MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50K on disk with cipher suites. It includes SSL and TLS client and server support, session resumption, and implementations of RSA, AES, 3DES, ARC4, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.
|Tags||Communications Internet Web HTTP Servers Security Cryptography Software Development Embedded Systems Libraries Networking SSL TLS|
|Operating Systems||Windows OS Independent POSIX Linux Other Unix Mac OS X FreeRTOS iOS Bare Metal or Native|
Release Notes: Client certificate authentication was enabled in the GPL release. Certificate Revocation List (CRL) support was added. Assembly language optimizations were made for x86, x86_64, ARM, and MIPS. Countermeasures were provided for the Lucky Thirteen CBC padding attack. Maximum Fragment Length extension support was added. There were additional minor enhancements and fixes.
Release Notes: This release throttles TLS re-handshakes on the server side to minimize the effect of potential denial of service due to repeated requests, rebrands the documentation and source code to reflect the AuthenTec acquisition of MatrixSSL, and adds Chrome False Start support to the example Web server application.
Release Notes: This release adds TLS 1.1 security protocol support for the client and server to enhance block cipher security using a per-record explicit IV. It adds PKCS#8 parsing for newer format public key certificates. Library users can parameterize incoming and outgoing buffer sizes and are notified of zero-length SSL records. A new matrixSslEncodeToOutdata() API to encode directly into an existing TCP/IP buffer for low footprint memory usage.
Release Notes: iPhone OS support and a sample Xcode project were added. Server support was added for Google Chrome False Start additions to the TLS protocol for increased handshake performance. Size/speed tradeoffs are now configurable during compile time. Active cipher suites can now be modified at runtime via a new API. The code was updated to support Luminary Micro/TI Stellaris ARM Cortex-M3 secure Web server examples.
Release Notes: A server-side configuration option was added to decrease binary executable size with simpler X.509 parsing. The Yarrow PRNG algorithm is included for strong entropy processing. Non-ASCII X.509 attributes are supported in certificates. Project files for Windows were updated to VS Express 2010. The return code was clarified for the matrixSslReceivedData() API.