Data Sheet
Table Of Contents
- 1 Module Overview
- Table of Contents
- 2 Revision History
- 3 Device Comparison
- 4 Terminal Configuration and Functions
- 5 Specifications
- 5.1 Absolute Maximum Ratings
- 5.2 ESD Ratings
- 5.3 Recommended Operating Conditions
- 5.4 Current Consumption Summary: 2.4 GHz RF Band
- 5.5 Current Consumption Summary: 5 GHz RF Band
- 5.6 TX Power Control for 2.4 GHz Band
- 5.7 TX Power Control for 5 GHz Band
- 5.8 Brownout and Blackout Conditions
- 5.9 Electrical Characteristics for DIO Pins
- 5.10 WLAN Receiver Characteristics
- 5.11 WLAN Transmitter Characteristics
- 5.12 BLE and WLAN Coexistence Requirements
- 5.13 Reset Requirement
- 5.14 Thermal Resistance Characteristics for MOB Package
- 5.15 Timing and Switching Characteristics
- 5.16 External Interfaces
- 6 Detailed Description
- 7 Applications, Implementation, and Layout
- 8 Environmental Requirements and SMT Specifications
- 9 Device and Documentation Support
- 10 Mechanical, Packaging, and Orderable Information
- Important Notice
TI Confidential – NDA Restrictions
ADVANCEINFORMATION
36
CC3135MOD
SWRS225A –FEBRUARY 2019–REVISED AUGUST 2019
www.ti.com
Submit Documentation Feedback
Product Folder Links: CC3135MOD
Detailed Description Copyright © 2019, Texas Instruments Incorporated
• Secure sockets
– Protocol versions: SSL v3/TLS 1.0/TLS 1.1/TLS 1.2
– On-chip powerful crypto engine for fast, secure Wi-Fi and internet connections with 256-bit AES
encryption for TLS and SSL connections
– Ciphers suites
• SL_SEC_MASK_SSL_RSA_WITH_RC4_128_SHA
• SL_SEC_MASK_SSL_RSA_WITH_RC4_128_MD5
• SL_SEC_MASK_TLS_RSA_WITH_AES_256_CBC_SHA
• SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
• SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
• SL_SEC_MASK_TLS_ECDHE_RSA_WITH_RC4_128_SHA
• SL_SEC_MASK_TLS_RSA_WITH_AES_128_CBC_SHA256
• SL_SEC_MASK_TLS_RSA_WITH_AES_256_CBC_SHA256
• SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
• SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
• SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
• SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
• SL_SEC_MASK_TLS_RSA_WITH_AES_128_GCM_SHA256
• SL_SEC_MASK_TLS_RSA_WITH_AES_256_GCM_SHA384
• SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
• SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
• SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
• SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
• SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
• SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
• SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
• SL_SEC_MASK_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
• SL_SEC_MASK_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
– Server authentication
– Client authentication
– Domain name verification
– Socket upgrade to secure socket – STARTTLS
• Secure HTTP server (HTTPS)
• The trusted root-certificate catalog verifies that the CA used by the application is trusted and known
secure content delivery.
• The TI root-of-trust public key is a hardware-based mechanism that allows authenticating TI as the
genuine origin of a given content using asymmetric keys.
• Secure content delivery allows file transfer to the system in a secure way on any unsecured tunnel.
• Code and data security
– Secured network information: Network passwords and certificates are encrypted
– Secured and authenticated service pack: SP is signed based on TI certificate