MatrixSSL 3.6.2

Embedded SSL/TLS library under 50KB, designed for small footprint applications and devices
MatrixSSL is an embedded SSL/TLS library under 50KB, designed for small footprint applications and devices. Secure Sockets Layer (SSL) and the next generation Transport Layer Security (TLS) are the most widely deployed protocols for creating secure connections between applications on a network.

SSL is used to secure proprietary applications as well as common Internet protocols such as HTTP, SIP, H.323 and EAP-TLS.

PeerSec Networks also provides an embedded SSH solution for Linux based devices. Embedded SSH is primarily used to securely manage a device through a command line interface, while embedded SSL provides security at the sockets layer for a variety of network protocols. SSH is provided as an add on component to MatrixSSL.

MatrixSSL supports all operating systems and has been ported to OSs including Mac OS X, VxWorks, uClinux, eCos, Nucleus, BREW, pSOS, Linux, Windows and PocketPC. MatrixSSL has been deployed on systems with no OS, filesystem or memory management. Ported pl

Main features:

  • < 50KB total footprint with crypto provider
  • SSLv3 and TLS server and client support
  • Included crypto library - RSA, AES, 3DES, ARC4, SHA1, MD5
  • Cipher Suites - RC4-MD5, RC4-SHA, DES-CBC3-SHA, AES128-SHA, AES256-SHA
  • RSA public and private key generation
  • X.509 certificate generation and signing
  • Full support for fast session resumption/caching
  • X.509 server and client certificate authentication
  • Tight, heavily commented code in portable C
  • User and developer documentation

last updated on:
September 10th, 2014, 22:22 GMT
file size:
4.3 MB
developed by:
PeerSec Networks
license type:
operating system(s):
Mac OS X
binary format:
Universal Binary
Home \ Security


In a hurry? Add it to your Download Basket!

user rating 25



Rate it!
What's New in This Release:
  • ECC public point validation
  • Previous versions of MatrixSSL were not testing ECC public keys for validity when ECDHE suites were used. Security researchers at Matsano Security crafted a malicious public ECC key that was able to cause a memory read access violation on some platforms and an infinite loop on others.
read full changelog

Add your review!