DTLS.Net was developed for use in an implementation of the Open Mobile Alliance's (OMA) Lightweight Machine to Machine protocol (LWM2M). For this reason it only supports the following cipher suites:
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
- TLS_PSK_WITH_AES_128_CCM_8
- TLS_PSK_WITH_AES_128_CBC_SHA256
Since the client is only required to serve for the above project it has several inherent limitations:
- No automatic retransmition
- No support for fragmentation of handshake packets
- Does not verify Server Certificates (against CA)
The server currently also has the following limitations:
- Does not verify client Certificates
- No support for fragmentation of handshake packets
Hopefully over time these will be implemented, in the meantime we hope this is still useful.
We welcome all contributions to this project and we give credit where it's due. Anything from enhancing functionality to improving documentation and bug reporting - it's all good.
Find out more in the contributor guide.
We would like to thank all of our current contributors.
- All code and documentation developed by Imagination Technologies Limited is licensed under the BSD 3-clause license.
- Bouncy Castle by The Legion of the Bouncy Castle is licensed under an adaptation of the MIT X11 License.