Navigate:
OpenSSL
~$OPENS0.2%

OpenSSL: TLS/SSL and cryptographic toolkit

C-based cryptographic library implementing TLS, DTLS, and QUIC protocols.

LIVE RANKINGS • 11:31 AM • STEADY
OVERALL
#247
5
SECURITY
#24
6
30 DAY RANKING TREND
ovr#247
·Secur#24
STARS
29.6K
FORKS
11.1K
7D STARS
+60
7D FORKS
+16
See Repo:
Share:

Learn more about OpenSSL

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes

OpenSSL

1

Modular architecture

Separates protocol implementations (libssl) from cryptographic primitives (libcrypto), allowing libcrypto to be used independently for non-TLS cryptographic tasks. This design enables flexible integration into applications with varying security requirements.

2

Multiple protocol support

Implements TLS versions up to 1.3, DTLS for datagram-based communication, and QUIC for modern transport protocols. Single toolkit covers legacy SSL/TLS compatibility alongside contemporary protocol standards.

3

FIPS validation

Includes a cryptographic module validated to conform with FIPS standards, enabling deployment in regulated environments with specific cryptographic certification requirements.


import https from 'https';
import fs from 'fs';

const options = {
  key: fs.readFileSync('key.pem'),
  cert: fs.readFileSync('cert.pem')
};

const server = https.createServer(options, (req, res) => {
  res.writeHead(200);
  res.end('Secure connection established');
});

server.listen(443);

vopenssl-3.6.1

Critical security patch release fixing 12 CVEs including high-severity vulnerabilities in PKCS#12, TLS, and CMS.

  • Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
  • Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing
  • Fixed NULL dereference in SSLCIPHERfind() function on unknown cipher ID
  • Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB
  • Fixed TLS 1.3 CompressedCertificate excessive memory allocation
vopenssl-3.5.5

Critical security patch release fixing 12 vulnerabilities including buffer overflows and memory allocation issues.

  • Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
  • Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing
  • Fixed NULL dereference in SSLCIPHERfind() function on unknown cipher ID
  • Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB
  • Fixed TLS 1.3 CompressedCertificate excessive memory allocation
vopenssl-3.4.4

Critical security patch release fixing 11 vulnerabilities including buffer overflows and memory allocation issues.

  • Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
  • Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing
  • Fixed NULL dereference in SSLCIPHERfind() function on unknown cipher ID
  • Fixed TLS 1.3 CompressedCertificate excessive memory allocation
  • Fixed Heap out-of-bounds write in BIOflinebuffer on short writes


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers