MatrixSSL
MatrixSSL is an TLS/SSL implementation designed for custom applications in embedded hardware environments.[3][4] The MatrixSSL library contains a full cryptographic software module that includes industry-standard public key and symmetric key algorithms.
Features
Features:[5]
- Protocol versions
- Public key algorithms
- Symmetric key algorithms
- Supported cipher suites
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
- TLS_RSA_WITH_SEED_CBC_SHA
- TLS_DHE_PSK_WITH_AES_128_CBC_SHA
- TLS_DHE_PSK_WITH_AES_256_CBC_SHA
- TLS_PSK_WITH_AES_128_CBC_SHA
- TLS_PSK_WITH_AES_256_CBC_SHA
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_CBC_SHA256
- TLS_RSA_WITH_AES_256_CBC_SHA256
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- SSL_RSA_WITH_3DES_EDE_CBC_SHA
- SSL_RSA_WITH_RC4_128_SHA
- SSL_RSA_WITH_RC4_128_MD5
- TLS_DH_anon_WITH_AES_128_CBC_SHA
- TLS_DH_anon_WITH_AES_256_CBC_SHA
- SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
- SSL_DH_anon_WITH_RC4_128_MD5
- Client authentication
- Secure Renegotiation
- Standard Session Resumption
- Stateless Session Resumption
- Transport independent
- PKCS#1 and PKCS#8 key parsing
- False Start
- Max Fragment Length extension
- Optional PKCS#11 Crypto Interface
Major Releases
Version[6] | Date |
3.7.2b | Jul 2015 |
3.7.1 | Dec 2014 |
3.6.2 | Sep 2014 |
3.6.1 | Apr 2014 |
3.6 | Apr 2014 |
3.4.2 | Sep 2013 |
3.4.1 | Feb 2013 |
3.4 | Jan 2013 |
3.3.1 | Jul 2012 |
3.3 | Feb 2012 |
3.2.2 | Oct 2011 |
3.2 | Jun 2011 |
3.1 | Mar 2010 |
3.0 | Aug 2009 |
2.2 | Jan 2008 |
2.1 | Nov 2005 |
1.7 | Apr 2005 |
1.1 | May 2004 |
1.0 | Jan 2004 |
See also
External links
References
|
---|
| Protocols and technologies | |
---|
| Public-key infrastructure | |
---|
| See also | |
---|
| History | |
---|
| Implementations | |
---|
| Notaries | |
---|
| Vulnerabilities | Theory | |
---|
| Cipher | |
---|
| Protocol | |
---|
| Implementation | |
---|
|
---|
|