Comparison of TLS implementations

The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations compares several of the most notable libraries. There are several TLS implementations which are free software and open source.

All comparison categories use the stable version of each implementation listed in the overview section. The comparison is limited to features that directly relate to the TLS protocol.

Overview

[edit]
Implementation Developed by Open source Software license Copyright holder Written in Latest stable version, release date Origin
Botan Jack Lloyd Yes Simplified BSD License Jack Lloyd C++ 3.5.0 (July 8, 2024; 3 months ago (2024-07-08)[1]) [±] US (Vermont)
BoringSSL Google Yes OpenSSL-SSLeay dual-license, ISC license Eric Young, Tim Hudson, Sun, OpenSSL project, Google, and others C, C++, Go, assembly ?? Australia/EU
Bouncy Castle The Legion of the Bouncy Castle Inc. Yes MIT License Legion of the Bouncy Castle Inc. Java, C#
Java1.77 / November 13, 2023; 11 months ago (2023-11-13)[2]
Java LTSBC-LJA 2.73.5 / March 1, 2024; 8 months ago (2024-03-01)[3]
Java FIPSBC-FJA 1.0.2.4 / September 28, 2023; 13 months ago (2023-09-28)[4]
C#2.3.0 / February 5, 2024; 8 months ago (2024-02-05)[5]
C# FIPSBC-FNA 1.0.2 / February 28, 2023; 20 months ago (2023-02-28)[6]
Australia
BSAFE Dell, formerly RSA Security No Proprietary Dell Java, C, assembly SSL-J 6.6 (July 2, 2024; 3 months ago (2024-07-02)[7]) [±]

SSL-J 7.3.1 (October 7, 2024; 25 days ago (2024-10-07)[8]) [±]
Micro Edition Suite 4.6.2 (May 2, 2023; 17 months ago (2023-05-02)[9]) [±]
Micro Edition Suite 5.0.2.1 (September 18, 2023; 13 months ago (2023-09-18)[10]) [±]

Australia
cryptlib Peter Gutmann Yes Sleepycat License and commercial license Peter Gutmann C 3.4.5 (2019; 5 years ago (2019)[11]) [±] NZ
GnuTLS GnuTLS project Yes LGPL-2.1-or-later Free Software Foundation C 3.8.5[12] Edit this on Wikidata 2024-04-04 EU (Greece and Sweden)
Java Secure Socket Extension (JSSE) Oracle Yes GNU GPLv2 and commercial license Oracle Java

23.0.1 (October 15, 2024; 17 days ago (2024-10-15)[13]) [±]
21.0.5 LTS (October 15, 2024; 17 days ago (2024-10-15)[14]) [±]
17.0.13 LTS (October 15, 2024; 17 days ago (2024-10-15)[15]) [±]
11.0.25 LTS (October 15, 2024; 17 days ago (2024-10-15)[16]) [±]
8u431 LTS (October 15, 2024; 17 days ago (2024-10-15)[17]) [±]

US
LibreSSL OpenBSD Project Yes Apache-1.0, BSD-4-Clause, ISC, and public domain Eric Young, Tim Hudson, Sun, OpenSSL project, OpenBSD Project, and others C, assembly 4.0.0[18] Edit this on Wikidata 2024-10-14 Canada
MatrixSSL[19] PeerSec Networks Yes GNU GPLv2+ and commercial license PeerSec Networks C 4.2.2 (September 11, 2019; 5 years ago (2019-09-11) [20]) [±] US
Mbed TLS (previously PolarSSL) Arm Yes Apache License 2.0, GNU GPLv2+ and commercial license Arm Holdings C 3.6.2[21]Edit this on Wikidata (15 October 2024; 17 days ago (15 October 2024)) [±] EU (Netherlands)
Network Security Services (NSS) Mozilla, AOL, Red Hat, Sun, Oracle, Google and others Yes MPL 2.0 NSS contributors C, assembly
Standard3.84 / October 12, 2022; 2 years ago (2022-10-12)[22]
Extended Support Release3.79.1 / August 18, 2022; 2 years ago (2022-08-18)[22]
US
OpenSSL OpenSSL project Yes Apache-2.0[a] Eric Young, Tim Hudson, Sun, OpenSSL project, and others C, assembly 3.4.0[23] Edit this on Wikidata 2024-10-22 Australia/EU
Rustls Joe Birr-Pixton, Dirkjan Ochtman, Daniel McCarney, Josh Aas, and open source contributors Yes Apache-2.0, MIT License and ISC Open source contributors Rust v0.23.12 (July 23, 2024; 3 months ago (2024-07-23)[24]) [±] United Kingdom
s2n Amazon Yes Apache License 2.0, GNU GPLv2+ and commercial license Amazon.com, Inc. C Continuous US
Schannel Microsoft No Proprietary Microsoft Corporation Windows 11, 2021-10-05 US
Secure Transport Apple Inc. Yes APSL 2.0 Apple Inc. 57337.20.44 (OS X 10.11.2), 2015-12-08 US
wolfSSL (previously CyaSSL) wolfSSL[25] Yes GNU GPLv2+ and commercial license wolfSSL Inc.[26] C, assembly 5.6.4 (October 30, 2023; 12 months ago (2023-10-30)[27]) [±] US
Erlang/OTP SSL application Ericsson Yes Apache License 2.0 Ericsson Erlang OTP-21, 2018-06-19 Sweden
Implementation Developed by Open source Software license Copyright owner Written in Latest stable version, release date Origin
  1. ^ Apache-2.0 for OpenSSL 3.0 and later releases. OpenSSL-SSLeay dual-license for any release before OpenSSL 3.0.

TLS/SSL protocol version support

[edit]

Several versions of the TLS protocol exist. SSL 2.0 is a deprecated[28] protocol version with significant weaknesses. SSL 3.0 (1996) and TLS 1.0 (1999) are successors with two weaknesses in CBC-padding that were explained in 2001 by Serge Vaudenay.[29] TLS 1.1 (2006) fixed only one of the problems, by switching to random initialization vectors (IV) for CBC block ciphers, whereas the more problematic use of mac-pad-encrypt instead of the secure pad-mac-encrypt was addressed with RFC 7366.[30] A workaround for SSL 3.0 and TLS 1.0, roughly equivalent to random IVs from TLS 1.1, was widely adopted by many implementations in late 2011.[31] In 2014, the POODLE vulnerability of SSL 3.0 was discovered, which takes advantage of the known vulnerabilities in CBC, and an insecure fallback negotiation used in browsers.[32]

TLS 1.2 (2008) introduced a means to identify the hash used for digital signatures. While permitting the use of stronger hash functions for digital signatures in the future (rsa,sha256/sha384/sha512) over the SSL 3.0 conservative choice (rsa,sha1+md5), the TLS 1.2 protocol change inadvertently and substantially weakened the default digital signatures and provides (rsa,sha1) and even (rsa,md5).[33]

Datagram Transport Layer Security (DTLS or Datagram TLS) 1.0 is a modification of TLS 1.1 for a packet-oriented transport layer, where packet loss and packet reordering have to be tolerated. The revision DTLS 1.2 based on TLS 1.2 was published in January 2012.[34]

TLS 1.3 (2018) specified in RFC 8446 includes major optimizations and security improvements. QUIC (2021) specified in RFC 9000 and DTLS 1.3 (2022) specified in RFC 9147 builds on TLS 1.3. The publishing of TLS 1.3 and DTLS 1.3 obsoleted TLS 1.2 and DTLS 1.2.

Note that there are known vulnerabilities in SSL 2.0 and SSL 3.0. In 2021, IETF published RFC 8996 also forbidding negotiation of TLS 1.0, TLS 1.1, and DTLS 1.0 due to known vulnerabilities. NIST SP 800-52 requires support of TLS 1.3 by January 2024. Support of TLS 1.3 means that two compliant nodes will never negotiate TLS 1.2.

Implementation SSL 2.0 (insecure)[35] SSL 3.0 (insecure)[36] TLS 1.0 (deprecated)[37] TLS 1.1 (deprecated)[38] TLS 1.2[39] TLS 1.3 DTLS 1.0 (deprecated)[40] DTLS 1.2[34] DTLS 1.3[citation needed]
Botan No No[41] No No Yes Yes No Yes No
BoringSSL Yes Yes Yes Yes Yes Yes No
Bouncy Castle No No Yes Yes Yes Yes
(draft version)
Yes Yes No
BSAFE SSL-J[42] No Disabled by default No[a] No[a] Yes Yes No No No
cryptlib No Disabled by default at compile time Yes Yes Yes No No No
GnuTLS No[b] Disabled by default[43] Yes Yes Yes Yes[44] Yes Yes No
JSSE No[b] Disabled by default[45] Disabled by default[46] Disabled by default[46] Yes Yes Yes Yes No
LibreSSL No[47] No[48] Yes Yes Yes Yes Yes Yes[49] No
MatrixSSL No Disabled by default at compile time[50] Yes Yes Yes Yes Yes Yes No
Mbed TLS No No[51] No[51] No[51] Yes Yes
(experimental)
Yes[52] Yes[52] No
NSS No[c] Disabled by default[53] Yes Yes[54] Yes[55] Yes[56] Yes[54] Yes[57] No
OpenSSL No[58] Disabled by default Yes Yes[59] Yes[59] Yes Yes Yes[60] No
Rustls No[61] No[61] No[61] No[61] Yes[61] Yes[61] No No No
s2n[62] No Disabled by default Yes Yes Yes Yes No No No
Schannel XP, 2003[63] Disabled by default in MSIE 7 Enabled by default Enabled by default in MSIE 7 No No No No No No
Schannel Vista[64] Disabled by default Enabled by default Yes No No No No No No
Schannel 2008[64] Disabled by default Enabled by default Yes Disabled by default (KB4019276) Disabled by default (KB4019276) No No No No
Schannel 7, 2008R2[65] Disabled by default Disabled by default in MSIE 11 Yes Enabled by default in MSIE 11 Enabled by default in MSIE 11 No Yes[66] No[66] No
Schannel 8, 2012[65] Disabled by default Enabled by default Yes Disabled by default Disabled by default No Yes No No
Schannel 8.1, 2012R2, 10 RTM & v1511[65] Disabled by default Disabled by default in MSIE 11 Yes Yes Yes No Yes No No
Schannel 10 v1607 / 2016[67] No Disabled by default Yes Yes Yes No Yes Yes No
Schannel 11 / 2022[68] No Disabled by default Yes Yes Yes Yes Yes Yes No
Secure Transport

OS X 10.2-10.7, iOS 1-4

Yes Yes Yes No No No No No
Secure Transport OS X 10.8-10.10, iOS 5-8 No[d] Yes Yes Yes[d] Yes[d] Yes[d] No No
Secure Transport OS X 10.11, iOS 9 No No[d] Yes Yes Yes Yes Un­known No
Secure Transport OS X 10.13, iOS 11 No No[d] Yes Yes Yes Yes
(draft version)[69]
Yes Un­known No
wolfSSL No Disabled by default[70] Disabled by default[71] Yes Yes Yes Yes Yes Yes
Erlang/OTP SSL application[72] No [e] No [f] Disabled by default [e] Disabled by default [e] Yes Partially [g] Disabled by default [e] Yes No
Implementation SSL 2.0 (insecure)[35] SSL 3.0 (insecure)[36] TLS 1.0 (deprecated)[37] TLS 1.1 (deprecated)[38] TLS 1.2[39] TLS 1.3 DTLS 1.0 (deprecated)[40] DTLS 1.2[34] DTLS 1.3[citation needed]
  1. ^ a b As of SSL-J 7.0, support for TLS 1.0 and 1.1 has been removed
  2. ^ a b SSL 2.0 client hello is supported for backward compatibility reasons even though SSL 2.0 is not supported.
  3. ^ Server-side implementation of the SSL/TLS protocol still supports processing of received v2-compatible client hello messages."NSS 3.24 release notes". Mozilla Developer Network. Mozilla. Archived from the original on 2016-08-26. Retrieved 2016-06-19.
  4. ^ a b c d e f Secure Transport: SSL 2.0 was discontinued in OS X 10.8. SSL 3.0 was discontinued in OS X 10.11 and iOS 9.TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.9 and later."Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03.
  5. ^ a b c d Since OTP 22
  6. ^ Since OTP 23
  7. ^ "Erlang OTP SSL application TLS 1.3 compliance table".

NSA Suite B Cryptography

[edit]

Required components for NSA Suite B Cryptography (RFC 6460) are:

Per CNSSP-15, the 256-bit elliptic curve (specified in FIPS 186-2), SHA-256, and AES with 128-bit keys are sufficient for protecting classified information up to the Secret level, while the 384-bit elliptic curve (specified in FIPS 186-2), SHA-384, and AES with 256-bit keys are necessary for the protection of Top Secret information.

Implementation TLS 1.2 Suite B
Botan Yes
Bouncy Castle Yes
BSAFE Yes[42]
cryptlib Yes
GnuTLS Yes
JSSE Yes[73]
LibreSSL Yes
MatrixSSL Yes
Mbed TLS Yes
NSS No[74]
OpenSSL Yes[60]
Rustls Yes[61]
S2n
Schannel Yes[75]
Secure Transport No
wolfSSL Yes
Implementation TLS 1.2 Suite B

Certifications

[edit]

Note that certain certifications have received serious negative criticism from people who are actually involved in them.[76]

Implementation FIPS 140-1, FIPS 140-2[77] FIPS 140-3 Embedded FIPS Solution
Level 1 Level 2[disputeddiscuss] Level 1
Botan[78]
Bouncy Castle BC-FJA 1.0.0 (#2768)
BC-FJA 1.0.1 (#3152)
BSAFE SSL-J[79] Crypto-J 6.0 (1785, 1786)
Crypto-J 6.1 / 6.1.1.0.1 (2057, 2058)
Crypto-J 6.2 / 6.2.1.1 (2468, 2469)
Crypto-J 6.2.4 (3172, 3184)
Crypto-J 6.2.5 (#3819, #3820)
Crypto-J 6.3 (#4696, #4697)
cryptlib[80]
GnuTLS[81] Red Hat Enterprise Linux GnuTLS Cryptographic Module (#2780)
JSSE
LibreSSL[47] no support
MatrixSSL[82] SafeZone FIPS Cryptographic Module: 1.1 (#2389)
Mbed TLS[83]
NSS[84] Network Security Services: 3.2.2 (#247)
Network Security Services Cryptographic Module: 3.11.4 (#815), 3.12.4 (#1278), 3.12.9.1 (#1837)
Netscape Security Module: 1 (#7[notes 1]), 1.01 (#47[notes 2])
Network Security Services: 3.2.2 (#248[notes 3])
Network Security Services Cryptographic Module: 3.11.4 (#814[notes 4]), 3.12.4 (#1279, #1280[notes 5])
OpenSSL[85] OpenSSL FIPS Object Module: 1.0 (#624), 1.1.1 (#733), 1.1.2 (#918), 1.2, 1.2.1, 1.2.2, 1.2.3 or 1.2.4 (#1051)
2.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7 or 2.0.8 (#1747)
Rustls aws-lc FIPS module[86] (#4759)
Schannel[87] Cryptographic modules in Windows NT 4.0, 95, 95, 2000, XP, Server 2003, CE 5, CE 6, Mobile 6.x, Vista, Server 2008, 7, Server 2008 R2, 8, Server 2012, RT, Surface, Phone 8
See details on Microsoft FIPS 140 Validated Cryptographic Modules
Secure Transport Apple FIPS Cryptographic Module: 1.0 (OS X 10.6, #1514), 1.1 (OS X 10.7, #1701)
Apple OS X CoreCrypto Module; CoreCrypto Kernel Module: 3.0 (OS X 10.8, #1964, #1956), 4.0 (OS X 10.9, #2015, #2016)
Apple iOS CoreCrypto Module; CoreCrypto Kernel Module: 3.0 (iOS 6, #1963, #1944), 4.0 (iOS 7, #2020, #2021)
wolfSSL[88] wolfCrypt FIPS Module: 4.0 (#3389)
See details on NIST certificate for validated Operating Environments
wolfCrypt FIPS Module: 3.6.0 (#2425)
See details on NIST certificate for validated Operating Environments
wolfCrypt FIPS Module (#4178)
See details on NIST certificate
Yes
Implementation Level 1 Level 2 Level 1 Embedded FIPS Solution
FIPS 140-1, FIPS 140-2 FIPS 140-3
  1. ^ with Sun Sparc 5 w/ Sun Solaris v 2.4SE (ITSEC-rated)
  2. ^ with Sun Ultra-5 w/ Sun Trusted Solaris version 2.5.1 (ITSEC-rated)
  3. ^ with Solaris v8.0 with AdminSuite 3.0.1 as specified in UK IT SEC CC Report No. P148 EAL4 on a SUN SPARC Ultra-1
  4. ^ with these platforms; Red Hat Enterprise Linux Version 4 Update 1 AS on IBM xSeries 336 with Intel Xeon CPU, Trusted Solaris 8 4/01 on Sun Blade 2500 Workstation with UltraSPARC IIIi CPU
  5. ^ with these platforms; Red Hat Enterprise Linux v5 running on an IBM System x3550, Red Hat Enterprise Linux v5 running on an HP ProLiant DL145, Sun Solaris 10 5/08 running on a Sun SunBlade 2000 workstation, Sun Solaris 10 5/08 running on a Sun W2100z workstation

Key exchange algorithms (certificate-only)

[edit]

This section lists the certificate verification functionality available in the various implementations.

Implementation RSA[39] RSA-EXPORT (insecure)[39] DHE-RSA (forward secrecy)[39] DHE-DSS (forward secrecy)[39] ECDH-ECDSA[89] ECDHE-ECDSA (forward secrecy)[89] ECDH-RSA[89] ECDHE-RSA (forward secrecy)[89] GOST R 34.10-94, 34.10-2001[90]
Botan Disabled by default No Yes Disabled by default No Yes No Yes No
BSAFE Yes No Yes Yes Yes Yes Yes Yes No
cryptlib Yes No Yes Yes No Yes No No No
GnuTLS Yes No Yes Disabled by default[43] No Yes No Yes No
JSSE Yes Disabled by default Yes Yes Yes Yes Yes Yes No
LibreSSL Yes No[47] Yes Yes No Yes No Yes Yes[91]
MatrixSSL Yes No Yes No Yes Yes Yes Yes No
Mbed TLS Yes No Yes No Yes Yes Yes Yes No
NSS Yes Disabled by default Yes[92] Yes Yes Yes Yes Yes No[93][94]
OpenSSL Yes No[58] Yes Disabled by default[58] No Yes No Yes Yes[95]
Rustls No No No No No Yes[61] No Yes[61] No
Schannel XP/2003 Yes Yes No XP: Max 1024 bits
2003: 1024 bits only
No No No No No[96]
Schannel Vista/2008 Yes Disabled by default No 1024 bits by default[97] No Yes No except AES_GCM No[96]
Schannel 8/2012 Yes Disabled by default AES_GCM only[98][99][100] 1024 bits by default[97] No Yes No except AES_GCM No[96]
Schannel 7/2008R2, 8.1/2012R2 Yes Disabled by default Yes 2048 bits by default[97] No Yes No except AES_GCM No[96]
Schannel 10 Yes Disabled by default Yes 2048 bits by default[97] No Yes No Yes No[96]
Secure Transport OS X 10.6 Yes Yes except AES_GCM Yes Yes except AES_GCM yes except AES_GCM No
Secure Transport OS X 10.8-10.10 Yes No except AES_GCM No Yes except AES_GCM Yes except AES_GCM No
Secure Transport OS X 10.11 Yes No Yes No No Yes No Yes No
wolfSSL Yes No Yes No Yes Yes Yes Yes No
Erlang/OTP SSL application Yes No Yes Yes Yes Yes Yes Yes No
Implementation RSA[39] RSA-EXPORT (insecure)[39] DHE-RSA (forward secrecy)[39] DHE-DSS (forward secrecy)[39] ECDH-ECDSA[89] ECDHE-ECDSA (forward secrecy)[89] ECDH-RSA[89] ECDHE-RSA (forward secrecy)[89] GOST R 34.10-94, 34.10-2001[90]

Key exchange algorithms (alternative key-exchanges)

[edit]
Implementation SRP[101] SRP-DSS[101] SRP-RSA[101] PSK-RSA[102] PSK[102] DHE-PSK (forward secrecy)[102] ECDHE-PSK (forward secrecy)[103] KRB5[104] DH-ANON[39] (insecure) ECDH-ANON[89] (insecure)
Botan No No No No Yes No Yes No No No
BSAFE SSL-J No No No No Yes[105] No No No Disabled by default Disabled by default
cryptlib No No No No Yes Yes No Un­known No No
GnuTLS Yes Yes Yes Yes Yes Yes Yes No Disabled by default Disabled by default
JSSE No No No No No No No No Disabled by default Disabled by default
LibreSSL No[106] No[106] No[106] No No No No No Yes Yes
MatrixSSL No No No Yes Yes Yes No No Disabled by default No
Mbed TLS No No No Yes Yes Yes Yes No No No
NSS No[107] No[107] No[107] No[108] No[108] No[108] No[108] No Client side only, disabled by default[109] Disabled by default[110]
OpenSSL Yes Yes Yes Yes Yes Yes Yes Yes[111] Disabled by default[112] Disabled by default[112]
Rustls No No No No No No No No No No
Schannel No No No No No No No Yes No No
Secure Transport No No No No No No No Un­known Yes Yes
wolfSSL Yes Yes Yes Yes Yes Yes Yes[113] Yes No No
Erlang/OTP SSL application Disabled by default Disabled by default Disabled by default Disabled by default Disabled by default Disabled by default No No Disabled by default Disabled by default
Implementation SRP[101] SRP-DSS[101] SRP-RSA[101] PSK-RSA[102] PSK[102] DHE-PSK (forward secrecy)[102] ECDHE-PSK (forward secrecy)[103] KRB5[104] DH-ANON[39] (insecure) ECDH-ANON[89] (insecure)

Certificate verification methods

[edit]
Implementation Application-defined PKIX path validation[114] CRL[115] OCSP[116] DANE (DNSSEC)[117][118] Trust on First Use (TOFU) CT[119]
Botan Yes Yes Yes Yes No No Un­known
Bouncy Castle Yes Yes Yes Yes Yes No Un­known
BSAFE Yes Yes Yes Yes No No Un­known
cryptlib Yes Yes Yes Yes No No Un­known
GnuTLS Yes Yes Yes Yes Yes Yes Un­known
JSSE Yes Yes Yes Yes No No No
LibreSSL Yes Yes Yes Yes No No Un­known
MatrixSSL Yes Yes Yes Yes[120] No No Un­known
Mbed TLS Yes Yes Yes No[121] No No Un­known
NSS Yes Yes Yes Yes No[122] No Un­known
OpenSSL Yes Yes Yes Yes Yes No Yes
Rustls Yes Yes Yes No No No No
s2n No [123] Un­known [124] Un­known [125]
Schannel Un­known Yes Yes[126] Yes[126] No No Un­known
Secure Transport Yes Yes Yes Yes No No Un­known
wolfSSL Yes Yes Yes Yes No No Un­known
Erlang/OTP SSL application Yes Yes Yes No No No Un­known
Implementation Application-defined PKIX path validation CRL OCSP DANE (DNSSEC) Trust on First Use (TOFU) CT

Encryption algorithms

[edit]
Implementation Block cipher with mode of operation Stream cipher None
AES GCM
[127]
AES CCM
[128]
AES CBC Camellia GCM
[129]
Camellia CBC
[130][129]
ARIA GCM
[131]
ARIA CBC
[131]
SEED CBC
[132]
3DES EDE CBC
(insecure)[133]
GOST 28147-89 CNT
(proposed)
[90][n 1]
ChaCha20-Poly1305
[134]
Null
(insecure)
[n 2]
Botan Yes Yes Yes Yes Yes No No Disabled by default Disabled by default No Yes[135] Not implemented
BoringSSL Yes No Yes No No No No No Yes No Yes
BSAFE SSL-J Yes Yes Yes No No No No No Disabled by default No No Disabled by default
cryptlib Yes No Yes No No No No No Yes No No Not implemented
GnuTLS Yes Yes[43] Yes Yes Yes No No No Disabled by default[136] No Yes[137] Disabled by default
JSSE Yes No Yes No No No No No Disabled by default[138] No Yes
(JDK 12+)[139]
Disabled by default
LibreSSL Yes[47] No Yes No Yes[91] No No No[47] Yes Yes[91] Yes[47] Disabled by default
MatrixSSL Yes No Yes No No No No Yes Disabled by default No Yes[140] Disabled by default
Mbed TLS Yes Yes [141] Yes Yes Yes Yes[142] Yes[142] No No[51] No Yes[143] Disabled by default at compile time
NSS Yes[144] No Yes No[145][n 3] Yes[146] No No Yes[147] Yes No[93][94] Yes[148] Disabled by default
OpenSSL Yes[149] Disabled by default[58] Yes No Disabled by default[58] Disabled by default[150] No Disabled by default[58] Disabled by default[58] Yes[95] Yes[58] Disabled by default
Rustls Yes[61] No No No No No No No No No Yes[61] Not implemented
Schannel XP/2003 No No 2003 only[151] No No No No No Yes No[96] No Disabled by default
Schannel Vista/2008, 2008R2, 2012 No No Yes No No No No No Yes No[96] No Disabled by default
Schannel 7, 8, 8.1/2012R2 Yes except ECDHE_RSA
[98][99]
No Yes No No No No No Yes No[96] No Disabled by default
Schannel 10[152] Yes No Yes No No No No No Yes No[96] No Disabled by default
Secure Transport OS X 10.6 - 10.10 No No Yes No No No No No Yes No No Disabled by default
Secure Transport OS X 10.11 Yes No Yes No No No No No Yes No No Disabled by default
wolfSSL Yes Yes Yes No No No No No Yes No Yes Disabled by default
Erlang/OTP SSL application Yes No Yes No No No No No Disabled by default No Experimental Disable by default
Implementation Block cipher with mode of operation Stream cipher None
AES GCM
[127]
AES CCM
[128]
AES CBC Camellia GCM
[129]
Camellia CBC
[130][129]
ARIA GCM
[131]
ARIA CBC
[131]
SEED CBC
[132]
3DES EDE CBC
(insecure)[133]
GOST 28147-89 CNT
(proposed)
[90][n 1]
ChaCha20-Poly1305
[134]
Null
(insecure)
[n 2]
Notes
  1. ^ a b This algorithm is not defined yet as TLS cipher suites in RFCs, is proposed in drafts.
  2. ^ a b authentication only, no encryption
  3. ^ This algorithm is implemented in an NSS fork used by Pale Moon.

Obsolete algorithms

[edit]
Implementation Block cipher with mode of operation Stream cipher
IDEA CBC
[n 1](insecure)[154]
DES CBC
(insecure)
[n 1]
DES-40 CBC
(EXPORT, insecure)
[n 2]
RC2-40 CBC
(EXPORT, insecure)
[n 2]
RC4-128
(insecure)
[n 3]
RC4-40
(EXPORT, insecure)
[n 4][n 2]
Botan No No No No No[155] No
BoringSSL No No No No Disabled by default at compile time No
BSAFE SSL-J No Disabled by default Disabled by default No Disabled by default Disabled by default
cryptlib No Disabled by default at compile time No No Disabled by default at compile time No
GnuTLS No No No No Disabled by default[43] No
JSSE No Disabled by default Disabled by default No Disabled by default Disabled by default [156]
LibreSSL Yes Yes No[47] No[47] Yes No[47]
MatrixSSL Yes No No No Disabled by default No
Mbed TLS No Disabled by default at compile time No No Disabled by default at compile time[52] No
NSS Yes Disabled by default Disabled by default Disabled by default Lowest priority[157][158] Disabled by default
OpenSSL Disabled by default[58] Disabled by default No[58] No[58] Disabled by default No[58]
Rustls No No No No No No
Schannel XP/2003 No Yes Yes Yes Yes Yes
Schannel Vista/2008 No Disabled by default Disabled by default Disabled by default Yes Disabled by default
Schannel 7/2008R2 No Disabled by default Disabled by default Disabled by default Lowest priority
will be disabled soon[159]
Disabled by default
Schannel 8/2012 No Disabled by default Disabled by default Disabled by default Only as fallback Disabled by default
Schannel 8.1/2012R2 No Disabled by default Disabled by default Disabled by default Disabled by default[159] Disabled by default
Schannel 10[152] No Disabled by default Disabled by default Disabled by default Disabled by default[159] Disabled by default
Secure Transport OS X 10.6 Yes Yes Yes Yes Yes Yes
Secure Transport OS X 10.7 Yes Un­known Un­known Un­known Yes Un­known
Secure Transport OS X 10.8-10.9 Yes Disabled by default Disabled by default Disabled by default Yes Disabled by default
Secure Transport OS X 10.10-10.11 Yes Disabled by default Disabled by default Disabled by default Lowest priority Disabled by default
Secure Transport macOS 10.12 Yes Disabled by default Disabled by default Disabled by default Disabled by default Disabled by default
wolfSSL Disabled by default[160] No No No Disabled by default No
Erlang/OTP SSL application no Disabled by default no no Disabled by default no
Implementation Block cipher with mode of operation Stream cipher
IDEA CBC
[n 1](insecure)[154]
DES CBC
(insecure)
[n 1]
DES-40 CBC
(EXPORT, insecure)
[n 2]
RC2-40 CBC
(EXPORT, insecure)
[n 2]
RC4-128
(insecure)
[n 3]
RC4-40
(EXPORT, insecure)
[n 4][n 2]
Notes
  1. ^ a b c d IDEA and DES have been removed from TLS 1.2.[153]
  2. ^ a b c d e f 40 bits strength of cipher suites were designed to operate at reduced key lengths in order to comply with US regulations about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak suites are forbidden in TLS 1.1 and later.
  3. ^ a b The RC4 attacks weaken or break RC4 used in SSL/TLS. Use of RC4 is prohibited by RFC 7465.
  4. ^ a b The RC4 attacks weaken or break RC4 used in SSL/TLS.

Supported elliptic curves

[edit]

This section lists the supported elliptic curves by each implementation.

Defined curves in RFC 8446 (for TLS 1.3) and RFC 8422, 7027 (for TLS 1.2 and earlier)

[edit]
applicable TLS version TLS 1.3 and earlier TLS 1.2 and earlier
Implementation secp256r1
prime256v1
NIST P-256
(0x0017,[161] 23[162])
secp384r1
NIST P-384
(0x0018,[161] 24[162])
secp521r1
NIST P-521
(0x0019,[161] 25[162])
X25519
(0x001D,[161] 29[162])
X448
(0x001E,[161] 30[162])
brainpoolP256r1
(26)[163]
brainpoolP384r1
(27)[163]
brainpoolP512r1
(28)[163]
Botan Yes Yes Yes Yes[135] No Yes[164] Yes[164] Yes[164]
BoringSSL Yes Yes Yes (disabled by default) Yes No No No No
BSAFE Yes Yes Yes No No No No No
GnuTLS Yes Yes Yes Yes[165] Yes[166] No No No
JSSE Yes Yes Yes Yes
x25519: JDK 13+[167]
Ed25519:JDK 15+[168]
Yes
x448: JDK 13+[167]
Ed448: JDK 15+[168]
No No No
LibreSSL Yes Yes Yes Yes[169] No Yes[47] Yes[47] Yes[47]
MatrixSSL Yes Yes Yes TLS 1.3 only[170] No Yes Yes Yes
Mbed TLS Yes Yes Yes Primitive only[171] Primitive only[172] Yes[173] Yes[173] Yes[173]
NSS Yes Yes Yes Yes[174] No[175][176] No[177] No[177] No[177]
OpenSSL Yes Yes Yes Yes[178][179] Yes[180][181] Yes[60] Yes[60] Yes[60]
Rustls Yes Yes No Yes No No No No
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10 Yes Yes Yes No No No No No
Secure Transport Yes Yes Yes No No No No No
wolfSSL Yes Yes Yes Yes[182] Yes[183] Yes Yes Yes
Erlang/OTP SSL application Yes Yes Yes No No Yes Yes Yes
Implementation secp256r1
prime256v1
NIST P-256
(0x0017, 23)
secp384r1
NIST P-384
(0x0018, 24)
secp521r1
NIST P-521
(0x0019, 25)
X25519
(0x001D, 29)
X448
(0x001E, 30)
brainpoolP256r1
(26)
brainpoolP384r1
(27)
brainpoolP512r1
(28)

Proposed curves

[edit]
Implementation M221
Curve2213
[184]
E222
[184]
Curve1174
[184]
E382
[184]
M383
[184]
Curve383187
[184]
Curve41417
Curve3617
[184]
M511
Curve511187
[184]
E521
[184]
Botan No No No No No No No No No
BoringSSL No No No No No No No No No
BSAFE No No No No No No No No No
GnuTLS No No No No No No No No No
JSSE No No No No No No No No No
LibreSSL No No No No No No No No No
MatrixSSL No No No No No No No No No
Mbed TLS No No No No No No No No No
NSS No No No No No No No No No
OpenSSL No No No No No No No No No
Rustls No No No No No No No No No
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10 No No No No No No No No No
Secure Transport No No No No No No No No No
wolfSSL No No No No No No No No No
Erlang/OTP SSL application No No No No No No No No No
Implementation M221
Curve2213
E222 Curve1174 E382 M383 Curve383187 Curve41417
Curve3617
M511
Curve511187
E521

Deprecated curves in RFC 8422

[edit]
Implementation sect163k1
NIST K-163
(1)[89]
sect163r1
(2)[89]
sect163r2
NIST B-163
(3)[89]
sect193r1
(4)[89]
sect193r2
(5)[89]
sect233k1
NIST K-233
(6)[89]
sect233r1
NIST B-233
(7)[89]
sect239k1
(8)[89]
sect283k1
NIST K-283
(9)[89]
sect283r1
NIST B-283
(10)[89]
sect409k1
NIST K-409
(11)[89]
sect409r1
NIST B-409
(12)[89]
sect571k1
NIST K-571
(13)[89]
sect571r1
NIST B-571
(14)[89]
Botan No No No No No No No No No No No No No No
BoringSSL No No No No No No No No No No No No No No
BSAFE Yes No Yes No No Yes Yes No Yes Yes Yes Yes Yes Yes
GnuTLS No No No No No No No No No No No No No No
JSSE Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b]
LibreSSL Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
MatrixSSL No No No No No No No No No No No No No No
Mbed TLS No No No No No No No No No No No No No No
NSS Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
OpenSSL Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Rustls No No No No No No No No No No No No No No
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10 No No No No No No No No No No No No No No
Secure Transport No No No No No No No No No No No No No No
wolfSSL No No No No No No No No No No No No No No
Erlang/OTP SSL application Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Implementation sect163k1
NIST K-163
(1)
sect163r1
(2)
sect163r2
NIST B-163
(3)
sect193r1
(4)
sect193r2
(5)
sect233k1
NIST K-233
(6)
sect233r1
NIST B-233
(7)
sect239k1
(8)
sect283k1
NIST K-283
(9)
sect283r1
NIST B-283
(10)
sect409k1
NIST K-409
(11)
sect409r1
NIST B-409
(12)
sect571k1
NIST K-571
(13)
sect571r1
NIST B-571
(14)
Implementation secp160k1
(15)[89]
secp160r1
(16)[89]
secp160r2
(17)[89]
secp192k1
(18)[89]
secp192r1
prime192v1
NIST P-192
(19)[89]
secp224k1
(20)[89]
secp224r1
NIST P-244
(21)[89]
secp256k1
(22)[89]
arbitrary prime curves
(0xFF01)[89][187]
arbitrary char2 curves
(0xFF02)[89][187]
Botan No No No No No No No No No No
BoringSSL No No No No No No Yes No No No
BSAFE No No No No Yes No Yes No No No
GnuTLS No No No No Yes No Yes No No No
JSSE Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] Notes[a][b] No No
LibreSSL Yes Yes Yes Yes Yes Yes Yes Yes No No
MatrixSSL No No No No Yes No Yes No No No
Mbed TLS No No No Yes Yes Yes Yes Yes No No
NSS Yes Yes Yes Yes Yes Yes Yes Yes No No
OpenSSL Yes Yes Yes Yes Yes Yes Yes Yes No No
Rustls No No No No No No No No No No
Schannel Vista/2008, 7/2008R2, 8/2012, 8.1/2012R2, 10 No No No No No No No No No No
Secure Transport No No No No Yes No No No No No
wolfSSL Yes Yes Yes Yes Yes Yes Yes Yes No No
Erlang/OTP SSL application Yes Yes Yes Yes Yes Yes Yes Yes No No
Implementation secp160k1
(15)
secp160r1
(16)
secp160r2
(17)
secp192k1
(18)
secp192r1
prime192v1
NIST P-192
(19)
secp224k1
(20)
secp224r1
NIST P-244
(21)
secp256k1
(22)
arbitrary prime curves
(0xFF01)
arbitrary char2 curves
(0xFF02)
Notes
  1. ^ a b c d e f g h i j k l m n o p q r s t u v These elliptic curves were "Disabled by Default" in current JDK families as part of JDK-8236730.[185]
  2. ^ a b c d e f g h i j k l m n o p q r s t u v These elliptic curves were subsequently removed in JDK 16+ as part of JDK-8252601.[186]

Data integrity

[edit]
Implementation HMAC-MD5 HMAC-SHA1 HMAC-SHA256/384 AEAD GOST 28147-89 IMIT[90] GOST R 34.11-94[90]
Botan No Yes Yes Yes No No
BSAFE Yes Yes Yes Yes No No
cryptlib Yes Yes Yes Yes No No
GnuTLS Yes Yes Yes Yes No No
JSSE Disabled by Default Yes Yes Yes No No
LibreSSL Yes Yes Yes Yes Yes[91] Yes[91]
MatrixSSL Yes Yes Yes Yes No No
Mbed TLS Yes Yes Yes Yes No No
NSS Yes Yes Yes Yes No[93][94] No[93][94]
OpenSSL Yes Yes Yes Yes Yes[95] Yes[95]
Rustls No No No Yes No No
Schannel XP/2003, Vista/2008 Yes Yes XP SP3, 2003 SP2 via hotfix[188] No No[96] No[96]
Schannel 7/2008R2, 8/2012, 8.1/2012R2 Yes Yes Yes except ECDHE_RSA[98][99][100] No[96] No[96]
Schannel 10 Yes Yes Yes Yes[152] No[96] No[96]
Secure Transport Yes Yes Yes Yes No No
wolfSSL Yes Yes Yes Yes No No
Erlang/OTP SSL application Yes Yes Yes Yes No No
Implementation HMAC-MD5 HMAC-SHA1 HMAC-SHA256/384 AEAD GOST 28147-89 IMIT GOST R 34.11-94

Compression

[edit]

Note the CRIME security exploit takes advantage of TLS compression, so conservative implementations do not enable compression at the TLS level. HTTP compression is unrelated and unaffected by this exploit, but is exploited by the related BREACH attack.

Implementation DEFLATE[189]
(insecure)
Botan No
BSAFE[42] No
cryptlib No
GnuTLS Disabled by default
JSSE No
LibreSSL No[47]
MatrixSSL Disabled by default
Mbed TLS Disabled by default
NSS Disabled by default
OpenSSL Disabled by default
Rustls No
Schannel No
Secure Transport No
wolfSSL Disabled by default
Erlang/OTP SSL application No
Implementation DEFLATE

Extensions

[edit]

In this section the extensions each implementation supports are listed. Note that the Secure Renegotiation extension is critical for HTTPS client security [citation needed]. TLS clients not implementing it are vulnerable to attacks, irrespective of whether the client implements TLS renegotiation.

Implementation Secure Renegotiation
[190]
Server Name Indication
[191]
ALPN
[192]
Certificate Status Request
[191]
OpenPGP
[193]
Supplemental Data
[194]
Session Ticket
[195]
Keying Material Exporter
[196]
Maximum Fragment Length
[191]
Truncated HMAC
[191]
Encrypt-then-MAC
[30]
TLS Fallback SCSV
[197]
Extended Master Secret
[198]
ClientHello Padding
[199]
Raw Public Keys
[200]
Botan Yes Yes Yes[201] No No No Yes Yes Yes No Yes Yes[202] Yes[203] No Un­known
BSAFE SSL-J Yes Yes No Yes No No No No Yes No No No Yes No No
cryptlib Yes Yes No No No Yes No No No[204] No Yes Yes Yes No Un­known
GnuTLS Yes Yes Yes[205] Yes No[206] Yes Yes Yes Yes No Yes[43] Yes[207] Yes[43] Yes[208] Yes[209]
JSSE Yes Yes[73] Yes[73] Yes No No Yes No Yes No No No Yes No No
LibreSSL Yes Yes Yes[210] Yes No No? Yes Yes? No No No Server side only[211] No Yes No
MatrixSSL Yes Yes Yes[212] Yes[140] No No Yes No Yes Yes No Yes[140] Yes[140] No Un­known
Mbed TLS Yes Yes Yes[213] No No No Yes No Yes Disabled by default[52] Yes[214] Yes[214] Yes[214] No No
NSS Yes Yes Yes[215] Yes No[216] No Yes Yes No No No[217] Yes[218] Yes[219] Yes[215] Un­known
OpenSSL Yes Yes Yes[60] Yes No No? Yes Yes Yes No Yes Yes[220] Yes[58] Yes[221] Yes[222]
Rustls Yes Yes Yes Yes No No Yes Yes No No No No [223] Yes No Un­known
Schannel XP/2003 No No No No No Yes No No No No No No No No Un­known
Schannel Vista/2008 Yes Yes No No No Yes No No No No No No Yes[224] No Un­known
Schannel 7/2008R2 Yes Yes No Yes No Yes No No No No No No Yes[224] No Un­known
Schannel 8/2012 Yes Yes No Yes No Yes Client side only[225] No No No No No Yes[224] No Un­known
Schannel 8.1/2012R2, 10 Yes Yes Yes Yes No Yes Yes[225] No No No No No Yes[224] No Un­known
Secure Transport Yes Yes Un­known No No Yes No No No No No No No No Un­known
wolfSSL Yes Yes Yes[160] Yes No No Yes No Yes Yes Yes[226] No Yes No Yes[227]
Erlang/OTP SSL application Yes Yes Yes No No No No No No No No Yes No No Un­known
Implementation Secure Renegotiation Server Name Indication ALPN Certificate Status Request OpenPGP Supplemental Data Session Ticket Keying Material Exporter Maximum Fragment Length Truncated HMAC Encrypt-then-MAC TLS Fallback SCSV Extended Master Secret ClientHello Padding Raw Public Keys

Assisted cryptography

[edit]

This section lists the known ability of an implementation to take advantage of CPU instruction sets that optimize encryption, or utilize system specific devices that allow access to underlying cryptographic hardware for acceleration or for data separation.

Implementation PKCS #11 device Intel AES-NI VIA PadLock ARMv8-A Intel SGX Intel QAT Intel SHA NXP CAAM
Botan Yes[228] Yes No Yes No No No
BSAFE SSL-J [a][b] Yes Yes No Yes No No Yes No
cryptlib Yes Yes Yes No No
Crypto++ Yes No Yes
GnuTLS Yes Yes Yes Yes[231] No No Yes
JSSE Yes Yes[232] No No No No
LibreSSL No Yes Yes No No
MatrixSSL Yes Yes No Yes No No
Mbed TLS Yes Yes[233] Yes No No No
NSS Yes[234] Yes[235] No[236] No No No
OpenSSL Yes[237] Yes Yes Yes[238] No Yes Partial
Rustls Yes Yes Yes
Schannel No Yes No No No No
Secure Transport No Yes[239][240] No Yes No No
wolfSSL Yes Yes No Yes Yes Yes[241] Yes[242]
Implementation PKCS #11 device Intel AES-NI VIA PadLock ARMv8-A Intel SGX Intel QAT Intel SHA NXP CAAM
  1. ^ Pure Java implementations relies on JVM processor optimization capabilities, such as OpenJDK support for AES-NI[229]
  2. ^ BSAFE SSL-J can be configured to run in native mode, using BSAFE Crypto-C Micro Edition to benefit from processor optimization.[230]

System-specific backends

[edit]

This section lists the ability of an implementation to take advantage of the available operating system specific backends, or even the backends provided by another implementation.

Implementation /dev/crypto af_alg Windows CSP CommonCrypto OpenSSL engine
Botan No No No No Partial
BSAFE No No No No No
cryptlib No No No No No
GnuTLS Yes Yes No No No
JSSE No No Yes No No
LibreSSL No No No No No[243]
MatrixSSL No No No Yes Yes
Mbed TLS No No No No No
NSS No No No No No
OpenSSL Yes Yes No No Yes
Rustls No Yes [244] No No No
Schannel No No Yes No No
Secure Transport No No No Yes No
wolfSSL Yes Yes Partial No Yes[245]
Erlang/OTP SSL application No No No No Yes
Implementation /dev/crypto af_alg Windows CSP CommonCrypto OpenSSL engine

Cryptographic module/token support

[edit]
Implementation TPM support Hardware token support Objects identified via
Botan Partial[203] PKCS #11
BSAFE SSL-J No No
cryptlib No PKCS #11 User-defined label
GnuTLS Yes PKCS #11 RFC 7512 PKCS #11 URLs[246]
JSSE No PKCS11 Java Cryptography Architecture,
Java Cryptography Extension
LibreSSL Yes PKCS #11 (via 3rd party module) Custom method
MatrixSSL No PKCS #11
Mbed TLS No PKCS #11 (via libpkcs11-helper) or standard hooks Custom method
NSS No PKCS #11
OpenSSL Yes PKCS #11 (via 3rd party module)[247] RFC 7512 PKCS #11 URLs[246]
Rustls No Microsoft CryptoAPI [248] Custom method
Schannel No Microsoft CryptoAPI UUID, User-defined label
Secure Transport
wolfSSL Yes PKCS #11
Implementation TPM support Hardware token support Objects identified via

Code dependencies

[edit]
Implementation Dependencies Optional dependencies
Botan C++20 SQLite
zlib (compression)
bzip2 (compression)
liblzma (compression)
boost
trousers (TPM)
GnuTLS libc
nettle
gmp
zlib (compression)
p11-kit (PKCS #11)
trousers (TPM)
libunbound (DANE)
JSSE Java
MatrixSSL none zlib (compression)
MatrixSSL-open libc or newlib
Mbed TLS libc libpkcs11-helper (PKCS #11)
zlib (compression)
NSS libc
libnspr4
libsoftokn3
libplc4
libplds4
zlib (compression)
Rustls rust core library rust std library
zlib-rs (compression)
brotli (compression)
ring (cryptography)
aws-lc-rs (cryptography)
OpenSSL libc zlib (compression)
brotli (compression)
zstd (compression)
wolfSSL None libc
zlib (compression)
Erlang/OTP SSL application libcrypto (from OpenSSL), Erlang/OTP and its public_key, crypto and asn1 applications Erlang/OTP -inets (http fetching of CRLs)
Implementation Dependencies Optional dependencies

Development environment

[edit]
Implementation Namespace Build tools API manual Crypto back-end OpenSSL compatibility Layer[clarify]
Botan Botan::TLS Makefile Sphinx Included (pluggable) No
Bouncy Castle org.bouncycastle Java Development Environment Programmers reference manual (PDF) Included (pluggable) No
BSAFE SSL-J com.rsa.asn1[a]

com.rsa.certj[b]
com.rsa.jcp[c]
com.rsa.jsafe[d]
com.rsa.ssl[e]
com.rsa.jsse[f]

Java classloader Javadoc, Developer's guide (HTML) Included No
cryptlib crypt* makefile, MSVC project workspaces Programmers reference manual (PDF), architecture design manual (PDF) Included (monolithic) No
GnuTLS gnutls_* Autoconf, automake, libtool Manual and API reference (HTML, PDF) External, libnettle Yes (limited)
JSSE javax.net.ssl

sun.security.ssl

Makefile API Reference (HTML) +

JSSE Reference Guide

Java Cryptography Architecture,
Java Cryptography Extension
No
MatrixSSL matrixSsl_*

ps*

Makefile, MSVC project workspaces, Xcode projects for OS X and iOS API Reference (PDF), Integration Guide Included (pluggable) Yes (Subset: SSL_read, SSL_write, etc.)
Mbed TLS mbedtls_ssl_*

mbedtls_sha1_*
mbedtls_md5_*
mbedtls_x509*
...

Makefile, CMake, MSVC project workspaces, yotta API Reference + High Level and Module Level Documentation (HTML) Included (monolithic) No
NSS CERT_*

SEC_*
SECKEY_*
NSS_*
PK11_*
SSL_*
...

Makefile Manual (HTML) Included, PKCS#11 based[249] Yes (separate package called nss_compat_ossl[250])
OpenSSL SSL_*

SHA1_*
MD5_*
EVP_*
...

Makefile Man pages Included (monolithic)
Rustls rustls:: cargo API reference and design manual Two options included (pluggable) Yes[251] (subset)
wolfSSL wolfSSL_*

CyaSSL_*
SSL_*

Autoconf, automake, libtool, MSVC project workspaces, XCode projects, CodeWarrior projects, MPLAB X projects, Keil, IAR, Clang, GCC, e2Studio Manual and API Reference (HTML, PDF) Included (monolithic) Yes (about 60% of API)
Implementation Namespace Build tools API manual Crypto back-end OpenSSL compatibility layer
  1. ^
    ASN.1 manipulation classes
  2. ^
    Cert-J proprietary API
  3. ^
    Certificate Path manipulation classes
  4. ^
    Crypto-J proprietary API, JCE, CMS and PKI
  5. API
  6. ^
    SSLJ proprietary API
  7. ^
    JSSE API

Portability concerns

[edit]
Implementation Platform requirements Network requirements Thread safety Random seed Able to cross-compile No OS (bare metal) Supported operating systems
Botan C++11 None Thread-safe Platform-dependent Yes Windows, Linux, macOS, Android, iOS, FreeBSD, OpenBSD, Solaris, AIX, HP-UX, QNX, BeOS, IncludeOS
BSAFE SSL-J Java Java SE network components Thread-safe Depends on java.security.SecureRandom Yes No FreeBSD, Linux, macOS, Microsoft Windows, Android, AIX, Solaris
cryptlib C89 POSIX send() and recv(). API to supply your own replacement Thread-safe Platform-dependent, including hardware sources Yes Yes AMX, BeOS, ChorusOS, DOS, eCos, FreeRTOS/OpenRTOS, uItron, MVS, OS/2, Palm OS, QNX Neutrino, RTEMS, Tandem NonStop, ThreadX, uC/OS II, Unix (AIX, FreeBSD, HPUX, Linux, macOS, Solaris, etc.), VDK, VM/CMS, VxWorks, Win16, Win32, Win64, WinCE/PocketPC/etc, XMK
GnuTLS C89 POSIX send() and recv(). API to supply your own replacement. Thread-safe, needs custom mutex hooks if neither POSIX nor Windows threads are available. Platform dependent Yes No Generally any POSIX platforms or Windows, commonly tested platforms include Linux, Win32/64, macOS, Solaris, OpenWRT, FreeBSD, NetBSD, OpenBSD.
JSSE Java Java SE network components Thread-safe Depends on java.security.SecureRandom Yes Java based, platform-independent
MatrixSSL C89 None Thread-safe Platform dependent Yes Yes All
Mbed TLS C89 POSIX read() and write(). API to supply your own replacement. Threading layer available (POSIX or own hooks) Random seed set through entropy pool Yes Yes Known to work on: Win32/64, Linux, macOS, Solaris, FreeBSD, NetBSD, OpenBSD, OpenWRT, iPhone (iOS), Xbox, Android, eCos, SeggerOS, RISC OS
NSS C89, NSPR[252] NSPR[252] PR_Send() and PR_Recv(). API to supply your own replacement. Thread-safe Platform dependent[253] Yes (but cumbersome) No AIX, Android, FreeBSD, NetBSD, OpenBSD, BeOS, HP-UX, IRIX, Linux, macOS, OS/2, Solaris, OpenVMS, Amiga DE, Windows, WinCE, Sony PlayStation
Rustls Rust (programming language) None Thread-safe Platform dependent Yes Yes All supported by Rust (programming language)
OpenSSL C89 None Thread-safe Platform dependent Yes No Unix-like, DOS (with djgpp), Windows, OpenVMS, NetWare, eCos
wolfSSL C89 POSIX send() and recv(). API to supply your own replacement. Thread-safe Random seed set through wolfCrypt Yes Yes Win32/64, Linux, macOS, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, Yocto Project, OpenEmbedded, WinCE, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and Gamecube through DevKitPro, QNX, MontaVista, NonStop, TRON/ITRON/μITRON, eCos, Micrium μC/OS-III, FreeRTOS, SafeRTOS, NXP/Freescale MQX, Nucleus, TinyOS, HP/UX, AIX, ARC MQX, Keil RTX, TI-RTOS, uTasker, embOS, INtime, Mbed, uT-Kernel, RIOT, CMSIS-RTOS, FROSTED, Green Hills INTEGRITY, TOPPERS, PetaLinux, Apache mynewt
Implementation Platform requirements Network requirements Thread safety Random seed Able to cross-compile No OS (bare metal) Supported operating systems

See also

[edit]
  • SCTP — with DTLS support
  • DCCP — with DTLS support
  • SRTP — with DTLS support (DTLS-SRTP) and Secure Real-Time Transport Control Protocol (SRTCP)

References

[edit]
  1. ^ "Botan: Release Notes". Retrieved 2024-08-13.
  2. ^ "Release Notes - bouncycastle.org". 2023-11-13. Retrieved 2023-11-18.
  3. ^ "Java LTS Resources - bouncycastle.org". 2024-03-01. Retrieved 2024-03-31.
  4. ^ "Java FIPS Resources - bouncycastle.org". 2023-09-28. Retrieved 2022-09-29.
  5. ^ "The Legion of the Bouncy Castle C# Cryptography APIs". 2024-02-05. Retrieved 2024-02-06.
  6. ^ "C# .NET FIPS Resources - bouncycastle.org". 2023-02-28. Retrieved 2023-02-28.
  7. ^ "Dell BSAFE SSL-J 6.6 Release Advisory". Dell.
  8. ^ "Dell BSAFE SSL-J 7.3.1 Release Advisory". Dell.
  9. ^ "Dell BSAFE Micro Edition Suite 4.6.2 Release Advisory".
  10. ^ "Dell BSAFE Micro Edition Suite 5.0.2.1 Release Advisory".
  11. ^ Gutmann, Peter (2019). "Downloading". cryptlib. University of Auckland School of Computer Science. Retrieved 2019-08-07.
  12. ^ "gnutls 3.8.5".
  13. ^ "Java™ SE Development Kit 23, 23.0.1 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
  14. ^ "Java™ SE Development Kit 21, 21.0.5 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
  15. ^ "Java™ SE Development Kit 17, 17.0.13 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
  16. ^ "Java™ SE Development Kit 11, 11.0.25 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
  17. ^ "Java™ SE Development Kit 8, Update 431 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
  18. ^ "LibreSSL 4.0.0 Released". 14 October 2024. Retrieved 15 October 2024.
  19. ^ The features listed are for the closed source version
  20. ^ "MatrixSSL 4.2.2 Open release". 2019-09-11. Retrieved 2020-03-20.
  21. ^ "Release 3.6.2". 15 October 2024. Retrieved 22 October 2024.
  22. ^ a b "NSS:Release versions". Mozilla Wiki. Retrieved 7 November 2022.
  23. ^ "OpenSSL 3.4.0". 22 October 2024. Retrieved 22 October 2024.
  24. ^