) == 0)) {
-            CYASSL_MSG("DES-CBC");
+            WOLFSSL_MSG("DES-CBC");
             ctx->cipherType = DES_CBC_TYPE;
             ctx->keyLen     = 8;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = Des_SetKey(&ctx->cipher.des, key, iv,
+                ret = wc_Des_SetKey(&ctx->cipher.des, key, iv,
                           ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION);
                 if (ret != 0)
                     return ret;
             }
 
             if (iv && key == NULL)
-                Des_SetIV(&ctx->cipher.des, iv);
+                wc_Des_SetIV(&ctx->cipher.des, iv);
         }
         else if (ctx->cipherType == DES_EDE3_CBC_TYPE || (type &&
                                      XSTRNCMP(type, "DES-EDE3-CBC", 11) == 0)) {
-            CYASSL_MSG("DES-EDE3-CBC");
+            WOLFSSL_MSG("DES-EDE3-CBC");
             ctx->cipherType = DES_EDE3_CBC_TYPE;
             ctx->keyLen     = 24;
             if (enc == 0 || enc == 1)
                 ctx->enc = enc ? 1 : 0;
             if (key) {
-                ret = Des3_SetKey(&ctx->cipher.des3, key, iv,
+                ret = wc_Des3_SetKey(&ctx->cipher.des3, key, iv,
                           ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION);
                 if (ret != 0)
                     return ret;
             }
 
             if (iv && key == NULL) {
-                ret = Des3_SetIV(&ctx->cipher.des3, iv);
+                ret = wc_Des3_SetIV(&ctx->cipher.des3, iv);
                 if (ret != 0)
                     return ret;
             }
         }
+#endif /* NO_DES3 */
+#ifndef NO_RC4
         else if (ctx->cipherType == ARC4_TYPE || (type &&
                                      XSTRNCMP(type, "ARC4", 4) == 0)) {
-            CYASSL_MSG("ARC4");
+            WOLFSSL_MSG("ARC4");
             ctx->cipherType = ARC4_TYPE;
             if (ctx->keyLen == 0)  /* user may have already set */
                 ctx->keyLen = 16;  /* default to 128 */
             if (key)
-                Arc4SetKey(&ctx->cipher.arc4, key, ctx->keyLen);
+                wc_Arc4SetKey(&ctx->cipher.arc4, key, ctx->keyLen);
         }
+#endif /* NO_RC4 */
         else if (ctx->cipherType == NULL_CIPHER_TYPE || (type &&
                                      XSTRNCMP(type, "NULL", 4) == 0)) {
-            CYASSL_MSG("NULL cipher");
+            WOLFSSL_MSG("NULL cipher");
             ctx->cipherType = NULL_CIPHER_TYPE;
             ctx->keyLen = 0;
         }
@@ -7085,9 +7988,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_CIPHER_CTX_key_length(CYASSL_EVP_CIPHER_CTX* ctx)
+    int wolfSSL_EVP_CIPHER_CTX_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx)
     {
-        CYASSL_ENTER("CyaSSL_EVP_CIPHER_CTX_key_length");
+        WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_key_length");
         if (ctx)
             return ctx->keyLen;
 
@@ -7096,10 +7999,10 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_CIPHER_CTX_set_key_length(CYASSL_EVP_CIPHER_CTX* ctx,
+    int wolfSSL_EVP_CIPHER_CTX_set_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx,
                                              int keylen)
     {
-        CYASSL_ENTER("CyaSSL_EVP_CIPHER_CTX_set_key_length");
+        WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_set_key_length");
         if (ctx)
             ctx->keyLen = keylen;
         else
@@ -7110,129 +8013,140 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_Cipher(CYASSL_EVP_CIPHER_CTX* ctx, byte* dst, byte* src,
+    int wolfSSL_EVP_Cipher(WOLFSSL_EVP_CIPHER_CTX* ctx, byte* dst, byte* src,
                           word32 len)
     {
         int ret = 0;
-        CYASSL_ENTER("CyaSSL_EVP_Cipher");
+        WOLFSSL_ENTER("wolfSSL_EVP_Cipher");
 
         if (ctx == NULL || dst == NULL || src == NULL) {
-            CYASSL_MSG("Bad function argument");
+            WOLFSSL_MSG("Bad function argument");
             return 0;  /* failure */
         }
 
         if (ctx->cipherType == 0xff) {
-            CYASSL_MSG("no init");
+            WOLFSSL_MSG("no init");
             return 0;  /* failure */
         }
 
         switch (ctx->cipherType) {
 
+#ifndef NO_AES
             case AES_128_CBC_TYPE :
             case AES_192_CBC_TYPE :
             case AES_256_CBC_TYPE :
-                CYASSL_MSG("AES CBC");
+                WOLFSSL_MSG("AES CBC");
                 if (ctx->enc)
-                    ret = AesCbcEncrypt(&ctx->cipher.aes, dst, src, len);
+                    ret = wc_AesCbcEncrypt(&ctx->cipher.aes, dst, src, len);
                 else
-                    ret = AesCbcDecrypt(&ctx->cipher.aes, dst, src, len);
+                    ret = wc_AesCbcDecrypt(&ctx->cipher.aes, dst, src, len);
                 break;
 
-#ifdef CYASSL_AES_COUNTER
+#ifdef WOLFSSL_AES_COUNTER
             case AES_128_CTR_TYPE :
             case AES_192_CTR_TYPE :
             case AES_256_CTR_TYPE :
-                    CYASSL_MSG("AES CTR");
-                    AesCtrEncrypt(&ctx->cipher.aes, dst, src, len);
+                    WOLFSSL_MSG("AES CTR");
+                    wc_AesCtrEncrypt(&ctx->cipher.aes, dst, src, len);
                 break;
 #endif
+#endif /* NO_AES */
 
+#ifndef NO_DES3
             case DES_CBC_TYPE :
                 if (ctx->enc)
-                    Des_CbcEncrypt(&ctx->cipher.des, dst, src, len);
+                    wc_Des_CbcEncrypt(&ctx->cipher.des, dst, src, len);
                 else
-                    Des_CbcDecrypt(&ctx->cipher.des, dst, src, len);
+                    wc_Des_CbcDecrypt(&ctx->cipher.des, dst, src, len);
                 break;
 
             case DES_EDE3_CBC_TYPE :
                 if (ctx->enc)
-                    ret = Des3_CbcEncrypt(&ctx->cipher.des3, dst, src, len);
+                    ret = wc_Des3_CbcEncrypt(&ctx->cipher.des3, dst, src, len);
                 else
-                    ret = Des3_CbcDecrypt(&ctx->cipher.des3, dst, src, len);
+                    ret = wc_Des3_CbcDecrypt(&ctx->cipher.des3, dst, src, len);
                 break;
+#endif
 
+#ifndef NO_RC4
             case ARC4_TYPE :
-                Arc4Process(&ctx->cipher.arc4, dst, src, len);
+                wc_Arc4Process(&ctx->cipher.arc4, dst, src, len);
                 break;
+#endif
 
             case NULL_CIPHER_TYPE :
                 XMEMCPY(dst, src, len);
                 break;
 
             default: {
-                CYASSL_MSG("bad type");
+                WOLFSSL_MSG("bad type");
                 return 0;  /* failure */
             }
         }
 
         if (ret != 0) {
-            CYASSL_MSG("CyaSSL_EVP_Cipher failure");
+            WOLFSSL_MSG("wolfSSL_EVP_Cipher failure");
             return 0;  /* failuer */
         }
 
-        CYASSL_MSG("CyaSSL_EVP_Cipher success");
+        WOLFSSL_MSG("wolfSSL_EVP_Cipher success");
         return SSL_SUCCESS;  /* success */
     }
 
 
     /* store for external read of iv, SSL_SUCCESS on success */
-    int  CyaSSL_StoreExternalIV(CYASSL_EVP_CIPHER_CTX* ctx)
+    int  wolfSSL_StoreExternalIV(WOLFSSL_EVP_CIPHER_CTX* ctx)
     {
-        CYASSL_ENTER("CyaSSL_StoreExternalIV");
+        WOLFSSL_ENTER("wolfSSL_StoreExternalIV");
 
         if (ctx == NULL) {
-            CYASSL_MSG("Bad function argument");
+            WOLFSSL_MSG("Bad function argument");
             return SSL_FATAL_ERROR;
         }
 
         switch (ctx->cipherType) {
 
+#ifndef NO_AES
             case AES_128_CBC_TYPE :
             case AES_192_CBC_TYPE :
             case AES_256_CBC_TYPE :
-                CYASSL_MSG("AES CBC");
+                WOLFSSL_MSG("AES CBC");
                 memcpy(ctx->iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE);
                 break;
 
-#ifdef CYASSL_AES_COUNTER
+#ifdef WOLFSSL_AES_COUNTER
             case AES_128_CTR_TYPE :
             case AES_192_CTR_TYPE :
             case AES_256_CTR_TYPE :
-                CYASSL_MSG("AES CTR");
+                WOLFSSL_MSG("AES CTR");
                 memcpy(ctx->iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE);
                 break;
-#endif
+#endif /* WOLFSSL_AES_COUNTER */
 
+#endif /* NO_AES */
+
+#ifndef NO_DES3
             case DES_CBC_TYPE :
-                CYASSL_MSG("DES CBC");
+                WOLFSSL_MSG("DES CBC");
                 memcpy(ctx->iv, &ctx->cipher.des.reg, DES_BLOCK_SIZE);
                 break;
 
             case DES_EDE3_CBC_TYPE :
-                CYASSL_MSG("DES EDE3 CBC");
-                memcpy(ctx->iv, &ctx->cipher.des.reg, DES_BLOCK_SIZE);
+                WOLFSSL_MSG("DES EDE3 CBC");
+                memcpy(ctx->iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE);
                 break;
+#endif
 
             case ARC4_TYPE :
-                CYASSL_MSG("ARC4");
+                WOLFSSL_MSG("ARC4");
                 break;
 
             case NULL_CIPHER_TYPE :
-                CYASSL_MSG("NULL");
+                WOLFSSL_MSG("NULL");
                 break;
 
             default: {
-                CYASSL_MSG("bad type");
+                WOLFSSL_MSG("bad type");
                 return SSL_FATAL_ERROR;
             }
         }
@@ -7241,54 +8155,59 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* set internal IV from external, SSL_SUCCESS on success */
-    int  CyaSSL_SetInternalIV(CYASSL_EVP_CIPHER_CTX* ctx)
+    int  wolfSSL_SetInternalIV(WOLFSSL_EVP_CIPHER_CTX* ctx)
     {
 
-        CYASSL_ENTER("CyaSSL_SetInternalIV");
+        WOLFSSL_ENTER("wolfSSL_SetInternalIV");
 
         if (ctx == NULL) {
-            CYASSL_MSG("Bad function argument");
+            WOLFSSL_MSG("Bad function argument");
             return SSL_FATAL_ERROR;
         }
 
         switch (ctx->cipherType) {
 
+#ifndef NO_AES
             case AES_128_CBC_TYPE :
             case AES_192_CBC_TYPE :
             case AES_256_CBC_TYPE :
-                CYASSL_MSG("AES CBC");
+                WOLFSSL_MSG("AES CBC");
                 memcpy(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE);
                 break;
 
-#ifdef CYASSL_AES_COUNTER
+#ifdef WOLFSSL_AES_COUNTER
             case AES_128_CTR_TYPE :
             case AES_192_CTR_TYPE :
             case AES_256_CTR_TYPE :
-                CYASSL_MSG("AES CTR");
+                WOLFSSL_MSG("AES CTR");
                 memcpy(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE);
                 break;
 #endif
 
+#endif /* NO_AES */
+
+#ifndef NO_DES3
             case DES_CBC_TYPE :
-                CYASSL_MSG("DES CBC");
+                WOLFSSL_MSG("DES CBC");
                 memcpy(&ctx->cipher.des.reg, ctx->iv, DES_BLOCK_SIZE);
                 break;
 
             case DES_EDE3_CBC_TYPE :
-                CYASSL_MSG("DES EDE3 CBC");
-                memcpy(&ctx->cipher.des.reg, ctx->iv, DES_BLOCK_SIZE);
+                WOLFSSL_MSG("DES EDE3 CBC");
+                memcpy(&ctx->cipher.des3.reg, ctx->iv, DES_BLOCK_SIZE);
                 break;
+#endif
 
             case ARC4_TYPE :
-                CYASSL_MSG("ARC4");
+                WOLFSSL_MSG("ARC4");
                 break;
 
             case NULL_CIPHER_TYPE :
-                CYASSL_MSG("NULL");
+                WOLFSSL_MSG("NULL");
                 break;
 
             default: {
-                CYASSL_MSG("bad type");
+                WOLFSSL_MSG("bad type");
                 return SSL_FATAL_ERROR;
             }
         }
@@ -7297,34 +8216,38 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_DigestInit(CYASSL_EVP_MD_CTX* ctx, const CYASSL_EVP_MD* type)
+    int wolfSSL_EVP_DigestInit(WOLFSSL_EVP_MD_CTX* ctx, const WOLFSSL_EVP_MD* type)
     {
-        CYASSL_ENTER("EVP_DigestInit");
-        if (XSTRNCMP(type, "MD5", 3) == 0) {
-             ctx->macType = MD5;
-             CyaSSL_MD5_Init((MD5_CTX*)&ctx->hash);
-        }
-        else if (XSTRNCMP(type, "SHA256", 6) == 0) {
+        WOLFSSL_ENTER("EVP_DigestInit");
+        if (XSTRNCMP(type, "SHA256", 6) == 0) {
              ctx->macType = SHA256;
-             CyaSSL_SHA256_Init((SHA256_CTX*)&ctx->hash);
+             wolfSSL_SHA256_Init((SHA256_CTX*)&ctx->hash);
         }
-    #ifdef CYASSL_SHA384
+    #ifdef WOLFSSL_SHA384
         else if (XSTRNCMP(type, "SHA384", 6) == 0) {
              ctx->macType = SHA384;
-             CyaSSL_SHA384_Init((SHA384_CTX*)&ctx->hash);
+             wolfSSL_SHA384_Init((SHA384_CTX*)&ctx->hash);
         }
     #endif
-    #ifdef CYASSL_SHA512
+    #ifdef WOLFSSL_SHA512
         else if (XSTRNCMP(type, "SHA512", 6) == 0) {
              ctx->macType = SHA512;
-             CyaSSL_SHA512_Init((SHA512_CTX*)&ctx->hash);
+             wolfSSL_SHA512_Init((SHA512_CTX*)&ctx->hash);
+        }
+    #endif
+    #ifndef NO_MD5
+        else if (XSTRNCMP(type, "MD5", 3) == 0) {
+            ctx->macType = MD5;
+            wolfSSL_MD5_Init((MD5_CTX*)&ctx->hash);
         }
     #endif
+    #ifndef NO_SHA
         /* has to be last since would pick or 256, 384, or 512 too */
         else if (XSTRNCMP(type, "SHA", 3) == 0) {
              ctx->macType = SHA;
-             CyaSSL_SHA_Init((SHA_CTX*)&ctx->hash);
+             wolfSSL_SHA_Init((SHA_CTX*)&ctx->hash);
         }
+    #endif /* NO_SHA */
         else
              return BAD_FUNC_ARG;
 
@@ -7333,217 +8256,278 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_DigestUpdate(CYASSL_EVP_MD_CTX* ctx, const void* data,
+    int wolfSSL_EVP_DigestUpdate(WOLFSSL_EVP_MD_CTX* ctx, const void* data,
                                 unsigned long sz)
     {
-        CYASSL_ENTER("EVP_DigestUpdate");
-        if (ctx->macType == MD5)
-            CyaSSL_MD5_Update((MD5_CTX*)&ctx->hash, data, (unsigned long)sz);
-        else if (ctx->macType == SHA)
-            CyaSSL_SHA_Update((SHA_CTX*)&ctx->hash, data, (unsigned long)sz);
-        else if (ctx->macType == SHA256)
-            CyaSSL_SHA256_Update((SHA256_CTX*)&ctx->hash, data,
-                                 (unsigned long)sz);
-    #ifdef CYASSL_SHA384
-        else if (ctx->macType == SHA384)
-            CyaSSL_SHA384_Update((SHA384_CTX*)&ctx->hash, data,
-                                 (unsigned long)sz);
-    #endif
-    #ifdef CYASSL_SHA512
-        else if (ctx->macType == SHA512)
-            CyaSSL_SHA512_Update((SHA512_CTX*)&ctx->hash, data,
-                                 (unsigned long)sz);
-    #endif
-        else
-            return BAD_FUNC_ARG;
+        WOLFSSL_ENTER("EVP_DigestUpdate");
+
+        switch (ctx->macType) {
+#ifndef NO_MD5
+            case MD5:
+                wolfSSL_MD5_Update((MD5_CTX*)&ctx->hash, data,
+                                  (unsigned long)sz);
+                break;
+#endif
+#ifndef NO_SHA
+            case SHA:
+                wolfSSL_SHA_Update((SHA_CTX*)&ctx->hash, data,
+                                  (unsigned long)sz);
+                break;
+#endif
+#ifndef NO_SHA256
+            case SHA256:
+                wolfSSL_SHA256_Update((SHA256_CTX*)&ctx->hash, data,
+                                     (unsigned long)sz);
+                break;
+#endif
+#ifdef WOLFSSL_SHA384
+            case SHA384:
+                wolfSSL_SHA384_Update((SHA384_CTX*)&ctx->hash, data,
+                                     (unsigned long)sz);
+                break;
+#endif
+#ifdef WOLFSSL_SHA512
+            case SHA512:
+                wolfSSL_SHA512_Update((SHA512_CTX*)&ctx->hash, data,
+                                     (unsigned long)sz);
+                break;
+#endif
+            default:
+                return BAD_FUNC_ARG;
+        }
 
         return SSL_SUCCESS;
     }
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_DigestFinal(CYASSL_EVP_MD_CTX* ctx, unsigned char* md,
+    int wolfSSL_EVP_DigestFinal(WOLFSSL_EVP_MD_CTX* ctx, unsigned char* md,
                                unsigned int* s)
     {
-        CYASSL_ENTER("EVP_DigestFinal");
-        if (ctx->macType == MD5) {
-            CyaSSL_MD5_Final(md, (MD5_CTX*)&ctx->hash);
-            if (s) *s = MD5_DIGEST_SIZE;
-        }
-        else if (ctx->macType == SHA) {
-            CyaSSL_SHA_Final(md, (SHA_CTX*)&ctx->hash);
-            if (s) *s = SHA_DIGEST_SIZE;
-        }
-        else if (ctx->macType == SHA256) {
-            CyaSSL_SHA256_Final(md, (SHA256_CTX*)&ctx->hash);
-            if (s) *s = SHA256_DIGEST_SIZE;
-        }
-    #ifdef CYASSL_SHA384
-        else if (ctx->macType == SHA384) {
-            CyaSSL_SHA384_Final(md, (SHA384_CTX*)&ctx->hash);
-            if (s) *s = SHA384_DIGEST_SIZE;
-        }
-    #endif
-    #ifdef CYASSL_SHA512
-        else if (ctx->macType == SHA512) {
-            CyaSSL_SHA512_Final(md, (SHA512_CTX*)&ctx->hash);
-            if (s) *s = SHA512_DIGEST_SIZE;
+        WOLFSSL_ENTER("EVP_DigestFinal");
+        switch (ctx->macType) {
+#ifndef NO_MD5
+            case MD5:
+                wolfSSL_MD5_Final(md, (MD5_CTX*)&ctx->hash);
+                if (s) *s = MD5_DIGEST_SIZE;
+                break;
+#endif
+#ifndef NO_SHA
+            case SHA:
+                wolfSSL_SHA_Final(md, (SHA_CTX*)&ctx->hash);
+                if (s) *s = SHA_DIGEST_SIZE;
+                break;
+#endif
+#ifndef NO_SHA256
+            case SHA256:
+                wolfSSL_SHA256_Final(md, (SHA256_CTX*)&ctx->hash);
+                if (s) *s = SHA256_DIGEST_SIZE;
+                break;
+#endif
+#ifdef WOLFSSL_SHA384
+            case SHA384:
+                wolfSSL_SHA384_Final(md, (SHA384_CTX*)&ctx->hash);
+                if (s) *s = SHA384_DIGEST_SIZE;
+                break;
+#endif
+#ifdef WOLFSSL_SHA512
+            case SHA512:
+                wolfSSL_SHA512_Final(md, (SHA512_CTX*)&ctx->hash);
+                if (s) *s = SHA512_DIGEST_SIZE;
+                break;
+#endif
+            default:
+                return BAD_FUNC_ARG;
         }
-    #endif
-        else
-            return BAD_FUNC_ARG;
 
         return SSL_SUCCESS;
     }
 
 
     /* SSL_SUCCESS on ok */
-    int CyaSSL_EVP_DigestFinal_ex(CYASSL_EVP_MD_CTX* ctx, unsigned char* md,
+    int wolfSSL_EVP_DigestFinal_ex(WOLFSSL_EVP_MD_CTX* ctx, unsigned char* md,
                                   unsigned int* s)
     {
-        CYASSL_ENTER("EVP_DigestFinal_ex");
+        WOLFSSL_ENTER("EVP_DigestFinal_ex");
         return EVP_DigestFinal(ctx, md, s);
     }
 
 
-    unsigned char* CyaSSL_HMAC(const CYASSL_EVP_MD* evp_md, const void* key,
+    unsigned char* wolfSSL_HMAC(const WOLFSSL_EVP_MD* evp_md, const void* key,
                                int key_len, const unsigned char* d, int n,
                                unsigned char* md, unsigned int* md_len)
     {
-        Hmac hmac;
-
-        CYASSL_ENTER("HMAC");
-        if (!md) return NULL;  /* no static buffer support */
-
-        if (XSTRNCMP(evp_md, "MD5", 3) == 0) {
-            if (HmacSetKey(&hmac, MD5, (const byte*)key, key_len) != 0)
-                return NULL;
+        int type;
+        unsigned char* ret = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+        Hmac* hmac = NULL;
+#else
+        Hmac  hmac[1];
+#endif
 
-            if (md_len) *md_len = MD5_DIGEST_SIZE;
-        }
-        else if (XSTRNCMP(evp_md, "SHA", 3) == 0) {
-            if (HmacSetKey(&hmac, SHA, (const byte*)key, key_len) != 0)
-                return NULL;
+        WOLFSSL_ENTER("HMAC");
+        if (!md)
+            return NULL;  /* no static buffer support */
 
-            if (md_len) *md_len = SHA_DIGEST_SIZE;
-        }
+        if (XSTRNCMP(evp_md, "MD5", 3) == 0)
+            type = MD5;
+        else if (XSTRNCMP(evp_md, "SHA", 3) == 0)
+            type = SHA;
         else
             return NULL;
 
-        if (HmacUpdate(&hmac, d, n) != 0)
+    #ifdef WOLFSSL_SMALL_STACK
+        hmac = (Hmac*)XMALLOC(sizeof(Hmac), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (hmac == NULL)
             return NULL;
+    #endif
 
-        if (HmacFinal(&hmac, md) != 0)
-            return NULL;
-    
-        return md;
+        if (wc_HmacSetKey(hmac, type, (const byte*)key, key_len) == 0)
+            if (wc_HmacUpdate(hmac, d, n) == 0)
+                if (wc_HmacFinal(hmac, md) == 0) {
+                    if (md_len)
+                        *md_len = (type == MD5) ? (int)MD5_DIGEST_SIZE
+                                                : (int)SHA_DIGEST_SIZE;
+                    ret = md;
+                }
+
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(hmac, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+
+        return ret;
     }
 
-    void CyaSSL_ERR_clear_error(void)
+    void wolfSSL_ERR_clear_error(void)
     {
         /* TODO: */
     }
 
 
-    int CyaSSL_RAND_status(void)
+    int wolfSSL_RAND_status(void)
     {
-        return SSL_SUCCESS;  /* CTaoCrypt provides enough seed internally */
+        return SSL_SUCCESS;  /* wolfCrypt provides enough seed internally */
     }
 
 
 
-    void CyaSSL_RAND_add(const void* add, int len, double entropy)
+    void wolfSSL_RAND_add(const void* add, int len, double entropy)
     {
         (void)add;
         (void)len;
         (void)entropy;
 
-        /* CyaSSL seeds/adds internally, use explicit RNG if you want
+        /* wolfSSL seeds/adds internally, use explicit RNG if you want
            to take control */
     }
 
 
+#ifndef NO_DES3
     /* SSL_SUCCESS on ok */
-    int CyaSSL_DES_key_sched(CYASSL_const_DES_cblock* key,
-                             CYASSL_DES_key_schedule* schedule)
+    int wolfSSL_DES_key_sched(WOLFSSL_const_DES_cblock* key,
+                             WOLFSSL_DES_key_schedule* schedule)
     {
-        CYASSL_ENTER("DES_key_sched");
+        WOLFSSL_ENTER("DES_key_sched");
         XMEMCPY(schedule, key, sizeof(const_DES_cblock));
         return SSL_SUCCESS;
     }
 
 
-    void CyaSSL_DES_cbc_encrypt(const unsigned char* input,
+    void wolfSSL_DES_cbc_encrypt(const unsigned char* input,
                      unsigned char* output, long length,
-                     CYASSL_DES_key_schedule* schedule, CYASSL_DES_cblock* ivec,
+                     WOLFSSL_DES_key_schedule* schedule, WOLFSSL_DES_cblock* ivec,
                      int enc)
     {
         Des myDes;
 
-        CYASSL_ENTER("DES_cbc_encrypt");
+        WOLFSSL_ENTER("DES_cbc_encrypt");
 
         /* OpenSSL compat, no ret */
-        Des_SetKey(&myDes, (const byte*)schedule, (const byte*)ivec, !enc);
+        wc_Des_SetKey(&myDes, (const byte*)schedule, (const byte*)ivec, !enc);
 
         if (enc)
-            Des_CbcEncrypt(&myDes, output, input, (word32)length);
+            wc_Des_CbcEncrypt(&myDes, output, input, (word32)length);
         else
-            Des_CbcDecrypt(&myDes, output, input, (word32)length);
+            wc_Des_CbcDecrypt(&myDes, output, input, (word32)length);
     }
 
 
     /* correctly sets ivec for next call */
-    void CyaSSL_DES_ncbc_encrypt(const unsigned char* input,
+    void wolfSSL_DES_ncbc_encrypt(const unsigned char* input,
                      unsigned char* output, long length,
-                     CYASSL_DES_key_schedule* schedule, CYASSL_DES_cblock* ivec,
+                     WOLFSSL_DES_key_schedule* schedule, WOLFSSL_DES_cblock* ivec,
                      int enc)
     {
         Des myDes;
 
-        CYASSL_ENTER("DES_ncbc_encrypt");
+        WOLFSSL_ENTER("DES_ncbc_encrypt");
 
         /* OpenSSL compat, no ret */
-        Des_SetKey(&myDes, (const byte*)schedule, (const byte*)ivec, !enc);
+        wc_Des_SetKey(&myDes, (const byte*)schedule, (const byte*)ivec, !enc);
 
         if (enc)
-            Des_CbcEncrypt(&myDes, output, input, (word32)length);
+            wc_Des_CbcEncrypt(&myDes, output, input, (word32)length);
         else
-            Des_CbcDecrypt(&myDes, output, input, (word32)length);
+            wc_Des_CbcDecrypt(&myDes, output, input, (word32)length);
 
         XMEMCPY(ivec, output + length - sizeof(DES_cblock), sizeof(DES_cblock));
     }
 
+#endif /* NO_DES3 */
 
-    void CyaSSL_ERR_free_strings(void)
+
+    void wolfSSL_ERR_free_strings(void)
     {
         /* handled internally */
     }
 
 
-    void CyaSSL_ERR_remove_state(unsigned long state)
+    void wolfSSL_ERR_remove_state(unsigned long state)
     {
         /* TODO: GetErrors().Remove(); */
         (void)state;
     }
 
 
-    void CyaSSL_EVP_cleanup(void)
+    void wolfSSL_EVP_cleanup(void)
     {
         /* nothing to do here */
     }
 
 
-    void CyaSSL_cleanup_all_ex_data(void)
+    void wolfSSL_cleanup_all_ex_data(void)
     {
         /* nothing to do here */
     }
 
 
-    long CyaSSL_CTX_set_mode(CYASSL_CTX* ctx, long mode)
+    int wolfSSL_clear(WOLFSSL* ssl)
     {
-        /* SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is CyaSSL default mode */
-
-        CYASSL_ENTER("SSL_CTX_set_mode");
+        (void)ssl;
+        /* TODO: GetErrors().Remove(); */
+        return SSL_SUCCESS;
+    }
+
+
+    long wolfSSL_SSL_SESSION_set_timeout(WOLFSSL_SESSION* ses, long t)
+    {
+        word32 tmptime;
+        if (!ses || t < 0)
+            return BAD_FUNC_ARG;
+
+        tmptime = t & 0xFFFFFFFF;
+
+        ses->timeout = tmptime;
+
+        return SSL_SUCCESS;
+    }
+
+
+    long wolfSSL_CTX_set_mode(WOLFSSL_CTX* ctx, long mode)
+    {
+        /* SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is wolfSSL default mode */
+
+        WOLFSSL_ENTER("SSL_CTX_set_mode");
         if (mode == SSL_MODE_ENABLE_PARTIAL_WRITE)
             ctx->partialWrite = 1;
 
@@ -7551,7 +8535,15 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    long CyaSSL_CTX_get_mode(CYASSL_CTX* ctx)
+    long wolfSSL_SSL_get_mode(WOLFSSL* ssl)
+    {
+        /* TODO: */
+        (void)ssl;
+        return 0;
+    }
+
+
+    long wolfSSL_CTX_get_mode(WOLFSSL_CTX* ctx)
     {
         /* TODO: */
         (void)ctx;
@@ -7559,7 +8551,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    void CyaSSL_CTX_set_default_read_ahead(CYASSL_CTX* ctx, int m)
+    void wolfSSL_CTX_set_default_read_ahead(WOLFSSL_CTX* ctx, int m)
     {
         /* TODO: maybe? */
         (void)ctx;
@@ -7567,11 +8559,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_CTX_set_session_id_context(CYASSL_CTX* ctx,
+    int wolfSSL_CTX_set_session_id_context(WOLFSSL_CTX* ctx,
                                        const unsigned char* sid_ctx,
                                        unsigned int sid_ctx_len)
     {
-        /* No application specific context needed for cyaSSL */
+        /* No application specific context needed for wolfSSL */
         (void)ctx;
         (void)sid_ctx;
         (void)sid_ctx_len;
@@ -7579,14 +8571,14 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    long CyaSSL_CTX_sess_get_cache_size(CYASSL_CTX* ctx)
+    long wolfSSL_CTX_sess_get_cache_size(WOLFSSL_CTX* ctx)
     {
         /* TODO: maybe? */
         (void)ctx;
         return (~0);
     }
 
-    unsigned long CyaSSL_ERR_get_error_line_data(const char** file, int* line,
+    unsigned long wolfSSL_ERR_get_error_line_data(const char** file, int* line,
                                           const char** data, int *flags)
     {
         /* Not implemented */
@@ -7602,9 +8594,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 #if defined(KEEP_PEER_CERT)
 
-    CYASSL_X509* CyaSSL_get_peer_certificate(CYASSL* ssl)
+    WOLFSSL_X509* wolfSSL_get_peer_certificate(WOLFSSL* ssl)
     {
-        CYASSL_ENTER("SSL_get_peer_certificate");
+        WOLFSSL_ENTER("SSL_get_peer_certificate");
         if (ssl->peerCert.issuer.sz)
             return &ssl->peerCert;
         else
@@ -7616,18 +8608,18 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
 #if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
 
-    void CyaSSL_FreeX509(CYASSL_X509* x509)
+    void wolfSSL_FreeX509(WOLFSSL_X509* x509)
     {
-        CYASSL_ENTER("CyaSSL_FreeX509");
+        WOLFSSL_ENTER("wolfSSL_FreeX509");
         FreeX509(x509);
     }
 
 
     /* return the next, if any, altname from the peer cert */
-    char* CyaSSL_X509_get_next_altname(CYASSL_X509* cert)
+    char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
     {
         char* ret = NULL;
-        CYASSL_ENTER("CyaSSL_X509_get_next_altname");
+        WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
 
         /* don't have any to work with */
         if (cert == NULL || cert->altNames == NULL)
@@ -7644,41 +8636,41 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    CYASSL_X509_NAME* CyaSSL_X509_get_issuer_name(CYASSL_X509* cert)
+    WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
     {
-        CYASSL_ENTER("X509_get_issuer_name");
+        WOLFSSL_ENTER("X509_get_issuer_name");
         return &cert->issuer;
     }
 
 
-    CYASSL_X509_NAME* CyaSSL_X509_get_subject_name(CYASSL_X509* cert)
+    WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
     {
-        CYASSL_ENTER("X509_get_subject_name");
+        WOLFSSL_ENTER("X509_get_subject_name");
         return &cert->subject;
     }
 
 
-    int CyaSSL_X509_get_isCA(CYASSL_X509* x509)
+    int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
     {
         int isCA = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_isCA");
+        WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
 
         if (x509 != NULL)
             isCA = x509->isCa;
 
-        CYASSL_LEAVE("CyaSSL_X509_get_isCA", isCA);
+        WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
 
         return isCA;
     }
 
 
 #ifdef OPENSSL_EXTRA
-    int CyaSSL_X509_ext_isSet_by_NID(CYASSL_X509* x509, int nid)
+    int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
     {
         int isSet = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_ext_isSet_by_NID");
+        WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
 
         if (x509 != NULL) {
             switch (nid) {
@@ -7687,23 +8679,23 @@ int CyaSSL_set_compression(CYASSL* ssl)
                 case AUTH_KEY_OID: isSet = x509->authKeyIdSet; break;
                 case SUBJ_KEY_OID: isSet = x509->subjKeyIdSet; break;
                 case KEY_USAGE_OID: isSet = x509->keyUsageSet; break;
-                #ifdef CYASSL_SEP
+                #ifdef WOLFSSL_SEP
                     case CERT_POLICY_OID: isSet = x509->certPolicySet; break;
-                #endif /* CYASSL_SEP */
+                #endif /* WOLFSSL_SEP */
             }
         }
 
-        CYASSL_LEAVE("CyaSSL_X509_ext_isSet_by_NID", isSet);
+        WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
 
         return isSet;
     }
 
 
-    int CyaSSL_X509_ext_get_critical_by_NID(CYASSL_X509* x509, int nid)
+    int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
     {
         int crit = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_ext_get_critical_by_NID");
+        WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
 
         if (x509 != NULL) {
             switch (nid) {
@@ -7712,70 +8704,70 @@ int CyaSSL_set_compression(CYASSL* ssl)
                 case AUTH_KEY_OID: crit = x509->authKeyIdCrit; break;
                 case SUBJ_KEY_OID: crit = x509->subjKeyIdCrit; break;
                 case KEY_USAGE_OID: crit = x509->keyUsageCrit; break;
-                #ifdef CYASSL_SEP
+                #ifdef WOLFSSL_SEP
                     case CERT_POLICY_OID: crit = x509->certPolicyCrit; break;
-                #endif /* CYASSL_SEP */
+                #endif /* WOLFSSL_SEP */
             }
         }
 
-        CYASSL_LEAVE("CyaSSL_X509_ext_get_critical_by_NID", crit);
+        WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
 
         return crit;
     }
 
 
-    int CyaSSL_X509_get_isSet_pathLength(CYASSL_X509* x509)
+    int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
     {
         int isSet = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_isSet_pathLength");
+        WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
 
         if (x509 != NULL)
             isSet = x509->basicConstPlSet;
 
-        CYASSL_LEAVE("CyaSSL_X509_get_isSet_pathLength", isSet);
+        WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
 
         return isSet;
     }
 
 
-    word32 CyaSSL_X509_get_pathLength(CYASSL_X509* x509)
+    word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
     {
         word32 pathLength = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_pathLength");
+        WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
 
         if (x509 != NULL)
             pathLength = x509->pathLength;
 
-        CYASSL_LEAVE("CyaSSL_X509_get_pathLength", pathLength);
+        WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
 
         return pathLength;
     }
 
 
-    unsigned int CyaSSL_X509_get_keyUsage(CYASSL_X509* x509)
+    unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
     {
         word16 usage = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_keyUsage");
+        WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
 
         if (x509 != NULL)
             usage = x509->keyUsage;
 
-        CYASSL_LEAVE("CyaSSL_X509_get_keyUsage", usage);
+        WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
 
         return usage;
     }
 
 
-    byte* CyaSSL_X509_get_authorityKeyID(
-                                      CYASSL_X509* x509, byte* dst, int* dstLen)
+    byte* wolfSSL_X509_get_authorityKeyID(
+                                      WOLFSSL_X509* x509, byte* dst, int* dstLen)
     {
         byte *id = NULL;
         int copySz = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_authorityKeyID");
+        WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
 
         if (x509 != NULL) {
             if (x509->authKeyIdSet) {
@@ -7791,19 +8783,19 @@ int CyaSSL_set_compression(CYASSL* ssl)
             }
         }
 
-        CYASSL_LEAVE("CyaSSL_X509_get_authorityKeyID", copySz);
+        WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
 
         return id;
     }
 
 
-    byte* CyaSSL_X509_get_subjectKeyID(
-                                      CYASSL_X509* x509, byte* dst, int* dstLen)
+    byte* wolfSSL_X509_get_subjectKeyID(
+                                      WOLFSSL_X509* x509, byte* dst, int* dstLen)
     {
         byte *id = NULL;
         int copySz = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_subjectKeyID");
+        WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
 
         if (x509 != NULL) {
             if (x509->subjKeyIdSet) {
@@ -7819,33 +8811,33 @@ int CyaSSL_set_compression(CYASSL* ssl)
             }
         }
 
-        CYASSL_LEAVE("CyaSSL_X509_get_subjectKeyID", copySz);
+        WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
 
         return id;
     }
 
 
-    int CyaSSL_X509_NAME_entry_count(CYASSL_X509_NAME* name)
+    int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
     {
         int count = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_NAME_entry_count");
+        WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
 
         if (name != NULL)
             count = name->fullName.entryCount;
 
-        CYASSL_LEAVE("CyaSSL_X509_NAME_entry_count", count);
+        WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
         return count;
     }
 
 
-    int CyaSSL_X509_NAME_get_text_by_NID(CYASSL_X509_NAME* name,
+    int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
                                                     int nid, char* buf, int len)
     {
         char *text = NULL;
         int textSz = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_NAME_get_text_by_NID");
+        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
 
         switch (nid) {
             case ASN_COMMON_NAME:
@@ -7890,7 +8882,7 @@ int CyaSSL_set_compression(CYASSL* ssl)
             buf[textSz] = '\0';
         }
 
-        CYASSL_LEAVE("CyaSSL_X509_NAME_get_text_by_NID", textSz);
+        WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
         return textSz;
     }
 #endif
@@ -7898,11 +8890,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
 
     /* copy name into in buffer, at most sz bytes, if buffer is null will
        malloc buffer, call responsible for freeing                     */
-    char* CyaSSL_X509_NAME_oneline(CYASSL_X509_NAME* name, char* in, int sz)
+    char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
     {
         int copySz = min(sz, name->sz);
 
-        CYASSL_ENTER("CyaSSL_X509_NAME_oneline");
+        WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
         if (!name->sz) return in;
 
         if (!in) {
@@ -7921,11 +8913,11 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_X509_get_signature_type(CYASSL_X509* x509)
+    int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
     {
         int type = 0;
 
-        CYASSL_ENTER("CyaSSL_X509_get_signature_type");
+        WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
 
         if (x509 != NULL)
             type = x509->sigOID;
@@ -7934,10 +8926,10 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_X509_get_signature(CYASSL_X509* x509,
+    int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
                                                  unsigned char* buf, int* bufSz)
     {
-        CYASSL_ENTER("CyaSSL_X509_get_signature");
+        WOLFSSL_ENTER("wolfSSL_X509_get_signature");
         if (x509 == NULL || bufSz == NULL || *bufSz < (int)x509->sig.length)
             return SSL_FATAL_ERROR;
 
@@ -7952,9 +8944,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     /* write X509 serial number in unsigned binary to buffer
        buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
        return SSL_SUCCESS on success */
-    int CyaSSL_X509_get_serial_number(CYASSL_X509* x509, byte* in, int* inOutSz)
+    int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509, byte* in, int* inOutSz)
     {
-        CYASSL_ENTER("CyaSSL_X509_get_serial_number");
+        WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
         if (x509 == NULL || in == NULL ||
                                    inOutSz == NULL || *inOutSz < x509->serialSz)
             return BAD_FUNC_ARG;
@@ -7966,9 +8958,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    const byte* CyaSSL_X509_get_der(CYASSL_X509* x509, int* outSz)
+    const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
     {
-        CYASSL_ENTER("CyaSSL_X509_get_der");
+        WOLFSSL_ENTER("wolfSSL_X509_get_der");
 
         if (x509 == NULL || outSz == NULL)
             return NULL;
@@ -7978,9 +8970,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    int CyaSSL_X509_version(CYASSL_X509* x509)
+    int wolfSSL_X509_version(WOLFSSL_X509* x509)
     {
-        CYASSL_ENTER("CyaSSL_X509_version");
+        WOLFSSL_ENTER("wolfSSL_X509_version");
 
         if (x509 == NULL)
             return 0;
@@ -7989,9 +8981,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    const byte* CyaSSL_X509_notBefore(CYASSL_X509* x509)
+    const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
     {
-        CYASSL_ENTER("CyaSSL_X509_notBefore");
+        WOLFSSL_ENTER("wolfSSL_X509_notBefore");
 
         if (x509 == NULL)
             return NULL;
@@ -8000,9 +8992,9 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-    const byte* CyaSSL_X509_notAfter(CYASSL_X509* x509)
+    const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
     {
-        CYASSL_ENTER("CyaSSL_X509_notAfter");
+        WOLFSSL_ENTER("wolfSSL_X509_notAfter");
 
         if (x509 == NULL)
             return NULL;
@@ -8011,16 +9003,16 @@ int CyaSSL_set_compression(CYASSL* ssl)
     }
 
 
-#ifdef CYASSL_SEP
+#ifdef WOLFSSL_SEP
 
 /* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
    malloc buffer, call responsible for freeing. Actual size returned in
    *inOutSz. Requires inOutSz be non-null */
-byte* CyaSSL_X509_get_device_type(CYASSL_X509* x509, byte* in, int *inOutSz)
+byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
 {
     int copySz;
 
-    CYASSL_ENTER("CyaSSL_X509_get_dev_type");
+    WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
     if (inOutSz == NULL) return NULL;
     if (!x509->deviceTypeSz) return in;
 
@@ -8039,11 +9031,11 @@ byte* CyaSSL_X509_get_device_type(CYASSL_X509* x509, byte* in, int *inOutSz)
 }
 
 
-byte* CyaSSL_X509_get_hw_type(CYASSL_X509* x509, byte* in, int* inOutSz)
+byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
 {
     int copySz;
 
-    CYASSL_ENTER("CyaSSL_X509_get_hw_type");
+    WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
     if (inOutSz == NULL) return NULL;
     if (!x509->hwTypeSz) return in;
 
@@ -8062,11 +9054,11 @@ byte* CyaSSL_X509_get_hw_type(CYASSL_X509* x509, byte* in, int* inOutSz)
 }
 
 
-byte* CyaSSL_X509_get_hw_serial_number(CYASSL_X509* x509,byte* in,int* inOutSz)
+byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,int* inOutSz)
 {
     int copySz;
 
-    CYASSL_ENTER("CyaSSL_X509_get_hw_serial_number");
+    WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
     if (inOutSz == NULL) return NULL;
     if (!x509->hwTypeSz) return in;
 
@@ -8084,31 +9076,45 @@ byte* CyaSSL_X509_get_hw_serial_number(CYASSL_X509* x509,byte* in,int* inOutSz)
     return in;
 }
 
-#endif /* CYASSL_SEP */
+#endif /* WOLFSSL_SEP */
 
 
-CYASSL_X509* CyaSSL_X509_d2i(CYASSL_X509** x509, const byte* in, int len)
+WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
 {
-    CYASSL_X509 *newX509 = NULL;
+    WOLFSSL_X509 *newX509 = NULL;
 
-    CYASSL_ENTER("CyaSSL_X509_d2i");
+    WOLFSSL_ENTER("wolfSSL_X509_d2i");
 
     if (in != NULL && len != 0) {
-        DecodedCert cert;
+    #ifdef WOLFSSL_SMALL_STACK
+        DecodedCert* cert = NULL;
+    #else
+        DecodedCert  cert[1];
+    #endif
+
+    #ifdef WOLFSSL_SMALL_STACK
+        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (cert == NULL)
+            return NULL;
+    #endif
 
-        InitDecodedCert(&cert, (byte*)in, len, NULL);
-        if (ParseCertRelative(&cert, CERT_TYPE, 0, NULL) == 0) {
-            newX509 = (CYASSL_X509*)XMALLOC(sizeof(CYASSL_X509),
+        InitDecodedCert(cert, (byte*)in, len, NULL);
+        if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0) {
+            newX509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509),
                                                        NULL, DYNAMIC_TYPE_X509);
             if (newX509 != NULL) {
                 InitX509(newX509, 1);
-                if (CopyDecodedToX509(newX509, &cert) != 0) {
+                if (CopyDecodedToX509(newX509, cert) != 0) {
                     XFREE(newX509, NULL, DYNAMIC_TYPE_X509);
                     newX509 = NULL;
                 }
             }
         }
-        FreeDecodedCert(&cert);
+        FreeDecodedCert(cert);
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
     }
 
     if (x509 != NULL)
@@ -8122,11 +9128,11 @@ CYASSL_X509* CyaSSL_X509_d2i(CYASSL_X509** x509, const byte* in, int len)
 
 #ifndef NO_STDIO_FILESYSTEM
 
-CYASSL_X509* CyaSSL_X509_d2i_fp(CYASSL_X509** x509, XFILE file)
+WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
 {
-    CYASSL_X509* newX509 = NULL;
+    WOLFSSL_X509* newX509 = NULL;
 
-    CYASSL_ENTER("CyaSSL_X509_d2i_fp");
+    WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
 
     if (file != XBADFILE) {
         byte* fileBuffer = NULL;
@@ -8136,10 +9142,16 @@ CYASSL_X509* CyaSSL_X509_d2i_fp(CYASSL_X509** x509, XFILE file)
         sz = XFTELL(file);
         XREWIND(file);
 
+        if (sz < 0) {
+            WOLFSSL_MSG("Bad tell on FILE");
+            return NULL;
+        }
+
         fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
         if (fileBuffer != NULL) {
-            if ((int)XFREAD(fileBuffer, sz, 1, file) > 0) {
-                newX509 = CyaSSL_X509_d2i(NULL, fileBuffer, (int)sz);
+            int ret = (int)XFREAD(fileBuffer, sz, 1, file);
+            if (ret > 0) {
+                newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
             }
             XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
         }
@@ -8153,17 +9165,23 @@ CYASSL_X509* CyaSSL_X509_d2i_fp(CYASSL_X509** x509, XFILE file)
 
 #endif /* NO_STDIO_FILESYSTEM */
 
-CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
+WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
 {
-    byte staticBuffer[FILE_BUFFER_SIZE];
+#ifdef WOLFSSL_SMALL_STACK
+    byte  staticBuffer[1]; /* force heap usage */
+#else
+    byte  staticBuffer[FILE_BUFFER_SIZE];
+#endif
     byte* fileBuffer = staticBuffer;
-    int dynamic = 0;
-    long sz = 0;
+    int   dynamic = 0;
+    int   ret;
+    long  sz = 0;
     XFILE file;
-    CYASSL_X509* x509 = NULL;
+
+    WOLFSSL_X509* x509 = NULL;
     buffer der;
 
-    CYASSL_ENTER("CyaSSL_X509_load_certificate");
+    WOLFSSL_ENTER("wolfSSL_X509_load_certificate");
 
     /* Check the inputs */
     if ((fname == NULL) ||
@@ -8171,7 +9189,9 @@ CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
         return NULL;
 
     file = XFOPEN(fname, "rb");
-    if (file == XBADFILE) return NULL;
+    if (file == XBADFILE)
+        return NULL;
+
     XFSEEK(file, 0, XSEEK_END);
     sz = XFTELL(file);
     XREWIND(file);
@@ -8184,25 +9204,48 @@ CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
         }
         dynamic = 1;
     }
-    if ((int)XFREAD(fileBuffer, sz, 1, file) < 0) {
+    else if (sz < 0) {
+        XFCLOSE(file);
+        return NULL;
+    }
+
+    ret = (int)XFREAD(fileBuffer, sz, 1, file);
+    if (ret < 0) {
         XFCLOSE(file);
-        if (dynamic) XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
+        if (dynamic)
+            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
         return NULL;
     }
+
     XFCLOSE(file);
 
     der.buffer = NULL;
     der.length = 0;
 
     if (format == SSL_FILETYPE_PEM) {
-        EncryptedInfo info;
         int ecc = 0;
+    #ifdef WOLFSSL_SMALL_STACK
+        EncryptedInfo* info = NULL;
+    #else
+        EncryptedInfo  info[1];
+    #endif
+
+    #ifdef WOLFSSL_SMALL_STACK
+        info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (info == NULL) {
+            if (dynamic)
+                XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
+
+            return NULL;
+        }
+    #endif
 
-        info.set = 0;
-        info.ctx = NULL;
-        info.consumed = 0;
+        info->set = 0;
+        info->ctx = NULL;
+        info->consumed = 0;
 
-        if (PemToDer(fileBuffer, sz, CERT_TYPE, &der, NULL, &info, &ecc) != 0)
+        if (PemToDer(fileBuffer, sz, CERT_TYPE, &der, NULL, info, &ecc) != 0)
         {
             /* Only time this should fail, and leave `der` with a buffer
                is when the Base64 Decode fails. Release `der.buffer` in
@@ -8212,6 +9255,10 @@ CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
                 der.buffer = NULL;
             }
         }
+
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
     }
     else {
         der.buffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_CERT);
@@ -8220,26 +9267,43 @@ CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
             der.length = (word32)sz;
         }
     }
-    if (dynamic) XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
+
+    if (dynamic)
+        XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
 
     /* At this point we want `der` to have the certificate in DER format */
     /* ready to be decoded. */
     if (der.buffer != NULL) {
-        DecodedCert cert;
+    #ifdef WOLFSSL_SMALL_STACK
+        DecodedCert* cert = NULL;
+    #else
+        DecodedCert  cert[1];
+    #endif
 
-        InitDecodedCert(&cert, der.buffer, der.length, NULL);
-        if (ParseCertRelative(&cert, CERT_TYPE, 0, NULL) == 0) {
-            x509 = (CYASSL_X509*)XMALLOC(sizeof(CYASSL_X509),
-                                                       NULL, DYNAMIC_TYPE_X509);
-            if (x509 != NULL) {
-                InitX509(x509, 1);
-                if (CopyDecodedToX509(x509, &cert) != 0) {
-                    XFREE(x509, NULL, DYNAMIC_TYPE_X509);
-                    x509 = NULL;
+    #ifdef WOLFSSL_SMALL_STACK
+        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (cert != NULL)
+    #endif
+        {
+            InitDecodedCert(cert, der.buffer, der.length, NULL);
+            if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0) {
+                x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
+                                                             DYNAMIC_TYPE_X509);
+                if (x509 != NULL) {
+                    InitX509(x509, 1);
+                    if (CopyDecodedToX509(x509, cert) != 0) {
+                        XFREE(x509, NULL, DYNAMIC_TYPE_X509);
+                        x509 = NULL;
+                    }
                 }
             }
+
+            FreeDecodedCert(cert);
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
         }
-        FreeDecodedCert(&cert);
 
         XFREE(der.buffer, NULL, DYNAMIC_TYPE_CERT);
     }
@@ -8253,1339 +9317,1400 @@ CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
 
 
 #ifdef OPENSSL_EXTRA
-    int CyaSSL_set_ex_data(CYASSL* ssl, int idx, void* data)
-    {
+int wolfSSL_set_ex_data(WOLFSSL* ssl, int idx, void* data)
+{
 #ifdef FORTRESS
-        if (ssl != NULL && idx < MAX_EX_DATA)
-        {
-            ssl->ex_data[idx] = data;
-            return SSL_SUCCESS;
-        }
+    if (ssl != NULL && idx < MAX_EX_DATA)
+    {
+        ssl->ex_data[idx] = data;
+        return SSL_SUCCESS;
+    }
 #else
-        (void)ssl;
-        (void)idx;
-        (void)data;
+    (void)ssl;
+    (void)idx;
+    (void)data;
 #endif
-        return SSL_FAILURE;
-    }
+    return SSL_FAILURE;
+}
 
 
-    int CyaSSL_set_session_id_context(CYASSL* ssl, const unsigned char* id,
-                                   unsigned int len)
-    {
-        (void)ssl;
-        (void)id;
-        (void)len;
-        return 0;
-    }
+int wolfSSL_set_session_id_context(WOLFSSL* ssl, const unsigned char* id,
+                               unsigned int len)
+{
+    (void)ssl;
+    (void)id;
+    (void)len;
+    return 0;
+}
 
 
-    void CyaSSL_set_connect_state(CYASSL* ssl)
-    {
-        (void)ssl;
-        /* client by default */
-    }
+void wolfSSL_set_connect_state(WOLFSSL* ssl)
+{
+    (void)ssl;
+    /* client by default */
+}
 #endif
 
-    int CyaSSL_get_shutdown(const CYASSL* ssl)
-    {
-        return (ssl->options.isClosed  ||
-                ssl->options.connReset ||
-                ssl->options.sentNotify);
-    }
+int wolfSSL_get_shutdown(const WOLFSSL* ssl)
+{
+    return (ssl->options.isClosed  ||
+            ssl->options.connReset ||
+            ssl->options.sentNotify);
+}
 
 
-    int CyaSSL_session_reused(CYASSL* ssl)
-    {
-        return ssl->options.resuming;
-    }
+int wolfSSL_session_reused(WOLFSSL* ssl)
+{
+    return ssl->options.resuming;
+}
 
 #ifdef OPENSSL_EXTRA
-    void CyaSSL_SESSION_free(CYASSL_SESSION* session)
-    {
-        (void)session;
-    }
+void wolfSSL_SESSION_free(WOLFSSL_SESSION* session)
+{
+    (void)session;
+}
 #endif
 
-    const char* CyaSSL_get_version(CYASSL* ssl)
-    {
-        CYASSL_ENTER("SSL_get_version");
-        if (ssl->version.major == SSLv3_MAJOR) {
-            switch (ssl->version.minor) {
-                case SSLv3_MINOR :
-                    return "SSLv3";
-                case TLSv1_MINOR :
-                    return "TLSv1";
-                case TLSv1_1_MINOR :
-                    return "TLSv1.1";
-                case TLSv1_2_MINOR :
-                    return "TLSv1.2";
-                default:
-                    return "unknown";
-            }
+const char* wolfSSL_get_version(WOLFSSL* ssl)
+{
+    WOLFSSL_ENTER("SSL_get_version");
+    if (ssl->version.major == SSLv3_MAJOR) {
+        switch (ssl->version.minor) {
+            case SSLv3_MINOR :
+                return "SSLv3";
+            case TLSv1_MINOR :
+                return "TLSv1";
+            case TLSv1_1_MINOR :
+                return "TLSv1.1";
+            case TLSv1_2_MINOR :
+                return "TLSv1.2";
+            default:
+                return "unknown";
         }
-        else if (ssl->version.major == DTLS_MAJOR) {
-            switch (ssl->version.minor) {
-                case DTLS_MINOR :
-                    return "DTLS";
-                case DTLSv1_2_MINOR :
-                    return "DTLSv1.2";
-                default:
-                    return "unknown";
-            }
+    }
+    else if (ssl->version.major == DTLS_MAJOR) {
+        switch (ssl->version.minor) {
+            case DTLS_MINOR :
+                return "DTLS";
+            case DTLSv1_2_MINOR :
+                return "DTLSv1.2";
+            default:
+                return "unknown";
         }
-        return "unknown";
     }
+    return "unknown";
+}
 
-    int CyaSSL_get_current_cipher_suite(CYASSL* ssl)
-    {
-        CYASSL_ENTER("SSL_get_current_cipher_suite");
-        if (ssl)
-            return (ssl->options.cipherSuite0 << 8) | ssl->options.cipherSuite;
-        return 0;
-    }
 
-    CYASSL_CIPHER* CyaSSL_get_current_cipher(CYASSL* ssl)
-    {
-        CYASSL_ENTER("SSL_get_current_cipher");
-        if (ssl)
-            return &ssl->cipher;
-        else
-            return NULL;
-    }
+/* current library version */
+const char* wolfSSL_lib_version(void)
+{
+    return LIBWOLFSSL_VERSION_STRING;
+}
 
 
-    const char* CyaSSL_CIPHER_get_name(const CYASSL_CIPHER* cipher)
-    {
-        (void)cipher;
+/* current library version in hex */
+word32 wolfSSL_lib_version_hex(void)
+{
+    return LIBWOLFSSL_VERSION_HEX;
+}
+
+
+int wolfSSL_get_current_cipher_suite(WOLFSSL* ssl)
+{
+    WOLFSSL_ENTER("SSL_get_current_cipher_suite");
+    if (ssl)
+        return (ssl->options.cipherSuite0 << 8) | ssl->options.cipherSuite;
+    return 0;
+}
+
+WOLFSSL_CIPHER* wolfSSL_get_current_cipher(WOLFSSL* ssl)
+{
+    WOLFSSL_ENTER("SSL_get_current_cipher");
+    if (ssl)
+        return &ssl->cipher;
+    else
+        return NULL;
+}
+
 
-        CYASSL_ENTER("SSL_CIPHER_get_name");
+const char* wolfSSL_CIPHER_get_name(const WOLFSSL_CIPHER* cipher)
+{
+    (void)cipher;
+
+    WOLFSSL_ENTER("SSL_CIPHER_get_name");
 #ifndef NO_ERROR_STRINGS
-        if (cipher) {
+    if (cipher) {
+#if defined(HAVE_CHACHA)
+        if (cipher->ssl->options.cipherSuite0 == CHACHA_BYTE) {
+        /* ChaCha suites */
+        switch (cipher->ssl->options.cipherSuite) {
+#ifdef HAVE_CHACHA
+#ifndef NO_RSA
+            case TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 :
+                return "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256";
+
+            case TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 :
+                return "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256";
+#endif
+            case TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 :
+                return "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256";
+#endif
+            }
+        }
+#endif
+
 #if defined(HAVE_ECC) || defined(HAVE_AESCCM)
-            /* Awkwardly, the ECC cipher suites use the ECC_BYTE as expected,
-             * but the AES-CCM cipher suites also use it, even the ones that
-             * aren't ECC. */
-            if (cipher->ssl->options.cipherSuite0 == ECC_BYTE) {
-            /* ECC suites */
-            switch (cipher->ssl->options.cipherSuite) {
+        /* Awkwardly, the ECC cipher suites use the ECC_BYTE as expected,
+         * but the AES-CCM cipher suites also use it, even the ones that
+         * aren't ECC. */
+        if (cipher->ssl->options.cipherSuite0 == ECC_BYTE) {
+        /* ECC suites */
+        switch (cipher->ssl->options.cipherSuite) {
 #ifdef HAVE_ECC
 #ifndef NO_RSA
-                case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256";
+            case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 :
+                return "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256";
 #endif
-                case TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256";
+            case TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 :
+                return "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256";
 #ifndef NO_RSA
-                case TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256";
+            case TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 :
+                return "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256";
 #endif
-                case TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256";
+            case TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 :
+                return "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256";
 #ifndef NO_RSA
-                case TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 :
-                    return "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384";
+            case TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 :
+                return "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384";
 #endif
-                case TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384";
+            case TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 :
+                return "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384";
 #ifndef NO_RSA
-                case TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 :
-                    return "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384";
+            case TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 :
+                return "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384";
 #endif
-                case TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 :
-                    return "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384";
+            case TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 :
+                return "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384";
 #ifndef NO_SHA
+#ifndef NO_RSA
+            case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA :
+                return "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA";
+            case TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA :
+                return "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA";
+#endif
+            case TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA :
+                return "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA";
+            case TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA :
+                return "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA";
+#ifndef NO_RC4
     #ifndef NO_RSA
-                case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA";
-                case TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA";
-    #endif
-                case TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA";
-                case TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA";
-    #ifndef NO_RC4
-        #ifndef NO_RSA
-                case TLS_ECDHE_RSA_WITH_RC4_128_SHA :
-                    return "TLS_ECDHE_RSA_WITH_RC4_128_SHA";
-        #endif
-                case TLS_ECDHE_ECDSA_WITH_RC4_128_SHA :
-                    return "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA";
+            case TLS_ECDHE_RSA_WITH_RC4_128_SHA :
+                return "TLS_ECDHE_RSA_WITH_RC4_128_SHA";
     #endif
-    #ifndef NO_DES3
-        #ifndef NO_RSA
-                case TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA :
-                    return "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA";
-        #endif
-                case TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA :
-                    return "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA";
+            case TLS_ECDHE_ECDSA_WITH_RC4_128_SHA :
+                return "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA";
+#endif
+#ifndef NO_DES3
+    #ifndef NO_RSA
+            case TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA :
+                return "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA";
     #endif
+            case TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA :
+                return "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA";
+#endif
 
+#ifndef NO_RSA
+            case TLS_ECDH_RSA_WITH_AES_128_CBC_SHA :
+                return "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA";
+            case TLS_ECDH_RSA_WITH_AES_256_CBC_SHA :
+                return "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA";
+#endif
+            case TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA :
+                return "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA";
+            case TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA :
+                return "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA";
+#ifndef NO_RC4
     #ifndef NO_RSA
-                case TLS_ECDH_RSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA";
-                case TLS_ECDH_RSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA";
+            case TLS_ECDH_RSA_WITH_RC4_128_SHA :
+                return "TLS_ECDH_RSA_WITH_RC4_128_SHA";
     #endif
-                case TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA";
-                case TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA";
-    #ifndef NO_RC4
-        #ifndef NO_RSA
-                case TLS_ECDH_RSA_WITH_RC4_128_SHA :
-                    return "TLS_ECDH_RSA_WITH_RC4_128_SHA";
-        #endif
-                case TLS_ECDH_ECDSA_WITH_RC4_128_SHA :
-                    return "TLS_ECDH_ECDSA_WITH_RC4_128_SHA";
-    #endif
-    #ifndef NO_DES3
-        #ifndef NO_RSA
-                case TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA :
-                    return "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA";
-        #endif
-                case TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA :
-                    return "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA";
+            case TLS_ECDH_ECDSA_WITH_RC4_128_SHA :
+                return "TLS_ECDH_ECDSA_WITH_RC4_128_SHA";
+#endif
+#ifndef NO_DES3
+    #ifndef NO_RSA
+            case TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA :
+                return "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA";
     #endif
+            case TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA :
+                return "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA";
+#endif
 #endif /* NO_SHA */
 
 #ifdef HAVE_AESGCM
-    #ifndef NO_RSA
-                case TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256";
-                case TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384";
-    #endif
-                case TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256";
-                case TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384";
-    #ifndef NO_RSA
-                case TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256";
-                case TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384";
-    #endif
-                case TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256";
-                case TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384";
+#ifndef NO_RSA
+            case TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 :
+                return "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256";
+            case TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 :
+                return "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384";
+#endif
+            case TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 :
+                return "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256";
+            case TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 :
+                return "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384";
+#ifndef NO_RSA
+            case TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 :
+                return "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256";
+            case TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 :
+                return "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384";
+#endif
+            case TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 :
+                return "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256";
+            case TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 :
+                return "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384";
 #endif
 #endif /* HAVE_ECC */
 
 #ifdef HAVE_AESCCM
-    #ifndef NO_RSA
-                case TLS_RSA_WITH_AES_128_CCM_8 :
-                    return "TLS_RSA_WITH_AES_128_CCM_8";
-                case TLS_RSA_WITH_AES_256_CCM_8 :
-                    return "TLS_RSA_WITH_AES_256_CCM_8";
-    #endif
-    #ifndef NO_PSK
-                case TLS_PSK_WITH_AES_128_CCM_8 :
-                    return "TLS_PSK_WITH_AES_128_CCM_8";
-                case TLS_PSK_WITH_AES_256_CCM_8 :
-                    return "TLS_PSK_WITH_AES_256_CCM_8";
-                case TLS_PSK_WITH_AES_128_CCM :
-                    return "TLS_PSK_WITH_AES_128_CCM";
-                case TLS_PSK_WITH_AES_256_CCM :
-                    return "TLS_PSK_WITH_AES_256_CCM";
-                case TLS_DHE_PSK_WITH_AES_128_CCM :
-                    return "TLS_DHE_PSK_WITH_AES_128_CCM";
-                case TLS_DHE_PSK_WITH_AES_256_CCM :
-                    return "TLS_DHE_PSK_WITH_AES_256_CCM";
-    #endif
-    #ifdef HAVE_ECC
-                case TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
-                    return "TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8";
-                case TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 :
-                    return "TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8";
-    #endif
+#ifndef NO_RSA
+            case TLS_RSA_WITH_AES_128_CCM_8 :
+                return "TLS_RSA_WITH_AES_128_CCM_8";
+            case TLS_RSA_WITH_AES_256_CCM_8 :
+                return "TLS_RSA_WITH_AES_256_CCM_8";
+#endif
+#ifndef NO_PSK
+            case TLS_PSK_WITH_AES_128_CCM_8 :
+                return "TLS_PSK_WITH_AES_128_CCM_8";
+            case TLS_PSK_WITH_AES_256_CCM_8 :
+                return "TLS_PSK_WITH_AES_256_CCM_8";
+            case TLS_PSK_WITH_AES_128_CCM :
+                return "TLS_PSK_WITH_AES_128_CCM";
+            case TLS_PSK_WITH_AES_256_CCM :
+                return "TLS_PSK_WITH_AES_256_CCM";
+            case TLS_DHE_PSK_WITH_AES_128_CCM :
+                return "TLS_DHE_PSK_WITH_AES_128_CCM";
+            case TLS_DHE_PSK_WITH_AES_256_CCM :
+                return "TLS_DHE_PSK_WITH_AES_256_CCM";
+#endif
+#ifdef HAVE_ECC
+            case TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
+                return "TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8";
+            case TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 :
+                return "TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8";
+#endif
 #endif
 
-                default:
-                    return "NONE";
-            }
-            }
+            default:
+                return "NONE";
+        }
+        }
 #endif  /* ECC */
-            if (cipher->ssl->options.cipherSuite0 != ECC_BYTE) {
+        if (cipher->ssl->options.cipherSuite0 != ECC_BYTE &&
+            cipher->ssl->options.cipherSuite0 != CHACHA_BYTE) {
+
             /* normal suites */
-            switch (cipher->ssl->options.cipherSuite) {
+        switch (cipher->ssl->options.cipherSuite) {
 #ifndef NO_RSA
-    #ifndef NO_RC4
-        #ifndef NO_SHA
-                case SSL_RSA_WITH_RC4_128_SHA :
-                    return "SSL_RSA_WITH_RC4_128_SHA";
-        #endif
-        #ifndef NO_MD5
-                case SSL_RSA_WITH_RC4_128_MD5 :
-                    return "SSL_RSA_WITH_RC4_128_MD5";
-        #endif
-    #endif
+#ifndef NO_RC4
     #ifndef NO_SHA
-        #ifndef NO_DES3
-                case SSL_RSA_WITH_3DES_EDE_CBC_SHA :
-                    return "SSL_RSA_WITH_3DES_EDE_CBC_SHA";
-        #endif
-                case TLS_RSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_RSA_WITH_AES_128_CBC_SHA";
-                case TLS_RSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_RSA_WITH_AES_256_CBC_SHA";
+            case SSL_RSA_WITH_RC4_128_SHA :
+                return "SSL_RSA_WITH_RC4_128_SHA";
     #endif
-                case TLS_RSA_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_RSA_WITH_AES_128_CBC_SHA256";
-                case TLS_RSA_WITH_AES_256_CBC_SHA256 :
-                    return "TLS_RSA_WITH_AES_256_CBC_SHA256";
-        #ifdef HAVE_BLAKE2
-                case TLS_RSA_WITH_AES_128_CBC_B2B256:
-                    return "TLS_RSA_WITH_AES_128_CBC_B2B256";
-                case TLS_RSA_WITH_AES_256_CBC_B2B256:
-                    return "TLS_RSA_WITH_AES_256_CBC_B2B256";
-        #endif
-    #ifndef NO_SHA
-                case TLS_RSA_WITH_NULL_SHA :
-                    return "TLS_RSA_WITH_NULL_SHA";
+    #ifndef NO_MD5
+            case SSL_RSA_WITH_RC4_128_MD5 :
+                return "SSL_RSA_WITH_RC4_128_MD5";
     #endif
-                case TLS_RSA_WITH_NULL_SHA256 :
-                    return "TLS_RSA_WITH_NULL_SHA256";
-#endif /* NO_RSA */
-#ifndef NO_PSK
-    #ifndef NO_SHA
-                case TLS_PSK_WITH_AES_128_CBC_SHA :
-                    return "TLS_PSK_WITH_AES_128_CBC_SHA";
-                case TLS_PSK_WITH_AES_256_CBC_SHA :
-                    return "TLS_PSK_WITH_AES_256_CBC_SHA";
+#endif
+#ifndef NO_SHA
+    #ifndef NO_DES3
+            case SSL_RSA_WITH_3DES_EDE_CBC_SHA :
+                return "SSL_RSA_WITH_3DES_EDE_CBC_SHA";
     #endif
-    #ifndef NO_SHA256
-                case TLS_PSK_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_PSK_WITH_AES_128_CBC_SHA256";
-                case TLS_PSK_WITH_NULL_SHA256 :
-                    return "TLS_PSK_WITH_NULL_SHA256";
-                case TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256";
-                case TLS_DHE_PSK_WITH_NULL_SHA256 :
-                    return "TLS_DHE_PSK_WITH_NULL_SHA256";
-        #ifdef HAVE_AESGCM
-                case TLS_PSK_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_PSK_WITH_AES_128_GCM_SHA256";
-                case TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_DHE_PSK_WITH_AES_128_GCM_SHA256";
-        #endif
+            case TLS_RSA_WITH_AES_128_CBC_SHA :
+                return "TLS_RSA_WITH_AES_128_CBC_SHA";
+            case TLS_RSA_WITH_AES_256_CBC_SHA :
+                return "TLS_RSA_WITH_AES_256_CBC_SHA";
+#endif
+            case TLS_RSA_WITH_AES_128_CBC_SHA256 :
+                return "TLS_RSA_WITH_AES_128_CBC_SHA256";
+            case TLS_RSA_WITH_AES_256_CBC_SHA256 :
+                return "TLS_RSA_WITH_AES_256_CBC_SHA256";
+    #ifdef HAVE_BLAKE2
+            case TLS_RSA_WITH_AES_128_CBC_B2B256:
+                return "TLS_RSA_WITH_AES_128_CBC_B2B256";
+            case TLS_RSA_WITH_AES_256_CBC_B2B256:
+                return "TLS_RSA_WITH_AES_256_CBC_B2B256";
     #endif
-    #ifdef CYASSL_SHA384
-                case TLS_PSK_WITH_AES_256_CBC_SHA384 :
-                    return "TLS_PSK_WITH_AES_256_CBC_SHA384";
-                case TLS_PSK_WITH_NULL_SHA384 :
-                    return "TLS_PSK_WITH_NULL_SHA384";
-                case TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 :
-                    return "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384";
-                case TLS_DHE_PSK_WITH_NULL_SHA384 :
-                    return "TLS_DHE_PSK_WITH_NULL_SHA384";
-        #ifdef HAVE_AESGCM
-                case TLS_PSK_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_PSK_WITH_AES_256_GCM_SHA384";
-                case TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_DHE_PSK_WITH_AES_256_GCM_SHA384";
-        #endif
+#ifndef NO_SHA
+            case TLS_RSA_WITH_NULL_SHA :
+                return "TLS_RSA_WITH_NULL_SHA";
+#endif
+            case TLS_RSA_WITH_NULL_SHA256 :
+                return "TLS_RSA_WITH_NULL_SHA256";
+#endif /* NO_RSA */
+#ifndef NO_PSK
+#ifndef NO_SHA
+            case TLS_PSK_WITH_AES_128_CBC_SHA :
+                return "TLS_PSK_WITH_AES_128_CBC_SHA";
+            case TLS_PSK_WITH_AES_256_CBC_SHA :
+                return "TLS_PSK_WITH_AES_256_CBC_SHA";
+#endif
+#ifndef NO_SHA256
+            case TLS_PSK_WITH_AES_128_CBC_SHA256 :
+                return "TLS_PSK_WITH_AES_128_CBC_SHA256";
+            case TLS_PSK_WITH_NULL_SHA256 :
+                return "TLS_PSK_WITH_NULL_SHA256";
+            case TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 :
+                return "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256";
+            case TLS_DHE_PSK_WITH_NULL_SHA256 :
+                return "TLS_DHE_PSK_WITH_NULL_SHA256";
+    #ifdef HAVE_AESGCM
+            case TLS_PSK_WITH_AES_128_GCM_SHA256 :
+                return "TLS_PSK_WITH_AES_128_GCM_SHA256";
+            case TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 :
+                return "TLS_DHE_PSK_WITH_AES_128_GCM_SHA256";
     #endif
-    #ifndef NO_SHA
-                case TLS_PSK_WITH_NULL_SHA :
-                    return "TLS_PSK_WITH_NULL_SHA";
+#endif
+#ifdef WOLFSSL_SHA384
+            case TLS_PSK_WITH_AES_256_CBC_SHA384 :
+                return "TLS_PSK_WITH_AES_256_CBC_SHA384";
+            case TLS_PSK_WITH_NULL_SHA384 :
+                return "TLS_PSK_WITH_NULL_SHA384";
+            case TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 :
+                return "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384";
+            case TLS_DHE_PSK_WITH_NULL_SHA384 :
+                return "TLS_DHE_PSK_WITH_NULL_SHA384";
+    #ifdef HAVE_AESGCM
+            case TLS_PSK_WITH_AES_256_GCM_SHA384 :
+                return "TLS_PSK_WITH_AES_256_GCM_SHA384";
+            case TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 :
+                return "TLS_DHE_PSK_WITH_AES_256_GCM_SHA384";
     #endif
+#endif
+#ifndef NO_SHA
+            case TLS_PSK_WITH_NULL_SHA :
+                return "TLS_PSK_WITH_NULL_SHA";
+#endif
 #endif /* NO_PSK */
 #ifndef NO_RSA
-                case TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 :
-                    return "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256";
-                case TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 :
-                    return "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256";
-    #ifndef NO_SHA
-                case TLS_DHE_RSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_DHE_RSA_WITH_AES_128_CBC_SHA";
-                case TLS_DHE_RSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_DHE_RSA_WITH_AES_256_CBC_SHA";
+            case TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 :
+                return "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256";
+            case TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 :
+                return "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256";
+#ifndef NO_SHA
+            case TLS_DHE_RSA_WITH_AES_128_CBC_SHA :
+                return "TLS_DHE_RSA_WITH_AES_128_CBC_SHA";
+            case TLS_DHE_RSA_WITH_AES_256_CBC_SHA :
+                return "TLS_DHE_RSA_WITH_AES_256_CBC_SHA";
+#endif
+#ifndef NO_HC128
+    #ifndef NO_MD5
+            case TLS_RSA_WITH_HC_128_MD5 :
+                return "TLS_RSA_WITH_HC_128_MD5";
     #endif
-    #ifndef NO_HC128
-        #ifndef NO_MD5
-                case TLS_RSA_WITH_HC_128_MD5 :
-                    return "TLS_RSA_WITH_HC_128_MD5";
-        #endif
-        #ifndef NO_SHA
-                case TLS_RSA_WITH_HC_128_SHA :
-                    return "TLS_RSA_WITH_HC_128_SHA";
-        #endif
-        #ifdef HAVE_BLAKE2
-                case TLS_RSA_WITH_HC_128_B2B256:
-                    return "TLS_RSA_WITH_HC_128_B2B256";
-        #endif
-    #endif /* NO_HC128 */
     #ifndef NO_SHA
-        #ifndef NO_RABBIT
-                case TLS_RSA_WITH_RABBIT_SHA :
-                    return "TLS_RSA_WITH_RABBIT_SHA";
-        #endif
-        #ifdef HAVE_NTRU
-            #ifndef NO_RC4
-                case TLS_NTRU_RSA_WITH_RC4_128_SHA :
-                    return "TLS_NTRU_RSA_WITH_RC4_128_SHA";
-            #endif
-            #ifndef NO_DES3
-                case TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA :
-                    return "TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA";
-            #endif
-                case TLS_NTRU_RSA_WITH_AES_128_CBC_SHA :
-                    return "TLS_NTRU_RSA_WITH_AES_128_CBC_SHA";
-                case TLS_NTRU_RSA_WITH_AES_256_CBC_SHA :
-                    return "TLS_NTRU_RSA_WITH_AES_256_CBC_SHA";
-        #endif /* HAVE_NTRU */
-    #endif /* NO_SHA */
-                case TLS_RSA_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_RSA_WITH_AES_128_GCM_SHA256";
-                case TLS_RSA_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_RSA_WITH_AES_256_GCM_SHA384";
-                case TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 :
-                    return "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256";
-                case TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 :
-                    return "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384";
-    #ifndef NO_SHA
-                case TLS_RSA_WITH_CAMELLIA_128_CBC_SHA :
-                    return "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA";
-                case TLS_RSA_WITH_CAMELLIA_256_CBC_SHA :
-                    return "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA";
+            case TLS_RSA_WITH_HC_128_SHA :
+                return "TLS_RSA_WITH_HC_128_SHA";
     #endif
-                case TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 :
-                    return "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256";
-                case TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 :
-                    return "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256";
-    #ifndef NO_SHA
-                case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA :
-                    return "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA";
-                case TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA :
-                    return "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA";
+    #ifdef HAVE_BLAKE2
+            case TLS_RSA_WITH_HC_128_B2B256:
+                return "TLS_RSA_WITH_HC_128_B2B256";
+    #endif
+#endif /* NO_HC128 */
+#ifndef NO_SHA
+    #ifndef NO_RABBIT
+            case TLS_RSA_WITH_RABBIT_SHA :
+                return "TLS_RSA_WITH_RABBIT_SHA";
     #endif
-                case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 :
-                    return "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256";
-                case TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 :
-                    return "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256";
+    #ifdef HAVE_NTRU
+        #ifndef NO_RC4
+            case TLS_NTRU_RSA_WITH_RC4_128_SHA :
+                return "TLS_NTRU_RSA_WITH_RC4_128_SHA";
+        #endif
+        #ifndef NO_DES3
+            case TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA :
+                return "TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA";
+        #endif
+            case TLS_NTRU_RSA_WITH_AES_128_CBC_SHA :
+                return "TLS_NTRU_RSA_WITH_AES_128_CBC_SHA";
+            case TLS_NTRU_RSA_WITH_AES_256_CBC_SHA :
+                return "TLS_NTRU_RSA_WITH_AES_256_CBC_SHA";
+    #endif /* HAVE_NTRU */
+#endif /* NO_SHA */
+            case TLS_RSA_WITH_AES_128_GCM_SHA256 :
+                return "TLS_RSA_WITH_AES_128_GCM_SHA256";
+            case TLS_RSA_WITH_AES_256_GCM_SHA384 :
+                return "TLS_RSA_WITH_AES_256_GCM_SHA384";
+            case TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 :
+                return "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256";
+            case TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 :
+                return "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384";
+#ifndef NO_SHA
+            case TLS_RSA_WITH_CAMELLIA_128_CBC_SHA :
+                return "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA";
+            case TLS_RSA_WITH_CAMELLIA_256_CBC_SHA :
+                return "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA";
+#endif
+            case TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 :
+                return "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256";
+            case TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 :
+                return "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256";
+#ifndef NO_SHA
+            case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA :
+                return "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA";
+            case TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA :
+                return "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA";
+#endif
+            case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 :
+                return "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256";
+            case TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 :
+                return "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256";
 #endif /* NO_RSA */
-                default:
-                    return "NONE";
-            }  /* switch */
-            }  /* normal / ECC */
-        }
-#endif /* NO_ERROR_STRINGS */
-        return "NONE";
+#ifdef BUILD_TLS_DH_anon_WITH_AES_128_CBC_SHA
+            case TLS_DH_anon_WITH_AES_128_CBC_SHA :
+                return "TLS_DH_anon_WITH_AES_128_CBC_SHA";
+#endif
+            default:
+                return "NONE";
+        }  /* switch */
+        }  /* normal / ECC */
     }
+#endif /* NO_ERROR_STRINGS */
+    return "NONE";
+}
 
 
-    const char* CyaSSL_get_cipher(CYASSL* ssl)
-    {
-        CYASSL_ENTER("CyaSSL_get_cipher");
-        return CyaSSL_CIPHER_get_name(CyaSSL_get_current_cipher(ssl));
-    }
+const char* wolfSSL_get_cipher(WOLFSSL* ssl)
+{
+    WOLFSSL_ENTER("wolfSSL_get_cipher");
+    return wolfSSL_CIPHER_get_name(wolfSSL_get_current_cipher(ssl));
+}
 
 #ifdef OPENSSL_EXTRA
 
 
 
-    char* CyaSSL_CIPHER_description(CYASSL_CIPHER* cipher, char* in, int len)
-    {
-        (void)cipher;
-        (void)in;
-        (void)len;
-        return 0;
-    }
+char* wolfSSL_CIPHER_description(WOLFSSL_CIPHER* cipher, char* in, int len)
+{
+    (void)cipher;
+    (void)in;
+    (void)len;
+    return 0;
+}
 
 
-    CYASSL_SESSION* CyaSSL_get1_session(CYASSL* ssl)  /* what's ref count */
-    {
-        (void)ssl;
-        return 0;
-    }
+WOLFSSL_SESSION* wolfSSL_get1_session(WOLFSSL* ssl)  /* what's ref count */
+{
+    (void)ssl;
+    return 0;
+}
 
 
-    void CyaSSL_X509_free(CYASSL_X509* buf)
-    {
-        (void)buf;
-    }
+void wolfSSL_X509_free(WOLFSSL_X509* buf)
+{
+    FreeX509(buf);
+}
 
 
-    /* was do nothing */
-    /*
-    void OPENSSL_free(void* buf)
-    {
-        (void)buf;
-    }
-    */
+/* was do nothing */
+/*
+void OPENSSL_free(void* buf)
+{
+    (void)buf;
+}
+*/
 
 
-    int CyaSSL_OCSP_parse_url(char* url, char** host, char** port, char** path,
-                       int* ssl)
-    {
-        (void)url;
-        (void)host;
-        (void)port;
-        (void)path;
-        (void)ssl;
-        return 0;
-    }
+int wolfSSL_OCSP_parse_url(char* url, char** host, char** port, char** path,
+                   int* ssl)
+{
+    (void)url;
+    (void)host;
+    (void)port;
+    (void)path;
+    (void)ssl;
+    return 0;
+}
 
 
-    CYASSL_METHOD* CyaSSLv2_client_method(void)
-    {
-        return 0;
-    }
+WOLFSSL_METHOD* wolfSSLv2_client_method(void)
+{
+    return 0;
+}
 
 
-    CYASSL_METHOD* CyaSSLv2_server_method(void)
-    {
-        return 0;
-    }
+WOLFSSL_METHOD* wolfSSLv2_server_method(void)
+{
+    return 0;
+}
 
 
 #ifndef NO_MD4
 
-    void CyaSSL_MD4_Init(CYASSL_MD4_CTX* md4)
-    {
-        /* make sure we have a big enough buffer */
-        typedef char ok[sizeof(md4->buffer) >= sizeof(Md4) ? 1 : -1];
-        (void) sizeof(ok);
+void wolfSSL_MD4_Init(WOLFSSL_MD4_CTX* md4)
+{
+    /* make sure we have a big enough buffer */
+    typedef char ok[sizeof(md4->buffer) >= sizeof(Md4) ? 1 : -1];
+    (void) sizeof(ok);
 
-        CYASSL_ENTER("MD4_Init");
-        InitMd4((Md4*)md4);
-    }
+    WOLFSSL_ENTER("MD4_Init");
+    wc_InitMd4((Md4*)md4);
+}
 
 
-    void CyaSSL_MD4_Update(CYASSL_MD4_CTX* md4, const void* data,
-                           unsigned long len)
-    {
-        CYASSL_ENTER("MD4_Update");
-        Md4Update((Md4*)md4, (const byte*)data, (word32)len);
-    }
+void wolfSSL_MD4_Update(WOLFSSL_MD4_CTX* md4, const void* data,
+                       unsigned long len)
+{
+    WOLFSSL_ENTER("MD4_Update");
+    wc_Md4Update((Md4*)md4, (const byte*)data, (word32)len);
+}
 
 
-    void CyaSSL_MD4_Final(unsigned char* digest, CYASSL_MD4_CTX* md4)
-    {
-        CYASSL_ENTER("MD4_Final");
-        Md4Final((Md4*)md4, digest);
-    }
+void wolfSSL_MD4_Final(unsigned char* digest, WOLFSSL_MD4_CTX* md4)
+{
+    WOLFSSL_ENTER("MD4_Final");
+    wc_Md4Final((Md4*)md4, digest);
+}
 
 #endif /* NO_MD4 */
 
 
-    CYASSL_BIO* CyaSSL_BIO_pop(CYASSL_BIO* top)
-    {
-        (void)top;
-        return 0;
-    }
+WOLFSSL_BIO* wolfSSL_BIO_pop(WOLFSSL_BIO* top)
+{
+    (void)top;
+    return 0;
+}
 
 
-    int CyaSSL_BIO_pending(CYASSL_BIO* bio)
-    {
-        (void)bio;
-        return 0;
-    }
+int wolfSSL_BIO_pending(WOLFSSL_BIO* bio)
+{
+    (void)bio;
+    return 0;
+}
 
 
 
-    CYASSL_BIO_METHOD* CyaSSL_BIO_s_mem(void)
-    {
-        static CYASSL_BIO_METHOD meth;
+WOLFSSL_BIO_METHOD* wolfSSL_BIO_s_mem(void)
+{
+    static WOLFSSL_BIO_METHOD meth;
 
-        CYASSL_ENTER("BIO_s_mem");
-        meth.type = BIO_MEMORY;
+    WOLFSSL_ENTER("BIO_s_mem");
+    meth.type = BIO_MEMORY;
 
-        return &meth;
-    }
+    return &meth;
+}
 
 
-    CYASSL_BIO_METHOD* CyaSSL_BIO_f_base64(void)
-    {
-        return 0;
-    }
+WOLFSSL_BIO_METHOD* wolfSSL_BIO_f_base64(void)
+{
+    return 0;
+}
 
 
-    void CyaSSL_BIO_set_flags(CYASSL_BIO* bio, int flags)
-    {
-        (void)bio;
-        (void)flags;
-    }
+void wolfSSL_BIO_set_flags(WOLFSSL_BIO* bio, int flags)
+{
+    (void)bio;
+    (void)flags;
+}
 
 
 
-    void CyaSSL_RAND_screen(void)
-    {
+void wolfSSL_RAND_screen(void)
+{
 
-    }
+}
 
 
-    const char* CyaSSL_RAND_file_name(char* fname, unsigned long len)
-    {
-        (void)fname;
-        (void)len;
-        return 0;
-    }
+const char* wolfSSL_RAND_file_name(char* fname, unsigned long len)
+{
+    (void)fname;
+    (void)len;
+    return 0;
+}
 
 
-    int CyaSSL_RAND_write_file(const char* fname)
-    {
-        (void)fname;
-        return 0;
-    }
+int wolfSSL_RAND_write_file(const char* fname)
+{
+    (void)fname;
+    return 0;
+}
 
 
-    int CyaSSL_RAND_load_file(const char* fname, long len)
-    {
-        (void)fname;
-        /* CTaoCrypt provides enough entropy internally or will report error */
-        if (len == -1)
-            return 1024;
-        else
-            return (int)len;
-    }
+int wolfSSL_RAND_load_file(const char* fname, long len)
+{
+    (void)fname;
+    /* wolfCrypt provides enough entropy internally or will report error */
+    if (len == -1)
+        return 1024;
+    else
+        return (int)len;
+}
 
 
-    int CyaSSL_RAND_egd(const char* path)
-    {
-        (void)path;
-        return 0;
-    }
+int wolfSSL_RAND_egd(const char* path)
+{
+    (void)path;
+    return 0;
+}
 
 
 
-    CYASSL_COMP_METHOD* CyaSSL_COMP_zlib(void)
-    {
-        return 0;
-    }
+WOLFSSL_COMP_METHOD* wolfSSL_COMP_zlib(void)
+{
+    return 0;
+}
 
 
-    CYASSL_COMP_METHOD* CyaSSL_COMP_rle(void)
-    {
-        return 0;
-    }
+WOLFSSL_COMP_METHOD* wolfSSL_COMP_rle(void)
+{
+    return 0;
+}
 
 
-    int CyaSSL_COMP_add_compression_method(int method, void* data)
-    {
-        (void)method;
-        (void)data;
-        return 0;
-    }
+int wolfSSL_COMP_add_compression_method(int method, void* data)
+{
+    (void)method;
+    (void)data;
+    return 0;
+}
 
 
 
-    int CyaSSL_get_ex_new_index(long idx, void* data, void* cb1, void* cb2,
-                             void* cb3)
-    {
-        (void)idx;
-        (void)data;
-        (void)cb1;
-        (void)cb2;
-        (void)cb3;
-        return 0;
-    }
+int wolfSSL_get_ex_new_index(long idx, void* data, void* cb1, void* cb2,
+                         void* cb3)
+{
+    (void)idx;
+    (void)data;
+    (void)cb1;
+    (void)cb2;
+    (void)cb3;
+    return 0;
+}
 
 
-    void CyaSSL_set_dynlock_create_callback(CYASSL_dynlock_value* (*f)(
-                                                              const char*, int))
-    {
-        (void)f;
-    }
+void wolfSSL_set_dynlock_create_callback(WOLFSSL_dynlock_value* (*f)(
+                                                          const char*, int))
+{
+    (void)f;
+}
 
 
-    void CyaSSL_set_dynlock_lock_callback(
-                 void (*f)(int, CYASSL_dynlock_value*, const char*, int))
-    {
-        (void)f;
-    }
+void wolfSSL_set_dynlock_lock_callback(
+             void (*f)(int, WOLFSSL_dynlock_value*, const char*, int))
+{
+    (void)f;
+}
 
 
-    void CyaSSL_set_dynlock_destroy_callback(
-                      void (*f)(CYASSL_dynlock_value*, const char*, int))
-    {
-        (void)f;
-    }
+void wolfSSL_set_dynlock_destroy_callback(
+                  void (*f)(WOLFSSL_dynlock_value*, const char*, int))
+{
+    (void)f;
+}
 
 
 
-    const char* CyaSSL_X509_verify_cert_error_string(long err)
-    {
-        (void)err;
-        return 0;
-    }
+const char* wolfSSL_X509_verify_cert_error_string(long err)
+{
+    (void)err;
+    return 0;
+}
 
 
 
-    int CyaSSL_X509_LOOKUP_add_dir(CYASSL_X509_LOOKUP* lookup, const char* dir,
-                                   long len)
-    {
-        (void)lookup;
-        (void)dir;
-        (void)len;
-        return 0;
-    }
+int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
+                               long len)
+{
+    (void)lookup;
+    (void)dir;
+    (void)len;
+    return 0;
+}
 
 
-    int CyaSSL_X509_LOOKUP_load_file(CYASSL_X509_LOOKUP* lookup,
-                                     const char* file, long len)
-    {
-        (void)lookup;
-        (void)file;
-        (void)len;
-        return 0;
-    }
+int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
+                                 const char* file, long len)
+{
+    (void)lookup;
+    (void)file;
+    (void)len;
+    return 0;
+}
 
 
-    CYASSL_X509_LOOKUP_METHOD* CyaSSL_X509_LOOKUP_hash_dir(void)
-    {
-        return 0;
-    }
+WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
+{
+    return 0;
+}
 
 
-    CYASSL_X509_LOOKUP_METHOD* CyaSSL_X509_LOOKUP_file(void)
-    {
-        return 0;
-    }
+WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
+{
+    return 0;
+}
 
 
 
-    CYASSL_X509_LOOKUP* CyaSSL_X509_STORE_add_lookup(CYASSL_X509_STORE* store,
-                                                   CYASSL_X509_LOOKUP_METHOD* m)
-    {
-        (void)store;
-        (void)m;
-        return 0;
-    }
+WOLFSSL_X509_LOOKUP* wolfSSL_X509_STORE_add_lookup(WOLFSSL_X509_STORE* store,
+                                               WOLFSSL_X509_LOOKUP_METHOD* m)
+{
+    (void)store;
+    (void)m;
+    return 0;
+}
 
 
-    int CyaSSL_X509_STORE_add_cert(CYASSL_X509_STORE* store, CYASSL_X509* x509)
-    {
-        int result = SSL_FATAL_ERROR;
+int wolfSSL_X509_STORE_add_cert(WOLFSSL_X509_STORE* store, WOLFSSL_X509* x509)
+{
+    int result = SSL_FATAL_ERROR;
 
-        CYASSL_ENTER("CyaSSL_X509_STORE_add_cert");
-        if (store != NULL && store->cm != NULL && x509 != NULL) {
-            buffer derCert;
-            derCert.buffer = (byte*)XMALLOC(x509->derCert.length,
-                                                       NULL, DYNAMIC_TYPE_CERT);
-            if (derCert.buffer != NULL) {
-                derCert.length = x509->derCert.length;
-                    /* AddCA() frees the buffer. */
-                XMEMCPY(derCert.buffer,
-                                    x509->derCert.buffer, x509->derCert.length);
-                result = AddCA(store->cm, derCert, CYASSL_USER_CA, 1);
-                if (result != SSL_SUCCESS) result = SSL_FATAL_ERROR;
-            }
+    WOLFSSL_ENTER("wolfSSL_X509_STORE_add_cert");
+    if (store != NULL && store->cm != NULL && x509 != NULL) {
+        buffer derCert;
+        derCert.buffer = (byte*)XMALLOC(x509->derCert.length,
+                                                   NULL, DYNAMIC_TYPE_CERT);
+        if (derCert.buffer != NULL) {
+            derCert.length = x509->derCert.length;
+                /* AddCA() frees the buffer. */
+            XMEMCPY(derCert.buffer,
+                                x509->derCert.buffer, x509->derCert.length);
+            result = AddCA(store->cm, derCert, WOLFSSL_USER_CA, 1);
+            if (result != SSL_SUCCESS) result = SSL_FATAL_ERROR;
         }
-
-        CYASSL_LEAVE("CyaSSL_X509_STORE_add_cert", result);
-        return result;
     }
 
+    WOLFSSL_LEAVE("wolfSSL_X509_STORE_add_cert", result);
+    return result;
+}
 
-    CYASSL_X509_STORE* CyaSSL_X509_STORE_new(void)
-    {
-        CYASSL_X509_STORE* store = NULL;
-
-        store = (CYASSL_X509_STORE*)XMALLOC(sizeof(CYASSL_X509_STORE), NULL, 0);
-        if (store != NULL) {
-            store->cm = CyaSSL_CertManagerNew();
-            if (store->cm == NULL) {
-                XFREE(store, NULL, 0);
-                store = NULL;
-            }
-        }
-
-        return store;
-    }
 
+WOLFSSL_X509_STORE* wolfSSL_X509_STORE_new(void)
+{
+    WOLFSSL_X509_STORE* store = NULL;
 
-    void CyaSSL_X509_STORE_free(CYASSL_X509_STORE* store)
-    {
-        if (store != NULL) {
-            if (store->cm != NULL)
-            CyaSSL_CertManagerFree(store->cm);
+    store = (WOLFSSL_X509_STORE*)XMALLOC(sizeof(WOLFSSL_X509_STORE), NULL, 0);
+    if (store != NULL) {
+        store->cm = wolfSSL_CertManagerNew();
+        if (store->cm == NULL) {
             XFREE(store, NULL, 0);
+            store = NULL;
         }
     }
 
+    return store;
+}
+
 
-    int CyaSSL_X509_STORE_set_default_paths(CYASSL_X509_STORE* store)
-    {
-        (void)store;
-        return SSL_SUCCESS;
+void wolfSSL_X509_STORE_free(WOLFSSL_X509_STORE* store)
+{
+    if (store != NULL) {
+        if (store->cm != NULL)
+        wolfSSL_CertManagerFree(store->cm);
+        XFREE(store, NULL, 0);
     }
+}
 
 
-    int CyaSSL_X509_STORE_get_by_subject(CYASSL_X509_STORE_CTX* ctx, int idx,
-                                CYASSL_X509_NAME* name, CYASSL_X509_OBJECT* obj)
-    {
-        (void)ctx;
-        (void)idx;
-        (void)name;
-        (void)obj;
-        return 0;
-    }
+int wolfSSL_X509_STORE_set_default_paths(WOLFSSL_X509_STORE* store)
+{
+    (void)store;
+    return SSL_SUCCESS;
+}
 
 
-    CYASSL_X509_STORE_CTX* CyaSSL_X509_STORE_CTX_new(void)
-    {
-        CYASSL_X509_STORE_CTX* ctx = (CYASSL_X509_STORE_CTX*)XMALLOC(
-                                        sizeof(CYASSL_X509_STORE_CTX), NULL, 0);
+int wolfSSL_X509_STORE_get_by_subject(WOLFSSL_X509_STORE_CTX* ctx, int idx,
+                            WOLFSSL_X509_NAME* name, WOLFSSL_X509_OBJECT* obj)
+{
+    (void)ctx;
+    (void)idx;
+    (void)name;
+    (void)obj;
+    return 0;
+}
 
-        if (ctx != NULL)
-            CyaSSL_X509_STORE_CTX_init(ctx, NULL, NULL, NULL);
 
-        return ctx;
-    }
+WOLFSSL_X509_STORE_CTX* wolfSSL_X509_STORE_CTX_new(void)
+{
+    WOLFSSL_X509_STORE_CTX* ctx = (WOLFSSL_X509_STORE_CTX*)XMALLOC(
+                                    sizeof(WOLFSSL_X509_STORE_CTX), NULL, 0);
 
+    if (ctx != NULL)
+        wolfSSL_X509_STORE_CTX_init(ctx, NULL, NULL, NULL);
 
-    int CyaSSL_X509_STORE_CTX_init(CYASSL_X509_STORE_CTX* ctx,
-         CYASSL_X509_STORE* store, CYASSL_X509* x509, STACK_OF(CYASSL_X509)* sk)
-    {
-        (void)sk;
-        if (ctx != NULL) {
-            ctx->store = store;
-            ctx->current_cert = x509;
-            ctx->domain = NULL;
-            ctx->ex_data = NULL;
-            ctx->userCtx = NULL;
-            ctx->error = 0;
-            ctx->error_depth = 0;
-            ctx->discardSessionCerts = 0;
-            return SSL_SUCCESS;
-        }
-        return SSL_FATAL_ERROR;
-    }
+    return ctx;
+}
 
 
-    void CyaSSL_X509_STORE_CTX_free(CYASSL_X509_STORE_CTX* ctx)
-    {
-        if (ctx != NULL) {
-            if (ctx->store != NULL)
-                CyaSSL_X509_STORE_free(ctx->store);
-            if (ctx->current_cert != NULL)
-                CyaSSL_FreeX509(ctx->current_cert);
-            XFREE(ctx, NULL, 0);
-        }
+int wolfSSL_X509_STORE_CTX_init(WOLFSSL_X509_STORE_CTX* ctx,
+     WOLFSSL_X509_STORE* store, WOLFSSL_X509* x509, STACK_OF(WOLFSSL_X509)* sk)
+{
+    (void)sk;
+    if (ctx != NULL) {
+        ctx->store = store;
+        ctx->current_cert = x509;
+        ctx->domain = NULL;
+        ctx->ex_data = NULL;
+        ctx->userCtx = NULL;
+        ctx->error = 0;
+        ctx->error_depth = 0;
+        ctx->discardSessionCerts = 0;
+        return SSL_SUCCESS;
     }
+    return SSL_FATAL_ERROR;
+}
 
 
-    void CyaSSL_X509_STORE_CTX_cleanup(CYASSL_X509_STORE_CTX* ctx)
-    {
-        (void)ctx;
+void wolfSSL_X509_STORE_CTX_free(WOLFSSL_X509_STORE_CTX* ctx)
+{
+    if (ctx != NULL) {
+        if (ctx->store != NULL)
+            wolfSSL_X509_STORE_free(ctx->store);
+        if (ctx->current_cert != NULL)
+            wolfSSL_FreeX509(ctx->current_cert);
+        XFREE(ctx, NULL, 0);
     }
+}
 
 
-    int CyaSSL_X509_verify_cert(CYASSL_X509_STORE_CTX* ctx)
-    {
-        if (ctx != NULL && ctx->store != NULL && ctx->store->cm != NULL
-                                                 && ctx->current_cert != NULL) {
-            return CyaSSL_CertManagerVerifyBuffer(ctx->store->cm,
-                        ctx->current_cert->derCert.buffer,
-                        ctx->current_cert->derCert.length,
-                        SSL_FILETYPE_ASN1);
-        }
-        return SSL_FATAL_ERROR;
-    }
+void wolfSSL_X509_STORE_CTX_cleanup(WOLFSSL_X509_STORE_CTX* ctx)
+{
+    (void)ctx;
+}
 
 
-    CYASSL_ASN1_TIME* CyaSSL_X509_CRL_get_lastUpdate(CYASSL_X509_CRL* crl)
-    {
-        (void)crl;
-        return 0;
+int wolfSSL_X509_verify_cert(WOLFSSL_X509_STORE_CTX* ctx)
+{
+    if (ctx != NULL && ctx->store != NULL && ctx->store->cm != NULL
+                                             && ctx->current_cert != NULL) {
+        return wolfSSL_CertManagerVerifyBuffer(ctx->store->cm,
+                    ctx->current_cert->derCert.buffer,
+                    ctx->current_cert->derCert.length,
+                    SSL_FILETYPE_ASN1);
     }
+    return SSL_FATAL_ERROR;
+}
 
 
-    CYASSL_ASN1_TIME* CyaSSL_X509_CRL_get_nextUpdate(CYASSL_X509_CRL* crl)
-    {
-        (void)crl;
-        return 0;
-    }
+WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
+{
+    (void)crl;
+    return 0;
+}
 
 
+WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
+{
+    (void)crl;
+    return 0;
+}
 
-    CYASSL_EVP_PKEY* CyaSSL_X509_get_pubkey(CYASSL_X509* x509)
-    {
-        CYASSL_EVP_PKEY* key = NULL;
-        if (x509 != NULL) {
-            key = (CYASSL_EVP_PKEY*)XMALLOC(
-                        sizeof(CYASSL_EVP_PKEY), NULL, DYNAMIC_TYPE_PUBLIC_KEY);
-            if (key != NULL) {
-                key->type = x509->pubKeyOID;
-                key->save_type = 0;
-                key->pkey.ptr = (char*)XMALLOC(
-                            x509->pubKey.length, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
-                if (key->pkey.ptr == NULL) {
-                    XFREE(key, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
-                    return NULL;
-                }
-                XMEMCPY(key->pkey.ptr,
-                                      x509->pubKey.buffer, x509->pubKey.length);
-                key->pkey_sz = x509->pubKey.length;
-                #ifdef HAVE_ECC
-                    key->pkey_curve = (int)x509->pkCurveOID;
-                #endif /* HAVE_ECC */
+
+
+WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
+{
+    WOLFSSL_EVP_PKEY* key = NULL;
+    if (x509 != NULL) {
+        key = (WOLFSSL_EVP_PKEY*)XMALLOC(
+                    sizeof(WOLFSSL_EVP_PKEY), NULL, DYNAMIC_TYPE_PUBLIC_KEY);
+        if (key != NULL) {
+            key->type = x509->pubKeyOID;
+            key->save_type = 0;
+            key->pkey.ptr = (char*)XMALLOC(
+                        x509->pubKey.length, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
+            if (key->pkey.ptr == NULL) {
+                XFREE(key, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
+                return NULL;
             }
+            XMEMCPY(key->pkey.ptr,
+                                  x509->pubKey.buffer, x509->pubKey.length);
+            key->pkey_sz = x509->pubKey.length;
+            #ifdef HAVE_ECC
+                key->pkey_curve = (int)x509->pkCurveOID;
+            #endif /* HAVE_ECC */
         }
-        return key;
     }
+    return key;
+}
 
 
-    int CyaSSL_X509_CRL_verify(CYASSL_X509_CRL* crl, CYASSL_EVP_PKEY* key)
-    {
-        (void)crl;
-        (void)key;
-        return 0;
-    }
+int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
+{
+    (void)crl;
+    (void)key;
+    return 0;
+}
 
 
-    void CyaSSL_X509_STORE_CTX_set_error(CYASSL_X509_STORE_CTX* ctx, int err)
-    {
-        (void)ctx;
-        (void)err;
-    }
+void wolfSSL_X509_STORE_CTX_set_error(WOLFSSL_X509_STORE_CTX* ctx, int err)
+{
+    (void)ctx;
+    (void)err;
+}
 
 
-    void CyaSSL_X509_OBJECT_free_contents(CYASSL_X509_OBJECT* obj)
-    {
-        (void)obj;
-    }
+void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
+{
+    (void)obj;
+}
 
 
-    void CyaSSL_EVP_PKEY_free(CYASSL_EVP_PKEY* key)
-    {
-        if (key != NULL) {
-            if (key->pkey.ptr != NULL)
-                XFREE(key->pkey.ptr, NULL, 0);
-            XFREE(key, NULL, 0);
-        }
+void wolfSSL_EVP_PKEY_free(WOLFSSL_EVP_PKEY* key)
+{
+    if (key != NULL) {
+        if (key->pkey.ptr != NULL)
+            XFREE(key->pkey.ptr, NULL, 0);
+        XFREE(key, NULL, 0);
     }
+}
 
 
-    int CyaSSL_X509_cmp_current_time(const CYASSL_ASN1_TIME* asnTime)
-    {
-        (void)asnTime;
-        return 0;
-    }
+int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
+{
+    (void)asnTime;
+    return 0;
+}
 
 
-    int CyaSSL_sk_X509_REVOKED_num(CYASSL_X509_REVOKED* revoked)
-    {
-        (void)revoked;
-        return 0;
-    }
+int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_X509_REVOKED* revoked)
+{
+    (void)revoked;
+    return 0;
+}
 
 
 
-    CYASSL_X509_REVOKED* CyaSSL_X509_CRL_get_REVOKED(CYASSL_X509_CRL* crl)
-    {
-        (void)crl;
-        return 0;
-    }
+WOLFSSL_X509_REVOKED* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
+{
+    (void)crl;
+    return 0;
+}
 
 
-    CYASSL_X509_REVOKED* CyaSSL_sk_X509_REVOKED_value(
-                                        CYASSL_X509_REVOKED* revoked, int value)
-    {
-        (void)revoked;
-        (void)value;
-        return 0;
-    }
+WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
+                                    WOLFSSL_X509_REVOKED* revoked, int value)
+{
+    (void)revoked;
+    (void)value;
+    return 0;
+}
 
 
 
-    CYASSL_ASN1_INTEGER* CyaSSL_X509_get_serialNumber(CYASSL_X509* x509)
-    {
-        (void)x509;
-        return 0;
-    }
+WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
+{
+    (void)x509;
+    return 0;
+}
 
 
-    int CyaSSL_ASN1_TIME_print(CYASSL_BIO* bio, const CYASSL_ASN1_TIME* asnTime)
-    {
-        (void)bio;
-        (void)asnTime;
-        return 0;
-    }
+int wolfSSL_ASN1_TIME_print(WOLFSSL_BIO* bio, const WOLFSSL_ASN1_TIME* asnTime)
+{
+    (void)bio;
+    (void)asnTime;
+    return 0;
+}
 
 
 
-    int CyaSSL_ASN1_INTEGER_cmp(const CYASSL_ASN1_INTEGER* a,
-                                const CYASSL_ASN1_INTEGER* b)
-    {
-        (void)a;
-        (void)b;
-        return 0;
-    }
+int wolfSSL_ASN1_INTEGER_cmp(const WOLFSSL_ASN1_INTEGER* a,
+                            const WOLFSSL_ASN1_INTEGER* b)
+{
+    (void)a;
+    (void)b;
+    return 0;
+}
 
 
-    long CyaSSL_ASN1_INTEGER_get(const CYASSL_ASN1_INTEGER* i)
-    {
-        (void)i;
-        return 0;
-    }
+long wolfSSL_ASN1_INTEGER_get(const WOLFSSL_ASN1_INTEGER* i)
+{
+    (void)i;
+    return 0;
+}
 
 
 
-    void* CyaSSL_X509_STORE_CTX_get_ex_data(CYASSL_X509_STORE_CTX* ctx, int idx)
-    {
+void* wolfSSL_X509_STORE_CTX_get_ex_data(WOLFSSL_X509_STORE_CTX* ctx, int idx)
+{
 #ifdef FORTRESS
-        if (ctx != NULL && idx == 0)
-            return ctx->ex_data;
+    if (ctx != NULL && idx == 0)
+        return ctx->ex_data;
 #else
-        (void)ctx;
-        (void)idx;
+    (void)ctx;
+    (void)idx;
 #endif
-        return 0;
-    }
+    return 0;
+}
 
 
-    int CyaSSL_get_ex_data_X509_STORE_CTX_idx(void)
-    {
-        return 0;
-    }
+int wolfSSL_get_ex_data_X509_STORE_CTX_idx(void)
+{
+    return 0;
+}
 
 
-    void* CyaSSL_get_ex_data(const CYASSL* ssl, int idx)
-    {
+void* wolfSSL_get_ex_data(const WOLFSSL* ssl, int idx)
+{
 #ifdef FORTRESS
-        if (ssl != NULL && idx < MAX_EX_DATA)
-            return ssl->ex_data[idx];
+    if (ssl != NULL && idx < MAX_EX_DATA)
+        return ssl->ex_data[idx];
 #else
-        (void)ssl;
-        (void)idx;
+    (void)ssl;
+    (void)idx;
 #endif
-        return 0;
-    }
+    return 0;
+}
 
 
-    void CyaSSL_CTX_set_info_callback(CYASSL_CTX* ctx, void (*f)(void))
-    {
-        (void)ctx;
-        (void)f;
-    }
+void wolfSSL_CTX_set_info_callback(WOLFSSL_CTX* ctx, void (*f)(void))
+{
+    (void)ctx;
+    (void)f;
+}
 
 
-    unsigned long CyaSSL_ERR_peek_error(void)
-    {
-        return 0;
-    }
+unsigned long wolfSSL_ERR_peek_error(void)
+{
+    return 0;
+}
 
 
-    int CyaSSL_ERR_GET_REASON(int err)
-    {
-        (void)err;
-        return 0;
-    }
+int wolfSSL_ERR_GET_REASON(int err)
+{
+    (void)err;
+    return 0;
+}
 
 
-    char* CyaSSL_alert_type_string_long(int alertID)
-    {
-        (void)alertID;
-        return 0;
-    }
+char* wolfSSL_alert_type_string_long(int alertID)
+{
+    (void)alertID;
+    return 0;
+}
 
 
-    char* CyaSSL_alert_desc_string_long(int alertID)
-    {
-        (void)alertID;
-        return 0;
-    }
+char* wolfSSL_alert_desc_string_long(int alertID)
+{
+    (void)alertID;
+    return 0;
+}
 
 
-    char* CyaSSL_state_string_long(CYASSL* ssl)
-    {
-        (void)ssl;
-        return 0;
-    }
+char* wolfSSL_state_string_long(WOLFSSL* ssl)
+{
+    (void)ssl;
+    return 0;
+}
 
 
-    int CyaSSL_PEM_def_callback(char* name, int num, int w, void* key)
-    {
-        (void)name;
-        (void)num;
-        (void)w;
-        (void)key;
-        return 0;
-    }
+int wolfSSL_PEM_def_callback(char* name, int num, int w, void* key)
+{
+    (void)name;
+    (void)num;
+    (void)w;
+    (void)key;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_accept(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_accept(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_connect(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_connect(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_accept_good(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_accept_good(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_connect_good(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_connect_good(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_accept_renegotiate(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_accept_renegotiate(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_connect_renegotiate(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_connect_renegotiate(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_hits(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_hits(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_cb_hits(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_cb_hits(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_cache_full(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_cache_full(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_misses(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_misses(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_timeouts(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_timeouts(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
 
-    long CyaSSL_CTX_sess_number(CYASSL_CTX* ctx)
-    {
-        (void)ctx;
-        return 0;
-    }
+long wolfSSL_CTX_sess_number(WOLFSSL_CTX* ctx)
+{
+    (void)ctx;
+    return 0;
+}
 
+#ifndef NO_DES3
 
-    void CyaSSL_DES_set_key_unchecked(CYASSL_const_DES_cblock* myDes,
-                                                   CYASSL_DES_key_schedule* key)
-    {
-        (void)myDes;
-        (void)key;
-    }
+void wolfSSL_DES_set_key_unchecked(WOLFSSL_const_DES_cblock* myDes,
+                                               WOLFSSL_DES_key_schedule* key)
+{
+    (void)myDes;
+    (void)key;
+}
 
 
-    void CyaSSL_DES_set_odd_parity(CYASSL_DES_cblock* myDes)
-    {
-        (void)myDes;
-    }
+void wolfSSL_DES_set_odd_parity(WOLFSSL_DES_cblock* myDes)
+{
+    (void)myDes;
+}
+
 
+void wolfSSL_DES_ecb_encrypt(WOLFSSL_DES_cblock* desa,
+             WOLFSSL_DES_cblock* desb, WOLFSSL_DES_key_schedule* key, int len)
+{
+    (void)desa;
+    (void)desb;
+    (void)key;
+    (void)len;
+}
 
-    void CyaSSL_DES_ecb_encrypt(CYASSL_DES_cblock* desa,
-                 CYASSL_DES_cblock* desb, CYASSL_DES_key_schedule* key, int len)
-    {
-        (void)desa;
-        (void)desb;
-        (void)key;
-        (void)len;
-    }
+#endif /* NO_DES3 */
 
-    int CyaSSL_BIO_printf(CYASSL_BIO* bio, const char* format, ...)
-    {
-        (void)bio;
-        (void)format;
-        return 0;
-    }
+int wolfSSL_BIO_printf(WOLFSSL_BIO* bio, const char* format, ...)
+{
+    (void)bio;
+    (void)format;
+    return 0;
+}
 
 
-    int CyaSSL_ASN1_UTCTIME_print(CYASSL_BIO* bio, const CYASSL_ASN1_UTCTIME* a)
-    {
-        (void)bio;
-        (void)a;
-        return 0;
-    }
+int wolfSSL_ASN1_UTCTIME_print(WOLFSSL_BIO* bio, const WOLFSSL_ASN1_UTCTIME* a)
+{
+    (void)bio;
+    (void)a;
+    return 0;
+}
 
 
-    int  CyaSSL_sk_num(CYASSL_X509_REVOKED* rev)
-    {
-        (void)rev;
-        return 0;
-    }
+int  wolfSSL_sk_num(WOLFSSL_X509_REVOKED* rev)
+{
+    (void)rev;
+    return 0;
+}
 
 
-    void* CyaSSL_sk_value(CYASSL_X509_REVOKED* rev, int i)
-    {
-        (void)rev;
-        (void)i;
-        return 0;
-    }
+void* wolfSSL_sk_value(WOLFSSL_X509_REVOKED* rev, int i)
+{
+    (void)rev;
+    (void)i;
+    return 0;
+}
 
 
-    /* stunnel 4.28 needs */
-    void* CyaSSL_CTX_get_ex_data(const CYASSL_CTX* ctx, int d)
-    {
-        (void)ctx;
-        (void)d;
-        return 0;
-    }
+/* stunnel 4.28 needs */
+void* wolfSSL_CTX_get_ex_data(const WOLFSSL_CTX* ctx, int d)
+{
+    (void)ctx;
+    (void)d;
+    return 0;
+}
 
 
-    int CyaSSL_CTX_set_ex_data(CYASSL_CTX* ctx, int d, void* p)
-    {
-        (void)ctx;
-        (void)d;
-        (void)p;
-        return SSL_SUCCESS;
-    }
+int wolfSSL_CTX_set_ex_data(WOLFSSL_CTX* ctx, int d, void* p)
+{
+    (void)ctx;
+    (void)d;
+    (void)p;
+    return SSL_SUCCESS;
+}
 
 
-    void CyaSSL_CTX_sess_set_get_cb(CYASSL_CTX* ctx,
-                        CYASSL_SESSION*(*f)(CYASSL*, unsigned char*, int, int*))
-    {
-        (void)ctx;
-        (void)f;
-    }
+void wolfSSL_CTX_sess_set_get_cb(WOLFSSL_CTX* ctx,
+                    WOLFSSL_SESSION*(*f)(WOLFSSL*, unsigned char*, int, int*))
+{
+    (void)ctx;
+    (void)f;
+}
 
 
-    void CyaSSL_CTX_sess_set_new_cb(CYASSL_CTX* ctx,
-                                 int (*f)(CYASSL*, CYASSL_SESSION*))
-    {
-        (void)ctx;
-        (void)f;
-    }
+void wolfSSL_CTX_sess_set_new_cb(WOLFSSL_CTX* ctx,
+                             int (*f)(WOLFSSL*, WOLFSSL_SESSION*))
+{
+    (void)ctx;
+    (void)f;
+}
 
 
-    void CyaSSL_CTX_sess_set_remove_cb(CYASSL_CTX* ctx, void (*f)(CYASSL_CTX*,
-                                                            CYASSL_SESSION*))
-    {
-        (void)ctx;
-        (void)f;
-    }
+void wolfSSL_CTX_sess_set_remove_cb(WOLFSSL_CTX* ctx, void (*f)(WOLFSSL_CTX*,
+                                                        WOLFSSL_SESSION*))
+{
+    (void)ctx;
+    (void)f;
+}
 
 
-    int CyaSSL_i2d_SSL_SESSION(CYASSL_SESSION* sess, unsigned char** p)
-    {
-        (void)sess;
-        (void)p;
-        return sizeof(CYASSL_SESSION);
-    }
+int wolfSSL_i2d_SSL_SESSION(WOLFSSL_SESSION* sess, unsigned char** p)
+{
+    (void)sess;
+    (void)p;
+    return sizeof(WOLFSSL_SESSION);
+}
 
 
-    CYASSL_SESSION* CyaSSL_d2i_SSL_SESSION(CYASSL_SESSION** sess,
-                                    const unsigned char** p, long i)
-    {
-        (void)p;
-        (void)i;
-        if (sess)
-            return *sess;
-        return NULL;
-    }
+WOLFSSL_SESSION* wolfSSL_d2i_SSL_SESSION(WOLFSSL_SESSION** sess,
+                                const unsigned char** p, long i)
+{
+    (void)p;
+    (void)i;
+    if (sess)
+        return *sess;
+    return NULL;
+}
 
 
-    long CyaSSL_SESSION_get_timeout(const CYASSL_SESSION* sess)
-    {
-        CYASSL_ENTER("CyaSSL_SESSION_get_timeout");
-        return sess->timeout;
-    }
+long wolfSSL_SESSION_get_timeout(const WOLFSSL_SESSION* sess)
+{
+    WOLFSSL_ENTER("wolfSSL_SESSION_get_timeout");
+    return sess->timeout;
+}
 
 
-    long CyaSSL_SESSION_get_time(const CYASSL_SESSION* sess)
-    {
-        CYASSL_ENTER("CyaSSL_SESSION_get_time");
-        return sess->bornOn;
-    }
+long wolfSSL_SESSION_get_time(const WOLFSSL_SESSION* sess)
+{
+    WOLFSSL_ENTER("wolfSSL_SESSION_get_time");
+    return sess->bornOn;
+}
 
 
-    int CyaSSL_CTX_get_ex_new_index(long idx, void* arg, void* a, void* b,
-                                    void* c)
-    {
-        (void)idx;
-        (void)arg;
-        (void)a;
-        (void)b;
-        (void)c;
-        return 0;
-    }
+int wolfSSL_CTX_get_ex_new_index(long idx, void* arg, void* a, void* b,
+                                void* c)
+{
+    (void)idx;
+    (void)arg;
+    (void)a;
+    (void)b;
+    (void)c;
+    return 0;
+}
 
 #endif /* OPENSSL_EXTRA */
 
 
 #ifdef KEEP_PEER_CERT
-    char*  CyaSSL_X509_get_subjectCN(CYASSL_X509* x509)
-    {
-        if (x509 == NULL)
-            return NULL;
+char*  wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
+{
+    if (x509 == NULL)
+        return NULL;
 
-        return x509->subjectCN;
-    }
+    return x509->subjectCN;
+}
 #endif /* KEEP_PEER_CERT */
 
 #ifdef OPENSSL_EXTRA
 
 #ifdef FORTRESS
-    int CyaSSL_cmp_peer_cert_to_file(CYASSL* ssl, const char *fname)
+int wolfSSL_cmp_peer_cert_to_file(WOLFSSL* ssl, const char *fname)
+{
+    int ret = SSL_FATAL_ERROR;
+
+    WOLFSSL_ENTER("wolfSSL_cmp_peer_cert_to_file");
+    if (ssl != NULL && fname != NULL)
     {
-        int ret = SSL_FATAL_ERROR;
+    #ifdef WOLFSSL_SMALL_STACK
+        EncryptedInfo* info = NULL;
+        byte           staticBuffer[1]; /* force heap usage */
+    #else
+        EncryptedInfo  info[1];
+        byte           staticBuffer[FILE_BUFFER_SIZE];
+    #endif
+        byte*          myBuffer  = staticBuffer;
+        int            dynamic   = 0;
+        XFILE          file      = XBADFILE;
+        long           sz        = 0;
+        int            eccKey    = 0;
+        WOLFSSL_CTX*    ctx       = ssl->ctx;
+        WOLFSSL_X509*   peer_cert = &ssl->peerCert;
+        buffer         fileDer;
+
+        file = XFOPEN(fname, "rb");
+        if (file == XBADFILE)
+            return SSL_BAD_FILE;
+
+        XFSEEK(file, 0, XSEEK_END);
+        sz = XFTELL(file);
+        XREWIND(file);
+
+        if (sz > (long)sizeof(staticBuffer)) {
+            WOLFSSL_MSG("Getting dynamic buffer");
+            myBuffer = (byte*)XMALLOC(sz, ctx->heap, DYNAMIC_TYPE_FILE);
+            dynamic = 1;
+        }
 
-        CYASSL_ENTER("CyaSSL_cmp_peer_cert_to_file");
-        if (ssl != NULL && fname != NULL)
+    #ifdef WOLFSSL_SMALL_STACK
+        info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL,
+                                                   DYNAMIC_TYPE_TMP_BUFFER);
+        if (info == NULL)
+            ret = MEMORY_E;
+        else
+    #endif
         {
-            XFILE         file = XBADFILE;
-            long          sz = 0;
-            byte          staticBuffer[FILE_BUFFER_SIZE];
-            byte*         myBuffer = staticBuffer;
-            CYASSL_CTX*   ctx = ssl->ctx;
-            EncryptedInfo info;
-            buffer        fileDer;
-            int           eccKey = 0;
-            CYASSL_X509*  peer_cert = &ssl->peerCert;
-
-            info.set = 0;
-            info.ctx = ctx;
-            info.consumed = 0;
+            info->set = 0;
+            info->ctx = ctx;
+            info->consumed = 0;
             fileDer.buffer = 0;
 
-            file = XFOPEN(fname, "rb");
-            if (file == XBADFILE) return SSL_BAD_FILE;
-            XFSEEK(file, 0, XSEEK_END);
-            sz = XFTELL(file);
-            XREWIND(file);
-            if (sz > (long)sizeof(staticBuffer)) {
-                CYASSL_MSG("Getting dynamic buffer");
-                myBuffer = (byte*) XMALLOC(sz, ctx->heap, DYNAMIC_TYPE_FILE);
-            }
-
             if ((myBuffer != NULL) &&
                 (sz > 0) &&
                 (XFREAD(myBuffer, sz, 1, file) > 0) &&
                 (PemToDer(myBuffer, sz, CERT_TYPE,
-                                &fileDer, ctx->heap, &info, &eccKey) == 0) &&
+                          &fileDer, ctx->heap, info, &eccKey) == 0) &&
                 (fileDer.length != 0) &&
                 (fileDer.length == peer_cert->derCert.length) &&
                 (XMEMCMP(peer_cert->derCert.buffer, fileDer.buffer,
@@ -9594,1689 +10719,1849 @@ CYASSL_X509* CyaSSL_X509_load_certificate_file(const char* fname, int format)
                 ret = 0;
             }
 
-            XFCLOSE(file);
-            if (fileDer.buffer)
-                XFREE(fileDer.buffer, ctx->heap, DYNAMIC_TYPE_CERT);
-            if (myBuffer && (myBuffer != staticBuffer))
-                XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE);
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
         }
 
-        return ret;
+        XFREE(fileDer.buffer, ctx->heap, DYNAMIC_TYPE_CERT);
+        if (dynamic)
+            XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE);
+
+        XFCLOSE(file);
     }
+
+    return ret;
+}
 #endif
 
 
 static RNG globalRNG;
 static int initGlobalRNG = 0;
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_RAND_seed(const void* seed, int len)
-    {
+/* SSL_SUCCESS on ok */
+int wolfSSL_RAND_seed(const void* seed, int len)
+{
 
-        CYASSL_MSG("CyaSSL_RAND_seed");
+    WOLFSSL_MSG("wolfSSL_RAND_seed");
 
-        (void)seed;
-        (void)len;
+    (void)seed;
+    (void)len;
 
-        if (initGlobalRNG == 0) {
-            if (InitRng(&globalRNG) < 0) {
-                CYASSL_MSG("CyaSSL Init Global RNG failed");
-                return 0;
-            }
-            initGlobalRNG = 1;
+    if (initGlobalRNG == 0) {
+        if (wc_InitRng(&globalRNG) < 0) {
+            WOLFSSL_MSG("wolfSSL Init Global RNG failed");
+            return 0;
         }
-
-        return SSL_SUCCESS;
+        initGlobalRNG = 1;
     }
 
+    return SSL_SUCCESS;
+}
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_RAND_bytes(unsigned char* buf, int num)
-    {
-        RNG    tmpRNG;
-        RNG*   rng = &tmpRNG;
 
-        CYASSL_ENTER("RAND_bytes");
-        if (InitRng(&tmpRNG) != 0) {
-            CYASSL_MSG("Bad RNG Init, trying global");
-            if (initGlobalRNG == 0) {
-                CYASSL_MSG("Global RNG no Init");
-                return 0;
-            }
-            rng = &globalRNG;
-        }
+/* SSL_SUCCESS on ok */
+int wolfSSL_RAND_bytes(unsigned char* buf, int num)
+{
+    int    ret = 0;
+    int    initTmpRng = 0;
+    RNG*   rng = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    RNG*   tmpRNG = NULL;
+#else
+    RNG    tmpRNG[1];
+#endif
 
-        if (RNG_GenerateBlock(rng, buf, num) != 0) {
-            CYASSL_MSG("Bad RNG_GenerateBlock");
-            return 0;
-        }
+    WOLFSSL_ENTER("RAND_bytes");
 
-        return SSL_SUCCESS;
+#ifdef WOLFSSL_SMALL_STACK
+    tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    if (tmpRNG == NULL)
+        return ret;
+#endif
+
+    if (wc_InitRng(tmpRNG) == 0) {
+        rng = tmpRNG;
+        initTmpRng = 1;
     }
+    else if (initGlobalRNG)
+        rng = &globalRNG;
 
-    CYASSL_BN_CTX* CyaSSL_BN_CTX_new(void)
-    {
-        static int ctx;  /* ctaocrypt doesn't now need ctx */
+    if (rng) {
+        if (wc_RNG_GenerateBlock(rng, buf, num) != 0)
+            WOLFSSL_MSG("Bad wc_RNG_GenerateBlock");
+        else
+            ret = SSL_SUCCESS;
+    }
 
-        CYASSL_MSG("CyaSSL_BN_CTX_new");
+    if (initTmpRng)
+        wc_FreeRng(tmpRNG);
 
-        return (CYASSL_BN_CTX*)&ctx;
-    }
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-    void CyaSSL_BN_CTX_init(CYASSL_BN_CTX* ctx)
-    {
-        (void)ctx;
-        CYASSL_MSG("CyaSSL_BN_CTX_init");
-    }
+    return ret;
+}
 
+WOLFSSL_BN_CTX* wolfSSL_BN_CTX_new(void)
+{
+    static int ctx;  /* wolfcrypt doesn't now need ctx */
 
-    void CyaSSL_BN_CTX_free(CYASSL_BN_CTX* ctx)
-    {
-        (void)ctx;
-        CYASSL_MSG("CyaSSL_BN_CTX_free");
+    WOLFSSL_MSG("wolfSSL_BN_CTX_new");
 
-        /* do free since static ctx that does nothing */
-    }
+    return (WOLFSSL_BN_CTX*)&ctx;
+}
+
+void wolfSSL_BN_CTX_init(WOLFSSL_BN_CTX* ctx)
+{
+    (void)ctx;
+    WOLFSSL_MSG("wolfSSL_BN_CTX_init");
+}
 
 
-    static void InitCyaSSL_BigNum(CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("InitCyaSSL_BigNum");
-        if (bn) {
-            bn->neg      = 0;
-            bn->internal = NULL;
-        }
-    }
+void wolfSSL_BN_CTX_free(WOLFSSL_BN_CTX* ctx)
+{
+    (void)ctx;
+    WOLFSSL_MSG("wolfSSL_BN_CTX_free");
 
+    /* do free since static ctx that does nothing */
+}
 
-    CYASSL_BIGNUM* CyaSSL_BN_new(void)
-    {
-        CYASSL_BIGNUM* external;
-        mp_int*        mpi;
 
-        CYASSL_MSG("CyaSSL_BN_new");
+static void InitwolfSSL_BigNum(WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("InitwolfSSL_BigNum");
+    if (bn) {
+        bn->neg      = 0;
+        bn->internal = NULL;
+    }
+}
 
-        mpi = (mp_int*) XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
-        if (mpi == NULL) {
-            CYASSL_MSG("CyaSSL_BN_new malloc mpi failure");
-            return NULL;
-        }
 
-        external = (CYASSL_BIGNUM*) XMALLOC(sizeof(CYASSL_BIGNUM), NULL,
-                                            DYNAMIC_TYPE_BIGINT);
-        if (external == NULL) {
-            CYASSL_MSG("CyaSSL_BN_new malloc CYASSL_BIGNUM failure");
-            XFREE(mpi, NULL, DYNAMIC_TYPE_BIGINT);
-            return NULL;
-        }
+WOLFSSL_BIGNUM* wolfSSL_BN_new(void)
+{
+    WOLFSSL_BIGNUM* external;
+    mp_int*        mpi;
 
-        InitCyaSSL_BigNum(external);
-        external->internal = mpi;
-        if (mp_init(mpi) != MP_OKAY) {
-            CyaSSL_BN_free(external);
-            return NULL;
-        }
+    WOLFSSL_MSG("wolfSSL_BN_new");
 
-        return external;
+    mpi = (mp_int*) XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT);
+    if (mpi == NULL) {
+        WOLFSSL_MSG("wolfSSL_BN_new malloc mpi failure");
+        return NULL;
     }
 
+    external = (WOLFSSL_BIGNUM*) XMALLOC(sizeof(WOLFSSL_BIGNUM), NULL,
+                                        DYNAMIC_TYPE_BIGINT);
+    if (external == NULL) {
+        WOLFSSL_MSG("wolfSSL_BN_new malloc WOLFSSL_BIGNUM failure");
+        XFREE(mpi, NULL, DYNAMIC_TYPE_BIGINT);
+        return NULL;
+    }
 
-    void CyaSSL_BN_free(CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_free");
-        if (bn) {
-            if (bn->internal) {
-                mp_clear((mp_int*)bn->internal);
-                XFREE(bn->internal, NULL, DYNAMIC_TYPE_BIGINT);
-                bn->internal = NULL;
-            }
-            XFREE(bn, NULL, DYNAMIC_TYPE_BIGINT);
-        }
+    InitwolfSSL_BigNum(external);
+    external->internal = mpi;
+    if (mp_init(mpi) != MP_OKAY) {
+        wolfSSL_BN_free(external);
+        return NULL;
     }
 
+    return external;
+}
 
-    void CyaSSL_BN_clear_free(CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_clear_free");
 
-        CyaSSL_BN_free(bn);
+void wolfSSL_BN_free(WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_free");
+    if (bn) {
+        if (bn->internal) {
+            mp_clear((mp_int*)bn->internal);
+            XFREE(bn->internal, NULL, DYNAMIC_TYPE_BIGINT);
+            bn->internal = NULL;
+        }
+        XFREE(bn, NULL, DYNAMIC_TYPE_BIGINT);
     }
+}
 
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_BN_sub(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* a,
-                      const CYASSL_BIGNUM* b)
-    {
-        CYASSL_MSG("CyaSSL_BN_sub");
+void wolfSSL_BN_clear_free(WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_clear_free");
 
-        if (r == NULL || a == NULL || b == NULL)
-            return 0;
+    wolfSSL_BN_free(bn);
+}
 
-        if (mp_sub((mp_int*)a->internal,(mp_int*)b->internal,
-                   (mp_int*)r->internal) == MP_OKAY)
-            return SSL_SUCCESS;
 
-        CYASSL_MSG("CyaSSL_BN_sub mp_sub failed");
+/* SSL_SUCCESS on ok */
+int wolfSSL_BN_sub(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* a,
+                  const WOLFSSL_BIGNUM* b)
+{
+    WOLFSSL_MSG("wolfSSL_BN_sub");
+
+    if (r == NULL || a == NULL || b == NULL)
         return 0;
-    }
 
+    if (mp_sub((mp_int*)a->internal,(mp_int*)b->internal,
+               (mp_int*)r->internal) == MP_OKAY)
+        return SSL_SUCCESS;
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_BN_mod(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* a,
-                         const CYASSL_BIGNUM* b, const CYASSL_BN_CTX* c)
-    {
-        (void)c;
-        CYASSL_MSG("CyaSSL_BN_mod");
+    WOLFSSL_MSG("wolfSSL_BN_sub mp_sub failed");
+    return 0;
+}
 
-        if (r == NULL || a == NULL || b == NULL)
-            return 0;
 
-        if (mp_mod((mp_int*)a->internal,(mp_int*)b->internal,
-                   (mp_int*)r->internal) == MP_OKAY)
-            return SSL_SUCCESS;
+/* SSL_SUCCESS on ok */
+int wolfSSL_BN_mod(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* a,
+                  const WOLFSSL_BIGNUM* b, const WOLFSSL_BN_CTX* c)
+{
+    (void)c;
+    WOLFSSL_MSG("wolfSSL_BN_mod");
 
-        CYASSL_MSG("CyaSSL_BN_mod mp_mod failed");
+    if (r == NULL || a == NULL || b == NULL)
         return 0;
-    }
 
+    if (mp_mod((mp_int*)a->internal,(mp_int*)b->internal,
+               (mp_int*)r->internal) == MP_OKAY)
+        return SSL_SUCCESS;
 
-    const CYASSL_BIGNUM* CyaSSL_BN_value_one(void)
-    {
-        static CYASSL_BIGNUM* bn_one = NULL;
+    WOLFSSL_MSG("wolfSSL_BN_mod mp_mod failed");
+    return 0;
+}
 
-        CYASSL_MSG("CyaSSL_BN_value_one");
 
-        if (bn_one == NULL) {
-            bn_one = CyaSSL_BN_new();
-            if (bn_one)
-                mp_set_int((mp_int*)bn_one->internal, 1);
-        }
+const WOLFSSL_BIGNUM* wolfSSL_BN_value_one(void)
+{
+    static WOLFSSL_BIGNUM* bn_one = NULL;
 
-        return bn_one;
-    }
+    WOLFSSL_MSG("wolfSSL_BN_value_one");
 
+    if (bn_one == NULL) {
+        bn_one = wolfSSL_BN_new();
+        if (bn_one)
+            mp_set_int((mp_int*)bn_one->internal, 1);
+    }
 
-    int CyaSSL_BN_num_bytes(const CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_num_bytes");
+    return bn_one;
+}
 
-        if (bn == NULL || bn->internal == NULL)
-            return 0;
 
-        return mp_unsigned_bin_size((mp_int*)bn->internal);
-    }
+int wolfSSL_BN_num_bytes(const WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_num_bytes");
 
+    if (bn == NULL || bn->internal == NULL)
+        return 0;
 
-    int CyaSSL_BN_num_bits(const CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_num_bits");
+    return mp_unsigned_bin_size((mp_int*)bn->internal);
+}
 
-        if (bn == NULL || bn->internal == NULL)
-            return 0;
 
-        return mp_count_bits((mp_int*)bn->internal);
-    }
+int wolfSSL_BN_num_bits(const WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_num_bits");
 
+    if (bn == NULL || bn->internal == NULL)
+        return 0;
 
-    int CyaSSL_BN_is_zero(const CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_is_zero");
+    return mp_count_bits((mp_int*)bn->internal);
+}
 
-        if (bn == NULL || bn->internal == NULL)
-            return 0;
 
-        return mp_iszero((mp_int*)bn->internal);
-    }
+int wolfSSL_BN_is_zero(const WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_is_zero");
 
+    if (bn == NULL || bn->internal == NULL)
+        return 0;
 
-    int CyaSSL_BN_is_one(const CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_is_one");
+    return mp_iszero((mp_int*)bn->internal);
+}
 
-        if (bn == NULL || bn->internal == NULL)
-            return 0;
 
-        if (mp_cmp_d((mp_int*)bn->internal, 1) == 0)
-            return 1;
+int wolfSSL_BN_is_one(const WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_is_one");
 
+    if (bn == NULL || bn->internal == NULL)
         return 0;
-    }
 
+    if (mp_cmp_d((mp_int*)bn->internal, 1) == 0)
+        return 1;
 
-    int CyaSSL_BN_is_odd(const CYASSL_BIGNUM* bn)
-    {
-        CYASSL_MSG("CyaSSL_BN_is_odd");
+    return 0;
+}
 
-        if (bn == NULL || bn->internal == NULL)
-            return 0;
 
-        return mp_isodd((mp_int*)bn->internal);
-    }
+int wolfSSL_BN_is_odd(const WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_MSG("wolfSSL_BN_is_odd");
 
+    if (bn == NULL || bn->internal == NULL)
+        return 0;
 
-    int CyaSSL_BN_cmp(const CYASSL_BIGNUM* a, const CYASSL_BIGNUM* b)
-    {
-        CYASSL_MSG("CyaSSL_BN_cmp");
+    return mp_isodd((mp_int*)bn->internal);
+}
 
-        if (a == NULL || a->internal == NULL || b == NULL || b->internal ==NULL)
-            return 0;
 
-        return mp_cmp((mp_int*)a->internal, (mp_int*)b->internal);
-    }
+int wolfSSL_BN_cmp(const WOLFSSL_BIGNUM* a, const WOLFSSL_BIGNUM* b)
+{
+    WOLFSSL_MSG("wolfSSL_BN_cmp");
 
+    if (a == NULL || a->internal == NULL || b == NULL || b->internal ==NULL)
+        return 0;
 
-    int CyaSSL_BN_bn2bin(const CYASSL_BIGNUM* bn, unsigned char* r)
-    {
-        CYASSL_MSG("CyaSSL_BN_bn2bin");
+    return mp_cmp((mp_int*)a->internal, (mp_int*)b->internal);
+}
 
-        if (bn == NULL || bn->internal == NULL) {
-            CYASSL_MSG("NULL bn error");
-            return SSL_FATAL_ERROR;
-        }
 
-        if (r == NULL)
-            return mp_unsigned_bin_size((mp_int*)bn->internal);
+int wolfSSL_BN_bn2bin(const WOLFSSL_BIGNUM* bn, unsigned char* r)
+{
+    WOLFSSL_MSG("wolfSSL_BN_bn2bin");
 
-        if (mp_to_unsigned_bin((mp_int*)bn->internal, r) != MP_OKAY) {
-            CYASSL_MSG("mp_to_unsigned_bin error");
-            return SSL_FATAL_ERROR;
-        }
+    if (bn == NULL || bn->internal == NULL) {
+        WOLFSSL_MSG("NULL bn error");
+        return SSL_FATAL_ERROR;
+    }
 
+    if (r == NULL)
         return mp_unsigned_bin_size((mp_int*)bn->internal);
+
+    if (mp_to_unsigned_bin((mp_int*)bn->internal, r) != MP_OKAY) {
+        WOLFSSL_MSG("mp_to_unsigned_bin error");
+        return SSL_FATAL_ERROR;
     }
 
+    return mp_unsigned_bin_size((mp_int*)bn->internal);
+}
 
-    CYASSL_BIGNUM* CyaSSL_BN_bin2bn(const unsigned char* str, int len,
-                                   CYASSL_BIGNUM* ret)
-    {
-        CYASSL_MSG("CyaSSL_BN_bin2bn");
 
-        if (ret && ret->internal) {
-            if (mp_read_unsigned_bin((mp_int*)ret->internal, str, len) != 0) {
-                CYASSL_MSG("mp_read_unsigned_bin failure");
-                return NULL;
-            }
-        }
-        else {
-            CYASSL_MSG("CyaSSL_BN_bin2bn wants return bignum");
-        }
+WOLFSSL_BIGNUM* wolfSSL_BN_bin2bn(const unsigned char* str, int len,
+                            WOLFSSL_BIGNUM* ret)
+{
+    WOLFSSL_MSG("wolfSSL_BN_bin2bn");
 
-        return ret;
+    if (ret && ret->internal) {
+        if (mp_read_unsigned_bin((mp_int*)ret->internal, str, len) != 0) {
+            WOLFSSL_MSG("mp_read_unsigned_bin failure");
+            return NULL;
+        }
+    }
+    else {
+        WOLFSSL_MSG("wolfSSL_BN_bin2bn wants return bignum");
     }
 
+    return ret;
+}
 
-    int CyaSSL_mask_bits(CYASSL_BIGNUM* bn, int n)
-    {
-        (void)bn;
-        (void)n;
-        CYASSL_MSG("CyaSSL_BN_mask_bits");
 
-        return SSL_FATAL_ERROR;
-    }
+int wolfSSL_mask_bits(WOLFSSL_BIGNUM* bn, int n)
+{
+    (void)bn;
+    (void)n;
+    WOLFSSL_MSG("wolfSSL_BN_mask_bits");
 
+    return SSL_FATAL_ERROR;
+}
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_BN_rand(CYASSL_BIGNUM* bn, int bits, int top, int bottom)
-    {
-        byte          buff[1024];
-        RNG           tmpRNG;
-        RNG*          rng = &tmpRNG;
-        int           len = bits/8;
 
-        (void)top;
-        (void)bottom;
-        CYASSL_MSG("CyaSSL_BN_rand");
+/* SSL_SUCCESS on ok */
+int wolfSSL_BN_rand(WOLFSSL_BIGNUM* bn, int bits, int top, int bottom)
+{
+    int           ret    = 0;
+    int           len    = bits / 8;
+    int           initTmpRng = 0;
+    RNG*          rng    = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    RNG*          tmpRNG = NULL;
+    byte*         buff   = NULL;
+#else
+    RNG           tmpRNG[1];
+    byte          buff[1024];
+#endif
 
-        if (bn == NULL || bn->internal == NULL) {
-            CYASSL_MSG("Bad function arguments");
-            return 0;
-        }
+    (void)top;
+    (void)bottom;
+    WOLFSSL_MSG("wolfSSL_BN_rand");
 
-        if (bits % 8)
-            len++;
+    if (bits % 8)
+        len++;
 
-        if ( (InitRng(&tmpRNG)) != 0) {
-            CYASSL_MSG("Bad RNG Init, trying global");
-            if (initGlobalRNG == 0) {
-                CYASSL_MSG("Global RNG no Init");
-                return 0;
-            }
-            rng = &globalRNG;
-        }
+#ifdef WOLFSSL_SMALL_STACK
+    buff   = (byte*)XMALLOC(1024,        NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    tmpRNG = (RNG*) XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    if (buff == NULL || tmpRNG == NULL) {
+        XFREE(buff,   NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        return ret;
+    }
+#endif
 
-        if (RNG_GenerateBlock(rng, buff, len) != 0) {
-            CYASSL_MSG("Bad RNG_GenerateBlock");
-            return 0;
-        }
+    if (bn == NULL || bn->internal == NULL)
+        WOLFSSL_MSG("Bad function arguments");
+    else if (wc_InitRng(tmpRNG) == 0) {
+        rng = tmpRNG;
+        initTmpRng = 1;
+    }
+    else if (initGlobalRNG)
+        rng = &globalRNG;
 
-        buff[0]     |= 0x80 | 0x40;
-        buff[len-1] |= 0x01;
+    if (rng) {
+        if (wc_RNG_GenerateBlock(rng, buff, len) != 0)
+            WOLFSSL_MSG("Bad wc_RNG_GenerateBlock");
+        else {
+            buff[0]     |= 0x80 | 0x40;
+            buff[len-1] |= 0x01;
 
-        if (mp_read_unsigned_bin((mp_int*)bn->internal,buff,len) != MP_OKAY) {
-            CYASSL_MSG("mp read bin failed");
-            return 0;
+            if (mp_read_unsigned_bin((mp_int*)bn->internal,buff,len) != MP_OKAY)
+                WOLFSSL_MSG("mp read bin failed");
+            else
+                ret = SSL_SUCCESS;
         }
-
-        return SSL_SUCCESS;
     }
 
+    if (initTmpRng)
+        wc_FreeRng(tmpRNG);
 
-    int CyaSSL_BN_is_bit_set(const CYASSL_BIGNUM* bn, int n)
-    {
-        (void)bn;
-        (void)n;
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(buff,   NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-        CYASSL_MSG("CyaSSL_BN_is_bit_set");
+    return ret;
+}
 
-        return 0;
-    }
 
+int wolfSSL_BN_is_bit_set(const WOLFSSL_BIGNUM* bn, int n)
+{
+    (void)bn;
+    (void)n;
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_BN_hex2bn(CYASSL_BIGNUM** bn, const char* str)
-    {
-        byte    decoded[1024];
-        word32  decSz = sizeof(decoded);
+    WOLFSSL_MSG("wolfSSL_BN_is_bit_set");
 
-        CYASSL_MSG("CyaSSL_BN_hex2bn");
+    return 0;
+}
 
-        if (str == NULL) {
-            CYASSL_MSG("Bad function argument");
-            return 0;
-        }
 
-        if (Base16_Decode((byte*)str, (int)XSTRLEN(str), decoded, &decSz) < 0) {
-            CYASSL_MSG("Bad Base16_Decode error");
-            return 0;
-        }
+/* SSL_SUCCESS on ok */
+int wolfSSL_BN_hex2bn(WOLFSSL_BIGNUM** bn, const char* str)
+{
+    int     ret     = 0;
+    word32  decSz   = 1024;
+#ifdef WOLFSSL_SMALL_STACK
+    byte*   decoded = NULL;
+#else
+    byte    decoded[1024];
+#endif
 
-        if (bn == NULL)
-            return decSz;
+    WOLFSSL_MSG("wolfSSL_BN_hex2bn");
 
-        if (*bn == NULL) {
-            *bn = CyaSSL_BN_new();
-            if (*bn == NULL) {
-                CYASSL_MSG("BN new failed");
-                return 0;
-            }
-        }
+#ifdef WOLFSSL_SMALL_STACK
+    decoded = (byte*)XMALLOC(decSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    if (decoded == NULL)
+        return ret;
+#endif
 
-        if (CyaSSL_BN_bin2bn(decoded, decSz, *bn) == NULL) {
-            CYASSL_MSG("Bad bin2bn error");
-            return 0;
-        }
+    if (str == NULL)
+        WOLFSSL_MSG("Bad function argument");
+    else if (Base16_Decode((byte*)str, (int)XSTRLEN(str), decoded, &decSz) < 0)
+        WOLFSSL_MSG("Bad Base16_Decode error");
+    else if (bn == NULL)
+        ret = decSz;
+    else {
+        if (*bn == NULL)
+            *bn = wolfSSL_BN_new();
 
-        return SSL_SUCCESS;
+        if (*bn == NULL)
+            WOLFSSL_MSG("BN new failed");
+        else if (wolfSSL_BN_bin2bn(decoded, decSz, *bn) == NULL)
+            WOLFSSL_MSG("Bad bin2bn error");
+        else
+            ret = SSL_SUCCESS;
     }
 
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(decoded, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-    CYASSL_BIGNUM* CyaSSL_BN_dup(const CYASSL_BIGNUM* bn)
-    {
-        CYASSL_BIGNUM* ret;
+    return ret;
+}
 
-        CYASSL_MSG("CyaSSL_BN_dup");
 
-        if (bn == NULL || bn->internal == NULL) {
-            CYASSL_MSG("bn NULL error");
-            return NULL;
-        }
+WOLFSSL_BIGNUM* wolfSSL_BN_dup(const WOLFSSL_BIGNUM* bn)
+{
+    WOLFSSL_BIGNUM* ret;
 
-        ret = CyaSSL_BN_new();
-        if (ret == NULL) {
-            CYASSL_MSG("bn new error");
-            return NULL;
-        }
+    WOLFSSL_MSG("wolfSSL_BN_dup");
 
-        if (mp_copy((mp_int*)bn->internal, (mp_int*)ret->internal) != MP_OKAY) {
-            CYASSL_MSG("mp_copy error");
-            CyaSSL_BN_free(ret);
-            return NULL;
-        }
+    if (bn == NULL || bn->internal == NULL) {
+        WOLFSSL_MSG("bn NULL error");
+        return NULL;
+    }
 
-        return ret;
+    ret = wolfSSL_BN_new();
+    if (ret == NULL) {
+        WOLFSSL_MSG("bn new error");
+        return NULL;
     }
 
+    if (mp_copy((mp_int*)bn->internal, (mp_int*)ret->internal) != MP_OKAY) {
+        WOLFSSL_MSG("mp_copy error");
+        wolfSSL_BN_free(ret);
+        return NULL;
+    }
 
-    CYASSL_BIGNUM* CyaSSL_BN_copy(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* bn)
-    {
-        (void)r;
-        (void)bn;
+    return ret;
+}
 
-        CYASSL_MSG("CyaSSL_BN_copy");
 
-        return NULL;
-    }
+WOLFSSL_BIGNUM* wolfSSL_BN_copy(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* bn)
+{
+    (void)r;
+    (void)bn;
 
+    WOLFSSL_MSG("wolfSSL_BN_copy");
 
-    int CyaSSL_BN_set_word(CYASSL_BIGNUM* bn, unsigned long w)
-    {
-        (void)bn;
-        (void)w;
+    return NULL;
+}
 
-        CYASSL_MSG("CyaSSL_BN_set_word");
 
-        return SSL_FATAL_ERROR;
-    }
+int wolfSSL_BN_set_word(WOLFSSL_BIGNUM* bn, unsigned long w)
+{
+    (void)bn;
+    (void)w;
 
+    WOLFSSL_MSG("wolfSSL_BN_set_word");
 
-    int CyaSSL_BN_dec2bn(CYASSL_BIGNUM** bn, const char* str)
-    {
-        (void)bn;
-        (void)str;
+    return SSL_FATAL_ERROR;
+}
 
-        CYASSL_MSG("CyaSSL_BN_dec2bn");
 
-        return SSL_FATAL_ERROR;
-    }
+int wolfSSL_BN_dec2bn(WOLFSSL_BIGNUM** bn, const char* str)
+{
+    (void)bn;
+    (void)str;
 
+    WOLFSSL_MSG("wolfSSL_BN_dec2bn");
 
-    char* CyaSSL_BN_bn2dec(const CYASSL_BIGNUM* bn)
-    {
-        (void)bn;
+    return SSL_FATAL_ERROR;
+}
 
-        CYASSL_MSG("CyaSSL_BN_bn2dec");
 
-        return NULL;
-    }
+char* wolfSSL_BN_bn2dec(const WOLFSSL_BIGNUM* bn)
+{
+    (void)bn;
 
+    WOLFSSL_MSG("wolfSSL_BN_bn2dec");
 
-    #ifndef NO_DH
+    return NULL;
+}
 
-    static void InitCyaSSL_DH(CYASSL_DH* dh)
-    {
-        if (dh) {
-            dh->p        = NULL;
-            dh->g        = NULL;
-            dh->pub_key  = NULL;
-            dh->priv_key = NULL;
-            dh->internal = NULL;
-            dh->inSet    = 0;
-            dh->exSet    = 0;
-        }
-    }
 
+#ifndef NO_DH
 
-    CYASSL_DH* CyaSSL_DH_new(void)
-    {
-        CYASSL_DH* external;
-        DhKey*     key;
+static void InitwolfSSL_DH(WOLFSSL_DH* dh)
+{
+    if (dh) {
+        dh->p        = NULL;
+        dh->g        = NULL;
+        dh->pub_key  = NULL;
+        dh->priv_key = NULL;
+        dh->internal = NULL;
+        dh->inSet    = 0;
+        dh->exSet    = 0;
+    }
+}
 
-        CYASSL_MSG("CyaSSL_DH_new");
 
-        key = (DhKey*) XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH);
-        if (key == NULL) {
-            CYASSL_MSG("CyaSSL_DH_new malloc DhKey failure");
-            return NULL;
-        }
+WOLFSSL_DH* wolfSSL_DH_new(void)
+{
+    WOLFSSL_DH* external;
+    DhKey*     key;
 
-        external = (CYASSL_DH*) XMALLOC(sizeof(CYASSL_DH), NULL,
-                                        DYNAMIC_TYPE_DH);
-        if (external == NULL) {
-            CYASSL_MSG("CyaSSL_DH_new malloc CYASSL_DH failure");
-            XFREE(key, NULL, DYNAMIC_TYPE_DH);
-            return NULL;
-        }
+    WOLFSSL_MSG("wolfSSL_DH_new");
 
-        InitCyaSSL_DH(external);
-        InitDhKey(key);
-        external->internal = key;
+    key = (DhKey*) XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH);
+    if (key == NULL) {
+        WOLFSSL_MSG("wolfSSL_DH_new malloc DhKey failure");
+        return NULL;
+    }
 
-        return external;
+    external = (WOLFSSL_DH*) XMALLOC(sizeof(WOLFSSL_DH), NULL,
+                                    DYNAMIC_TYPE_DH);
+    if (external == NULL) {
+        WOLFSSL_MSG("wolfSSL_DH_new malloc WOLFSSL_DH failure");
+        XFREE(key, NULL, DYNAMIC_TYPE_DH);
+        return NULL;
     }
 
+    InitwolfSSL_DH(external);
+    wc_InitDhKey(key);
+    external->internal = key;
 
-    void CyaSSL_DH_free(CYASSL_DH* dh)
-    {
-        CYASSL_MSG("CyaSSL_DH_free");
+    return external;
+}
 
-        if (dh) {
-            if (dh->internal) {
-                FreeDhKey((DhKey*)dh->internal);
-                XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH);
-                dh->internal = NULL;
-            }
-            CyaSSL_BN_free(dh->priv_key);
-            CyaSSL_BN_free(dh->pub_key);
-            CyaSSL_BN_free(dh->g);
-            CyaSSL_BN_free(dh->p);
-            InitCyaSSL_DH(dh);  /* set back to NULLs for safety */
 
-            XFREE(dh, NULL, DYNAMIC_TYPE_DH);
+void wolfSSL_DH_free(WOLFSSL_DH* dh)
+{
+    WOLFSSL_MSG("wolfSSL_DH_free");
+
+    if (dh) {
+        if (dh->internal) {
+            wc_FreeDhKey((DhKey*)dh->internal);
+            XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH);
+            dh->internal = NULL;
         }
-    }
+        wolfSSL_BN_free(dh->priv_key);
+        wolfSSL_BN_free(dh->pub_key);
+        wolfSSL_BN_free(dh->g);
+        wolfSSL_BN_free(dh->p);
+        InitwolfSSL_DH(dh);  /* set back to NULLs for safety */
 
+        XFREE(dh, NULL, DYNAMIC_TYPE_DH);
+    }
+}
 
-    static int SetDhInternal(CYASSL_DH* dh)
-    {
-        unsigned char p[1024];
-        unsigned char g[1024];
-        int           pSz = sizeof(p);
-        int           gSz = sizeof(g);
 
-        CYASSL_ENTER("SetDhInternal");
+static int SetDhInternal(WOLFSSL_DH* dh)
+{
+    int            ret = SSL_FATAL_ERROR;
+    int            pSz = 1024;
+    int            gSz = 1024;
+#ifdef WOLFSSL_SMALL_STACK
+    unsigned char* p   = NULL;
+    unsigned char* g   = NULL;
+#else
+    unsigned char  p[1024];
+    unsigned char  g[1024];
+#endif
 
-        if (dh == NULL || dh->p == NULL || dh->g == NULL) {
-            CYASSL_MSG("Bad function arguments");
-            return SSL_FATAL_ERROR;
-        }
+    WOLFSSL_ENTER("SetDhInternal");
 
-        if (CyaSSL_BN_bn2bin(dh->p, NULL) > pSz) {
-            CYASSL_MSG("Bad p internal size");
-            return SSL_FATAL_ERROR;
-        }
+    if (dh == NULL || dh->p == NULL || dh->g == NULL)
+        WOLFSSL_MSG("Bad function arguments");
+    else if (wolfSSL_BN_bn2bin(dh->p, NULL) > pSz)
+        WOLFSSL_MSG("Bad p internal size");
+    else if (wolfSSL_BN_bn2bin(dh->g, NULL) > gSz)
+        WOLFSSL_MSG("Bad g internal size");
+    else {
+    #ifdef WOLFSSL_SMALL_STACK
+        p = (unsigned char*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        g = (unsigned char*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 
-        if (CyaSSL_BN_bn2bin(dh->g, NULL) > gSz) {
-            CYASSL_MSG("Bad g internal size");
-            return SSL_FATAL_ERROR;
+        if (p == NULL || g == NULL) {
+            XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+            return ret;
         }
+    #endif
 
-        pSz = CyaSSL_BN_bn2bin(dh->p, p);
-        gSz = CyaSSL_BN_bn2bin(dh->g, g);
+        pSz = wolfSSL_BN_bn2bin(dh->p, p);
+        gSz = wolfSSL_BN_bn2bin(dh->g, g);
 
-        if (pSz <= 0 || gSz <= 0) {
-            CYASSL_MSG("Bad BN2bin set");
-            return SSL_FATAL_ERROR;
+        if (pSz <= 0 || gSz <= 0)
+            WOLFSSL_MSG("Bad BN2bin set");
+        else if (wc_DhSetKey((DhKey*)dh->internal, p, pSz, g, gSz) < 0)
+            WOLFSSL_MSG("Bad DH SetKey");
+        else {
+            dh->inSet = 1;
+            ret = 0;
         }
 
-        if (DhSetKey((DhKey*)dh->internal, p, pSz, g, gSz) < 0) {
-            CYASSL_MSG("Bad DH SetKey");
-            return SSL_FATAL_ERROR;
-        }
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+    }
 
-        dh->inSet = 1;
 
-        return 0;
-    }
+    return ret;
+}
 
 
-    int CyaSSL_DH_size(CYASSL_DH* dh)
-    {
-        CYASSL_MSG("CyaSSL_DH_size");
+int wolfSSL_DH_size(WOLFSSL_DH* dh)
+{
+    WOLFSSL_MSG("wolfSSL_DH_size");
 
-        if (dh == NULL)
-            return 0;
+    if (dh == NULL)
+        return 0;
 
-        return CyaSSL_BN_num_bytes(dh->p);
-    }
+    return wolfSSL_BN_num_bytes(dh->p);
+}
 
 
-    /* return SSL_SUCCESS on ok, else 0 */
-    int CyaSSL_DH_generate_key(CYASSL_DH* dh)
-    {
-        unsigned char pub [768];
-        unsigned char priv[768];
-        word32        pubSz  = sizeof(pub);
-        word32        privSz = sizeof(priv);
-        RNG           tmpRNG;
-        RNG*          rng = &tmpRNG;
+/* return SSL_SUCCESS on ok, else 0 */
+int wolfSSL_DH_generate_key(WOLFSSL_DH* dh)
+{
+    int            ret    = 0;
+    word32         pubSz  = 768;
+    word32         privSz = 768;
+    int            initTmpRng = 0;
+    RNG*           rng    = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    unsigned char* pub    = NULL;
+    unsigned char* priv   = NULL;
+    RNG*           tmpRNG = NULL;
+#else
+    unsigned char  pub [768];
+    unsigned char  priv[768];
+    RNG            tmpRNG[1];
+#endif
 
-        CYASSL_MSG("CyaSSL_DH_generate_key");
+    WOLFSSL_MSG("wolfSSL_DH_generate_key");
 
-        if (dh == NULL || dh->p == NULL || dh->g == NULL) {
-            CYASSL_MSG("Bad function arguments");
-            return 0;
-        }
+#ifdef WOLFSSL_SMALL_STACK
+    tmpRNG = (RNG*)XMALLOC(sizeof(RNG),      NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    pub    = (unsigned char*)XMALLOC(pubSz,  NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    priv   = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 
-        if (dh->inSet == 0) {
-            if (SetDhInternal(dh) < 0) {
-                CYASSL_MSG("Bad DH set internal");
-                return 0;
-            }
-        }
+    if (tmpRNG == NULL || pub == NULL || priv == NULL) {
+        XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(pub,    NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        XFREE(priv,   NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        return ret;
+    }
+#endif
 
-        if ( (InitRng(&tmpRNG)) != 0) {
-            CYASSL_MSG("Bad RNG Init, trying global");
-            if (initGlobalRNG == 0) {
-                CYASSL_MSG("Global RNG no Init");
-                return 0;
-            }
+    if (dh == NULL || dh->p == NULL || dh->g == NULL)
+        WOLFSSL_MSG("Bad function arguments");
+    else if (dh->inSet == 0 && SetDhInternal(dh) < 0)
+            WOLFSSL_MSG("Bad DH set internal");
+    else if (wc_InitRng(tmpRNG) == 0) {
+        rng = tmpRNG;
+        initTmpRng = 1;
+    }
+    else {
+        WOLFSSL_MSG("Bad RNG Init, trying global");
+        if (initGlobalRNG == 0)
+            WOLFSSL_MSG("Global RNG no Init");
+        else
             rng = &globalRNG;
-        }
-
-        if (DhGenerateKeyPair((DhKey*)dh->internal, rng, priv, &privSz,
-                                pub, &pubSz) < 0) {
-            CYASSL_MSG("Bad DhGenerateKeyPair");
-            return 0;
-        }
+    }
 
-        if (dh->pub_key)
-            CyaSSL_BN_free(dh->pub_key);
-        dh->pub_key = CyaSSL_BN_new();
-        if (dh->pub_key == NULL) {
-            CYASSL_MSG("Bad DH new pub");
-            return 0;
-        }
+    if (rng) {
+       if (wc_DhGenerateKeyPair((DhKey*)dh->internal, rng, priv, &privSz,
+                                                               pub, &pubSz) < 0)
+            WOLFSSL_MSG("Bad wc_DhGenerateKeyPair");
+       else {
+            if (dh->pub_key)
+                wolfSSL_BN_free(dh->pub_key);
+   
+            dh->pub_key = wolfSSL_BN_new();
+            if (dh->pub_key == NULL) {
+                WOLFSSL_MSG("Bad DH new pub");
+            }
+            if (dh->priv_key)
+                wolfSSL_BN_free(dh->priv_key);
 
-        if (dh->priv_key)
-            CyaSSL_BN_free(dh->priv_key);
-        dh->priv_key = CyaSSL_BN_new();
-        if (dh->priv_key == NULL) {
-            CYASSL_MSG("Bad DH new priv");
-            return 0;
-        }
+            dh->priv_key = wolfSSL_BN_new();
 
-        if (CyaSSL_BN_bin2bn(pub, pubSz, dh->pub_key) == NULL) {
-            CYASSL_MSG("Bad DH bn2bin error pub");
-            return 0;
-        }
+            if (dh->priv_key == NULL) {
+                WOLFSSL_MSG("Bad DH new priv");
+            }
 
-        if (CyaSSL_BN_bin2bn(priv, privSz, dh->priv_key) == NULL) {
-            CYASSL_MSG("Bad DH bn2bin error priv");
-            return 0;
+            if (dh->pub_key && dh->priv_key) {
+               if (wolfSSL_BN_bin2bn(pub, pubSz, dh->pub_key) == NULL)
+                   WOLFSSL_MSG("Bad DH bn2bin error pub");
+               else if (wolfSSL_BN_bin2bn(priv, privSz, dh->priv_key) == NULL)
+                   WOLFSSL_MSG("Bad DH bn2bin error priv");
+               else
+                   ret = SSL_SUCCESS;
+            }
         }
-
-        CYASSL_MSG("CyaSSL_generate_key success");
-        return SSL_SUCCESS;
     }
 
+    if (initTmpRng)
+        wc_FreeRng(tmpRNG);
 
-    /* return key size on ok, 0 otherwise */
-    int CyaSSL_DH_compute_key(unsigned char* key, CYASSL_BIGNUM* otherPub,
-                              CYASSL_DH* dh)
-    {
-        unsigned char pub [1024];
-        unsigned char priv[1024];
-        word32        pubSz  = sizeof(pub);
-        word32        privSz = sizeof(priv);
-        word32        keySz;
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    XFREE(pub,    NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    XFREE(priv,   NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-        CYASSL_MSG("CyaSSL_DH_compute_key");
+    return ret;
+}
 
-        if (dh == NULL || dh->priv_key == NULL || otherPub == NULL) {
-            CYASSL_MSG("Bad function arguments");
-            return 0;
-        }
 
-        keySz = (word32)DH_size(dh);
-        if (keySz == 0) {
-            CYASSL_MSG("Bad DH_size");
-            return 0;
-        }
+/* return key size on ok, 0 otherwise */
+int wolfSSL_DH_compute_key(unsigned char* key, WOLFSSL_BIGNUM* otherPub,
+                          WOLFSSL_DH* dh)
+{
+    int            ret    = 0;
+    word32         keySz  = 0;
+    word32         pubSz  = 1024;
+    word32         privSz = 1024;
+#ifdef WOLFSSL_SMALL_STACK
+    unsigned char* pub    = NULL;
+    unsigned char* priv   = NULL;
+#else
+    unsigned char  pub [1024];
+    unsigned char  priv[1024];
+#endif
 
-        if (CyaSSL_BN_bn2bin(dh->priv_key, NULL) > (int)privSz) {
-            CYASSL_MSG("Bad priv internal size");
-            return 0;
-        }
+    WOLFSSL_MSG("wolfSSL_DH_compute_key");
 
-        if (CyaSSL_BN_bn2bin(otherPub, NULL) > (int)pubSz) {
-            CYASSL_MSG("Bad otherPub size");
-            return 0;
-        }
+#ifdef WOLFSSL_SMALL_STACK
+    pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    if (pub == NULL)
+        return ret;
 
-        privSz = CyaSSL_BN_bn2bin(dh->priv_key, priv);
-        pubSz  = CyaSSL_BN_bn2bin(otherPub, pub);
+    priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    if (priv == NULL) {
+        XFREE(pub, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        return 0;
+    }
+#endif
 
-        if (privSz <= 0 || pubSz <= 0) {
-            CYASSL_MSG("Bad BN2bin set");
-            return 0;
-        }
+    if (dh == NULL || dh->priv_key == NULL || otherPub == NULL)
+        WOLFSSL_MSG("Bad function arguments");
+    else if ((keySz = (word32)DH_size(dh)) == 0)
+        WOLFSSL_MSG("Bad DH_size");
+    else if (wolfSSL_BN_bn2bin(dh->priv_key, NULL) > (int)privSz)
+        WOLFSSL_MSG("Bad priv internal size");
+    else if (wolfSSL_BN_bn2bin(otherPub, NULL) > (int)pubSz)
+        WOLFSSL_MSG("Bad otherPub size");
+    else {
+        privSz = wolfSSL_BN_bn2bin(dh->priv_key, priv);
+        pubSz  = wolfSSL_BN_bn2bin(otherPub, pub);
+
+        if (privSz <= 0 || pubSz <= 0)
+            WOLFSSL_MSG("Bad BN2bin set");
+        else if (wc_DhAgree((DhKey*)dh->internal, key, &keySz, priv, privSz, pub,
+                                                                     pubSz) < 0)
+            WOLFSSL_MSG("wc_DhAgree failed");
+        else
+            ret = (int)keySz;
+    }
 
-        if (DhAgree((DhKey*)dh->internal, key, &keySz, priv, privSz, pub,
-                    pubSz) < 0) {
-            CYASSL_MSG("DhAgree failed");
-            return 0;
-        }
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(pub,  NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
 
-        CYASSL_MSG("CyaSSL_compute_key success");
-        return (int)keySz;
-    }
-    #endif /* NO_DH */
+    return ret;
+}
+#endif /* NO_DH */
 
 
 #ifndef NO_DSA
-    static void InitCyaSSL_DSA(CYASSL_DSA* dsa)
-    {
-        if (dsa) {
-            dsa->p        = NULL;
-            dsa->q        = NULL;
-            dsa->g        = NULL;
-            dsa->pub_key  = NULL;
-            dsa->priv_key = NULL;
-            dsa->internal = NULL;
-            dsa->inSet    = 0;
-            dsa->exSet    = 0;
-        }
+static void InitwolfSSL_DSA(WOLFSSL_DSA* dsa)
+{
+    if (dsa) {
+        dsa->p        = NULL;
+        dsa->q        = NULL;
+        dsa->g        = NULL;
+        dsa->pub_key  = NULL;
+        dsa->priv_key = NULL;
+        dsa->internal = NULL;
+        dsa->inSet    = 0;
+        dsa->exSet    = 0;
     }
+}
 
 
-    CYASSL_DSA* CyaSSL_DSA_new(void)
-    {
-        CYASSL_DSA* external;
-        DsaKey*     key;
-
-        CYASSL_MSG("CyaSSL_DSA_new");
-
-        key = (DsaKey*) XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
-        if (key == NULL) {
-            CYASSL_MSG("CyaSSL_DSA_new malloc DsaKey failure");
-            return NULL;
-        }
+WOLFSSL_DSA* wolfSSL_DSA_new(void)
+{
+    WOLFSSL_DSA* external;
+    DsaKey*     key;
 
-        external = (CYASSL_DSA*) XMALLOC(sizeof(CYASSL_DSA), NULL,
-                                        DYNAMIC_TYPE_DSA);
-        if (external == NULL) {
-            CYASSL_MSG("CyaSSL_DSA_new malloc CYASSL_DSA failure");
-            XFREE(key, NULL, DYNAMIC_TYPE_DSA);
-            return NULL;
-        }
+    WOLFSSL_MSG("wolfSSL_DSA_new");
 
-        InitCyaSSL_DSA(external);
-        InitDsaKey(key);
-        external->internal = key;
+    key = (DsaKey*) XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
+    if (key == NULL) {
+        WOLFSSL_MSG("wolfSSL_DSA_new malloc DsaKey failure");
+        return NULL;
+    }
 
-        return external;
+    external = (WOLFSSL_DSA*) XMALLOC(sizeof(WOLFSSL_DSA), NULL,
+                                    DYNAMIC_TYPE_DSA);
+    if (external == NULL) {
+        WOLFSSL_MSG("wolfSSL_DSA_new malloc WOLFSSL_DSA failure");
+        XFREE(key, NULL, DYNAMIC_TYPE_DSA);
+        return NULL;
     }
 
+    InitwolfSSL_DSA(external);
+    InitDsaKey(key);
+    external->internal = key;
 
-    void CyaSSL_DSA_free(CYASSL_DSA* dsa)
-    {
-        CYASSL_MSG("CyaSSL_DSA_free");
+    return external;
+}
 
-        if (dsa) {
-            if (dsa->internal) {
-                FreeDsaKey((DsaKey*)dsa->internal);
-                XFREE(dsa->internal, NULL, DYNAMIC_TYPE_DSA);
-                dsa->internal = NULL;
-            }
-            CyaSSL_BN_free(dsa->priv_key);
-            CyaSSL_BN_free(dsa->pub_key);
-            CyaSSL_BN_free(dsa->g);
-            CyaSSL_BN_free(dsa->q);
-            CyaSSL_BN_free(dsa->p);
-            InitCyaSSL_DSA(dsa);  /* set back to NULLs for safety */
 
-            XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
+void wolfSSL_DSA_free(WOLFSSL_DSA* dsa)
+{
+    WOLFSSL_MSG("wolfSSL_DSA_free");
+
+    if (dsa) {
+        if (dsa->internal) {
+            FreeDsaKey((DsaKey*)dsa->internal);
+            XFREE(dsa->internal, NULL, DYNAMIC_TYPE_DSA);
+            dsa->internal = NULL;
         }
+        wolfSSL_BN_free(dsa->priv_key);
+        wolfSSL_BN_free(dsa->pub_key);
+        wolfSSL_BN_free(dsa->g);
+        wolfSSL_BN_free(dsa->q);
+        wolfSSL_BN_free(dsa->p);
+        InitwolfSSL_DSA(dsa);  /* set back to NULLs for safety */
+
+        XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
     }
+}
 
 
-    int CyaSSL_DSA_generate_key(CYASSL_DSA* dsa)
-    {
-        (void)dsa;
+int wolfSSL_DSA_generate_key(WOLFSSL_DSA* dsa)
+{
+    (void)dsa;
 
-        CYASSL_MSG("CyaSSL_DSA_generate_key");
+    WOLFSSL_MSG("wolfSSL_DSA_generate_key");
 
-        return 0;  /* key gen not needed by server */
-    }
+    return 0;  /* key gen not needed by server */
+}
 
 
-    int CyaSSL_DSA_generate_parameters_ex(CYASSL_DSA* dsa, int bits,
-                   unsigned char* seed, int seedLen, int* counterRet,
-                   unsigned long* hRet, void* cb)
-    {
-        (void)dsa;
-        (void)bits;
-        (void)seed;
-        (void)seedLen;
-        (void)counterRet;
-        (void)hRet;
-        (void)cb;
+int wolfSSL_DSA_generate_parameters_ex(WOLFSSL_DSA* dsa, int bits,
+               unsigned char* seed, int seedLen, int* counterRet,
+               unsigned long* hRet, void* cb)
+{
+    (void)dsa;
+    (void)bits;
+    (void)seed;
+    (void)seedLen;
+    (void)counterRet;
+    (void)hRet;
+    (void)cb;
 
-        CYASSL_MSG("CyaSSL_DSA_generate_parameters_ex");
+    WOLFSSL_MSG("wolfSSL_DSA_generate_parameters_ex");
 
-        return 0;  /* key gen not needed by server */
-    }
+    return 0;  /* key gen not needed by server */
+}
 #endif /* NO_DSA */
 
 #ifndef NO_RSA
-    static void InitCyaSSL_Rsa(CYASSL_RSA* rsa)
-    {
-        if (rsa) {
-            rsa->n        = NULL;
-            rsa->e        = NULL;
-            rsa->d        = NULL;
-            rsa->p        = NULL;
-            rsa->q        = NULL;
-               rsa->dmp1     = NULL;
-               rsa->dmq1     = NULL;
-               rsa->iqmp     = NULL;
-            rsa->internal = NULL;
-            rsa->inSet    = 0;
-            rsa->exSet    = 0;
-        }
+static void InitwolfSSL_Rsa(WOLFSSL_RSA* rsa)
+{
+    if (rsa) {
+        rsa->n        = NULL;
+        rsa->e        = NULL;
+        rsa->d        = NULL;
+        rsa->p        = NULL;
+        rsa->q        = NULL;
+        rsa->dmp1     = NULL;
+        rsa->dmq1     = NULL;
+        rsa->iqmp     = NULL;
+        rsa->internal = NULL;
+        rsa->inSet    = 0;
+        rsa->exSet    = 0;
     }
+}
 
 
-    CYASSL_RSA* CyaSSL_RSA_new(void)
-    {
-        CYASSL_RSA* external;
-        RsaKey*     key;
-
-        CYASSL_MSG("CyaSSL_RSA_new");
+WOLFSSL_RSA* wolfSSL_RSA_new(void)
+{
+    WOLFSSL_RSA* external;
+    RsaKey*     key;
 
-        key = (RsaKey*) XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
-        if (key == NULL) {
-            CYASSL_MSG("CyaSSL_RSA_new malloc RsaKey failure");
-            return NULL;
-        }
+    WOLFSSL_MSG("wolfSSL_RSA_new");
 
-        external = (CYASSL_RSA*) XMALLOC(sizeof(CYASSL_RSA), NULL,
-                                         DYNAMIC_TYPE_RSA);
-        if (external == NULL) {
-            CYASSL_MSG("CyaSSL_RSA_new malloc CYASSL_RSA failure");
-            XFREE(key, NULL, DYNAMIC_TYPE_RSA);
-            return NULL;
-        }
+    key = (RsaKey*) XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
+    if (key == NULL) {
+        WOLFSSL_MSG("wolfSSL_RSA_new malloc RsaKey failure");
+        return NULL;
+    }
 
-        InitCyaSSL_Rsa(external);
-        if (InitRsaKey(key, NULL) != 0) {
-            CYASSL_MSG("InitRsaKey CYASSL_RSA failure");
-            XFREE(external, NULL, DYNAMIC_TYPE_RSA);
-            XFREE(key, NULL, DYNAMIC_TYPE_RSA);
-            return NULL;
-        }
-        external->internal = key;
+    external = (WOLFSSL_RSA*) XMALLOC(sizeof(WOLFSSL_RSA), NULL,
+                                     DYNAMIC_TYPE_RSA);
+    if (external == NULL) {
+        WOLFSSL_MSG("wolfSSL_RSA_new malloc WOLFSSL_RSA failure");
+        XFREE(key, NULL, DYNAMIC_TYPE_RSA);
+        return NULL;
+    }
 
-        return external;
+    InitwolfSSL_Rsa(external);
+    if (wc_InitRsaKey(key, NULL) != 0) {
+        WOLFSSL_MSG("InitRsaKey WOLFSSL_RSA failure");
+        XFREE(external, NULL, DYNAMIC_TYPE_RSA);
+        XFREE(key, NULL, DYNAMIC_TYPE_RSA);
+        return NULL;
     }
+    external->internal = key;
 
+    return external;
+}
 
-    void CyaSSL_RSA_free(CYASSL_RSA* rsa)
-    {
-        CYASSL_MSG("CyaSSL_RSA_free");
 
-        if (rsa) {
-            if (rsa->internal) {
-                FreeRsaKey((RsaKey*)rsa->internal);
-                XFREE(rsa->internal, NULL, DYNAMIC_TYPE_RSA);
-                rsa->internal = NULL;
-            }
-            CyaSSL_BN_free(rsa->iqmp);
-            CyaSSL_BN_free(rsa->dmq1);
-            CyaSSL_BN_free(rsa->dmp1);
-            CyaSSL_BN_free(rsa->q);
-            CyaSSL_BN_free(rsa->p);
-            CyaSSL_BN_free(rsa->d);
-            CyaSSL_BN_free(rsa->e);
-            CyaSSL_BN_free(rsa->n);
-            InitCyaSSL_Rsa(rsa);  /* set back to NULLs for safety */
+void wolfSSL_RSA_free(WOLFSSL_RSA* rsa)
+{
+    WOLFSSL_MSG("wolfSSL_RSA_free");
 
-            XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
+    if (rsa) {
+        if (rsa->internal) {
+            wc_FreeRsaKey((RsaKey*)rsa->internal);
+            XFREE(rsa->internal, NULL, DYNAMIC_TYPE_RSA);
+            rsa->internal = NULL;
         }
+        wolfSSL_BN_free(rsa->iqmp);
+        wolfSSL_BN_free(rsa->dmq1);
+        wolfSSL_BN_free(rsa->dmp1);
+        wolfSSL_BN_free(rsa->q);
+        wolfSSL_BN_free(rsa->p);
+        wolfSSL_BN_free(rsa->d);
+        wolfSSL_BN_free(rsa->e);
+        wolfSSL_BN_free(rsa->n);
+        InitwolfSSL_Rsa(rsa);  /* set back to NULLs for safety */
+
+        XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
     }
+}
 #endif /* NO_RSA */
 
 
 #if !defined(NO_RSA) || !defined(NO_DSA)
-    static int SetIndividualExternal(CYASSL_BIGNUM** bn, mp_int* mpi)
-    {
-        CYASSL_MSG("Entering SetIndividualExternal");
+static int SetIndividualExternal(WOLFSSL_BIGNUM** bn, mp_int* mpi)
+{
+    WOLFSSL_MSG("Entering SetIndividualExternal");
 
-        if (mpi == NULL) {
-            CYASSL_MSG("mpi NULL error");
-            return SSL_FATAL_ERROR;
-        }
+    if (mpi == NULL) {
+        WOLFSSL_MSG("mpi NULL error");
+        return SSL_FATAL_ERROR;
+    }
 
+    if (*bn == NULL) {
+        *bn = wolfSSL_BN_new();
         if (*bn == NULL) {
-            *bn = CyaSSL_BN_new();
-            if (*bn == NULL) {
-                CYASSL_MSG("SetIndividualExternal alloc failed");
-                return SSL_FATAL_ERROR;
-            }
-        }
-
-        if (mp_copy(mpi, (mp_int*)((*bn)->internal)) != MP_OKAY) {
-            CYASSL_MSG("mp_copy error");
+            WOLFSSL_MSG("SetIndividualExternal alloc failed");
             return SSL_FATAL_ERROR;
         }
+    }
 
-        return 0;
+    if (mp_copy(mpi, (mp_int*)((*bn)->internal)) != MP_OKAY) {
+        WOLFSSL_MSG("mp_copy error");
+        return SSL_FATAL_ERROR;
     }
+
+    return 0;
+}
 #endif /* !NO_RSA && !NO_DSA */
 
 
 #ifndef NO_DSA
-    static int SetDsaExternal(CYASSL_DSA* dsa)
-    {
-        DsaKey* key;
-        CYASSL_MSG("Entering SetDsaExternal");
+static int SetDsaExternal(WOLFSSL_DSA* dsa)
+{
+    DsaKey* key;
+    WOLFSSL_MSG("Entering SetDsaExternal");
 
-        if (dsa == NULL || dsa->internal == NULL) {
-            CYASSL_MSG("dsa key NULL error");
-            return SSL_FATAL_ERROR;
-        }
+    if (dsa == NULL || dsa->internal == NULL) {
+        WOLFSSL_MSG("dsa key NULL error");
+        return SSL_FATAL_ERROR;
+    }
 
-        key = (DsaKey*)dsa->internal;
+    key = (DsaKey*)dsa->internal;
 
-        if (SetIndividualExternal(&dsa->p, &key->p) < 0) {
-            CYASSL_MSG("dsa p key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&dsa->p, &key->p) < 0) {
+        WOLFSSL_MSG("dsa p key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&dsa->q, &key->q) < 0) {
-            CYASSL_MSG("dsa q key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&dsa->q, &key->q) < 0) {
+        WOLFSSL_MSG("dsa q key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&dsa->g, &key->g) < 0) {
-            CYASSL_MSG("dsa g key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&dsa->g, &key->g) < 0) {
+        WOLFSSL_MSG("dsa g key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&dsa->pub_key, &key->y) < 0) {
-            CYASSL_MSG("dsa y key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&dsa->pub_key, &key->y) < 0) {
+        WOLFSSL_MSG("dsa y key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&dsa->priv_key, &key->x) < 0) {
-            CYASSL_MSG("dsa x key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&dsa->priv_key, &key->x) < 0) {
+        WOLFSSL_MSG("dsa x key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        dsa->exSet = 1;
+    dsa->exSet = 1;
 
-        return 0;
-    }
+    return 0;
+}
 #endif /* NO_DSA */
 
 
 #ifndef NO_RSA
-    static int SetRsaExternal(CYASSL_RSA* rsa)
-    {
-        RsaKey* key;
-        CYASSL_MSG("Entering SetRsaExternal");
+static int SetRsaExternal(WOLFSSL_RSA* rsa)
+{
+    RsaKey* key;
+    WOLFSSL_MSG("Entering SetRsaExternal");
 
-        if (rsa == NULL || rsa->internal == NULL) {
-            CYASSL_MSG("rsa key NULL error");
-            return SSL_FATAL_ERROR;
-        }
+    if (rsa == NULL || rsa->internal == NULL) {
+        WOLFSSL_MSG("rsa key NULL error");
+        return SSL_FATAL_ERROR;
+    }
 
-        key = (RsaKey*)rsa->internal;
+    key = (RsaKey*)rsa->internal;
 
-        if (SetIndividualExternal(&rsa->n, &key->n) < 0) {
-            CYASSL_MSG("rsa n key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->n, &key->n) < 0) {
+        WOLFSSL_MSG("rsa n key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->e, &key->e) < 0) {
-            CYASSL_MSG("rsa e key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->e, &key->e) < 0) {
+        WOLFSSL_MSG("rsa e key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->d, &key->d) < 0) {
-            CYASSL_MSG("rsa d key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->d, &key->d) < 0) {
+        WOLFSSL_MSG("rsa d key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->p, &key->p) < 0) {
-            CYASSL_MSG("rsa p key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->p, &key->p) < 0) {
+        WOLFSSL_MSG("rsa p key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->q, &key->q) < 0) {
-            CYASSL_MSG("rsa q key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->q, &key->q) < 0) {
+        WOLFSSL_MSG("rsa q key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->dmp1, &key->dP) < 0) {
-            CYASSL_MSG("rsa dP key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->dmp1, &key->dP) < 0) {
+        WOLFSSL_MSG("rsa dP key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->dmq1, &key->dQ) < 0) {
-            CYASSL_MSG("rsa dQ key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->dmq1, &key->dQ) < 0) {
+        WOLFSSL_MSG("rsa dQ key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        if (SetIndividualExternal(&rsa->iqmp, &key->u) < 0) {
-            CYASSL_MSG("rsa u key error");
-            return SSL_FATAL_ERROR;
-        }
+    if (SetIndividualExternal(&rsa->iqmp, &key->u) < 0) {
+        WOLFSSL_MSG("rsa u key error");
+        return SSL_FATAL_ERROR;
+    }
 
-        rsa->exSet = 1;
+    rsa->exSet = 1;
 
-        return 0;
-    }
+    return 0;
+}
 
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_RSA_generate_key_ex(CYASSL_RSA* rsa, int bits, CYASSL_BIGNUM* bn,
-                                   void* cb)
-    {
-        RNG rng;
+/* SSL_SUCCESS on ok */
+int wolfSSL_RSA_generate_key_ex(WOLFSSL_RSA* rsa, int bits, WOLFSSL_BIGNUM* bn,
+                               void* cb)
+{
+    int ret = SSL_FATAL_ERROR;
 
-        CYASSL_MSG("CyaSSL_RSA_generate_key_ex");
+    WOLFSSL_MSG("wolfSSL_RSA_generate_key_ex");
 
-        (void)rsa;
-        (void)bits;
-        (void)cb;
-        (void)bn;
+    (void)rsa;
+    (void)bits;
+    (void)cb;
+    (void)bn;
 
-        if (InitRng(&rng) < 0) {
-            CYASSL_MSG("RNG init failed");
-            return SSL_FATAL_ERROR;
-        }
+#ifdef WOLFSSL_KEY_GEN
+    {
+    #ifdef WOLFSSL_SMALL_STACK
+        RNG* rng = NULL;
+    #else
+        RNG  rng[1];
+    #endif
 
-#ifdef CYASSL_KEY_GEN
-        if (MakeRsaKey((RsaKey*)rsa->internal, bits, 65537, &rng) < 0) {
-            CYASSL_MSG("MakeRsaKey failed");
+    #ifdef WOLFSSL_SMALL_STACK
+        rng = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (rng == NULL)
             return SSL_FATAL_ERROR;
-        }
+    #endif
 
-        if (SetRsaExternal(rsa) < 0) {
-            CYASSL_MSG("SetRsaExternal failed");
-            return SSL_FATAL_ERROR;
+        if (wc_InitRng(rng) < 0)
+            WOLFSSL_MSG("RNG init failed");
+        else if (wc_MakeRsaKey((RsaKey*)rsa->internal, bits, 65537, rng) < 0)
+            WOLFSSL_MSG("wc_MakeRsaKey failed");
+        else if (SetRsaExternal(rsa) < 0)
+            WOLFSSL_MSG("SetRsaExternal failed");
+        else {
+            rsa->inSet = 1;
+            ret = SSL_SUCCESS;
         }
 
-        rsa->inSet = 1;
-
-        return SSL_SUCCESS;
+        wc_FreeRng(rng);
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(rng, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
+    }
 #else
-        CYASSL_MSG("No Key Gen built in");
-        return SSL_FATAL_ERROR;
+    WOLFSSL_MSG("No Key Gen built in");
 #endif
-
-    }
+    return ret;
+}
 
 
-    /* SSL_SUCCESS on ok */
-    int CyaSSL_RSA_blinding_on(CYASSL_RSA* rsa, CYASSL_BN_CTX* bn)
-    {
-        (void)rsa;
-        (void)bn;
+/* SSL_SUCCESS on ok */
+int wolfSSL_RSA_blinding_on(WOLFSSL_RSA* rsa, WOLFSSL_BN_CTX* bn)
+{
+    (void)rsa;
+    (void)bn;
 
-        CYASSL_MSG("CyaSSL_RSA_blinding_on");
+    WOLFSSL_MSG("wolfSSL_RSA_blinding_on");
 
-        return SSL_SUCCESS;  /* on by default */
-    }
+    return SSL_SUCCESS;  /* on by default */
+}
 
 
-    int CyaSSL_RSA_public_encrypt(int len, unsigned char* fr,
-                                   unsigned char* to, CYASSL_RSA* rsa, int padding)
-    {
-        (void)len;
-        (void)fr;
-        (void)to;
-        (void)rsa;
-        (void)padding;
+int wolfSSL_RSA_public_encrypt(int len, unsigned char* fr,
+                            unsigned char* to, WOLFSSL_RSA* rsa, int padding)
+{
+    (void)len;
+    (void)fr;
+    (void)to;
+    (void)rsa;
+    (void)padding;
 
-        CYASSL_MSG("CyaSSL_RSA_public_encrypt");
+    WOLFSSL_MSG("wolfSSL_RSA_public_encrypt");
 
-        return SSL_FATAL_ERROR;
-    }
+    return SSL_FATAL_ERROR;
+}
 
 
-    int CyaSSL_RSA_private_decrypt(int len, unsigned char* fr,
-                                   unsigned char* to, CYASSL_RSA* rsa, int padding)
-    {
-        (void)len;
-        (void)fr;
-        (void)to;
-        (void)rsa;
-        (void)padding;
+int wolfSSL_RSA_private_decrypt(int len, unsigned char* fr,
+                            unsigned char* to, WOLFSSL_RSA* rsa, int padding)
+{
+    (void)len;
+    (void)fr;
+    (void)to;
+    (void)rsa;
+    (void)padding;
 
-        CYASSL_MSG("CyaSSL_RSA_private_decrypt");
+    WOLFSSL_MSG("wolfSSL_RSA_private_decrypt");
 
-        return SSL_FATAL_ERROR;
-    }
+    return SSL_FATAL_ERROR;
+}
 
 
-    int CyaSSL_RSA_size(const CYASSL_RSA* rsa)
-    {
-        CYASSL_MSG("CyaSSL_RSA_size");
+int wolfSSL_RSA_size(const WOLFSSL_RSA* rsa)
+{
+    WOLFSSL_MSG("wolfSSL_RSA_size");
 
-        if (rsa == NULL)
-            return 0;
+    if (rsa == NULL)
+        return 0;
 
-        return CyaSSL_BN_num_bytes(rsa->n);
-    }
+    return wolfSSL_BN_num_bytes(rsa->n);
+}
 #endif /* NO_RSA */
 
 
 #ifndef NO_DSA
-    /* return SSL_SUCCESS on success, < 0 otherwise */
-    int CyaSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet,
-                           CYASSL_DSA* dsa)
-    {
-        RNG    tmpRNG;
-        RNG*   rng = &tmpRNG;
+/* return SSL_SUCCESS on success, < 0 otherwise */
+int wolfSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet,
+                       WOLFSSL_DSA* dsa)
+{
+    int    ret = SSL_FATAL_ERROR;
+    int    initTmpRng = 0;
+    RNG*   rng = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    RNG*   tmpRNG = NULL;
+#else
+    RNG    tmpRNG[1];
+#endif
 
-        CYASSL_MSG("CyaSSL_DSA_do_sign");
+    WOLFSSL_MSG("wolfSSL_DSA_do_sign");
 
-        if (d == NULL || sigRet == NULL || dsa == NULL) {
-            CYASSL_MSG("Bad function arguments");
+    if (d == NULL || sigRet == NULL || dsa == NULL)
+        WOLFSSL_MSG("Bad function arguments");
+    else if (dsa->inSet == 0)
+        WOLFSSL_MSG("No DSA internal set");
+    else {
+    #ifdef WOLFSSL_SMALL_STACK
+        tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (tmpRNG == NULL)
             return SSL_FATAL_ERROR;
-        }
+    #endif
 
-        if (dsa->inSet == 0) {
-            CYASSL_MSG("No DSA internal set");
-            return SSL_FATAL_ERROR;
+        if (wc_InitRng(tmpRNG) == 0) {
+            rng = tmpRNG;
+            initTmpRng = 1;
         }
-
-        if (InitRng(&tmpRNG) != 0) {
-            CYASSL_MSG("Bad RNG Init, trying global");
-            if (initGlobalRNG == 0) {
-                CYASSL_MSG("Global RNG no Init");
-                return SSL_FATAL_ERROR;
-            }
-            rng = &globalRNG;
+        else {
+            WOLFSSL_MSG("Bad RNG Init, trying global");
+            if (initGlobalRNG == 0)
+                WOLFSSL_MSG("Global RNG no Init");
+            else
+                rng = &globalRNG;
         }
 
-        if (DsaSign(d, sigRet, (DsaKey*)dsa->internal, rng) < 0) {
-            CYASSL_MSG("DsaSign failed");
-            return SSL_FATAL_ERROR;
+        if (rng) {
+            if (DsaSign(d, sigRet, (DsaKey*)dsa->internal, rng) < 0)
+                WOLFSSL_MSG("DsaSign failed");
+            else
+                ret = SSL_SUCCESS;
         }
 
-        return SSL_SUCCESS;
+        if (initTmpRng)
+            wc_FreeRng(tmpRNG);
+    #ifdef WOLFSSL_SMALL_STACK
+        XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    #endif
     }
+
+    return ret;
+}
 #endif /* NO_DSA */
 
 
 #ifndef NO_RSA
-    /* return SSL_SUCCES on ok, 0 otherwise */
-    int CyaSSL_RSA_sign(int type, const unsigned char* m,
-                               unsigned int mLen, unsigned char* sigRet,
-                               unsigned int* sigLen, CYASSL_RSA* rsa)
-    {
-        byte   encodedSig[MAX_ENCODED_SIG_SZ];
-        word32 outLen;
-        word32 signSz;
-        RNG    tmpRNG;
-        RNG*   rng = &tmpRNG;
+/* return SSL_SUCCES on ok, 0 otherwise */
+int wolfSSL_RSA_sign(int type, const unsigned char* m,
+                           unsigned int mLen, unsigned char* sigRet,
+                           unsigned int* sigLen, WOLFSSL_RSA* rsa)
+{
+    word32 outLen;    
+    word32 signSz;
+    int    initTmpRng = 0;
+    RNG*   rng        = NULL;
+    int    ret        = 0;
+#ifdef WOLFSSL_SMALL_STACK
+    RNG*   tmpRNG     = NULL;
+    byte*  encodedSig = NULL;
+#else
+    RNG    tmpRNG[1];
+    byte   encodedSig[MAX_ENCODED_SIG_SZ];
+#endif
 
-        CYASSL_MSG("CyaSSL_RSA_sign");
+    WOLFSSL_MSG("wolfSSL_RSA_sign");
 
-        if (m == NULL || sigRet == NULL || sigLen == NULL || rsa == NULL) {
-            CYASSL_MSG("Bad function arguments");
-            return 0;
-        }
+    if (m == NULL || sigRet == NULL || sigLen == NULL || rsa == NULL)
+        WOLFSSL_MSG("Bad function arguments");
+    else if (rsa->inSet == 0)
+        WOLFSSL_MSG("No RSA internal set");
+    else if (type != NID_md5 && type != NID_sha1)
+        WOLFSSL_MSG("Bad md type");
+    else {
+        outLen = (word32)wolfSSL_BN_num_bytes(rsa->n);
 
-        if (rsa->inSet == 0) {
-            CYASSL_MSG("No RSA internal set");
+    #ifdef WOLFSSL_SMALL_STACK
+        tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        if (tmpRNG == NULL)
             return 0;
-        }
 
-        outLen = (word32)CyaSSL_BN_num_bytes(rsa->n);
-        if (outLen == 0) {
-            CYASSL_MSG("Bad RSA size");
+        encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (encodedSig == NULL) {
+            XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
             return 0;
         }
+    #endif
 
-        if (InitRng(&tmpRNG) != 0) {
-            CYASSL_MSG("Bad RNG Init, trying global");
-            if (initGlobalRNG == 0) {
-                CYASSL_MSG("Global RNG no Init");
-                return 0;
-            }
-            rng = &globalRNG;
+        if (outLen == 0)
+            WOLFSSL_MSG("Bad RSA size");
+        else if (wc_InitRng(tmpRNG) == 0) {
+            rng = tmpRNG;
+            initTmpRng = 1;
         }
+        else {
+            WOLFSSL_MSG("Bad RNG Init, trying global");
 
-        switch (type) {
-            case NID_md5:
-                type = MD5h;
-                break;
-
-            case NID_sha1:
-                type = SHAh;
-                break;
-
-            default:
-                CYASSL_MSG("Bad md type");
-                return 0;
+            if (initGlobalRNG == 0)
+                WOLFSSL_MSG("Global RNG no Init");
+            else
+                rng = &globalRNG;
         }
+    }
+
+    if (rng) {
+        type = (type == NID_md5) ? MD5h : SHAh;
 
-        signSz = EncodeSignature(encodedSig, m, mLen, type);
+        signSz = wc_EncodeSignature(encodedSig, m, mLen, type);
         if (signSz == 0) {
-            CYASSL_MSG("Bad Encode Signature");
-            return 0;
+            WOLFSSL_MSG("Bad Encode Signature");
         }
-
-        *sigLen = RsaSSL_Sign(encodedSig, signSz, sigRet, outLen,
-                              (RsaKey*)rsa->internal, rng);
-        if (*sigLen <= 0) {
-            CYASSL_MSG("Bad Rsa Sign");
-            return 0;
+        else {
+            *sigLen = wc_RsaSSL_Sign(encodedSig, signSz, sigRet, outLen,
+                                  (RsaKey*)rsa->internal, rng);
+            if (*sigLen <= 0)
+                WOLFSSL_MSG("Bad Rsa Sign");
+            else
+                ret = SSL_SUCCESS;
         }
 
-        CYASSL_MSG("CyaSSL_RSA_sign success");
-        return SSL_SUCCESS;
     }
 
+    if (initTmpRng)
+        wc_FreeRng(tmpRNG);
+
+#ifdef WOLFSSL_SMALL_STACK
+    XFREE(tmpRNG,     NULL, DYNAMIC_TYPE_TMP_BUFFER);
+    XFREE(encodedSig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+#endif
+
+    WOLFSSL_MSG("wolfSSL_RSA_sign success");
+    return ret;
+}
+
+
+int wolfSSL_RSA_public_decrypt(int flen, unsigned char* from,
+                          unsigned char* to, WOLFSSL_RSA* rsa, int padding)
+{
+    (void)flen;
+    (void)from;
+    (void)to;
+    (void)rsa;
+    (void)padding;
+
+    WOLFSSL_MSG("wolfSSL_RSA_public_decrypt");
+
+    return SSL_FATAL_ERROR;
+}
+
 
-    int CyaSSL_RSA_public_decrypt(int flen, unsigned char* from,
-                              unsigned char* to, CYASSL_RSA* rsa, int padding)
-    {
-        (void)flen;
-        (void)from;
-        (void)to;
-        (void)rsa;
-        (void)padding;
+/* generate p-1 and q-1, SSL_SUCCESS on ok */
+int wolfSSL_RSA_GenAdd(WOLFSSL_RSA* rsa)
+{
+    int    err;
+    mp_int tmp;
 
-        CYASSL_MSG("CyaSSL_RSA_public_decrypt");
+    WOLFSSL_MSG("wolfSSL_RsaGenAdd");
 
+    if (rsa == NULL || rsa->p == NULL || rsa->q == NULL || rsa->d == NULL ||
+                       rsa->dmp1 == NULL || rsa->dmq1 == NULL) {
+        WOLFSSL_MSG("rsa no init error");
         return SSL_FATAL_ERROR;
     }
 
+    if (mp_init(&tmp) != MP_OKAY) {
+        WOLFSSL_MSG("mp_init error");
+        return SSL_FATAL_ERROR;
+    }
 
-    /* generate p-1 and q-1, SSL_SUCCESS on ok */
-    int CyaSSL_RSA_GenAdd(CYASSL_RSA* rsa)
-    {
-        int    err;
-        mp_int tmp;
-
-        CYASSL_MSG("CyaSSL_RsaGenAdd");
+    err = mp_sub_d((mp_int*)rsa->p->internal, 1, &tmp);
+    if (err != MP_OKAY) {
+        WOLFSSL_MSG("mp_sub_d error");
+    }
+    else
+        err = mp_mod((mp_int*)rsa->d->internal, &tmp,
+                     (mp_int*)rsa->dmp1->internal);
 
-        if (rsa == NULL || rsa->p == NULL || rsa->q == NULL || rsa->d == NULL ||
-                           rsa->dmp1 == NULL || rsa->dmq1 == NULL) {
-            CYASSL_MSG("rsa no init error");
-            return SSL_FATAL_ERROR;
-        }
+    if (err != MP_OKAY) {
+        WOLFSSL_MSG("mp_mod error");
+    }
+    else
+        err = mp_sub_d((mp_int*)rsa->q->internal, 1, &tmp);
+    if (err != MP_OKAY) {
+        WOLFSSL_MSG("mp_sub_d error");
+    }
+    else
+        err = mp_mod((mp_int*)rsa->d->internal, &tmp,
+                     (mp_int*)rsa->dmq1->internal);
 
-        if (mp_init(&tmp) != MP_OKAY) {
-            CYASSL_MSG("mp_init error");
-            return SSL_FATAL_ERROR;
-        }
+    mp_clear(&tmp);
 
-        err = mp_sub_d((mp_int*)rsa->p->internal, 1, &tmp);
-        if (err != MP_OKAY) {
-            CYASSL_MSG("mp_sub_d error");
-        }
-        else
-            err = mp_mod((mp_int*)rsa->d->internal, &tmp,
-                         (mp_int*)rsa->dmp1->internal);
+    if (err == MP_OKAY)
+        return SSL_SUCCESS;
+    else
+        return SSL_FATAL_ERROR;
+}
+#endif /* NO_RSA */
 
-        if (err != MP_OKAY) {
-            CYASSL_MSG("mp_mod error");
-        }
-        else
-            err = mp_sub_d((mp_int*)rsa->q->internal, 1, &tmp);
-        if (err != MP_OKAY) {
-            CYASSL_MSG("mp_sub_d error");
-        }
-        else
-            err = mp_mod((mp_int*)rsa->d->internal, &tmp,
-                         (mp_int*)rsa->dmq1->internal);
 
-        mp_clear(&tmp);
+void wolfSSL_HMAC_Init(WOLFSSL_HMAC_CTX* ctx, const void* key, int keylen,
+                  const EVP_MD* type)
+{
+    WOLFSSL_MSG("wolfSSL_HMAC_Init");
 
-        if (err == MP_OKAY)
-            return SSL_SUCCESS;
-        else
-            return SSL_FATAL_ERROR;
+    if (ctx == NULL) {
+        WOLFSSL_MSG("no ctx on init");
+        return;
     }
-#endif /* NO_RSA */
-
 
-    void CyaSSL_HMAC_Init(CYASSL_HMAC_CTX* ctx, const void* key, int keylen,
-                      const EVP_MD* type)
-    {
-        CYASSL_MSG("CyaSSL_HMAC_Init");
+    if (type) {
+        WOLFSSL_MSG("init has type");
 
-        if (ctx == NULL) {
-            CYASSL_MSG("no ctx on init");
-            return;
+        if (XSTRNCMP(type, "MD5", 3) == 0) {
+            WOLFSSL_MSG("md5 hmac");
+            ctx->type = MD5;
         }
-
-        if (type) {
-            CYASSL_MSG("init has type");
-
-            if (XSTRNCMP(type, "MD5", 3) == 0) {
-                CYASSL_MSG("md5 hmac");
-                ctx->type = MD5;
-            }
-            else if (XSTRNCMP(type, "SHA256", 6) == 0) {
-                CYASSL_MSG("sha256 hmac");
-                ctx->type = SHA256;
-            }
-
-            /* has to be last since would pick or 256, 384, or 512 too */
-            else if (XSTRNCMP(type, "SHA", 3) == 0) {
-                CYASSL_MSG("sha hmac");
-                ctx->type = SHA;
-            }
-            else {
-                CYASSL_MSG("bad init type");
-            }
+        else if (XSTRNCMP(type, "SHA256", 6) == 0) {
+            WOLFSSL_MSG("sha256 hmac");
+            ctx->type = SHA256;
         }
 
-        if (key && keylen) {
-            CYASSL_MSG("keying hmac");
-            HmacSetKey(&ctx->hmac, ctx->type, (const byte*)key, (word32)keylen);
-            /* OpenSSL compat, no error */
+        /* has to be last since would pick or 256, 384, or 512 too */
+        else if (XSTRNCMP(type, "SHA", 3) == 0) {
+            WOLFSSL_MSG("sha hmac");
+            ctx->type = SHA;
+        }
+        else {
+            WOLFSSL_MSG("bad init type");
         }
     }
 
+    if (key && keylen) {
+        WOLFSSL_MSG("keying hmac");
+        wc_HmacSetKey(&ctx->hmac, ctx->type, (const byte*)key, (word32)keylen);
+        /* OpenSSL compat, no error */
+    }
+}
 
-    void CyaSSL_HMAC_Update(CYASSL_HMAC_CTX* ctx, const unsigned char* data,
-                        int len)
-    {
-        CYASSL_MSG("CyaSSL_HMAC_Update");
 
-        if (ctx && data) {
-            CYASSL_MSG("updating hmac");
-            HmacUpdate(&ctx->hmac, data, (word32)len);
-            /* OpenSSL compat, no error */
-        }
+void wolfSSL_HMAC_Update(WOLFSSL_HMAC_CTX* ctx, const unsigned char* data,
+                    int len)
+{
+    WOLFSSL_MSG("wolfSSL_HMAC_Update");
+
+    if (ctx && data) {
+        WOLFSSL_MSG("updating hmac");
+        wc_HmacUpdate(&ctx->hmac, data, (word32)len);
+        /* OpenSSL compat, no error */
     }
+}
 
 
-    void CyaSSL_HMAC_Final(CYASSL_HMAC_CTX* ctx, unsigned char* hash,
-                       unsigned int* len)
-    {
-        CYASSL_MSG("CyaSSL_HMAC_Final");
+void wolfSSL_HMAC_Final(WOLFSSL_HMAC_CTX* ctx, unsigned char* hash,
+                   unsigned int* len)
+{
+    WOLFSSL_MSG("wolfSSL_HMAC_Final");
 
-        if (ctx && hash) {
-            CYASSL_MSG("final hmac");
-            HmacFinal(&ctx->hmac, hash);
-            /* OpenSSL compat, no error */
+    if (ctx && hash) {
+        WOLFSSL_MSG("final hmac");
+        wc_HmacFinal(&ctx->hmac, hash);
+        /* OpenSSL compat, no error */
 
-            if (len) {
-                CYASSL_MSG("setting output len");
-                switch (ctx->type) {
-                    case MD5:
-                        *len = MD5_DIGEST_SIZE;
-                        break;
+        if (len) {
+            WOLFSSL_MSG("setting output len");
+            switch (ctx->type) {
+                case MD5:
+                    *len = MD5_DIGEST_SIZE;
+                    break;
 
-                    case SHA:
-                        *len = SHA_DIGEST_SIZE;
-                        break;
+                case SHA:
+                    *len = SHA_DIGEST_SIZE;
+                    break;
 
-                    case SHA256:
-                        *len = SHA256_DIGEST_SIZE;
-                        break;
+                case SHA256:
+                    *len = SHA256_DIGEST_SIZE;
+                    break;
 
-                    default:
-                        CYASSL_MSG("bad hmac type");
-                }
+                default:
+                    WOLFSSL_MSG("bad hmac type");
             }
         }
     }
+}
 
 
-    void CyaSSL_HMAC_cleanup(CYASSL_HMAC_CTX* ctx)
-    {
-        (void)ctx;
-
-        CYASSL_MSG("CyaSSL_HMAC_cleanup");
-    }
-
-
-    const CYASSL_EVP_MD* CyaSSL_EVP_get_digestbynid(int id)
-    {
-        CYASSL_MSG("CyaSSL_get_digestbynid");
+void wolfSSL_HMAC_cleanup(WOLFSSL_HMAC_CTX* ctx)
+{
+    (void)ctx;
 
-        switch(id) {
-            case NID_md5:
-                return CyaSSL_EVP_md5();
+    WOLFSSL_MSG("wolfSSL_HMAC_cleanup");
+}
 
-            case NID_sha1:
-                return CyaSSL_EVP_sha1();
 
-            default:
-                CYASSL_MSG("Bad digest id value");
-        }
+const WOLFSSL_EVP_MD* wolfSSL_EVP_get_digestbynid(int id)
+{
+    WOLFSSL_MSG("wolfSSL_get_digestbynid");
 
-        return NULL;
+    switch(id) {
+#ifndef NO_MD5
+        case NID_md5:
+            return wolfSSL_EVP_md5();
+#endif
+#ifndef NO_SHA
+        case NID_sha1:
+            return wolfSSL_EVP_sha1();
+#endif
+        default:
+            WOLFSSL_MSG("Bad digest id value");
     }
 
+    return NULL;
+}
 
-    CYASSL_RSA* CyaSSL_EVP_PKEY_get1_RSA(CYASSL_EVP_PKEY* key)
-    {
-        (void)key;
-        CYASSL_MSG("CyaSSL_EVP_PKEY_get1_RSA");
 
-        return NULL;
-    }
+WOLFSSL_RSA* wolfSSL_EVP_PKEY_get1_RSA(WOLFSSL_EVP_PKEY* key)
+{
+    (void)key;
+    WOLFSSL_MSG("wolfSSL_EVP_PKEY_get1_RSA");
+
+    return NULL;
+}
 
 
-    CYASSL_DSA* CyaSSL_EVP_PKEY_get1_DSA(CYASSL_EVP_PKEY* key)
-    {
-        (void)key;
-        CYASSL_MSG("CyaSSL_EVP_PKEY_get1_DSA");
+WOLFSSL_DSA* wolfSSL_EVP_PKEY_get1_DSA(WOLFSSL_EVP_PKEY* key)
+{
+    (void)key;
+    WOLFSSL_MSG("wolfSSL_EVP_PKEY_get1_DSA");
 
-        return NULL;
-    }
+    return NULL;
+}
 
 
-    void* CyaSSL_EVP_X_STATE(const CYASSL_EVP_CIPHER_CTX* ctx)
-    {
-        CYASSL_MSG("CyaSSL_EVP_X_STATE");
+void* wolfSSL_EVP_X_STATE(const WOLFSSL_EVP_CIPHER_CTX* ctx)
+{
+    WOLFSSL_MSG("wolfSSL_EVP_X_STATE");
 
-        if (ctx) {
-            switch (ctx->cipherType) {
-                case ARC4_TYPE:
-                    CYASSL_MSG("returning arc4 state");
-                    return (void*)&ctx->cipher.arc4.x;
+    if (ctx) {
+        switch (ctx->cipherType) {
+            case ARC4_TYPE:
+                WOLFSSL_MSG("returning arc4 state");
+                return (void*)&ctx->cipher.arc4.x;
 
-                default:
-                    CYASSL_MSG("bad x state type");
-                    return 0;
-            }
+            default:
+                WOLFSSL_MSG("bad x state type");
+                return 0;
         }
-
-        return NULL;
     }
 
+    return NULL;
+}
 
-    int CyaSSL_EVP_X_STATE_LEN(const CYASSL_EVP_CIPHER_CTX* ctx)
-    {
-        CYASSL_MSG("CyaSSL_EVP_X_STATE_LEN");
 
-        if (ctx) {
-            switch (ctx->cipherType) {
-                case ARC4_TYPE:
-                    CYASSL_MSG("returning arc4 state size");
-                    return sizeof(Arc4);
+int wolfSSL_EVP_X_STATE_LEN(const WOLFSSL_EVP_CIPHER_CTX* ctx)
+{
+    WOLFSSL_MSG("wolfSSL_EVP_X_STATE_LEN");
 
-                default:
-                    CYASSL_MSG("bad x state type");
-                    return 0;
-            }
-        }
+    if (ctx) {
+        switch (ctx->cipherType) {
+            case ARC4_TYPE:
+                WOLFSSL_MSG("returning arc4 state size");
+                return sizeof(Arc4);
 
-        return 0;
+            default:
+                WOLFSSL_MSG("bad x state type");
+                return 0;
+        }
     }
 
+    return 0;
+}
 
-    void CyaSSL_3des_iv(CYASSL_EVP_CIPHER_CTX* ctx, int doset,
-                                unsigned char* iv, int len)
-    {
-        (void)len;
 
-        CYASSL_MSG("CyaSSL_3des_iv");
+#ifndef NO_DES3
 
-        if (ctx == NULL || iv == NULL) {
-            CYASSL_MSG("Bad function argument");
-            return;
-        }
+void wolfSSL_3des_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, int doset,
+                            unsigned char* iv, int len)
+{
+    (void)len;
 
-        if (doset)
-            Des3_SetIV(&ctx->cipher.des3, iv);  /* OpenSSL compat, no ret */
-        else
-            memcpy(iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE);
+    WOLFSSL_MSG("wolfSSL_3des_iv");
+
+    if (ctx == NULL || iv == NULL) {
+        WOLFSSL_MSG("Bad function argument");
+        return;
     }
 
+    if (doset)
+        wc_Des3_SetIV(&ctx->cipher.des3, iv);  /* OpenSSL compat, no ret */
+    else
+        memcpy(iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE);
+}
 
-    void CyaSSL_aes_ctr_iv(CYASSL_EVP_CIPHER_CTX* ctx, int doset,
-                          unsigned char* iv, int len)
-    {
-        (void)len;
+#endif /* NO_DES3 */
 
-        CYASSL_MSG("CyaSSL_aes_ctr_iv");
 
-        if (ctx == NULL || iv == NULL) {
-            CYASSL_MSG("Bad function argument");
-            return;
-        }
+#ifndef NO_AES
 
-        if (doset)
-            AesSetIV(&ctx->cipher.aes, iv);  /* OpenSSL compat, no ret */
-        else
-            memcpy(iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE);
+void wolfSSL_aes_ctr_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, int doset,
+                      unsigned char* iv, int len)
+{
+    (void)len;
+
+    WOLFSSL_MSG("wolfSSL_aes_ctr_iv");
+
+    if (ctx == NULL || iv == NULL) {
+        WOLFSSL_MSG("Bad function argument");
+        return;
     }
 
+    if (doset)
+        wc_AesSetIV(&ctx->cipher.aes, iv);  /* OpenSSL compat, no ret */
+    else
+        memcpy(iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE);
+}
 
-    const CYASSL_EVP_MD* CyaSSL_EVP_ripemd160(void)
-    {
-        CYASSL_MSG("CyaSSL_ripemd160");
+#endif /* NO_AES */
 
-        return NULL;
-    }
 
+const WOLFSSL_EVP_MD* wolfSSL_EVP_ripemd160(void)
+{
+    WOLFSSL_MSG("wolfSSL_ripemd160");
 
-    int CyaSSL_EVP_MD_size(const CYASSL_EVP_MD* type)
-    {
-        CYASSL_MSG("CyaSSL_EVP_MD_size");
+    return NULL;
+}
 
-        if (type == NULL) {
-            CYASSL_MSG("No md type arg");
-            return BAD_FUNC_ARG;
-        }
 
-        if (XSTRNCMP(type, "MD5", 3) == 0) {
-            return MD5_DIGEST_SIZE;
-        }
-        else if (XSTRNCMP(type, "SHA256", 6) == 0) {
-            return SHA256_DIGEST_SIZE;
-        }
-    #ifdef CYASSL_SHA384
-        else if (XSTRNCMP(type, "SHA384", 6) == 0) {
-            return SHA384_DIGEST_SIZE;
-        }
-    #endif
-    #ifdef CYASSL_SHA512
-        else if (XSTRNCMP(type, "SHA512", 6) == 0) {
-            return SHA512_DIGEST_SIZE;
-        }
-    #endif
-        /* has to be last since would pick or 256, 384, or 512 too */
-        else if (XSTRNCMP(type, "SHA", 3) == 0) {
-            return SHA_DIGEST_SIZE;
-        }
+int wolfSSL_EVP_MD_size(const WOLFSSL_EVP_MD* type)
+{
+    WOLFSSL_MSG("wolfSSL_EVP_MD_size");
 
+    if (type == NULL) {
+        WOLFSSL_MSG("No md type arg");
         return BAD_FUNC_ARG;
     }
 
+    if (XSTRNCMP(type, "SHA256", 6) == 0) {
+        return SHA256_DIGEST_SIZE;
+    }
+#ifndef NO_MD5
+    else if (XSTRNCMP(type, "MD5", 3) == 0) {
+        return MD5_DIGEST_SIZE;
+    }
+#endif
+#ifdef WOLFSSL_SHA384
+    else if (XSTRNCMP(type, "SHA384", 6) == 0) {
+        return SHA384_DIGEST_SIZE;
+    }
+#endif
+#ifdef WOLFSSL_SHA512
+    else if (XSTRNCMP(type, "SHA512", 6) == 0) {
+        return SHA512_DIGEST_SIZE;
+    }
+#endif
+#ifndef NO_SHA
+    /* has to be last since would pick or 256, 384, or 512 too */
+    else if (XSTRNCMP(type, "SHA", 3) == 0) {
+        return SHA_DIGEST_SIZE;
+    }
+#endif
 
-    int CyaSSL_EVP_CIPHER_CTX_iv_length(const CYASSL_EVP_CIPHER_CTX* ctx)
-    {
-        CYASSL_MSG("CyaSSL_EVP_CIPHER_CTX_iv_length");
+    return BAD_FUNC_ARG;
+}
 
-        switch (ctx->cipherType) {
 
-            case AES_128_CBC_TYPE :
-            case AES_192_CBC_TYPE :
-            case AES_256_CBC_TYPE :
-                CYASSL_MSG("AES CBC");
-                return AES_BLOCK_SIZE;
+int wolfSSL_EVP_CIPHER_CTX_iv_length(const WOLFSSL_EVP_CIPHER_CTX* ctx)
+{
+    WOLFSSL_MSG("wolfSSL_EVP_CIPHER_CTX_iv_length");
 
-#ifdef CYASSL_AES_COUNTER
-            case AES_128_CTR_TYPE :
-            case AES_192_CTR_TYPE :
-            case AES_256_CTR_TYPE :
-                CYASSL_MSG("AES CTR");
-                return AES_BLOCK_SIZE;
+    switch (ctx->cipherType) {
+
+        case AES_128_CBC_TYPE :
+        case AES_192_CBC_TYPE :
+        case AES_256_CBC_TYPE :
+            WOLFSSL_MSG("AES CBC");
+            return AES_BLOCK_SIZE;
+
+#ifdef WOLFSSL_AES_COUNTER
+        case AES_128_CTR_TYPE :
+        case AES_192_CTR_TYPE :
+        case AES_256_CTR_TYPE :
+            WOLFSSL_MSG("AES CTR");
+            return AES_BLOCK_SIZE;
 #endif
 
-            case DES_CBC_TYPE :
-                CYASSL_MSG("DES CBC");
-                return DES_BLOCK_SIZE;
+        case DES_CBC_TYPE :
+            WOLFSSL_MSG("DES CBC");
+            return DES_BLOCK_SIZE;
 
-            case DES_EDE3_CBC_TYPE :
-                CYASSL_MSG("DES EDE3 CBC");
-                return DES_BLOCK_SIZE;
+        case DES_EDE3_CBC_TYPE :
+            WOLFSSL_MSG("DES EDE3 CBC");
+            return DES_BLOCK_SIZE;
 
-            case ARC4_TYPE :
-                CYASSL_MSG("ARC4");
-                return 0;
+        case ARC4_TYPE :
+            WOLFSSL_MSG("ARC4");
+            return 0;
 
-            case NULL_CIPHER_TYPE :
-                CYASSL_MSG("NULL");
-                return 0;
+        case NULL_CIPHER_TYPE :
+            WOLFSSL_MSG("NULL");
+            return 0;
 
-            default: {
-                CYASSL_MSG("bad type");
-            }
+        default: {
+            WOLFSSL_MSG("bad type");
         }
-        return 0;
     }
+    return 0;
+}
 
 
-    void CyaSSL_OPENSSL_free(void* p)
-    {
-        CYASSL_MSG("CyaSSL_OPENSSL_free");
+void wolfSSL_OPENSSL_free(void* p)
+{
+    WOLFSSL_MSG("wolfSSL_OPENSSL_free");
 
-        XFREE(p, NULL, 0);
-    }
+    XFREE(p, NULL, 0);
+}
 
 
-    int CyaSSL_PEM_write_bio_RSAPrivateKey(CYASSL_BIO* bio, RSA* rsa,
-                                         const EVP_CIPHER* cipher,
-                                         unsigned char* passwd, int len,
-                                         pem_password_cb cb, void* arg)
-    {
-        (void)bio;
-        (void)rsa;
-        (void)cipher;
-        (void)passwd;
-        (void)len;
-        (void)cb;
-        (void)arg;
+int wolfSSL_PEM_write_bio_RSAPrivateKey(WOLFSSL_BIO* bio, RSA* rsa,
+                                  const EVP_CIPHER* cipher,
+                                  unsigned char* passwd, int len,
+                                  pem_password_cb cb, void* arg)
+{
+    (void)bio;
+    (void)rsa;
+    (void)cipher;
+    (void)passwd;
+    (void)len;
+    (void)cb;
+    (void)arg;
 
-        CYASSL_MSG("CyaSSL_PEM_write_bio_RSAPrivateKey");
+    WOLFSSL_MSG("wolfSSL_PEM_write_bio_RSAPrivateKey");
 
-        return SSL_FATAL_ERROR;
-    }
+    return SSL_FATAL_ERROR;
+}
 
 
 
-    int CyaSSL_PEM_write_bio_DSAPrivateKey(CYASSL_BIO* bio, DSA* rsa,
-                                         const EVP_CIPHER* cipher,
-                                         unsigned char* passwd, int len,
-                                         pem_password_cb cb, void* arg)
-    {
-        (void)bio;
-        (void)rsa;
-        (void)cipher;
-        (void)passwd;
-        (void)len;
-        (void)cb;
-        (void)arg;
+int wolfSSL_PEM_write_bio_DSAPrivateKey(WOLFSSL_BIO* bio, DSA* rsa,
+                                  const EVP_CIPHER* cipher,
+                                  unsigned char* passwd, int len,
+                                  pem_password_cb cb, void* arg)
+{
+    (void)bio;
+    (void)rsa;
+    (void)cipher;
+    (void)passwd;
+    (void)len;
+    (void)cb;
+    (void)arg;
 
-        CYASSL_MSG("CyaSSL_PEM_write_bio_DSAPrivateKey");
+    WOLFSSL_MSG("wolfSSL_PEM_write_bio_DSAPrivateKey");
 
-        return SSL_FATAL_ERROR;
-    }
+    return SSL_FATAL_ERROR;
+}
 
 
 
-    CYASSL_EVP_PKEY* CyaSSL_PEM_read_bio_PrivateKey(CYASSL_BIO* bio,
-                        CYASSL_EVP_PKEY** key, pem_password_cb cb, void* arg)
-    {
-        (void)bio;
-        (void)key;
-        (void)cb;
-        (void)arg;
+WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PrivateKey(WOLFSSL_BIO* bio,
+                    WOLFSSL_EVP_PKEY** key, pem_password_cb cb, void* arg)
+{
+    (void)bio;
+    (void)key;
+    (void)cb;
+    (void)arg;
 
-        CYASSL_MSG("CyaSSL_PEM_read_bio_PrivateKey");
+    WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey");
 
-        return NULL;
-    }
+    return NULL;
+}
 
 
 
 #ifndef NO_RSA
 /* Load RSA from Der, SSL_SUCCESS on success < 0 on error */
-int CyaSSL_RSA_LoadDer(CYASSL_RSA* rsa, const unsigned char* der,  int derSz)
+int wolfSSL_RSA_LoadDer(WOLFSSL_RSA* rsa, const unsigned char* der,  int derSz)
 {
     word32 idx = 0;
     int    ret;
 
-    CYASSL_ENTER("CyaSSL_RSA_LoadDer");
+    WOLFSSL_ENTER("wolfSSL_RSA_LoadDer");
 
     if (rsa == NULL || rsa->internal == NULL || der == NULL || derSz <= 0) {
-        CYASSL_MSG("Bad function arguments");
+        WOLFSSL_MSG("Bad function arguments");
         return BAD_FUNC_ARG;
     }
 
-    ret = RsaPrivateKeyDecode(der, &idx, (RsaKey*)rsa->internal, derSz);
+    ret = wc_RsaPrivateKeyDecode(der, &idx, (RsaKey*)rsa->internal, derSz);
     if (ret < 0) {
-        CYASSL_MSG("RsaPrivateKeyDecode failed");
+        WOLFSSL_MSG("RsaPrivateKeyDecode failed");
         return ret;
     }
 
     if (SetRsaExternal(rsa) < 0) {
-        CYASSL_MSG("SetRsaExternal failed");
+        WOLFSSL_MSG("SetRsaExternal failed");
         return SSL_FATAL_ERROR;
     }
 
@@ -11289,26 +12574,26 @@ int CyaSSL_RSA_LoadDer(CYASSL_RSA* rsa, const unsigned char* der,  int derSz)
 
 #ifndef NO_DSA
 /* Load DSA from Der, SSL_SUCCESS on success < 0 on error */
-int CyaSSL_DSA_LoadDer(CYASSL_DSA* dsa, const unsigned char* der,  int derSz)
+int wolfSSL_DSA_LoadDer(WOLFSSL_DSA* dsa, const unsigned char* der,  int derSz)
 {
     word32 idx = 0;
     int    ret;
 
-    CYASSL_ENTER("CyaSSL_DSA_LoadDer");
+    WOLFSSL_ENTER("wolfSSL_DSA_LoadDer");
 
     if (dsa == NULL || dsa->internal == NULL || der == NULL || derSz <= 0) {
-        CYASSL_MSG("Bad function arguments");
+        WOLFSSL_MSG("Bad function arguments");
         return BAD_FUNC_ARG;
     }
 
     ret = DsaPrivateKeyDecode(der, &idx, (DsaKey*)dsa->internal, derSz);
     if (ret < 0) {
-        CYASSL_MSG("DsaPrivateKeyDecode failed");
+        WOLFSSL_MSG("DsaPrivateKeyDecode failed");
         return ret;
     }
 
     if (SetDsaExternal(dsa) < 0) {
-        CYASSL_MSG("SetDsaExternal failed");
+        WOLFSSL_MSG("SetDsaExternal failed");
         return SSL_FATAL_ERROR;
     }
 
@@ -11328,9 +12613,9 @@ int CyaSSL_DSA_LoadDer(CYASSL_DSA* dsa, const unsigned char* der,  int derSz)
 
 
 /* Get peer's certificate chain */
-CYASSL_X509_CHAIN* CyaSSL_get_peer_chain(CYASSL* ssl)
+WOLFSSL_X509_CHAIN* wolfSSL_get_peer_chain(WOLFSSL* ssl)
 {
-    CYASSL_ENTER("CyaSSL_get_peer_chain");
+    WOLFSSL_ENTER("wolfSSL_get_peer_chain");
     if (ssl)
         return &ssl->session.chain;
 
@@ -11339,9 +12624,9 @@ CYASSL_X509_CHAIN* CyaSSL_get_peer_chain(CYASSL* ssl)
 
 
 /* Get peer's certificate chain total count */
-int CyaSSL_get_chain_count(CYASSL_X509_CHAIN* chain)
+int wolfSSL_get_chain_count(WOLFSSL_X509_CHAIN* chain)
 {
-    CYASSL_ENTER("CyaSSL_get_chain_count");
+    WOLFSSL_ENTER("wolfSSL_get_chain_count");
     if (chain)
         return chain->count;
 
@@ -11350,9 +12635,9 @@ int CyaSSL_get_chain_count(CYASSL_X509_CHAIN* chain)
 
 
 /* Get peer's ASN.1 DER ceritifcate at index (idx) length in bytes */
-int CyaSSL_get_chain_length(CYASSL_X509_CHAIN* chain, int idx)
+int wolfSSL_get_chain_length(WOLFSSL_X509_CHAIN* chain, int idx)
 {
-    CYASSL_ENTER("CyaSSL_get_chain_length");
+    WOLFSSL_ENTER("wolfSSL_get_chain_length");
     if (chain)
         return chain->certs[idx].length;
 
@@ -11361,9 +12646,9 @@ int CyaSSL_get_chain_length(CYASSL_X509_CHAIN* chain, int idx)
 
 
 /* Get peer's ASN.1 DER ceritifcate at index (idx) */
-byte* CyaSSL_get_chain_cert(CYASSL_X509_CHAIN* chain, int idx)
+byte* wolfSSL_get_chain_cert(WOLFSSL_X509_CHAIN* chain, int idx)
 {
-    CYASSL_ENTER("CyaSSL_get_chain_cert");
+    WOLFSSL_ENTER("wolfSSL_get_chain_cert");
     if (chain)
         return chain->certs[idx].buffer;
 
@@ -11371,41 +12656,53 @@ byte* CyaSSL_get_chain_cert(CYASSL_X509_CHAIN* chain, int idx)
 }
 
 
-/* Get peer's CyaSSL X509 ceritifcate at index (idx) */
-CYASSL_X509* CyaSSL_get_chain_X509(CYASSL_X509_CHAIN* chain, int idx)
+/* Get peer's wolfSSL X509 ceritifcate at index (idx) */
+WOLFSSL_X509* wolfSSL_get_chain_X509(WOLFSSL_X509_CHAIN* chain, int idx)
 {
     int          ret;
-    CYASSL_X509* x509;
-    DecodedCert  dCert;
+    WOLFSSL_X509* x509 = NULL;
+#ifdef WOLFSSL_SMALL_STACK
+    DecodedCert* cert = NULL;
+#else
+    DecodedCert  cert[1];
+#endif
 
-    CYASSL_ENTER("CyaSSL_get_chain_X509");
-    if (chain == NULL)
-        return NULL;
+    WOLFSSL_ENTER("wolfSSL_get_chain_X509");
+    if (chain != NULL) {
+    #ifdef WOLFSSL_SMALL_STACK
+        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
+                                                       DYNAMIC_TYPE_TMP_BUFFER);
+        if (cert != NULL)
+    #endif
+        {
+            InitDecodedCert(cert, chain->certs[idx].buffer,
+                                  chain->certs[idx].length, NULL);
 
-    InitDecodedCert(&dCert, chain->certs[idx].buffer, chain->certs[idx].length,
-                    NULL);
-    ret = ParseCertRelative(&dCert, CERT_TYPE, 0, NULL);
-    if (ret != 0) {
-        CYASSL_MSG("Failed to parse cert");
-        FreeDecodedCert(&dCert);
-        return NULL;
-    }
+            if ((ret = ParseCertRelative(cert, CERT_TYPE, 0, NULL)) != 0)
+                WOLFSSL_MSG("Failed to parse cert");
+            else {
+                x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
+                                                             DYNAMIC_TYPE_X509);
+                if (x509 == NULL) {
+                    WOLFSSL_MSG("Failed alloc X509");
+                }
+                else {
+                    InitX509(x509, 1);
 
-    x509 = (CYASSL_X509*)XMALLOC(sizeof(CYASSL_X509), NULL, DYNAMIC_TYPE_X509);
-    if (x509 == NULL) {
-        CYASSL_MSG("Failed alloc X509");
-        FreeDecodedCert(&dCert);
-        return NULL;
-    }
-    InitX509(x509, 1);
+                    if ((ret = CopyDecodedToX509(x509, cert)) != 0) {
+                        WOLFSSL_MSG("Failed to copy decoded");
+                        XFREE(x509, NULL, DYNAMIC_TYPE_X509);
+                        x509 = NULL;
+                    }
+                }
+            }
 
-    ret = CopyDecodedToX509(x509, &dCert);
-    if (ret != 0) {
-        CYASSL_MSG("Failed to copy decoded");
-        XFREE(x509, NULL, DYNAMIC_TYPE_X509);
-        x509 = NULL;
+            FreeDecodedCert(cert);
+        #ifdef WOLFSSL_SMALL_STACK
+            XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER);
+        #endif
+        }
     }
-    FreeDecodedCert(&dCert);
 
     return x509;
 }
@@ -11414,7 +12711,7 @@ CYASSL_X509* CyaSSL_get_chain_X509(CYASSL_X509_CHAIN* chain, int idx)
 /* Get peer's PEM ceritifcate at index (idx), output to buffer if inLen big
    enough else return error (-1), output length is in *outLen
    SSL_SUCCESS on ok */
-int  CyaSSL_get_chain_cert_pem(CYASSL_X509_CHAIN* chain, int idx,
+int  wolfSSL_get_chain_cert_pem(WOLFSSL_X509_CHAIN* chain, int idx,
                                unsigned char* buf, int inLen, int* outLen)
 {
     const char header[] = "-----BEGIN CERTIFICATE-----\n";
@@ -11425,7 +12722,7 @@ int  CyaSSL_get_chain_cert_pem(CYASSL_X509_CHAIN* chain, int idx,
     int i;
     int err;
 
-    CYASSL_ENTER("CyaSSL_get_chain_cert_pem");
+    WOLFSSL_ENTER("wolfSSL_get_chain_cert_pem");
     if (!chain || !outLen || !buf)
         return BAD_FUNC_ARG;
 
@@ -11455,9 +12752,9 @@ int  CyaSSL_get_chain_cert_pem(CYASSL_X509_CHAIN* chain, int idx,
 
 
 /* get session ID */
-const byte* CyaSSL_get_sessionID(const CYASSL_SESSION* session)
+const byte* wolfSSL_get_sessionID(const WOLFSSL_SESSION* session)
 {
-    CYASSL_ENTER("CyaSSL_get_sessionID");
+    WOLFSSL_ENTER("wolfSSL_get_sessionID");
     if (session)
         return session->sessionID;
 
@@ -11467,27 +12764,36 @@ const byte* CyaSSL_get_sessionID(const CYASSL_SESSION* session)
 
 #endif /* SESSION_CERTS */
 
+#ifdef HAVE_FUZZER
+void wolfSSL_SetFuzzerCb(WOLFSSL* ssl, CallbackFuzzer cbf, void* fCtx)
+{
+    if (ssl) {
+        ssl->fuzzerCb  = cbf;
+        ssl->fuzzerCtx = fCtx;
+    }
+}
+#endif
 
 #ifndef NO_CERTS
 #ifdef  HAVE_PK_CALLBACKS
 
 #ifdef HAVE_ECC
 
-void  CyaSSL_CTX_SetEccSignCb(CYASSL_CTX* ctx, CallbackEccSign cb)
+void  wolfSSL_CTX_SetEccSignCb(WOLFSSL_CTX* ctx, CallbackEccSign cb)
 {
     if (ctx)
         ctx->EccSignCb = cb;
 }
 
 
-void  CyaSSL_SetEccSignCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetEccSignCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->EccSignCtx = ctx;
 }
 
 
-void* CyaSSL_GetEccSignCtx(CYASSL* ssl)
+void* wolfSSL_GetEccSignCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->EccSignCtx;
@@ -11496,21 +12802,21 @@ void* CyaSSL_GetEccSignCtx(CYASSL* ssl)
 }
 
 
-void  CyaSSL_CTX_SetEccVerifyCb(CYASSL_CTX* ctx, CallbackEccVerify cb)
+void  wolfSSL_CTX_SetEccVerifyCb(WOLFSSL_CTX* ctx, CallbackEccVerify cb)
 {
     if (ctx)
         ctx->EccVerifyCb = cb;
 }
 
 
-void  CyaSSL_SetEccVerifyCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetEccVerifyCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->EccVerifyCtx = ctx;
 }
 
 
-void* CyaSSL_GetEccVerifyCtx(CYASSL* ssl)
+void* wolfSSL_GetEccVerifyCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->EccVerifyCtx;
@@ -11522,21 +12828,21 @@ void* CyaSSL_GetEccVerifyCtx(CYASSL* ssl)
 
 #ifndef NO_RSA
 
-void  CyaSSL_CTX_SetRsaSignCb(CYASSL_CTX* ctx, CallbackRsaSign cb)
+void  wolfSSL_CTX_SetRsaSignCb(WOLFSSL_CTX* ctx, CallbackRsaSign cb)
 {
     if (ctx)
         ctx->RsaSignCb = cb;
 }
 
 
-void  CyaSSL_SetRsaSignCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetRsaSignCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->RsaSignCtx = ctx;
 }
 
 
-void* CyaSSL_GetRsaSignCtx(CYASSL* ssl)
+void* wolfSSL_GetRsaSignCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->RsaSignCtx;
@@ -11545,21 +12851,21 @@ void* CyaSSL_GetRsaSignCtx(CYASSL* ssl)
 }
 
 
-void  CyaSSL_CTX_SetRsaVerifyCb(CYASSL_CTX* ctx, CallbackRsaVerify cb)
+void  wolfSSL_CTX_SetRsaVerifyCb(WOLFSSL_CTX* ctx, CallbackRsaVerify cb)
 {
     if (ctx)
         ctx->RsaVerifyCb = cb;
 }
 
 
-void  CyaSSL_SetRsaVerifyCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetRsaVerifyCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->RsaVerifyCtx = ctx;
 }
 
 
-void* CyaSSL_GetRsaVerifyCtx(CYASSL* ssl)
+void* wolfSSL_GetRsaVerifyCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->RsaVerifyCtx;
@@ -11567,21 +12873,21 @@ void* CyaSSL_GetRsaVerifyCtx(CYASSL* ssl)
     return NULL;
 }
 
-void  CyaSSL_CTX_SetRsaEncCb(CYASSL_CTX* ctx, CallbackRsaEnc cb)
+void  wolfSSL_CTX_SetRsaEncCb(WOLFSSL_CTX* ctx, CallbackRsaEnc cb)
 {
     if (ctx)
         ctx->RsaEncCb = cb;
 }
 
 
-void  CyaSSL_SetRsaEncCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetRsaEncCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->RsaEncCtx = ctx;
 }
 
 
-void* CyaSSL_GetRsaEncCtx(CYASSL* ssl)
+void* wolfSSL_GetRsaEncCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->RsaEncCtx;
@@ -11589,21 +12895,21 @@ void* CyaSSL_GetRsaEncCtx(CYASSL* ssl)
     return NULL;
 }
 
-void  CyaSSL_CTX_SetRsaDecCb(CYASSL_CTX* ctx, CallbackRsaDec cb)
+void  wolfSSL_CTX_SetRsaDecCb(WOLFSSL_CTX* ctx, CallbackRsaDec cb)
 {
     if (ctx)
         ctx->RsaDecCb = cb;
 }
 
 
-void  CyaSSL_SetRsaDecCtx(CYASSL* ssl, void *ctx)
+void  wolfSSL_SetRsaDecCtx(WOLFSSL* ssl, void *ctx)
 {
     if (ssl)
         ssl->RsaDecCtx = ctx;
 }
 
 
-void* CyaSSL_GetRsaDecCtx(CYASSL* ssl)
+void* wolfSSL_GetRsaDecCtx(WOLFSSL* ssl)
 {
     if (ssl)
         return ssl->RsaDecCtx;
@@ -11618,14 +12924,14 @@ void* CyaSSL_GetRsaDecCtx(CYASSL* ssl)
 #endif /* NO_CERTS */
 
 
-#ifdef CYASSL_HAVE_WOLFSCEP
+#ifdef WOLFSSL_HAVE_WOLFSCEP
     /* Used by autoconf to see if wolfSCEP is available */
-    void CyaSSL_wolfSCEP(void) {}
+    void wolfSSL_wolfSCEP(void) {}
 #endif
 
 
-#ifdef CYASSL_HAVE_CERT_SERVICE
+#ifdef WOLFSSL_HAVE_CERT_SERVICE
     /* Used by autoconf to see if cert service is available */
-    void CyaSSL_cert_service(void) {}
+    void wolfSSL_cert_service(void) {}
 #endif