SSL encryption cipher suites
- Last Updated: March 13, 2026
- 2 minute read
- DataDirect Connectors
- ODBC
- Aha! 8.0
- Amazon Redshift 8.0
- Apache Cassandra 8.0
- Apache Hive 8.0
- Apache Spark SQL 8.0
- Autonomous Rest Connector 8.0
- Cloudera Impala 7.1
- dBase 7.1
- + 24
The following tables list the SSL/TLS encryption cipher suites supported by Progress DataDirect ODBC drivers. The driver attempts to negotiate either SSL v3 or TLS v1 with the server using OpenSSL cipher suites.
Note: For information about using SSL/TLS data encryption with the drivers, refer to "Using
security" in the user's guide for your driver.
Mapping OpenSSL Cipher Suites to SSL v3 Cipher Suites
The following table shows the OpenSSL encryption cipher suites that a driver can use if it can negotiate SSL v3 with the server, with the name of the corresponding SSL v3 encryption cipher suites.
| OpenSSL Cipher Suite | SSL v3 Cipher Suite |
|---|---|
| AES128-GCM-SHA256 | TLS_RSA_WITH_AES_128_GCM_SHA256 |
| AES128-SHA | TLS_RSA_WITH_AES_128_CBC_SHA1 |
| AES128-SHA256 | TLS_RSA_WITH_AES_128_CBC_SHA256 |
| AES256-GCM-SHA384 | TLS_RSA_WITH_AES_256_GCM_SHA384 |
| AES256-SHA | TLS_RSA_WITH_AES_256_CBC_SHA 2 |
| AES256-SHA256 | TLS_RSA_WITH_AES_256_CBC_SHA256 |
| DES-CBC3-SHA | SSL_RSA_WITH_3DES_EDE_CBC_SHA |
| DHE-DSS-AES128-GCM-SHA256 | TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 |
| DHE-DSS-AES128-SHA | TLS_DHE_DSS_WITH_AES_128_CBC_SHA3 |
| DHE-DSS-AES128-SHA256 | TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
| DHE-DSS-AES256-GCM-SHA384 | TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 |
| DHE-DSS-AES256-SHA | TLS_DHE_DSS_WITH_AES_256_CBC_SHA4 |
| DHE-DSS-AES256-SHA256 | TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
| DHE-DSS-SEED-SHA | TLS_DHE_DSS_WITH_SEED_CBC_SHA5 |
| DHE-RSA-AES128-GCM-SHA256 | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
| DHE-RSA-AES128-SHA | TLS_DHE_RSA_WITH_AES_128_CBC_SHA6 |
| DHE-RSA-AES128-SHA256 | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 |
| DHE-RSA-AES256-GCM-SHA384 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
| DHE-RSA-AES256-SHA | TLS_DHE_RSA_WITH_AES_256_CBC_SHA7 |
| DHE-RSA-AES256-SHA256 | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 |
| DHE-RSA-SEED-SHA | TLS_DHE_RSA_WITH_SEED_CBC_SHA8 |
| EDH-DSS-DES-CBC3-SHA | SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
| EDH-RSA-DES-CBC3-SHA | SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA |
| EXP-EDH-DSS-DES-CBC-SHA | SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA |
| PSK-3DES-EDE-CBC-SHA | TLS_PSK_WITH_3DES_EDE_CBC_SHA |
| PSK-AES128-CBC-SHA | TLS_PSK_WITH_AES_128_CBC_SHA |
| PSK-AES256-CBC-SHA | TLS_PSK_WITH_AES_256_CBC_SHA |
| PSK-RC4-SHA | TLS_PSK_WITH_RC4_128_SHA |
| RC4-MD5 | SSL_RSA_WITH_RC4_128_MD5 |
| RC4-SHA | SSL_RSA_WITH_RC4_128_SHA |
| SEED-SHA | TLS_RSA_WITH_SEED_CBC_SHA9 |
| SRP-3DES-EDE-CBC-SHA | TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA |
| SRP-AES-128-CBC-SHA | TLS_SRP_SHA_WITH_AES_128_CBC_SHA |
| SRP-AES-256-CBC-SHA | TLS_SRP_SHA_WITH_AES_256_CBC_SHA |
| SRP-DSS-3DES-EDE-CBC-SHA | TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA |
| SRP-DSS-AES-128-CBC-SHA | TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA |
| SRP-DSS-AES-256-CBC-SHA | TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA |
| SRP-RSA-3DES-EDE-CBC-SHA | TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA |
| SRP-RSA-AES-128-CBC-SHA | TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA |
| SRP-RSA-AES-256-CBC-SHA | TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA |
Mapping OpenSSL Encryption Cipher Suites to TLS v1.2 and TLS v1.3 Cipher Suites
The following table shows the OpenSSL Encryption Cipher suites that a driver can use if it can negotiate TLS v1.2 and TLS v1.3 with the server, with the name of the corresponding cipher suites.
| OpenSSL Cipher Suite | Maps to TLS v1 Cipher Suite |
|---|---|
| AES128-GCM-SHA256 | TLS_RSA_WITH_AES_128_GCM_SHA256 |
| AES128-SHA | TLS_RSA_WITH_AES_128_CBC_SHA10 |
| AES128-SHA256 | TLS_RSA_WITH_AES_128_CBC_SHA256 |
| AES256-GCM-SHA384 | TLS_RSA_WITH_AES_256_GCM_SHA384 |
| AES256-SHA | TLS_RSA_WITH_AES_256_CBC_SHA11 |
| AES256-SHA256 | TLS_RSA_WITH_AES_256_CBC_SHA256 |
| DES-CBC3-SHA | TLS_RSA_WITH_3DES_EDE_CBC_SHA |
| DES-CBC-SHA | TLS_RSA_WITH_DES_CBC_SHA |
| DHE-DSS-AES128-GCM-SHA256 | DHE-DSS-AES128-GCM-SHA256 |
| DHE-DSS-AES128-SHA | TLS_DHE_DSS_WITH_AES_128_CBC_SHA12 |
| DHE-DSS-AES128-SHA256 | TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
| DHE-DSS-AES256-GCM-SHA384 | TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 |
| DHE-DSS-AES256-SHA | TLS_DHE_DSS_WITH_AES_256_CBC_SHA13 |
| DHE-DSS-AES256-SHA256 | TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
| DHE-DSS-SEED-SHA | TLS_DHE_DSS_WITH_SEED_CBC_SHA14 |
| DHE-RSA-AES128-GCM-SHA256 | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
| DHE-RSA-AES128-SHA | TLS_DHE_RSA_WITH_AES_128_CBC_SHA15 |
| DHE-RSA-AES128-SHA | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 |
| DHE-RSA-AES256-GCM-SHA384 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
| DHE-RSA-AES256-SHA | TLS_DHE_RSA_WITH_AES_256_CBC_SHA16 |
| DHE-RSA-AES256-SHA256 | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 |
| DHE-RSA-SEED-SHA | TLS_DHE_RSA_WITH_SEED_CBC_SHA17 |
| ECDHE-RSA-AES256-SHA384 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
| ECDHE-RSA-AES256-SHA | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA |
| ECDHE-RSA-AES128-SHA256 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
| ECDHE-RSA-AES128-SHA | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA |
| EDH-DSS-DES-CBC3-SHA | TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
| EDH-DSS-DES-CBC-SHA | TLS_DHE_DSS_WITH_DES_CBC_SHA |
| EDH-RSA-DES-CBC3-SHA | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA |
| EDH-RSA-DES-CBC-SHA | TLS_DHE_RSA_WITH_DES_CBC_SHA |
| EXP-DES-CBC-SHA | TLS_RSA_EXPORT_WITH_DES40_CBC_SHA |
| EXP-EDH-DSS-DES-CBC-SHA | TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA |
| EXP-EDH-RSA-DES-CBC-SHA | TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA |
| EXP-RC2-CBC-MD5 | TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 |
| EXP-RC4-MD5 | TLS_RSA_EXPORT_WITH_RC4_40_MD5 |
| PSK-3DES-EDE-CBC-SHA | TLS_PSK_WITH_3DES_EDE_CBC_SHA |
| PSK-AES128-CBC-SHA | TLS_PSK_WITH_AES_128_CBC_SHA |
| PSK-AES256-CBC-SHA | TLS_PSK_WITH_AES_256_CBC_SHA |
| PSK-RC4-SHA | TLS_PSK_WITH_RC4_128_SHA |
| RC4-MD5 | TLS_RSA_WITH_RC4_128_MD5 |
| RC4-SHA | TLS_RSA_WITH_RC4_128_SHA |
| SEED-SHA | TLS_RSA_WITH_SEED_CBC_SHA18 |
| SRP-3DES-EDE-CBC-SHA | TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA |
| SRP-AES-128-CBC-SHA | TLS_SRP_SHA_WITH_AES_128_CBC_SHA |
| SRP-AES-128-CBC-SHA | TLS_SRP_SHA_WITH_AES_128_CBC_SHA |
| SRP-AES-256-CBC-SHA | TLS_SRP_SHA_WITH_AES_256_CBC_SHA |
| SRP-DSS-3DES-EDE-CBC-SHA | TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA |
| SRP-DSS-AES-128-CBC-SHA | TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA |
| SRP-DSS-AES-256-CBC-SHA | TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA |
| SRP-RSA-3DES-EDE-CBC-SHA | TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA |
| SRP-RSA-AES-128-CBC-SHA | TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA |
| SRP-RSA-AES-256-CBC-SHA | TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA |
| TLS_AES_256_GCM_SHA384 | TLS_AES_256_GCM_SHA384 |
| TLS_AES_128_GCM_SHA256 | TLS_AES_128_GCM_SHA256 |
| TLS_CHACHA20_POLY1305_SHA256 | TLS_CHACHA20_POLY1305_SHA256 |
| TLS_AES_128_CCM_SHA256 | TLS_AES_128_CCM_SHA256 |
| TLS_AES_128_CCM_8_SHA256 | TLS_AES_128_CCM_8_SHA256 |
Reference
1 AES cipher suites from RFC3268 are
used to extend TLS v1.
2 AES cipher suites from RFC3268 are used to extend TLS
v1.
3 AES cipher suites from RFC3268 are used to extend
TLS v1.
4 AES cipher suites from RFC3268 are used to extend
TLS v1.
5 Seed cipher suites from RFC4162 are used to extend TLS
v1.
6 AES cipher suites from RFC3268 are used to extend
TLS v1.
7 AES cipher suites from RFC3268 are used to extend
TLS v1.
8 Seed cipher suites from RFC4162 are used to extend TLS
v1.
9 Seed cipher suites from RFC4162
are used to extend TLS v1.
10 AES cipher suites from RFC3268, extending TLS v1
11 AES cipher suites from RFC3268, extending TLS v1
12 AES cipher suites from RFC3268, extending TLS
v1
13 AES cipher suites from RFC3268, extending TLS
v1
14 Seed cipher suites from RFC4162 are used to extend TLS
v1.
15 AES cipher suites from RFC3268, extending TLS
v1
16 AES cipher suites from RFC3268, extending TLS
v1
17 Seed cipher suites from RFC4162 are used to extend TLS
v1.
18 Seed cipher suites from RFC4162 are used to extend TLS v1.