OpenSSL: TLS/SSL and cryptographic toolkit
C-based cryptographic library implementing TLS, DTLS, and QUIC protocols.
Learn more about OpenSSL
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes
Modular architecture
Separates protocol implementations (libssl) from cryptographic primitives (libcrypto), allowing libcrypto to be used independently for non-TLS cryptographic tasks. This design enables flexible integration into applications with varying security requirements.
Multiple protocol support
Implements TLS versions up to 1.3, DTLS for datagram-based communication, and QUIC for modern transport protocols. Single toolkit covers legacy SSL/TLS compatibility alongside contemporary protocol standards.
FIPS validation
Includes a cryptographic module validated to conform with FIPS standards, enabling deployment in regulated environments with specific cryptographic certification requirements.
import https from 'https';
import fs from 'fs';
const options = {
key: fs.readFileSync('key.pem'),
cert: fs.readFileSync('cert.pem')
};
const server = https.createServer(options, (req, res) => {
res.writeHead(200);
res.end('Secure connection established');
});
server.listen(443);Critical security patch release fixing 12 CVEs including high-severity vulnerabilities in PKCS#12, TLS, and CMS.
- –Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
- –Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing
- –Fixed NULL dereference in SSLCIPHERfind() function on unknown cipher ID
- –Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB
- –Fixed TLS 1.3 CompressedCertificate excessive memory allocation
Critical security patch release fixing 12 vulnerabilities including buffer overflows and memory allocation issues.
- –Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
- –Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing
- –Fixed NULL dereference in SSLCIPHERfind() function on unknown cipher ID
- –Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB
- –Fixed TLS 1.3 CompressedCertificate excessive memory allocation
Critical security patch release fixing 11 vulnerabilities including buffer overflows and memory allocation issues.
- –Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
- –Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing
- –Fixed NULL dereference in SSLCIPHERfind() function on unknown cipher ID
- –Fixed TLS 1.3 CompressedCertificate excessive memory allocation
- –Fixed Heap out-of-bounds write in BIOflinebuffer on short writes
Related Repositories
Discover similar tools and frameworks used by developers
WhatsMyName
JSON dataset for checking username availability across hundreds of websites for OSINT tools.
Gitleaks
Regex-based secret scanner for git repositories.
DVWA
PHP/MariaDB training platform for web security exploitation practice.
Volatility Framework
Open-source Python framework for extracting digital artifacts from RAM samples for Windows, Linux, and macOS forensics.
SpiderFoot
Python reconnaissance framework with 200+ OSINT modules.