Navigate:
All Reposopenssl
~$OPENSS0.1%

OpenSSL: TLS/SSL and cryptographic toolkit

C-based cryptographic library implementing TLS, DTLS, and QUIC protocols.

LIVE RANKINGS • 06:51 AM • STEADY
OVERALL
#147
28
SECURITY
#14
2
30 DAY RANKING TREND
ovr#147
·Secur#14
STARS
29.3K
FORKS
11.0K
DOWNLOADS
2.9K
7D STARS
+21
7D FORKS
+2
See Repo:
Share:

Learn more about openssl

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes

openssl

1

Modular architecture

Separates protocol implementations (libssl) from cryptographic primitives (libcrypto), allowing libcrypto to be used independently for non-TLS cryptographic tasks. This design enables flexible integration into applications with varying security requirements.

2

Multiple protocol support

Implements TLS versions up to 1.3, DTLS for datagram-based communication, and QUIC for modern transport protocols. Single toolkit covers legacy SSL/TLS compatibility alongside contemporary protocol standards.

3

FIPS validation

Includes a cryptographic module validated to conform with FIPS standards, enabling deployment in regulated environments with specific cryptographic certification requirements.


import https from 'https';
import fs from 'fs';

const options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem')
};

const server = https.createServer(options, (req, res) => {
  res.writeHead(200);
  res.end('Secure connection established');
});

server.listen(443);

vopenssl-3.6.0

Requires C99 compiler; VxWorks support removed. Adds symmetric key objects, LMS signature verification, and FIPS 186-5 deterministic ECDSA.

  • Upgrade build toolchain to C99-compliant compilers; ANSI-C is no longer sufficient.
  • Migrate off VxWorks platforms and deprecated EVP_PKEY_ASN1_METHOD functions before upgrading.
vopenssl-3.5.4

Security patch fixing three moderate CVEs (out-of-bounds reads/writes in RFC 3211 KEK, SM2 timing leak, HTTP no_proxy); reverts OPENSSL_VERSION_NUMBER change that broke apps.

  • Upgrade to patch CVE-2025-9230 (RFC 3211 KEK unwrap OOB), CVE-2025-9231 (SM2 timing on ARM64), and CVE-2025-9232 (HTTP client no_proxy OOB read).
  • Note OPENSSL_VERSION_NUMBER now matches 3.x semantics again; apps relying on the reverted behavior may need adjustment.
vopenssl-3.4.3

Security patch fixing three moderate CVEs: out-of-bounds issues in RFC 3211 KEK unwrap and HTTP no_proxy handling, plus a timing side-channel in SM2 on ARM64.

  • Upgrade immediately if using RFC 3211 key unwrap, SM2 on 64-bit ARM, or HTTP client no_proxy features to close memory safety and timing vulnerabilities.
  • No breaking changes or migration steps specified; patch addresses CVE-2025-9230, CVE-2025-9231, and CVE-2025-9232.


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers