JAJSHI1B February 2019 – May 2021 CC3135
PRODUCTION DATA
Table 6-1 lists the features supported across different CC3x35 devices.
FEATURE | DEVICE | ||
---|---|---|---|
CC3135 | CC3235S | CC3235SF | |
Classification | Network processor | Wireless microcontroller | Wireless microcontroller |
Standard | 802.11a/b/g/n | 802.11a/b/g/n | 802.11a/b/g/n |
TCP/IP stack | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 |
Sockets | 16 | 16 | 16 |
Package | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN |
ON-CHIP APPLICATION MEMORY | |||
Flash | — | — | 1MB |
RAM | — | 256KB | 256KB |
RF FEATURES | |||
Frequency | 2.4 GHz, 5 GHz | 2.4 GHz, 5 GHz | 2.4 GHz, 5 GHz |
Coexistence with BLE Radio | Yes | Yes | Yes |
SECURITY FEATURES | |||
Additional networking security | Unique device identity Trusted root-certificate catalog TI Root-of-trust public key Online certificate status protocol (OCSP) Certificate signing request (CSR) Unique per-device key pair |
Unique device identity Trusted root-certificate catalog TI Root-of-trust public key Online certificate status protocol (OCSP) Certificate signing request (CSR) Unique per-device key pair |
Unique device identity Trusted root-certificate catalog TI Root-of-trust public key Online certificate status protocol (OCSP) Certificate signing request (CSR) Unique per-device key pair |
Hardware acceleration | Hardware crypto engines | Hardware crypto engines | Hardware crypto engines |
Secure boot | — | Yes | Yes |
Enhanced application level security | — | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
FIPS 140-2 Level 1 Certification(1) | Yes | Yes | Yes |