This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Tool/software:
Hi Experts,
My customer below is asking if the OpenSSL v3 is compatible with CC3100 and CC3120 modules and other query. Please see below and please advise.
My name is Nenad, and I work at Mikroelektronika from Serbia.
Our project uses your CC3100 and CC3120 modules on the server side, configured as SSL sockets for secure communication. So far, we have been using OpenSSL v1.1.1 on the PC (client side) to connect to the SSL socket.
We are currently transitioning to a newer version, OpenSSL v3.0.8, and we are interested in knowing whether it is possible to use this newer OpenSSL version with these modules. Specifically, we would like to know if they support secure renegotiation and newer encryption protocols (currently, we are using AES256-SHA), as this cipher, which is at security level 2, is not available.
Regards,
Josel
Hi,
CC3100/CC3200 is limited in terms of cipher suites that are supported.
Again, I am not sure whether newer openssl versions restrict some older suites but the common security level would be set according to supported suites exchanged between the two peers.
The CC3100 NWP user guide denotes support for the following suites:
Regards,
Shlomi
Hi Shlomi,
Okay. Do the CC3100 and CC3120 support safe renegotiation?
How can I force the desired algorithm on the server using the CC3100?
Best regards,
Josel
the list applies to cc3100 only.
For cc3120, there are additional suites.
there is no TLS renegotiation.
if you run server/client on cc31xx, you can force cipher suites by the SL_SO_SECMETHOD and SL_SO_SECURE_MASK options.
You can read in the NWP guide or look at the code (under sl_Socket.h)