Release Notes: Full support for the recently published TLS Renegotiation Indication Extension (RFC 5746). MatrixSSL enabled clients and servers now support the "renegotiation_info" extension and the TLS_EMPTY_RENEGOTIATION_INFO_SCSV signaling cipher suite to prevent any possibility of the "plaintext injection attack" that was disclosed November 2009 and described in CVE-2009-3555. Support for adding extensions to CLIENT_HELLO messages (RFC 3546) is now included in the open source version of MatrixSSL.
Release Notes: TLS 1.2 client and server. ECC, DH, and ephemeral key exchange. Pre-Shared Key (PSK), AES-GCM, SEED, and IDEA ciphers. SHA2 (256, 384, and 512 bit) hashes and HMAC. Server Name Indication (SNI), Stateless Session Ticket, and Truncated HMAC extensions. Intel assembly and AES-NI acceleration. These features have been open sourced from the commercial product branch. Only SSH and DTLS remain commercial. Security fixes: certificate parsing is much more strict, and several length underflow issues were fixed as a result of multiple external code audits.
Release Notes: Client certificate authentication was enabled in the GPL release. Certificate Revocation List (CRL) support was added. Assembly language optimizations were made for x86, x86_64, ARM, and MIPS. Countermeasures were provided for the Lucky Thirteen CBC padding attack. Maximum Fragment Length extension support was added. There were additional minor enhancements and fixes.
Release Notes: This release throttles TLS re-handshakes on the server side to minimize the effect of potential denial of service due to repeated requests, rebrands the documentation and source code to reflect the AuthenTec acquisition of MatrixSSL, and adds Chrome False Start support to the example Web server application.
Release Notes: This release adds TLS 1.1 security protocol support for the client and server to enhance block cipher security using a per-record explicit IV. It adds PKCS#8 parsing for newer format public key certificates. Library users can parameterize incoming and outgoing buffer sizes and are notified of zero-length SSL records. A new matrixSslEncodeToOutdata() API to encode directly into an existing TCP/IP buffer for low footprint memory usage.
Release Notes: iPhone OS support and a sample Xcode project were added. Server support was added for Google Chrome False Start additions to the TLS protocol for increased handshake performance. Size/speed tradeoffs are now configurable during compile time. Active cipher suites can now be modified at runtime via a new API. The code was updated to support Luminary Micro/TI Stellaris ARM Cortex-M3 secure Web server examples.