Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Comparison of TLS implementations

From Wikipedia, the free encyclopedia

This article is about TLS libraries comparison. For cryptographic libraries comparison, seeComparison of cryptography libraries.
"Secure Transport" redirects here. For the transportation of valuables, seeArmored car (valuables).

TheTransport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. Thiscomparison of TLS implementations compares several of the most notablelibraries. There are several TLS implementations which arefree software andopen source.

All comparison categories use the stable version of each implementation listed in the overview section. The comparison is limited to features that directly relate to the TLS protocol.

Overview

[edit]
ImplementationDeveloped byOpen sourceSoftware licenseCopyright holderWritten inLatest stable version, release dateOrigin
BotanJack LloydYesSimplified BSD LicenseJack LloydC++3.8.1 (May 7, 2025; 6 months ago (2025-05-07)[1]) [±]US (Vermont)
BoringSSLGoogleYesOpenSSL-SSLeay dual-license,ISC licenseEric Young, Tim Hudson, Sun, OpenSSL project, Google, and othersC,C++,Go,assemblyNo stable releases[2]Australia/EU[citation needed]
Bouncy CastleThe Legion of the Bouncy Castle Inc.YesMIT LicenseLegion of the Bouncy Castle Inc.Java,C#
Java1.81 / June 4, 2025; 5 months ago (2025-06-04)[3]
Java LTSBC-LJA 2.73.7 / November 8, 2024; 12 months ago (2024-11-08)[4]
Java FIPSBC-FJA 2.0.0 / July 30, 2024; 15 months ago (2024-07-30)[5]
C#2.6.1 / May 22, 2025; 6 months ago (2025-05-22)[6]
C# FIPSBC-FNA 1.0.2 / March 11, 2024; 20 months ago (2024-03-11)[7]
Australia
BSAFEDell, formerlyRSA SecurityNoProprietaryDellJava,C,assemblySSL-J 6.6 (July 2, 2024; 16 months ago (2024-07-02)[8]) [±]

SSL-J 7.3.1 (October 7, 2024; 13 months ago (2024-10-07)[9]) [±]
Micro Edition Suite 5.0.3 (December 3, 2024; 11 months ago (2024-12-03)[10]) [±]

Australia
cryptlibPeter GutmannYesSleepycat License and commercial licensePeter GutmannC3.4.8 (April 30, 2025; 6 months ago (2025-04-30)[11]) [±]NZ
GnuTLSGnuTLS projectYesLGPL-2.1-or-laterFree Software FoundationC3.8.11[12] Edit this on Wikidata 2025-11-20EU (Greece and Sweden)
Java Secure Socket Extension (JSSE)OracleYesGNU GPLv2 and commercial licenseOracleJava

25LTS (September 16, 2025; 2 months ago (2025-09-16)[13]) [±]
21.0.5 LTS (October 15, 2024; 13 months ago (2024-10-15)[14]) [±]
17.0.13 LTS (October 15, 2024; 13 months ago (2024-10-15)[15]) [±]
11.0.25 LTS (October 15, 2024; 13 months ago (2024-10-15)[16]) [±]
8u431 LTS (October 15, 2024; 13 months ago (2024-10-15)[17]) [±]

US
LibreSSLOpenBSD ProjectYesApache-1.0,BSD-4-Clause,ISC, andpublic domainEric Young, Tim Hudson, Sun, OpenSSL project, OpenBSD Project, and othersC,assembly4.2.1[18] Edit this on Wikidata 2025-10-31Canada
MatrixSSL[19]PeerSec NetworksYesGNU GPLv2+ and commercial licensePeerSec NetworksC4.2.2 (September 11, 2019; 6 years ago (2019-09-11)[20]) [±]US
Mbed TLS (previously PolarSSL)ArmYesApache License 2.0,GNU GPLv2+ and commercial licenseArm HoldingsC4.0.0[21]Edit this on Wikidata (15 October 2025; 40 days ago (15 October 2025)) [±]EU (Netherlands)
Network Security Services (NSS)Mozilla,AOL,Red Hat,Sun,Oracle,Google and othersYesMPL 2.0NSS contributorsC,assembly
Standard3.84 / October 12, 2022; 3 years ago (2022-10-12)[22]
Extended Support Release3.79.1 / August 18, 2022; 3 years ago (2022-08-18)[22]
US
OpenSSLOpenSSL projectYesApache-2.0[a]Eric Young, Tim Hudson, Sun, OpenSSL project, and othersC,assembly3.6.0[23] Edit this on Wikidata 2025-10-01Australia/EU
RustlsJoe Birr-Pixton, Dirkjan Ochtman, Daniel McCarney, Josh Aas, and open source contributorsYesApache-2.0,MIT License andISCOpen source contributorsRustv0.23.31 (July 29, 2025; 3 months ago (2025-07-29)[24]) [±]United Kingdom
s2nAmazonYesApache License 2.0,GNU GPLv2+ and commercial licenseAmazon.com, Inc.CContinuousUS
SchannelMicrosoftNoProprietaryMicrosoft CorporationWindows 11, 2021-10-05US
Secure TransportApple Inc.YesAPSL 2.0Apple Inc.57337.20.44 (OS X 10.11.2), 2015-12-08US
wolfSSL (previously CyaSSL)wolfSSL[25]YesGNU GPLv3+ and commercial licensewolfSSL Inc.[26]C,assembly5.8.4 (November 20, 2025; 4 days ago (2025-11-20)[27]) [±]US
Erlang/OTP SSL applicationEricssonYesApache License 2.0EricssonErlangOTP-21, 2018-06-19Sweden
ImplementationDeveloped byOpen sourceSoftware licenseCopyright ownerWritten inLatest stable version, release dateOrigin
  1. ^Apache-2.0 for OpenSSL 3.0 and later releases.OpenSSL-SSLeay dual-license for any release before OpenSSL 3.0.

TLS/SSL protocol version support

[edit]

Several versions of the TLS protocol exist. SSL 2.0 is a deprecated[28] protocol version with significant weaknesses. SSL 3.0 (1996) and TLS 1.0 (1999) are successors with two weaknesses in CBC-padding that were explained in 2001 by Serge Vaudenay.[29] TLS 1.1 (2006) fixed only one of the problems, by switching to randominitialization vectors (IV) for CBC block ciphers, whereas the more problematic use of mac-pad-encrypt instead of the secure pad-mac-encrypt was addressed with RFC 7366.[30] A workaround for SSL 3.0 and TLS 1.0, roughly equivalent to random IVs from TLS 1.1, was widely adopted by many implementations in late 2011.[31] In 2014, thePOODLE vulnerability of SSL 3.0 was discovered, which takes advantage of the known vulnerabilities in CBC, and an insecure fallback negotiation used in browsers.[32]

TLS 1.2 (2008) introduced a means to identify the hash used for digital signatures. While permitting the use of stronger hash functions for digital signatures in the future (rsa,sha256/sha384/sha512) over the SSL 3.0 conservative choice (rsa,sha1+md5), the TLS 1.2 protocol change inadvertently and substantially weakened the default digital signatures and provides (rsa,sha1) and even (rsa,md5).[33]

Datagram Transport Layer Security (DTLS or Datagram TLS) 1.0 is a modification of TLS 1.1 for a packet-oriented transport layer, where packet loss and packet reordering have to be tolerated. The revision DTLS 1.2 based on TLS 1.2 was published in January 2012.[34]

TLS 1.3 (2018) specified in RFC 8446 includes major optimizations and security improvements. QUIC (2021) specified in RFC 9000 and DTLS 1.3 (2022) specified in RFC 9147 builds on TLS 1.3. The publishing of TLS 1.3 and DTLS 1.3 obsoleted TLS 1.2 and DTLS 1.2.

Note that there are known vulnerabilities in SSL 2.0 and SSL 3.0. In 2021, IETF published RFC 8996 also forbidding negotiation of TLS 1.0, TLS 1.1, and DTLS 1.0 due to known vulnerabilities. NIST SP 800-52 requires support of TLS 1.3 by January 2024. Support of TLS 1.3 means that two compliant nodes will never negotiate TLS 1.2.

ImplementationSSL 2.0 (insecure)[35]SSL 3.0 (insecure)[36]TLS 1.0 (deprecated)[37]TLS 1.1 (deprecated)[38]TLS 1.2[39]TLS 1.3DTLS 1.0 (deprecated)[40]DTLS 1.2[34]DTLS 1.3
BotanNoNo[41]NoNoYesYesNoYesNo
BoringSSLYesYesYesYesYesYesNo
Bouncy CastleNoNoYesYesYesYesYesYesNo
BSAFE SSL-J[42]NoDisabled by defaultNo[a]No[a]YesYesNoNoNo
cryptlibNoNoYesYesYesYesNoNoNo
GnuTLSNo[b]Disabled by default[43]YesYesYesYes[44]YesYesNo
JSSENo[b]Disabled by default[45]Disabled by default[46]Disabled by default[46]YesYesYesYesNo
LibreSSLNo[47]No[48]YesYesYesYesYesYes[49]No
MatrixSSLNoDisabled by default at compile time[50]YesYesYesYesYesYesNo
Mbed TLSNoNo[51]No[51]No[51]YesYes
(experimental)
Yes[52]Yes[52]No
NSSNo[c]Disabled by default[53]YesYes[54]Yes[55]Yes[56]Yes[54]Yes[57]No
OpenSSLNo[58]Disabled by defaultYesYes[59]Yes[59]YesYesYes[60]No
RustlsNo[61]No[61]No[61]No[61]Yes[61]Yes[61]NoNoNo
s2n[62]NoDisabled by defaultYesYesYesYesNoNoNo
Schannel XP, 2003[63]Disabled by default in MSIE 7Enabled by defaultEnabled by default in MSIE 7NoNoNoNoNoNo
Schannel Vista[64]Disabled by defaultEnabled by defaultYesNoNoNoNoNoNo
Schannel 2008[64]Disabled by defaultEnabled by defaultYesDisabled by default (KB4019276)Disabled by default (KB4019276)NoNoNoNo
Schannel 7, 2008R2[65]Disabled by defaultDisabled by default in MSIE 11YesEnabled by default in MSIE 11Enabled by default in MSIE 11NoYes[66]No[66]No
Schannel 8, 2012[65]Disabled by defaultEnabled by defaultYesDisabled by defaultDisabled by defaultNoYesNoNo
Schannel 8.1, 2012R2, 10 RTM & v1511[65]Disabled by defaultDisabled by default in MSIE 11YesYesYesNoYesNoNo
Schannel 10 v1607 / 2016[67]NoDisabled by defaultYesYesYesNoYesYesNo
Schannel 11 / 2022[68]NoDisabled by defaultYesYesYesYesYesYesNo
Secure Transport

OS X 10.2–10.7, iOS 1–4

YesYesYesNoNoNoNoNo
Secure Transport OS X 10.8–10.10, iOS 5–8No[d]YesYesYes[d]Yes[d]Yes[d]NoNo
Secure Transport OS X 10.11, iOS 9NoNo[d]YesYesYesYesUnknownNo
Secure Transport OS X 10.13, iOS 11NoNo[d]YesYesYesYes
(draft version)[69]
YesUnknownNo
wolfSSLNoDisabled by default[70]Disabled by default[71]YesYesYesYesYesYes
Erlang/OTP SSL application[72]No[e]No[f]Disabled by default[e]Disabled by default[e]YesPartially[g]Disabled by default[e]YesNo
ImplementationSSL 2.0 (insecure)[35]SSL 3.0 (insecure)[36]TLS 1.0 (deprecated)[37]TLS 1.1 (deprecated)[38]TLS 1.2[39]TLS 1.3DTLS 1.0 (deprecated)[40]DTLS 1.2[34]DTLS 1.3
  1. ^abAs of SSL-J 7.0, support for TLS 1.0 and 1.1 has been removed
  2. ^abSSL 2.0 client hello is supported for backward compatibility reasons even though SSL 2.0 is not supported.
  3. ^Server-side implementation of the SSL/TLS protocol still supports processing of received v2-compatible client hello messages."NSS 3.24 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2016-08-26. Retrieved2016-06-19.
  4. ^abcdefSecure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues".iOS Developer Library. Apple Inc. Retrieved2012-05-03.
  5. ^abcdSince OTP 22
  6. ^Since OTP 23
  7. ^"Erlang OTP SSL application TLS 1.3 compliance table".

NSA Suite B Cryptography

[edit]

Required components forNSA Suite B Cryptography (RFC 6460) are:

Per CNSSP-15, the 256-bit elliptic curve (specified in FIPS 186-2), SHA-256, and AES with 128-bit keys are sufficient for protecting classified information up to theSecret level, while the 384-bit elliptic curve (specified in FIPS 186-2), SHA-384, and AES with 256-bit keys are necessary for the protection ofTop Secret information.

ImplementationTLS 1.2Suite B
BotanYes
Bouncy CastleYes
BSAFEYes[42]
cryptlibYes
GnuTLSYes
JSSEYes[73]
LibreSSLYes
MatrixSSLYes
Mbed TLSYes
NSSNo[74]
OpenSSLYes[60]
RustlsYes[61]
S2n
SchannelYes[75]
Secure TransportNo
wolfSSLYes
ImplementationTLS 1.2 Suite B

Certifications

[edit]

Note that certain certifications have received serious negative criticism from people who are actually involved in them.[76]

ImplementationFIPS 140-1,FIPS 140-2[77]FIPS 140-3
Level 1Level 2[disputeddiscuss]Level 1
Botan[78]
Bouncy CastleBC-FJA 2.0.0 (#4743)
BC-FJA 2.1.0 (#4943)
BC-FNA 1.0.2 (#4416
BSAFE SSL-J[79]Crypto-J 6.0 (1785,1786)
Crypto-J 6.1 / 6.1.1.0.1 (2057,2058)
Crypto-J 6.2 / 6.2.1.1 (2468,2469)
Crypto-J 6.2.4 (3172,3184)
Crypto-J 6.2.5 (#3819,#3820)
Crypto-J 6.3 (#4696,#4697)
Crypto-J 7.0 (4892)
cryptlib[80]
GnuTLS[81]Red Hat Enterprise Linux GnuTLS Cryptographic Module (#2780)
JSSE
LibreSSL[47]no support
MatrixSSL[82]SafeZone FIPS Cryptographic Module: 1.1 (#2389)
Mbed TLS[83]
NSS[84]Network Security Services: 3.2.2 (#247)
Network Security Services Cryptographic Module: 3.11.4 (#815), 3.12.4 (#1278), 3.12.9.1 (#1837)
Netscape Security Module: 1 (#7[notes 1]), 1.01 (#47[notes 2])
Network Security Services: 3.2.2 (#248[notes 3])
Network Security Services Cryptographic Module: 3.11.4 (#814[notes 4]), 3.12.4 (#1279, #1280[notes 5])
OpenSSL[85]OpenSSL FIPS Object Module: 1.0 (#624), 1.1.1 (#733), 1.1.2 (#918), 1.2, 1.2.1, 1.2.2, 1.2.3 or 1.2.4 (#1051)
2.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7 or 2.0.8 (#1747)
Rustlsaws-lc FIPS module[86] (#4759)
Schannel[87]Cryptographic modules in Windows NT 4.0, 95, 95, 2000, XP, Server 2003, CE 5, CE 6, Mobile 6.x, Vista, Server 2008, 7, Server 2008 R2, 8, Server 2012, RT, Surface, Phone 8
See details onMicrosoft FIPS 140 Validated Cryptographic Modules
Secure TransportApple FIPS Cryptographic Module: 1.0 (OS X 10.6, #1514), 1.1 (OS X 10.7, #1701)
Apple OS X CoreCrypto Module; CoreCrypto Kernel Module: 3.0 (OS X 10.8, #1964, #1956), 4.0 (OS X 10.9, #2015, #2016)
Apple iOS CoreCrypto Module; CoreCrypto Kernel Module: 3.0 (iOS 6, #1963, #1944), 4.0 (iOS 7, #2020, #2021)
wolfSSL[88]wolfCrypt FIPS Module: 4.0 (#3389)
See details onNIST certificate for validated Operating Environments
wolfCrypt FIPS Module: 3.6.0 (#2425)
See details onNIST certificate for validated Operating Environments
wolfCrypt FIPS Module (#4178)
See details onNIST certificate
ImplementationLevel 1Level 2Level 1
FIPS 140-1, FIPS 140-2FIPS 140-3
  1. ^with SunSparc 5 w/ SunSolaris v 2.4SE (ITSEC-rated)
  2. ^with SunUltra-5 w/ SunTrusted Solaris version 2.5.1 (ITSEC-rated)
  3. ^withSolaris v8.0 withAdminSuite 3.0.1 as specified in UK IT SEC CC Report No. P148 EAL4 on a SUNSPARCUltra-1
  4. ^with these platforms;Red Hat Enterprise Linux Version 4 Update 1 AS onIBM xSeries 336 with Intel Xeon CPU,Trusted Solaris 8 4/01 onSun Blade 2500 Workstation withUltraSPARC IIIi CPU
  5. ^with these platforms;Red Hat Enterprise Linux v5 running on anIBM System x3550,Red Hat Enterprise Linux v5 running on anHP ProLiant DL145, SunSolaris 10 5/08 running on a SunSunBlade 2000 workstation, SunSolaris 10 5/08 running on aSun W2100z workstation

Key exchange algorithms (certificate-only)

[edit]

This section lists the certificate verification functionality available in the various implementations.

ImplementationRSA[39]RSA-EXPORT (insecure)[39]DHE-RSA (forward secrecy)[39]DHE-DSS (forward secrecy)[39]ECDH-ECDSA[89]ECDHE-ECDSA (forward secrecy)[89]ECDH-RSA[89]ECDHE-RSA (forward secrecy)[89]GOST R 34.10-94, 34.10-2001[90]
BotanDisabled by defaultNoYesDisabled by defaultNoYesNoYesNo
BSAFEYesNoYesYesYesYesYesYesNo
cryptlibYesNoYesYesYesYesNoYesNo
GnuTLSYesNoYesDisabled by default[43]NoYesNoYesNo
JSSEYesDisabled by defaultYesYesYesYesYesYesNo
LibreSSLYesNo[47]YesYesNoYesNoYesYes[91]
MatrixSSLYesNoYesNoYesYesYesYesNo
Mbed TLSYesNoYesNoYesYesYesYesNo
NSSYesDisabled by defaultYes[92]YesYesYesYesYesNo[93][94]
OpenSSLYesNo[58]YesDisabled by default[58]NoYesNoYesYes[95]
RustlsNoNoNoNoNoYes[61]NoYes[61]No
Schannel XP/2003YesYesNoXP: Max 1024 bits
2003: 1024 bits only
NoNoNoNoNo[96]
Schannel Vista/2008YesDisabled by defaultNo1024 bits by default[97]NoYesNoexcept AES_GCMNo[96]
Schannel 8/2012YesDisabled by defaultAES_GCM only[98][99][100]1024 bits by default[97]NoYesNoexcept AES_GCMNo[96]
Schannel 7/2008R2, 8.1/2012R2YesDisabled by defaultYes2048 bits by default[97]NoYesNoexcept AES_GCMNo[96]
Schannel 10YesDisabled by defaultYes2048 bits by default[97]NoYesNoYesNo[96]
Secure Transport OS X 10.6YesYesexcept AES_GCMYesYesexcept AES_GCMyesexcept AES_GCMNo
Secure Transport OS X 10.8-10.10YesNoexcept AES_GCMNoYesexcept AES_GCMYesexcept AES_GCMNo
Secure Transport OS X 10.11YesNoYesNoNoYesNoYesNo
wolfSSLYesNoYesNoYesYesYesYesNo
Erlang/OTP SSL applicationYesNoYesYesYesYesYesYesNo
ImplementationRSA[39]RSA-EXPORT (insecure)[39]DHE-RSA (forward secrecy)[39]DHE-DSS (forward secrecy)[39]ECDH-ECDSA[89]ECDHE-ECDSA (forward secrecy)[89]ECDH-RSA[89]ECDHE-RSA (forward secrecy)[89]GOST R 34.10-94, 34.10-2001[90]

Key exchange algorithms (alternative key-exchanges)

[edit]
ImplementationSRP[101]SRP-DSS[101]SRP-RSA[101]PSK-RSA[102]PSK[102]DHE-PSK (forward secrecy)[102]ECDHE-PSK (forward secrecy)[103]KRB5[104]DH-ANON[39] (insecure)ECDH-ANON[89] (insecure)
BotanNoNoNoNoYesNoYesNoNoNo
BSAFE SSL-JNoNoNoNoYes[105]NoNoNoDisabled by defaultDisabled by default
cryptlibNoNoNoNoYesYesNoNoNoNo
GnuTLSYesYesYesYesYesYesYesNoDisabled by defaultDisabled by default
JSSENoNoNoNoNoNoNoNoDisabled by defaultDisabled by default
LibreSSLNo[106]No[106]No[106]NoNoNoNoNoYesYes
MatrixSSLNoNoNoYesYesYesNoNoDisabled by defaultNo
Mbed TLSNoNoNoYesYesYesYesNoNoNo
NSSNo[107]No[107]No[107]No[108]No[108]No[108]No[108]NoClient side only, disabled by default[109]Disabled by default[110]
OpenSSLYesYesYesYesYesYesYesYes[111]Disabled by default[112]Disabled by default[112]
RustlsNoNoNoNoNoNoNoNoNoNo
SchannelNoNoNoNoNoNoNoYesNoNo
Secure TransportNoNoNoNoNoNoNoUnknownYesYes
wolfSSLYesYesYesYesYesYesYes[113]YesNoNo
Erlang/OTP SSL applicationDisabled by defaultDisabled by defaultDisabled by defaultDisabled by defaultDisabled by defaultDisabled by defaultNoNoDisabled by defaultDisabled by default
ImplementationSRP[101]SRP-DSS[101]SRP-RSA[101]PSK-RSA[102]PSK[102]DHE-PSK (forward secrecy)[102]ECDHE-PSK (forward secrecy)[103]KRB5[104]DH-ANON[39] (insecure)ECDH-ANON[89] (insecure)

Certificate verification methods

[edit]
ImplementationApplication-definedPKIX path validation[114]CRL[115]OCSP[116]DANE (DNSSEC)[117][118]CT[119]
BotanYesYesYesYesNoUnknown
Bouncy CastleYesYesYesYesYesUnknown
BSAFEYesYesYesYesNoUnknown
cryptlibYesYesYesYesNoUnknown
GnuTLSYesYesYesYesYesUnknown
JSSEYesYesYesYesNoNo
LibreSSLYesYesYesYesNoUnknown
MatrixSSLYesYesYesYes[120]NoUnknown
Mbed TLSYesYesYesNo[121]NoUnknown
NSSYesYesYesYesNo[122]Unknown
OpenSSLYesYesYesYesYesYes
RustlsYesYesYesNoNoNo
s2nNo[123]Unknown[124]Unknown[125]
SchannelUnknownYesYes[126]Yes[126]NoUnknown
Secure TransportYesYesYesYesNoUnknown
wolfSSLYesYesYesYesNoUnknown
Erlang/OTP SSL applicationYesYesYesNoNoUnknown
ImplementationApplication-definedPKIX path validationCRLOCSPDANE (DNSSEC)CT

Encryption algorithms

[edit]
ImplementationBlock cipher withmode of operationStream cipherNone
AESGCM
[127]
AESCCM
[128]
AESCBCCamelliaGCM
[129]
CamelliaCBC
[130][129]
ARIAGCM
[131]
ARIACBC
[131]
SEEDCBC
[132]
3DES EDECBC
(insecure)[133]
GOST 28147-89CNT
(proposed)
[90][n 1]
ChaCha20-Poly1305
[134]
Null
(insecure)
[n 2]
BotanYesYesYesYesYesNoNoDisabled by defaultDisabled by defaultNoYes[135]Not implemented
BoringSSLYesNoYesNoNoNoNoNoYesNoYes
BSAFE SSL-JYesYesYesNoNoNoNoNoDisabled by defaultNoNoDisabled by default
cryptlibYesNoYesNoNoNoNoNoYesNoNoNot implemented
GnuTLSYesYes[43]YesYesYesNoNoNoDisabled by default[136]NoYes[137]Disabled by default
JSSEYesNoYesNoNoNoNoNoDisabled by default[138]NoYes
(JDK 12+)[139]
Disabled by default
LibreSSLYes[47]NoYesNoYes[91]NoNoNo[47]YesYes[91]Yes[47]Disabled by default
MatrixSSLYesNoYesNoNoNoNoYesDisabled by defaultNoYes[140]Disabled by default
Mbed TLSYesYes[141]YesYesYesYes[142]Yes[142]NoNo[51]NoYes[143]Disabled by default at compile time
NSSYes[144]NoYesNo[145][n 3]Yes[146]NoNoYes[147]YesNo[93][94]Yes[148]Disabled by default
OpenSSLYes[149]Disabled by default[58]YesNoDisabled by default[58]Disabled by default[150]NoDisabled by default[58]Disabled by default[58]Yes[95]Yes[58]Disabled by default
RustlsYes[61]NoNoNoNoNoNoNoNoNoYes[61]Not implemented
Schannel XP/2003NoNo2003 only[151]NoNoNoNoNoYesNo[96]NoDisabled by default
Schannel Vista/2008, 2008R2, 2012NoNoYesNoNoNoNoNoYesNo[96]NoDisabled by default
Schannel 7, 8, 8.1/2012R2Yes except ECDHE_RSA
[98][99]
NoYesNoNoNoNoNoYesNo[96]NoDisabled by default
Schannel 10[152]YesNoYesNoNoNoNoNoYesNo[96]NoDisabled by default
Secure Transport OS X 10.6 - 10.10NoNoYesNoNoNoNoNoYesNoNoDisabled by default
Secure Transport OS X 10.11YesNoYesNoNoNoNoNoYesNoNoDisabled by default
wolfSSLYesYesYesNoNoNoNoNoYesNoYesDisabled by default
Erlang/OTP SSL applicationYesNoYesNoNoNoNoNoDisabled by defaultNoExperimentalDisable by default
ImplementationBlock cipher withmode of operationStream cipherNone
AESGCM
[127]
AESCCM
[128]
AESCBCCamelliaGCM
[129]
CamelliaCBC
[130][129]
ARIAGCM
[131]
ARIACBC
[131]
SEEDCBC
[132]
3DES EDECBC
(insecure)[133]
GOST 28147-89CNT
(proposed)
[90][n 1]
ChaCha20-Poly1305
[134]
Null
(insecure)
[n 2]
Notes
  1. ^abThis algorithm is not defined yet as TLS cipher suites in RFCs, is proposed in drafts.
  2. ^abauthentication only, no encryption
  3. ^This algorithmis implemented in an NSSfork used byPale Moon.

Obsolete algorithms

[edit]
ImplementationBlock cipher withmode of operationStream cipher
IDEACBC
[n 1](insecure)[154]
DESCBC
(insecure)
[n 1]
DES-40CBC
(EXPORT, insecure)
[n 2]
RC2-40CBC
(EXPORT, insecure)
[n 2]
RC4-128
(insecure)
[n 3]
RC4-40
(EXPORT, insecure)
[n 4][n 2]
BotanNoNoNoNoNo[155]No
BoringSSLNoNoNoNoDisabled by default at compile timeNo
BSAFE SSL-JNoDisabled by defaultDisabled by defaultNoDisabled by defaultDisabled by default
cryptlibNoDisabled by default at compile timeNoNoDisabled by default at compile timeNo
GnuTLSNoNoNoNoDisabled by default[43]No
JSSENoDisabled by defaultDisabled by defaultNoDisabled by defaultDisabled by default[156]
LibreSSLYesYesNo[47]No[47]YesNo[47]
MatrixSSLYesNoNoNoDisabled by defaultNo
Mbed TLSNoDisabled by default at compile timeNoNoDisabled by default at compile time[52]No
NSSYesDisabled by defaultDisabled by defaultDisabled by defaultLowest priority[157][158]Disabled by default
OpenSSLDisabled by default[58]Disabled by defaultNo[58]No[58]Disabled by defaultNo[58]
RustlsNoNoNoNoNoNo
Schannel XP/2003NoYesYesYesYesYes
Schannel Vista/2008NoDisabled by defaultDisabled by defaultDisabled by defaultYesDisabled by default
Schannel 7/2008R2NoDisabled by defaultDisabled by defaultDisabled by defaultLowest priority
will be disabled soon[159]
Disabled by default
Schannel 8/2012NoDisabled by defaultDisabled by defaultDisabled by defaultOnly as fallbackDisabled by default
Schannel 8.1/2012R2NoDisabled by defaultDisabled by defaultDisabled by defaultDisabled by default[159]Disabled by default
Schannel 10[152]NoDisabled by defaultDisabled by defaultDisabled by defaultDisabled by default[159]Disabled by default
Secure Transport OS X 10.6YesYesYesYesYesYes
Secure Transport OS X 10.7YesUnknownUnknownUnknownYesUnknown
Secure Transport OS X 10.8-10.9YesDisabled by defaultDisabled by defaultDisabled by defaultYesDisabled by default
Secure Transport OS X 10.10-10.11YesDisabled by defaultDisabled by defaultDisabled by defaultLowest priorityDisabled by default
Secure Transport macOS 10.12YesDisabled by defaultDisabled by defaultDisabled by defaultDisabled by defaultDisabled by default
wolfSSLDisabled by default[160]NoNoNoDisabled by defaultNo
Erlang/OTP SSL applicationnoDisabled by defaultnonoDisabled by defaultno
ImplementationBlock cipher withmode of operationStream cipher
IDEACBC
[n 1](insecure)[154]
DESCBC
(insecure)
[n 1]
DES-40CBC
(EXPORT, insecure)
[n 2]
RC2-40CBC
(EXPORT, insecure)
[n 2]
RC4-128
(insecure)
[n 3]
RC4-40
(EXPORT, insecure)
[n 4][n 2]
Notes
  1. ^abcdIDEA and DES have been removed from TLS 1.2.[153]
  2. ^abcdef40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (seeExport of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later.
  3. ^abTheRC4 attacks weaken or break RC4 used in SSL/TLS. Use of RC4 is prohibited by RFC 7465.
  4. ^abTheRC4 attacks weaken or break RC4 used in SSL/TLS.

Supported elliptic curves

[edit]

This section lists the supportedelliptic curves by each implementation.

Defined curves in RFC 8446 (for TLS 1.3) and RFC 8422, 7027 (for TLS 1.2 and earlier)

[edit]
applicable TLS versionTLS 1.3 and earlierTLS 1.2 and earlier
Implementationsecp256r1
prime256v1
NIST P-256
(0x0017,[161] 23[162])
secp384r1
NIST P-384
(0x0018,[161] 24[162])
secp521r1
NIST P-521
(0x0019,[161] 25[162])
X25519
(0x001D,[161] 29[162])
X448
(0x001E,[161] 30[162])
brainpoolP256r1
(26)[163]
brainpoolP384r1
(27)[163]
brainpoolP512r1
(28)[163]
BotanYesYesYesYes[135]NoYes[164]Yes[164]Yes[164]
BoringSSLYesYesYes (disabled by default)YesNoNoNoNo
BSAFEYesYesYesNoNoNoNoNo
GnuTLSYesYesYesYes[165]Yes[166]NoNoNo
JSSEYesYesYesYes
x25519: JDK 13+[167]
Ed25519:JDK 15+[168]
Yes
x448: JDK 13+[167]
Ed448: JDK 15+[168]
NoNoNo
LibreSSLYesYesYesYes[169]NoYes[47]Yes[47]Yes[47]
MatrixSSLYesYesYesTLS 1.3 only[170]NoYesYesYes
Mbed TLSYesYesYesPrimitive only[171]Primitive only[172]Yes[173]Yes[173]Yes[173]
NSSYesYesYesYes[174]No[175][176]No[177]No[177]No[177]
OpenSSLYesYesYesYes[178][179]Yes[180][181]Yes[60]Yes[60]Yes[60]
RustlsYesYesNoYesNoNoNoNo
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10YesYesYesNoNoNoNoNo
Secure TransportYesYesYesNoNoNoNoNo
wolfSSLYesYesYesYes[182]Yes[183]YesYesYes
Erlang/OTP SSL applicationYesYesYesNoNoYesYesYes
Implementationsecp256r1
prime256v1
NIST P-256
(0x0017, 23)
secp384r1
NIST P-384
(0x0018, 24)
secp521r1
NIST P-521
(0x0019, 25)
X25519
(0x001D, 29)
X448
(0x001E, 30)
brainpoolP256r1
(26)
brainpoolP384r1
(27)
brainpoolP512r1
(28)

Deprecated curves in RFC 8422

[edit]
Implementationsect163k1
NIST K-163
(1)[89]
sect163r1
(2)[89]
sect163r2
NIST B-163
(3)[89]
sect193r1
(4)[89]
sect193r2
(5)[89]
sect233k1
NIST K-233
(6)[89]
sect233r1
NIST B-233
(7)[89]
sect239k1
(8)[89]
sect283k1
NIST K-283
(9)[89]
sect283r1
NIST B-283
(10)[89]
sect409k1
NIST K-409
(11)[89]
sect409r1
NIST B-409
(12)[89]
sect571k1
NIST K-571
(13)[89]
sect571r1
NIST B-571
(14)[89]
BotanNoNoNoNoNoNoNoNoNoNoNoNoNoNo
BoringSSLNoNoNoNoNoNoNoNoNoNoNoNoNoNo
BSAFEYesNoYesNoNoYesYesNoYesYesYesYesYesYes
GnuTLSNoNoNoNoNoNoNoNoNoNoNoNoNoNo
JSSENotes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]
LibreSSLYesYesYesYesYesYesYesYesYesYesYesYesYesYes
MatrixSSLNoNoNoNoNoNoNoNoNoNoNoNoNoNo
Mbed TLSNoNoNoNoNoNoNoNoNoNoNoNoNoNo
NSSYesYesYesYesYesYesYesYesYesYesYesYesYesYes
OpenSSLYesYesYesYesYesYesYesYesYesYesYesYesYesYes
RustlsNoNoNoNoNoNoNoNoNoNoNoNoNoNo
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10NoNoNoNoNoNoNoNoNoNoNoNoNoNo
Secure TransportNoNoNoNoNoNoNoNoNoNoNoNoNoNo
wolfSSLNoNoNoNoNoNoNoNoNoNoNoNoNoNo
Erlang/OTP SSL applicationYesYesYesYesYesYesYesYesYesYesYesYesYesYes
Implementationsect163k1
NIST K-163
(1)
sect163r1
(2)
sect163r2
NIST B-163
(3)
sect193r1
(4)
sect193r2
(5)
sect233k1
NIST K-233
(6)
sect233r1
NIST B-233
(7)
sect239k1
(8)
sect283k1
NIST K-283
(9)
sect283r1
NIST B-283
(10)
sect409k1
NIST K-409
(11)
sect409r1
NIST B-409
(12)
sect571k1
NIST K-571
(13)
sect571r1
NIST B-571
(14)
Implementationsecp160k1
(15)[89]
secp160r1
(16)[89]
secp160r2
(17)[89]
secp192k1
(18)[89]
secp192r1
prime192v1
NIST P-192
(19)[89]
secp224k1
(20)[89]
secp224r1
NIST P-244
(21)[89]
secp256k1
(22)[89]
arbitrary prime curves
(0xFF01)[89][186]
arbitrary char2 curves
(0xFF02)[89][186]
BotanNoNoNoNoNoNoNoNoNoNo
BoringSSLNoNoNoNoNoNoYesNoNoNo
BSAFENoNoNoNoYesNoYesNoNoNo
GnuTLSNoNoNoNoYesNoYesNoNoNo
JSSENotes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]Notes[a][b]NoNo
LibreSSLYesYesYesYesYesYesYesYesNoNo
MatrixSSLNoNoNoNoYesNoYesNoNoNo
Mbed TLSNoNoNoYesYesYesYesYesNoNo
NSSYesYesYesYesYesYesYesYesNoNo
OpenSSLYesYesYesYesYesYesYesYesNoNo
RustlsNoNoNoNoNoNoNoNoNoNo
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10NoNoNoNoNoNoNoNoNoNo
Secure TransportNoNoNoNoYesNoNoNoNoNo
wolfSSLYesYesYesYesYesYesYesYesNoNo
Erlang/OTP SSL applicationYesYesYesYesYesYesYesYesNoNo
Implementationsecp160k1
(15)
secp160r1
(16)
secp160r2
(17)
secp192k1
(18)
secp192r1
prime192v1
NIST P-192
(19)
secp224k1
(20)
secp224r1
NIST P-244
(21)
secp256k1
(22)
arbitrary prime curves
(0xFF01)
arbitrary char2 curves
(0xFF02)
Notes
  1. ^abcdefghijklmnopqrstuvThese elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[184]
  2. ^abcdefghijklmnopqrstuvThese elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[185]

Data integrity

[edit]
ImplementationHMAC-MD5HMAC-SHA1HMAC-SHA256/384AEADGOST 28147-89 IMIT
[90]
GOST R 34.11-94
[90]
BotanNoYesYesYesNoNo
BSAFEYesYesYesYesNoNo
cryptlibYesYesYesYesNoNo
GnuTLSYesYesYesYesNoNo
JSSEDisabled by DefaultYesYesYesNoNo
LibreSSLYesYesYesYesYes
[91]
Yes
[91]
MatrixSSLYesYesYesYesNoNo
Mbed TLSYesYesYesYesNoNo
NSSYesYesYesYesNo
[93][94]
No
[93][94]
OpenSSLYesYesYesYesYes
[95]
Yes
[95]
RustlsNoNoNoYesNoNo
Schannel XP/2003, Vista/2008YesYesXP SP3, 2003 SP2 via hotfix
[187]
NoNo
[96]
No
[96]
Schannel 7/2008R2, 8/2012, 8.1/2012R2YesYesYesexcept ECDHE_RSA
[98][99][100]
No
[96]
No
[96]
Schannel 10YesYesYesYes
[152]
No
[96]
No
[96]
Secure TransportYesYesYesYesNoNo
wolfSSLDisabled by DefaultYesYesYesNoNo
Erlang/OTP SSL applicationYesYesYesYesNoNo
ImplementationHMAC-MD5HMAC-SHA1HMAC-SHA256/384AEADGOST 28147-89 IMITGOST R 34.11-94

Compression

[edit]

Note theCRIME security exploit takes advantage of TLS compression, so conservative implementations do not enable compression at the TLS level.HTTP compression is unrelated and unaffected by this exploit, but is exploited by the relatedBREACH attack.

ImplementationDEFLATE[188]
(insecure)
BotanNo
BSAFE[42]No
cryptlibNo
GnuTLSDisabled by default
JSSENo
LibreSSLNo[47]
MatrixSSLDisabled by default
Mbed TLSDisabled by default
NSSDisabled by default
OpenSSLDisabled by default
RustlsNo
SchannelNo
Secure TransportNo
wolfSSLDisabled by default
Erlang/OTP SSL applicationNo
ImplementationDEFLATE

Extensions

[edit]

In this section the extensions each implementation supports are listed. Note that the Secure Renegotiation extension is critical for HTTPS client security[citation needed]. TLS clients not implementing it are vulnerable to attacks, irrespective of whether the client implements TLS renegotiation.

ImplementationSecure Renegotiation
[189]
Server Name Indication
[190]
ALPN
[191]
Certificate Status Request
[190]
OpenPGP
[192]
Supplemental Data
[193]
Session Ticket
[194]
Keying Material Exporter
[195]
Maximum Fragment Length
[190]
Encrypt-then-MAC
[30]
TLS Fallback SCSV
[196]
Extended Master Secret
[197]
ClientHello Padding
[198]
Raw Public Keys
[199]
BotanYesYesYes[200]NoNoNoYesYesYesYesYes[201]Yes[202]NoUnknown
BSAFE SSL-JYesYesNoYesNoNoNoNoYesNoNoYesNoNo
cryptlibYesYesNoNoNoYesNoNoNo[203]YesYesYesNoUnknown
GnuTLSYesYesYes[204]YesNo[205]YesYesYesYesYes[43]Yes[206]Yes[43]Yes[207]Yes[208]
JSSEYesYes[73]Yes[73]YesNoNoYesNoYesNoNoYesNoNo
LibreSSLYesYesYes[209]YesNoNo?YesYes?NoNoServer side only[210]NoYesNo
MatrixSSLYesYesYes[211]Yes[140]NoNoYesNoYesNoYes[140]Yes[140]NoUnknown
Mbed TLSYesYesYes[212]NoNoNoYesNoYesYes[213]Yes[213]Yes[213]NoNo
NSSYesYesYes[214]YesNo[215]NoYesYesNoNo[216]Yes[217]Yes[218]Yes[214]Unknown
OpenSSLYesYesYes[60]YesNoNo?YesYesYesYesYes[219]Yes[58]Yes[220]Yes[221]
RustlsYesYesYesYesNoNoYesYesNoNoNo[222]YesNoUnknown
Schannel XP/2003NoNoNoNoNoYesNoNoNoNoNoNoNoUnknown
Schannel Vista/2008YesYesNoNoNoYesNoNoNoNoNoYes[223]NoUnknown
Schannel 7/2008R2YesYesNoYesNoYesNoNoNoNoNoYes[223]NoUnknown
Schannel 8/2012YesYesNoYesNoYesClient side only[224]NoNoNoNoYes[223]NoUnknown
Schannel 8.1/2012R2, 10YesYesYesYesNoYesYes[224]NoNoNoNoYes[223]NoUnknown
Secure TransportYesYesUnknownNoNoYesNoNoNoNoNoNoNoUnknown
wolfSSLYesYesYes[160]YesNoNoYesNoYesYes[225]NoYesNoYes[226]
Erlang/OTP SSL applicationYesYesYesNoNoNoNoNoNoNoYesNoNoUnknown
ImplementationSecure RenegotiationServer Name IndicationALPNCertificate Status RequestOpenPGPSupplemental DataSession TicketKeying Material ExporterMaximum Fragment LengthEncrypt-then-MACTLS Fallback SCSVExtended Master SecretClientHello PaddingRaw Public Keys

Assisted cryptography

[edit]

This section lists the known ability of an implementation to take advantage of CPU instruction sets that optimize encryption, or utilize system specific devices that allow access to underlying cryptographic hardware for acceleration or for data separation.

ImplementationPKCS #11 deviceIntel AES-NIVIA PadLockARMv8-AIntel SHANXP CAAMTPM 2.0NXP SE050Microchip ATECCSTMicro STSAFEMaxim MAXQ
BotanYes[227]YesNoYesNoYes[228]NoNoNoNo
BSAFE SSL-J[a][b]YesYesNoYesYesNoNo[231]NoNoNoNo
cryptlibYesYesYesNoYesNoNoNoNo
Crypto++YesYesNoNoNoNo
GnuTLSYesYesYesYes[232]YesNo[233]NoNoNoNo
JSSEYesYes[234]NoNoNoNoNoNoNo
LibreSSLNoYesYesNoNoNoNoNo
MatrixSSLYesYesNoYesNoNoNoNoNo
Mbed TLSYesYes[235]YesNoNoPartial[236]Yes[237]NoNo
NSSYes[238]Yes[239]No[240]NoNoNoNoNoNo
OpenSSLYes[241][242][243]YesYesYes[244]YesPartialPartial[245][246]Partial[236]NoPartial[247]No
RustlsYesYesYesNoNoNoNo
SchannelNoYesNoNoNoNoNoNoNo
Secure TransportNoYes[248][249]NoYesNoNoNoNoNo
wolfSSLYesYesNoYesYesYes[250]Yes[251][252]Yes[253]Yes[254]Yes[255]Yes[256]
ImplementationPKCS #11 deviceIntel AES-NIVIA PadLockARMv8-AIntel SHANXP CAAMTPM 2.0NXP SE050Microchip ATECCSTMicro STSAFEMaxim MAXQ
  1. ^Pure Java implementations relies onJVM processor optimization capabilities, such asOpenJDK support forAES-NI[229]
  2. ^BSAFE SSL-J can be configured to run in native mode, using BSAFE Crypto-C Micro Edition to benefit from processor optimization.[230]

System-specific backends

[edit]

This section lists the ability of an implementation to take advantage of the available operating system specific backends, or even the backends provided by another implementation.

Implementation/dev/cryptoaf_algWindows CSPCommonCryptoOpenSSL engine
BotanNoNoNoNoPartial
BSAFENoNoNoNoNo
cryptlibYesNoNoNoNo
GnuTLSYesYesNoNoNo
JSSENoNoYesNoNo
LibreSSLNoNoNoNoNo[257]
MatrixSSLNoNoNoYesYes
Mbed TLSNoNoNoNoNo
NSSNoNoNoNoNo
OpenSSLYesYesNoNoYes
RustlsNoYes[258]NoNoNo
SchannelNoNoYesNoNo
Secure TransportNoNoNoYesNo
wolfSSLYesYesPartialNoYes[259]
Erlang/OTP SSL applicationNoNoNoNoYes
Implementation/dev/cryptoaf_algWindows CSPCommonCryptoOpenSSL engine

Cryptographic module/token support

[edit]
ImplementationTPM supportHardware token supportObjects identified via
BotanPartial[202]PKCS #11
BSAFE SSL-JNoNo
cryptlibYesPKCS #11User-defined label
GnuTLSYesPKCS #11RFC 7512 PKCS #11 URLs[260]
JSSENoPKCS11Java Cryptography Architecture,
Java Cryptography Extension
LibreSSLYesPKCS #11 (via 3rd party module)Custom method
MatrixSSLNoPKCS #11
Mbed TLSNoPKCS #11 (via libpkcs11-helper) or standard hooksCustom method
NSSNoPKCS #11
OpenSSLYesPKCS #11 (via 3rd party module)[261]RFC 7512 PKCS #11 URLs[260]
RustlsNoMicrosoft CryptoAPI[262]Custom method
SchannelNoMicrosoft CryptoAPIUUID, User-defined label
Secure Transport
wolfSSLYesPKCS #11
ImplementationTPM supportHardware token supportObjects identified via

Code dependencies

[edit]
ImplementationDependenciesOptional dependencies
BotanC++20SQLite
zlib (compression)
bzip2 (compression)
liblzma (compression)
boost
trousers (TPM)
GnuTLSlibc
nettle
gmp
zlib (compression)
p11-kit (PKCS #11)
trousers (TPM)
libunbound (DANE)
JSSEJava
MatrixSSLnonezlib (compression)
MatrixSSL-openlibc or newlib
Mbed TLSlibclibpkcs11-helper (PKCS #11)
zlib (compression)
NSSlibc
libnspr4
libsoftokn3
libplc4
libplds4
zlib (compression)
Rustlsrustcore libraryruststd library
zlib-rs (compression)
brotli (compression)
ring (cryptography)
aws-lc-rs (cryptography)
OpenSSLlibczlib (compression)
brotli (compression)
zstd (compression)
wolfSSLNonelibc
zlib (compression)
Erlang/OTP SSL applicationlibcrypto (from OpenSSL), Erlang/OTP and its public_key, crypto and asn1 applicationsErlang/OTP -inets (http fetching of CRLs)
ImplementationDependenciesOptional dependencies

Development environment

[edit]
ImplementationNamespaceBuild toolsAPI manualCrypto back-endOpenSSL compatibility Layer[clarify]
BotanBotan::TLSMakefileSphinxIncluded (pluggable)No
Bouncy Castleorg.bouncycastleJava Development EnvironmentProgrammers reference manual (PDF)Included (pluggable)No
BSAFE SSL-Jcom.rsa.asn1[a]

com.rsa.certj[b]
com.rsa.jcp[c]
com.rsa.jsafe[d]
com.rsa.ssl[e]
com.rsa.jsse[f]

Java class loaderJavadoc, Developer's guide (HTML)IncludedNo
cryptlibcrypt*makefile, MSVC project workspacesProgrammers reference manual (PDF), architecture design manual (PDF)Included (monolithic)No
GnuTLSgnutls_*Autoconf, automake, libtoolManual and API reference (HTML, PDF)External,libnettleYes (limited)
JSSEjavax.net.ssl

sun.security.ssl

MakefileAPI Reference (HTML) +

JSSE Reference Guide

Java Cryptography Architecture,
Java Cryptography Extension
No
MatrixSSLmatrixSsl_*

ps*

Makefile, MSVC project workspaces, Xcode projects for OS X and iOSAPI Reference (PDF), Integration GuideIncluded (pluggable)Yes (Subset: SSL_read, SSL_write, etc.)
Mbed TLSmbedtls_ssl_*

mbedtls_sha1_*
mbedtls_md5_*
mbedtls_x509*
...

Makefile,CMake, MSVC project workspaces, yottaAPI Reference + High Level and Module Level Documentation (HTML)Included (monolithic)No
NSSCERT_*

SEC_*
SECKEY_*
NSS_*
PK11_*
SSL_*
...

MakefileManual (HTML)Included, PKCS#11 based[263]Yes (separate package called nss_compat_ossl[264])
OpenSSLSSL_*

SHA1_*
MD5_*
EVP_*
...

MakefileMan pagesIncluded (monolithic)
Rustlsrustls::cargoAPI reference anddesign manualTwo options included (pluggable)Yes[265] (subset)
wolfSSLwolfSSL_*

CyaSSL_*
SSL_*

Autoconf, automake, libtool, MSVC project workspaces, XCode projects, CodeWarrior projects, MPLAB X projects, Keil, IAR, Clang, GCC, e2StudioManual and API Reference (HTML, PDF)Included (monolithic)Yes (about 60% of API)
ImplementationNamespaceBuild toolsAPI manualCrypto back-endOpenSSL compatibility layer
  1. ^
    ASN.1 manipulation classes
  2. ^
    Cert-J proprietary API
  3. ^
    Certificate Path manipulation classes
  4. ^
    Crypto-J proprietary API,JCE,CMS andPKI
  5. API
  6. ^
    SSLJ proprietary API
  7. ^
    JSSE API

Portability concerns

[edit]
ImplementationPlatform requirementsNetwork requirementsThread safetyRandom seedAble to cross-compileNo OS (bare metal)Supported operating systems
BotanC++11NoneThread-safePlatform-dependentYesWindows, Linux, macOS, Android, iOS, FreeBSD, OpenBSD, Solaris, AIX, HP-UX, QNX, BeOS, IncludeOS
BSAFE SSL-JJavaJava SE network componentsThread-safeDepends on java.security.SecureRandomYesNoFreeBSD, Linux, macOS, Microsoft Windows, Android, AIX, Solaris
cryptlibC89POSIX send() and recv(). API to supply your own replacementThread-safePlatform-dependent, including hardware sourcesYesYesAMX, BeOS, ChorusOS, DOS, eCos, FreeRTOS/OpenRTOS, uItron, MVS, OS/2, Palm OS, QNX Neutrino, RTEMS, Tandem NonStop, ThreadX, uC/OS II, Unix (AIX, FreeBSD, HPUX, Linux, macOS, Solaris, etc.), VDK, VM/CMS, VxWorks, Win16, Win32, Win64, WinCE/PocketPC/etc, XMK
GnuTLSC89POSIX send() and recv(). API to supply your own replacement.Thread-safe, needs custom mutex hooks if neither POSIX nor Windows threads are available.Platform dependentYesNoGenerally any POSIX platforms or Windows, commonly tested platforms include Linux, Win32/64, macOS, Solaris, OpenWRT, FreeBSD, NetBSD, OpenBSD.
JSSEJavaJava SE network componentsThread-safeDepends on java.security.SecureRandomYesJava based, platform-independent
MatrixSSLC89NoneThread-safePlatform dependentYesYesAll
Mbed TLSC89POSIX read() and write(). API to supply your own replacement.Threading layer available (POSIX or own hooks)Random seed set through entropy poolYesYesKnown to work on: Win32/64, Linux, macOS, Solaris, FreeBSD, NetBSD, OpenBSD, OpenWRT, iPhone (iOS), Xbox, Android, eCos, SeggerOS, RISC OS
NSSC89, NSPR[266]NSPR[266] PR_Send() and PR_Recv(). API to supply your own replacement.Thread-safePlatform dependent[267]Yes (but cumbersome)NoAIX, Android, FreeBSD, NetBSD, OpenBSD, BeOS, HP-UX, IRIX, Linux, macOS, OS/2, Solaris, OpenVMS, Amiga DE, Windows, WinCE, Sony PlayStation
RustlsRust (programming language)NoneThread-safePlatform dependentYesYesAll supported byRust (programming language)
OpenSSLC89NoneThread-safePlatform dependentYesNoUnix-like, DOS (with djgpp), Windows, OpenVMS, NetWare, eCos
wolfSSLC89POSIX send() and recv(). API to supply your own replacement.Thread-safeRandom seed set through wolfCryptYesYesWin32/64, Linux, macOS, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, Yocto Project, OpenEmbedded, WinCE, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and GameCube through DevKitPro, QNX, MontaVista, NonStop, TRON/ITRON/μITRON, eCos, Micrium μC/OS-III, FreeRTOS, SafeRTOS, NXP/Freescale MQX, Nucleus, TinyOS, HP/UX, AIX, ARC MQX, Keil RTX, TI-RTOS, uTasker, embOS, INtime, Mbed, uT-Kernel, RIOT, CMSIS-RTOS, FROSTED, Green Hills INTEGRITY, TOPPERS, PetaLinux, Apache mynewt
ImplementationPlatform requirementsNetwork requirementsThread safetyRandom seedAble to cross-compileNo OS (bare metal)Supported operating systems

See also

[edit]
  • SCTP — with DTLS support
  • DCCP — with DTLS support
  • SRTP — with DTLS support (DTLS-SRTP) and Secure Real-Time Transport Control Protocol (SRTCP)

References

[edit]
  1. ^"Botan: Release Notes". Retrieved2025-05-16.
  2. ^"BoringSSL README.md".boringssl.googlesource.com. Retrieved2025-11-11.
  3. ^"Download Bouncy Castle for Java - bouncycastle.org". 2025-08-04. Retrieved2025-08-04.
  4. ^"Download Bouncy Castle for Java LTS - bouncycastle.org". 2024-11-08. Retrieved2024-11-29.
  5. ^"Download Bouncy Castle for Java FIPS - bouncycastle.org". 2024-07-30. Retrieved2024-11-29.
  6. ^"Download Bouncy Castle for C# .NET - bouncycastle.org". 2025-08-04. Retrieved2025-08-04.
  7. ^"Download Bouncy Castle for C# .NET FIPS - bouncycastle.org". 2024-03-11. Retrieved2024-11-29.
  8. ^"Dell BSAFE SSL-J 6.6 Release Advisory".Dell.
  9. ^"Dell BSAFE SSL-J 7.3.1 Release Advisory".Dell.
  10. ^"Dell BSAFE Micro Edition Suite 5.0.3 Release Advisory".
  11. ^Gutmann, Peter (May 1, 2025)."cryptlib".Github. Retrieved2025-08-02.
  12. ^Daiki Ueno (20 November 2025)."gnutls 3.8.11 released". Retrieved20 November 2025.
  13. ^"Java Development Kit 25 Release Notes".Oracle Corporation. Retrieved2025-06-09.
  14. ^"Java™ SE Development Kit 21, 21.0.5 Release Notes".Oracle Corporation. Retrieved2024-10-16.
  15. ^"Java™ SE Development Kit 17, 17.0.13 Release Notes".Oracle Corporation. Retrieved2024-10-16.
  16. ^"Java™ SE Development Kit 11, 11.0.25 Release Notes".Oracle Corporation. Retrieved2024-10-16.
  17. ^"Java™ SE Development Kit 8, Update 431 Release Notes".Oracle Corporation. Retrieved2024-10-16.
  18. ^"LibreSSL 4.1.2 and 4.2.1 released". 31 October 2025. Retrieved3 November 2025.
  19. ^The features listed are for the closed source version
  20. ^"MatrixSSL 4.2.2 Open release". 2019-09-11. Retrieved2020-03-20.
  21. ^"Release 4.0.0". 15 October 2025. Retrieved21 October 2025.
  22. ^ab"NSS:Release versions".Mozilla Wiki. Retrieved7 November 2022.
  23. ^"OpenSSL 3.6.0". 1 October 2025. Retrieved1 October 2025.
  24. ^"rustls/rustls releases".Github. Retrieved15 August 2025.
  25. ^"wolfSSL product description". Retrieved2016-05-03.
  26. ^"wolfSSL Embedded SSL/TLS". Retrieved2016-05-03.
  27. ^"wolfSSL ChangeLog". 2025-11-20. Retrieved2025-11-20.
  28. ^Prohibiting Secure Sockets Layer (SSL) Version 2.0.doi:10.17487/RFC6176.RFC6176.
  29. ^Vaudenay, Serge (2001)."CBC-Padding: Security Flaws in SSL, IPsec, WTLS,..."(PDF).
  30. ^abEncrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security.doi:10.17487/RFC7366.RFC7366.
  31. ^"Rizzo/Duong BEAST Countermeasures". Archived fromthe original on 2016-03-11.
  32. ^Möller, Bodo; Duong, Thai; Kotowicz, Krzysztof (September 2014)."This POODLE Bites: Exploiting The SSL 3.0 Fallback"(PDF). Archived fromthe original(PDF) on 15 October 2014. Retrieved15 October 2014.
  33. ^"TLSv1.2's Major Differences from TLSv1.1".The Transport Layer Security (TLS) Protocol Version 1.2. sec. 1.2.doi:10.17487/RFC5246.RFC5246.
  34. ^abcRFC 6347.doi:10.17487/RFC6347.
  35. ^abElgamal, Taher; Hickman, Kipp E. B. (19 April 1995).The SSL Protocol. I-D draft-hickman-netscape-ssl-00.
  36. ^abRFC 6101.doi:10.17487/RFC6101.
  37. ^abRFC 2246.doi:10.17487/RFC2246.
  38. ^abRFC 4346.doi:10.17487/RFC4346.
  39. ^abcdefghijklRFC 5246.doi:10.17487/RFC5246.
  40. ^abRFC 4347.doi:10.17487/RFC4347.
  41. ^"Version 1.11.13, 2015-01-11 — Botan". 2015-01-11. Archived fromthe original on 2015-01-09. Retrieved2015-01-16.
  42. ^abc"RSA BSAFE Technical Specification Comparison Tables"(PDF). Archived fromthe original(PDF) on 2015-09-24. Retrieved2015-01-09.
  43. ^abcdef"[gnutls-devel] GnuTLS 3.4.0 released". 2015-04-08. Retrieved2015-04-16.
  44. ^"[gnutls-devel] GnuTLS 3.6.3". 2018-07-16. Retrieved2018-09-16.
  45. ^"Java SE Development Kit 8, Update 31 Release Notes". Retrieved2024-01-14.
  46. ^ab"Release Note: Disable TLS 1.0 and 1.1". Retrieved2024-01-14.
  47. ^abcdefghijklm"OpenBSD 5.6 Released". 2014-11-01. Retrieved2015-01-20.
  48. ^"LibreSSL 2.3.0 Released". 2015-09-23. Retrieved2015-09-24.
  49. ^"LibreSSL 3.3.3 Released". 2021-05-04. Retrieved2021-05-04.
  50. ^"MatrixSSL - News". Archived fromthe original on 2015-02-14. Retrieved2014-11-09.
  51. ^abcd"Mbed TLS 3.0.0 branch released".GitHub. 2021-07-07. Retrieved2021-08-13.
  52. ^abc"mbed TLS 2.0.0 released". 2015-07-10. Retrieved2015-07-14.
  53. ^"NSS 3.19 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2015-06-05. Retrieved2015-05-06.
  54. ^ab"NSS 3.14 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2013-01-17. Retrieved2012-10-27.
  55. ^"NSS 3.15.1 release notes".Mozilla Developer Network. Mozilla. Retrieved2013-08-10.
  56. ^"NSS 3.39 release notes".Mozilla Developer Network. Mozilla. 2018-08-31. Archived fromthe original on 2021-12-07. Retrieved2018-09-15.
  57. ^"NSS 3.16.2 release notes".Mozilla Developer Network. Mozilla. 2014-06-30. Archived fromthe original on 2021-12-07. Retrieved2014-06-30.
  58. ^abcdefghijklm"OpenSSL 1.1.0 Series Release Notes".www.openssl.org. Archived fromthe original on 2018-03-17. Retrieved2016-09-03.
  59. ^ab"Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]". 2012-03-14. Archived fromthe original on December 5, 2014. Retrieved2015-01-20.
  60. ^abcdef"Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]". Archived fromthe original on September 4, 2014. Retrieved2015-01-22.
  61. ^abcdefghijk"rustls implemented and unimplemented features documentation". Retrieved2024-08-28.
  62. ^"S2N Readme".GitHub. 2019-12-21.
  63. ^"TLS Cipher Suites (Windows)".msdn.microsoft.com. 14 July 2023.
  64. ^ab"TLS Cipher Suites in Windows Vista (Windows)".msdn.microsoft.com. 25 October 2021.
  65. ^abc"Cipher Suites in TLS/SSL (Schannel SSP) (Windows)".msdn.microsoft.com. 14 July 2023.
  66. ^ab"An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1". Microsoft. Retrieved13 November 2012.
  67. ^"Protocols in TLS/SSL (Schannel SSP)". Microsoft. 2022-05-25. Retrieved2023-11-18.
  68. ^"Protocols in TLS/SSL (Schannel SSP)". 25 May 2022. Retrieved6 November 2022.
  69. ^"@badger: the 1.3 stuff is apparently in iOS 11 and macOS 10.13". 2018-03-09. Retrieved2018-03-09.
  70. ^"[wolfssl] wolfSSL 3.6.6 Released". 2015-08-20. Retrieved2015-08-24.
  71. ^"[wolfssl] wolfSSL 3.13.0 Released". 2017-12-21. Retrieved2022-01-17.
  72. ^"Erlang -- Standards Compliance".
  73. ^abc"Security Enhancements in JDK 8".docs.oracle.com.
  74. ^"Bug 663320 - (NSA-Suite-B-TLS) Implement RFC6460 (NSA Suite B profile for TLS)". Mozilla. Retrieved2014-05-19.
  75. ^"Introducing Compliance to Suite B Cryptography". 18 September 2012.
  76. ^"Speeds and Feeds › Secure or Compliant, Pick One". Archived fromthe original on December 27, 2013.
  77. ^"Search - Cryptographic Module Validation Program - CSRC".csrc.nist.gov. Archived fromthe original on 2014-12-26. Retrieved2014-03-18.
  78. ^""Is botan FIPS 140 certified?" Frequently Asked Questions — Botan". Archived fromthe original on 2014-11-29. Retrieved2014-11-16.
  79. ^"Search - Cryptographic Module Validation Program - CSRC".csrc.nist.gov. 11 October 2016.
  80. ^"cryptlib". 11 October 2013. Archived fromthe original on 11 October 2013.
  81. ^"B.5 Certification".GnuTLS 3.7.7. Retrieved26 September 2022.
  82. ^"Matrix SSL Toolkit"(PDF).
  83. ^"Is mbed TLS FIPS certified? - Mbed TLS documentation".Mbed TLS documentation.
  84. ^"FIPS Validation - MozillaWiki".wiki.mozilla.org.
  85. ^"OpenSSL and FIPS 140-2". Archived fromthe original on 2013-05-28. Retrieved2014-11-15.
  86. ^"rustls FIPS documentation". Retrieved2024-08-28.
  87. ^"Microsoft FIPS 140 Validated Cryptographic Modules".
  88. ^"wolfCrypt FIPS 140-2 Information - wolfSSL Embedded SSL/TLS Library".
  89. ^abcdefghijklmnopqrstuvwxyzaaabacadaeafagahRFC 4492.doi:10.17487/RFC4492.
  90. ^abcdefGOST 28147-89 Cipher Suites for Transport Layer Security (TLS). I-D draft-chudov-cryptopro-cptls-04.
  91. ^abcde"LibreSSL 2.1.2 released". 2014-12-09. Retrieved2015-01-20.
  92. ^"NSS 3.20 release notes".Mozilla. 2015-08-19. Archived fromthe original on 2021-12-07. Retrieved2015-08-20.
  93. ^abcdMozilla.org."Bug 518787 - Add GOST crypto algorithm support in NSS". Retrieved2014-07-01.
  94. ^abcdMozilla.org."Bug 608725 - Add Russian GOST cryptoalgorithms to NSS and Thunderbird". Retrieved2014-07-01.
  95. ^abcd"OpenSSL: CVS Web Interface". Archived fromthe original on 2013-04-15. Retrieved2014-11-12.
  96. ^abcdefghijklmnoExtensions to support GOST in Schannel might be available.[citation needed]
  97. ^abcd"Microsoft Security Advisory 3174644". 14 October 2022.
  98. ^abc"Microsoft Security Bulletin MS14-066 - Critical (Section Update FAQ)". Microsoft. November 11, 2014. Retrieved11 November 2014.
  99. ^abcThomlinson, Matt (November 11, 2014)."Hundreds of Millions of Microsoft Customers Now Benefit from Best-in-Class Encryption". Microsoft Security. Retrieved11 November 2014.
  100. ^ab"Update adds new TLS cipher suites and changes cipher suite priorities in Windows 8.1 and Windows Server 2012 R2".support.microsoft.com.
  101. ^abcdefRFC 5054.doi:10.17487/RFC5054.
  102. ^abcdefRFC 4279.doi:10.17487/RFC4279.
  103. ^abRFC 5489.doi:10.17487/RFC5489.
  104. ^abRFC 2712.doi:10.17487/RFC2712.
  105. ^"RSA BSAFE SSL-J 6.2.4 Release Notes". 2018-09-05. Archived fromthe original on 2018-09-10.
  106. ^abc"LibreSSL 2.0.4 released". Retrieved2014-08-04.
  107. ^abc"Bug 405155 - add support for TLS-SRP, rfc5054". Mozilla. Retrieved2014-01-25.
  108. ^abcd"Bug 306435 - Mozilla browsers should support the new IETF TLS-PSK protocol to help reduce phishing". Mozilla. Retrieved2014-01-25.
  109. ^"Bug 1170510 - Implement NSS server side support for DH_anon". Mozilla. Retrieved2015-06-03.
  110. ^"Bug 236245 - Update ECC/TLS to conform to RFC 4492". Mozilla. Retrieved2014-06-09.
  111. ^"Changes between 0.9.6h and 0.9.7 [31 Dec 2002]". Retrieved2016-01-29.
  112. ^ab"Changes between 0.9.8n and 1.0.0 [29 Mar 2010]". Retrieved2016-01-29.
  113. ^"wolfSSL (Formerly CyaSSL) Release 3.9.0 (03/18/2016)". 2016-03-18. Retrieved2016-04-05.
  114. ^RFC 5280.doi:10.17487/RFC5280.
  115. ^RFC 3280.doi:10.17487/RFC3280.
  116. ^RFC 2560.doi:10.17487/RFC2560.
  117. ^RFC 6698.doi:10.17487/RFC6698.
  118. ^RFC 7218.doi:10.17487/RFC7218.
  119. ^Laurie, B.; Langley, A.; Kasper, E. (June 2013).Certificate Transparency.IETF.doi:10.17487/RFC6962.ISSN 2070-1721.RFC 6962. Retrieved2020-08-31.
  120. ^"MatrixSSL 3.8.3". Archived fromthe original on 2017-01-19. Retrieved2017-01-18.
  121. ^"mbed TLS 2.0 defaults implement best practices". Retrieved2017-01-18.
  122. ^"Bug 672600 - Use DNSSEC/DANE chain stapled into TLS handshake in certificate chain validation". Mozilla. Retrieved2014-06-18.
  123. ^"CRL Validation · Issue #3499 · aws/s2n-tls".GitHub. Retrieved2022-11-01.
  124. ^"OCSP digest support for SHA-256 · Issue #2854 · aws/s2n-tls · GitHub".GitHub. Retrieved2022-11-01.
  125. ^"[RFC 6962] s2n Client can Validate Signed Certificate Timestamp TLS Extension · Issue #457 · aws/s2n-tls · GitHub".GitHub. Retrieved2022-11-01.
  126. ^ab"How Certificate Revocation Works".Microsoft TechNet.Microsoft. March 16, 2012. RetrievedJuly 10, 2013.
  127. ^ab
  128. ^abRFC 6655, RFC 7251
  129. ^abcdRFC 6367.doi:10.17487/RFC6367.
  130. ^abRFC 5932.doi:10.17487/RFC5932.
  131. ^abcdRFC 6209.doi:10.17487/RFC6209.
  132. ^abRFC 4162.doi:10.17487/RFC4162.
  133. ^ab"Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN".sweet32.info.
  134. ^abRFC 7905.doi:10.17487/RFC7905.
  135. ^ab"Version 1.11.12, 2015-01-02 — Botan". 2015-01-02. Retrieved2015-01-09.
  136. ^"gnutls 3.6.0". 2017-09-21. Retrieved2018-01-07.
  137. ^"gnutls 3.4.12". 2016-05-20. Archived fromthe original on 2016-10-13. Retrieved2016-05-29.
  138. ^"Java SE DevelopmentK Kit 10 - 10.0.1 Release Notes". 2018-04-17. Retrieved2024-01-14.
  139. ^"JDK 12 Release Notes". Retrieved2024-01-14.
  140. ^abcd"Changes in 3.8.3".GitHub. Retrieved2016-06-19.[permanent dead link]
  141. ^"PolarSSL 1.3.8 release notes". Archived fromthe original on 2014-07-14.
  142. ^ab"Mbed TLS 2.11.0, 2.7.4 and 2.1.13 released". Retrieved2018-08-30.
  143. ^"Mbed TLS 2.12.0, 2.7.5 and 2.1.14 released". Retrieved2018-08-30.
  144. ^"NSS 3.25 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2021-12-07. Retrieved2016-07-01.
  145. ^"Bug 940119 - libssl does not support any TLS_ECDHE_*_CAMELLIA_*_GCM cipher suites". Mozilla. Retrieved2013-11-19.
  146. ^"NSS 3.12 is released". Retrieved2013-11-19.
  147. ^"NSS 3.12.3 Release Notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2023-04-02. Retrieved2023-04-01.
  148. ^"NSS 3.23 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2021-04-14. Retrieved2016-03-09.
  149. ^"openssl/CHANGES at OpenSSL_1_0_1-stable · openssl/openssl".GitHub. Retrieved2015-01-20.
  150. ^"OpenSSL 1.1.1 Series Release Notes".www.openssl.org. Archived fromthe original on 2024-01-16.
  151. ^"Cipher Suites in TLS/SSL (Schannel SSP) - Win32 apps".docs.microsoft.com. 14 July 2023.
  152. ^abc"Qualys SSL Labs - Projects / User Agent Capabilities: IE 11 / Win 10 Preview".dev.ssllabs.com. Archived fromthe original on 2023-07-14.
  153. ^RFC 5469
  154. ^ab"Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN".
  155. ^"Version 1.11.15, 2015-03-08 — Botan". 2015-03-08. Retrieved2015-03-11.
  156. ^"Java Cryptography Architecture Oracle Providers Documentation".docs.oracle.com.
  157. ^"NSS 3.15.3 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on 2014-06-05. Retrieved2014-07-13.
  158. ^"MFSA 2013-103: Miscellaneous Network Security Services (NSS) vulnerabilities".Mozilla. Retrieved2014-07-13.
  159. ^abc"RC4 is now disabled in Microsoft Edge and Internet Explorer 11 - Microsoft Edge Dev BlogMicrosoft Edge Dev Blog".blogs.windows.com. 2016-08-09.
  160. ^ab"wolfSSL (Formerly CyaSSL) Release 3.7.0 (10/26/2015)". 2015-10-26. Retrieved2015-11-19.
  161. ^abcdeRFC 8446
  162. ^abcdeRFC 8422
  163. ^abcRFC 7027
  164. ^abc"Version 1.11.5, 2013-11-10 — Botan". 2013-11-10. Retrieved2015-01-23.
  165. ^"An overview of the new features in GnuTLS 3.5.0". 2016-05-02. Retrieved2016-12-09.
  166. ^"gnutls 3.6.12". 2020-02-01. Retrieved2021-08-31.
  167. ^ab"JDK 13 Early-Access Release Notes". Archived fromthe original on 2020-04-01. Retrieved2019-06-20.
  168. ^ab"JEP 339: Edwards-Curve Digital Signature Algorithm (EdDSA)". Retrieved2024-01-14.
  169. ^"LibreSSL 2.5.1 release notes". OpenBSD. 2017-01-31. Retrieved2017-02-23.
  170. ^"MatrixSSL 4.0 changelog".GitHub. Retrieved2018-09-18.
  171. ^"PolarSSL 1.3.3 released". 2013-12-31. Archived fromthe original on 2014-01-07. Retrieved2015-01-23.
  172. ^"Mbed TLS 2.9.0, 2.7.3 and 2.1.12 released". Retrieved2018-08-30.
  173. ^abc"PolarSSL 1.3.1 released". 2013-10-15. Archived fromthe original on 2015-01-23. Retrieved2015-01-23.
  174. ^"Bug 957105 - Add support for curve25519 Key Exchange and UMAC MAC support for TLS". Mozilla. Retrieved2017-02-23.
  175. ^"Bug 1305243 - Support for X448". Mozilla. Retrieved2022-08-04.
  176. ^"Bug 1597057 - Curve448 or named Ed448-Goldilocks support needed (both X448 key exchange and Ed448 signature algorithm )". Mozilla. Retrieved2022-08-04.
  177. ^abc"Bug 943639 - Support for Brainpool ECC Curve (rfc5639)". Mozilla. Retrieved2014-01-25.
  178. ^"OpenSSL 1.1.0x Release Notes". 25 August 2016. Archived fromthe original on 18 May 2018. Retrieved18 May 2018.
  179. ^"OpenSSL GitHub Issue #487 Tracker".GitHub. 2 December 2015. Retrieved18 May 2018.
  180. ^"OpenSSL CHANGES". 1 May 2018. Archived fromthe original on 18 May 2018. Retrieved18 May 2018.
  181. ^"OpenSSL GitHub Issue #5049 Tracker".GitHub. 9 January 2018. Retrieved18 May 2018.
  182. ^"wolfSSL (Formerly CyaSSL) Release 3.4.6 (03/30/2015)". 2015-03-30. Retrieved2015-11-19.
  183. ^"wolfSSL Release 4.4.0 (04/22/2020)". 2020-04-22. Retrieved2022-10-18.
  184. ^"Release Note: Weak Named Curves in TLS, CertPath, and Signed JAR Disabled by Default".JDK Bug System (JBS). Retrieved25 December 2024.
  185. ^"Release Note: Removal of Legacy Elliptic Curves".JDK Bug System (JBS). Retrieved25 December 2024.
  186. ^abNegotiation of arbitrary curves has been shown to be insecure for certain curve sizesMavrogiannopoulos, Nikos and Vercautern, Frederik and Velichkov, Vesselin and Preneel, Bart (2012)."A cross-protocol attack on the TLS protocol"(PDF).Proceedings of the 2012 ACM conference on Computer and communications security. Association for Computing Machinery. pp. 62–72.doi:10.1145/2382196.2382206.ISBN 978-1-4503-1651-4.{{cite conference}}: CS1 maint: multiple names: authors list (link)
  187. ^"SHA2 and Windows". Retrieved2024-12-25.
  188. ^RFC 3749
  189. ^RFC 5746
  190. ^abcRFC 6066
  191. ^RFC 7301
  192. ^RFC 6091
  193. ^RFC 4680
  194. ^RFC 5077.doi:10.17487/RFC5077.
  195. ^RFC 5705.doi:10.17487/RFC5705.
  196. ^RFC 7507.doi:10.17487/RFC7507.
  197. ^RFC 7627
  198. ^RFC 7685
  199. ^RFC 7250
  200. ^"Version 1.11.16, 2015-03-29 — Botan". 2016-03-29. Retrieved2016-09-08.
  201. ^"Version 1.11.10, 2014-12-10 — Botan". 2014-12-10. Retrieved2014-12-14.
  202. ^ab"Version 1.11.26, 2016-01-04 — Botan". 2016-01-04. Retrieved2016-02-25.
  203. ^Present, but disabled by default due to lack of use by any implementation.
  204. ^"gnutls 3.2.0". Archived fromthe original on 2016-01-31. Retrieved2015-01-26.
  205. ^Mavrogiannopoulos, Nikos (August 21, 2017)."[gnutls-help] GnuTLS 3.6.0 released".
  206. ^"gnutls 3.4.4". Archived fromthe original on 2017-07-17. Retrieved2015-08-25.
  207. ^"%DUMBFW priority keyword". Retrieved2017-04-30.
  208. ^"gnutls 3.6.6". 2019-01-25. Retrieved2019-09-01.
  209. ^"LibreSSL 2.1.3 released". 2015-01-22. Retrieved2015-01-22.
  210. ^"LibreSSL 2.1.4 released". 2015-03-04. Retrieved2015-03-04.
  211. ^"MatrixSSL - News". 2014-12-04. Archived fromthe original on 2015-02-14. Retrieved2015-01-26.
  212. ^"Download overview - PolarSSL". 2014-04-11. Archived fromthe original on 2015-02-09. Retrieved2015-01-26.
  213. ^abc"mbed TLS 1.3.10 released". 2015-02-08. Archived fromthe original on 2015-02-09. Retrieved2015-02-09.
  214. ^ab"NSS 3.15.5 release notes".Mozilla Developer Network. Mozilla. Archived fromthe original on January 26, 2015. Retrieved2015-01-26.
  215. ^"Bug 961416 - Support RFC6091 - Using OpenPGP Keys for Transport Layer Security Authentication (TLS1.2)". Mozilla. Retrieved2014-06-18.
  216. ^"Bug 972145 - Implement the encrypt-then-MAC TLS extension". Mozilla. Retrieved2014-11-06.
  217. ^"NSS 3.17.1 release notes". Archived fromthe original on 2019-04-19. Retrieved2014-10-17.
  218. ^"NSS 3.21 release notes". Archived fromthe original on 2021-12-07. Retrieved2015-11-14.
  219. ^"OpenSSL Security Advisory [15 Oct 2014]". 2014-10-15.
  220. ^"Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]". 2014-04-07. Archived fromthe original on 2015-01-20. Retrieved2015-02-10.
  221. ^"OpenSSL Announces Final Release of OpenSSL 3.2.0". 2023-11-23. Retrieved2024-10-11.
  222. ^rustls does not implement earlier versions that would warrant protection against insecure downgrade
  223. ^abcd"Microsoft Security Bulletin MS15-121". March 2023. Retrieved2024-04-28.
  224. ^ab"What's New in TLS/SSL (Schannel SSP)". 31 August 2016. Retrieved2024-04-28.
  225. ^"wolfSSL Version 4.2.0 is Now Available!". 22 October 2019. Retrieved2021-08-13.
  226. ^"wolfSSL supports Raw Public Keys". August 2023. Retrieved2024-10-25.
  227. ^"Version 1.11.31, 2015-08-30 — Botan". 2016-08-30. Retrieved2016-09-08.
  228. ^"Trusted Platform Module (TPM) — Botan".
  229. ^"JEP 164: Leverage CPU Instructions for AES Cryptography".openjdk.org.
  230. ^"RSA SecurID PASSCODE Request".sso.rsasecurity.com.
  231. ^"Comparison of BSAFE TLS libraries: Micro Edition Suite vs SSL-J | Dell Malaysia".
  232. ^Mavrogiannopoulos, Nikos (October 9, 2016)."[gnutls-devel] gnutls 3.5.5".
  233. ^"Trusted Platform Module (GnuTLS 3.8.4)".
  234. ^"Java SSL provider with AES-NI support".stackoverflow.com.
  235. ^"PolarSSL 1.3.3 released". 2013-12-31. Archived fromthe original on 2014-01-07. Retrieved2014-01-07.We've incorporated support for AES-NI in our AES and GCM modules.
  236. ^ab"NXP/Plug-and-trust".GitHub.
  237. ^"ARMmbed/Mbed-os-atecc608a".GitHub.
  238. ^Normally NSS's libssl performs all operations via the PKCS#11 interface, either to hardware or software tokens
  239. ^"Bug 706024 - AES-NI enhancements to NSS on Sandy Bridge systems". Retrieved2013-09-28.
  240. ^"Bug 479744 - RFE : VIA Padlock ACE support (hardware RNG, AES, SHA1 and SHA256)". Retrieved2014-04-11.
  241. ^"Подключаем Рутокен ЭЦП к OpenSSL" (in Russian). 16 December 2011.
  242. ^"Поддержка Рутокен ЭЦП в OpenSSL (Страница 1) — Рутокен и Open Source — Форум Рутокен" (in Russian).
  243. ^"OpenSSL ГОСТ" (in Russian). Archived fromthe original on 2018-06-23.
  244. ^"git.openssl.org Git - openssl.git/commitdiff".git.openssl.org.
  245. ^"Tpm2-software/Tpm2-openssl".GitHub.
  246. ^"Provider - OpenSSL Documentation".
  247. ^"STSW-STSA110-SSL - STSAFE-A integration within OpenSSL security stack".STMicroelectronics.
  248. ^SecECKey.c onGitHub
  249. ^"Crypto Officer Role Guide for FIPS 140-2 Compliance OS X Mountain Lion v10.8"(PDF). Apple Inc. 2013.
  250. ^"CAAM support in wolfSSL". 10 March 2020.
  251. ^"wolfTPM Portable TPM 2.0 Library".
  252. ^"Announcing wolfSSL TPM support for the Espressif ESP32". 20 June 2024.
  253. ^"WolfSSL SSL/TLS Support for NXP SE050 – wolfSSL". 22 February 2024.
  254. ^"WolfSSL support for the ATECC608 Crypto Coprocessor – wolfSSL". 13 October 2021.
  255. ^"WolfSSL support for STSAFE-A100 crypto coprocessor – wolfSSL". 20 September 2018.
  256. ^"Support for MAXQ1065 in wolfSSL – wolfSSL". 29 November 2022.
  257. ^"LibreSSL 2.2.1 Released". 2015-07-08. Retrieved2016-01-30.
  258. ^"ktls integration for rustls".GitHub. Retrieved2024-08-29.
  259. ^"wolfProvider". 2021-11-10. Retrieved2022-01-17.
  260. ^abThe PKCS #11 URI Scheme.doi:10.17487/RFC7512.RFC7512.
  261. ^"libp11: PKCS#11 wrapper library". 19 January 2018 – via GitHub.
  262. ^"Windows CNG bridge for rustls".GitHub. Retrieved2024-08-29.
  263. ^On the fly replaceable/augmentable.
  264. ^"Nss compat ossl - Fedora Project Wiki".fedoraproject.org.
  265. ^"rustls-openssl compatibility layer".GitHub. Retrieved2024-08-29.
  266. ^ab"NSPR".Mozilla Developer Network.
  267. ^For Unix/Linux it uses /dev/urandom if available, for Windows it uses CAPI. For other platforms it gets data from clock, and tries to open system files. NSS has a set of platform dependent functions it uses to determine randomness.
Protocols and technologies
Public-key infrastructure
See also
History
Implementations
Notaries
Vulnerabilities
Theory
Cipher
Protocol
Implementation
Retrieved from "https://en.wikipedia.org/w/index.php?title=Comparison_of_TLS_implementations&oldid=1323474394"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp