OpenSSL Library
https://openssl-library.org/
Recent content on OpenSSL LibraryHugoenTue, 14 Apr 2026 00:00:00 +0000OpenSSL 4.0 Final Release - Live
https://openssl-library.org/post/2026-04-14-openssl-40-final-release/
Tue, 14 Apr 2026 00:00:00 +0000https://openssl-library.org/post/2026-04-14-openssl-40-final-release/<p>The final release of OpenSSL 4.0 is now live. We would like to thank all those who contributed to the OpenSSL 4.0 release,
without whom the OpenSSL Library would not be possible.</p>ASN1_STRING type is now opaque
https://openssl-library.org/post/2026-04-13-asn1_string/
Mon, 13 Apr 2026 00:00:00 +0000https://openssl-library.org/post/2026-04-13-asn1_string/<p>Previous posts about the upcoming OpenSSL 4.0 release:</p>
<ol>
<li><a href="https://openssl-library.org/post/2025-12-18-remove-engines">removing ENGINE code</a></li>
<li><a href="https://openssl-library.org/post/2026-02-03-remove-methods">removing deprecated functions for creating or modifying custom METHODS</a></li>
<li><a href="https://openssl-library.org/post/2026-03-10-remove-atexit">no longer registering a function via atexit function</a></li>
<li><a href="https://openssl-library.org/post/2026-03-11-ech">adding ECH support</a></li>
<li><a href="https://openssl-library.org/post/2026-04-07-ssl3">removing SSLv3 and SSLv2 Client Hello</a></li>
</ol>
<h2 id="summary">Summary</h2>
<p>The ASN1_STRING structure can <a href="https://docs.openssl.org/4.0/man7/ossl-guide-migration/#the-asn1_string-type-is-now-opaque">no longer be accessed
directly</a>. Instead,
accessor functions must be used.</p>
<p>While these accessor functions have been available since OpenSSL
1.0.1, this change is being made now to enable future work improving
X509 memory efficiency. Requiring accessor functions will allow ASN1
strings to be stored as pointers to data in read only memory instead
of making duplicate copies.</p>OpenSSL Release Announcement for 3.6.2, 3.5.6, 3.4.5, 3.3.7, 3.0.20, 1.1.1zg and 1.0.2zp
https://openssl-library.org/post/2026-04-07-release-announcement/
Tue, 07 Apr 2026 00:00:00 +0000https://openssl-library.org/post/2026-04-07-release-announcement/<p>Release Announcement for OpenSSL Library <strong>3.6.2</strong>, <strong>3.5.6</strong>, <strong>3.4.5</strong>, <strong>3.3.7</strong>, <strong>3.0.20</strong>, <strong>1.1.1zg</strong> and <strong>1.0.2zp</strong></p>
<p>The OpenSSL Project team announces the release of new versions of our open-source toolkit for SSL/TLS.</p>The OpenSSL Library no longer includes SSLv3
https://openssl-library.org/post/2026-04-07-ssl3/
Tue, 07 Apr 2026 00:00:00 +0000https://openssl-library.org/post/2026-04-07-ssl3/<p>Previous posts about the upcoming OpenSSL 4.0 release:</p>
<ol>
<li><a href="https://openssl-library.org/post/2025-12-18-remove-engines">removing ENGINE code</a></li>
<li><a href="https://openssl-library.org/post/2026-02-03-remove-methods">removing deprecated functions for creating or modifying custom METHODS</a></li>
<li><a href="https://openssl-library.org/post/2026-03-10-remove-atexit">no longer registering a function via atexit function</a></li>
<li><a href="https://openssl-library.org/post/2026-03-11-ech">adding ECH support</a></li>
</ol>
<h2 id="summary">Summary</h2>
<p>Secure Sockets Layer version 3.0 (SSLv3) was deprecated in <a href="https://www.rfc-editor.org/rfc/rfc7568">RFC
7568</a>. SSLv3 was disabled at
build-time in OpenSSL 1.0.2h by default. As of OpenSSL 4.0, SSLv3 support
has been removed altogether.</p>
<p>In addition, OpenSSL no longer supports the SSLv2 Client Hello.</p>OpenSSL 4.0 Beta Release Announcement
https://openssl-library.org/post/2026-03-24-openssl-4.0-beta/
Tue, 24 Mar 2026 00:00:00 +0000https://openssl-library.org/post/2026-03-24-openssl-4.0-beta/<p>The <a href="https://openssl.org">OpenSSL Project</a> is pleased to announce that <a href="https://github.com/openssl/openssl/releases/tag/openssl-4.0.0-beta1">OpenSSL 4.0 Beta1</a>
pre-release is available, adding significant functionality to the OpenSSL Library.</p>OpenSSL release signing key expiration extended
https://openssl-library.org/post/2026-03-16-release-signing-key-validity/
Mon, 16 Mar 2026 00:00:00 +0000https://openssl-library.org/post/2026-03-16-release-signing-key-validity/<p>The expiration date of the OpenSSL release signing key with fingerprint
<code>BA5473A2B0587B07FB27CF2D216094DFD0CB81EF</code> has been extended from <code>08 Apr 2026</code> to <code>14 Jun 2026</code>.</p>
<p>Only the key expiration date has changed. The signing key itself remains the same.</p>
<p>The updated public key is available at:
<a href="https://keys.openpgp.org/search?q=BA5473A2B0587B07FB27CF2D216094DFD0CB81EF">https://keys.openpgp.org/search?q=BA5473A2B0587B07FB27CF2D216094DFD0CB81EF</a></p>The OpenSSL Library now supports Encrypted Client Hello (ECH)
https://openssl-library.org/post/2026-03-11-ech/
Wed, 11 Mar 2026 00:00:00 +0000https://openssl-library.org/post/2026-03-11-ech/<p>Previous posts about the upcoming OpenSSL 4.0 release:</p>
<ol>
<li><a href="https://openssl-library.org/post/2025-12-18-remove-engines">removing ENGINE code</a></li>
<li><a href="https://openssl-library.org/post/2026-02-03-remove-methods">removing deprecated functions for creating or modifying custom METHODS</a></li>
<li><a href="https://openssl-library.org/post/2026-03-10-remove-atexit">no longer registering a function via atexit function</a></li>
</ol>
<h2 id="summary">Summary</h2>
<p>The OpenSSL Library now supports Encrypted Client Hello (ECH)
specified in <a href="https://www.rfc-editor.org/rfc/rfc9849.txt">RFC 9849</a>,
which was published this month. Applications that implement this
standard will be able to encrypt sensitive information that is
currently transmitted in plaintext in the TLS 1.3 handshake. In
particular, ECH can protect the client’s target server name from being
revealed to third parties.</p>The OpenSSL Library no longer registers an atexit function
https://openssl-library.org/post/2026-03-10-remove-atexit/
Tue, 10 Mar 2026 00:00:00 +0000https://openssl-library.org/post/2026-03-10-remove-atexit/<p>Previous posts about features removed from OpenSSL 4.0:</p>
<ol>
<li><a href="https://openssl-library.org/post/2025-12-18-remove-engines">ENGINE code</a></li>
<li><a href="https://openssl-library.org/post/2026-02-03-remove-methods/">deprecated functions for creating or modifying custom METHODS</a></li>
</ol>
<h2 id="summary">Summary</h2>
<p>The <code>OPENSSL_cleanup()</code> function is no longer registered to be called
upon the termination of the process. This means the OpenSSL Library
does not automatically free resources so the operating system reclaims
them when an application exits.</p>
<p>For most users, this will have no impact since the memory is freed one
way or the other.</p>OpenSSL 4.0 Alpha Repository Freeze Approaching
https://openssl-library.org/post/2026-02-18-alpha-freeze-approaching/
Wed, 18 Feb 2026 00:00:00 +0000https://openssl-library.org/post/2026-02-18-alpha-freeze-approaching/<p>The OpenSSL Project is announcing the upcoming release of OpenSSL 4.0 Alpha,
scheduled for March 10, 2026. As a result, the repository will be frozen before the release on <em><strong>February 24, 2026</strong></em>.</p>Custom method functions removed from the OpenSSL Library
https://openssl-library.org/post/2026-02-03-remove-methods/
Tue, 03 Feb 2026 00:00:00 +0000https://openssl-library.org/post/2026-02-03-remove-methods/<p>Following on from the <a href="https://openssl-library.org/post/2025-12-18-remove-engines">removal of ENGINE
code</a>, deprecated <a href="https://docs.openssl.org/master/man7/ossl-guide-migration/#engines-and-method-apis">functions for
creating or modifying custom
METHODS</a>
will be removed from OpenSSL 4.0.</p>
<h2 id="summary">Summary</h2>
<p>For a complete list of deprecated functions removed in OpenSSL 4.0,
please see the
<a href="https://docs.openssl.org/master/man7/ossl-removed-api/#openssl-40">ossl-removed-api</a>
documentation. They are divided into the following pull requests:</p>
<ul>
<li>Custom ciphers methods (<code>EVP_CIPHER_meth_*</code>) were removed in <a href="https://github.com/openssl/openssl/pull/29299">PR
#29299</a>.</li>
<li>Custom message digest methods (<code>EVP_MD_meth_*</code>) were removed in <a href="https://github.com/openssl/openssl/pull/29366">PR
#29366</a>.</li>
<li>Custom private key methods (<code>EVP_PKEY_meth_*</code>) were removed in <a href="https://github.com/openssl/openssl/pull/29384">PR
#29384</a>.</li>
<li>Custom private key <a href="https://en.wikipedia.org/wiki/ASN.1">Abstract Syntax Notation
One</a> methods
(<code>EVP_PKEY_asn1_*</code>) were removed in <a href="https://github.com/openssl/openssl/pull/29405">PR
#29405</a>. (These
functions were deprecated in OpenSSL 3.6.)</li>
</ul>
<p>Instead of using these methods, developers are encouraged to use the
<a href="https://docs.openssl.org/master/man7/provider/">provider framework</a>.</p>OpenSSL Release Announcement for 3.6.1, 3.5.5, 3.4.4, 3.3.6, 3.0.19, 1.1.1ze and 1.0.2zn
https://openssl-library.org/post/2026-01-27-release-announcement/
Tue, 27 Jan 2026 00:00:00 +0000https://openssl-library.org/post/2026-01-27-release-announcement/<p>Release Announcement for OpenSSL Library <strong>3.6.1</strong>, <strong>3.5 5</strong>, <strong>3.4.4</strong>, <strong>3.3.6</strong>, <strong>3.0.19</strong>, <strong>1.1.1ze</strong> and <strong>1.0.2zn</strong></p>
<p>The OpenSSL Project team announces the release of new versions of our open-source toolkit for SSL/TLS.</p>ENGINE code removed from the OpenSSL Library
https://openssl-library.org/post/2025-12-18-remove-engines/
Thu, 18 Dec 2025 00:00:00 +0000https://openssl-library.org/post/2025-12-18-remove-engines/<p>OpenSSL 4.0, to be released in April 2026, is the first <a href="https://openssl-library.org/policies/releasestrat/index.html">major
release</a> since 3.0 which <a href="https://openssl-library.org/post/2019-02-13-fips-update/">replaced
the ENGINE interface with
<em>Providers</em></a>. Removing ENGINEs is a
primary goal of this major release and this post describes the change
agreed to by both the OpenSSL Corporation and OpenSSL Foundation.</p>
<h2 id="summary">Summary</h2>
<p>All symbols defined in <code>openssl/engine.h</code> have been removed from the
<a href="https://en.wikipedia.org/wiki/Shared_library">shared library</a> in
OpenSSL 4.0. Applications that use the ENGINE API will fail to compile
using the default build settings. This behavior matches what happens
in previous versions when building OpenSSL with the <a href="https://github.com/openssl/openssl/blob/master/INSTALL.md#no-engine"><code>no-engine</code>
configuration
option</a>
with current versions. Up-to-date applications should not include
<code>openssl/engine.h</code> at all.</p>Vote now for the Foundation Business Advisory Committee
https://openssl-library.org/post/2025-12-16-fbac-voting/
Tue, 16 Dec 2025 00:00:00 +0000https://openssl-library.org/post/2025-12-16-fbac-voting/<p>The voting from the Foundation BAC has been <a href="https://openssl-library.org/post/2025-12-02-fbac-nominations-extended/">extended through December
21</a>. If you want to
participate in the future of the OpenSSL Foundation, please <a href="https://openssl-communities.org/hub">join the
communities site</a> and vote for
your representative.</p>
<p>The currently running elections are:</p>
<ul>
<li><a href="https://openssl-communities.org/d/6pdaBelD/foundation-bac-academics-election/4">Academics</a></li>
<li><a href="https://openssl-communities.org/d/VQqtGwlJ/foundation-bac-individuals-election/2">Individuals</a></li>
<li><a href="https://openssl-communities.org/d/LzDphFJU/foundation-bac-distributions-election/3">Distributions</a></li>
<li><a href="https://openssl-communities.org/d/Rx8PO94Y/foundation-bac-large-business-election/4">Large Business</a></li>
<li><a href="https://openssl-communities.org/d/iovp7Vht/foundation-bac-small-business-election/3">Small Business</a></li>
</ul>
<p>For details about how the election works, please consult the
<a href="https://openssl-communities.org/d/ZTsN4RGg/foundation-election-guide">Foundation Election
Guide</a>.</p>OpenSSL Library is moving to clang-format
https://openssl-library.org/post/2025-11-28-cstyle-format/
Fri, 28 Nov 2025 00:00:00 +0000https://openssl-library.org/post/2025-11-28-cstyle-format/<p>The OpenSSL Library would like to modernise and streamline development processes, especially to ensure effective code review and make the project easier for contributors to contribute to.</p>
<p>As part of this effort, we will be making some changes to our coding style guidelines and adopting clang-format using the WebKit C coding style as enforced by clang-format. We will transition to using clang-format to check pre-submissions and ensure code follows the format portions of the style guide before PRs are reviewed.</p>OpenSSL 3.2 End Of Life
https://openssl-library.org/post/2025-11-25-eol-32/
Tue, 25 Nov 2025 00:00:00 +0000https://openssl-library.org/post/2025-11-25-eol-32/<p>OpenSSL 3.2 series has reached its End of Life (EOL).
As such it will no longer receive publicly available security fixes.</p>Contributors to the OpenSSL Library (September 2025)
https://openssl-library.org/post/2025-10-27-september-contributors/
Mon, 27 Oct 2025 00:00:00 +0000https://openssl-library.org/post/2025-10-27-september-contributors/<p>September has come and gone, so it’s past time to recognize new
contributors to the OpenSSL Library:</p>
<table>
<thead>
<tr>
<th style="text-align: left">author</th>
<th style="text-align: left">date</th>
<th style="text-align: left">PR</th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align: left">xiaoloudongfeng</td>
<td style="text-align: left">2025-09-02</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28415">fix length of digestinfo_sm3_der</a></td>
</tr>
<tr>
<td style="text-align: left">Pkeane22</td>
<td style="text-align: left">2025-09-07</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28467">Fixed typo</a></td>
</tr>
<tr>
<td style="text-align: left">LuiginoC</td>
<td style="text-align: left">2025-09-10</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28504">crypto/evp/bio_ok.c:Integer Overflow in BIO_f_reliable record parser leads to Out-of-Bounds Read</a></td>
</tr>
<tr>
<td style="text-align: left">ritesh006</td>
<td style="text-align: left">2025-09-11</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28393">doc: clarify SSL_SESSION_get0_hostname notes</a></td>
</tr>
<tr>
<td style="text-align: left">jedenastka</td>
<td style="text-align: left">2025-09-11</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28523">Fix cipher protocol ID type in docs</a></td>
</tr>
<tr>
<td style="text-align: left">leesugil</td>
<td style="text-align: left">2025-09-14</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28540">FIPS 186-5 auxiliary prime length check condition updated (Fixed #28526)</a></td>
</tr>
<tr>
<td style="text-align: left">rodeka</td>
<td style="text-align: left">2025-09-16</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28576">crypto/ml_dsa: fix public_from_private() error path to return failure</a></td>
</tr>
<tr>
<td style="text-align: left">jonathimer</td>
<td style="text-align: left">2025-09-18</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28614">Add Linux Foundation Health Score badge to README</a></td>
</tr>
<tr>
<td style="text-align: left">bleeqer</td>
<td style="text-align: left">2025-09-29</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28686">ts_conf: fix memory leak in TS_CONF_set_policies</a></td>
</tr>
</tbody>
</table>
<p>Here are more details on a sample of these pull requests.</p>We Celebrate the Success of the Inaugural OpenSSL Conference in Prague
https://openssl-library.org/post/2025-10-23-osslcon25_conclusion/
Thu, 23 Oct 2025 00:00:00 +0000https://openssl-library.org/post/2025-10-23-osslcon25_conclusion/<figure class="w-99/100 mx-auto"><img src="https://openssl-library.org/images/blog/osslcon_pr.jpeg"
alt="OpenSSL Conference 2025">
</figure>
<p>The <a href="https://openssl-corporation.org/"><strong>OpenSSL Corporation</strong></a> and the <a href="https://openssl-foundation.org/"><strong>OpenSSL Foundation</strong></a> celebrate the success of the inaugural <a href="https://openssl-conference.org/"><strong>OpenSSL Conference</strong></a>, held in Prague, October 7-9. This was the <strong>first time in the history</strong> of the OpenSSL Project that the full community met in person. Developers, legal experts, and users from <strong>academics, committers, distributions, individuals, large businesses, and small businesses</strong> came together to discuss project direction, share experience, and collaborate on the future of secure digital communication.</p>Foundation Business Advisory Committee election
https://openssl-library.org/post/2025-10-15-fbac-election-2026/
Wed, 15 Oct 2025 00:00:00 +0000https://openssl-library.org/post/2025-10-15-fbac-election-2026/<p>Believe it or not, it’s time to start the election process for the
2026 Foundation Business Advisory Committee (FBAC). Advisory
committees play a critical role in the <a href="https://openssl-library.org/about/governance/#committees">governance of the OpenSSL
Foundation</a>. This committee focuses on
the strategic direction of the OpenSSL Foundation and <a href="https://openssl-library.org/mission-and-values">our
mission</a>.</p>
<p>Each of the six communities (Academics, Committers, Distributions,
Individuals, Large Businesses and Small Businesses) will have a
representative who will serve for one year. In addition to a monthly
meeting, representatives also lead discussions on the <a href="https://openssl-communities.org/hub/">Communities
platform</a> and generally promote
<a href="https://openssl-mission.org/">the OpenSSL Mission</a>.</p>Lightship Security and the OpenSSL Corporation Submit OpenSSL 3.5.4 for FIPS 140-3 Validation
https://openssl-library.org/post/2025-10-09-ossl3.5.4-fips-submission/
Thu, 09 Oct 2025 00:00:00 +0000https://openssl-library.org/post/2025-10-09-ossl3.5.4-fips-submission/<figure class="w-99/100 mx-auto"><img src="https://openssl-library.org/images/blog/FIPS_Validation01.jpg"
alt="FIPS Validation">
</figure>
<p><a href="https://lightshipsec.com/"><strong>Lightship Security</strong></a><strong>, an Applus+ Laboratories company and accredited cryptographic security test laboratory, and the <a href="https://openssl-corporation.org/">OpenSSL Corporation</a>, the co-maintainer of the OpenSSL Library, announce the submission of OpenSSL version 3.5.4 to the Cryptographic Module Validation Program (CMVP) for FIPS 140-3 validation.</strong></p>
<p>This submission confirms that <strong>the code is complete</strong> and that <strong>all included algorithms have successfully passed NIST testing and independent laboratory review</strong>. The final <strong>CMVP review and certificate issuance</strong> remain as the last step in the process.</p>Release Announcement for OpenSSL 3.6.0
https://openssl-library.org/post/2025-10-01-3.6-release-announcement/
Wed, 01 Oct 2025 00:00:00 +0000https://openssl-library.org/post/2025-10-01-3.6-release-announcement/<p>The final release of OpenSSL 3.6 is now live. We would like to thank all those who contributed to the OpenSSL 3.6 release, without whom the OpenSSL Library would not be possible.</p>OpenSSL Release Announcement for 3.5.4, 3.4.3, 3.3.5, 3.2.6, 3.0.18, 1.1.1zd and 1.0.2zm
https://openssl-library.org/post/2025-09-30-release-announcement/
Tue, 30 Sep 2025 00:00:00 +0000https://openssl-library.org/post/2025-09-30-release-announcement/<p>Release Announcement for OpenSSL Library <strong>3.5.4</strong>, <strong>3.4.3</strong>, <strong>3.3.5</strong>, <strong>3.2.6</strong>, <strong>3.0.18</strong>, <strong>1.1.1zd</strong> and <strong>1.0.2zm</strong></p>
<p>The OpenSSL Project team announces the release of new versions of our open-source toolkit for SSL/TLS.</p>Contributors to the OpenSSL Library (August 2025)
https://openssl-library.org/post/2025-09-18-august-contributors/
Thu, 18 Sep 2025 00:00:00 +0000https://openssl-library.org/post/2025-09-18-august-contributors/<p>Among the <a href="https://github.com/openssl/openssl/pulls?q=is%3Apr+label%3A%22approval%3A+ready+to+merge%22+-author%3Aopenssl-machine+created%3A2025-08-01..2025-08-31+">91 PRs</a> approved in August, 6 were from people who hadn’t contributed to OpenSSL’s code base until now.</p>
<table>
<thead>
<tr>
<th style="text-align: left">author</th>
<th style="text-align: left">date</th>
<th style="text-align: left">PR</th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align: left">zl523856</td>
<td style="text-align: left">2025-08-03</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28048">[RISC-V] Further optimization for AES-128-CBC decryption performance</a></td>
</tr>
<tr>
<td style="text-align: left">ChillerDragon</td>
<td style="text-align: left">2025-08-04</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28167">Improve english in endian comment</a></td>
</tr>
<tr>
<td style="text-align: left">ritoban23</td>
<td style="text-align: left">2025-08-13</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28259">Fix potential null pointer dereference in pkey_dh_derive</a></td>
</tr>
<tr>
<td style="text-align: left">vkryl</td>
<td style="text-align: left">2025-08-15</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28277">Android: Enable 16 KB ELF alignment for <code>arm64-v8a</code> and <code>x86_64</code> platforms</a></td>
</tr>
<tr>
<td style="text-align: left">itot1198</td>
<td style="text-align: left">2025-08-18</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28299">Remove unnecessary fetch-depth in GitHub Actions workflow</a></td>
</tr>
<tr>
<td style="text-align: left">Leonabcd123</td>
<td style="text-align: left">2025-08-28</td>
<td style="text-align: left"><a href="https://github.com/openssl/openssl/pull/28362">Fixed typo</a></td>
</tr>
</tbody>
</table>
<p><a href="https://github.com/zl523856">zl523856</a> started by submitting <a href="https://github.com/openssl/openssl/issues/28027">an
issue</a> that asking
about the proposed change. The pull request includes <a href="https://github.com/openssl/openssl/pull/28048/files">some assembly code</a> that improves the performance of the AES-128-CBC decryption algorithm on the <a href="https://en.wikipedia.org/wiki/RISC-V">RISC-V architecture</a>. It’s not the sort of code that just anyone can write. Open source projects, such as OpenSSL, can benefit from one-time contributions of expertise. In turn, anyone who uses OpenSSL or products that include the library also benefit. It’s a beautiful thing.</p>Openssl 3.5.3 Release Announcement
https://openssl-library.org/post/2025-09-16-openssl-3.5.3/
Tue, 16 Sep 2025 00:00:00 +0000https://openssl-library.org/post/2025-09-16-openssl-3.5.3/<p>Release Announcement for <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.3">OpenSSL Library <strong>3.5.3</strong></a></p>
<p>The OpenSSL Project team announces the release of new versions of our open-source toolkit for SSL/TLS.</p>OpenSSL 3.6 Beta Release Announcement
https://openssl-library.org/post/2025-09-16-openssl-3.6-beta/
Tue, 16 Sep 2025 00:00:00 +0000https://openssl-library.org/post/2025-09-16-openssl-3.6-beta/<p>The <a href="https://openssl.org">OpenSSL Project</a> is pleased to announce that <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.0-beta1">OpenSSL 3.6 Beta1</a>
pre-release is available, adding significant functionality to the OpenSSL Library.</p>OpenSSL 3.6 Alpha Release Announcement
https://openssl-library.org/post/2025-09-02-openssl-3.6-alpha/
Tue, 02 Sep 2025 00:00:00 +0000https://openssl-library.org/post/2025-09-02-openssl-3.6-alpha/<p>The <a href="https://openssl.org">OpenSSL Project</a> is pleased to announce that <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.0-alpha1">OpenSSL 3.6 Alpha1</a> pre-release is released and adding significant new functionality to
OpenSSL Library.</p>Contributors to the OpenSSL Library (July 2025)
https://openssl-library.org/post/2025-08-08-july-contributors/
Fri, 08 Aug 2025 00:00:00 +0000https://openssl-library.org/post/2025-08-08-july-contributors/<p>In July, <a href="https://github.com/openssl/openssl/pulls?q=is%3Apr+label%3A%22approval%3A+ready+to+merge%22+-author%3Aopenssl-machine+created%3A2025-07-01..2025-07-31">58 pull
requests</a>
were approved for merge into the OpenSSL Library code base. There were
also four people who contributed code for the first time:</p>
<ul>
<li><a href="https://github.com/yzpgryx">yzpgryx</a> provided a <a href="https://github.com/openssl/openssl/pull/27963">fix to support the SM2 PEM format</a> with matching tests.</li>
<li><a href="https://github.com/caolanm">caolanm</a> designated an unchanging structure <a href="https://github.com/openssl/openssl/pull/28029">to be constant</a>.</li>
<li><a href="https://github.com/igus68">igus68</a> found a <a href="https://github.com/openssl/openssl/issues/27506">good first
issue</a> and <a href="https://github.com/openssl/openssl/pull/28080">fixed
it</a>. Before this fix,
the <a href="https://docs.openssl.org/3.0/man7/crypto/">OpenSSL cryptographic
library</a> would accept a
<a href="https://en.wikipedia.org/wiki/Certificate_revocation_list">certificate revocation
list</a>
that was invalid according to the <a href="https://www.rfc-editor.org/rfc/rfc5280.html#section-5.2.5">X.509 Public Key Infrastructure
specification</a>. Fun
fact: Igor Ustinov represents the Individuals community on the
<a href="https://openssl-communities.org/hub-foundation-tac/">Foundation Technical Advisory
Committee</a> and
this is his first pull request. And he’s on a roll with <a href="https://github.com/openssl/openssl/pull/28160">another
pull request</a> that
addresses <a href="https://github.com/openssl/openssl/issues/24584">an
issue</a> with the
<a href="https://github.com/openssl/openssl/issues?q=state%3Aopen%20label%3A%22help%20wanted%22">help
wanted</a>
label.</li>
<li><a href="https://github.com/Saurabh825">Saurabh825</a> corrected the <a href="https://github.com/openssl/openssl/pull/28123">order of
options</a> for the
<a href="https://docs.openssl.org/master/man1/openssl-cmds/">asn1parse
command</a>.</li>
</ul>
<p>So far in the development cycle of OpenSSL 3.6, the <a href="https://status.openssl.org/versions/3.6/#companies-changes">plurality of
changes</a>
come from developers paid by either the OpenSSL Corporation or
Foundation. But individual contributions continue to make up a large
proportion of commits (41%) and overall changes (28%). Additionally
individual committers also have done 18.5% of reviews so far.</p>Early Bird Registration is Now Open for the OpenSSL Conference 2025
https://openssl-library.org/post/2025-08-01-oss-conf25-early-bird/
Fri, 01 Aug 2025 00:00:00 +0000https://openssl-library.org/post/2025-08-01-oss-conf25-early-bird/<figure class="w-99/100 mx-auto"><img src="https://openssl-library.org/images/blog/banner_earlybird.jpg"
alt="Banner for Conference Early Bird">
</figure>
<p>Early Bird registration is now open for the <strong>inaugural <a href="https://openssl-conference.org/">OpenSSL Conference</a></strong>, taking place from <strong>October 7 to 9, 2025</strong>, in <strong>Prague, Czech Republic</strong>. Take advantage of exclusive Early Bird rates and <strong>secure your spot now</strong>!</p>
<p>Join the global community of cryptographers, open-source innovators, security experts, and thought leaders who shape the future of secure communications. The OpenSSL Conference promises to be a landmark event, uniting diverse perspectives from across technical, enterprise, academic, and regulatory fields.</p>OpenSSL Library 3.6 Upcoming Release Announcement
https://openssl-library.org/post/2025-07-30-openssl-36-final-release/
Tue, 29 Jul 2025 00:00:00 +0000https://openssl-library.org/post/2025-07-30-openssl-36-final-release/<p>The freeze date for OpenSSL 3.6 Alpha is rapidly approaching. If you have a feature ready,
please ensure that your associated PRs are posted, reviewed, and ready to be merged before the include/exclude
decision date (<strong>Tuesday, August 5, 2025</strong>) and merged before the repository freeze date (<strong>Tuesday, August 19, 2025</strong>).
Otherwise, the feature will be postponed until the next release.</p>Contributors to the OpenSSL Library (June 2025)
https://openssl-library.org/post/2025-07-10-june-contributors/
Thu, 10 Jul 2025 00:00:00 +0000https://openssl-library.org/post/2025-07-10-june-contributors/<p>Every month the OpenSSL Library receives code in the form of pull
requests (PR) to GitHub. In June, <a href="https://github.com/openssl/openssl/pulls?q=is%3Apr+label%3A%22approval%3A+ready+to+merge%22+created%3A2025-06-01..2025-06-30">64 of those PRs were
merged</a>
into the default branch of the repository thus becoming a part of the
OpenSSL Library code base. Some of those changes came from developers
paid by either the <a href="https://openssl-foundation.org/">OpenSSL
Foundation</a> or the <a href="https://openssl-corporation.org/">OpenSSL
Corporation</a>. Some of the changes
come from <a href="https://status.openssl.org/years/2025/#companies-commits">developers who work for another
company</a>. And
some, ~40% so far in 2025, come from individuals.</p>There's still time to share your story
https://openssl-library.org/post/2025-07-03-wild-ending/
Thu, 03 Jul 2025 00:00:00 +0000https://openssl-library.org/post/2025-07-03-wild-ending/<p>Recently we opened <a href="https://secure.lglforms.com/form_engine/s/85lymH2pkvzm26KyuxafBQ">a short
survey</a>
for people to share their OpenSSL stories. We’ve already heard from
people who use OpenSSL to:</p>
<ul>
<li>Analyze <a href="https://openssl-foundation.org/post/2025-03-12-quic-server-addition">QUIC</a> traffic.</li>
<li>Secure school cafeteria point of sale (POS) systems.</li>
<li>Protect letters sent digitally to a printer before they are sent
physically, on paper, via the postal system.</li>
<li>Generate a JSON Web Token (JWT) from a PEM (Privacy Enhanced Mail)
file without depending on a third party.</li>
<li>Support software that depends on OpenSSL.</li>
</ul>
<p><img src="https://openssl-library.org/images/blog/2025-07-uses.svg" alt="How is OpenSSL used?"></p>Openssl Release Announcement for 3.5.1, 3.4.2, 3.3.4, 3.2.5, and 3.0.17
https://openssl-library.org/post/2025-07-01-release-announcement/
Tue, 01 Jul 2025 00:00:00 +0000https://openssl-library.org/post/2025-07-01-release-announcement/<p>Release Announcement for OpenSSL Library <strong>3.5.1</strong>, <strong>3.4.2</strong>, <strong>3.3.4</strong>, <strong>3.2.5</strong>, and <strong>3.0.17</strong></p>
<p>The OpenSSL Project team announces the release of new versions of our open-source toolkit for SSL/TLS.</p>
<p>CVEs fixed in 3.5.1:</p>
<ul>
<li><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-4575">CVE-2025-4575</a> - LOW - Fix x509 application adds trusted use instead of rejected use.
All other releases contain miscellaneous minor bug fixes. For details of the changes, refer to the release notes for versions 3.0, 3.2, 3.3, 3.4, and 3.5.</li>
</ul>
<p>Specific notes on upgrading from previous versions are available in the <a href="https://docs.openssl.org/master/man7/ossl-guide-migration/">OpenSSL Migration Guide</a>.</p>OpenSSL Foundation is hiring Software Engineer (C Developer)
https://openssl-library.org/post/2025-06-19-foundation-sw-engineer/
Thu, 19 Jun 2025 00:00:00 +0000https://openssl-library.org/post/2025-06-19-foundation-sw-engineer/<p><strong>Please note that we are no longer accepting new applications for
this position.</strong></p>
<p>OpenSSL Foundation is seeking a talented and motivated Software Engineer
(C Developer) to contribute to the development and maintenance of the
widely-used OpenSSL open-source cryptographic library.</p>Share your user story
https://openssl-library.org/post/2025-06-01-openssl-wild/
Sun, 01 Jun 2025 00:00:00 +0000https://openssl-library.org/post/2025-06-01-openssl-wild/<p><img src="https://openssl-library.org/images/blog/2025_OpenSSL_Wild_Banner.jpg" alt="OpenSSL Library in the Wild: Share your story"></p>
<p>If you’re reading this blog post, you probably don’t need us to tell you how essential, widespread, and important the OpenSSL Library is. While our open source model means that everyone is freely able to use these tools, it also means we here at the OpenSSL Foundation don’t actually know all the great stories of how these tools are being used.</p>
<p>We’re looking for real stories of how the OpenSSL Library benefits your end users.</p>Deadline Extended: More Time to Submit Your Proposal for the OpenSSL Conference 2025
https://openssl-library.org/post/2025-05-30-cfp-extension-ossl25-conference/
Fri, 30 May 2025 00:00:00 +0000https://openssl-library.org/post/2025-05-30-cfp-extension-ossl25-conference/<figure class="w-99/100 mx-auto"><img src="https://openssl-library.org/images/blog/Call%20for%20Papers%20%281%29.png"
alt="CFP Deadline Extended">
</figure>
<p>The <a href="https://openssl-conference.org/">OpenSSL Conference 2025</a> is extending its Call for Papers (CFP) deadline to <strong>June 22, 2025</strong>.</p>
<p>We understand that the best proposals often come from teams deep in the trenches of real-world security work. You now have additional time to craft and submit the <strong>talk, panel, or workshop</strong> that challenges assumptions, advances cryptographic innovation, drives and shapes the future of secure communications.</p>Brno May 2025: Hosting OpenSSL Projects and Corporation BAC Members for Alignment and Connection
https://openssl-library.org/post/2025-05-23-may25_brno_f2f/
Fri, 23 May 2025 00:00:00 +0000https://openssl-library.org/post/2025-05-23-may25_brno_f2f/<figure class="w-99/100 mx-auto"><img src="https://openssl-library.org/images/blog/may25_brno_group.jpeg"
alt="OpenSSL Corporation, OpenSSL Projects, Corporation BACs, and OpenSSL Foundation"><figcaption>
<p>Pictured here from left to right: Štefan Kremeň (Support Manager), Peter Gutmann (cryptlib), Hana Andersen (Marcom Manager), Shayne Jones (cryptlib), Kajal Sapkota (MarCom Specialist), Kateřina Míčová (Business Admin), Daniela Kellnerová (MarCom Specialist), Norbert Pócs (Software Engineer), Tomáš Vávra (Engineering & Standards Mgr.), Anton Arapov (Operations Manager), Tim Hudson (Corporation President), Matt Caswell (Foundation President), Tomáš Mráz (Foundation Public Support and Security Manager), James Bourne (FireDaemon Technologies), Jaroslav Řezník (Red Hat), David Hook (Bouncy Castle), Billy Bob Brumley (RIT)</p>
</figcaption>
</figure>
<br>
<p>From May 14–16, the <strong>OpenSSL Corporation</strong> hosted a face-to-face working session in Brno, Czech Republic. The meeting was designed to bring together participants from the <strong>OpenSSL Projects</strong> and convene in an in-person meeting of the <strong>Corporation’s Business Advisory Committee (BAC)</strong>. The <strong>OpenSSL Foundation</strong> was invited to join on Wednesday and Thursday in the broader conversations with the OpenSSL Projects.</p>
<p>This was the first time these groups gathered in person in this configuration. The sessions served as an opportunity to strengthen working relationships, align on shared priorities, and focus on strategic coordination across the ecosystem.</p>The OpenSSL Corporation and the OpenSSL Foundation Launch Distinguished Contributor Awards with OpenSSL 3.5 Honorees
https://openssl-library.org/post/2025-05-20-3.5-awards/
Tue, 20 May 2025 00:00:00 +0000https://openssl-library.org/post/2025-05-20-3.5-awards/<p>The OpenSSL Corporation and the OpenSSL Foundation are launching the <strong>Distinguished Contributor Awards</strong>, a new programme formally recognising exceptional technical contributions to each OpenSSL Library release. These awards highlight individuals who drive critical advancements and demonstrate technical leadership in the evolution of the OpenSSL Library.</p>Call for Papers Deadline Approaching – Don’t Miss Your Shot to Speak at the OpenSSL Conference 2025!
https://openssl-library.org/post/2025-05-15-cfp-openssl-conference/
Thu, 15 May 2025 00:00:00 +0000https://openssl-library.org/post/2025-05-15-cfp-openssl-conference/<figure class="w-99/100 mx-auto"><img src="https://openssl-library.org/images/blog/25839_OSSL_Banner_1128x191_A_01.jpg"
alt="OpenSSL Corporation Banner">
</figure>
<p><strong>Dates:</strong> October 7–9, 2025
<strong>Location:</strong> Prague, Czech Republic
<strong>Submission Deadline:</strong> May 31, 2025</p>
<p>The <a href="https://openssl-conference.org/">OpenSSL Conference 2025</a> is accepting proposals for <strong>talks, panels, and workshops</strong>. This inaugural event will bring together developers, researchers, security engineers, compliance professionals, and policy experts working across open-source and commercial domains. While the OpenSSL Library remains central to modern cryptography, this conference is designed to support the broader community in building secure systems and advancing internet trust.</p>
<p>We are looking for speakers who can share real-world experiences, technical innovations, and practical insights that contribute to the field of security and cryptographic infrastructure.</p>Technical Advisory Committees Election Results
https://openssl-library.org/post/2025-05-12-tac25-results/
Mon, 12 May 2025 00:00:00 +0000https://openssl-library.org/post/2025-05-12-tac25-results/<p>The <a href="https://openssl-corporation.org/">OpenSSL Corporation</a> and the <a href="https://openssl-foundation.org/">OpenSSL Foundation</a> certify the results of the <strong>Technical Advisory Committee (TAC)</strong> elections. After a thorough nomination and voting process, the OpenSSL community has selected a group of distinguished individuals to provide guidance and advice to the OpenSSL Library.</p>Nomination Deadline Extended: Technical Advisory Committees
https://openssl-library.org/post/2025-04-14-tac-nomination-extention/
Mon, 14 Apr 2025 00:00:00 +0000https://openssl-library.org/post/2025-04-14-tac-nomination-extention/<p>The nomination period for the <a href="https://openssl-corporation.org/post/2025-03-14-tac-announcement/">Technical Advisory Committees</a> (TACs) has been extended. The new deadline is <strong>Sunday, April 27, 2025</strong>.</p>
<p><strong>Take advantage of the extended timeline to submit thoughtful nominations — and play an active role in shaping the future of the OpenSSL Library. Your voice matters!</strong></p>OpenSSL 3.5 Final Release - Live
https://openssl-library.org/post/2025-04-08-openssl-35-final-release/
Tue, 08 Apr 2025 00:00:00 +0000https://openssl-library.org/post/2025-04-08-openssl-35-final-release/<p>The final release of OpenSSL 3.5 is now live. We would like to thank all those who contributed to the OpenSSL 3.5 release, without whom the OpenSSL Library would not be possible.</p>Join Us at the OpenSSL Conference in Prague – October 7 to 9, 2025 - Share Your Expertise and Shape the Future of Secure Communications
https://openssl-library.org/post/2025-04-02-openssl-conference25/
Wed, 02 Apr 2025 00:00:00 +0000https://openssl-library.org/post/2025-04-02-openssl-conference25/<figure class="w-95/100 mx-auto"><img src="https://openssl-library.org/images/blog/25839_OSSL_Banner_1128x191_A_01.jpg"
alt="OpenSSL Conference Banner">
</figure>
<p>The OpenSSL Corporation and the OpenSSL Foundation are pleased to announce the <a href="https://openssl-conference.org/"><strong>OpenSSL Conference 2025</strong></a>, taking place from <strong>October 7 to 9, 2025</strong>, in the historic city of <strong>Prague, Czech Republic</strong>. This premier event brings together a global community of cryptography experts, legal professionals, and open-source enthusiasts dedicated to advancing cryptography and secure communications for three days of in-depth discussions, insights, and networking.</p>Thank You for Joining Our Live Q&A Session on Technical Advisory Committees
https://openssl-library.org/post/2025-03-27-qna-thank-you-live-session-participation/
Thu, 27 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-03-27-qna-thank-you-live-session-participation/<p>On March 24 and 25, 2025, we hosted two live Q&A sessions to discuss the formation and role of the new Technical Advisory Committees (TACs) concerning the OpenSSL Library. These sessions featured:</p>
<ul>
<li><strong>Tim Hudson</strong>, President of the OpenSSL Corporation (Session 1)</li>
<li><strong>Matt Caswell</strong>, President of the OpenSSL Foundation (Sessions 1 and 2)</li>
<li><strong>Anton Arapov</strong>, Operations Director of the OpenSSL Corporation (Session 2)</li>
<li><strong>Hana Andersen</strong>, Marcom Manager of the OpenSSL Corporation (both sessions)</li>
<li>Moderated by <strong>Kajal Sapkota</strong></li>
</ul>
<p>These interactive webinars offered our community the opportunity to ask questions and better understand the purpose and structure of the TACs.</p>OpenSSL 3.5 Beta Release Announcement
https://openssl-library.org/post/2025-03-25-openssl-3.5-beta/
Tue, 25 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-03-25-openssl-3.5-beta/<p>The <a href="https://openssl.org">OpenSSL Project</a> is pleased to announce that <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.0-beta1">OpenSSL 3.5 Beta1</a> pre-release is released and adding significant new functionality to
the OpenSSL Library.</p>Do Not Miss Our Technical Advisory Committee Q&A Sessions - Get Involved!
https://openssl-library.org/post/2025-03-20-qa-tacs/
Thu, 20 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-03-20-qa-tacs/<p>Thank you to everyone who registered and to those who went the extra mile to nominate candidates for the Technical Advisory Committees of the OpenSSL Corporation and OpenSSL Foundation.</p>Join Us in Forming the Technical Advisory Committees (TACs)
https://openssl-library.org/post/2025-03-14-tac-announcement/
Fri, 14 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-03-14-tac-announcement/<p>The <a href="https://openssl-corporation.org/">OpenSSL Corporation</a> (primarily focused on commercial communities) and the <a href="https://openssl-foundation.org/">OpenSSL Foundation</a> (primarily focused on non-commercial communities) are pleased to announce the formation of the <strong>Technical Advisory Committees (TACs)</strong> to provide expert guidance and strategic direction for our technical initiatives. This marks a significant milestone, and we need dedicated individuals to help shape their future.</p>OpenSSL 3.5 Alpha Release Announcement
https://openssl-library.org/post/2025-03-11-openssl-3.5-alpha/
Wed, 12 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-03-11-openssl-3.5-alpha/<p>The <a href="https://openssl.org">OpenSSL Project</a> is pleased to announce that <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.0-alpha1">OpenSSL 3.5 Alpha1</a> pre-release is released and adding significant new functionality to
OpenSSL Library.</p>OpenSSL 3.1.2: FIPS 140-3 Validated
https://openssl-library.org/post/2025-03-11-fips-140-3/
Tue, 11 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-03-11-fips-140-3/<figure class="w-75/100 mx-auto"><img src="https://openssl-library.org/images/blog/FIPS_140-3_Logo_Color.png"
alt="FIPS 140-3 Logo">
</figure>
<p>The <a href="https://openssl-corporation.org">OpenSSL Corporation</a> is pleased to announce that OpenSSL version 3.1.2 has achieved FIPS 140-3 validation, signifying its compliance with the rigorous cryptographic module security requirements set forth by the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a> (NIST). This accomplishment marks a significant milestone in reinforcing trusted, standards-based encryption for organizations operating in regulated environments, including government agencies, healthcare institutions, and financial services.</p>OpenSSL 3.5 Alpha Repository Freeze Approaching
https://openssl-library.org/post/2025-02-28-alpha-freeze-approaching/
Sun, 02 Mar 2025 00:00:00 +0000https://openssl-library.org/post/2025-02-28-alpha-freeze-approaching/<p>The OpenSSL Project is announcing the upcoming release of OpenSSL 3.5 Alpha,
scheduled for March 11, 2025. As a result, the repository will be frozen before the release on <em><strong>March 6, 2025</strong></em>.</p>
<p>The included features can be found in the <a href="https://openssl-library.org/post/2025-02-12-openssl-3.5-go-nogo/">OpenSSL 3.5 Feature Go/No-Go Decision</a> blog post.</p>OpenSSL 3.5 will be the next long term stable (LTS) release
https://openssl-library.org/post/2025-02-20-openssl-3.5-lts/
Thu, 20 Feb 2025 00:00:00 +0000https://openssl-library.org/post/2025-02-20-openssl-3.5-lts/<p>We are pleased to announce that <a href="https://openssl-library.org/post/2025-02-04-release-announcement-3.5/">OpenSSL
3.5</a>
will be the next long term stable (LTS) release. Per <a href="https://openssl-library.org/policies/general/versioning-policy/#long-term-stable-release">OpenSSL’s LTS
policy</a>,
3.5 will be supported until April 8, 2030.</p>
<p>The previous LTS (<a href="https://openssl-library.org/post/2021-09-06-openssl3.final/">OpenSSL 3.0</a>)
will continue to be fully supported until September 7, 2025 and
receive security fixes until September 7, 2026. Projects that
currently depend on 3.0 are strongly encouraged to switch to OpenSSL
3.5 once it has been released.</p>
<p>In addition, the OpenSSL Corporation and Foundation have agreed to
designate an LTS every two years. That means there will be an LTS
release in April of 2027, another in 2029, and so on. As always, each
LTS will be supported for 5 years with the final year’s support being
security patches only. For more information, please see the <a href="https://openssl-library.org/roadmap/">OpenSSL
Library Roadmap</a>.</p>OpenSSL 3.5 Feature Branch Merge – Go/No-Go Decisions
https://openssl-library.org/post/2025-02-12-openssl-3.5-go-nogo/
Wed, 12 Feb 2025 00:00:00 +0000https://openssl-library.org/post/2025-02-12-openssl-3.5-go-nogo/<p>We’re introducing a streamlined process for deciding which new features make it into each OpenSSL Library release. This involves two layers of readiness checks—technical and business—to help ensure features are both technically sound and well-aligned with the broader needs of the communities. For OpenSSL 3.5, the OpenSSL Technical Committee (OTC) has advised on technical readiness, and the Business Advisory Committee has advised on business readiness.</p>
<p>The go/no-go decisions ensure we merge well-vetted features into the main codebase for OpenSSL 3.5, complementing OpenSSL Library’s existing review process.</p>OpenSSL 3.5: Upcoming Release Announcement
https://openssl-library.org/post/2025-02-04-release-announcement-3.5/
Tue, 04 Feb 2025 00:00:00 +0000https://openssl-library.org/post/2025-02-04-release-announcement-3.5/<p>The freeze date for OpenSSL 3.5 Alpha is rapidly approaching. If you have a feature on the planning page, please ensure that your associated PRs are posted, reviewed, and ready to be merged before the include/exclude decision date (<strong>Tuesday, February 11, 2025</strong>) and merged before the repository freeze date (<strong>Tuesday, February 25, 2025</strong>). Otherwise, the feature will be postponed until the next release.</p>
<h2 id="important-dates">Important dates</h2>
<ul>
<li><strong>Feature branches include/exclude decision date:</strong> February 11, 2025</li>
<li><strong>Feature branches merge:</strong> February 18, 2025</li>
<li><strong>Repository freeze date:</strong> February 25, 2025</li>
<li><strong>Alpha release date:</strong> March 11, 2025</li>
<li><strong>Beta release date:</strong> March 25, 2025</li>
<li><strong>Release date:</strong> April 8, 2025</li>
</ul>
<img src="https://openssl-library.org/images/blog/release-3.5.svg" width=95% alt="release-3.5.svg" class="center" >
<h2 id="current-highlights-of-the-feature-list-planned-for-35-include">Current highlights of the feature list planned for 3.5 include:</h2>
<ul>
<li>QUIC server - <strong>QUIC (<a href="https://datatracker.ietf.org/doc/html/rfc9000">RFC 9000</a> - Quick UDP Internet Connections)</strong> is a protocol intended to deliver faster, secure communication for Internet applications. Standardized as RFC 9000, QUIC operates over UDP.</li>
<li>ML-KEM - <strong>Module Lattice Based Key Encapsulation Mechanism (<a href="https://csrc.nist.gov/pubs/fips/203/final">FIPS 203</a>)</strong>, a post-quantum cryptography algorithm for key encapsulation for secure key exchange.</li>
<li>ML-DSA - <strong>Module Lattice Based Digital Signature Algorithm (<a href="https://csrc.nist.gov/pubs/fips/204/final">FIPS 204</a>)</strong>, a post-quantum cryptography algorithm for signature generation and verification for proof of authenticity and non-repudiation.</li>
<li>SLH-DSA - <strong>Stateless Hash Based Digital Signature Algorithm (<a href="https://csrc.nist.gov/pubs/fips/205/final">FIPS 205</a>)</strong>, a post-quantum cryptography algorithm for signature generation and verification for proof of authenticity and non-repudiation.</li>
</ul>
<p>If you have any questions or comments regarding the OpenSSL 3.5 release contact us at <a href="mailto:[email protected]">[email protected]</a>.</p>OpenSSL Position and Plans on Private Key Formats for the ML-KEM and ML-DSA Post-quantum (PQ) Algorithms
https://openssl-library.org/post/2025-01-21-blog-positionandplans/
Tue, 21 Jan 2025 00:00:00 +0000https://openssl-library.org/post/2025-01-21-blog-positionandplans/<p>The anticipated future arrival of <em><strong>cryptographically relevant quantum computers</strong></em> (CRQCs),
that could undermine the algorithms that underlie the currently most widely used public key algorithms (ECDHE, ECDSA, DH and RSA),
has led to the development and recent standardisation of new “post-quantum” (PQ) algorithms, that are believed to not be vulnerable to CRQC attack.</p>
<p>Two of the first algorithms standardized are ML-KEM (for key agreement) and ML-DSA (for digital signatures).
These algorithms are standardized by NIST in FIPS 203 and FIPS 204. These define the algorithm parameters and how to correctly
perform the necessary mathematical operations, but do not define such details as data formats for public and private keys.
Those details were left to other standards organisations, such as the IETF.</p>Introducing Jon Ericson
https://openssl-library.org/post/2025-01-17-introducing-jon/
Fri, 17 Jan 2025 00:00:00 +0000https://openssl-library.org/post/2025-01-17-introducing-jon/<p>From the very beginning of the project, OpenSSL has depended on a
community of experts to enable secure and private communication. It’s
safe to say that without volunteers contributing code, tests and
documentation, we wouldn’t have the modern internet. In order to
preserve and grow that ecosystem, the <a href="https://openssl-foundation.org">OpenSSL
Foundation</a> has brought in Jon Ericson
as its first Communities Manager.</p>
<p>Jon began his programming career as an intern at the US National
Weather Service where he designed software to test instruments for the
Automated Surface Observing System
(<a href="https://www.weather.gov/asos/">ASOS</a>). He continued as a programmer
at the Jet Propulsion Laboratory (<a href="https://www.jpl.nasa.gov/">JPL</a>)
with the Shuttle Radar Topography Mission
(<a href="https://www.earthdata.nasa.gov/data/instruments/srtm">SRTM</a>)
ground-data team. When that project ended, he managed data processing
for the Tropospheric Emission Spectrometer
(<a href="https://tes.jpl.nasa.gov/tes/">TES</a>) mission which collected global
atmospheric data from heliosynchronous orbit. Along the way he
participated in open source projects such as Perl and Emacs via Usenet
groups and mailing lists.</p>Connect with us at FOSDEM
https://openssl-library.org/post/2025-01-16-foundation-at-fosdem/
Thu, 16 Jan 2025 00:00:00 +0000https://openssl-library.org/post/2025-01-16-foundation-at-fosdem/<p>The OpenSSL Foundation will be attending FOSDEM in Brussels, Belgium on 1-2 February 2025, and we’d like to connect with you!</p>
<p>The Free and Open Source Developers’ European Meeting (FOSDEM) is a volunteer-organized event to promote the widespread use of free and open source software. The conference includes 1,001 events across two days, taking place in 40 rooms on the ULB Solbosch Campus. There is no fee to participate and attend.</p>OpenSSL Foundation publishes first ever annual report
https://openssl-library.org/post/2024-12-23-foundation-annual-report/
Mon, 23 Dec 2024 00:00:00 +0000https://openssl-library.org/post/2024-12-23-foundation-annual-report/<p>The OpenSSL Foundation is pleased to share its Annual Report for fiscal year 2024, covering the period of August 1, 2023 through July 31, 2024. This public document is a first for the Foundation, reflecting a renewed commitment to transparency with our communities and the sponsors and donors whose contributions provide critical financial support.</p>
<p>One year ago, we celebrated the 25th anniversary of OpenSSL, marking the release of version 0.9.1c on December 23, 1998, and it seemed fitting to share this Annual Report today, on OpenSSL’s 26th birthday. So much has changed over those 26 years, but our reliance on our community of committers, contributors, and funders has not. We greatly appreciate the many contributions of many types that keep OpenSSL strong and secure and hope you enjoy reading about all that we achieved together.</p>Foundation BAC Distributions seat
https://openssl-library.org/post/2024-12-19-bacs-foundation-distros/
Thu, 19 Dec 2024 00:00:00 +0000https://openssl-library.org/post/2024-12-19-bacs-foundation-distros/<p>As previously communicated the recent election for the Distributions seat on the
Foundation BAC resulted in a tie between Dmitry Belyavsky (Red Hat) and John
Haxby (Oracle). As a result we will be re-running this election in early January
with just these two candidates. Voting will open on 3rd January 2025 and will
close on 10th January 2025.</p>
<p>The “Distributions” community includes maintainers of operating systems or
significant packages that integrate OpenSSL Foundation and OpenSSL Corporation
projects. If you are involved in an OpenSSL distribution then we encourage you
to <a href="https://openssl-communities.org/hub-distributions/">sign up</a> to the
community and vote in the second round of the election in January.</p>Announcing the Results of the Business Advisory Committee Elections
https://openssl-library.org/post/2024-12-17-bacs-election-results/
Tue, 17 Dec 2024 00:00:00 +0000https://openssl-library.org/post/2024-12-17-bacs-election-results/<p>Upon certification of the election results by the Election Committee, the <a href="https://openssl-foundation.org/">OpenSSL Foundation</a> and the <a href="https://openssl-corporation.org/">OpenSSL Corporation</a> are pleased to announce the official results of the Business Advisory Committee (BAC) elections. After a thorough nomination and voting process, the OpenSSL community has selected a group of distinguished individuals to provide guidance and advice to OpenSSL.</p>
<p><strong>Newly Elected Members</strong></p>
<p>The following candidates have been elected to serve on the Business Advisory Committee:</p>
<p><em><strong>OpenSSL Foundation BAC Members</strong></em></p>Re-opening donation opportunities to OpenSSL Foundation
https://openssl-library.org/post/2024-12-11-individual-sponsorship/
Wed, 11 Dec 2024 00:00:00 +0000https://openssl-library.org/post/2024-12-11-individual-sponsorship/<p>The OpenSSL Foundation is pleased to announce that we are reopening the opportunity for individuals to financially support our work through donations on <a href="https://github.com/sponsors/openssl">Github Sponsors</a>. Individual contributions of time, expertise, and financial support have always been critical to our ability to keep improving the OpenSSL software library, and we are excited to once again welcome financial contributions at all levels.</p>Business Advisory Committees Elections Are Now Open - Vote for Your Community Representative
https://openssl-library.org/post/2024-12-06-bacs-election/
Fri, 06 Dec 2024 00:00:00 +0000https://openssl-library.org/post/2024-12-06-bacs-election/<p>Thank you to everyone who registered, as well as those who took the extra step to nominate candidates, for the Business Advisory Committees of the OpenSSL Foundation and OpenSSL Corporation. We are now at the final step - <strong>voting</strong> - which is essential to complete the process.</p>
<p><strong>Start Date:</strong> December 5, 2024<br>
<strong>Deadline for Voting:</strong> December 15, 2024 11:59pm Pacific Time (US/ Canada)</p>
<p><strong>Election Committee</strong></p>
<p>The Election Committee is composed of the directors of the OpenSSL Foundation and the OpenSSL Corporation. This marks the first inaugural Election Committee, tasked with overseeing and managing the election processes across various communities. The committee is dedicated to ensuring that voting is conducted fairly, transparently, and in alignment with the established rules and procedures.</p>Nominations Remain Open Until Wednesday, December 4, 2024 - Based on Your Feedback!
https://openssl-library.org/post/2024-11-27-nominations-remain-open/
Wed, 27 Nov 2024 00:00:00 +0000https://openssl-library.org/post/2024-11-27-nominations-remain-open/<p>Thank you to everyone who attended our Q&A sessions about the formation of Business Advisory Committees. We received valuable input from our communities, including requests to allow more time for nominations.</p>
<p>We have heard you, and we would like to announce that:</p>
<ul>
<li><strong>The nomination period has been extended until Wednesday, December 4, 2024.</strong></li>
<li><strong>The election period starts on Thursday, December 5, 2024 and ends on Sunday, December 15, 2024. You can change your vote up to the end of the election period.</strong></li>
</ul>
<p>This extension provides additional time to ensure everyone has the opportunity to nominate the individuals who can best represent the community’ s view and needs.</p>Websites mirrors
https://openssl-library.org/post/2024-11-26-websites-mirrors/
Tue, 26 Nov 2024 00:00:00 +0000https://openssl-library.org/post/2024-11-26-websites-mirrors/<p>To align with our <a href="https://openssl-mission.org/">mission</a>, we have provisioned mirrors for our
websites, hosted through our chosen CDN vendor:</p>
<ul>
<li><a href="https://mirror.openssl.org">https://mirror.openssl.org</a></li>
<li><a href="https://mirror.openssl-mission.org">https://mirror.openssl-mission.org</a></li>
<li><a href="https://mirror.openssl-library.org">https://mirror.openssl-library.org</a></li>
<li><a href="https://mirror.openssl-foundation.org">https://mirror.openssl-foundation.org</a></li>
<li><a href="https://mirror.openssl-corporation.org">https://mirror.openssl-corporation.org</a></li>
<li><a href="https://mirror.openssl-projects.org">https://mirror.openssl-projects.org</a></li>
<li><a href="https://mirror.openssl-conference.org">https://mirror.openssl-conference.org</a></li>
</ul>
<p>These mirrors are accessible in locations where our original websites might be blocked.</p>Upcoming Webinar - Working with X.509 Keys and Certificates
https://openssl-library.org/post/2024-11-08-x509-webinar/
Fri, 08 Nov 2024 00:00:00 +0000https://openssl-library.org/post/2024-11-08-x509-webinar/<p><strong>Advance Your Skills in X.509 Certificate Management with OpenSSL</strong></p>
<ul>
<li><strong>Date:</strong> Nov 21, 2024</li>
<li><strong>Time:</strong> 04:00 PM Eastern Time (US and Canada)</li>
<li><strong>Duration:</strong> 1 hour</li>
<li><strong>Location:</strong> Online Webinar (link to be provided upon registration)</li>
<li><a href="https://api.transpond.io/form?am=38291&fid=36899&host=true">Register Here</a></li>
</ul>
<p><strong>Are you looking to deepen your understanding of X.509 keys and certificates or sharpen your command-line skills?</strong></p>
<p>Join us for a comprehensive webinar on X.509 certificate management led by Viktor Dukhovni, an OpenSSL Software Engineer. This session covers essential concepts and hands-on techniques using OpenSSL’s command-line tools.</p>OpenSSL Forms Business Advisory Committees - Shape the Future - Join Now!
https://openssl-library.org/post/2024-10-30-join-bacs/
Wed, 30 Oct 2024 00:00:00 +0000https://openssl-library.org/post/2024-10-30-join-bacs/<p>The <a href="https://openssl-foundation.org/">OpenSSL Foundation</a> (primarily focused on non-commercial communities) and the <a href="https://openssl-corporation.org/">OpenSSL Corporation</a> (primarily focused on commercial communities) are pleased to announce the formation of Business Advisory Committees (BAC), inviting our communities - Distributions, Committers, Small Businesses, Large Businesses, Individuals, and Academics - to actively engage in shaping the future of <a href="https://openssl.org/">OpenSSL</a>. These advisory bodies are critical in enhancing our governance structure, ensuring that the decisions reflect the diverse stakeholders involved and that our <a href="https://openssl-mission.org/">Mission and Values</a> stay aligned with the community’s needs.</p>OpenSSL 3.4 Final Release Live
https://openssl-library.org/post/2024-10-22-openssl-3-4-final/
Tue, 22 Oct 2024 00:00:00 +0000https://openssl-library.org/post/2024-10-22-openssl-3-4-final/<p>The final release of OpenSSL 3.4 is now live. We would like to thank all those who contributed to the OpenSSL 3.4 release, without whom OpenSSL would not be possible.</p>
<p>OpenSSL delivers the following significant new features:</p>
<ul>
<li>Support for Integrity only cipher suites (RFC 9150)</li>
<li>JITTER RNG support via statically linked jitterentropy library</li>
<li>RFC 5755 Attribute Certificate support</li>
<li>FIPS indicators in support of FIPS 140-3 validation</li>
<li>Improved Base64 BIO input handling and error reporting</li>
<li>XOF Digest size reporting improvements</li>
<li>Windows Registry key-based directory lookup</li>
<li>Support for several X509v3 extensions</li>
<li>Support for position independent executables in the openssl app to support address space layout randomization</li>
</ul>
<p>Please see the <a href="https://github.com/openssl/openssl/blob/openssl-3.4/CHANGES.md">CHANGES.md</a> file in the release for a full list of changes since OpenSSL 3.3</p>OpenSSL is hiring Communities Manager
https://openssl-library.org/post/2024-10-22-communities-manager/
Tue, 22 Oct 2024 00:00:00 +0000https://openssl-library.org/post/2024-10-22-communities-manager/<p><strong>Please note that we are no longer accepting new applications for
this position.</strong></p>
<p>OpenSSL is hiring for a Communities Manager to join our team.</p>Introducing Amy Parker
https://openssl-library.org/post/2024-10-07-introducing-amy/
Mon, 07 Oct 2024 00:00:00 +0000https://openssl-library.org/post/2024-10-07-introducing-amy/<p>OpenSSL welcomes Amy Parker as the newest member of the
<a href="https://openssl-foundation.org">OpenSSL Foundation</a> team. Amy joins us in the
newly created position of Chief Funding Officer, a fundraising role focused on
revenue generation through corporate sponsorship and other
charitable/non-commercial contributions. Funds raised will help the Foundation
continue to deliver on its mission of providing security and privacy tools to
everyone, everywhere.</p>
<p>A strategic leader with more than twenty years of senior-level fundraising
experience, Amy has worked for prestigious educational and cultural institutions
including the Wikimedia Foundation, Smithsonian Institution, The New York Public
Library, and the University of North Carolina at Chapel Hill. She has been part
of several record-setting fundraising campaigns, including the Smithsonian’s
first-ever comprehensive campaign, which raised over $1.8 billion, and the $2
billion Carolina First Campaign, which was one of the 5 largest campaigns in US
higher education at the time.</p>OpenSSL 3.4 beta released
https://openssl-library.org/post/2024-10-07-openssl-3-4-beta/
Mon, 07 Oct 2024 00:00:00 +0000https://openssl-library.org/post/2024-10-07-openssl-3-4-beta/<p>OpenSSL 3.4 beta 1 has now been made available.</p>
<p>Our beta releases are considered feature complete for the release, meaning
that between now and the final release, only bug fixes are expected (if any).
Notable features of this release are available in <a href="https://github.com/openssl/openssl/blob/openssl-3.4/NEWS.md">NEWS.md</a>
within the source tarball.</p>
<p>Beta releases are provided to our communities for testing and feedback
purposes. If you use OpenSSL, and particularly if you intend to upgrade to
OpenSSL 3.4 when it is released, we strongly encourage you to download this
beta release, and test it within whatever quality control mechanisms you
have, providing feedback via our GitHub issue page at
<a href="http://github.com/openssl/openssl/issues">http://github.com/openssl/openssl/issues</a>, so that we can address any
shortcomings prior to the final release</p>OpenSSL Corporation's Silver Sponsorship at ICMC 2024 - A Retrospective
https://openssl-library.org/post/2024-09-25-icmc24-retrospective/
Fri, 27 Sep 2024 00:00:00 +0000https://openssl-library.org/post/2024-09-25-icmc24-retrospective/<p>OpenSSL Corporation’s participation as a Silver Sponsor at the International Cryptographic Module Conference (ICMC) 18<sup>th</sup> - 20<sup>th</sup> September 2024 marked an important milestone in our continued commitment to advancing cryptographic technologies. As a critical player in secure communication, OpenSSL’s involvement highlighted our dedication to fostering collaboration, innovation, and security within the cryptographic community.</p>
<p>ICMC 2024 provided a valuable platform for industry leaders to engage in key discussions surrounding cryptographic standards, challenges, and innovations. Through our sponsorship, OpenSSL contributed to critical dialogues on post-quantum cryptography, regulatory compliance, and developing secure, open-source cryptographic solutions.</p>Lightship Security Partnership with OpenSSL
https://openssl-library.org/post/2024-09-18-lightship-partnership/
Wed, 18 Sep 2024 00:00:00 +0000https://openssl-library.org/post/2024-09-18-lightship-partnership/<p>OpenSSL is sharing Lightship Security’s latest press release, highlighting the new partnership with the OpenSSL Corporation. Read the full release below:</p>
<p><strong>Lightship Security, an Applus+ Laboratories company and a leading cryptographic security test lab, announces its agreement with the OpenSSL Corporation to provide FIPS 140-3 validation services for the OpenSSL cryptographic library.</strong></p>
<p>The OpenSSL Corporation provides commercial support for users of the OpenSSL Library, a critical component of secure communications in enterprise technologies.</p>Performance benchmarks dashboard
https://openssl-library.org/post/2024-09-17-performance-benchmarks/
Tue, 17 Sep 2024 00:00:00 +0000https://openssl-library.org/post/2024-09-17-performance-benchmarks/<p>We would like to announce the release of the <strong>OpenSSL Performance Benchmarks Dashboard</strong>, designed
to track the impact of code changes on performance. The key focus of this dashboard is relative
performance so we can assess how various code modifications affect OpenSSL’s performance across
versions. This helps ensure that we’re aware of any potential performance impacts in advance,
allowing us to maintain or improve efficiency with each update.</p>
<p>You can explore the dashboard here:
<a href="https://openssl-library.org/performance/">OpenSSL Performance Benchmarks Dashboard</a>.
Additionally, it can be conveniently accessed from the main menu of this site under the “Resources”
section.</p>Post-Quantum Algorithms in OpenSSL
https://openssl-library.org/post/2024-09-17-post-quantum/
Tue, 17 Sep 2024 00:00:00 +0000https://openssl-library.org/post/2024-09-17-post-quantum/<p>Recently NIST published a number of post-quantum algorithm standards (ML-KEM,
ML-DSA, and SLH-DSA). With these new NIST publications, OpenSSL is now prepared
for implementation.</p>
<p>We’ve recently been receiving a lot of questions about these new standards so we
wanted to make our position clear:</p>
<ul>
<li>We intend to implement support for these algorithms in our providers in a
future version of OpenSSL</li>
<li>We are currently putting together our project plans for this, stay tuned for
more information regarding timeline</li>
<li>We invite qualified and skilled individuals to help us implement these
algorithms and integrate them into OpenSSL in accordance with our standards and policies.</li>
</ul>
<p>From early 2022 a research project made available a test vehicle enabling TLS1.3
and X.509 support for many pre-standard and other experimental post-quantum
algorithms via the OpenSSL provider interface, called
<a href="https://github.com/open-quantum-safe/oqs-provider">oqs-provider</a>. Its primary
author and maintainer (<a href="https://github.com/baentsch">Michael Baentsch</a>) has now
joined the OpenSSL team with the goal to support an efficient, secure, smooth
and seamless integration of the now standardised post-quantum algorithms from
NIST into the OpenSSL code base. Many lessons learnt from the process of
building and integrating
<a href="https://github.com/open-quantum-safe/oqs-provider">oqs-provider</a> into
downstream applications will be applied to this process.</p>OpenSSL 3.4 alpha released
https://openssl-library.org/post/2024-09-10-openssl-3-4-alpha/
Tue, 10 Sep 2024 00:00:00 +0000https://openssl-library.org/post/2024-09-10-openssl-3-4-alpha/<p>OpenSSL 3.4 alpha 1 has now been made available.</p>
<p>Our Alpha releases are considered feature complete for the release, meaning
that between now and the final release, only bug fixes are expected (if any).
Notable features of this release are available in CHANGES.md within the source
tarball.</p>
<p>Alpha releases are provided to our communities for testing and feedback
purposes. If you use OpenSSL, and particularly if you intend to upgrade to
OpenSSL 3.4 when it is released, we strongly encourage you to download this
alpha release, and test it within whatever quality control mechanisms you
have, providing feedback via our GitHub issue page at
<a href="http://github.com/openssl/openssl/issues">http://github.com/openssl/openssl/issues</a>, so that we can address any
shortcomings prior to the final release</p>OpenSSL considering TLS 1.0/1.1 deprecation
https://openssl-library.org/post/2024-09-10-tls-deprecation/
Tue, 10 Sep 2024 00:00:00 +0000https://openssl-library.org/post/2024-09-10-tls-deprecation/<p>Recently, OpenSSL proposed the deprecation of TLS 1.0/1.1 and solicited
community feedback on the idea.</p>
<p>Feedback on the proposal was generally split down the middle, with half of the
respondents indicating immediate depreciation with near-term removal was
acceptable, while the remainder of the respondents with affirmative opinions
noted that they represent, or know of products whose environment disallowed
updating to TLS1.2 or later, and would need to re-enable the deprecated
features for the foreseeable future.</p>Join Our Webinar on Debugging OpenSSL Applications
https://openssl-library.org/post/2024-08-30-debugging-webinar/
Fri, 30 Aug 2024 00:00:00 +0000https://openssl-library.org/post/2024-08-30-debugging-webinar/<p>Debugging is a crucial aspect of developing and maintaining reliable software. However, debugging can become particularly challenging when applications incorporate diverse and complex components like OpenSSL. This webinar is designed to help you navigate these complexities.</p>
<h2 id="webinar-details">Webinar Details</h2>
<p><strong>Date:</strong> September 11, 2024 <br>
<strong>Time:</strong> 09:00 AM Pacific Time (US and Canada) <br>
<strong>Platform:</strong> Zoom <br>
<strong>Topic:</strong> Debugging OpenSSL Applications</p>
<p><strong>Registration Link:</strong><a href="https://api.transpond.io/form?am=38291&fid=35239&host=true"> Click here to register</a></p>
<h2 id="what-to-expect">What to Expect</h2>
<ul>
<li><strong>Internal Debugging Tools</strong>: Learn about the facilities OpenSSL provides to help you gain visibility into its internal behavior, allowing for more effective troubleshooting.</li>
<li><strong>External Diagnostic Tools</strong>: Explore additional tools that can be integrated with OpenSSL to diagnose and resolve more intricate issues.</li>
</ul>
<p>For professionals dealing with OpenSSL, mastering these debugging techniques is essential to ensuring the stability and security of their applications.</p>Join OpenSSL at the ICMC 2024 - Visit Our Exhibit Booth!
https://openssl-library.org/post/2024-08-20-icmc24/
Tue, 20 Aug 2024 00:00:00 +0000https://openssl-library.org/post/2024-08-20-icmc24/<p>OpenSSL is pleased to announce its participation as a Silver Sponsor at the upcoming International Cryptographic Module Conference (ICMC) 2024, taking place from 18<sup>th</sup> to 20<sup>th </sup>September. Visit our booth and attend our presentations to discover how we can help each other.</p>
<!-- more -->
<h2 id="event-details">Event Details</h2>
<p><strong>Conference Name:</strong> <a href="https://icmconference.org/">International Cryptographic Module Conference</a><br />
<strong>Dates:</strong> 18<sup>th</sup> - 20<sup>th</sup> September 2024<br />
<strong>Location:</strong> DoubleTree by Hilton, San Jose, California<br />
<strong>Our Booth Number:</strong> 102</p>OpenSSL 3.4 Alpha release approaching
https://openssl-library.org/post/2024-08-16-3.4-alpha-approaching/
Fri, 16 Aug 2024 13:00:00 +0000https://openssl-library.org/post/2024-08-16-3.4-alpha-approaching/<p>The freeze date for OpenSSL 3.4 Alpha is rapidly approaching.</p>
<!-- more -->
<p><strong>Alpha freeze approaching</strong></p>
<p>The freeze date for OpenSSL 3.4 Alpha is rapidly approaching. Planned features
are viewable on our <a href="https://github.com/orgs/openssl/projects/12/views/5">3.4 Planning page</a>.
If you have a feature on the planning
page, please ensure that your associated PRs are posted, reviewed, and merged
prior to the freeze date (Friday, Aug 30, 2024), or it will be postponed until
the next release.</p>New Governance Structure and New Projects under the Mission
https://openssl-library.org/post/2024-07-24-openssl-new-governance-structure/
Wed, 24 Jul 2024 11:00:00 +0000https://openssl-library.org/post/2024-07-24-openssl-new-governance-structure/<p>As part of our ongoing journey, OpenSSL is evolving to provide more opportunities for engagement that more effectively align with our <a href="https://openssl-mission.org/">mission statement and promote our values</a>. OpenSSL is implementing various mechanisms to foster greater community involvement and enable our communities to play a key and active role in the decision-making process.</p>
<!-- more -->
<p><strong>New Governance Framework</strong></p>
<p>OpenSSL has two independent, co-equal organizations to support the OpenSSL Mission:</p>
<ul>
<li>The <a href="https://openssl-foundation.org/">OpenSSL Foundation</a> primarily focuses on non-commercial communities.</li>
<li>The <a href="https://openssl-corporation.org/">OpenSSL Corporation</a> primarily focuses on commercial communities.</li>
</ul>
<p>This balanced approach ensures that both entities can operate independently and make decisions autonomously.</p>OpenSSL is hiring - Fundraiser
https://openssl-library.org/post/2024-07-24-fundraiser/
Wed, 24 Jul 2024 00:00:00 +0000https://openssl-library.org/post/2024-07-24-fundraiser/<p><strong>Note that this position has now been filled and we are no longer accepting
applications</strong></p>
<p>OpenSSL is hiring for a Fundraiser to join our team</p>
<!-- more -->
<p>We are seeking a Fundraiser to join our team. As a Fundraiser at OpenSSL, you
will play a vital role in sustaining critical components of internet
infrastructure that enable secure communications around the world. In addition
to your fundraising role, you must align with and uphold our core
<a href="https://openssl-mission.org/">values and mission</a> in your every day
professional activities. This role will require you to
have strong networks and relationships with our various sponsors, customers and
communities in order to help us identify and bring on board new sponsors for our
project as well as maintain our existing ones. You will also hold significant
responsibility for developing our sponsorship and fundraising program in order
to ensure that our sponsors are getting good value from their engagement with us
whilst at the same time maximizing the resources available to OpenSSL to further
develop and expand.</p>Join Our Exclusive Webinar on Performance Tuning with OpenSSL
https://openssl-library.org/post/2024-07-18-august-webinar/
Thu, 18 Jul 2024 13:00:00 +0000https://openssl-library.org/post/2024-07-18-august-webinar/<p>Secure communication is vital in today’s digital world, but it sometimes slows down your applications. We invite you to an insightful webinar on optimizing application performance using OpenSSL. This session is designed for individuals seeking to enhance the security and efficiency of their applications.</p>
<!-- more -->
<h2 id="webinar-details">Webinar Details</h2>
<p><strong>Date:</strong> August 1, 2024 <br>
<strong>Time:</strong> 09:00 AM Pacific Time (US and Canada) <br>
<strong>Platform:</strong> Zoom <br>
<strong>Topic:</strong> Performance Tuning with OpenSSL</p>
<p><strong>Registration Link:</strong><a href="https://zoom.us/webinar/register/8917163125507/WN_-4zEZ7uDRbqxQTrqCn3hww"> Click here to register</a></p>OpenSSL mailing lists are moving to Google Groups
https://openssl-library.org/post/2024-07-16-google-groups/
Wed, 17 Jul 2024 13:00:00 +0000https://openssl-library.org/post/2024-07-16-google-groups/<p>We are announcing a change in how communication and collaboration will take place within
the OpenSSL community. Effective August 1st, 2024, the OpenSSL mailing lists will migrate
to Google Groups. This transition is designed to streamline communication channels and
simplify our infrastructure.</p>
<!-- more -->
<h2 id="why-the-change">Why the change?</h2>
<p>Over the years, the combintation of Postfix and Mailman has served us well, but it’s time to move on
and explore better options. Google Groups offers several advantages that align with our goals:</p>Large issue cleanup in OpenSSL
https://openssl-library.org/post/2024-06-25-issue-cleanup/
Tue, 25 Jun 2024 16:00:00 +0000https://openssl-library.org/post/2024-06-25-issue-cleanup/<p>OpenSSL is cleaning up its issue backlog</p>
<!-- more -->
<h2 id="whats-going-on">Whats going on?</h2>
<p>Recently, some may have noticed issues (particularly old ones) in the openssl
repository have received an update, having the ‘inactive’ label applied to them
with a comment indicating that they will be closed at the end of the 3.4
development cycle. OpenSSL currently has almost 2000 outstanding issues in its
issue list, many of which have been sitting idle for multiple years. In an
effort to better plan and schedule work for the OpenSSL development team, it has
become increasingly clear that, to do so efficiently, the issue list must be
reduced, so as to better identify those issues which are impacting the larger
user base more visibly for planning purposes.</p>New OpenSSL patch releases available
https://openssl-library.org/post/2024-06-04-patch-releases-available/
Tue, 04 Jun 2024 16:00:00 +0000https://openssl-library.org/post/2024-06-04-patch-releases-available/<p>New OpenSSL patch releases are available</p>Soliciting input regarding a potential hardening effort
https://openssl-library.org/post/2024-05-07-soliciting-input-on-a-hardening-effort/
Mon, 03 Jun 2024 20:00:00 +0000https://openssl-library.org/post/2024-05-07-soliciting-input-on-a-hardening-effort/<p>OpenSSL is soliciting input on a hardening effort for our library. The details
can be found here:
<a href="https://github.com/openssl/openssl/discussions/24321">https://github.com/openssl/openssl/discussions/24321</a></p>Upcoming Webinar: Getting Started with QUIC and OpenSSL
https://openssl-library.org/post/2024-05-22-quic-webinar/
Tue, 28 May 2024 16:00:00 +0000https://openssl-library.org/post/2024-05-22-quic-webinar/<p>We are pleased to announce our upcoming webinar, Getting Started with QUIC and OpenSSL.</p>
<p>In this brief yet comprehensive session, we’ll dive into the basics of QUIC and guide you through implementing a simple client using the QUIC OpenSSL API. By the end of this webinar, you’ll have a solid grasp of creating a client application that connects to a server and receives data. Our demo client may be straightforward, but it serves as the perfect playground to explore and observe the QUIC protocol in action. Get ready to see QUIC in motion and discover the tools to monitor its performance effectively!</p>OSTIF and Trail of Bits Complete Audit of OpenSSL
https://openssl-library.org/post/2024-05-02-ostif/
Thu, 02 May 2024 16:00:00 +0000https://openssl-library.org/post/2024-05-02-ostif/<p>OpenSSL would like to announce the publication of the final report of a recent
security audit conducted on the OpenSSL software library.</p>Releases distribution changes
https://openssl-library.org/post/2024-04-30-releases-distribution-changes/
Tue, 30 Apr 2024 16:00:00 +0000https://openssl-library.org/post/2024-04-30-releases-distribution-changes/<p>I’d like to give you a heads-up about some changes we’re making at OpenSSL. We’re simplifying how
you can get our software, and that means we’re phasing out some older methods that don’t quite fit
with the way the web works today.</p>QUIC server preview branch available for testing and feedback
https://openssl-library.org/post/2024-03-10-quic-server-preview/
Tue, 16 Apr 2024 13:45:00 +0000https://openssl-library.org/post/2024-03-10-quic-server-preview/<p>We are pleased to announce the availability of a feature preview for our OpenSSL
QUIC server functionality. This is an early technology preview which is being
published to seek feedback from our communities.</p>
<p>This preview is now available in the <a href="https://github.com/openssl/openssl/tree/feature/quic-server"><code>feature/quic-server</code> branch</a> of
the OpenSSL repository on GitHub. Those interested in providing early feedback
on our QUIC server functionality are invited to download and build this branch.</p>
<p>It is important to note that this branch represents a prototype phase at this
time and many aspects of the planned functionality are not yet implemented. In
particular, only a very small subset of the full SSL API is currently
implemented. This preview is being released to enable all of our communities to
provide their feedback as part of the API design process and in order to
validate our requirements prior to the finalisation of the API.</p>Upcoming Webinar: Writing a TLS Client
https://openssl-library.org/post/2024-04-15-april-webinar/
Mon, 15 Apr 2024 09:00:00 +0000https://openssl-library.org/post/2024-04-15-april-webinar/<p>We are pleased to announce our upcoming webinar, Writing a TLS Client.</p>OpenSSL 3.3 Final Release Live
https://openssl-library.org/post/2024-04-10-3.3-final-release/
Wed, 10 Apr 2024 12:00:00 +0000https://openssl-library.org/post/2024-04-10-3.3-final-release/<p>The final release of OpenSSL 3.3 is now live. This is the first release in accordance with our adoption of biannual <a href="https://www.openssl-library.org/policies/general/release-policy">time-based releases</a>. We would like to thank all those who contributed to the OpenSSL 3.3 release, without whom, OpenSSL would not be possible.</p>
<p>OpenSSL 3.3 delivers the following new features:</p>
<ul>
<li>QUIC qlog diagnostic logging support</li>
<li>Support for the non-blocking polling of multiple QUIC connections or stream objects</li>
<li>Support for optimised generation of end-of-stream frames for QUIC connections</li>
<li>Support for disabling QUIC event processing when making API calls</li>
<li>Support for configuring QUIC idle timeout durations</li>
<li>Support for querying the size and utilisation of a QUIC stream’s write buffer</li>
<li>Support for RFC 9480 and RFC 9483 extensions to CMP</li>
<li>Ability to disable OpenSSL usage of atexit(3) at build time</li>
<li>Year 2038-compatible SSL_SESSION APIs</li>
<li>Ability to automatically derive Chinese Remainder Theorem (CRT) parameters when requested</li>
<li>Ability to ignore unknown algorithm names in TLS signature algorithm and group configuration strings</li>
<li>Ability to configure a TLS 1.3 server to prefer PSK-only key exchange during session resumption</li>
<li>Added a new EVP_DigestSqueeze() API. This allows SHAKE to squeeze multiple times with different output sizes.</li>
<li>Added exporter for CMake on Unix and Windows, alongside the pkg-config exporter.</li>
<li>And more. Please check out <a href="https://github.com/openssl/openssl/blob/efb87dd7936dd970d0477180f9e3ba174e960e6e/CHANGES.md">CHANGES.md</a> for a full list of changes between OpenSSL 3.2 and OpenSSL 3.3.</li>
</ul>
<p>OpenSSL 3.3 is a regular release, upon this final release a one-year Full Support period is initiated for regular releases. During this phase, bugs and security issues are addressed and fixed according to the <a href="https://www.openssl-library.org/policies/technical/stable-release-updates">Stable Release Updates Policy</a>. Immediately after the Full Support phase ends, the Maintenance Support phase begins, lasting for one year. During this phase, the primary focus is on fixing security issues, although other bugs may be addressed at the discretion of OpenSSL engineering.</p>Celebrating 25 Years of OpenSSL
https://openssl-library.org/post/2024-04-03-25-years-tshirt-update/
Wed, 03 Apr 2024 06:00:00 +0000https://openssl-library.org/post/2024-04-03-25-years-tshirt-update/<p>We are pleased to announce that we have successfully distributed nearly 100 limited edition T-shirts commemorating the 25th anniversary of OpenSSL’s existence.</p>
<p>We appreciate the support of all our communities, users, individual contributors and support customers, without which we would not be able to continue our mission and deliver on our open source values. These continue to drive the success and evolution of OpenSSL, and we couldn’t be more appreciative.</p>OpenSSL 3.3 Beta Release Live
https://openssl-library.org/post/2024-03-29-3.3-beta-release/
Tue, 02 Apr 2024 07:00:00 +0000https://openssl-library.org/post/2024-03-29-3.3-beta-release/<p>The beta release of OpenSSL 3.3 is now live. This release is in accordance with our adoption of biannual <a href="https://www.openssl-library.org/policies/general/release-policy">time-based releases</a>. As this is a beta release, we consider this to be a release candidate and as such encourage all OpenSSL users to build and test against this beta release and provide feedback. It represents the second step in our planned release of OpenSSL 3.3. To view the full 3.3 release schedule please refer to this <a href="https://openssl-library.org/post/2024-03-10-openssl-3.3-alpha-date/">blog</a>.</p>OpenSSL at FOSDEM 24
https://openssl-library.org/post/2024-03-19-fosdem-24/
Thu, 28 Mar 2024 06:00:00 +0000https://openssl-library.org/post/2024-03-19-fosdem-24/<p>This year, we had the privilege of participating in FOSDEM for the first time. This offered us an opportunity to engage with the open source community at the conference, share our insights, and learn from the vast pool of knowledge that FOSDEM brings together.</p>
<p><img src="https://openssl-library.org/images/blog/FOSDEM_24.jpg" alt="Photo of OpenSSL FOSDEM 2024 attendees"></p>
<p>FOSDEM, short for Free and Open Source Software Developers’ European Meeting, is an event that brings together thousands of open source developers, enthusiasts, and professionals from around the world. It’s a festival of knowledge, with workshops, talks, and sessions covering a myriad of topics from software development and security to hardware innovation and beyond.</p>Upcoming Webinar: Writing Your First OpenSSL Application
https://openssl-library.org/post/2024-03-19-march-webinar/
Fri, 22 Mar 2024 09:00:00 +0000https://openssl-library.org/post/2024-03-19-march-webinar/<p>We are thrilled to announce our upcoming webinar, Writing Your First OpenSSL Application.</p>
<p>This webinar is designed to take you from an understanding of basic cryptography concepts to writing your first secure application using OpenSSL. It’s the perfect starting point for anyone looking to dive into the world of secure application development. Here’s what we’ll cover:</p>
<ul>
<li>Define the use cases for which OpenSSL can be used</li>
<li>How to find documentation to learn how to use OpenSSL in applications</li>
<li>How to write applications using OpenSSL</li>
<li>How to test and verify functionality of OpenSSL applications</li>
<li>How to identify and fix bugs in OpenSSL applications</li>
<li>Q&A Session: Have your questions answered by our OpenSSL experts. This is a great opportunity to clear up any doubts and gain additional insights.</li>
</ul>
<p>By the end of this presentation, the audience should be able to match their application needs to OpenSSL library features, find documentation to explain how to leverage those features, create applications using OpenSSL, and learn how to detect and understand errors that may arise.</p>OpenSSL 3.3 Alpha Release Live
https://openssl-library.org/post/2024-03-20-3.3-alpha-release/
Fri, 22 Mar 2024 07:00:00 +0000https://openssl-library.org/post/2024-03-20-3.3-alpha-release/<p>The Alpha release of OpenSSL 3.3 is now live. This release is in accordance with our adoption of biannual time-based releases. As this is an alpha release, it is intended for development and testing purposes. It represents the first step in our planned release of OpenSSL 3.3. To view the full 3.3 release schedule please refer to this <a href="https://openssl-library.org/post/2024-03-10-openssl-3.3-alpha-date/">blog</a>.</p>
<p>OpenSSL 3.3 will feature the following new features:</p>
<ul>
<li>QUIC qlog diagnostic logging support</li>
<li>Support for the non-blocking polling of multiple QUIC connection or stream objects</li>
<li>Support for optimised generation of end-of-stream frames for QUIC connections</li>
<li>Support for disabling QUIC event processing when making API calls</li>
<li>Support for configuring QUIC idle timeout durations</li>
<li>Support for querying the size and utilisation of a QUIC stream’s write buffer</li>
<li>RCU lock infrastructure for performance enhancements</li>
<li>Support for RFC 9480 and RFC 9483 extensions to CMP</li>
<li>Ability to disable OpenSSL usage of atexit(3) at build time</li>
<li>Year 2038-compatible SSL_SESSION APIs</li>
<li>Ability to automatically derive Chinese Remainder Theorem (CRT) parameters when requested</li>
<li>Ability to ignore unknown algorithm names in TLS signature algorithm and group configuration strings</li>
<li>Ability to configure a TLS 1.3 server to prefer PSK-only key exchange during session resumption</li>
</ul>
<p>No further features or API changes are planned for 3.3 beyond those listed above. We will not be accepting any additional features for 3.3; any unmerged feature PRs will now be considered for 3.4.</p>OpenSSL 3.3 alpha release date announced
https://openssl-library.org/post/2024-03-10-openssl-3.3-alpha-date/
Tue, 12 Mar 2024 18:00:00 +0000https://openssl-library.org/post/2024-03-10-openssl-3.3-alpha-date/<p>We are pleased to announce our schedule for the April release of OpenSSL 3.3. In
accordance with our adoption of biannual time-based releases following the
release of OpenSSL 3.2, this will be our first time-based release.</p>
<p>The release schedule is as follows:</p>
<ul>
<li>
<p>An alpha of OpenSSL 3.3 will be made on 20 March 2024.</p>
</li>
<li>
<p>A beta of OpenSSL 3.3 will then be made on 29 March 2024.</p>
</li>
<li>
<p>The expected final release date for OpenSSL 3.3.0 is 10 April 2024.
Backup release dates are 17 April 2024 and 24 April 2024.</p>NetApp and OpenSSL: Teaming Up for More Secure Internet
https://openssl-library.org/post/2024-02-08-netapp/
Thu, 08 Feb 2024 16:00:00 +0000https://openssl-library.org/post/2024-02-08-netapp/<p>Exciting news in the world of online security! <a href="https://www.netapp.com/">NetApp</a>, an intelligent data infrastructure company, is now a Gold Sponsor of OpenSSL, showing their strong support for making the internet a safer place for everyone.</p>
<p>NetApp’s sponsorship brings valuable resources to OpenSSL, enabling the project to accelerate development, conduct thorough security audits, and ensure ongoing maintenance and support. In return, NetApp gains access to cutting-edge cryptographic technologies, contributing to the enhancement of its own security solutions and reinforcing its position as a leader in data management.</p>Upcoming Getting Started with OpenSSL Webinar
https://openssl-library.org/post/2024-01-23-getting-started/
Tue, 23 Jan 2024 16:00:00 +0000https://openssl-library.org/post/2024-01-23-getting-started/<p>In the fast-paced world of cybersecurity, the ability to secure digital assets is paramount. We’re excited to announce our upcoming webinar, “Getting Started with OpenSSL,” which is designed to provide attendee’s with a solid foundation in using OpenSSL to enhance the security of their applications and systems. Join us for this webinar and learn all about OpenSSL’s purpose, features, and components.</p>
<p><strong>Why Attend?</strong>
Empower Yourself: Gain practical skills to implement OpenSSL in your projects.
Community Engagement: Connect with a community of security-conscious individuals.</p>OpenSSL FIPS provider 3.0.9 validated
https://openssl-library.org/post/2024-01-23-fips-309/
Tue, 23 Jan 2024 08:00:00 +0000https://openssl-library.org/post/2024-01-23-fips-309/<p>The OpenSSL project is pleased to announce an update to its <a href="https://csrc.nist.gov/Projects/cryptographic-module-validation-program/fips-140-2">FIPS 140-2</a>
certificate <a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282">#4282</a>. The certificate now validates the FIPS
provider built from the 3.0.8 and 3.0.9 releases.</p>OpenSSL 3.1 FIPS Module has been submitted for validation
https://openssl-library.org/post/2024-01-04-openssl31-fips-submission/
Thu, 04 Jan 2024 07:00:00 +0000https://openssl-library.org/post/2024-01-04-openssl31-fips-submission/<p>On 2023-12-29 we have submitted our FIPS 140-3 validation report to NIST’s
<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program">Cryptographic Module Validation Program</a> (CMVP).</p>
<p>This in no way impacts our existing <a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282">FIPS 140-2 certificate</a> which remains
valid and will be maintained until its sunset date in September 2026.</p>OpenSSL's Official Youtube Channel
https://openssl-library.org/post/2023-12-21-youtube/
Thu, 21 Dec 2023 10:00:00 +0000https://openssl-library.org/post/2023-12-21-youtube/<p>We are thrilled to announce a major leap forward in our efforts to connect with the community and share valuable insights—OpenSSL now has its own YouTube channel! As a significant milestone in our commitment to transparency, education, and open-source collaboration, this channel will serve as a hub for engaging content, tutorials, and updates straight from the heart of OpenSSL.</p>
<p><strong>What to Expect:</strong></p>
<p><strong>Tutorial Series:</strong>
Get ready for in-depth tutorials covering a wide range of topics, from OpenSSL basics to advanced usage scenarios. Whether you’re a seasoned developer or just starting, our tutorials will cater to all skill levels.</p>OpenSSL 25 Year Anniversary T-Shirt Giveaway
https://openssl-library.org/post/2023-12-20-25_year_tshirt/
Wed, 20 Dec 2023 10:00:00 +0000https://openssl-library.org/post/2023-12-20-25_year_tshirt/<p>We are thrilled to announce a special celebration in honor of OpenSSL’s 25th anniversary! Two and a half decades of commitment to security, reliability, and open-source collaboration have made OpenSSL an indispensable tool in the world of digital communication.</p>
<p>To express our gratitude to the incredible community that has supported us throughout the years, we are hosting an exclusive T-Shirt Giveaway! The first 75 people to participate will receive a limited edition OpenSSL 25th-anniversary T-shirt as a token of our appreciation.</p>OpenSSL Providers Workshop: Authors Track
https://openssl-library.org/post/2023-12-05-provider_author_meeting/
Tue, 05 Dec 2023 10:00:00 +0000https://openssl-library.org/post/2023-12-05-provider_author_meeting/<p>Part two of the OpenSSL Providers Workshop is next week! We have divided the workshop into two tracks the Users Track and the Authors Track. Please join us next week for part two of the workshop: Live OpenSSL Providers Workshop: Authors Track. As with the Users Track, we will be hosting two sessions of the Authors Track at different times to allow people from different time zones to be able to join our workshops live.</p>OpenSSL Providers Workshop: Users Track
https://openssl-library.org/post/2023-11-29-provider_meeting/
Wed, 29 Nov 2023 10:00:00 +0000https://openssl-library.org/post/2023-11-29-provider_meeting/<p>The long anticipated OpenSSL Providers Workshop is finally here! We have divided the workshop into two tracks the Users Track and the Authors Track. Please join us next week for part one of the workshop: Live OpenSSL Providers Workshop: Users Track. Due to world wide interest, we will be hosting two sessions of the Users Track at different times to allow people from different time zones to be able to join our workshops live.</p>OpenSSL announces final release of OpenSSL 3.2.0
https://openssl-library.org/post/2023-11-06-openssl32/
Thu, 23 Nov 2023 14:00:00 +0000https://openssl-library.org/post/2023-11-06-openssl32/<p>We are pleased to announce the immediate availability of OpenSSL 3.2.0. OpenSSL
3.2.0 is the first General Availability release of the OpenSSL 3.2 release line,
and incorporates a number of new features, including:</p>
<ul>
<li>Client-side QUIC support, including support for multiple streams (RFC 9000)</li>
<li>Certificate compression in TLS (RFC 8879), including support for zlib, zstd
and Brotli</li>
<li>Deterministic ECDSA (RFC 6979)</li>
<li>Support for Ed25519ctx, Ed25519ph and Ed448ph (RFC 8032)
in addition to existing support for Ed25519 and Ed448</li>
<li>AES-GCM-SIV (RFC 8452)</li>
<li>Argon2 (RFC 9106) and supporting thread pool functionality</li>
<li>HPKE (RFC 9180)</li>
<li>The ability to use raw public keys in TLS (RFC 7250)</li>
<li>TCP Fast Open (RFC 7413) support, where supported by the OS</li>
<li>Support for provider-based pluggable signature schemes in TLS,
enabling third-party post-quantum and other algorithm providers to use those
algorithms with TLS</li>
<li>Support for Brainpool curves in TLS 1.3</li>
<li>SM4-XTS</li>
<li>Support for using the Windows system certificate store as a source of trusted
root certificates. This is not yet enabled by default and must be activated
using an environment variable. This is likely to become enabled by default
in a future feature release.</li>
</ul>OpenSSL 3.2 Final Release Postponed
https://openssl-library.org/post/2023-11-17-ossl-32-postponed/
Fri, 17 Nov 2023 10:00:00 +0000https://openssl-library.org/post/2023-11-17-ossl-32-postponed/<p>As part of the OpenSSL project’s commitment to deliver a secure and high quality
cryptography toolkit, we routinely apply fuzzing to the OpenSSL codebase, which
searches automatically for potential bugs in upcoming OpenSSL releases. This
fuzzing process runs continuously and on an ongoing basis and as such, bugs can
be identified by our fuzzing infrastructure at any time.</p>
<p>Due to a small number of bugs which have been identified by the ongoing use of
fuzzing, the OpenSSL Project has made the decision to postpone the final release
of OpenSSL 3.2 by at least a week. While we have promptly fixed all bugs
presently identified by fuzzing, to ensure the quality of OpenSSL 3.2, we do not
intend to make the final release until all issues identified by fuzzing have
been addressed and no new issues are found for one week. As a result, we have
pushed the full release of OpenSSL 3.2 to the 23rd November 2023. Please stay
tuned to our blog for more details on the matter.</p>Expected OpenSSL 3.2 Release Date
https://openssl-library.org/post/2023-11-08-ossl_32_fr_blog1/
Wed, 08 Nov 2023 13:00:00 +0000https://openssl-library.org/post/2023-11-08-ossl_32_fr_blog1/<p>The OpenSSL Project is excited to announce that OpenSSL 3.2 is expected to be fully released on 16th November, 2023.</p>
<p>In the meantime the <a href="https://www.openssl-library.org/source/old">OpenSSL 3.2 Beta</a> is currently available. We encourage all OpenSSL users to build and test against the beta release and provide feedback.</p>
<p>OpenSSL 3.2 will be our last release before we transition to a <a href="https://openssl-library.org/post/2023-08-29-steps-forward/">time-based release schedule</a> on a 6-month cadence, with regular feature releases in October and April each year.</p>OpenSSL 3.2 Release Candidate
https://openssl-library.org/post/2023-10-26-ossl-32-beta/
Thu, 26 Oct 2023 13:00:00 +0000https://openssl-library.org/post/2023-10-26-ossl-32-beta/<p>The OpenSSL Project is excited to announce our first beta release of OpenSSL 3.2. We consider this to be a release candidate and as such encourage all OpenSSL users to build and test against this beta release and provide feedback.</p>
<p>The code for OpenSSL 3.2 is now functionally complete and at the time of the beta release there were no outstanding known regressions that need to be fixed before the final release. A lot of work has been going on over the last few months getting OpenSSL 3.2 ready for its final release and we want to send thanks to everyone who has helped us.</p>OpenSSL Adds Support for Raw Public Key (RFC7250)
https://openssl-library.org/post/2023-10-20-ossl-rpk/
Fri, 20 Oct 2023 13:00:00 +0000https://openssl-library.org/post/2023-10-20-ossl-rpk/<p><a href="https://datatracker.ietf.org/doc/html/rfc7250">Raw Public Keys</a> have emerged as a component for securing communications between clients and servers. Raw Public Keys, as defined in RFC 7250, play a role in ensuring the confidentiality, integrity, and authenticity of data exchanged over the web. As a result OpenSSL will be adding <a href="https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set1_server_cert_type.html">support</a> for Raw Public Keys in the upcoming OpenSSL 3.2.</p>
<p>Raw Public Keys are a cryptographic mechanism used in <a href="https://en.wikipedia.org/wiki/Public_key_infrastructure">public key infrastructure</a> (PKI) systems. They are a way of representing a public key without the associated digital certificate, which contains additional information like the owner’s identity, expiration date, and digital signatures from a certificate authority. This makes Raw Public Keys more lightweight and efficient, especially in resource-constrained environments.</p>Implementing HPKE in OpenSSL 3.2
https://openssl-library.org/post/2023-10-18-ossl-hpke/
Wed, 18 Oct 2023 13:00:00 +0000https://openssl-library.org/post/2023-10-18-ossl-hpke/<p>The upcoming OpenSSL 3.2 will be implementing Hybrid Public Key Encryption (HPKE) into the library.</p>
<p><a href="https://datatracker.ietf.org/doc/rfc9180/">Hybrid Public Key Encryption</a> (HPKE) is a cryptographic protocol defined in <a href="https://datatracker.ietf.org/doc/rfc9180/">RFC 9180</a> (Request for Comments) that aims to provide a flexible and secure way to perform public key encryption in various scenarios. HPKE combines the security of public key encryption with the flexibility of using different key exchange methods and encryption schemes. This protocol is designed to be used in a wide range of applications, including securing communications over the internet and other networked environments.</p>
<p><a href="https://www.openssl.org/docs/manmaster/man3/OSSL_HPKE_CTX_new.html">Implementing HPKE in OpenSSL</a> will help ensure that your public key encryption solution is both effective and reliable for securing data in various applications and environments for the following reasons:</p>OpenSSL FIPS 140 Update
https://openssl-library.org/post/2023-10-12-osslfips-timeline/
Thu, 12 Oct 2023 13:00:00 +0000https://openssl-library.org/post/2023-10-12-osslfips-timeline/<p>In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is crucial. The OpenSSL project has been at the forefront of cryptographic security for decades, providing a robust toolkit that enables encryption, decryption, and other cryptographic functions. In the continuous pursuit of enhancing security and regulatory compliance, we want to share our updated ambitious FIPS (Federal Information Processing Standards) plans.</p>New OpenSSL Tutorials for OpenSSL 3.2 Release
https://openssl-library.org/post/2023-10-09-ossl32-tutorial/
Mon, 09 Oct 2023 12:00:00 +0000https://openssl-library.org/post/2023-10-09-ossl32-tutorial/<p>We will be releasing a series of new tutorials in the upcoming OpenSSL 3.2 release to help new users of OpenSSL get a quick start on developing applications using the OpenSSL libraries. They will also be helpful to users wanting to try out the new client side QUIC capabilities.</p>OpenSSL 3.2 Alpha 2 released
https://openssl-library.org/post/2023-10-02-ossl32a2/
Tue, 03 Oct 2023 16:00:00 +0000https://openssl-library.org/post/2023-10-02-ossl32a2/<p>OpenSSL 3.2 Alpha 2 has recently been released.</p>
<p>Please see our <a href="https://openssl-library.org/post/2023-09-07-ossl32a1/">previous blog post</a>
for a list of all of the exciting new features that are contained in the
upcoming 3.2 release.</p>OpenSSL 1.1.1 End Of Life
https://openssl-library.org/post/2023-09-11-eol-111/
Mon, 11 Sep 2023 00:00:00 +0000https://openssl-library.org/post/2023-09-11-eol-111/<p>OpenSSL 1.1.1 series has reached its End of Life (EOL).
As such it will no longer receive publicly available security fixes.</p>OpenSSL announces OpenSSL 3.2 Alpha 1
https://openssl-library.org/post/2023-09-07-ossl32a1/
Thu, 07 Sep 2023 10:55:00 +0100https://openssl-library.org/post/2023-09-07-ossl32a1/<p>We are pleased to announce the immediate availability of OpenSSL 3.2 Alpha 1.
This release incorporates a number of new features, most notably:</p>
<ul>
<li>Client-side QUIC support, including support for multiple streams (RFC 9000)</li>
<li>Certificate compression in TLS (RFC 8879), including support for zlib, zstd
and Brotli</li>
<li>Deterministic ECDSA (RFC 6979)</li>
<li>Support for Ed25519ctx, Ed25519ph, Ed448 and Ed448ph (RFC 8032)
in addition to existing support for Ed25519</li>
<li>AES-GCM-SIV (RFC 8452)</li>
<li>Argon2 (RFC 9106) and supporting thread pool functionality</li>
<li>HPKE (RFC 9180)</li>
<li>The ability to use raw public keys in TLS (RFC 7250)</li>
<li>TCP Fast Open (RFC 7413) support, where supported by the OS</li>
<li>Support for provider-based pluggable signature schemes in TLS,
enabling third-party post-quantum algorithm providers to use these algorithms
with TLS</li>
<li>Support for Brainpool curves in TLS 1.3</li>
<li>SM4-XTS</li>
<li>Support for using the Windows system certificate store as a source of trusted
root certificates. This is not yet enabled by default and must be activated
using an environment variable. This is likely to become enabled by default
in a future feature release.</li>
</ul>OpenSSL announces imminent release of OpenSSL 3.2 Alpha 1
https://openssl-library.org/post/2023-09-05-ossl32a1pre/
Tue, 05 Sep 2023 11:35:00 +0100https://openssl-library.org/post/2023-09-05-ossl32a1pre/<p>OpenSSL is pleased to announce the imminent release of OpenSSL 3.2 Alpha 1
on the 7th September 2023.</p>
<p>As this will be an alpha release, it is intended for development and testing
purposes. It represents the first step in our planned release of OpenSSL 3.2.</p>
<p>Depending on the outcome of the alpha process, we hope to make a beta release as
soon as two weeks after Alpha 1 is released. When we do move to beta, this will
represent a feature freeze. Therefore, no new feature PRs will be accepted into
the 3.2 branch after this.</p>OpenSSL Updates: A Few Steps Forward
https://openssl-library.org/post/2023-08-29-steps-forward/
Mon, 28 Aug 2023 00:00:00 +0200https://openssl-library.org/post/2023-08-29-steps-forward/<p>At OpenSSL, we’re always learning and taking small steps, informed by both fresh
ideas and the feedback we receive. Today, we’d like to share a couple of updates
we hope will make things clearer and more collaborative for our community.</p>
<p>These updates are part of our effort to align more closely with, and live by,
our <a href="https://www.openssl-mission.org">Mission and Values</a>.</p>OpenSSL statement on the recent Intel/AMD Downfall/Inception vulnerabilities
https://openssl-library.org/post/2023-08-09-downfall/
Tue, 15 Aug 2023 08:55:00 +0000https://openssl-library.org/post/2023-08-09-downfall/<p>Last week marked the public announcement of the
<a href="https://downfall.page/">Downfall</a> vulnerability in Intel CPUs and the
<a href="https://comsec.ethz.ch/research/microarch/inception/">Inception</a> vulnerability
in AMD CPUs. Both of these are microarchitectural side-channel attacks allowing
an attacker with unprivileged execution on the same physical core as a victim
process to extract confidential information from that process.</p>
<p>This blog post provides information and advice for users of OpenSSL.
Specifically, it provides information on how users of OpenSSL may be affected by
these vulnerabilities, and advice for users of OpenSSL on mitigation strategies.</p>Face-to-face meetings: OTC and Committers
https://openssl-library.org/post/2023-07-18-f2f-otc-committers-summary/
Mon, 24 Jul 2023 04:00:00 +0200https://openssl-library.org/post/2023-07-18-f2f-otc-committers-summary/<p>From June 19-21, OpenSSL had a face-to-face event in Brno, Czech Republic, for OTC members and contributors. The event provided a valuable platform for productive meetings and discussions. The gathering brought together prominent individuals from the OpenSSL community, fostering robust and enlightening exchanges. This event served as a crucial opportunity for introspection and future planning, encouraging open dialogue on various facets of the OpenSSL project.</p>Face-to-face meetings: OTC and Committers, Day 3
https://openssl-library.org/post/2023-07-18-f2f-otc-committers-day3/
Mon, 24 Jul 2023 03:00:00 +0200https://openssl-library.org/post/2023-07-18-f2f-otc-committers-day3/<ul>
<li>Discussions were held about introducing a new time-based release policy for OpenSSL. This policy aims to improve the predictability of release schedules and content. Part of this discussion also touched on how to effectively plan and assess feature readiness before each release.</li>
<li>To enhance project management, the use of feature branches for more complex features was suggested. This idea was paired with the proposal to establish clearly defined criteria for the review and approval of code.</li>
<li>As part of improving decision-making within the project, dialogues were carried out on how to best select features for inclusion. The proposal to establish a review body, focused on making these decisions and prioritizing features, was also put forward.</li>
<li>Inspired by Apache’s practices, improvements to the existing security policy were considered and discussed.</li>
<li>As part of addressing the project’s technical debt, suggestions were made to discuss infallible locking and mandatory atomics. The goal was to streamline locking mechanisms and reduce code complexity.</li>
<li>Tomas Mraz and Dmitry Belyavsky held personal sessions where they discussed different approaches. Tomas delved into the approach of using decoupled low-level crypto libraries, while Belyavsky considered the potential for incorporating more pluggable elements within OpenSSL.</li>
<li>Richard Levitte highlighted several areas of technical debt that need addressing. These included issues with composite algorithm names, the functionality of Password-Based Encryption (PBE), and AlgorithmIdentifier parameters. He also proposed potential solutions to these identified issues.</li>
</ul>Face-to-face meetings: OTC and Committers, Day 2
https://openssl-library.org/post/2023-07-18-f2f-otc-committers-day2/
Mon, 24 Jul 2023 02:00:00 +0200https://openssl-library.org/post/2023-07-18-f2f-otc-committers-day2/<ul>
<li>The OpenSSL project has some performance issues. These need to be addressed by setting performance standards and testing before making changes. The team has agreed to prioritize this process.</li>
<li>Technical debt is another problem that needs to be dealt with. The proposed solutions are:
<ul>
<li>Setting performance targets.</li>
<li>Improving inefficient data structures.</li>
</ul>
</li>
<li>The team also discussed ways to improve engagement with the community, including:
<ul>
<li>Updating the current outdated communication channels.</li>
<li>Revamping the website.</li>
<li>Creating a separate space for user queries and software issues.</li>
<li>Starting to use GitHub Discussions for better communication.</li>
</ul>
</li>
<li>Supporting different OpenSSL versions poses challenges. The team also discussed how to manage Long Term Support (LTS) releases.</li>
<li>When talking about the QUIC protocol, several points were emphasized:
<ul>
<li>Its development is crucial.</li>
<li>Features need to be prioritized.</li>
<li>It’s important to gather feedback early.</li>
<li>There was agreement to turn on QUIC by default in the next release.</li>
</ul>
</li>
<li>Nicola Tuveri pointed out that the BIGNUM issue needs to be addressed. He suggested setting aside dedicated resources to work on it.</li>
<li>Code reviews are essential for maintaining the quality of the project. Documentation should be easy to understand and useful for users. The team stressed its importance.</li>
<li>The error API has some problems. These were discussed along with potential solutions.</li>
</ul>Face-to-face meetings: OTC and Committers, Day 1
https://openssl-library.org/post/2023-07-18-f2f-otc-committers-day1/
Mon, 24 Jul 2023 01:00:00 +0200https://openssl-library.org/post/2023-07-18-f2f-otc-committers-day1/<ul>
<li>The OTC retrospective highlighted the need for diversity and improved communication.
<ul>
<li>A proposal for a Special Interest Group (SiG) model was made.</li>
<li>The necessity for regular communication with communities was identified.</li>
<li>A need for reevaluation of membership criteria was highlighted.</li>
</ul>
</li>
<li>The team acknowledged the presence of technical debt in OpenSSL. Challenges like code redundancy and inconsistent APIs were noted within OpenSSL. Refactoring was seen as a potential solution to these OpenSSL challenges.</li>
<li>Updates and improvements to the Certificate Management Protocol (CMP) were discussed. Focus was placed on interoperability and testing within the CMP.</li>
<li>Red Hat engineers shared their journey towards FIPS compliance. Their approach to security vulnerabilities was discussed.</li>
<li>Solutions for managing parameters and configurations were examined.</li>
<li>The challenge of accessing entropy sources was discussed. A proposition to enhance randomness providers was made.</li>
<li>The implementation of Post-Quantum Cryptography was also discussed. Focus was put on compatibility between OQS and OpenSSL in the future.</li>
<li>Red Hat presented several significant issues, including confirmed bugs. There was also a discussion on features needing careful consideration by Red Hat.</li>
<li>The experience of writing a PKCS#11 provider emphasized the need for better documentation. The need for more supportive resources for writing a PKCS#11 provider was also discussed.</li>
</ul>Who writes OpenSSL?
https://openssl-library.org/post/2023-07-17-who-writes-openssl/
Mon, 17 Jul 2023 08:30:00 +0000https://openssl-library.org/post/2023-07-17-who-writes-openssl/<p>For a meeting last week I wanted to show how much of OpenSSL is being written by people paid to do so by their employers, and how much was from individuals in their own time. And it turns out most of OpenSSL is written by people paid to do so. This is crucial to understanding the critical role that corporations provide to Open Source projects such as OpenSSL.</p>OpenSSL adopts Mission & Values Statement
https://openssl-library.org/post/2023-07-04-mission-adoption/
Tue, 04 Jul 2023 08:00:00 +0000https://openssl-library.org/post/2023-07-04-mission-adoption/<p>After extensive feedback from our communities, OpenSSL is pleased to announce that we have formally adopted the Mission and Values Statement, and will now be aligning our activities to support these.</p>
<p>You can view our new <a href="https://www.openssl.org/community/mission.html">Mission and Values Statment here</a>.</p>
<p>We would like to extend our sincere thanks to all those who provided feedback to us. We have reviewed all the comments and responses, which showed that a clear majority (around 70%) agreed on OpenSSL adopting the Mission and Values Statement. It was really beneficial to hear from our various communities and we will continue to seek out your feedback in the future.</p>OpenSSL 1.1.1 End Of Life Approaching
https://openssl-library.org/post/2023-06-15-1.1.1-eol-reminder/
Thu, 15 Jun 2023 05:00:00 +0000https://openssl-library.org/post/2023-06-15-1.1.1-eol-reminder/<p>OpenSSL 1.1.1 series will reach End of Life (EOL) on 11th September 2023. Users of OpenSSL 1.1.1 should consider their options and plan any actions they might need to take.</p>Rebranded OpenSSL FIPS certificates issued
https://openssl-library.org/post/2023-06-01-fips-rebranded/
Thu, 01 Jun 2023 01:00:00 +0000https://openssl-library.org/post/2023-06-01-fips-rebranded/<p>The OpenSSL project is pleased to announce that the first of the rebranded
<a href="https://csrc.nist.gov/Projects/cryptographic-module-validation-program/fips-140-2">FIPS 140-2</a> certificates, available exclusively to our Premium Support
Customers, have been officially issued by the <a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program">CMVP</a>. With this
significant milestone achieved, we anticipate a smooth and ongoing
rollout of the remaining and future rebrandings. If your company desires
a rebranded FIPS 140-2 validation certificate bearing your organisation’s
name, obtaining one is a straightforward task: simply secure a
<a href="https://openssl-corporation.org/support/#premium">premium support contract</a> with the project and ask for a rebranded
certificate.</p>OpenSSL FIPS provider 3.0.8 validated
https://openssl-library.org/post/2023-05-29-fips-3-0-8/
Mon, 29 May 2023 00:00:00 +0000https://openssl-library.org/post/2023-05-29-fips-3-0-8/<p>The OpenSSL project is pleased to announce a major update to its <a href="https://csrc.nist.gov/Projects/cryptographic-module-validation-program/fips-140-2">FIPS 140-2</a>
certificate <a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282">#4282</a>. The certificate now validates the FIPS
provider built from the 3.0.8 release.</p>OpenSSL extends feedback on draft mission & values statement
https://openssl-library.org/post/2023-05-04-mission-extension/
Thu, 04 May 2023 09:50:00 +1000https://openssl-library.org/post/2023-05-04-mission-extension/<p>OpenSSL would like to thank everyone who has provided feedback on our draft
mission & values statement.
The response has been great, and the feedback is really important to us. We are
working through those responses.</p>
<p>We’d like to get even more feedback so we are extending the response
period until 19th May 2023.
If you haven’t already provided feedback to us, please do so by:</p>
<ul>
<li><a href="https://forms.gle/yjdpFnSpaLXBMTsf9">Filling in this feedback form</a>, or</li>
<li>Emailing your feedback to <a href="mailto:[email protected]">[email protected]</a></li>
</ul>
<p>As a small incentive we will be randomly selecting 10 responders out of
everyone who has provided feedback and the lucky ones will receive an OpenSSL
T-shirt. (Yes this includes those who have already responded to us).</p>OpenSSL seeks feedback on draft mission & values statement
https://openssl-library.org/post/2023-03-31-mission/
Fri, 31 Mar 2023 08:31:00 +0000https://openssl-library.org/post/2023-03-31-mission/<p>Following the successful OpenSSL 2023 <a href="https://openssl-library.org/blog/2023/03/31/f2f/">face-to-face conference</a>, OpenSSL has produced a draft mission &
values statement. Once finalised, we intend to realign all activities of the
project to ensure they reflect our agreed mission and values. Before doing so
however, we would like to obtain feedback on this statement from the public, to
ensure it represents all of our communities. By offering us your feedback, you
will help us to ensure the OpenSSL project is run in a way that reflects the
values of all of our users.</p>OpenSSL 1.1.1 End Of Life
https://openssl-library.org/post/2023-03-28-1.1.1-eol/
Tue, 28 Mar 2023 11:00:00 +0000https://openssl-library.org/post/2023-03-28-1.1.1-eol/<p>We are now less than 6 months away from the End Of Life (EOL) date for the
OpenSSL 1.1.1 series. Users of OpenSSL 1.1.1 should consider their options and
plan any actions they might need to take.</p>OpenSSL FIPS Update and Expansion of Rebranding Offer
https://openssl-library.org/post/2023-03-15-fips-rebranding/
Wed, 15 Mar 2023 08:00:00 +0000https://openssl-library.org/post/2023-03-15-fips-rebranding/<p>We are thrilled to inform you that the complimentary FIPS rebranding
service for our premium support customers has been extended. As part
of this non-contractual benefit, premium support customers are entitled
to one rebranding of any of our FIPS provider certificates per year,
completely free of charge.</p>OpenSSL 3.1 Final Release
https://openssl-library.org/post/2023-03-07-openssl3.1release/
Tue, 07 Mar 2023 12:00:00 +0000https://openssl-library.org/post/2023-03-07-openssl3.1release/<p>We are pleased to announce that the forthcoming OpenSSL 3.1 release is to be
made available on 14th March 2023.</p>OpenSSL 3.1 Release Candidate
https://openssl-library.org/post/2022-12-21-openssl3.1beta/
Wed, 21 Dec 2022 11:00:00 +0000https://openssl-library.org/post/2022-12-21-openssl3.1beta/<p>The OpenSSL Management Committee (OMC) and the OpenSSL Technical Committee
(OTC) are glad to announce our first beta release of OpenSSL 3.1. We consider
this to be a release candidate and as such encourage all OpenSSL users to build
and test against this beta release and provide feedback.</p>OpenSSL 3.1 alpha release
https://openssl-library.org/post/2022-11-30-openssl3.1alpha/
Fri, 02 Dec 2022 08:00:00 +0000https://openssl-library.org/post/2022-11-30-openssl3.1alpha/<p>The OpenSSL Management Committee and the OpenSSL Technical Committee are glad to
announce the alpha release of OpenSSL 3.1.</p>CVE-2022-3786 and CVE-2022-3602: X.509 Email address buffer overflows
https://openssl-library.org/post/2022-11-01-email-address-overflows/
Tue, 01 Nov 2022 15:00:00 +0000https://openssl-library.org/post/2022-11-01-email-address-overflows/<p>Today we published an
<a href="https://www.openssl.org/news/secadv/20221101.txt">advisory</a> about CVE-2022-3786
(“X.509 Email Address Variable Length Buffer Overflow”) and
CVE-2022-3602 (“X.509 Email Address 4-byte Buffer Overflow”).</p>
<p>Please read the advisory for specific details about these CVEs and how they
might impact you. This blog post will address some common questions that we
expect to be asked about these CVEs.</p>Configuring supported TLS groups in OpenSSL
https://openssl-library.org/post/2022-10-21-tls-groups-configuration/
Fri, 21 Oct 2022 11:00:00 +0000https://openssl-library.org/post/2022-10-21-tls-groups-configuration/<p>The configuration of supported groups in TLS servers is important to limit
the resource consumption of the TLS handshakes performed by the server.
This blog post should give system administrators a few useful hints
on how to configure the OpenSSL library and two of the most used
open source HTTP servers which use the OpenSSL library for supporting
the HTTPS protocol.</p>
<p>UPDATE: The post was updated to mention the new CVE-2022-40735 vulnerability.</p>RIPEMD160 and the legacy provider
https://openssl-library.org/post/2022-10-17-rmd160-and-the-legacy-provider/
Tue, 18 Oct 2022 09:07:50 +0200https://openssl-library.org/post/2022-10-17-rmd160-and-the-legacy-provider/<p>With the release of OpenSSL 3.0 and the new provider architecture,
some algorithms that were considered legacy by the OpenSSL team at the
time were moved to the <code>legacy</code> provider, to be loaded <em>optionally</em> by
those wishing to still use any of said algorithms.</p>FIPS 140-3 Plans
https://openssl-library.org/post/2022-09-30-fips-140-3/
Fri, 30 Sep 2022 10:00:00 +0000https://openssl-library.org/post/2022-09-30-fips-140-3/<p>The OpenSSL Management Committee (OMC) on behalf of the OpenSSL Project
is pleased to announce that the project is partnering with <a href="https://keypair.us/">KeyPair Consulting</a>
and <a href="https://www.acumensecurity.net/">Acumen Security</a> to validate OpenSSL to meet the requirements
of the <a href="https://csrc.nist.gov/publications/detail/fips/140/3/final">FIPS 140-3</a> standard.</p>OpenSSL Presentation at ICMC22 Conference
https://openssl-library.org/post/2022-09-20-openssl-presentation-at-icmc/
Wed, 21 Sep 2022 12:00:00 +0000https://openssl-library.org/post/2022-09-20-openssl-presentation-at-icmc/<p>After 2 years of forced covid break, OpenSSL once again presented at the ICMC22
conference. The conference was a very pleasant meet-up of the community around
cryptography and cryptographic modules. There were a lot of insights, feedback,
and discussions around IT security. OpenSSL gave a talk on the Current Status of
OpenSSL.</p>OpenSSL 3.0 FIPS 140-2 Free Rebranding Offer
https://openssl-library.org/post/2022-09-14-fips-rebranding/
Wed, 14 Sep 2022 12:00:00 +0000https://openssl-library.org/post/2022-09-14-fips-rebranding/<p>OpenSSL is celebrating our FIPS 140-2 certification with a special offer for
our Premium Support Customers by providing access to a free rebranding of the
OpenSSL 3.0 FIPS 140-2 certificate.</p>
<p>See FIPS 140-2 Certificate
<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282">here</a></p>OpenSSL FIPS 140-2 validation certificate issued
https://openssl-library.org/post/2022-08-24-fips-validation-certificate-issued/
Wed, 24 Aug 2022 12:00:00 +0000https://openssl-library.org/post/2022-08-24-fips-validation-certificate-issued/<p>The OpenSSL Management Committee on behalf of the OpenSSL Project is pleased to
announce that the OpenSSL 3.0 FIPS Provider has had its FIPS 140-2 validation
<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282">certificate</a>
issued by NIST & CSE.</p>Spectre and Meltdown Attacks against OpenSSL
https://openssl-library.org/post/2022-05-13-spectre-meltdown/
Fri, 13 May 2022 00:00:00 +0000https://openssl-library.org/post/2022-05-13-spectre-meltdown/<p>The OpenSSL Technical Committee (OTC) was recently made aware of
several potential attacks against the OpenSSL libraries which might
permit information leakage via the <a href="https://meltdownattack.com/">Spectre</a> attack.<sup id="fnref:1"><a href="#fn:1" class="footnote-ref" role="doc-noteref">1</a></sup> Although there
are currently no known exploits for the Spectre attacks identified,
it is plausible that some of them might be exploitable.</p>
<p>Local side channel attacks, such as these, are outside the scope of
our <a href="https://openssl-library.org/policies/general/security-policy/">security policy</a>, however the project generally does introduce
mitigations when they are discovered. In this case, the OTC has decided
that these attacks will <strong>not</strong> be mitigated by changes to the OpenSSL
code base. The full reasoning behind this is given below.</p>Starting the QUIC design
https://openssl-library.org/post/2021-12-03-starting-the-quic-design/
Fri, 03 Dec 2021 12:00:00 +0000https://openssl-library.org/post/2021-12-03-starting-the-quic-design/<p>The OTC recently agreed a new design process that needs to be followed for
future releases. See
<a href="https://github.com/openssl/technical-policies/blob/master/policies/design-process.md">here</a>
for details. Moving forward designs for significant features should be captured
and stored alongside the documentation in our main source code repository and
updated if necessary during the development process.</p>OpenSSL Update
https://openssl-library.org/post/2021-11-25-openssl-update/
Thu, 25 Nov 2021 14:00:00 +0000https://openssl-library.org/post/2021-11-25-openssl-update/<p>The OpenSSL community is a diverse group, ranging from those that use
applications that depend on OpenSSL (effectively end-users) to operating system
distributions, application developers, embedded devices, layered security
libraries, and cryptographic algorithm and protocol researchers. Each of these
subsets of our community have different needs and different priorities.</p>Making changes to OpenSSL technical policies more open
https://openssl-library.org/post/2021-11-12-technical-policies/
Fri, 12 Nov 2021 10:00:00 +0000https://openssl-library.org/post/2021-11-12-technical-policies/<p>The OpenSSL Technical Committee decided to have a more formal but also a more
open process on establishing changes to OpenSSL technical policies and
other technical decisions made by the OpenSSL Technical Committee. We would
like to invite the broad community of OpenSSL developers and users to
participate in our decision making process.</p>Community Maintainers: How to get support for your platform
https://openssl-library.org/post/2021-11-08-community-maintainers/
Mon, 08 Nov 2021 08:15:00 +0000https://openssl-library.org/post/2021-11-08-community-maintainers/OpenSSL 3.0 FIPS Module has been submitted for validation
https://openssl-library.org/post/2021-09-22-openssl3-fips-submission/
Wed, 22 Sep 2021 18:00:00 +0000https://openssl-library.org/post/2021-09-22-openssl3-fips-submission/<p>Following on from the recent <a href="https://openssl-library.org/post/2021-09-06-openssl3.final/">announcement</a>
that OpenSSL 3.0 has been released, we have now also submitted our FIPS 140-2
validation report to NIST’s Cryptographic Module Validation Program (CMVP).</p>Old Let's Encrypt root certificate expiration and OpenSSL 1.0.2
https://openssl-library.org/post/2021-09-13-letsencryptrootcertexpire/
Mon, 13 Sep 2021 08:00:00 +0000https://openssl-library.org/post/2021-09-13-letsencryptrootcertexpire/<p>The currently recommended certificate chain as presented to Let’s Encrypt ACME
clients when new certificates are issued contains an intermediate certificate
(ISRG Root X1) that is signed by an old DST Root CA X3 certificate that expires
on 2021-09-30. In some cases the OpenSSL 1.0.2 version will regard the
certificates issued by the Let’s Encrypt CA as having an expired trust chain.</p>OpenSSL 3.0 has been released!
https://openssl-library.org/post/2021-09-06-openssl3.final/
Tue, 07 Sep 2021 14:00:00 +0000https://openssl-library.org/post/2021-09-06-openssl3.final/<p>After 3 years of development work, 17 alpha releases, 2 beta releases, over
7,500 commits and contributions from over 350 different authors we have finally
released OpenSSL 3.0! In addition to this there has been a large number of
contributions from our users who have been actively working with the pre-release
versions to test it, make sure it works in the real world and with a large array
of different applications and reporting their results. I am also delighted to
note that there has been a 94% increase in the amount of documentation that we
have since OpenSSL 1.1.1 and an (adjusted) increase in the “lines of code” in
our tests of 54%. There has never been a better demonstration of what an active
and enthusiastic community we have than when you look at the statistics for the
OpenSSL 3.0 development work. Thanks to everyone who has taken part - no matter
how small that part was.</p>OpenSSL 3.0 Release Candidate
https://openssl-library.org/post/2021-06-17-openssl3.0releasecandidate/
Thu, 17 Jun 2021 14:20:00 +0000https://openssl-library.org/post/2021-06-17-openssl3.0releasecandidate/<p>The OpenSSL Management Committee (OMC) and the OpenSSL Technical Committee
(OTC) are glad to announce our first beta release of OpenSSL 3.0. We consider
this to be a release candidate and as such encourage all OpenSSL users to build
and test against this beta release and provide feedback.</p>OpenSSL 3.0 alpha7 release
https://openssl-library.org/post/2020-10-20-openssl3.0alpha7/
Tue, 20 Oct 2020 19:00:00 +0000https://openssl-library.org/post/2020-10-20-openssl3.0alpha7/<p>The OpenSSL Management Committee (OMC) and the OpenSSL Technical Committee
(OTC) are glad to announce the seventh alpha release of OpenSSL 3.0.</p>OpenSSL 3.0 alpha4 release
https://openssl-library.org/post/2020-06-25-openssl3.0alpha4/
Thu, 25 Jun 2020 19:00:00 +0000https://openssl-library.org/post/2020-06-25-openssl3.0alpha4/<p>The OpenSSL Management Committee and the OpenSSL Technical Committee are glad to
announce the fourth alpha release of OpenSSL 3.0.</p>OpenSSL 3.0 alpha3 release
https://openssl-library.org/post/2020-06-05-openssl3.0alpha3/
Fri, 05 Jun 2020 12:00:00 +0000https://openssl-library.org/post/2020-06-05-openssl3.0alpha3/<p>The OpenSSL Management Committee and the OpenSSL Technical Committee are glad to
announce the third alpha release of OpenSSL 3.0.</p>OpenSSL 3.0 alpha2 release
https://openssl-library.org/post/2020-05-18-openssl3.0alpha2/
Sat, 16 May 2020 12:00:00 +0000https://openssl-library.org/post/2020-05-18-openssl3.0alpha2/<p>The OpenSSL Management Committee and the OpenSSL Technical Committee are glad to
announce the second alpha release of OpenSSL 3.0.</p>Security Policy Update on prenotifications
https://openssl-library.org/post/2020-05-12-security-prenotifications/
Tue, 12 May 2020 09:00:00 +0000https://openssl-library.org/post/2020-05-12-security-prenotifications/<p>We’re planning to extend who we prenotify of any future High and Critical
security issues.</p>OpenSSL 3.0 alpha1 release
https://openssl-library.org/post/2020-04-23-openssl3.0alpha1/
Thu, 23 Apr 2020 12:00:00 +0000https://openssl-library.org/post/2020-04-23-openssl3.0alpha1/<p>The OpenSSL Management Committee and the OpenSSL Technical Committee are glad to
announce the first alpha release of OpenSSL 3.0.</p>QUIC and OpenSSL
https://openssl-library.org/post/2020-02-13-quic-and-openssl/
Mon, 17 Feb 2020 12:00:00 +0000https://openssl-library.org/post/2020-02-13-quic-and-openssl/<p>QUIC is a new protocol which the IETF talks about as
<a href="https://datatracker.ietf.org/doc/draft-ietf-quic-transport/">A UDP-Based Multiplexed and Secure Transport</a>,
and has attracted a lot of attention lately. The OpenSSL Management
Committee (OMC) have followed the development with interest, and we feel that we
owe it to the community to say where we stand on this, and on the inclusion of
support for this protocol in our libraries.</p>Update on 3.0 Development, FIPS and 1.0.2 EOL
https://openssl-library.org/post/2019-11-07-3.0-update/
Thu, 07 Nov 2019 16:00:00 +0000https://openssl-library.org/post/2019-11-07-3.0-update/<p>We have previously talked about our plans for OpenSSL 3.0 and FIPS support
<a href="https://openssl-library.org/post/2019-02-13-fips-update/">here</a>. This blog
post will give an update about what has been happening since then.</p>Face to Face: Committer's Day
https://openssl-library.org/post/2019-05-23-f2f-committers-day/
Thu, 23 May 2019 17:15:00 +0000https://openssl-library.org/post/2019-05-23-f2f-committers-day/<p>At the Face to Face meeting held on the occasion of the <a href="https://icmconference.org">ICMC19 Conference</a>
in Vancouver, a novelty was introduced: For the last day of the meeting all
committers were invited to participate, either personally or remotely via video conference.</p>New Committers
https://openssl-library.org/post/2019-05-20-committers/
Mon, 20 May 2019 12:00:00 +0000https://openssl-library.org/post/2019-05-20-committers/<p>Following on from our additions to the committers
<a href="https://openssl-library.org/post/2018-08-22-updates/">last year</a>,
the <a href="https://www.openssl.org/community/omc.html">OpenSSL Management Committee</a> has now added four new
<a href="https://www.openssl.org/community/committers.html">Committers</a>.</p>OpenSSL 3.0 and FIPS update
https://openssl-library.org/post/2019-02-13-fips-update/
Wed, 13 Feb 2019 10:30:00 +0000https://openssl-library.org/post/2019-02-13-fips-update/<p>As <a href="https://openssl-library.org/post/2018-09-25-fips/">mentioned</a> in a previous
blog post, OpenSSL team members met with various representatives of the FIPS
sponsor organisations back in September last year to discuss design and planning
for the new FIPS module development project.</p>
<p>Since then there has been much design work taking place and we are now able to
publish the draft design documentation. You can read about how we see the longer
term architecture of OpenSSL changing in the future
<a href="https://www.openssl.org/docs/OpenSSLStrategicArchitecture.html">here</a> and you
can read about our specific plans for OpenSSL 3.0 (our next release which will
include a FIPS validated module)
<a href="https://www.openssl.org/docs/OpenSSL300Design.html">here</a>.</p>Celebrating 20 years of OpenSSL
https://openssl-library.org/post/2018-12-20-20years/
Thu, 20 Dec 2018 12:00:00 +0000https://openssl-library.org/post/2018-12-20-20years/<p>20 years ago, on the 23rd December 1998, the first version of OpenSSL was
released. OpenSSL was not the original name planned for the project but it was
changed over just a few hours before the site went live. Let’s take a look at
some of the early history of OpenSSL as some of the background has not been
documented before.</p>The Holy Hand Grenade of Antioch
https://openssl-library.org/post/2018-09-25-version/
Wed, 28 Nov 2018 12:00:00 +0000https://openssl-library.org/post/2018-09-25-version/<p>The OpenSSL Management Committee has been looking at the versioning scheme that
is currently in use. Over the years we’ve received plenty of feedback about the
“uniqueness” of this scheme, and it does cause some confusion for some users. We
would like to adopt a more typical version numbering approach.</p>
<p>The current versioning scheme has this format:</p>
<p>MAJOR.MINOR.FIX[PATCH]</p>
<p>The new scheme will have this format:</p>
<p>MAJOR.MINOR.PATCH</p>
<p>In practical terms our “letter” patch releases become patch numbers and “fix”
is dropped from the concept. In future, API/ABI compatibility will only be
guaranteed for the same MAJOR version number. Previously we guaranteed
API/ABI compatibility across the same MAJOR.MINOR combination. This more closely
aligns with the expectations of users who are familiar with semantic versioning.
We are not at this stage directly adopting semantic versioning because it would
mean changing our current LTS policies and practices.</p>FIPS 140-2: Forward progress
https://openssl-library.org/post/2018-09-25-fips/
Tue, 25 Sep 2018 12:00:00 +0000https://openssl-library.org/post/2018-09-25-fips/<p>The OpenSSL Management Committee (OMC) on behalf of the OpenSSL Project would
like to formally express its thanks to the following organisations
for agreeing to sponsor the next
FIPS validation effort: Akamai Technologies, Blue Cedar, NetApp, Oracle, VMware.</p>
<p>Four weeks ago, the OpenSSL team gathered with many of the organisations
sponsoring the next FIPS module for a face-to-face meeting in Brisbane,
Australia.</p>
<p>We got a great deal accomplished during that week. Having most of
the fips-sponsor organisations in the same location helps ensure that
we are all on the same page for the decisions we need to make going forward.</p>OpenSSL 1.1.1 is released
https://openssl-library.org/post/2018-09-11-release111/
Tue, 11 Sep 2018 12:00:00 +0000https://openssl-library.org/post/2018-09-11-release111/<p>After two years of work we are excited to be releasing our latest version today -
OpenSSL 1.1.1. This is also our new Long Term Support (LTS) version and so we
are committing to support it for at least five years.</p>
<p>OpenSSL 1.1.1 has been a huge team effort with nearly 5000 commits having been
made from over 200 individual contributors since the release of OpenSSL 1.1.0.
These statistics just illustrate the amazing vitality and diversity of the
OpenSSL community. The contributions didn’t just come in the form of commits
though. There has been a great deal of interest in this new version so thanks
needs to be extended to the large number of users who have downloaded the beta
releases to test them out and report bugs.</p>New OMC member and new Committers
https://openssl-library.org/post/2018-08-22-updates/
Wed, 22 Aug 2018 12:00:00 +0000https://openssl-library.org/post/2018-08-22-updates/<p>We first announced <a href="https://openssl-library.org/post/2017-06-15-committers/">last year</a>
the <a href="https://www.openssl.org/community/omc.html">OpenSSL Management Committee</a>
and separate <a href="https://www.openssl.org/community/committers.html">Committers</a> groups
aimed at enabling greater involvement from the community.</p>
<p>We have now added a new OMC member and two new committers.</p>New LTS Release
https://openssl-library.org/post/2018-05-18-new-lts/
Fri, 18 May 2018 06:00:00 +0000https://openssl-library.org/post/2018-05-18-new-lts/<p>Back around the end of 2014 we posted our
<a href="https://www.openssl.org/policies/releasestrat.html">release strategy</a>. This
was the first time we defined support timelines for our releases, and added
the concept of an LTS (long-term support) release. At our OMC meeting
earlier this month, we picked our next LTS release. This post walks through
that announcement, and tries to explain all the implications of it.</p>Changing the guiding principles in our Security Policy
https://openssl-library.org/post/2018-05-16-security-policy/
Wed, 16 May 2018 21:00:00 +0000https://openssl-library.org/post/2018-05-16-security-policy/<blockquote>
<p>“That we remove “We strongly believe that the right to advance patches/info
should not be based in any way on paid membership to some forum. You can not
pay us to get security patches in advance.” from the security policy and Mark
posts a blog entry to explain the change including that we have no
current such service.”</p></blockquote>
<p>At the OpenSSL Management Committee meeting earlier this month we <a href="https://mta.openssl.org/pipermail/openssl-project/2018-May/000724.html">passed the vote above</a> to remove a section our <a href="https://openssl-library.org/policies/general/security-policy/">security policy</a>. Part of that vote
was that I would write this blog post to explain why we made this change.</p>Seeking Last Group of Contributors
https://openssl-library.org/post/2018-03-01-last-license/
Thu, 01 Mar 2018 06:00:00 +0000https://openssl-library.org/post/2018-03-01-last-license/<p>The following is a press release that we just put out about how finishing
off our relicensing effort. For the impatient, please see
<a href="https://license.openssl.org/trying-to-find">https://license.openssl.org/trying-to-find</a>
to help us find the last people; we want to change the license with our
next release, which is currently in Alpha, and tentatively set for May.</p>
<p>For background, you can see all posts in the
<a href="https://openssl-library.org/tags/license">license tag</a>.</p>
<p>One copy of the press release is at
<a href="https://www.prnewswire.com/news-releases/openssl-seeking-last-group-of-contributors-300607162.html">https://www.prnewswire.com/news-releases/openssl-seeking-last-group-of-contributors-300607162.html</a>.</p>Using TLS1.3 with OpenSSL
https://openssl-library.org/post/2018-02-08-tlsv1.3/
Thu, 08 Feb 2018 12:00:00 +0100https://openssl-library.org/post/2018-02-08-tlsv1.3/<p>Note: This is an outdated version of this blog post. This information is now
maintained in a wiki page. See
<a href="https://github.com/openssl/openssl/wiki/TLS1.3">here</a> for the latest version.</p>
<p>The forthcoming OpenSSL 1.1.1 release will include support for TLSv1.3. The new
release will be binary and API compatible with OpenSSL 1.1.0. In theory, if your
application supports OpenSSL 1.1.0, then all you need to do to upgrade is to drop
in the new version of OpenSSL when it becomes available and you will
automatically start being able to use TLSv1.3. However there are some issues
that application developers and deployers need to be aware of. In this blog post
I am going to cover some of those things.</p>Early access to security issues for support customers?
https://openssl-library.org/post/2018-02-07-early-access/
Wed, 07 Feb 2018 09:00:00 +0000https://openssl-library.org/post/2018-02-07-early-access/<p>At the <a href="https://openssl-library.org/post/2018-01-19-f2f-london/">face to face</a>
last year we discussed future funding models, and we are exploring a range of
possible options. One suggestion raised was we could sell more support
contracts and give those support contract users patches for security issues in
advance.</p>
<p>But before we can even discuss this as an option we would have to change
our public stance. Our security policy since 2014 has stated we would
not do this and currently reads:</p>Another Face to Face: Email changes and crypto policy
https://openssl-library.org/post/2018-01-19-f2f-london/
Thu, 18 Jan 2018 01:00:00 +0000https://openssl-library.org/post/2018-01-19-f2f-london/<p>The OpenSSL OMC met last month for a two-day face-to-face meeting in London,
and like previous F2F meetings, most of the team was present and we addressed
a great many issues. This blog posts talks about some of them,
and most of the others will get their own blog posts, or notices, later.
Red Hat graciously hosted us for the two days, and both Red Hat and Cryptsoft
covered the costs of their employees who attended.</p>
<p>One of the overall threads of the meeting was about increasing the
transparency of the project. By default, everything should be done in
public. We decided to try some major changes to email and such.</p>OpenSSL wins the Levchin prize
https://openssl-library.org/post/2018-01-10-levchin/
Wed, 10 Jan 2018 19:00:00 +0000https://openssl-library.org/post/2018-01-10-levchin/<p>Today I have had great pleasure in attending the Real World Crypto 2018
conference in Zürich in order to receive the
<a href="http://levchinprize.com/">Levchin prize</a> on behalf of the OpenSSL team.</p>
<p>The Levchin prize for Real World Cryptography recognises up to two groups or
individuals each year who have made significant advances in the practice of
cryptography and its use in real-world systems. This year one of the two
recipients is the OpenSSL team. The other recipient is
<a href="http://researcher.watson.ibm.com/researcher/view.php?person=us-hugokraw">Hugo Krawczyk</a>.</p>Steve Marquess
https://openssl-library.org/post/2017-10-27-steve-marquess/
Fri, 27 Oct 2017 01:00:00 +0000https://openssl-library.org/post/2017-10-27-steve-marquess/<p>Steve Marquess is leaving the OpenSSL project as of the 15th of November 2017.</p>
<p>The OpenSSL Management Committee (OMC) would like to wish him all the
best for the future.</p>
<p>All communication that used to go to Steve Marquess directly, should
now be sent to <a href="mailto:[email protected]">[email protected]</a> in the first instance.</p>
<p>Thanks for your contributions to the project over the years!</p>Steve Henson
https://openssl-library.org/post/2017-10-24-steve-henson/
Tue, 24 Oct 2017 01:00:00 +0000https://openssl-library.org/post/2017-10-24-steve-henson/<p>For as long as I have been involved in the OpenSSL project there has been one
constant presence: Steve Henson. In fact he has been a part of the project since
it was founded and he is the number 1 committer of all time (by a wide margin).
I recall the first few times I had any dealings with him being somewhat in awe
of his encyclopaedic knowledge of OpenSSL and all things crypto. Over the years
Steve has made very many significant contributions both in terms of code but
also in terms of being an active member of the management team.</p>Seven days and four cities in China
https://openssl-library.org/post/2017-09-28-china-2/
Thu, 28 Sep 2017 01:00:00 +0000https://openssl-library.org/post/2017-09-28-china-2/<p>We had been invited to spend time with the open source community in China
by one of the developers - <a href="https://github.com/InfoHunter">Paul Yang</a> - who
participates in the OpenSSL project. A number of the team members had
communicated via email over the last year and when the suggestion was made
there were enough of us willing and interested to visit China for a <em>“tour”</em>
to make sense. So the tour was agreed as a good thing and that started
the journey that lead to spending a week in China (last week as I write
this on the plane on the way back to Australia).</p>FIPS 140-2: Thanks and Farewell to SafeLogic
https://openssl-library.org/post/2017-08-17-fips/
Thu, 17 Aug 2017 16:00:00 +0000https://openssl-library.org/post/2017-08-17-fips/<p>We’ve had a change in the stakeholder aspect of this new FIPS 140 validation effort.
The original sponsor, <a href="https://www.safelogic.com/">SafeLogic</a>, with whom we jump-started
this effort a year ago and who has worked with us since then, is taking a well-deserved
bow due to a change in circumstances. Supporting this effort has been quite a strain for
a relatively small company, but SafeLogic has left us in a fairly good position. Without
SafeLogic we wouldn’t have made it this far, and while I don’t anticipate any future
SafeLogic involvement with this effort from this point on, I remain enormously grateful
to SafeLogic and CEO Ray Potter for taking on such a bold and ambitious venture.</p>Random thoughts
https://openssl-library.org/post/2017-08-10-random/
Sat, 12 Aug 2017 20:00:00 +0000https://openssl-library.org/post/2017-08-10-random/<p>The next release will include a completely overhauled version of the random
number facility, the <code>RAND</code> API. The default RAND method is now based
on a Deterministic Random Bit Generator (DRBG) implemented according to
the NIST recommendation 800-90A.
We have also edited the documentation, allowed
finer-grained configuration of how to seed the generator, and updated
the default seeding mechanisms.</p>
<p>There will probably be more changes before the release is made, but they
should be comparatively minor.</p>
<p>Read on for more details.</p>FIPS 140-2: And so it begins
https://openssl-library.org/post/2017-07-25-fips/
Tue, 25 Jul 2017 20:00:00 +0000https://openssl-library.org/post/2017-07-25-fips/<p>It’s been almost a year since plans for a new FIPS 140 validation were
<a href="https://openssl-library.org/post/2016-07-20-fips/">first announced</a>.
Several factors have led to this long delay. For one, we chose to focus
our limited manpower resources on higher priority objectives such as the
TLS 1.3 implementation. SafeLogic has also experienced difficulties in
obtaining the funding for their intended sponsorship; potential sponsors can
<a href="mailto:[email protected]">contact them directly</a>.</p>
<p>With TLS 1.3 now done (pending only a final TLS 1.3 specification) we’re
now in a position to turn our attention to the new FIPS module, and just
in the nick of time Oracle has pledged enough funding to get us off to a
good start. With financial support from the Linux Foundation Core
Infrastructure Initiative temporarily interrupted, leaving a team member with
no income, that funding eases the pressure to seek new long term employment.</p>Removing some code
https://openssl-library.org/post/2017-06-22-code-removal/
Sat, 17 Jun 2017 12:00:00 +0000https://openssl-library.org/post/2017-06-22-code-removal/<p>This is another update on our effort to re-license the OpenSSL software.
Our previous post in <a href="https://openssl-library.org/post/2017-03-20-license/">March</a> was about the
launch of our effort to reach all contributors, with the hope that they
would support this change.</p>
<p>So far, about 40% of the people have responded. For a project that is
as old as OpenSSL (including its predecessor, SSLeay, it’s around 20 years)
that’s not bad.
We’ll be continuing our efforts over the next couple of months to
contact everyone.</p>
<p>Of those people responding, the vast majority have been in favor of
the license change – less then a dozen objected. This post describes
what we’re doing about those and how we came to our conclusions. The
goal is to be very transparent and open with our processes.</p>New Committers
https://openssl-library.org/post/2017-06-15-committers/
Tue, 13 Jun 2017 12:00:00 +0000https://openssl-library.org/post/2017-06-15-committers/<p>We announced back in <a href="https://openssl-library.org/post/2017-02-13-bylaws/">October</a>
that we would be changing from a single OpenSSL Project Team to having
an <a href="https://www.openssl.org/community/omc.html">OpenSSL management committee</a>
and a set of <a href="https://www.openssl.org/community/committers.html">committers</a> which
we planned to expand to enable the greater involvement from the community.</p>
<p>Now that we have in place <a href="https://www.openssl.org/policies/committers.html">committer guidelines</a>,
we have invited the first set of external (non-OMC) community members to become committers and
they have each accepted the invitation.</p>Using TLS1.3 with OpenSSL
https://openssl-library.org/post/2017-05-04-tlsv1.3/
Thu, 04 May 2017 12:00:00 +0100https://openssl-library.org/post/2017-05-04-tlsv1.3/<p>Note: This is an outdated version of this blog post. This information is now
maintained in a wiki page. See
<a href="https://github.com/openssl/openssl/wiki/TLS1.3">here</a> for the latest version.</p>
<p>The forthcoming OpenSSL 1.1.1 release will include support for TLSv1.3. The new
release will be binary and API compatible with OpenSSL 1.1.0. In theory, if your
application supports OpenSSL 1.1.0, then all you need to do to upgrade is to drop
in the new version of OpenSSL when it becomes available and you will
automatically start being able to use TLSv1.3. However there are some issues
that application developers and deployers need to be aware of. In this blog post
I am going to cover some of those things.</p>Licensing Update
https://openssl-library.org/post/2017-03-20-license/
Wed, 22 Mar 2017 12:00:00 +0000https://openssl-library.org/post/2017-03-20-license/<p>The following is a press release that we just released, with the cooperation
and financial support of the Core Infrastructure Initiative and the
Linux Foundation.</p>
<p>In the next few days we’ll start sending out email to all contributors
asking them to approve the change. In the meantime, you can visit
<a href="https://license.openssl.org">the licensing website</a> and search for
your name and request the email. If you have changed email addresses,
or want to raise other issues about the license change, please email
<a href="mailto:[email protected]">[email protected]</a>. You can also post
general issues to
<a href="mailto:[email protected]">[email protected]</a>.</p>
<p>We are grateful to all the contributors who have contributed to OpenSSL
and look forward to their help and support in this effort.</p>
<p>The <a href="https://www.coreinfrastructure.org/announcements/openssl-re-licensing-to-apache-license-v-2-0-to-encourage-broader-use-with-other-foss-projects-and-products/">official press release</a> can be found at the CII website. The rest of this post is a copy:</p>OpenSSL and Threads
https://openssl-library.org/post/2017-02-21-threads/
Tue, 21 Feb 2017 11:00:00 +0000https://openssl-library.org/post/2017-02-21-threads/<p>This post talks about OpenSSL and threads. In particular, using OpenSSL
in multi-threaded applications. It traces through the history, explains
what was changed for the 1.1.0 release, and will hopefully provide some
guidance to developers.</p>
<p>While none of the behaviors have really changed, and therefore none of
this should be new information, the documentation has not been as
clear as it could, or should, be. Therefore, some readers might be
surprised by what’s in this post.</p>
<p>In short, OpenSSL has always, and only, supported the concept of
<em>locking</em> an object and sometimes it locks its internal
objects. Read on for more details.</p>Project Bylaws
https://openssl-library.org/post/2017-02-13-bylaws/
Mon, 13 Feb 2017 12:00:00 +0000https://openssl-library.org/post/2017-02-13-bylaws/<p>Last October, the OpenSSL Project team had a face to face meeting.
We talked about many topics but one of them was that, in recent years, we have
seen much more involvement from the community and that we would like to
encourage that further. For example, there are a number of people in the
community who we know and trust. We would like those people to get involved more
and make it easier for them to contribute. We decided to introduce the
concept of a “committer” (borrowed from the Apache concept): someone who has the
ability to commit code to our source code repository but without necessarily
having to become a full team member. This might be seen as a stepping-stone for
someone who aspires to full team membership, or simply as an easier way of
contributing for those that don’t. Those people could help with our review
process (i.e., their reviews would count towards approval) - which might help us
keep on top of the github issues and pull request queues.</p>OCAP audit of OpenSSL
https://openssl-library.org/post/2016-12-15-audit/
Thu, 15 Dec 2016 01:00:00 +0000https://openssl-library.org/post/2016-12-15-audit/<p>The audit took place during 2015 in two phases while the OpenSSL project was
working on the development of the (now released) 1.1.0 version. We chose to
audit the “master” branch of the code as it stood at the time. OpenSSL 1.1.0 has
made some extensive internal changes, most notably in libssl with the new
state machine code, as well as the new packet parsing code. We wanted the audit
team to review that code to give us confidence that what we were delivering was
sound.</p>Face to Face: Roadmap and platform updates
https://openssl-library.org/post/2016-10-24-f2f-roadmap/
Mon, 24 Oct 2016 01:00:00 +0000https://openssl-library.org/post/2016-10-24-f2f-roadmap/<p>This is another in the
<a href="https://openssl-library.org/blog/2016/10/12/f2f-rt-github/">series of posts</a>
about decisions we made at our face-to-face meeting a couple of weeks
ago.</p>
<p>We updated the
<a href="https://www.openssl.org/policies/roadmap.html">project roadmap</a>.</p>
<p>I think the most important news here, is that our next release will
include TLS 1.3. Our current plan is that this will be 1.1.1, which means
that it is API-compatible with the current 1.1.0 release. This is really
only possible because of the work we did on making most of the structure
internals opaque. Also, since we are doing all of our work in public on
our GitHub repository, we hope that the entire community will be able to
“follow along at home” and help us improve the code. There will be more,
much more, to say about this later.</p>Face to Face: Goodbye RT, hello GitHub
https://openssl-library.org/post/2016-10-12-f2f-rt-github/
Wed, 12 Oct 2016 01:00:00 +0000https://openssl-library.org/post/2016-10-12-f2f-rt-github/<p>Last week, the OpenSSL dev team had another face-to-face meeting.
It was a week of “mosts”: most of the team flew in for most of the
week, and most of it was funded by the
<a href="https://www.coreinfrastructure.org/">CII/LF</a></p>
<p>We got a great deal accomplished during that week. We do many things by
vote, and having everyone in the room to talk not only beats email all
to hell, but it ensures that we’re all on the same page for the decisions
we make. Sure, not everything was a unanimous decision, but none
were decided by narrow margins.</p>
<p>In this post I’m going to talk about two important decisions.</p>The SWEET32 issue, CVE-2016-2183
https://openssl-library.org/post/2016-08-25-sweet32/
Wed, 24 Aug 2016 23:16:00 +0000https://openssl-library.org/post/2016-08-25-sweet32/<p>Today, Karthik Bhargavan and Gaetan Leurent from Inria have unveiled a
new attack on Triple-DES, <a href="https://sweet32.info">SWEET32</a>, Birthday attacks
on 64-bit block ciphers in TLS and OpenVPN.
It has been assigned CVE-2016-2183.</p>
<p>This post gives a bit of background and describes what OpenSSL is doing.
For more details, see their website.</p>FIPS 140-2: Once more unto the breach
https://openssl-library.org/post/2016-07-20-fips/
Wed, 20 Jul 2016 19:00:00 +0000https://openssl-library.org/post/2016-07-20-fips/<p>The last <a href="https://openssl-library.org/post/2015-09-29-fips/">post on this topic</a> sounded a
skeptical note on the prospects for a new FIPS 140 validated module for OpenSSL 1.1 and
beyond. That post noted a rather improbable set of prerequisites for a new validation attempt;
ones I thought only a governmental sponsor could meet (as was the case for the five previous
open source based validations).</p>
<p>Multiple commercial vendors have offered to fund (very generously in some cases) a new validation
effort under terms that would guarantee them a proprietary validation, while not guaranteeing
an open source based validation. At one point we actually came close to closing a deal that would
have funded an open source based validation attempt in exchange for a limited period of exclusivity;
a reasonable trade-off in my opinion. But, I eventually concluded that was too risky given an
uncertain reception by the FIPS validation bureaucracy, and we decided to wait for a “white knight”
sponsor that might never materialize.</p>Undefined Pointer Arithmetic
https://openssl-library.org/post/2016-06-27-undefined-pointer-arithmetic/
Mon, 27 Jun 2016 17:00:00 +0000https://openssl-library.org/post/2016-06-27-undefined-pointer-arithmetic/<p>In commits a004e72b9 (1.0.2) and 6f35f6deb (1.0.1) we released a fix for
CVE-2016-2177. The fix corrects a common coding idiom present in OpenSSL 1.0.2
and OpenSSL 1.0.1 which actually relies on a usage of pointer arithmetic that
is undefined in the C specification. The problem does not exist in master
(OpenSSL 1.1.0) which refactored this code some while ago. This usage could give
rise to a low severity security issue in certain unusual scenarios. The OpenSSL
security policy (<a href="https://openssl-library.org/policies/general/security-policy/">https://openssl-library.org/policies/general/security-policy/</a>) states that we
publish low severity issues directly to our public repository, and they get
rolled up into the next release whenever that happens. The rest of this blog
post describes the problem in a little more detail, explains the scenarios
where a security issue could arise and why this issue has been rated as low
severity.</p>An OpenSSL user's guide to DROWN
https://openssl-library.org/post/2016-03-01-an-openssl-users-guide-to-drown/
Tue, 01 Mar 2016 14:59:00 +0000https://openssl-library.org/post/2016-03-01-an-openssl-users-guide-to-drown/<p>Today, an international group of researchers unveiled
<a href="https://www.drownattack.com">DROWN</a> (Decrypting RSA with Obsolete and
Weakened eNcryption), aka CVE-2016-0800, a novel cross-protocol attack that uses SSLv2
handshakes to decrypt TLS sessions.</p>
<p>Over the past weeks, the OpenSSL team worked closely with the
researchers to determine the exact impact of DROWN on OpenSSL and
devise countermeasures to protect our users. Today’s
<a href="https://www.openssl.org/news/secadv/20160301.txt">OpenSSL release</a> makes it
impossible to configure a TLS server in such a way that it is vulnerable to
DROWN.</p>Poly1305 revised
https://openssl-library.org/post/2016-02-15-poly1305-revised/
Mon, 15 Feb 2016 22:16:22 +0100https://openssl-library.org/post/2016-02-15-poly1305-revised/<p><a href="http://cr.yp.to/mac.html">Poly1305</a> implementations are characterized
by several parameters:</p>
<ul>
<li><em>radix or base of inputs representation</em>, or how many digits
represent the 130-bit value the algorithm operates on;</li>
<li><em>vectorization factor</em>, or how many input blocks are
processed per [loop] iteration and in parallel;</li>
<li><em>floating-point vs. integer/scalar</em> arithmetic;</li>
</ul>Engine Building Lesson 2: An Example MD5 Engine
https://openssl-library.org/post/2015-11-23-engine-building-lesson-2-an-example-md5-engine/
Mon, 23 Nov 2015 22:19:30 +0100https://openssl-library.org/post/2015-11-23-engine-building-lesson-2-an-example-md5-engine/<p>Coming back after a month and two weeks, it’s time to resume with the
next engine lesson, this time building an engine implementing a
digest.</p>
<p>It doesn’t matter much what digest algorithm we choose. Being lazy,
I’ve chosen one with a well defined reference implementation, MD5
(reference implementation is found in
<a href="https://www.ietf.org/rfc/rfc1321.txt">RFC 1321</a>)</p>Engine building lesson 1: A minimum useless engine
https://openssl-library.org/post/2015-10-08-engine-building-lesson-1-a-minimum-useless-engine/
Thu, 08 Oct 2015 05:41:20 +0200https://openssl-library.org/post/2015-10-08-engine-building-lesson-1-a-minimum-useless-engine/<p>In this lesson, we’re going to explore minimalism, in this case in the
form of the most minimal engine possible (without obfuscating it).</p>
<p>The least boilerplate code for an engine looks like this:</p>
<div class="highlight"><pre tabindex="0" style="color:#586e75;background-color:#eee8d5;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-C" data-lang="C"><span style="display:flex;"><span><span style="color:#93a1a1;font-style:italic">#include</span> <span style="color:#93a1a1;font-style:italic"><openssl/engine.h></span><span style="color:#93a1a1;font-style:italic">
</span></span></span><span style="display:flex;"><span><span style="color:#93a1a1;font-style:italic"></span>
</span></span><span style="display:flex;"><span><span style="color:#268bd2">IMPLEMENT_DYNAMIC_BIND_FN</span>(<span style="color:#268bd2">bind</span>)
</span></span><span style="display:flex;"><span><span style="color:#268bd2">IMPLEMENT_DYNAMIC_CHECK_FN</span>()
</span></span></code></pre></div><p>This example isn’t complete, it will not compile. <em>However</em>, it
contains the absolute minimum required for those module to even be
recognised as an OpenSSL engine.</p>Engine school, a path to writing standalone engines
https://openssl-library.org/post/2015-10-07-engine-school/
Wed, 07 Oct 2015 23:32:00 +0000https://openssl-library.org/post/2015-10-07-engine-school/<p>For the longest time, it seems that people have wanted to have their
diverse engines bundled with the OpenSSL source, as if there was no
other way to build it or distribute it.</p>
<p>Nothing could be further from the truth. Also, having the engine for
some hardware bundled with the OpenSSL source presents a maintainance
problem, and the better solution is for those who have an engine to
maintain theḿ themselves.</p>New severity level, "Critical"
https://openssl-library.org/post/2015-09-28-critical-security-level/
Mon, 28 Sep 2015 12:10:00 +0000https://openssl-library.org/post/2015-09-28-critical-security-level/<p>We’ve just added a new severity level called “critical severity” to our
<a href="https://openssl-library.org/policies/general/security-policy/">security policy</a>. When we first introduced the policy, over a year ago, we just
had three levels, “Low”, “Moderate”, and “High”. So why did we add “Critical” and
why are we not using someone else’s standard definitions?</p>
<p>After introducing the new policy we started giving everyone a headsup when we
were due to release OpenSSL updates that included security fixes. The headsup
doesn’t contain any details of the issues being fixed apart from the maximum
severity level and a date a few days in the future.</p>FIPS 140-2: It's not dead, it's resting
https://openssl-library.org/post/2015-09-29-fips/
Wed, 02 Sep 2015 14:00:00 +0000https://openssl-library.org/post/2015-09-29-fips/<p>Some of you may have noticed that the upcoming 1.1 release doesn’t include any FIPS support. That omission is not by choice; it was forced on us by circumstances and will hopefully not be permanent.</p>
<p>The v2.0 OpenSSL FIPS module is compatible with the 1.0.x releases, in particular the 1.0.2 “LTS” release that will be supported through 2019. It has proven very popular, used both directly by hundreds of software vendors and indirectly as a model for copycat “private label” validations.</p>OpenSSL Security: A Year in Review
https://openssl-library.org/post/2015-09-01-openssl-security-a-year-in-review/
Tue, 01 Sep 2015 12:47:00 +0000https://openssl-library.org/post/2015-09-01-openssl-security-a-year-in-review/<p>Over the last 10 years, OpenSSL has published advisories on <a href="https://www.openssl.org/news/vulnerabilities.html">over 100 vulnerabilities</a>. Many more were likely silently fixed in the early days, but in the past year our goal has been to establish a clear public record.</p>
<p>In September 2014, the team adopted a <a href="https://openssl-library.org/policies/general/security-policy/">security policy</a> that defines how we handle vulnerability reports. One year later, I’m very happy to conclude that our policy is enforced, and working well.</p>
<p>Our policy divides vulnerabilities into three categories, and defines actions for each category: we use the severity ranking to balance the need to get the fix out fast with the burden release upgrades put on our consumers.</p>New website
https://openssl-library.org/post/2015-08-15-website/
Sat, 15 Aug 2015 14:00:00 +0000https://openssl-library.org/post/2015-08-15-website/<p>We just went live with a new website. The design is based on the style
included with <a href="http://octopress.org/">Octopress</a>; the new logo and some other
important CSS tweaks were contributed by Tony Arcieri.
The style is also mobile-friendly, so you can take us with you wherever
you go. :) We still need a better “favicon.”</p>
<p>The text still needs more work. As someone on the team pointed out,
“a worldwide community of volunteers that use the Internet to communicate,
plan, and develop [OpenSSL]” … really?</p>License Agreements and changes are coming
https://openssl-library.org/post/2015-08-01-cla/
Sat, 01 Aug 2015 09:00:00 +0000https://openssl-library.org/post/2015-08-01-cla/<p>The OpenSSL license is rather unique and idiosyncratic. It reflects
views from when its predecessor, SSLeay, started twenty years ago. As a
further complication, the original authors were hired by RSA in 1998,
and the code forked into two versions: OpenSSL and RSA BSAFE SSL-C.
(<a href="https://en.wikipedia.org/wiki/SSLeay">See Wikipedia</a> for discussion.) I don’t
want get into any specific details, and I certainly don’t know them all.</p>
<p>Things have evolved since then, and open source is an important part of
the landscape – the Internet could not exist without it.
There are good reasons why Microsoft is a founding member of the
Core Infrastructure Initiative (<a href="https://www.coreinfrastructure.org/">CII</a>).</p>
<p>Our plan is to update the license to the
<a href="http://www.apache.org/licenses/LICENSE-2.0">Apache License version 2.0</a>.
We are in
consultation with various corporate partners, the CII, and the legal experts
at the <a href="https://www.softwarefreedom.org/">Software Freedom Law Center</a>.
In other words, we have a great deal of expertise and interest at our
fingertips.</p>Beyond reformatting: More code cleanup
https://openssl-library.org/post/2015-07-27-code-cleanup/
Tue, 28 Jul 2015 13:20:00 +0000https://openssl-library.org/post/2015-07-27-code-cleanup/<p>The OpenSSL source doesn’t look the same as it did a year ago. Matt
posted about the big code reformatting. In this post I want review some
of the other changes – these rarely affect features, but are more than
involved than “just” whitespace.</p>Logjam, FREAK and upcoming changes in OpenSSL
https://openssl-library.org/post/2015-05-20-logjam-freak-upcoming-changes/
Wed, 20 May 2015 18:12:00 +0000https://openssl-library.org/post/2015-05-20-logjam-freak-upcoming-changes/<p>Today, news broke of Logjam, an attack on TLS connections using Diffie-Hellman ciphersuites. To protect OpenSSL-based clients, we’re increasing the minimum accepted DH key size to 768 bits immediately in the next release, and to 1024 bits soon after. We have also made several other changes to strengthen our cryptographic defaults and have updated our tools and documentation to help servers configure Diffie-Hellman ciphersuites securely - see below for details.</p>Security Updates
https://openssl-library.org/post/2015-03-19-security-updates/
Thu, 19 Mar 2015 14:00:00 +0000https://openssl-library.org/post/2015-03-19-security-updates/<p>We’ve just released security updates to OpenSSL 0.9.8, 1.0.0,
1.0.1, and 1.0.2.</p>
<p>These updates fix a number of Moderate and Low severity security
issues in OpenSSL. They also fix one new High severity issue,
CVE-2015-0291, that affects just OpenSSL 1.0.2, released in January
this year. A remote attacker could use this flaw to cause unfixed
servers to crash, which could lead to a denial of service attack
depending on the server.</p>Code Reformat Finished
https://openssl-library.org/post/2015-02-11-code-reformat-finished/
Wed, 11 Feb 2015 13:45:00 +0000https://openssl-library.org/post/2015-02-11-code-reformat-finished/<p>At the end of January we completed the OpenSSL code reformat as previously mentioned <a href="https://openssl-library.org/post/2015-01-05-source-code-reformat/">here</a> and <a href="https://mta.openssl.org/pipermail/openssl-announce/2015-January/000014.html">here</a>. This post is intended to give you a bit more insight into exactly what we’ve done.</p>Source Code Reformat
https://openssl-library.org/post/2015-01-05-source-code-reformat/
Mon, 05 Jan 2015 14:36:25 +0000https://openssl-library.org/post/2015-01-05-source-code-reformat/<p>We have previously announced our intention to reformat the entire
codebase into a more consistent style (see our roadmap document here:
<a href="https://www.openssl.org/policies/roadmap.html">https://www.openssl.org/policies/roadmap.html</a>)</p>On redesigning our website
https://openssl-library.org/post/2014-12-28-website-redesign/
Sun, 28 Dec 2014 19:00:00 +0000https://openssl-library.org/post/2014-12-28-website-redesign/<p>So I recently asked for
<a href="https://twitter.com/RichSalz/status/547589365569183746">help with our website</a>
on Twitter. It’s been my most popular tweet. Several people have
expressed an interest – thanks for that, and thanks for your support.</p>
<p>The goal of this post is to list the requirements. It’s definitely
incomplete and will evolve over time. Post your questions and comments
and help refine the list!</p>The new Release Strategy
https://openssl-library.org/post/2014-12-23-the-new-release-strategy/
Tue, 23 Dec 2014 23:16:00 +0000https://openssl-library.org/post/2014-12-23-the-new-release-strategy/<p>Today the OpenSSL project published its Release Strategy. You can read it <a href="https://www.openssl.org/policies/releasestrat.html">here</a>. There are some really important announcements discussed in it. I’d like to spend a bit of time talking about the thinking that went into writing this strategy.</p>Hello World
https://openssl-library.org/post/2014-12-19-hello/
Fri, 19 Dec 2014 20:00:00 +0000https://openssl-library.org/post/2014-12-19-hello/<p>Well, we did it. We have an OpenSSL team blog.</p>
<p>Powered by Octopress. Take a bit of doing to get it running.</p>
<p>Whew.</p>
<div class="highlight"><pre tabindex="0" style="color:#586e75;background-color:#eee8d5;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-C" data-lang="C"><span style="display:flex;"><span><span style="color:#93a1a1;font-style:italic">#include</span> <span style="color:#93a1a1;font-style:italic"><stdio.h></span><span style="color:#93a1a1;font-style:italic">
</span></span></span><span style="display:flex;"><span><span style="color:#93a1a1;font-style:italic"></span>
</span></span><span style="display:flex;"><span><span style="color:#859900;font-weight:bold">int</span>
</span></span><span style="display:flex;"><span><span style="color:#268bd2">main</span>(<span style="color:#859900;font-weight:bold">int</span> <span style="color:#268bd2">ac</span>, <span style="color:#859900;font-weight:bold">char</span> *<span style="color:#268bd2">av</span>[])
</span></span><span style="display:flex;"><span>{
</span></span><span style="display:flex;"><span> <span style="color:#268bd2">printf</span>(<span style="color:#2aa198">"Hello, world</span><span style="color:#2aa198">\n</span><span style="color:#2aa198">"</span>);
</span></span><span style="display:flex;"><span> <span style="color:#859900">return</span> <span style="color:#2aa198;font-weight:bold">0</span>;
</span></span><span style="display:flex;"><span>}
</span></span></code></pre></div>Authorised Trademark Register
https://openssl-library.org/policies/general-supplemental/trademarkregister/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general-supplemental/trademarkregister/<table>
<thead>
<tr>
<th><strong>Requestor Name</strong></th>
<th><strong>Date Decided</strong></th>
<th><strong>Approved/Declined</strong></th>
<th><strong>Reason for Decision</strong></th>
<th><strong>Approval Type</strong></th>
<th><strong>Approved Usage</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>OpenSSL Validation Services, Inc.</td>
<td>TBA</td>
<td>Approved</td>
<td>while not affiliated with the OpenSSL project has historical rights to use the OpenSSL trademark.</td>
<td>License Agreement</td>
<td>full usage</td>
</tr>
<tr>
<td>ExampleOrg</td>
<td>2022-11-25</td>
<td>Approved</td>
<td>Beneficial to OSSL to involved with this organisaiton</td>
<td>Written Authorisation</td>
<td>Including “based on OpenSSL” in their Super Services product</td>
</tr>
</tbody>
</table>Branch Policy
https://openssl-library.org/policies/technical/branch-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/branch-policy/<p>The openssl repository contains the following maintained branches:</p>
<h2 id="the-default-development-branch">The default development branch</h2>
<ul>
<li>Any type (bug fix, feature, refactoring, …) of pull requests is allowed.</li>
<li>The development of the next minor or major release happens there.
API/ABI breaking changes are allowed on this branch only if the next
release will be a major release.</li>
<li>Any changes merged to this branch must be ported to the future major
and future minor branches if they are applicable. This can be done by
directly cherry-picking the changes when merging if there are no conflicts.
By this we must ensure that no features or bug fixes are unintentionally
lost in future major or minor releases.</li>
</ul>
<h2 id="the-supported-release-branches">The supported release branches</h2>
<ul>
<li>The development of the next patch releases of supported stable releases
happens there.</li>
<li>According to <a href="https://openssl-library.org/policies/technical/stable-release-updates/">stable release update policy</a> only bug fixes and
documentation changes are allowed.</li>
<li>By exception given by the OpenSSL Foundation or the OpenSSL Corporation
also other types of pull requests can be merged.</li>
<li>Bug fix and documentation pull requests must be always merged to the
latest branch where the bug or documentation deficiency is present including
the future major and minor branches.
It can be then merged (backported or directly cherry-picked) to all
older branches where the deficiency is present.</li>
</ul>
<h2 id="a-future-major-branch">A future major branch</h2>
<ul>
<li>The development of a future major release happens there. Implicitly it
means that any API/ABI breaking changes are allowed but the OpenSSL
Foundation or the OpenSSL Corporation can (and usually will) limit the
extent of the breakage allowed.</li>
<li>Major features are allowed. Examples of a major feature: A completely
new implementation of a protocol. New API for pluggable crypto modules.</li>
<li>Major refactoring is allowed. Examples of major refactoring: Splitting
libcrypto into multiple hierarchically dependent libraries.</li>
<li>There might be no future major branch if the currently developed release
is a major release and there are no changes accepted for a future major
release yet.</li>
<li>All changes specifically targetting this branch instead of the default
development branch must be approved by the OpenSSL Foundation or
OpenSSL Corporation.</li>
</ul>
<h2 id="a-future-minor-branch">A future minor branch</h2>
<ul>
<li>The development of the minor release that is supposed to be released
after the release currently being developed at the default development branch
happens there.</li>
<li>No API/ABI breaking changes are allowed.</li>
<li>No major features are allowed unless explicitly acked by the OpenSSL
Foundation or the OpenSSL Corporation as targeted for the minor release.</li>
<li>No major refactoring is allowed.</li>
<li>Any changes (features, bug-fixes, documentation, …) done on the future
minor branch must be ported or directly cherry-picked to the future major
branch if applicable.</li>
<li>Exceptions are possible for example when we are removing deprecated
functionality in the future major branch.</li>
<li>There might be no future minor branch when the expected future release would
be a major release or there are no changes accepted for a future minor
release yet.</li>
<li>All changes specifically targetting this branch instead of the default
development branch must be approved by the OpenSSL Foundation or the
OpenSSL Corporation.</li>
</ul>
<h2 id="branch-and-tag-naming">Branch and tag naming</h2>
<p>The branch where the development of the next release is happening is called
<code>openssl-x.y</code> where <code>x</code> is the current major version number and <code>y</code> is the
version number of the release being developed. This is the default branch
of the repository.</p>Changelog
https://openssl-library.org/news/changelog/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/changelog/<p>When a release is created, that branch is forked off, and its changelog
is also forked. For example, none of the changes after 0.9.8n appear in
the other logs, because 1.0.0 was created after that release and before
0.9.8o. Any changes that are merged across branches, however, should
have an entry in each branch’s changelog.</p>
<p>This is the changelog for the master branch, the one that is currently
in active development. The markdown version of this document is available
here: <a href="https://github.com/openssl/openssl/blob/master/CHANGES.md">CHANGES.md</a></p>Code of Conduct
https://openssl-library.org/community/conduct/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/conduct/<p>The OpenSSL community consists primarily, although not solely, of its online
presence in mailing lists and activities such as the blog postings and
comments, the GitHub repository, and so on. These outlets are managed by the
the <a href="https://openssl.foundation/">Foundation</a> and
the <a href="https://openssl-corporation.org/">Corporation</a>.</p>
<p>We strive to be an open and inclusive community where anyone can contribute.
Contributions should be judged on their own merits; we don’t care about your
gender identity, race, political beliefs, age, or similar attributes.</p>Community
https://openssl-library.org/community/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/<p>OpenSSL library source is maintained by a <a href="https://openssl-library.org/about/committers">team of committers</a>.
We operate under a set of <a href="https://openssl-library.org/about/bylaws">project bylaws</a> and
ask everyone to follow our <a href="https://openssl-library.org/community/conduct">code of conduct</a>.</p>
<p>There are many ways you can join the community and contribute.
The “<a href="https://openssl-library.org/community/getting-started">getting started</a>” page has some ideas.
We maintain several <a href="https://openssl-library.org/community/mailinglists">mailing lists</a>.
Anyone can join, but you must be a member of a list to post to it.
We have a <a href="https://github.com/openssl/openssl/wiki">public wiki</a> that anyone with a GitHub account can edit.
We have a <a href="https://openssl-library.org/blog/">team blog</a>, where members of the development team
will occasionally post.</p>Community Support
https://openssl-library.org/community/support/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/support/<p>For community based support you can use the <a href="https://mta.openssl.org/mailman/listinfo/openssl-users">openssl-users</a>
mailing list or <a href="https://github.com/openssl/openssl/discussions">github discussion pages</a>.</p>
<p>You can also purchase <a href="https://openssl-corporation.org/solutions/support">commercial support contacts</a>.</p>Contact Information
https://openssl-library.org/community/contacts/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/contacts/<p>The <em>OpenSSL Software Foundation</em> (OSF) represents the OpenSSL project in
most legal capacities including contributor license agreements, managing
donations, and so on. It is a Delaware (US) non-profit corporation with its
own <a href="https://openssl-library.org/policies/osf-bylaws.pdf">bylaws</a>.</p>
<p><em>OpenSSL Software Services</em> (OSS) also represents the OpenSSL project, for
<a href="https://openssl-library.org/support/contracts.html">Support Contracts</a>, and as the Vendor of Record
for NIST Cryptographic Module
<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/1747">#1747</a>
(This is an open-source validation of <a href="https://openssl-library.org/docs/fips.html">FIPS-140</a> based on
OpenSSL). It is a Delaware (US) corporation with its own
<a href="https://openssl-library.org/policies/oss-bylaws.pdf">bylaws</a>.</p>Contact us
https://openssl-library.org/about/contact/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/about/contact/<br>
<ul>
<li>
<p><strong><a href="https://openssl.foundation/">OpenSSL Software Foundation Inc</a></strong><br>
Web: <a href="https://openssl.foundation">https://openssl.foundation</a><br>
Email: <a href="mailto:[email protected]">[email protected]</a></p>
</li>
<li>
<p><strong><a href="https://openssl-corporation.org/contacts/index.html">OpenSSL Software Services Inc</a></strong><br>
Web: <a href="https://openssl-corporation.org">https://openssl-corporation.org</a><br>
Email: <a href="mailto:[email protected]">[email protected]</a></p>
</li>
</ul>
<p>Feel free to reach out to us with your questions or for more information. We look forward to assisting you!</p>Contributor Agreements
https://openssl-library.org/policies/cla/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/cla/<p>Every non-trivial contribution needs to be covered by a signed
Contributor License Agreement (CLA) from all original authors. We have
modelled our policy based on the practice of <a href="https://www.apache.org">the Apache Software
Foundation</a>. You can see their CLA policy
<a href="https://www.apache.org/licenses/#clas">here</a>. Our policy is:</p>
<p>OpenSSL requires that all non-trivial contributors of ideas, code, or
documentation complete, sign, and submit (via email, or postal mail)
an <a href="openssl_icla.pdf">Individual Contributor License Agreement (ICLA)</a>.
The purpose of this agreement is to clearly define the terms under which
intellectual property has been contributed to OpenSSL and thereby allow
us to defend the project should there be a legal dispute regarding the
software at some future time.</p>Current platforms
https://openssl-library.org/policies/general-supplemental/platforms/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general-supplemental/platforms/<h2 id="current-primary-platforms">Current primary platforms</h2>
<table>
<thead>
<tr>
<th>Target</th>
<th> </th>
<th>O/S</th>
<th> </th>
<th>Architecture</th>
<th> </th>
<th>Toolchain</th>
</tr>
</thead>
<tbody>
<tr>
<td>linux-x86_64</td>
<td></td>
<td>Ubuntu Server 20.04</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>gcc 9</td>
</tr>
<tr>
<td>linux-generic64</td>
<td></td>
<td>Ubuntu Server 20.04</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>gcc 9</td>
</tr>
<tr>
<td>linux-x86</td>
<td></td>
<td>Debian 11</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc 10</td>
</tr>
<tr>
<td>linux-generic32</td>
<td></td>
<td>Debian 11</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc 10</td>
</tr>
<tr>
<td>BSD-x86_64</td>
<td></td>
<td>FreeBSD 13.0</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Clang 11</td>
</tr>
<tr>
<td>VC-WIN64A</td>
<td></td>
<td>Windows 10</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Visual Studio 2019 Community Edition</td>
</tr>
<tr>
<td>VC-WIN32</td>
<td></td>
<td>Windows 10</td>
<td></td>
<td>x86</td>
<td></td>
<td>Visual Studio 2019 Community Edition</td>
</tr>
<tr>
<td>mingw64</td>
<td></td>
<td>Windows 10</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>MinGW (64 bit) and MSYS2</td>
</tr>
<tr>
<td>darwin64-x86_64</td>
<td></td>
<td>Mac OS Big Sur (11)</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Apple clang 13</td>
</tr>
<tr>
<td>darwin64-arm64</td>
<td></td>
<td>Mac OS Big Sur (11)</td>
<td></td>
<td>AArch64 (M1)</td>
<td></td>
<td>Apple clang 12</td>
</tr>
</tbody>
</table>
<h2 id="current-secondary-platforms">Current secondary platforms</h2>
<table>
<thead>
<tr>
<th>Target</th>
<th> </th>
<th>O/S</th>
<th> </th>
<th>Architecture</th>
<th> </th>
<th>Toolchain</th>
<th> </th>
<th>Nominated Committer(s)</th>
<th> </th>
<th>Nominated Community Maintainer(s)</th>
</tr>
</thead>
<tbody>
<tr>
<td>linux-aarch64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>AArch64</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@tom-cosgrove-arm</td>
<td></td>
<td>@zorrorffm @xkqian</td>
</tr>
</tbody>
</table>
<h2 id="current-community-platforms">Current community platforms</h2>
<table>
<thead>
<tr>
<th>Target</th>
<th> </th>
<th>O/S</th>
<th> </th>
<th>Architecture</th>
<th> </th>
<th>Toolchain</th>
<th> </th>
<th>Nominated Community Member(s)</th>
</tr>
</thead>
<tbody>
<tr>
<td>nonstop-nsx</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 ilp32</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nsx_put</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 ilp32 PUT</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nsx_64</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 lp64</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nsx_64_put</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 lp64 PUT</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nsx_spt</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 ilp32 SPT</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nsx_spt_floss</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 ilp32 SPT FLOSS</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nsv</td>
<td></td>
<td>NonStop OSS L21.06</td>
<td></td>
<td>x86_64 ilp32</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nse</td>
<td></td>
<td>NonStop OSS J06.22</td>
<td></td>
<td>ia64 ilp32</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nse_put</td>
<td></td>
<td>NonStop OSS J06.22</td>
<td></td>
<td>ia64 ilp32 PUT</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nse_64</td>
<td></td>
<td>NonStop OSS J06.22</td>
<td></td>
<td>ia64 lp64</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nse_64_put</td>
<td></td>
<td>NonStop OSS J06.22</td>
<td></td>
<td>ia64 lp64 PUT</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nse_spt</td>
<td></td>
<td>NonStop OSS J06.22</td>
<td></td>
<td>ia64 ipl32 SPT</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>nonstop-nse_spt_floss</td>
<td></td>
<td>NonStop OSS J06.22</td>
<td></td>
<td>ia64 ipl32 SPT FLOSS</td>
<td></td>
<td>c99</td>
<td></td>
<td>@rsbeckerca</td>
</tr>
<tr>
<td>linux64-loongarch64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>loongarch64</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@shipujin</td>
</tr>
<tr>
<td>BSD-armv4</td>
<td></td>
<td>FreeBSD</td>
<td></td>
<td>armv4</td>
<td></td>
<td>LLVM</td>
<td></td>
<td>@pkubaj</td>
</tr>
<tr>
<td>BSD-ppc</td>
<td></td>
<td>FreeBSD</td>
<td></td>
<td>ppc</td>
<td></td>
<td>LLVM</td>
<td></td>
<td>@pkubaj</td>
</tr>
<tr>
<td>BSD-ppc64</td>
<td></td>
<td>FreeBSD</td>
<td></td>
<td>ppc64</td>
<td></td>
<td>LLVM</td>
<td></td>
<td>@pkubaj</td>
</tr>
<tr>
<td>BSD-ppc64le</td>
<td></td>
<td>FreeBSD</td>
<td></td>
<td>ppc64le</td>
<td></td>
<td>LLVM</td>
<td></td>
<td>@pkubaj</td>
</tr>
<tr>
<td>BSD-riscv64</td>
<td></td>
<td>FreeBSD</td>
<td></td>
<td>riscv64</td>
<td></td>
<td>LLVM</td>
<td></td>
<td>@pkubaj</td>
</tr>
<tr>
<td>solaris64-x86_64-gcc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@tio-checo @darrenmoffat</td>
</tr>
<tr>
<td>solaris64-x86_64-cc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Sun C</td>
<td></td>
<td>@tio-checo @darrenmoffat</td>
</tr>
<tr>
<td>solaris64-sparcv9-gcc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V9 64 bit</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@tio-checo @darrenmoffat</td>
</tr>
<tr>
<td>solaris64-sparcv9-cc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V9 64 bit</td>
<td></td>
<td>Sun C</td>
<td></td>
<td>@tio-checo @darrenmoffat</td>
</tr>
<tr>
<td>linux64-s390x</td>
<td></td>
<td>Linux</td>
<td></td>
<td>s390x</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@holger-dengler @ifranzki</td>
</tr>
<tr>
<td>hurd-x86</td>
<td></td>
<td>Hurd</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@sthibaul</td>
</tr>
<tr>
<td>hurd-x86_64</td>
<td></td>
<td>Hurd</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@sthibaul</td>
</tr>
<tr>
<td>ios-xcrun</td>
<td></td>
<td>iOS</td>
<td></td>
<td>armv7</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>ios64-xcrun</td>
<td></td>
<td>iOS</td>
<td></td>
<td>aarch64</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>iossimulator-xcrun</td>
<td></td>
<td>iOS Simulator</td>
<td></td>
<td>x86_64 or aarch64</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>iossimulator-arm64-xcrun</td>
<td></td>
<td>iOS Simulator</td>
<td></td>
<td>aarch64</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>iphoneos-cross</td>
<td></td>
<td>iOS</td>
<td></td>
<td>?</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>ios-cross</td>
<td></td>
<td>iOS</td>
<td></td>
<td>armv7</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>ios64-cross</td>
<td></td>
<td>iOS</td>
<td></td>
<td>aarch64</td>
<td></td>
<td>Apple clang 12</td>
<td></td>
<td>@fwh-dc</td>
</tr>
<tr>
<td>linux-ppc64le</td>
<td></td>
<td>Linux</td>
<td></td>
<td>ppc64 little endian</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@dannytsen @erichte-ibm @naynajain</td>
</tr>
<tr>
<td>linux64-riscv64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>riscv64</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@ZenithalHourlyRate</td>
</tr>
<tr>
<td>linux32-riscv32</td>
<td></td>
<td>Linux</td>
<td></td>
<td>riscv32</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@ZenithalHourlyRate</td>
</tr>
<tr>
<td>aix-gcc</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc32</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>aix64-gcc</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc64</td>
<td></td>
<td>gcc</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>aix64-gcc-as</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc64</td>
<td></td>
<td>gcc as directive</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>aix-cc</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc32</td>
<td></td>
<td>IBM xlc</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>aix64-cc</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc64</td>
<td></td>
<td>IBM xlc</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>aix-clang</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc32</td>
<td></td>
<td>IBM openxl clang</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>aix64-clang</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc64</td>
<td></td>
<td>IBM openxl clang</td>
<td></td>
<td>@sanumesh</td>
</tr>
<tr>
<td>BC-64</td>
<td></td>
<td>Windows 10/11</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Embarcaderoclang</td>
<td></td>
<td>@GermanAizek</td>
</tr>
</tbody>
</table>
<h2 id="current-unadopted-platforms">Current unadopted platforms</h2>
<table>
<thead>
<tr>
<th>Target</th>
<th> </th>
<th>O/S</th>
<th> </th>
<th>Architecture</th>
<th> </th>
<th>Toolchain</th>
</tr>
</thead>
<tbody>
<tr>
<td>vms-x86_64</td>
<td></td>
<td>OpenVMS 9.2</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>VSI C 7.5</td>
</tr>
<tr>
<td>vms-ia64</td>
<td></td>
<td>OpenVMS 8.4</td>
<td></td>
<td>ia64</td>
<td></td>
<td>VSI C 7.4</td>
</tr>
<tr>
<td>vms-ia64-p32</td>
<td></td>
<td>OpenVMS 8.4</td>
<td></td>
<td>ia64</td>
<td></td>
<td>VSI C 7.4 <sup id="fnref:1"><a href="#fn:1" class="footnote-ref" role="doc-noteref">1</a></sup></td>
</tr>
<tr>
<td>vms-ia64-p64</td>
<td></td>
<td>OpenVMS 8.4</td>
<td></td>
<td>ia64</td>
<td></td>
<td>VSI C 7.4 <sup id="fnref:2"><a href="#fn:2" class="footnote-ref" role="doc-noteref">2</a></sup></td>
</tr>
<tr>
<td>vms-alpha</td>
<td></td>
<td>OpenVMS 8.4</td>
<td></td>
<td>alpha</td>
<td></td>
<td>VSI C 7.4</td>
</tr>
<tr>
<td>vms-alpha-p32</td>
<td></td>
<td>OpenVMS 8.4</td>
<td></td>
<td>alpha</td>
<td></td>
<td>VSI C 7.4 <sup id="fnref1:1"><a href="#fn:1" class="footnote-ref" role="doc-noteref">1</a></sup></td>
</tr>
<tr>
<td>vms-alpha-p64</td>
<td></td>
<td>OpenVMS 8.4</td>
<td></td>
<td>alpha</td>
<td></td>
<td>VSI C 7.4 <sup id="fnref1:2"><a href="#fn:2" class="footnote-ref" role="doc-noteref">2</a></sup></td>
</tr>
<tr>
<td>vos-gcc</td>
<td></td>
<td>VOS</td>
<td></td>
<td>??</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>solaris-x86-gcc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>solaris-sparcv7-gcc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V7</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>solaris-sparcv8-gcc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V8</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>solaris-sparcv9-gcc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V9 32 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>solaris-sparcv7-cc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V7</td>
<td></td>
<td>Sun C</td>
</tr>
<tr>
<td>solaris-sparcv8-cc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V8</td>
<td></td>
<td>Sun C</td>
</tr>
<tr>
<td>solaris-sparcv9-cc</td>
<td></td>
<td>Solaris</td>
<td></td>
<td>Sparc V9 32 bit</td>
<td></td>
<td>Sun C</td>
</tr>
<tr>
<td>irix-mips3-gcc</td>
<td></td>
<td>Irix 6.x</td>
<td></td>
<td>mips64 n32</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>irix-mips3-cc</td>
<td></td>
<td>Irix 6.x</td>
<td></td>
<td>mips64 n32</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>irix64-mips4-gcc</td>
<td></td>
<td>Irix 6.x</td>
<td></td>
<td>mips64 n64</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>irix64-mips4-cc</td>
<td></td>
<td>Irix 6.x</td>
<td></td>
<td>mips64 n64</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>hpux-parisc-gcc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>parisc</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>hpux-parisc1_1-gcc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>parisc 1.1 32 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>hpux64-parisc2-gcc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>parisc 2.0 64 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>hpux-parisc-cc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>parisc</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>hpux-parisc1_1-cc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>parisc 1.0 32 bit</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>hpux64-parisc2-cc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>parisc 2.0 64 bit</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>hpux-ia64-cc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>IA64 32 bit</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>hpux64-ia64-cc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>IA64 64 bit</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>hpux-ia64-gcc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>IA64 32 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>hpux64-ia64-gcc</td>
<td></td>
<td>HP-UX</td>
<td></td>
<td>IA64 64 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>MPE/iX-gcc</td>
<td></td>
<td>MPE/iX</td>
<td></td>
<td>parisc?</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>tru64-alpha-gcc</td>
<td></td>
<td>Tru64</td>
<td></td>
<td>alpha</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>tru64-alpha-cc</td>
<td></td>
<td>Tru64</td>
<td></td>
<td>alpha</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>linux-ppc</td>
<td></td>
<td>Linux</td>
<td></td>
<td>ppc32</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-ppc64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>ppc64 big endian</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-armv4</td>
<td></td>
<td>Linux</td>
<td></td>
<td>armv4</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-arm64ilp32</td>
<td></td>
<td>Linux</td>
<td></td>
<td>aarch64-ilp32</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-mips32</td>
<td></td>
<td>Linux</td>
<td></td>
<td>mips32 o32</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-mips64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>mips64 n32</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux64-mips64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>mips64 64 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-x86-clang</td>
<td></td>
<td>Linux</td>
<td></td>
<td>x86</td>
<td></td>
<td>clang</td>
</tr>
<tr>
<td>linux-x86_64-clang</td>
<td></td>
<td>Linux</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>clang</td>
</tr>
<tr>
<td>linux-x32</td>
<td></td>
<td>Linux</td>
<td></td>
<td>x86_64 x32</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-ia64</td>
<td></td>
<td>Linux</td>
<td></td>
<td>ia64</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux32-s390x</td>
<td></td>
<td>Linux</td>
<td></td>
<td>s390x 31 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-sparcv8</td>
<td></td>
<td>Linux</td>
<td></td>
<td>sparc v8</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-sparcv9</td>
<td></td>
<td>Linux</td>
<td></td>
<td>sparc v9 32 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux64-sparcv9</td>
<td></td>
<td>Linux</td>
<td></td>
<td>sparc v9 64 bit</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-alpha-gcc</td>
<td></td>
<td>Linux</td>
<td></td>
<td>alpha</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-c64xplus</td>
<td></td>
<td>Linux</td>
<td></td>
<td>c64xplus</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>linux-c64xplus</td>
<td></td>
<td>Linux</td>
<td></td>
<td>c64xplus</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>BSD-x86</td>
<td></td>
<td>FreeBSD / OpenBSD / NetBSD / ?</td>
<td></td>
<td>x86 a.out</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>BSD-x86-elf</td>
<td></td>
<td>FreeBSD / OpenBSD / NetBSD / ?</td>
<td></td>
<td>x86 elf</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>BSD-sparcv8</td>
<td></td>
<td>?</td>
<td></td>
<td>Sparc v8</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>BSD-sparcv9</td>
<td></td>
<td>?</td>
<td></td>
<td>Sparc v9 32 bit</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>BSD-ia64</td>
<td></td>
<td>?</td>
<td></td>
<td>IA64</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>BSD-x86_64</td>
<td></td>
<td>OpenBSD / NetBSD / ?</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>bsdi-elf-gcc</td>
<td></td>
<td>BSDi</td>
<td></td>
<td>??</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>unixware-2.0</td>
<td></td>
<td>unixware 2.0</td>
<td></td>
<td>??</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>unixware-2.1</td>
<td></td>
<td>unixware 2.1</td>
<td></td>
<td>??</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>unixware-7</td>
<td></td>
<td>unixware 7</td>
<td></td>
<td>x86</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>unixware-7-gcc</td>
<td></td>
<td>unixware 7</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>sco5-cc</td>
<td></td>
<td>Open Server 5?</td>
<td></td>
<td>x86</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>sco5-gcc</td>
<td></td>
<td>Open Server 5?</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>BS2000-OSD</td>
<td></td>
<td>BS2000/OSD</td>
<td></td>
<td>??</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>VC-WIN64I</td>
<td></td>
<td>Windows XP / Windows Server 2008?</td>
<td></td>
<td>ia64</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-CE</td>
<td></td>
<td>Windows CE</td>
<td></td>
<td>x86 / armv4?</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-WIN64A-masm</td>
<td></td>
<td>Windows 10</td>
<td></td>
<td>x86</td>
<td></td>
<td>Visual C with masm</td>
</tr>
<tr>
<td>mingw</td>
<td></td>
<td>Windows 10?</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>UEFI-x86</td>
<td></td>
<td>UEFI</td>
<td></td>
<td>x86</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>UEFI-x86_64</td>
<td></td>
<td>UEFI</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>??</td>
</tr>
<tr>
<td>UWIN</td>
<td></td>
<td>UWIN</td>
<td></td>
<td>x86</td>
<td></td>
<td></td>
</tr>
<tr>
<td>Cygwin-x86</td>
<td></td>
<td>Windows 10</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>Cygwin-x86_64</td>
<td></td>
<td>Windows 10</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>darwin-ppc</td>
<td></td>
<td>MacOS?</td>
<td></td>
<td>ppc32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>darwin64-ppc</td>
<td></td>
<td>MacOS?</td>
<td></td>
<td>ppc64</td>
<td></td>
<td></td>
</tr>
<tr>
<td>darwin-i386</td>
<td></td>
<td>MacOS?</td>
<td></td>
<td>x86</td>
<td></td>
<td></td>
</tr>
<tr>
<td>darwin-i386</td>
<td></td>
<td>MacOS?</td>
<td></td>
<td>x86</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-ppc60x</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>ppc32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-ppcgen</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>ppc32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-ppc405</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>ppc32 405</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-ppc750</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>ppc32 750</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-ppc860</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>ppc32 860</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-simlinux</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>x86?</td>
<td></td>
<td></td>
</tr>
<tr>
<td>vxworks-mips</td>
<td></td>
<td>vxworks</td>
<td></td>
<td>mips32 o32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>uClinux-dist</td>
<td></td>
<td>uClinux</td>
<td></td>
<td>?</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>uClinux-dist64</td>
<td></td>
<td>uClinux</td>
<td></td>
<td>?</td>
<td></td>
<td>gcc</td>
</tr>
<tr>
<td>android-arm</td>
<td></td>
<td>android</td>
<td></td>
<td>armv4</td>
<td></td>
<td></td>
</tr>
<tr>
<td>android-arm64</td>
<td></td>
<td>android</td>
<td></td>
<td>aarch64</td>
<td></td>
<td></td>
</tr>
<tr>
<td>android-mips</td>
<td></td>
<td>android</td>
<td></td>
<td>mips32 o32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>android-mips64</td>
<td></td>
<td>android</td>
<td></td>
<td>mips64</td>
<td></td>
<td></td>
</tr>
<tr>
<td>android-x86</td>
<td></td>
<td>android</td>
<td></td>
<td>x86</td>
<td></td>
<td></td>
</tr>
<tr>
<td>android-x86_64</td>
<td></td>
<td>android</td>
<td></td>
<td>x86_64</td>
<td></td>
<td></td>
</tr>
<tr>
<td>BC-32</td>
<td></td>
<td>Windows 10?</td>
<td></td>
<td>x86</td>
<td></td>
<td>Borland C, C++ Builder?</td>
</tr>
<tr>
<td>DJGPP</td>
<td></td>
<td>DOS?</td>
<td></td>
<td>x86?</td>
<td></td>
<td>djgpp</td>
</tr>
<tr>
<td>haiku-x86</td>
<td></td>
<td>Haiku</td>
<td></td>
<td>x86</td>
<td></td>
<td>gcc?</td>
</tr>
<tr>
<td>haiku-x86_64</td>
<td></td>
<td>Haiku</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>gcc?</td>
</tr>
<tr>
<td>nonstop-nsx_g</td>
<td></td>
<td>NonStop Guardian</td>
<td></td>
<td>x86_64 ilp32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>nonstop-nsx_g_tandem</td>
<td></td>
<td>NonStop Guardian</td>
<td></td>
<td>x86_64 ilp32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>nonstop-nse_g</td>
<td></td>
<td>NonStop Guardian</td>
<td></td>
<td>ia64 ipl32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>nonstop-nse_g_tandem</td>
<td></td>
<td>NonStop Guardian</td>
<td></td>
<td>ia64 ipl32</td>
<td></td>
<td></td>
</tr>
<tr>
<td>OS390-Unix</td>
<td></td>
<td>zOS</td>
<td></td>
<td>s390</td>
<td></td>
<td></td>
</tr>
<tr>
<td>VC-WIN32-ONECORE</td>
<td></td>
<td>Windows OneCore</td>
<td></td>
<td>x86</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-WIN64A-ONECORE</td>
<td></td>
<td>Windows OneCore</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-WIN32-ARM</td>
<td></td>
<td>Windows OneCore</td>
<td></td>
<td>arm</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-WIN64-ARM</td>
<td></td>
<td>Windows OneCore</td>
<td></td>
<td>aarch64</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-WIN32-UWP</td>
<td></td>
<td>Windows UWP</td>
<td></td>
<td>x86</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-WIN64A-UWP</td>
<td></td>
<td>Windows UWP</td>
<td></td>
<td>x86_64</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-ARM-UWP</td>
<td></td>
<td>Windows UWP</td>
<td></td>
<td>arm</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>VC-ARM64-UWP</td>
<td></td>
<td>Windows UWP</td>
<td></td>
<td>aarch64</td>
<td></td>
<td>Visual C</td>
</tr>
<tr>
<td>aix-cc-solib</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc32</td>
<td></td>
<td>IBM xlc</td>
</tr>
<tr>
<td>aix64-cc-solib</td>
<td></td>
<td>AIX</td>
<td></td>
<td>ppc64</td>
<td></td>
<td>IBM xlc</td>
</tr>
</tbody>
</table>
<div class="footnotes" role="doc-endnotes">
<hr>
<ol>
<li id="fn:1">
<p>[VMS] 32 bit pointer build <a href="#fnref:1" class="footnote-backref" role="doc-backlink">↩︎</a> <a href="#fnref1:1" class="footnote-backref" role="doc-backlink">↩︎</a></p>CVEs and the FIPS provider
https://openssl-library.org/news/fips-cve/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/fips-cve/<p>After the release of OpenSSL 3.0.0, several CVEs have been identified
and resolved. While the majority of these vulnerabilities are unrelated
to the validated FIPS providers, a few of them are applicable. This table
lists all of the CVEs issued since the FIPS providers’ releases and their
relevance to it:</p>
<table class="[&>tbody>tr>td:first-child]:whitespace-nowrap">
<thead>
<tr>
<th>CVE ID</th>
<th>Fixed</th>
<th>FIPS?</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-13176">CVE-2024-13176</a></td>
<td>3.0.16<br>3.1.8<br>3.2.4<br>3.3.3<br>3.4.1</td>
<td><strong>yes</strong></td>
<td>Timing side channel in ECDSA signature computations. <br><strong>Workaround:</strong> Avoid using the module for ECDSA <br>signatures where an attacker can be running <br>in the same datacenter.</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-12797">CVE-2024-12797</a></td>
<td>3.0.16<br>3.1.8<br>3.2.4<br>3.3.3<br>3.4.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-9143">CVE-2024-9143</a></td>
<td>3.0.16<br>3.1.8<br>3.2.4<br>3.3.3<br>3.4.0</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-6119">CVE-2024-6119</a></td>
<td>3.0.15<br>3.1.7<br>3.2.3<br>3.3.2</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-5535">CVE-2024-5535</a></td>
<td>3.0.15<br>3.1.7<br>3.2.3<br>3.3.2</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-4741">CVE-2024-4741</a></td>
<td>3.0.14<br>3.1.6<br>3.2.2<br>3.3.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-4603">CVE-2024-4603</a></td>
<td>3.0.14<br>3.1.6<br>3.2.2<br>3.3.1</td>
<td><strong>yes</strong></td>
<td>EVP_PKEY_public_check() can take a long time. <br><strong>Workaround:</strong> First check the value returned by <br>EVP_PKEY_get_bits() and reject too large keys.</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-2511">CVE-2024-2511</a></td>
<td>3.0.14<br>3.1.6<br>3.2.2</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-0727">CVE-2024-0727</a></td>
<td>3.0.13<br>3.1.5<br>3.2.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-6237">CVE-2023-6237</a></td>
<td>3.0.13<br>3.1.5<br>3.2.1</td>
<td><strong>yes</strong></td>
<td>EVP_PKEY_public_check() can take a long time. <br><strong>Workaround:</strong> First check the value returned by <br>EVP_PKEY_get_bits() and reject too large keys.</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-6129">CVE-2023-6129</a></td>
<td>3.0.13<br>3.1.5<br>3.2.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-5678">CVE-2023-5678</a></td>
<td>3.0.13<br>3.1.5</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-5363">CVE-2023-5363</a></td>
<td>3.0.12<br>3.1.4</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-4807">CVE-2023-4807</a></td>
<td>3.0.11<br>3.1.3</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td></td>
<td></td>
<td></td>
<td><strong>Release of 3.1.2 FIPS provider</strong></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-3817">CVE-2023-3817</a></td>
<td>3.0.10<br>3.1.2</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-3446">CVE-2023-3446</a></td>
<td>3.0.10<br>3.1.2</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-2975">CVE-2023-2975</a></td>
<td>3.0.10<br>3.1.2</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td></td>
<td></td>
<td></td>
<td><strong>Release of 3.0.9 FIPS provider</strong></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-2650">CVE-2023-2650</a></td>
<td>3.0.9<br>3.1.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-1255">CVE-2023-1255</a></td>
<td>3.0.9<br>3.1.1</td>
<td><strong>yes</strong></td>
<td>Possible denial of service on Arm 64 (aarch64) using AES XTS mode</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0466">CVE-2023-0466</a></td>
<td>3.0.9<br>3.1.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0465">CVE-2023-0465</a></td>
<td>3.0.9<br>3.1.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0464">CVE-2023-0464</a></td>
<td>3.0.9<br>3.1.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td></td>
<td></td>
<td></td>
<td><strong>Release of 3.0.8 FIPS provider</strong></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0401">CVE-2023-0401</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0286">CVE-2023-0286</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0217">CVE-2023-0217</a></td>
<td>3.0.8</td>
<td><strong>yes</strong></td>
<td>DSA public key checks (but not from TLS)</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0216">CVE-2023-0216</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0215">CVE-2023-0215</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4450">CVE-2022-4450</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4304">CVE-2022-4304</a></td>
<td>3.0.8</td>
<td><strong>yes</strong></td>
<td>Timing side channel in RSA</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4203">CVE-2022-4203</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3996">CVE-2022-3996</a></td>
<td>3.0.8</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3786">CVE-2022-3786</a></td>
<td>3.0.7</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3602">CVE-2022-3602</a></td>
<td>3.0.7</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3358">CVE-2022-3358</a></td>
<td>3.0.6</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2274">CVE-2022-2274</a></td>
<td>3.0.5</td>
<td>no</td>
<td>Bug introduced in 3.0.4 which isn’t validated</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2097">CVE-2022-2097</a></td>
<td>3.0.5</td>
<td>no</td>
<td>Architecture (x86) is not part of validation</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2068">CVE-2022-2068</a></td>
<td>3.0.4</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1473">CVE-2022-1473</a></td>
<td>3.0.3</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1434">CVE-2022-1434</a></td>
<td>3.0.3</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1343">CVE-2022-1343</a></td>
<td>3.0.3</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1292">CVE-2022-1292</a></td>
<td>3.0.3</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-0778">CVE-2022-0778</a></td>
<td>3.0.2</td>
<td><em>maybe</em></td>
<td>Difficult to encounter inside FIPS boundary</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-4160">CVE-2021-4160</a></td>
<td>3.0.1</td>
<td>no</td>
<td>Architecture (MIPS) is not part of validation</td>
</tr>
<tr>
<td><a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-4044">CVE-2021-4044</a></td>
<td>3.0.1</td>
<td>no</td>
<td></td>
</tr>
<tr>
<td></td>
<td></td>
<td></td>
<td><strong>Release of 3.0.0 FIPS provider</strong></td>
</tr>
</tbody>
</table>Design Process Policy
https://openssl-library.org/policies/technical/design-process/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/design-process/<h2 id="objectives">Objectives</h2>
<p>The objective of the design process is to increase the quality of the software
engineering process. The production of design documents confers the following
benefits:</p>
<ul>
<li>
<p>Prior to implementation, the present understanding of the problem domain is
documented in a readily accessible fashion. The understanding of other
OpenSSL contributors is enhanced, as is their ability to identify any
potential issues in the design, or to make related code contributions.</p>
</li>
<li>
<p>After implementation, the design document serves as documentation of
the architectural and design decisions and rationale which served as the
basis for the implementation of the relevant functionality. This is
beneficial both to contributors who wish to understand the relevant code,
or evolve the implementation, but also to contributors who wish to implement
related functionality or understand non-obvious rationales behind given
design decisions.</p>Distributions
https://openssl-library.org/community/distributions/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/distributions/<p>The OpenSSL project does not endorse or recommend any specific
binary distribution, third party engine, or third party provider.</p>
<p>An informal list of third party distributions can be found on the
<a href="https://github.com/openssl/openssl/wiki/Binaries">wiki</a>.</p>FAQ
https://openssl-library.org/faq/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/faq/<p><strong>Who controls the OpenSSL Library?</strong></p>
<p>The <a href="https://openssl.foundation/">Foundation</a>
primarily focuses on non-commercial communities and
the <a href="https://openssl-corporation.org/">Corporation</a>
primarily focuses on commercial communities.
Decisions about the OpenSSL Library are made on a co-equal
basis where the <a href="https://openssl.foundation/">Foundation</a>
and the <a href="https://openssl-corporation.org/">Corporation</a> can operate
independently and make decisions autonomously</p>
<p><strong>Who controls the OpenSSL Mission?</strong></p>
<p>The <a href="https://openssl.foundation/">Foundation</a>
and the <a href="https://openssl-corporation.org/">Corporation</a>
both operate under the OpenSSL Mission and are responsible
for any updates or changes to the Mission.</p>
<p><strong>The library is huge, and it is a struggle to know where to start. What introductory materials do you have?</strong></p>Feature Branch Approval Policy
https://openssl-library.org/policies/general/feature-branch-approval-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/feature-branch-approval-policy/<p>The <a href="https://openssl-library.org/policies/general/release-policy/">Time-based Release Policy</a> defines a regular twice-a-year schedule for new
OpenSSL versions. In the case of large features that cannot reasonably be
implemented and reviewed within a single PR there is a risk that only an
incomplete or incorrect implementation of the feature will be merged to the
master branch by the time a feature freeze occurs for the next release.</p>
<p>To avoid this problem feature branches can be used. A feature branch is simply
a branch in the main git repository that can be used as a target branch for
PRs related to a single new feature.</p>Getting Started as a Contributor
https://openssl-library.org/community/getting-started/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/getting-started/<p>We’re always looking for people who want to help out. Here are some
tips to getting started. First, get familiar with the information on
this page, and the links to the side. In particular, you should look at
the <a href="https://github.com/openssl/openssl/discussions">discussion pages</a>.
There are also <a href="https://openssl-library.org/community/mailinglists">Mailing Lists</a> you can join.</p>
<p>Here are some ideas:</p>
<ul>
<li><em>Review and comment on the pull requests on GitHub.</em><br>
You can find <a href="https://github.com/openssl/openssl/pulls">pull requests</a> -- patches that people have suggested
-- at <a href="https://github.com/openssl/openssl/pulls">https://github.com/openssl/openssl/pulls</a>. Reviewing and
commenting on these is helpful and can be a good way to learn your way
around the code.</li>
<li><em>Look through the OpenSSL issues on GitHub.</em><br>
You can find <a href="https://github.com/openssl/openssl/issues">issues</a> that people have opened at
<a href="https://github.com/openssl/openssl/issues">https://github.com/openssl/openssl/issues</a>. Sometimes there are
open tickets that can be related, it would be good to
cross-reference them (so somebody working on one, sees the other).
Commentary on the issues is also good. Even just commenting that you
think an issue is important is very useful!</li>
<li><em>Help update the documentation.</em><br>
The documentation has gotten better, but there are still many API's
that are not documented. Write a POD page, or report bugs in
existing pages. It’s probably better to do a whole bunch of minor
edits in one submission.</li>
<li><em>Write some test cases.</em><br>
Simple stand-alone test programs that exercise various APIs are
very useful, and can usually be added to our perl-based test
framework pretty easily. Tests of the command-line program are also
important, and can be handled by the same framework but might
require a bit more digging. We welcome all new test efforts!</li>
<li><em>Follow Contributing Steps.</em><br>
See the details in <a href="https://github.com/openssl/openssl/blob/master/CONTRIBUTING.md">CONTRIBUTING.md</a>
and then contribute a change to the documentation or software, by
opening a <a href="https://github.com/openssl/openssl/pulls">pull request</a>.</li>
</ul>Git Repository
https://openssl-library.org/source/gitrepo/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/gitrepo/<p>The OpenSSL software is developed using a Git repository. Access
to the origin repository is private and all users other than
<a href="https://openssl-library.org/about/committers">committers</a> access the repository via our downstream clone
on GitHub, at <a href="https://github.com/openssl/openssl">https://github.com/openssl/openssl</a> on
GitHub. This repository is updated with every commit and is accessible
through multiple protocols.</p>
<p>Use the following command to clone the git repository including all available
branches and tags:</p>
<div class="highlight"><pre tabindex="0" style="color:#586e75;background-color:#eee8d5;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-console" data-lang="console"><span style="display:flex;"><span><span style="color:#d33682">$</span> git clone https://github.com/openssl/openssl.git
</span></span><span style="display:flex;"><span><span style="color:#d33682">OR
</span></span></span><span style="display:flex;"><span><span style="color:#d33682"></span><span style="color:#d33682">$</span> git clone [email protected]:openssl/openssl.git
</span></span></code></pre></div><p>Access to specific branches is possible via the standard branch and
checkout commands. See the discussion of branch naming below for more
information.</p>Glossary of OpenSSL terms
https://openssl-library.org/policies/general/glossary/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/glossary/<p>This is a <em>glossary of terms</em>, it does not include any <em>formal definitions</em> of
the included terms. It does, however, link to the <em>formal definition</em> where
appropriate. In the event in a conflict between this glossary and the
<em>formal definition</em>, the <em>formal definition</em> is <strong>always</strong> canonical.</p>
<h2 id="abi">ABI</h2>
<p><em>Application binary interface</em></p>
<p>An ABI compatible release allows a shared library to be replaced with a
new version or for applications to be relinked against the new library
with the expectation that everything will run.</p>Legal Disclaimer
https://openssl-library.org/about/legal/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/about/legal/<p>Export/import and/or use of cryptography software, cryptographic hooks, or
technical details about cryptography may be restricted in some parts of the world.
<br/>
It is <strong>your</strong> responsibility to determine the legal
status of <em>your</em> usage or participation.</p>License
https://openssl-library.org/source/license/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/license/<p>OpenSSL is covered by one of two licenses, depending on which release is
involved. In all cases, there is a file named <code>LICENSE</code> in the top-level
of the release. Copies can also be found here.</p>
<p>For the 3.0 release, and later releases derived from that,
<a href="apache-license-2.0.txt">the Apache License v2</a> applies. This also
applies to the git “master” branch.</p>
<p>For any release made before OpenSSL 3.0 (namely the 1.1.1, 1.1.0, 1.0.2,
and all prior releases including those not currently supported),
<a href="license-openssl-ssleay.txt">the dual OpenSSL and SSLeay license</a> applies.
Note that this is also true for any updates to those releases – the
“letter suffix” – no matter when they are made. It also applies to
the git branches for all those releases, and to any public forks that
have not rebased to master (or 3.0).</p>List of Committers
https://openssl-library.org/about/committers/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/about/committers/<p>The current list of <a href="https://openssl-library.org/about/bylaws/index.html#committers">committers</a> is listed below. These are the people
who can commit changes to the OpenSSL source tree, with appropriate
code reviews. Their deliberations can be found on <a href="https://openssl-communities.org/hub-committers/">the OpenSSL
Community platform</a>.</p>
<h2 id="committers">Committers</h2>
<table>
<thead>
<tr>
<th>Name</th>
<th>GitHub</th>
</tr>
</thead>
<tbody>
<tr>
<td>Alicja Kario</td>
<td><a href="https://github.com/tomato42">tomato42</a></td>
</tr>
<tr>
<td>Bernd Edlinger</td>
<td><a href="https://github.com/bernd-edlinger">bernd-edlinger</a></td>
</tr>
<tr>
<td>David von Oheimb</td>
<td><a href="https://github.com/DDvO">DDvO</a></td>
</tr>
<tr>
<td>Dmitry Belyavsky</td>
<td><a href="https://github.com/beldmit">beldmit</a></td>
</tr>
<tr>
<td>Eugene Syromiatnikov</td>
<td><a href="https://github.com/esyr">esyr</a></td>
</tr>
<tr>
<td>Frederik Wedel-Heinen</td>
<td><a href="https://github.com/fwh-dc">fwh-dc</a></td>
</tr>
<tr>
<td>Kurt Roeckx</td>
<td><a href="https://github.com/kroeckx">kroeckx</a></td>
</tr>
<tr>
<td>Matt Caswell</td>
<td><a href="https://github.com/mattcaswell">mattcaswell</a></td>
</tr>
<tr>
<td>Neil Horman</td>
<td><a href="https://github.com/nhorman">nhorman</a></td>
</tr>
<tr>
<td>Nikola Pajkovsky</td>
<td><a href="https://github.com/npajkovsky">npajkovsky</a></td>
</tr>
<tr>
<td>Norbert Pocs</td>
<td><a href="https://github.com/jogme">jogme</a></td>
</tr>
<tr>
<td>Paul Dale</td>
<td><a href="https://github.com/paulidale">paulidale</a></td>
</tr>
<tr>
<td>Paul Yang</td>
<td><a href="https://github.com/InfoHunter">InfoHunter</a></td>
</tr>
<tr>
<td>Richard Levitte</td>
<td><a href="https://github.com/levitte">levitte</a></td>
</tr>
<tr>
<td>Sasha Nedvedicky</td>
<td><a href="https://github.com/Sashan">Sashan</a></td>
</tr>
<tr>
<td>Shane Lontis</td>
<td><a href="https://github.com/slontis">slontis</a></td>
</tr>
<tr>
<td>Simo Sorce</td>
<td><a href="https://github.com/simo5">simo5</a></td>
</tr>
<tr>
<td>Tim Hudson</td>
<td><a href="https://github.com/t-j-h">t-j-h</a></td>
</tr>
<tr>
<td>Todd Short</td>
<td><a href="https://github.com/tmshort">tmshort</a></td>
</tr>
<tr>
<td>Tom Cosgrove</td>
<td><a href="https://github.com/tom-cosgrove-arm">tom-cosgrove-arm</a></td>
</tr>
<tr>
<td>Tomas Mraz</td>
<td><a href="https://github.com/t8m">t8m</a></td>
</tr>
<tr>
<td>Viktor Dukhovni</td>
<td><a href="https://github.com/vdukhovni">vdukhovni</a></td>
</tr>
</tbody>
</table>Mailing Lists
https://openssl-library.org/community/mailinglists/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/mailinglists/<p>You’ll need to be a member of the list to post to it. Anything you post to a list,
including the E-mail address you posted from, will be sent to and seen
by all other members of the list. Here are the mailing lists we run:</p>
<table>
<thead>
<tr>
<th>List</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://groups.google.com/a/openssl.org/g/openssl-announce/">openssl-announce</a></td>
<td>Official Project Announcements; low-volume read-only.</td>
</tr>
<tr>
<td><a href="https://groups.google.com/a/openssl.org/g/openssl-project">openssl-project</a></td>
<td>Discussion about the organization and structure of the project itself. Moderated.</td>
</tr>
<tr>
<td><a href="https://groups.google.com/a/openssl.org/g/openssl-commits">openssl-commits</a></td>
<td>Commits to the source repository and build results; read-only.</td>
</tr>
<tr>
<td><a href="https://groups.google.com/a/openssl.org/g/openssl-users">openssl-users</a></td>
<td>Any questions about building, using, etc., OpenSSL itself.</td>
</tr>
</tbody>
</table>
<h2 id="openssl-announce-subscription-form">openssl-announce subscription form</h2>
<iframe style="width: 414px;height: 384px;" src="https://api.transpond.io/form?am=38291&fid=37087&host=true"></iframe>
<h2 id="archives">Archives</h2>
<p>Public archives can be found at the following locations:</p>Management
https://openssl-library.org/about/management/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/about/management/<p>The OpenSSL library project is managed co-equally by the <a href="https://openssl.foundation/">Foundation</a>
and <a href="https://openssl-corporation.org/">Corporation</a> in conjuction with our various committees and communities.</p>
<br>
<ul>
<li>
<p><strong><a href="https://openssl.foundation/">OpenSSL Software Foundation Inc</a></strong><br>
Web: <a href="https://openssl.foundation">https://openssl.foundation</a><br>
Email: <a href="mailto:[email protected]">[email protected]</a></p>
</li>
<li>
<p><strong><a href="https://openssl-corporation.org/contacts/index.html">OpenSSL Software Services Inc</a></strong><br>
Web: <a href="https://openssl-corporation.org">https://openssl-corporation.org</a><br>
Email: <a href="mailto:[email protected]">[email protected]</a></p>
</li>
</ul>
<p>Feel free to reach out to us with your questions or for more information. We look forward to assisting you!</p>Old 0.9.x releases
https://openssl-library.org/source/old/0.9.x/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/0.9.x/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zh/openssl-0.9.8zh.tar.gz">openssl-0.9.8zh.tar.gz</a></td>
<td>3.6MiB</td>
<td>03 Dec 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zh/openssl-0.9.8zh.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zh/openssl-0.9.8zh.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zh/openssl-0.9.8zh.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zh/openssl-0.9.8zh.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zg/openssl-0.9.8zg.tar.gz">openssl-0.9.8zg.tar.gz</a></td>
<td>3.6MiB</td>
<td>11 Jun 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zg/openssl-0.9.8zg.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zg/openssl-0.9.8zg.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zg/openssl-0.9.8zg.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zf/openssl-0.9.8zf.tar.gz">openssl-0.9.8zf.tar.gz</a></td>
<td>3.6MiB</td>
<td>19 Mar 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zf/openssl-0.9.8zf.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zf/openssl-0.9.8zf.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zf/openssl-0.9.8zf.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8ze/openssl-0.9.8ze.tar.gz">openssl-0.9.8ze.tar.gz</a></td>
<td>3.6MiB</td>
<td>15 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8ze/openssl-0.9.8ze.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8ze/openssl-0.9.8ze.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8ze/openssl-0.9.8ze.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zd/openssl-0.9.8zd.tar.gz">openssl-0.9.8zd.tar.gz</a></td>
<td>3.6MiB</td>
<td>08 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zd/openssl-0.9.8zd.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zd/openssl-0.9.8zd.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zd/openssl-0.9.8zd.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zc/openssl-0.9.8zc.tar.gz">openssl-0.9.8zc.tar.gz</a></td>
<td>3.6MiB</td>
<td>15 Oct 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zc/openssl-0.9.8zc.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zc/openssl-0.9.8zc.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zc/openssl-0.9.8zc.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zb/openssl-0.9.8zb.tar.gz">openssl-0.9.8zb.tar.gz</a></td>
<td>3.6MiB</td>
<td>06 Aug 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zb/openssl-0.9.8zb.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zb/openssl-0.9.8zb.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8zb/openssl-0.9.8zb.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8za/openssl-0.9.8za.tar.gz">openssl-0.9.8za.tar.gz</a></td>
<td>3.6MiB</td>
<td>05 Jun 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8za/openssl-0.9.8za.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8za/openssl-0.9.8za.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8za/openssl-0.9.8za.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8y/openssl-0.9.8y.tar.gz">openssl-0.9.8y.tar.gz</a></td>
<td>3.6MiB</td>
<td>05 Feb 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8y/openssl-0.9.8y.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8y/openssl-0.9.8y.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8y/openssl-0.9.8y.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8x/openssl-0.9.8x.tar.gz">openssl-0.9.8x.tar.gz</a></td>
<td>3.6MiB</td>
<td>10 May 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8x/openssl-0.9.8x.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8x/openssl-0.9.8x.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8x/openssl-0.9.8x.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8w/openssl-0.9.8w.tar.gz">openssl-0.9.8w.tar.gz</a></td>
<td>3.6MiB</td>
<td>23 Apr 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8w/openssl-0.9.8w.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8w/openssl-0.9.8w.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8w/openssl-0.9.8w.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8v/openssl-0.9.8v.tar.gz">openssl-0.9.8v.tar.gz</a></td>
<td>3.6MiB</td>
<td>19 Apr 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8v/openssl-0.9.8v.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8v/openssl-0.9.8v.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8v/openssl-0.9.8v.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8u/openssl-0.9.8u.tar.gz">openssl-0.9.8u.tar.gz</a></td>
<td>3.6MiB</td>
<td>12 Mar 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8u/openssl-0.9.8u.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8u/openssl-0.9.8u.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8u/openssl-0.9.8u.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8t/openssl-0.9.8t.tar.gz">openssl-0.9.8t.tar.gz</a></td>
<td>3.6MiB</td>
<td>18 Jan 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8t/openssl-0.9.8t.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8t/openssl-0.9.8t.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8t/openssl-0.9.8t.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8s/openssl-0.9.8s.tar.gz">openssl-0.9.8s.tar.gz</a></td>
<td>3.6MiB</td>
<td>04 Jan 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8s/openssl-0.9.8s.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8s/openssl-0.9.8s.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8s/openssl-0.9.8s.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8r/openssl-0.9.8r.tar.gz">openssl-0.9.8r.tar.gz</a></td>
<td>3.6MiB</td>
<td>08 Feb 2011</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8r/openssl-0.9.8r.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8r/openssl-0.9.8r.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8r/openssl-0.9.8r.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8q/openssl-0.9.8q.tar.gz">openssl-0.9.8q.tar.gz</a></td>
<td>3.6MiB</td>
<td>02 Dec 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8q/openssl-0.9.8q.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8q/openssl-0.9.8q.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8q/openssl-0.9.8q.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8p/openssl-0.9.8p.tar.gz">openssl-0.9.8p.tar.gz</a></td>
<td>3.6MiB</td>
<td>16 Nov 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8p/openssl-0.9.8p.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8p/openssl-0.9.8p.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8p/openssl-0.9.8p.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8o/openssl-0.9.8o.tar.gz">openssl-0.9.8o.tar.gz</a></td>
<td>3.6MiB</td>
<td>01 Jun 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8o/openssl-0.9.8o.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8o/openssl-0.9.8o.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8o/openssl-0.9.8o.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8n/openssl-0.9.8n.tar.gz">openssl-0.9.8n.tar.gz</a></td>
<td>3.6MiB</td>
<td>24 Mar 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8n/openssl-0.9.8n.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8n/openssl-0.9.8n.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8n/openssl-0.9.8n.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m/openssl-0.9.8m.tar.gz">openssl-0.9.8m.tar.gz</a></td>
<td>3.6MiB</td>
<td>25 Feb 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m/openssl-0.9.8m.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m/openssl-0.9.8m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m/openssl-0.9.8m.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m-beta1/openssl-0.9.8m-beta1.tar.gz">openssl-0.9.8m-beta1.tar.gz</a></td>
<td>3.6MiB</td>
<td>20 Jan 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m-beta1/openssl-0.9.8m-beta1.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m-beta1/openssl-0.9.8m-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8m-beta1/openssl-0.9.8m-beta1.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8l/openssl-0.9.8l.tar.gz">openssl-0.9.8l.tar.gz</a></td>
<td>4.0MiB</td>
<td>05 Nov 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8l/openssl-0.9.8l.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8l/openssl-0.9.8l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8l/openssl-0.9.8l.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8k/openssl-0.9.8k.tar.gz">openssl-0.9.8k.tar.gz</a></td>
<td>3.7MiB</td>
<td>25 Mar 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8k/openssl-0.9.8k.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8k/openssl-0.9.8k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8k/openssl-0.9.8k.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8j/openssl-0.9.8j.tar.gz">openssl-0.9.8j.tar.gz</a></td>
<td>3.6MiB</td>
<td>07 Jan 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8j/openssl-0.9.8j.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8j/openssl-0.9.8j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8j/openssl-0.9.8j.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8i/openssl-0.9.8i.tar.gz">openssl-0.9.8i.tar.gz</a></td>
<td>3.3MiB</td>
<td>15 Sep 2008</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8i/openssl-0.9.8i.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8i/openssl-0.9.8i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8i/openssl-0.9.8i.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8h/openssl-0.9.8h.tar.gz">openssl-0.9.8h.tar.gz</a></td>
<td>3.3MiB</td>
<td>28 May 2008</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8h/openssl-0.9.8h.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8h/openssl-0.9.8h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8h/openssl-0.9.8h.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8g/openssl-0.9.8g.tar.gz">openssl-0.9.8g.tar.gz</a></td>
<td>3.2MiB</td>
<td>19 Oct 2007</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8g/openssl-0.9.8g.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8g/openssl-0.9.8g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8g/openssl-0.9.8g.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8f/openssl-0.9.8f.tar.gz">openssl-0.9.8f.tar.gz</a></td>
<td>3.2MiB</td>
<td>11 Oct 2007</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8f/openssl-0.9.8f.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8f/openssl-0.9.8f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8f/openssl-0.9.8f.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7m/openssl-0.9.7m.tar.gz">openssl-0.9.7m.tar.gz</a></td>
<td>3.2MiB</td>
<td>23 Feb 2007</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7m/openssl-0.9.7m.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7m/openssl-0.9.7m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7m/openssl-0.9.7m.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8e/openssl-0.9.8e.tar.gz">openssl-0.9.8e.tar.gz</a></td>
<td>3.2MiB</td>
<td>23 Feb 2007</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8e/openssl-0.9.8e.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8e/openssl-0.9.8e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8e/openssl-0.9.8e.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7l/openssl-0.9.7l.tar.gz">openssl-0.9.7l.tar.gz</a></td>
<td>3.1MiB</td>
<td>28 Sep 2006</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7l/openssl-0.9.7l.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7l/openssl-0.9.7l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7l/openssl-0.9.7l.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8d/openssl-0.9.8d.tar.gz">openssl-0.9.8d.tar.gz</a></td>
<td>3.2MiB</td>
<td>28 Sep 2006</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8d/openssl-0.9.8d.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8d/openssl-0.9.8d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8d/openssl-0.9.8d.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8c/openssl-0.9.8c.tar.gz">openssl-0.9.8c.tar.gz</a></td>
<td>3.2MiB</td>
<td>05 Sep 2006</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8c/openssl-0.9.8c.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8c/openssl-0.9.8c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8c/openssl-0.9.8c.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7k/openssl-0.9.7k.tar.gz">openssl-0.9.7k.tar.gz</a></td>
<td>3.1MiB</td>
<td>05 Sep 2006</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7k/openssl-0.9.7k.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7k/openssl-0.9.7k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7k/openssl-0.9.7k.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7j/openssl-0.9.7j.tar.gz">openssl-0.9.7j.tar.gz</a></td>
<td>3.1MiB</td>
<td>04 May 2006</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7j/openssl-0.9.7j.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7j/openssl-0.9.7j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7j/openssl-0.9.7j.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8b/openssl-0.9.8b.tar.gz">openssl-0.9.8b.tar.gz</a></td>
<td>3.1MiB</td>
<td>04 May 2006</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8b/openssl-0.9.8b.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8b/openssl-0.9.8b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8b/openssl-0.9.8b.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7i/openssl-0.9.7i.tar.gz">openssl-0.9.7i.tar.gz</a></td>
<td>3.1MiB</td>
<td>14 Oct 2005</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7i/openssl-0.9.7i.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7i/openssl-0.9.7i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7i/openssl-0.9.7i.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8a/openssl-0.9.8a.tar.gz">openssl-0.9.8a.tar.gz</a></td>
<td>3.1MiB</td>
<td>11 Oct 2005</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8a/openssl-0.9.8a.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8a/openssl-0.9.8a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8a/openssl-0.9.8a.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7h/openssl-0.9.7h.tar.gz">openssl-0.9.7h.tar.gz</a></td>
<td>3.1MiB</td>
<td>11 Oct 2005</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7h/openssl-0.9.7h.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7h/openssl-0.9.7h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7h/openssl-0.9.7h.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8/openssl-0.9.8.tar.gz">openssl-0.9.8.tar.gz</a></td>
<td>3.1MiB</td>
<td>05 Jul 2005</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8/openssl-0.9.8.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8/openssl-0.9.8.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_8/openssl-0.9.8.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7g/openssl-0.9.7g.tar.gz">openssl-0.9.7g.tar.gz</a></td>
<td>3.0MiB</td>
<td>11 Apr 2005</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7g/openssl-0.9.7g.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7g/openssl-0.9.7g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7g/openssl-0.9.7g.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7f/openssl-0.9.7f.tar.gz">openssl-0.9.7f.tar.gz</a></td>
<td>3.0MiB</td>
<td>22 Mar 2005</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7f/openssl-0.9.7f.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7f/openssl-0.9.7f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7f/openssl-0.9.7f.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7e/openssl-0.9.7e.tar.gz">openssl-0.9.7e.tar.gz</a></td>
<td>2.9MiB</td>
<td>25 Oct 2004</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7e/openssl-0.9.7e.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7e/openssl-0.9.7e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7e/openssl-0.9.7e.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7d/openssl-0.9.7d.tar.gz">openssl-0.9.7d.tar.gz</a></td>
<td>2.7MiB</td>
<td>17 Mar 2004</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7d/openssl-0.9.7d.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7d/openssl-0.9.7d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7d/openssl-0.9.7d.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6m/openssl-0.9.6m.tar.gz">openssl-0.9.6m.tar.gz</a></td>
<td>2.1MiB</td>
<td>17 Mar 2004</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6m/openssl-0.9.6m.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6m/openssl-0.9.6m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6m/openssl-0.9.6m.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6l/openssl-0.9.6l.tar.gz">openssl-0.9.6l.tar.gz</a></td>
<td>2.1MiB</td>
<td>04 Nov 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6l/openssl-0.9.6l.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6l/openssl-0.9.6l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6l/openssl-0.9.6l.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6k/openssl-0.9.6k.tar.gz">openssl-0.9.6k.tar.gz</a></td>
<td>2.1MiB</td>
<td>30 Sep 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6k/openssl-0.9.6k.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6k/openssl-0.9.6k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6k/openssl-0.9.6k.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7c/openssl-0.9.7c.tar.gz">openssl-0.9.7c.tar.gz</a></td>
<td>2.7MiB</td>
<td>30 Sep 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7c/openssl-0.9.7c.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7c/openssl-0.9.7c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7c/openssl-0.9.7c.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7b/openssl-0.9.7b.tar.gz">openssl-0.9.7b.tar.gz</a></td>
<td>2.7MiB</td>
<td>10 Apr 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7b/openssl-0.9.7b.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7b/openssl-0.9.7b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7b/openssl-0.9.7b.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6j/openssl-0.9.6j.tar.gz">openssl-0.9.6j.tar.gz</a></td>
<td>2.1MiB</td>
<td>10 Apr 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6j/openssl-0.9.6j.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6j/openssl-0.9.6j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6j/openssl-0.9.6j.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6i/openssl-0.9.6i.tar.gz">openssl-0.9.6i.tar.gz</a></td>
<td>2.1MiB</td>
<td>19 Feb 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6i/openssl-0.9.6i.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6i/openssl-0.9.6i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6i/openssl-0.9.6i.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7a/openssl-0.9.7a.tar.gz">openssl-0.9.7a.tar.gz</a></td>
<td>2.6MiB</td>
<td>19 Feb 2003</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7a/openssl-0.9.7a.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7a/openssl-0.9.7a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7a/openssl-0.9.7a.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7/openssl-0.9.7.tar.gz">openssl-0.9.7.tar.gz</a></td>
<td>2.6MiB</td>
<td>30 Dec 2002</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7/openssl-0.9.7.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7/openssl-0.9.7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_7/openssl-0.9.7.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6/openssl-0.9.6.tar.gz">openssl-0.9.6.tar.gz</a></td>
<td>2.0MiB</td>
<td>10 Oct 2000</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6/openssl-0.9.6.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6/openssl-0.9.6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_0_9_6/openssl-0.9.6.tar.gz.sha1">SHA1</a>)</td>
</tr></tbody>
</table>Old 1.0.0 releases
https://openssl-library.org/source/old/1.0.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/1.0.0/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0t/openssl-1.0.0t.tar.gz">openssl-1.0.0t.tar.gz</a></td>
<td>3.9MiB</td>
<td>03 Dec 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0t/openssl-1.0.0t.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0t/openssl-1.0.0t.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0t/openssl-1.0.0t.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0t/openssl-1.0.0t.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0s/openssl-1.0.0s.tar.gz">openssl-1.0.0s.tar.gz</a></td>
<td>3.9MiB</td>
<td>11 Jun 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0s/openssl-1.0.0s.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0s/openssl-1.0.0s.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0s/openssl-1.0.0s.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0r/openssl-1.0.0r.tar.gz">openssl-1.0.0r.tar.gz</a></td>
<td>3.9MiB</td>
<td>19 Mar 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0r/openssl-1.0.0r.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0r/openssl-1.0.0r.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0r/openssl-1.0.0r.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0q/openssl-1.0.0q.tar.gz">openssl-1.0.0q.tar.gz</a></td>
<td>3.8MiB</td>
<td>15 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0q/openssl-1.0.0q.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0q/openssl-1.0.0q.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0q/openssl-1.0.0q.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0p/openssl-1.0.0p.tar.gz">openssl-1.0.0p.tar.gz</a></td>
<td>3.8MiB</td>
<td>08 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0p/openssl-1.0.0p.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0p/openssl-1.0.0p.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0p/openssl-1.0.0p.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0o/openssl-1.0.0o.tar.gz">openssl-1.0.0o.tar.gz</a></td>
<td>3.8MiB</td>
<td>15 Oct 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0o/openssl-1.0.0o.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0o/openssl-1.0.0o.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0o/openssl-1.0.0o.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0n/openssl-1.0.0n.tar.gz">openssl-1.0.0n.tar.gz</a></td>
<td>3.8MiB</td>
<td>06 Aug 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0n/openssl-1.0.0n.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0n/openssl-1.0.0n.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0n/openssl-1.0.0n.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0m/openssl-1.0.0m.tar.gz">openssl-1.0.0m.tar.gz</a></td>
<td>3.9MiB</td>
<td>05 Jun 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0m/openssl-1.0.0m.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0m/openssl-1.0.0m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0m/openssl-1.0.0m.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0l/openssl-1.0.0l.tar.gz">openssl-1.0.0l.tar.gz</a></td>
<td>3.9MiB</td>
<td>06 Jan 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0l/openssl-1.0.0l.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0l/openssl-1.0.0l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0l/openssl-1.0.0l.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0k/openssl-1.0.0k.tar.gz">openssl-1.0.0k.tar.gz</a></td>
<td>3.9MiB</td>
<td>06 Feb 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0k/openssl-1.0.0k.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0k/openssl-1.0.0k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0k/openssl-1.0.0k.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0j/openssl-1.0.0j.tar.gz">openssl-1.0.0j.tar.gz</a></td>
<td>3.9MiB</td>
<td>10 May 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0j/openssl-1.0.0j.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0j/openssl-1.0.0j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0j/openssl-1.0.0j.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0i/openssl-1.0.0i.tar.gz">openssl-1.0.0i.tar.gz</a></td>
<td>3.9MiB</td>
<td>19 Apr 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0i/openssl-1.0.0i.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0i/openssl-1.0.0i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0i/openssl-1.0.0i.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0h/openssl-1.0.0h.tar.gz">openssl-1.0.0h.tar.gz</a></td>
<td>3.9MiB</td>
<td>12 Mar 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0h/openssl-1.0.0h.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0h/openssl-1.0.0h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0h/openssl-1.0.0h.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0g/openssl-1.0.0g.tar.gz">openssl-1.0.0g.tar.gz</a></td>
<td>3.9MiB</td>
<td>18 Jan 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0g/openssl-1.0.0g.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0g/openssl-1.0.0g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0g/openssl-1.0.0g.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0f/openssl-1.0.0f.tar.gz">openssl-1.0.0f.tar.gz</a></td>
<td>3.9MiB</td>
<td>04 Jan 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0f/openssl-1.0.0f.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0f/openssl-1.0.0f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0f/openssl-1.0.0f.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0e/openssl-1.0.0e.tar.gz">openssl-1.0.0e.tar.gz</a></td>
<td>3.9MiB</td>
<td>06 Sep 2011</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0e/openssl-1.0.0e.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0e/openssl-1.0.0e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0e/openssl-1.0.0e.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0d/openssl-1.0.0d.tar.gz">openssl-1.0.0d.tar.gz</a></td>
<td>3.8MiB</td>
<td>08 Feb 2011</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0d/openssl-1.0.0d.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0d/openssl-1.0.0d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0d/openssl-1.0.0d.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0c/openssl-1.0.0c.tar.gz">openssl-1.0.0c.tar.gz</a></td>
<td>3.8MiB</td>
<td>02 Dec 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0c/openssl-1.0.0c.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0c/openssl-1.0.0c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0c/openssl-1.0.0c.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0b/openssl-1.0.0b.tar.gz">openssl-1.0.0b.tar.gz</a></td>
<td>3.8MiB</td>
<td>16 Nov 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0b/openssl-1.0.0b.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0b/openssl-1.0.0b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0b/openssl-1.0.0b.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0a/openssl-1.0.0a.tar.gz">openssl-1.0.0a.tar.gz</a></td>
<td>3.8MiB</td>
<td>01 Jun 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0a/openssl-1.0.0a.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0a/openssl-1.0.0a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0a/openssl-1.0.0a.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0/openssl-1.0.0.tar.gz">openssl-1.0.0.tar.gz</a></td>
<td>3.8MiB</td>
<td>29 Mar 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0/openssl-1.0.0.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0/openssl-1.0.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0/openssl-1.0.0.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta5/openssl-1.0.0-beta5.tar.gz">openssl-1.0.0-beta5.tar.gz</a></td>
<td>3.8MiB</td>
<td>20 Jan 2010</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta5/openssl-1.0.0-beta5.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta5/openssl-1.0.0-beta5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta5/openssl-1.0.0-beta5.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta4/openssl-1.0.0-beta4.tar.gz">openssl-1.0.0-beta4.tar.gz</a></td>
<td>3.8MiB</td>
<td>10 Nov 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta4/openssl-1.0.0-beta4.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta4/openssl-1.0.0-beta4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta4/openssl-1.0.0-beta4.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta3/openssl-1.0.0-beta3.tar.gz">openssl-1.0.0-beta3.tar.gz</a></td>
<td>3.8MiB</td>
<td>15 Jul 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta3/openssl-1.0.0-beta3.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta3/openssl-1.0.0-beta3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta3/openssl-1.0.0-beta3.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta2/openssl-1.0.0-beta2.tar.gz">openssl-1.0.0-beta2.tar.gz</a></td>
<td>3.8MiB</td>
<td>21 Apr 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta2/openssl-1.0.0-beta2.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta2/openssl-1.0.0-beta2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta2/openssl-1.0.0-beta2.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta1/openssl-1.0.0-beta1.tar.gz">openssl-1.0.0-beta1.tar.gz</a></td>
<td>3.8MiB</td>
<td>01 Apr 2009</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta1/openssl-1.0.0-beta1.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta1/openssl-1.0.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_0-beta1/openssl-1.0.0-beta1.tar.gz.sha1">SHA1</a>)</td>
</tr></tbody>
</table>Old 1.0.1 releases
https://openssl-library.org/source/old/1.0.1/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/1.0.1/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1u/openssl-1.0.1u.tar.gz">openssl-1.0.1u.tar.gz</a></td>
<td>4.4MiB</td>
<td>22 Sep 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1u/openssl-1.0.1u.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1u/openssl-1.0.1u.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1u/openssl-1.0.1u.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1t/openssl-1.0.1t.tar.gz">openssl-1.0.1t.tar.gz</a></td>
<td>4.3MiB</td>
<td>03 May 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1t/openssl-1.0.1t.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1t/openssl-1.0.1t.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1t/openssl-1.0.1t.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1s/openssl-1.0.1s.tar.gz">openssl-1.0.1s.tar.gz</a></td>
<td>4.3MiB</td>
<td>01 Mar 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1s/openssl-1.0.1s.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1s/openssl-1.0.1s.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1s/openssl-1.0.1s.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1r/openssl-1.0.1r.tar.gz">openssl-1.0.1r.tar.gz</a></td>
<td>4.3MiB</td>
<td>28 Jan 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1r/openssl-1.0.1r.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1r/openssl-1.0.1r.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1r/openssl-1.0.1r.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1q/openssl-1.0.1q.tar.gz">openssl-1.0.1q.tar.gz</a></td>
<td>4.3MiB</td>
<td>03 Dec 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1q/openssl-1.0.1q.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1q/openssl-1.0.1q.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1q/openssl-1.0.1q.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1p/openssl-1.0.1p.tar.gz">openssl-1.0.1p.tar.gz</a></td>
<td>4.3MiB</td>
<td>09 Jul 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1p/openssl-1.0.1p.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1p/openssl-1.0.1p.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1p/openssl-1.0.1p.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1o/openssl-1.0.1o.tar.gz">openssl-1.0.1o.tar.gz</a></td>
<td>4.3MiB</td>
<td>12 Jun 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1o/openssl-1.0.1o.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1o/openssl-1.0.1o.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1o/openssl-1.0.1o.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1n/openssl-1.0.1n.tar.gz">openssl-1.0.1n.tar.gz</a></td>
<td>4.3MiB</td>
<td>11 Jun 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1n/openssl-1.0.1n.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1n/openssl-1.0.1n.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1n/openssl-1.0.1n.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1m/openssl-1.0.1m.tar.gz">openssl-1.0.1m.tar.gz</a></td>
<td>4.3MiB</td>
<td>19 Mar 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1m/openssl-1.0.1m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1m/openssl-1.0.1m.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1m/openssl-1.0.1m.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1l/openssl-1.0.1l.tar.gz">openssl-1.0.1l.tar.gz</a></td>
<td>4.2MiB</td>
<td>15 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1l/openssl-1.0.1l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1l/openssl-1.0.1l.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1l/openssl-1.0.1l.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1k/openssl-1.0.1k.tar.gz">openssl-1.0.1k.tar.gz</a></td>
<td>4.2MiB</td>
<td>08 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1k/openssl-1.0.1k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1k/openssl-1.0.1k.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1k/openssl-1.0.1k.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1j/openssl-1.0.1j.tar.gz">openssl-1.0.1j.tar.gz</a></td>
<td>4.2MiB</td>
<td>15 Oct 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1j/openssl-1.0.1j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1j/openssl-1.0.1j.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1j/openssl-1.0.1j.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1i/openssl-1.0.1i.tar.gz">openssl-1.0.1i.tar.gz</a></td>
<td>4.2MiB</td>
<td>06 Aug 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1i/openssl-1.0.1i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1i/openssl-1.0.1i.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1i/openssl-1.0.1i.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1h/openssl-1.0.1h.tar.gz">openssl-1.0.1h.tar.gz</a></td>
<td>4.3MiB</td>
<td>05 Jun 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1h/openssl-1.0.1h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1h/openssl-1.0.1h.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1h/openssl-1.0.1h.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1g/openssl-1.0.1g.tar.gz">openssl-1.0.1g.tar.gz</a></td>
<td>4.3MiB</td>
<td>07 Apr 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1g/openssl-1.0.1g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1g/openssl-1.0.1g.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1g/openssl-1.0.1g.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1f/openssl-1.0.1f.tar.gz">openssl-1.0.1f.tar.gz</a></td>
<td>4.3MiB</td>
<td>06 Jan 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1f/openssl-1.0.1f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1f/openssl-1.0.1f.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1f/openssl-1.0.1f.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1e/openssl-1.0.1e.tar.gz">openssl-1.0.1e.tar.gz</a></td>
<td>4.3MiB</td>
<td>11 Feb 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1e/openssl-1.0.1e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1e/openssl-1.0.1e.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1e/openssl-1.0.1e.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1d/openssl-1.0.1d.tar.gz">openssl-1.0.1d.tar.gz</a></td>
<td>4.3MiB</td>
<td>05 Feb 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1d/openssl-1.0.1d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1d/openssl-1.0.1d.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1d/openssl-1.0.1d.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1c/openssl-1.0.1c.tar.gz">openssl-1.0.1c.tar.gz</a></td>
<td>4.3MiB</td>
<td>10 May 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1c/openssl-1.0.1c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1c/openssl-1.0.1c.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1c/openssl-1.0.1c.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1b/openssl-1.0.1b.tar.gz">openssl-1.0.1b.tar.gz</a></td>
<td>4.3MiB</td>
<td>26 Apr 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1b/openssl-1.0.1b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1b/openssl-1.0.1b.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1b/openssl-1.0.1b.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1a/openssl-1.0.1a.tar.gz">openssl-1.0.1a.tar.gz</a></td>
<td>4.3MiB</td>
<td>19 Apr 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1a/openssl-1.0.1a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1a/openssl-1.0.1a.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1a/openssl-1.0.1a.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1/openssl-1.0.1.tar.gz">openssl-1.0.1.tar.gz</a></td>
<td>4.2MiB</td>
<td>14 Mar 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1/openssl-1.0.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1/openssl-1.0.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1/openssl-1.0.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta3/openssl-1.0.1-beta3.tar.gz">openssl-1.0.1-beta3.tar.gz</a></td>
<td>4.2MiB</td>
<td>23 Feb 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta3/openssl-1.0.1-beta3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta3/openssl-1.0.1-beta3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta3/openssl-1.0.1-beta3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta2/openssl-1.0.1-beta2.tar.gz">openssl-1.0.1-beta2.tar.gz</a></td>
<td>4.2MiB</td>
<td>19 Jan 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta2/openssl-1.0.1-beta2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta2/openssl-1.0.1-beta2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta2/openssl-1.0.1-beta2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta1/openssl-1.0.1-beta1.tar.gz">openssl-1.0.1-beta1.tar.gz</a></td>
<td>4.2MiB</td>
<td>03 Jan 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta1/openssl-1.0.1-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta1/openssl-1.0.1-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_1-beta1/openssl-1.0.1-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 1.0.2 releases
https://openssl-library.org/source/old/1.0.2/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/1.0.2/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2u/openssl-1.0.2u.tar.gz">openssl-1.0.2u.tar.gz</a></td>
<td>5.1MiB</td>
<td>20 Dec 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2u/openssl-1.0.2u.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2u/openssl-1.0.2u.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2u/openssl-1.0.2u.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2t/openssl-1.0.2t.tar.gz">openssl-1.0.2t.tar.gz</a></td>
<td>5.1MiB</td>
<td>10 Sep 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2t/openssl-1.0.2t.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2t/openssl-1.0.2t.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2t/openssl-1.0.2t.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2s/openssl-1.0.2s.tar.gz">openssl-1.0.2s.tar.gz</a></td>
<td>5.1MiB</td>
<td>28 May 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2s/openssl-1.0.2s.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2s/openssl-1.0.2s.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2s/openssl-1.0.2s.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2r/openssl-1.0.2r.tar.gz">openssl-1.0.2r.tar.gz</a></td>
<td>5.1MiB</td>
<td>26 Feb 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2r/openssl-1.0.2r.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2r/openssl-1.0.2r.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2r/openssl-1.0.2r.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2q/openssl-1.0.2q.tar.gz">openssl-1.0.2q.tar.gz</a></td>
<td>5.1MiB</td>
<td>20 Nov 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2q/openssl-1.0.2q.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2q/openssl-1.0.2q.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2q/openssl-1.0.2q.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2p/openssl-1.0.2p.tar.gz">openssl-1.0.2p.tar.gz</a></td>
<td>5.1MiB</td>
<td>14 Aug 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2p/openssl-1.0.2p.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2p/openssl-1.0.2p.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2p/openssl-1.0.2p.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2o/openssl-1.0.2o.tar.gz">openssl-1.0.2o.tar.gz</a></td>
<td>5.1MiB</td>
<td>27 Mar 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2o/openssl-1.0.2o.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2o/openssl-1.0.2o.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2o/openssl-1.0.2o.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2n/openssl-1.0.2n.tar.gz">openssl-1.0.2n.tar.gz</a></td>
<td>5.1MiB</td>
<td>07 Dec 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2n/openssl-1.0.2n.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2n/openssl-1.0.2n.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2n/openssl-1.0.2n.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2m/openssl-1.0.2m.tar.gz">openssl-1.0.2m.tar.gz</a></td>
<td>5.1MiB</td>
<td>02 Nov 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2m/openssl-1.0.2m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2m/openssl-1.0.2m.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2m/openssl-1.0.2m.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2l/openssl-1.0.2l.tar.gz">openssl-1.0.2l.tar.gz</a></td>
<td>5.1MiB</td>
<td>25 May 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2l/openssl-1.0.2l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2l/openssl-1.0.2l.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2l/openssl-1.0.2l.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2k/openssl-1.0.2k.tar.gz">openssl-1.0.2k.tar.gz</a></td>
<td>5.1MiB</td>
<td>26 Jan 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2k/openssl-1.0.2k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2k/openssl-1.0.2k.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2k/openssl-1.0.2k.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2j/openssl-1.0.2j.tar.gz">openssl-1.0.2j.tar.gz</a></td>
<td>5.1MiB</td>
<td>26 Sep 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2j/openssl-1.0.2j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2j/openssl-1.0.2j.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2j/openssl-1.0.2j.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2i/openssl-1.0.2i.tar.gz">openssl-1.0.2i.tar.gz</a></td>
<td>5.1MiB</td>
<td>22 Sep 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2i/openssl-1.0.2i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2i/openssl-1.0.2i.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2i/openssl-1.0.2i.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2h/openssl-1.0.2h.tar.gz">openssl-1.0.2h.tar.gz</a></td>
<td>5.0MiB</td>
<td>03 May 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2h/openssl-1.0.2h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2h/openssl-1.0.2h.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2h/openssl-1.0.2h.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2g/openssl-1.0.2g.tar.gz">openssl-1.0.2g.tar.gz</a></td>
<td>5.0MiB</td>
<td>01 Mar 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2g/openssl-1.0.2g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2g/openssl-1.0.2g.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2g/openssl-1.0.2g.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2f/openssl-1.0.2f.tar.gz">openssl-1.0.2f.tar.gz</a></td>
<td>5.0MiB</td>
<td>28 Jan 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2f/openssl-1.0.2f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2f/openssl-1.0.2f.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2f/openssl-1.0.2f.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2e/openssl-1.0.2e.tar.gz">openssl-1.0.2e.tar.gz</a></td>
<td>5.0MiB</td>
<td>03 Dec 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2e/openssl-1.0.2e.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2e/openssl-1.0.2e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2e/openssl-1.0.2e.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2e/openssl-1.0.2e.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2d/openssl-1.0.2d.tar.gz">openssl-1.0.2d.tar.gz</a></td>
<td>5.1MiB</td>
<td>09 Jul 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2d/openssl-1.0.2d.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2d/openssl-1.0.2d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2d/openssl-1.0.2d.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2d/openssl-1.0.2d.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2c/openssl-1.0.2c.tar.gz">openssl-1.0.2c.tar.gz</a></td>
<td>5.0MiB</td>
<td>12 Jun 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2c/openssl-1.0.2c.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2c/openssl-1.0.2c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2c/openssl-1.0.2c.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2c/openssl-1.0.2c.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2b/openssl-1.0.2b.tar.gz">openssl-1.0.2b.tar.gz</a></td>
<td>5.0MiB</td>
<td>11 Jun 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2b/openssl-1.0.2b.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2b/openssl-1.0.2b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2b/openssl-1.0.2b.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2b/openssl-1.0.2b.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2a/openssl-1.0.2a.tar.gz">openssl-1.0.2a.tar.gz</a></td>
<td>5.0MiB</td>
<td>19 Mar 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2a/openssl-1.0.2a.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2a/openssl-1.0.2a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2a/openssl-1.0.2a.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2a/openssl-1.0.2a.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2/openssl-1.0.2.tar.gz">openssl-1.0.2.tar.gz</a></td>
<td>5.0MiB</td>
<td>22 Jan 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2/openssl-1.0.2.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2/openssl-1.0.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2/openssl-1.0.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2/openssl-1.0.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta3/openssl-1.0.2-beta3.tar.gz">openssl-1.0.2-beta3.tar.gz</a></td>
<td>4.9MiB</td>
<td>25 Sep 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta3/openssl-1.0.2-beta3.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta3/openssl-1.0.2-beta3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta3/openssl-1.0.2-beta3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta3/openssl-1.0.2-beta3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta2/openssl-1.0.2-beta2.tar.gz">openssl-1.0.2-beta2.tar.gz</a></td>
<td>4.6MiB</td>
<td>22 Jul 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta2/openssl-1.0.2-beta2.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta2/openssl-1.0.2-beta2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta2/openssl-1.0.2-beta2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta2/openssl-1.0.2-beta2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta1/openssl-1.0.2-beta1.tar.gz">openssl-1.0.2-beta1.tar.gz</a></td>
<td>4.7MiB</td>
<td>24 Feb 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta1/openssl-1.0.2-beta1.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta1/openssl-1.0.2-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta1/openssl-1.0.2-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_0_2-beta1/openssl-1.0.2-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 1.1.0 releases
https://openssl-library.org/source/old/1.1.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/1.1.0/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0l/openssl-1.1.0l.tar.gz">openssl-1.1.0l.tar.gz</a></td>
<td>5.0MiB</td>
<td>10 Sep 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0l/openssl-1.1.0l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0l/openssl-1.1.0l.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0l/openssl-1.1.0l.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0k/openssl-1.1.0k.tar.gz">openssl-1.1.0k.tar.gz</a></td>
<td>5.0MiB</td>
<td>28 May 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0k/openssl-1.1.0k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0k/openssl-1.1.0k.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0k/openssl-1.1.0k.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0j/openssl-1.1.0j.tar.gz">openssl-1.1.0j.tar.gz</a></td>
<td>5.2MiB</td>
<td>20 Nov 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0j/openssl-1.1.0j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0j/openssl-1.1.0j.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0j/openssl-1.1.0j.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0i/openssl-1.1.0i.tar.gz">openssl-1.1.0i.tar.gz</a></td>
<td>5.2MiB</td>
<td>14 Aug 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0i/openssl-1.1.0i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0i/openssl-1.1.0i.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0i/openssl-1.1.0i.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0h/openssl-1.1.0h.tar.gz">openssl-1.1.0h.tar.gz</a></td>
<td>5.2MiB</td>
<td>27 Mar 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0h/openssl-1.1.0h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0h/openssl-1.1.0h.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0h/openssl-1.1.0h.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0g/openssl-1.1.0g.tar.gz">openssl-1.1.0g.tar.gz</a></td>
<td>5.2MiB</td>
<td>02 Nov 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0g/openssl-1.1.0g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0g/openssl-1.1.0g.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0g/openssl-1.1.0g.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0f/openssl-1.1.0f.tar.gz">openssl-1.1.0f.tar.gz</a></td>
<td>5.0MiB</td>
<td>25 May 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0f/openssl-1.1.0f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0f/openssl-1.1.0f.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0f/openssl-1.1.0f.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0e/openssl-1.1.0e.tar.gz">openssl-1.1.0e.tar.gz</a></td>
<td>5.0MiB</td>
<td>16 Feb 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0e/openssl-1.1.0e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0e/openssl-1.1.0e.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0e/openssl-1.1.0e.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0d/openssl-1.1.0d.tar.gz">openssl-1.1.0d.tar.gz</a></td>
<td>5.0MiB</td>
<td>26 Jan 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0d/openssl-1.1.0d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0d/openssl-1.1.0d.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0d/openssl-1.1.0d.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0c/openssl-1.1.0c.tar.gz">openssl-1.1.0c.tar.gz</a></td>
<td>4.9MiB</td>
<td>10 Nov 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0c/openssl-1.1.0c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0c/openssl-1.1.0c.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0c/openssl-1.1.0c.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0b/openssl-1.1.0b.tar.gz">openssl-1.1.0b.tar.gz</a></td>
<td>4.9MiB</td>
<td>26 Sep 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0b/openssl-1.1.0b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0b/openssl-1.1.0b.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0b/openssl-1.1.0b.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0a/openssl-1.1.0a.tar.gz">openssl-1.1.0a.tar.gz</a></td>
<td>4.9MiB</td>
<td>22 Sep 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0a/openssl-1.1.0a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0a/openssl-1.1.0a.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0a/openssl-1.1.0a.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0/openssl-1.1.0.tar.gz">openssl-1.1.0.tar.gz</a></td>
<td>4.9MiB</td>
<td>25 Aug 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0/openssl-1.1.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0/openssl-1.1.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0/openssl-1.1.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre3/openssl-1.1.0-pre3.tar.gz">openssl-1.1.0-pre3.tar.gz</a></td>
<td>4.8MiB</td>
<td>15 Feb 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre3/openssl-1.1.0-pre3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre3/openssl-1.1.0-pre3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre3/openssl-1.1.0-pre3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre2/openssl-1.1.0-pre2.tar.gz">openssl-1.1.0-pre2.tar.gz</a></td>
<td>4.7MiB</td>
<td>14 Jan 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre2/openssl-1.1.0-pre2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre2/openssl-1.1.0-pre2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre2/openssl-1.1.0-pre2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre1/openssl-1.1.0-pre1.tar.gz">openssl-1.1.0-pre1.tar.gz</a></td>
<td>4.8MiB</td>
<td>10 Dec 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre1/openssl-1.1.0-pre1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre1/openssl-1.1.0-pre1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_0-pre1/openssl-1.1.0-pre1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 1.1.1 releases
https://openssl-library.org/source/old/1.1.1/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/1.1.1/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1w/openssl-1.1.1w.tar.gz">openssl-1.1.1w.tar.gz</a></td>
<td>9.4MiB</td>
<td>12 Sep 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1w/openssl-1.1.1w.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1w/openssl-1.1.1w.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1w/openssl-1.1.1w.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1v/openssl-1.1.1v.tar.gz">openssl-1.1.1v.tar.gz</a></td>
<td>9.4MiB</td>
<td>01 Aug 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1v/openssl-1.1.1v.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1v/openssl-1.1.1v.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1v/openssl-1.1.1v.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1u/openssl-1.1.1u.tar.gz">openssl-1.1.1u.tar.gz</a></td>
<td>9.4MiB</td>
<td>30 May 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1u/openssl-1.1.1u.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1u/openssl-1.1.1u.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1u/openssl-1.1.1u.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1t/openssl-1.1.1t.tar.gz">openssl-1.1.1t.tar.gz</a></td>
<td>9.4MiB</td>
<td>07 Feb 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1t/openssl-1.1.1t.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1t/openssl-1.1.1t.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1t/openssl-1.1.1t.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1s/openssl-1.1.1s.tar.gz">openssl-1.1.1s.tar.gz</a></td>
<td>9.4MiB</td>
<td>01 Nov 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1s/openssl-1.1.1s.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1s/openssl-1.1.1s.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1s/openssl-1.1.1s.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1q/openssl-1.1.1q.tar.gz">openssl-1.1.1q.tar.gz</a></td>
<td>9.4MiB</td>
<td>05 Jul 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1q/openssl-1.1.1q.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1q/openssl-1.1.1q.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1q/openssl-1.1.1q.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1p/openssl-1.1.1p.tar.gz">openssl-1.1.1p.tar.gz</a></td>
<td>9.4MiB</td>
<td>21 Jun 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1p/openssl-1.1.1p.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1p/openssl-1.1.1p.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1p/openssl-1.1.1p.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1o/openssl-1.1.1o.tar.gz">openssl-1.1.1o.tar.gz</a></td>
<td>9.4MiB</td>
<td>03 May 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1o/openssl-1.1.1o.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1o/openssl-1.1.1o.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1o/openssl-1.1.1o.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1n/openssl-1.1.1n.tar.gz">openssl-1.1.1n.tar.gz</a></td>
<td>9.4MiB</td>
<td>15 Mar 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1n/openssl-1.1.1n.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1n/openssl-1.1.1n.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1n/openssl-1.1.1n.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1m/openssl-1.1.1m.tar.gz">openssl-1.1.1m.tar.gz</a></td>
<td>9.4MiB</td>
<td>14 Dec 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1m/openssl-1.1.1m.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1m/openssl-1.1.1m.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1m/openssl-1.1.1m.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1l/openssl-1.1.1l.tar.gz">openssl-1.1.1l.tar.gz</a></td>
<td>9.4MiB</td>
<td>24 Aug 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1l/openssl-1.1.1l.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1l/openssl-1.1.1l.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1l/openssl-1.1.1l.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1k/openssl-1.1.1k.tar.gz">openssl-1.1.1k.tar.gz</a></td>
<td>9.4MiB</td>
<td>25 Mar 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1k/openssl-1.1.1k.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1k/openssl-1.1.1k.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1k/openssl-1.1.1k.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1j/openssl-1.1.1j.tar.gz">openssl-1.1.1j.tar.gz</a></td>
<td>9.4MiB</td>
<td>16 Feb 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1j/openssl-1.1.1j.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1j/openssl-1.1.1j.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1j/openssl-1.1.1j.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1i/openssl-1.1.1i.tar.gz">openssl-1.1.1i.tar.gz</a></td>
<td>9.4MiB</td>
<td>08 Dec 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1i/openssl-1.1.1i.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1i/openssl-1.1.1i.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1i/openssl-1.1.1i.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1h/openssl-1.1.1h.tar.gz">openssl-1.1.1h.tar.gz</a></td>
<td>9.4MiB</td>
<td>22 Sep 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1h/openssl-1.1.1h.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1h/openssl-1.1.1h.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1h/openssl-1.1.1h.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1g/openssl-1.1.1g.tar.gz">openssl-1.1.1g.tar.gz</a></td>
<td>9.3MiB</td>
<td>21 Apr 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1g/openssl-1.1.1g.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1g/openssl-1.1.1g.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1g/openssl-1.1.1g.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1f/openssl-1.1.1f.tar.gz">openssl-1.1.1f.tar.gz</a></td>
<td>9.3MiB</td>
<td>31 Mar 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1f/openssl-1.1.1f.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1f/openssl-1.1.1f.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1f/openssl-1.1.1f.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1e/openssl-1.1.1e.tar.gz">openssl-1.1.1e.tar.gz</a></td>
<td>9.3MiB</td>
<td>17 Mar 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1e/openssl-1.1.1e.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1e/openssl-1.1.1e.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1e/openssl-1.1.1e.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1d/openssl-1.1.1d.tar.gz">openssl-1.1.1d.tar.gz</a></td>
<td>8.4MiB</td>
<td>10 Sep 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1d/openssl-1.1.1d.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1d/openssl-1.1.1d.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1d/openssl-1.1.1d.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1c/openssl-1.1.1c.tar.gz">openssl-1.1.1c.tar.gz</a></td>
<td>8.5MiB</td>
<td>28 May 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1c/openssl-1.1.1c.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1c/openssl-1.1.1c.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1c/openssl-1.1.1c.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1b/openssl-1.1.1b.tar.gz">openssl-1.1.1b.tar.gz</a></td>
<td>7.8MiB</td>
<td>26 Feb 2019</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1b/openssl-1.1.1b.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1b/openssl-1.1.1b.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1b/openssl-1.1.1b.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1a/openssl-1.1.1a.tar.gz">openssl-1.1.1a.tar.gz</a></td>
<td>8.0MiB</td>
<td>20 Nov 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1a/openssl-1.1.1a.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1a/openssl-1.1.1a.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1a/openssl-1.1.1a.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1/openssl-1.1.1.tar.gz">openssl-1.1.1.tar.gz</a></td>
<td>8.0MiB</td>
<td>11 Sep 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1/openssl-1.1.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1/openssl-1.1.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1/openssl-1.1.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre9/openssl-1.1.1-pre9.tar.gz">openssl-1.1.1-pre9.tar.gz</a></td>
<td>8.0MiB</td>
<td>21 Aug 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre9/openssl-1.1.1-pre9.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre9/openssl-1.1.1-pre9.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre9/openssl-1.1.1-pre9.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre8/openssl-1.1.1-pre8.tar.gz">openssl-1.1.1-pre8.tar.gz</a></td>
<td>7.9MiB</td>
<td>20 Jun 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre8/openssl-1.1.1-pre8.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre8/openssl-1.1.1-pre8.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre8/openssl-1.1.1-pre8.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre7/openssl-1.1.1-pre7.tar.gz">openssl-1.1.1-pre7.tar.gz</a></td>
<td>7.9MiB</td>
<td>29 May 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre7/openssl-1.1.1-pre7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre7/openssl-1.1.1-pre7.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre7/openssl-1.1.1-pre7.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre6/openssl-1.1.1-pre6.tar.gz">openssl-1.1.1-pre6.tar.gz</a></td>
<td>7.9MiB</td>
<td>01 May 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre6/openssl-1.1.1-pre6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre6/openssl-1.1.1-pre6.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre6/openssl-1.1.1-pre6.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre5/openssl-1.1.1-pre5.tar.gz">openssl-1.1.1-pre5.tar.gz</a></td>
<td>7.9MiB</td>
<td>17 Apr 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre5/openssl-1.1.1-pre5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre5/openssl-1.1.1-pre5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre5/openssl-1.1.1-pre5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre4/openssl-1.1.1-pre4.tar.gz">openssl-1.1.1-pre4.tar.gz</a></td>
<td>7.9MiB</td>
<td>03 Apr 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre4/openssl-1.1.1-pre4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre4/openssl-1.1.1-pre4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre4/openssl-1.1.1-pre4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre3/openssl-1.1.1-pre3.tar.gz">openssl-1.1.1-pre3.tar.gz</a></td>
<td>6.2MiB</td>
<td>20 Mar 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre3/openssl-1.1.1-pre3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre3/openssl-1.1.1-pre3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre3/openssl-1.1.1-pre3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre2/openssl-1.1.1-pre2.tar.gz">openssl-1.1.1-pre2.tar.gz</a></td>
<td>6.2MiB</td>
<td>27 Feb 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre2/openssl-1.1.1-pre2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre2/openssl-1.1.1-pre2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre2/openssl-1.1.1-pre2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre1/openssl-1.1.1-pre1.tar.gz">openssl-1.1.1-pre1.tar.gz</a></td>
<td>6.1MiB</td>
<td>15 Feb 2018</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre1/openssl-1.1.1-pre1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre1/openssl-1.1.1-pre1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL_1_1_1-pre1/openssl-1.1.1-pre1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.0 releases
https://openssl-library.org/source/old/3.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.0/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz">openssl-3.0.19.tar.gz</a></td>
<td>14.6MiB</td>
<td>27 Jan 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.19/openssl-3.0.19.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.18/openssl-3.0.18.tar.gz">openssl-3.0.18.tar.gz</a></td>
<td>14.6MiB</td>
<td>30 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.18/openssl-3.0.18.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.18/openssl-3.0.18.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.18/openssl-3.0.18.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.17/openssl-3.0.17.tar.gz">openssl-3.0.17.tar.gz</a></td>
<td>14.6MiB</td>
<td>01 Jul 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.17/openssl-3.0.17.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.17/openssl-3.0.17.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.17/openssl-3.0.17.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.16/openssl-3.0.16.tar.gz">openssl-3.0.16.tar.gz</a></td>
<td>14.6MiB</td>
<td>11 Feb 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.16/openssl-3.0.16.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.16/openssl-3.0.16.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.16/openssl-3.0.16.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.15/openssl-3.0.15.tar.gz">openssl-3.0.15.tar.gz</a></td>
<td>14.6MiB</td>
<td>03 Sep 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.15/openssl-3.0.15.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.15/openssl-3.0.15.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.15/openssl-3.0.15.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.14/openssl-3.0.14.tar.gz">openssl-3.0.14.tar.gz</a></td>
<td>14.6MiB</td>
<td>04 Jun 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.14/openssl-3.0.14.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.14/openssl-3.0.14.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.14/openssl-3.0.14.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.13/openssl-3.0.13.tar.gz">openssl-3.0.13.tar.gz</a></td>
<td>14.6MiB</td>
<td>30 Jan 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.13/openssl-3.0.13.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.13/openssl-3.0.13.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.13/openssl-3.0.13.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.12/openssl-3.0.12.tar.gz">openssl-3.0.12.tar.gz</a></td>
<td>14.5MiB</td>
<td>24 Oct 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.12/openssl-3.0.12.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.12/openssl-3.0.12.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.12/openssl-3.0.12.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.11/openssl-3.0.11.tar.gz">openssl-3.0.11.tar.gz</a></td>
<td>14.5MiB</td>
<td>19 Sep 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.11/openssl-3.0.11.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.11/openssl-3.0.11.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.11/openssl-3.0.11.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.10/openssl-3.0.10.tar.gz">openssl-3.0.10.tar.gz</a></td>
<td>14.5MiB</td>
<td>01 Aug 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.10/openssl-3.0.10.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.10/openssl-3.0.10.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.10/openssl-3.0.10.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.9/openssl-3.0.9.tar.gz">openssl-3.0.9.tar.gz</a></td>
<td>14.5MiB</td>
<td>30 May 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.9/openssl-3.0.9.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.9/openssl-3.0.9.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.9/openssl-3.0.9.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.8/openssl-3.0.8.tar.gz">openssl-3.0.8.tar.gz</a></td>
<td>14.4MiB</td>
<td>07 Feb 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.8/openssl-3.0.8.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.8/openssl-3.0.8.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.8/openssl-3.0.8.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.7/openssl-3.0.7.tar.gz">openssl-3.0.7.tar.gz</a></td>
<td>14.4MiB</td>
<td>01 Nov 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.7/openssl-3.0.7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.7/openssl-3.0.7.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.7/openssl-3.0.7.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.5/openssl-3.0.5.tar.gz">openssl-3.0.5.tar.gz</a></td>
<td>14.4MiB</td>
<td>05 Jul 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.5/openssl-3.0.5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.5/openssl-3.0.5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.5/openssl-3.0.5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.4/openssl-3.0.4.tar.gz">openssl-3.0.4.tar.gz</a></td>
<td>14.4MiB</td>
<td>21 Jun 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.4/openssl-3.0.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.4/openssl-3.0.4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.4/openssl-3.0.4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.3/openssl-3.0.3.tar.gz">openssl-3.0.3.tar.gz</a></td>
<td>14.4MiB</td>
<td>03 May 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.3/openssl-3.0.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.3/openssl-3.0.3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.3/openssl-3.0.3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.2/openssl-3.0.2.tar.gz">openssl-3.0.2.tar.gz</a></td>
<td>14.3MiB</td>
<td>15 Mar 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.2/openssl-3.0.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.2/openssl-3.0.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.2/openssl-3.0.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.1/openssl-3.0.1.tar.gz">openssl-3.0.1.tar.gz</a></td>
<td>14.3MiB</td>
<td>14 Dec 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.1/openssl-3.0.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.1/openssl-3.0.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.1/openssl-3.0.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0/openssl-3.0.0.tar.gz">openssl-3.0.0.tar.gz</a></td>
<td>14.3MiB</td>
<td>07 Sep 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0/openssl-3.0.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0/openssl-3.0.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0/openssl-3.0.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta2/openssl-3.0.0-beta2.tar.gz">openssl-3.0.0-beta2.tar.gz</a></td>
<td>14.2MiB</td>
<td>29 Jul 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta2/openssl-3.0.0-beta2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta2/openssl-3.0.0-beta2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta2/openssl-3.0.0-beta2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta1/openssl-3.0.0-beta1.tar.gz">openssl-3.0.0-beta1.tar.gz</a></td>
<td>14.2MiB</td>
<td>17 Jun 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta1/openssl-3.0.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta1/openssl-3.0.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-beta1/openssl-3.0.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha17/openssl-3.0.0-alpha17.tar.gz">openssl-3.0.0-alpha17.tar.gz</a></td>
<td>13.9MiB</td>
<td>20 May 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha17/openssl-3.0.0-alpha17.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha17/openssl-3.0.0-alpha17.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha17/openssl-3.0.0-alpha17.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha16/openssl-3.0.0-alpha16.tar.gz">openssl-3.0.0-alpha16.tar.gz</a></td>
<td>13.8MiB</td>
<td>06 May 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha16/openssl-3.0.0-alpha16.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha16/openssl-3.0.0-alpha16.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha16/openssl-3.0.0-alpha16.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha15/openssl-3.0.0-alpha15.tar.gz">openssl-3.0.0-alpha15.tar.gz</a></td>
<td>13.8MiB</td>
<td>22 Apr 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha15/openssl-3.0.0-alpha15.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha15/openssl-3.0.0-alpha15.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha15/openssl-3.0.0-alpha15.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha14/openssl-3.0.0-alpha14.tar.gz">openssl-3.0.0-alpha14.tar.gz</a></td>
<td>13.7MiB</td>
<td>08 Apr 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha14/openssl-3.0.0-alpha14.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha14/openssl-3.0.0-alpha14.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha14/openssl-3.0.0-alpha14.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha13/openssl-3.0.0-alpha13.tar.gz">openssl-3.0.0-alpha13.tar.gz</a></td>
<td>13.6MiB</td>
<td>11 Mar 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha13/openssl-3.0.0-alpha13.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha13/openssl-3.0.0-alpha13.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha13/openssl-3.0.0-alpha13.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha12/openssl-3.0.0-alpha12.tar.gz">openssl-3.0.0-alpha12.tar.gz</a></td>
<td>13.5MiB</td>
<td>18 Feb 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha12/openssl-3.0.0-alpha12.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha12/openssl-3.0.0-alpha12.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha12/openssl-3.0.0-alpha12.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha11/openssl-3.0.0-alpha11.tar.gz">openssl-3.0.0-alpha11.tar.gz</a></td>
<td>13.5MiB</td>
<td>28 Jan 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha11/openssl-3.0.0-alpha11.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha11/openssl-3.0.0-alpha11.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha11/openssl-3.0.0-alpha11.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha10/openssl-3.0.0-alpha10.tar.gz">openssl-3.0.0-alpha10.tar.gz</a></td>
<td>13.4MiB</td>
<td>07 Jan 2021</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha10/openssl-3.0.0-alpha10.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha10/openssl-3.0.0-alpha10.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha10/openssl-3.0.0-alpha10.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha9/openssl-3.0.0-alpha9.tar.gz">openssl-3.0.0-alpha9.tar.gz</a></td>
<td>13.4MiB</td>
<td>26 Nov 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha9/openssl-3.0.0-alpha9.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha9/openssl-3.0.0-alpha9.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha9/openssl-3.0.0-alpha9.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha8/openssl-3.0.0-alpha8.tar.gz">openssl-3.0.0-alpha8.tar.gz</a></td>
<td>13.4MiB</td>
<td>05 Nov 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha8/openssl-3.0.0-alpha8.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha8/openssl-3.0.0-alpha8.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha8/openssl-3.0.0-alpha8.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha7/openssl-3.0.0-alpha7.tar.gz">openssl-3.0.0-alpha7.tar.gz</a></td>
<td>13.4MiB</td>
<td>15 Oct 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha7/openssl-3.0.0-alpha7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha7/openssl-3.0.0-alpha7.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha7/openssl-3.0.0-alpha7.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha6/openssl-3.0.0-alpha6.tar.gz">openssl-3.0.0-alpha6.tar.gz</a></td>
<td>13.3MiB</td>
<td>06 Aug 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha6/openssl-3.0.0-alpha6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha6/openssl-3.0.0-alpha6.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha6/openssl-3.0.0-alpha6.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha5/openssl-3.0.0-alpha5.tar.gz">openssl-3.0.0-alpha5.tar.gz</a></td>
<td>13.3MiB</td>
<td>16 Jul 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha5/openssl-3.0.0-alpha5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha5/openssl-3.0.0-alpha5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha5/openssl-3.0.0-alpha5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha4/openssl-3.0.0-alpha4.tar.gz">openssl-3.0.0-alpha4.tar.gz</a></td>
<td>13.2MiB</td>
<td>25 Jun 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha4/openssl-3.0.0-alpha4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha4/openssl-3.0.0-alpha4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha4/openssl-3.0.0-alpha4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha3/openssl-3.0.0-alpha3.tar.gz">openssl-3.0.0-alpha3.tar.gz</a></td>
<td>9.2MiB</td>
<td>04 Jun 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha3/openssl-3.0.0-alpha3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha3/openssl-3.0.0-alpha3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha3/openssl-3.0.0-alpha3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha2/openssl-3.0.0-alpha2.tar.gz">openssl-3.0.0-alpha2.tar.gz</a></td>
<td>9.2MiB</td>
<td>15 May 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha2/openssl-3.0.0-alpha2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha2/openssl-3.0.0-alpha2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha2/openssl-3.0.0-alpha2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha1/openssl-3.0.0-alpha1.tar.gz">openssl-3.0.0-alpha1.tar.gz</a></td>
<td>9.1MiB</td>
<td>23 Apr 2020</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha1/openssl-3.0.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha1/openssl-3.0.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.0.0-alpha1/openssl-3.0.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.1 releases
https://openssl-library.org/source/old/3.1/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.1/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.8/openssl-3.1.8.tar.gz">openssl-3.1.8.tar.gz</a></td>
<td>15.0MiB</td>
<td>11 Feb 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.8/openssl-3.1.8.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.8/openssl-3.1.8.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.8/openssl-3.1.8.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.7/openssl-3.1.7.tar.gz">openssl-3.1.7.tar.gz</a></td>
<td>15.0MiB</td>
<td>03 Sep 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.7/openssl-3.1.7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.7/openssl-3.1.7.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.7/openssl-3.1.7.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.6/openssl-3.1.6.tar.gz">openssl-3.1.6.tar.gz</a></td>
<td>14.9MiB</td>
<td>04 Jun 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.6/openssl-3.1.6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.6/openssl-3.1.6.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.6/openssl-3.1.6.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.5/openssl-3.1.5.tar.gz">openssl-3.1.5.tar.gz</a></td>
<td>14.9MiB</td>
<td>30 Jan 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.5/openssl-3.1.5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.5/openssl-3.1.5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.5/openssl-3.1.5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.4/openssl-3.1.4.tar.gz">openssl-3.1.4.tar.gz</a></td>
<td>14.8MiB</td>
<td>24 Oct 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.4/openssl-3.1.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.4/openssl-3.1.4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.4/openssl-3.1.4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.3/openssl-3.1.3.tar.gz">openssl-3.1.3.tar.gz</a></td>
<td>14.8MiB</td>
<td>19 Sep 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.3/openssl-3.1.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.3/openssl-3.1.3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.3/openssl-3.1.3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.2/openssl-3.1.2.tar.gz">openssl-3.1.2.tar.gz</a></td>
<td>14.8MiB</td>
<td>01 Aug 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.2/openssl-3.1.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.2/openssl-3.1.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.2/openssl-3.1.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.1/openssl-3.1.1.tar.gz">openssl-3.1.1.tar.gz</a></td>
<td>14.8MiB</td>
<td>30 May 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.1/openssl-3.1.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.1/openssl-3.1.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.1/openssl-3.1.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0/openssl-3.1.0.tar.gz">openssl-3.1.0.tar.gz</a></td>
<td>14.8MiB</td>
<td>14 Mar 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0/openssl-3.1.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0/openssl-3.1.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0/openssl-3.1.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-beta1/openssl-3.1.0-beta1.tar.gz">openssl-3.1.0-beta1.tar.gz</a></td>
<td>14.8MiB</td>
<td>21 Dec 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-beta1/openssl-3.1.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-beta1/openssl-3.1.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-beta1/openssl-3.1.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-alpha1/openssl-3.1.0-alpha1.tar.gz">openssl-3.1.0-alpha1.tar.gz</a></td>
<td>14.6MiB</td>
<td>01 Dec 2022</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-alpha1/openssl-3.1.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-alpha1/openssl-3.1.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.1.0-alpha1/openssl-3.1.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.2 releases
https://openssl-library.org/source/old/3.2/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.2/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.6/openssl-3.2.6.tar.gz">openssl-3.2.6.tar.gz</a></td>
<td>17.0MiB</td>
<td>30 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.6/openssl-3.2.6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.6/openssl-3.2.6.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.6/openssl-3.2.6.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.5/openssl-3.2.5.tar.gz">openssl-3.2.5.tar.gz</a></td>
<td>17.0MiB</td>
<td>01 Jul 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.5/openssl-3.2.5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.5/openssl-3.2.5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.5/openssl-3.2.5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.4/openssl-3.2.4.tar.gz">openssl-3.2.4.tar.gz</a></td>
<td>17.0MiB</td>
<td>11 Feb 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.4/openssl-3.2.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.4/openssl-3.2.4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.4/openssl-3.2.4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.3/openssl-3.2.3.tar.gz">openssl-3.2.3.tar.gz</a></td>
<td>16.9MiB</td>
<td>03 Sep 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.3/openssl-3.2.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.3/openssl-3.2.3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.3/openssl-3.2.3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.2/openssl-3.2.2.tar.gz">openssl-3.2.2.tar.gz</a></td>
<td>16.9MiB</td>
<td>04 Jun 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.2/openssl-3.2.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.2/openssl-3.2.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.2/openssl-3.2.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.1/openssl-3.2.1.tar.gz">openssl-3.2.1.tar.gz</a></td>
<td>16.9MiB</td>
<td>30 Jan 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.1/openssl-3.2.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.1/openssl-3.2.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.1/openssl-3.2.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0/openssl-3.2.0.tar.gz">openssl-3.2.0.tar.gz</a></td>
<td>16.9MiB</td>
<td>23 Nov 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0/openssl-3.2.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0/openssl-3.2.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0/openssl-3.2.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-beta1/openssl-3.2.0-beta1.tar.gz">openssl-3.2.0-beta1.tar.gz</a></td>
<td>16.8MiB</td>
<td>26 Oct 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-beta1/openssl-3.2.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-beta1/openssl-3.2.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-beta1/openssl-3.2.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha2/openssl-3.2.0-alpha2.tar.gz">openssl-3.2.0-alpha2.tar.gz</a></td>
<td>16.8MiB</td>
<td>28 Sep 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha2/openssl-3.2.0-alpha2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha2/openssl-3.2.0-alpha2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha2/openssl-3.2.0-alpha2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha1/openssl-3.2.0-alpha1.tar.gz">openssl-3.2.0-alpha1.tar.gz</a></td>
<td>16.7MiB</td>
<td>07 Sep 2023</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha1/openssl-3.2.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha1/openssl-3.2.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.2.0-alpha1/openssl-3.2.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.3 releases
https://openssl-library.org/source/old/3.3/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.3/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.7/openssl-3.3.7.tar.gz">openssl-3.3.7.tar.gz</a></td>
<td>17.2MiB</td>
<td>07 Apr 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.7/openssl-3.3.7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.7/openssl-3.3.7.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.7/openssl-3.3.7.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.6/openssl-3.3.6.tar.gz">openssl-3.3.6.tar.gz</a></td>
<td>17.2MiB</td>
<td>27 Jan 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.6/openssl-3.3.6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.6/openssl-3.3.6.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.6/openssl-3.3.6.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.5/openssl-3.3.5.tar.gz">openssl-3.3.5.tar.gz</a></td>
<td>17.3MiB</td>
<td>30 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.5/openssl-3.3.5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.5/openssl-3.3.5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.5/openssl-3.3.5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.4/openssl-3.3.4.tar.gz">openssl-3.3.4.tar.gz</a></td>
<td>17.3MiB</td>
<td>01 Jul 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.4/openssl-3.3.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.4/openssl-3.3.4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.4/openssl-3.3.4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.3/openssl-3.3.3.tar.gz">openssl-3.3.3.tar.gz</a></td>
<td>17.3MiB</td>
<td>11 Feb 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.3/openssl-3.3.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.3/openssl-3.3.3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.3/openssl-3.3.3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.2/openssl-3.3.2.tar.gz">openssl-3.3.2.tar.gz</a></td>
<td>17.2MiB</td>
<td>03 Sep 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.2/openssl-3.3.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.2/openssl-3.3.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.2/openssl-3.3.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.1/openssl-3.3.1.tar.gz">openssl-3.3.1.tar.gz</a></td>
<td>17.2MiB</td>
<td>04 Jun 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.1/openssl-3.3.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.1/openssl-3.3.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.1/openssl-3.3.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0/openssl-3.3.0.tar.gz">openssl-3.3.0.tar.gz</a></td>
<td>17.2MiB</td>
<td>09 Apr 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0/openssl-3.3.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0/openssl-3.3.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0/openssl-3.3.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-beta1/openssl-3.3.0-beta1.tar.gz">openssl-3.3.0-beta1.tar.gz</a></td>
<td>17.2MiB</td>
<td>29 Mar 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-beta1/openssl-3.3.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-beta1/openssl-3.3.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-beta1/openssl-3.3.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-alpha1/openssl-3.3.0-alpha1.tar.gz">openssl-3.3.0-alpha1.tar.gz</a></td>
<td>17.2MiB</td>
<td>20 Mar 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-alpha1/openssl-3.3.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-alpha1/openssl-3.3.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.3.0-alpha1/openssl-3.3.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.4 releases
https://openssl-library.org/source/old/3.4/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.4/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.4/openssl-3.4.4.tar.gz">openssl-3.4.4.tar.gz</a></td>
<td>17.4MiB</td>
<td>27 Jan 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.4/openssl-3.4.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.4/openssl-3.4.4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.4/openssl-3.4.4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.3/openssl-3.4.3.tar.gz">openssl-3.4.3.tar.gz</a></td>
<td>17.5MiB</td>
<td>30 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.3/openssl-3.4.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.3/openssl-3.4.3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.3/openssl-3.4.3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.2/openssl-3.4.2.tar.gz">openssl-3.4.2.tar.gz</a></td>
<td>17.5MiB</td>
<td>01 Jul 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.2/openssl-3.4.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.2/openssl-3.4.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.2/openssl-3.4.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.1/openssl-3.4.1.tar.gz">openssl-3.4.1.tar.gz</a></td>
<td>17.5MiB</td>
<td>11 Feb 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.1/openssl-3.4.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.1/openssl-3.4.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.1/openssl-3.4.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0/openssl-3.4.0.tar.gz">openssl-3.4.0.tar.gz</a></td>
<td>17.5MiB</td>
<td>22 Oct 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0/openssl-3.4.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0/openssl-3.4.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0/openssl-3.4.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-beta1/openssl-3.4.0-beta1.tar.gz">openssl-3.4.0-beta1.tar.gz</a></td>
<td>17.5MiB</td>
<td>07 Oct 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-beta1/openssl-3.4.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-beta1/openssl-3.4.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-beta1/openssl-3.4.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-alpha1/openssl-3.4.0-alpha1.tar.gz">openssl-3.4.0-alpha1.tar.gz</a></td>
<td>17.5MiB</td>
<td>05 Sep 2024</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-alpha1/openssl-3.4.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-alpha1/openssl-3.4.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.4.0-alpha1/openssl-3.4.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.5 releases
https://openssl-library.org/source/old/3.5/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.5/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.5/openssl-3.5.5.tar.gz">openssl-3.5.5.tar.gz</a></td>
<td>50.6MiB</td>
<td>27 Jan 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.5/openssl-3.5.5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.5/openssl-3.5.5.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.5/openssl-3.5.5.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.4/openssl-3.5.4.tar.gz">openssl-3.5.4.tar.gz</a></td>
<td>50.7MiB</td>
<td>30 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.4/openssl-3.5.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.4/openssl-3.5.4.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.4/openssl-3.5.4.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.3/openssl-3.5.3.tar.gz">openssl-3.5.3.tar.gz</a></td>
<td>50.7MiB</td>
<td>16 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.3/openssl-3.5.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.3/openssl-3.5.3.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.3/openssl-3.5.3.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.2/openssl-3.5.2.tar.gz">openssl-3.5.2.tar.gz</a></td>
<td>50.7MiB</td>
<td>05 Aug 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.2/openssl-3.5.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.2/openssl-3.5.2.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.2/openssl-3.5.2.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.1/openssl-3.5.1.tar.gz">openssl-3.5.1.tar.gz</a></td>
<td>50.7MiB</td>
<td>01 Jul 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.1/openssl-3.5.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.1/openssl-3.5.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.1/openssl-3.5.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0/openssl-3.5.0.tar.gz">openssl-3.5.0.tar.gz</a></td>
<td>50.7MiB</td>
<td>08 Apr 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0/openssl-3.5.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0/openssl-3.5.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0/openssl-3.5.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-beta1/openssl-3.5.0-beta1.tar.gz">openssl-3.5.0-beta1.tar.gz</a></td>
<td>50.7MiB</td>
<td>25 Mar 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-beta1/openssl-3.5.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-beta1/openssl-3.5.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-beta1/openssl-3.5.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-alpha1/openssl-3.5.0-alpha1.tar.gz">openssl-3.5.0-alpha1.tar.gz</a></td>
<td>50.7MiB</td>
<td>12 Mar 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-alpha1/openssl-3.5.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-alpha1/openssl-3.5.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.5.0-alpha1/openssl-3.5.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 3.6 releases
https://openssl-library.org/source/old/3.6/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/3.6/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.1/openssl-3.6.1.tar.gz">openssl-3.6.1.tar.gz</a></td>
<td>52.3MiB</td>
<td>27 Jan 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.1/openssl-3.6.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.1/openssl-3.6.1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.1/openssl-3.6.1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0/openssl-3.6.0.tar.gz">openssl-3.6.0.tar.gz</a></td>
<td>52.4MiB</td>
<td>01 Oct 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0/openssl-3.6.0.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0/openssl-3.6.0.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0/openssl-3.6.0.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-beta1/openssl-3.6.0-beta1.tar.gz">openssl-3.6.0-beta1.tar.gz</a></td>
<td>52.4MiB</td>
<td>16 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-beta1/openssl-3.6.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-beta1/openssl-3.6.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-beta1/openssl-3.6.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-alpha1/openssl-3.6.0-alpha1.tar.gz">openssl-3.6.0-alpha1.tar.gz</a></td>
<td>52.4MiB</td>
<td>02 Sep 2025</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-alpha1/openssl-3.6.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-alpha1/openssl-3.6.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-3.6.0-alpha1/openssl-3.6.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old 4.0 releases
https://openssl-library.org/source/old/4.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/4.0/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-beta1/openssl-4.0.0-beta1.tar.gz">openssl-4.0.0-beta1.tar.gz</a></td>
<td>52.5MiB</td>
<td>24 Mar 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-beta1/openssl-4.0.0-beta1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-beta1/openssl-4.0.0-beta1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-beta1/openssl-4.0.0-beta1.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-alpha1/openssl-4.0.0-alpha1.tar.gz">openssl-4.0.0-alpha1.tar.gz</a></td>
<td>52.5MiB</td>
<td>10 Mar 2026</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-alpha1/openssl-4.0.0-alpha1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-alpha1/openssl-4.0.0-alpha1.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/openssl-4.0.0-alpha1/openssl-4.0.0-alpha1.tar.gz.sha256">SHA256</a>)</td>
</tr></tbody>
</table>Old fips releases
https://openssl-library.org/source/old/fips/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/fips/<table>
<thead>
<tr>
<th>Filename</th>
<th>Size</th>
<th>Release</th>
<th>Checksums</th>
</tr>
</thead>
<tbody><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_16/openssl-fips-ecp-2.0.16.tar.gz">openssl-fips-ecp-2.0.16.tar.gz</a></td>
<td>1.4MiB</td>
<td>31 Aug 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_16/openssl-fips-ecp-2.0.16.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_16/openssl-fips-ecp-2.0.16.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_16/openssl-fips-ecp-2.0.16.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_15/openssl-fips-ecp-2.0.15.tar.gz">openssl-fips-ecp-2.0.15.tar.gz</a></td>
<td>1.4MiB</td>
<td>30 Aug 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_15/openssl-fips-ecp-2.0.15.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_15/openssl-fips-ecp-2.0.15.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_15/openssl-fips-ecp-2.0.15.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_14/openssl-fips-ecp-2.0.14.tar.gz">openssl-fips-ecp-2.0.14.tar.gz</a></td>
<td>1.4MiB</td>
<td>16 Feb 2017</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_14/openssl-fips-ecp-2.0.14.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_14/openssl-fips-ecp-2.0.14.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_14/openssl-fips-ecp-2.0.14.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_13/openssl-fips-ecp-2.0.13.tar.gz">openssl-fips-ecp-2.0.13.tar.gz</a></td>
<td>1.4MiB</td>
<td>14 Nov 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_13/openssl-fips-ecp-2.0.13.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_13/openssl-fips-ecp-2.0.13.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_13/openssl-fips-ecp-2.0.13.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_12/openssl-fips-ecp-2.0.12.tar.gz">openssl-fips-ecp-2.0.12.tar.gz</a></td>
<td>1.4MiB</td>
<td>15 Feb 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_12/openssl-fips-ecp-2.0.12.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_12/openssl-fips-ecp-2.0.12.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_12/openssl-fips-ecp-2.0.12.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_11/openssl-fips-ecp-2.0.11.tar.gz">openssl-fips-ecp-2.0.11.tar.gz</a></td>
<td>1.4MiB</td>
<td>15 Feb 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_11/openssl-fips-ecp-2.0.11.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_11/openssl-fips-ecp-2.0.11.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_11/openssl-fips-ecp-2.0.11.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_10/openssl-fips-ecp-2.0.10.tar.gz">openssl-fips-ecp-2.0.10.tar.gz</a></td>
<td>1.4MiB</td>
<td>15 Feb 2016</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_10/openssl-fips-ecp-2.0.10.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_10/openssl-fips-ecp-2.0.10.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_10/openssl-fips-ecp-2.0.10.tar.gz.sha1">SHA1</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_10/openssl-fips-ecp-2.0.10.tar.gz.sha256">SHA256</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_9/openssl-fips-ecp-2.0.9.tar.gz">openssl-fips-ecp-2.0.9.tar.gz</a></td>
<td>1.3MiB</td>
<td>14 May 2015</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_9/openssl-fips-ecp-2.0.9.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_9/openssl-fips-ecp-2.0.9.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_9/openssl-fips-ecp-2.0.9.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_8/openssl-fips-ecp-2.0.8.tar.gz">openssl-fips-ecp-2.0.8.tar.gz</a></td>
<td>1.3MiB</td>
<td>24 Oct 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_8/openssl-fips-ecp-2.0.8.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_8/openssl-fips-ecp-2.0.8.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_8/openssl-fips-ecp-2.0.8.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_7/openssl-fips-ecp-2.0.7.tar.gz">openssl-fips-ecp-2.0.7.tar.gz</a></td>
<td>1.4MiB</td>
<td>11 Jul 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_7/openssl-fips-ecp-2.0.7.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_7/openssl-fips-ecp-2.0.7.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_7/openssl-fips-ecp-2.0.7.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_6/openssl-fips-ecp-2.0.6.tar.gz">openssl-fips-ecp-2.0.6.tar.gz</a></td>
<td>1.3MiB</td>
<td>12 May 2014</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_6/openssl-fips-ecp-2.0.6.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_6/openssl-fips-ecp-2.0.6.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_6/openssl-fips-ecp-2.0.6.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_4/openssl-fips-ecp-2.0.4.tar.gz">openssl-fips-ecp-2.0.4.tar.gz</a></td>
<td>1.4MiB</td>
<td>16 Dec 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_4/openssl-fips-ecp-2.0.4.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_4/openssl-fips-ecp-2.0.4.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_4/openssl-fips-ecp-2.0.4.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_5/openssl-fips-ecp-2.0.5.tar.gz">openssl-fips-ecp-2.0.5.tar.gz</a></td>
<td>1.4MiB</td>
<td>16 Dec 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_5/openssl-fips-ecp-2.0.5.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_5/openssl-fips-ecp-2.0.5.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_5/openssl-fips-ecp-2.0.5.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_3/openssl-fips-ecp-2.0.3.tar.gz">openssl-fips-ecp-2.0.3.tar.gz</a></td>
<td>1.4MiB</td>
<td>10 Apr 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_3/openssl-fips-ecp-2.0.3.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_3/openssl-fips-ecp-2.0.3.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_3/openssl-fips-ecp-2.0.3.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_2/openssl-fips-ecp-2.0.2.tar.gz">openssl-fips-ecp-2.0.2.tar.gz</a></td>
<td>1.4MiB</td>
<td>10 Apr 2013</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_2/openssl-fips-ecp-2.0.2.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_2/openssl-fips-ecp-2.0.2.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_2/openssl-fips-ecp-2.0.2.tar.gz.sha1">SHA1</a>)</td>
</tr><tr>
<td><a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_1/openssl-fips-ecp-2.0.1.tar.gz">openssl-fips-ecp-2.0.1.tar.gz</a></td>
<td>1.4MiB</td>
<td>04 Oct 2012</td>
<td class="text-base">(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_1/openssl-fips-ecp-2.0.1.tar.gz.md5">MD5</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_1/openssl-fips-ecp-2.0.1.tar.gz.asc">PGP</a>)(<a href="https://github.com/openssl/openssl/releases/download/OpenSSL-fips-2_0_1/openssl-fips-ecp-2.0.1.tar.gz.sha1">SHA1</a>)</td>
</tr></tbody>
</table>Old Releases
https://openssl-library.org/source/old/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/source/old/<p>Here are the old releases.</p>
<ul><li><a href="4.0/">4.0</a></li><li><a href="3.6/">3.6</a></li><li><a href="3.5/">3.5</a></li><li><a href="3.4/">3.4</a></li><li><a href="3.3/">3.3</a></li><li><a href="3.2/">3.2</a></li><li><a href="3.1/">3.1</a></li><li><a href="3.0/">3.0</a></li><li><a href="1.1.1/">1.1.1</a></li><li><a href="1.1.0/">1.1.0</a></li><li><a href="1.0.2/">1.0.2</a></li><li><a href="1.0.1/">1.0.1</a></li><li><a href="1.0.0/">1.0.0</a></li><li><a href="0.9.x/">0.9.x</a></li><li><a href="fips/">fips</a></li></ul>
<h2 id="legalities">Legalities</h2>
<p>Export/import and/or use of cryptography software, cryptographic hooks, or
technical details about cryptography may be restricted in some parts of the world.
<br/>
It is <strong>your</strong> responsibility to determine the legal
status of <em>your</em> usage or participation.</p>OMC
https://openssl-library.org/community/omc/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/omc/<h1 id="openssl-management-committee">OpenSSL Management Committee</h1>
<p>The <a href="https://openssl-library.org/policies/omc-bylaws#OMC">OpenSSL Management Committee</a>
represents the official voice of the project. All official OMC decisions
are taken on the basis of a vote.</p>
<p>The current OMC consists of (in alphabetical order):</p>
<table>
<thead>
<tr>
<th>Name</th>
<th></th>
<th>Email</th>
<th></th>
<th>Locale</th>
<th></th>
<th>PGP Key ID</th>
</tr>
</thead>
<tbody>
<tr>
<td>Anton Arapov</td>
<td></td>
<td><a href="mailto:[email protected]">[email protected]</a></td>
<td></td>
<td>CZ</td>
<td></td>
<td><a href="https://keys.openpgp.org/search?q=134C02E813889057DA2F3FDBEDDD4C5DAA149BBE">134C 02E8 1388 9057 DA2F 3FDB EDDD 4C5D AA14 9BBE</a></td>
</tr>
<tr>
<td>Matt Caswell</td>
<td></td>
<td><a href="mailto:[email protected]">[email protected]</a></td>
<td></td>
<td>UK</td>
<td></td>
<td><a href="https://keys.openpgp.org/search?q=8657ABB260F056B1E5190839D9C4D26D0E604491">8657 ABB2 60F0 56B1 E519 0839 D9C4 D26D 0E60 4491</a></td>
</tr>
<tr>
<td>Tim Hudson</td>
<td></td>
<td><a href="mailto:[email protected]">[email protected]</a></td>
<td></td>
<td>AU</td>
<td></td>
<td><a href="https://keys.openpgp.org/search?q=C1F33DD8CE1D4CC613AF14DA9195C48241FBF7DD">C1F3 3DD8 CE1D 4CC6 13AF 14DA 9195 C482 41FB F7DD</a></td>
</tr>
<tr>
<td>Richard Levitte</td>
<td></td>
<td><a href="mailto:[email protected]">[email protected]</a></td>
<td></td>
<td>SE</td>
<td></td>
<td><a href="https://keys.openpgp.org/search?q=7953AC1FBC3DC8B3B292393ED5E9E43F7DF9EE8C">7953 AC1F BC3D C8B3 B292 393E D5E9 E43F 7DF9 EE8C</a></td>
</tr>
<tr>
<td>Kurt Roeckx</td>
<td></td>
<td><a href="mailto:[email protected]">[email protected]</a></td>
<td></td>
<td>BE</td>
<td></td>
<td><a href="https://keys.openpgp.org/search?q=E5E52560DD91C556DDBDA5D02064C53641C25E5D">E5E5 2560 DD91 C556 DDBD A5D0 2064 C536 41C2 5E5D</a></td>
</tr>
</tbody>
</table>
<p>Names with an (I) are currently inactive as defined in our
<a href="https://openssl-library.org/policies/omc-bylaws">bylaws</a>.</p>OMC Alumni
https://openssl-library.org/community/omc-alumni/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/omc-alumni/<h1 id="openssl-management-committee---alumni">OpenSSL Management Committee - Alumni</h1>
<p>We gratefully acknowledge the contributions of the following alumni (who
were previously in the OMC, or a team member or founder prior to
creation of the OMC):</p>
<table>
<thead>
<tr>
<th>Name</th>
<th></th>
<th>Locale</th>
</tr>
</thead>
<tbody>
<tr>
<td>Mark J. Cox</td>
<td></td>
<td>UK</td>
</tr>
<tr>
<td>Paul Dale</td>
<td></td>
<td>AU</td>
</tr>
<tr>
<td>Viktor Dukhovni</td>
<td></td>
<td>US</td>
</tr>
<tr>
<td>Dr. Stephen Henson (OMC Emeritus)</td>
<td></td>
<td>UK</td>
</tr>
<tr>
<td>Lutz Jänicke</td>
<td></td>
<td>DE</td>
</tr>
<tr>
<td>Emilia Käsper</td>
<td></td>
<td>CH</td>
</tr>
<tr>
<td>Ben Laurie</td>
<td></td>
<td>UK</td>
</tr>
<tr>
<td>Steve Marquess</td>
<td></td>
<td>US</td>
</tr>
<tr>
<td>Bodo Möller</td>
<td></td>
<td>CH</td>
</tr>
<tr>
<td>Andy Polyakov</td>
<td></td>
<td>SE</td>
</tr>
<tr>
<td>Rich Salz</td>
<td></td>
<td>US</td>
</tr>
<tr>
<td>Geoff Thorpe</td>
<td></td>
<td>QC</td>
</tr>
</tbody>
</table>
<p>We also respectfully remember Ulf Möller who is no longer with us.</p>OpenSSL 1.1.1 Series Release Notes
https://openssl-library.org/news/openssl-1.1.1-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-1.1.1-notes/<p>The major changes and known issues for the 1.1.1 branch of the OpenSSL toolkit are summarised below.
The contents reflect the current state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a>
file inside the git repository. More details can be found in the
<a href="https://github.com/openssl/openssl/blob/OpenSSL_1_1_1-stable/CHANGES">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-111v-and-openssl-111w-11-sep-2023">Major changes between OpenSSL 1.1.1v and OpenSSL 1.1.1w [11 Sep 2023]</h2>
<ul>
<li>Fix POLY1305 MAC implementation corrupting XMM registers on Windows
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-4807">CVE-2023-4807</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111u-and-openssl-111v-1-aug-2023">Major changes between OpenSSL 1.1.1u and OpenSSL 1.1.1v [1 Aug 2023]</h2>
<ul>
<li>Fix excessive time spent checking DH q parameter value (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-3817">CVE-2023-3817</a>)</li>
<li>Fix DH_check() excessive time with over sized modulus (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-3446">CVE-2023-3446</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111t-and-openssl-111u-30-may-2023">Major changes between OpenSSL 1.1.1t and OpenSSL 1.1.1u [30 May 2023]</h2>
<ul>
<li>Mitigate for very slow <code>OBJ_obj2txt()</code> performance with gigantic
OBJECT IDENTIFIER sub-identities. (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-2650">CVE-2023-2650</a>)</li>
<li>Fixed documentation of X509_VERIFY_PARAM_add0_policy() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0466">CVE-2023-0466</a>)</li>
<li>Fixed handling of invalid certificate policies in leaf certificates
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0465">CVE-2023-0465</a>)</li>
<li>Limited the number of nodes created in a policy tree ([<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0464">CVE-2023-0464</a>])</li>
</ul>
<h2 id="major-changes-between-openssl-111s-and-openssl-111t-7-feb-2023">Major changes between OpenSSL 1.1.1s and OpenSSL 1.1.1t [7 Feb 2023]</h2>
<ul>
<li>Fixed X.400 address type confusion in X.509 GeneralName (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0286">CVE-2023-0286</a>)</li>
<li>Fixed Use-after-free following BIO_new_NDEF (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0215">CVE-2023-0215</a>)</li>
<li>Fixed Double free after calling PEM_read_bio_ex (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4450">CVE-2022-4450</a>)</li>
<li>Fixed Timing Oracle in RSA Decryption (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4304">CVE-2022-4304</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111r-and-openssl-111s-1-nov-2022">Major changes between OpenSSL 1.1.1r and OpenSSL 1.1.1s [1 Nov 2022]</h2>
<ul>
<li>Fixed a regression introduced in OpenSSL 1.1.1r not refreshing the
certificate data to be signed before signing the certificate.</li>
</ul>
<h2 id="major-changes-between-openssl-111q-and-openssl-111r-11-oct-2022">Major changes between OpenSSL 1.1.1q and OpenSSL 1.1.1r [11 Oct 2022]</h2>
<ul>
<li>Added a missing header for memcmp that caused compilation failure on
some platforms</li>
</ul>
<h2 id="major-changes-between-openssl-111p-and-openssl-111q-5-jul-2022">Major changes between OpenSSL 1.1.1p and OpenSSL 1.1.1q [5 Jul 2022]</h2>
<ul>
<li>Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2097">CVE-2022-2097</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111o-and-openssl-111p-21-jun-2022">Major changes between OpenSSL 1.1.1o and OpenSSL 1.1.1p [21 Jun 2022]</h2>
<ul>
<li>Fixed additional bugs in the c_rehash script which was not properly
sanitising shell metacharacters to prevent command injection
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2068">CVE-2022-2068</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111n-and-openssl-111o-3-may-2022">Major changes between OpenSSL 1.1.1n and OpenSSL 1.1.1o [3 May 2022]</h2>
<ul>
<li>Fixed a bug in the c_rehash script which was not properly sanitising
shell metacharacters to prevent command injection (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1292">CVE-2022-1292</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111m-and-openssl-111n-15-mar-2022">Major changes between OpenSSL 1.1.1m and OpenSSL 1.1.1n [15 Mar 2022]</h2>
<ul>
<li>Fixed a bug in the BN_mod_sqrt() function that can cause it to loop
forever for non-prime moduli (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-0778">CVE-2022-0778</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111l-and-openssl-111m-14-dec-2021">Major changes between OpenSSL 1.1.1l and OpenSSL 1.1.1m [14 Dec 2021]</h2>
<ul>
<li>None</li>
</ul>
<h2 id="major-changes-between-openssl-111k-and-openssl-111l-24-aug-2021">Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021]</h2>
<ul>
<li>Fixed an SM2 Decryption Buffer Overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3711">CVE-2021-3711</a>)</li>
<li>Fixed various read buffer overruns processing ASN.1 strings (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3712">CVE-2021-3712</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111j-and-openssl-111k-25-mar-2021">Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021]</h2>
<ul>
<li>Fixed a problem with verifying a certificate chain when using the
X509_V_FLAG_X509_STRICT flag (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3450">CVE-2021-3450</a>)</li>
<li>Fixed an issue where an OpenSSL TLS server may crash if sent a
maliciously crafted renegotiation ClientHello message from a client
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3449">CVE-2021-3449</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111i-and-openssl-111j-16-feb-2021">Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021]</h2>
<ul>
<li>Fixed a NULL pointer deref in the X509_issuer_and_serial_hash()
function (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-23841">CVE-2021-23841</a>)</li>
<li>Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
padding mode to correctly check for rollback attacks</li>
<li>Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
EVP_DecryptUpdate functions (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-23840">CVE-2021-23840</a>)</li>
<li>Fixed SRP_Calc_client_key so that it runs in constant time</li>
</ul>
<h2 id="major-changes-between-openssl-111h-and-openssl-111i-8-dec-2020">Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020]</h2>
<ul>
<li>Fixed NULL pointer deref in GENERAL_NAME_cmp (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2020-1971">CVE-2020-1971</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111g-and-openssl-111h-22-sep-2020">Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020]</h2>
<ul>
<li>Disallow explicit curve parameters in verifications chains when
X509_V_FLAG_X509_STRICT is used</li>
<li>Enable ‘MinProtocol’ and ‘MaxProtocol’ to configure both TLS and DTLS
contexts</li>
<li>Oracle Developer Studio will start reporting deprecation warnings</li>
</ul>
<h2 id="major-changes-between-openssl-111f-and-openssl-111g-21-apr-2020">Major changes between OpenSSL 1.1.1f and OpenSSL 1.1.1g [21 Apr 2020]</h2>
<ul>
<li>Fixed segmentation fault in SSL_check_chain() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2020-1967">CVE-2020-1967</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111e-and-openssl-111f-31-mar-2020">Major changes between OpenSSL 1.1.1e and OpenSSL 1.1.1f [31 Mar 2020]</h2>
<ul>
<li>Revert the unexpected EOF reporting via SSL_ERROR_SSL</li>
</ul>
<h2 id="major-changes-between-openssl-111d-and-openssl-111e-17-mar-2020">Major changes between OpenSSL 1.1.1d and OpenSSL 1.1.1e [17 Mar 2020]</h2>
<ul>
<li>Fixed an overflow bug in the x64_64 Montgomery squaring procedure
used in exponentiation with 512-bit moduli (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1551">CVE-2019-1551</a>)</li>
<li>Properly detect unexpected EOF while reading in libssl and report
it via SSL_ERROR_SSL</li>
</ul>
<h2 id="major-changes-between-openssl-111c-and-openssl-111d-10-sep-2019">Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [10 Sep 2019]</h2>
<ul>
<li>Fixed a fork protection issue (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1549">CVE-2019-1549</a>)</li>
<li>Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1563">CVE-2019-1563</a>)</li>
<li>For built-in EC curves, ensure an EC_GROUP built from the curve name is
used even when parsing explicit parameters</li>
<li>Compute ECC cofactors if not provided during EC_GROUP construction
(<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1547">CVE-2019-1547</a>)</li>
<li>Early start up entropy quality from the DEVRANDOM seed source has been
improved for older Linux systems</li>
<li>Correct the extended master secret constant on EBCDIC systems</li>
<li>Use Windows installation paths in the mingw builds (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1552">CVE-2019-1552</a>)</li>
<li>Changed DH_check to accept parameters with order q and 2q subgroups</li>
<li>Significantly reduce secure memory usage by the randomness pools</li>
<li>Revert the DEVRANDOM_WAIT feature for Linux systems</li>
</ul>
<h2 id="major-changes-between-openssl-111b-and-openssl-111c-28-may-2019">Major changes between OpenSSL 1.1.1b and OpenSSL 1.1.1c [28 May 2019]</h2>
<ul>
<li>Prevent over long nonces in ChaCha20-Poly1305 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1543">CVE-2019-1543</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-111a-and-openssl-111b-26-feb-2019">Major changes between OpenSSL 1.1.1a and OpenSSL 1.1.1b [26 Feb 2019]</h2>
<ul>
<li>Change the info callback signals for the start and end of a post-handshake
message exchange in TLSv1.3.</li>
<li>Fix a bug in DTLS over SCTP. This breaks interoperability with older versions
of OpenSSL like OpenSSL 1.1.0 and OpenSSL 1.0.2.</li>
</ul>
<h2 id="major-changes-between-openssl-111-and-openssl-111a-20-nov-2018">Major changes between OpenSSL 1.1.1 and OpenSSL 1.1.1a [20 Nov 2018]</h2>
<ul>
<li>Timing vulnerability in DSA signature generation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0734">CVE-2018-0734</a>)</li>
<li>Timing vulnerability in ECDSA signature generation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0735">CVE-2018-0735</a>)</li>
</ul>
<h2 id="major-changes-between-openssl-110i-and-openssl-111-11-sep-2018">Major changes between OpenSSL 1.1.0i and OpenSSL 1.1.1 [11 Sep 2018]</h2>
<ul>
<li>Support for TLSv1.3 added (see <a href="https://wiki.openssl.org/index.php/TLS1.3">https://wiki.openssl.org/index.php/TLS1.3</a>
for further important information). The TLSv1.3 implementation includes:</li>
<li>Fully compliant implementation of RFC8446 (TLSv1.3) on by default</li>
<li>Early data (0-RTT)</li>
<li>Post-handshake authentication and key update</li>
<li>Middlebox Compatibility Mode</li>
<li>TLSv1.3 PSKs</li>
<li>Support for all five RFC8446 ciphersuites</li>
<li>RSA-PSS signature algorithms (backported to TLSv1.2)</li>
<li>Configurable session ticket support</li>
<li>Stateless server support</li>
<li>Rewrite of the packet construction code for “safer” packet handling</li>
<li>Rewrite of the extension handling code</li>
<li>Complete rewrite of the OpenSSL random number generator to introduce the
following capabilities</li>
<li>The default RAND method now utilizes an AES-CTR DRBG according to
NIST standard SP 800-90Ar1.</li>
<li>Support for multiple DRBG instances with seed chaining.</li>
<li>There is a public and private DRBG instance.</li>
<li>The DRBG instances are fork-safe.</li>
<li>Keep all global DRBG instances on the secure heap if it is enabled.</li>
<li>The public and private DRBG instance are per thread for lock free
operation</li>
<li>Support for various new cryptographic algorithms including:</li>
<li>SHA3</li>
<li>SHA512/224 and SHA512/256</li>
<li>EdDSA (both Ed25519 and Ed448) including X509 and TLS support</li>
<li>X448 (adding to the existing X25519 support in 1.1.0)</li>
<li>Multi-prime RSA</li>
<li>SM2</li>
<li>SM3</li>
<li>SM4</li>
<li>SipHash</li>
<li>ARIA (including TLS support)</li>
<li>Significant Side-Channel attack security improvements</li>
<li>Add a new ClientHello callback to provide the ability to adjust the SSL
object at an early stage.</li>
<li>Add ‘Maximum Fragment Length’ TLS extension negotiation and support</li>
<li>A new STORE module, which implements a uniform and URI based reader of
stores that can contain keys, certificates, CRLs and numerous other
objects.</li>
<li>Move the display of configuration data to configdata.pm.</li>
<li>Allow GNU style “make variables” to be used with Configure.</li>
<li>Claim the namespaces OSSL and OPENSSL, represented as symbol prefixes</li>
<li>Rewrite of devcrypto engine</li>
</ul>OpenSSL 3.0 Series Release Notes
https://openssl-library.org/news/openssl-3.0-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.0-notes/<p>The major changes and known issues for the 3.0 branch of the
OpenSSL toolkit are summarised below. The contents reflect the
current state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a>
file inside the git repository. More details can be found in the
<a href="https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-3019-and-openssl-3020-7-apr-2026">Major changes between OpenSSL 3.0.19 and OpenSSL 3.0.20 [7 Apr 2026]</h2>
<p>OpenSSL 3.0.20 is a security patch release. The most severe CVE fixed in this
release is Moderate.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL 3.1 Series Release Notes
https://openssl-library.org/news/openssl-3.1-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.1-notes/<p>The major changes and known issues for the 3.1 branch of the
OpenSSL toolkit are summarised below. The contents reflect the
current state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a>
file inside the git repository. More details can be found in the
<a href="https://github.com/openssl/openssl/blob/openssl-3.1/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-317-and-openssl-318-11-feb-2025">Major changes between OpenSSL 3.1.7 and OpenSSL 3.1.8 [11 Feb 2025]</h2>
<p>OpenSSL 3.1.8 is a security patch release. The most severe CVE fixed in this
release is Low.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL 3.2 Series Release Notes
https://openssl-library.org/news/openssl-3.2-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.2-notes/<p>The major changes and known issues for the 3.2 branch of the
OpenSSL toolkit are summarised below. The contents reflect the
current state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a>
file inside the git repository. More details can be found in the
<a href="https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-325-and-openssl-326-30-sep-2025">Major changes between OpenSSL 3.2.5 and OpenSSL 3.2.6 [30 Sep 2025]</h2>
<p>OpenSSL 3.2.6 is a security patch release. The most severe CVE fixed in this
release is Moderate.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL 3.3 Series Release Notes
https://openssl-library.org/news/openssl-3.3-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.3-notes/<p>The major changes and known issues for the 3.3 branch of the
OpenSSL toolkit are summarised below. The contents reflect the current
state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a> file inside the
git repository.</p>
<p>More details can be found in the <a href="https://github.com/openssl/openssl/blob/openssl-3.3/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-336-and-openssl-337-7-apr-2026">Major changes between OpenSSL 3.3.6 and OpenSSL 3.3.7 [7 Apr 2026]</h2>
<p>OpenSSL 3.3.7 is a security patch release. The most severe CVE fixed in this
release is Moderate.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL 3.4 Series Release Notes
https://openssl-library.org/news/openssl-3.4-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.4-notes/<p>The major changes and known issues for the 3.4 branch of the
OpenSSL toolkit are summarised below. The contents reflect the current
state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a> file inside the
git repository.</p>
<p>More details can be found in the <a href="https://github.com/openssl/openssl/blob/openssl-3.4/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-344-and-openssl-345-7-apr-2026">Major changes between OpenSSL 3.4.4 and OpenSSL 3.4.5 [7 Apr 2026]</h2>
<p>OpenSSL 3.4.5 is a security patch release. The most severe CVE fixed in this
release is Moderate.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL 3.5 Series Release Notes
https://openssl-library.org/news/openssl-3.5-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.5-notes/<p>The major changes and known issues for the 3.5 branch of the
OpenSSL toolkit are summarised below. The contents reflect the current
state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a> file inside the
git repository.</p>
<p>More details can be found in the <a href="https://github.com/openssl/openssl/blob/openssl-3.5/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-355-and-openssl-356-7-apr-2026">Major changes between OpenSSL 3.5.5 and OpenSSL 3.5.6 [7 Apr 2026]</h2>
<p>OpenSSL 3.5.6 is a security patch release. The most severe CVE fixed in this
release is Moderate.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL 3.6 Series Release Notes
https://openssl-library.org/news/openssl-3.6-notes/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/openssl-3.6-notes/<p>The major changes and known issues for the 3.6 branch of the
OpenSSL toolkit are summarised below. The contents reflect the current
state of the <a href="https://openssl-library.org/policies/general/glossary/#news"><code>NEWS</code></a> file inside the
git repository.</p>
<p>More details can be found in the <a href="https://github.com/openssl/openssl/blob/openssl-3.6/CHANGES.md">ChangeLog</a>.</p>
<h2 id="major-changes-between-openssl-361-and-openssl-362-7-apr-2026">Major changes between OpenSSL 3.6.1 and OpenSSL 3.6.2 [7 Apr 2026]</h2>
<p>OpenSSL 3.6.2 is a security patch release. The most severe CVE fixed in this
release is Moderate.</p>
<p>This release incorporates the following bug fixes and mitigations:</p>OpenSSL coding style
https://openssl-library.org/policies/technical/coding-style/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/coding-style/<p>This document describes the coding style for the OpenSSL project. It is
derived from the <a href="https://www.kernel.org/doc/Documentation/process/coding-style.rst" title="Linux Kernel Coding Style">Linux kernel coding style</a>.</p>
<p>This guide is not distributed as part of OpenSSL itself. Since it is
derived from the Linux Kernel Coding Style, it is distributed under the
terms of the <a href="https://www.kernel.org/pub/linux/kernel/COPYING" title="Linux Kernel License">kernel license</a>.</p>
<p>Coding style is all about readability and maintainability using commonly
available tools. OpenSSL coding style is simple. Avoid tricky expressions.</p>OpenSSL documentation policy
https://openssl-library.org/policies/technical/documentation-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/documentation-policy/<p>This document describes the code documentation and commenting
requirements for the OpenSSL project.</p>
<p>The project’s documentation is all about making the libraries and tools
more accessible to our users and making the code more maintainable.
This policy applies to new submissions, existing code is below par and will
be gradually improved.</p>
<h2 id="chapter-1-command-line-commands-and-arguments">Chapter 1: Command line commands and arguments</h2>
<p>All new or modified arguments to the commands must be documented in the
<code>doc/man1</code> directory. This documentation is in <em>POD</em> format.</p>OpenSSL Library Bylaws
https://openssl-library.org/about/bylaws/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/about/bylaws/<p>This document defines the bylaws under which the OpenSSL Library Project
operates. It defines the different project roles, how they contribute to the
project, and how project decisions are made.</p>
<h2 id="roles-and-responsibilities">Roles and Responsibilities</h2>
<h3 id="users">Users</h3>
<p>Users include any individual or organization that downloads, installs,
compiles, or uses the OpenSSL Library via the libraries or the applications
produced by the project. This includes OpenSSL-library-based derivatives such
as patched versions of the OpenSSL Library provided through OS distributions,
often known as “downstream” versions.</p>OpenSSL release versioning policy
https://openssl-library.org/policies/general/versioning-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/versioning-policy/<p>This document describes the release versioning scheme used by the OpenSSL
project from version 3.0.0 onwards. It also details the level of <a href="https://openssl-library.org/policies/general/glossary/#abi">ABI</a> and
<a href="https://openssl-library.org/policies/general/glossary/#api">API</a> compatibility each version represents.</p>
<blockquote>
<p><em>Note: All examples herein are illustrative and do not constitute part of the
versioning policy.</em></p></blockquote>
<p>The version scheme consists a triple of numbers:
<strong><a href="https://openssl-library.org/policies/general/glossary/#major-release">major</a></strong>.<strong><a href="https://openssl-library.org/policies/general/glossary/#minor-release">minor</a></strong>.<strong><a href="https://openssl-library.org/policies/general/glossary/#patch-release">patch</a></strong>.</p>
<blockquote>
<p>For example, the version <em>3.0.1</em> has a <em>major</em> version of <em>3</em>, a <em>minor</em>
version of <em>0</em> and a <em>patch</em> version of <em>1</em>.</p>Our Mission and Values
https://openssl-library.org/community/mission/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/mission/<h3 id="mission-statement">Mission Statement</h3>
<p>We believe everyone should have access to security and privacy tools, whoever
they are, wherever they are or whatever their personal beliefs are, as a
fundamental human right.</p>
<h3 id="our-values">Our Values</h3>
<ul>
<li>
<p>We believe all our communities are important.</p>
</li>
<li>
<p>We believe in the principles of open source software, not only for its inherent
values but also for the transparency and accountability it provides to our
security and privacy tools.</p>
</li>
<li>
<p>We believe in behaving in a manner that fosters trust and confidence.</p>Our Supporters
https://openssl-library.org/about/sponsors/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/about/sponsors/<h2 id="thank-you">Thank you!</h2>
<p>The <a href="https://openssl.foundation">OpenSSL Foundation</a> is grateful to all of our supporters, whose contributions make our work possible. These dedicated supporters share our vision of a safer and more secure digital world and have put their financial backing behind it.</p>
<hr>
<h2 id="premier-supporters">Premier Supporters</h2>
<p>Premier Supporters have committed $100,000 and above, which represents a significant impact on our ability to fulfill our mission and plan for the future.</p>
<a href="https://openssl-corporation.org/">
<img class="object-contain object-center mx-auto w-[400px] h-[179px]" src="https://openssl-library.org/images/sponsors/openssl_logo_corporation.svg" alt="OpenSSL Corporation" />
</a><a href="https://cisco.com/">
<img class="object-contain object-center mx-auto w-[400px] h-[179px]" src="https://openssl-library.org/images/sponsors/Cisco_Logo_no_TM_Midnight_Blue-RGB.svg" alt="Cisco" />
</a><a href="https://www.sovereign.tech/tech">
<img class="object-contain object-center mx-auto w-[400px] h-[179px]" src="https://openssl-library.org/images/sponsors/ST-Fund-Logo-Default-Black-RGB.svg" alt="Sovereign Tech Fund" />
</a><a href="https://floss.fund/">
<img class="object-contain object-center mx-auto w-[400px] h-[179px]" src="https://openssl-library.org/images/sponsors/floss_fund.svg" alt="FLOSS/fund" />
</a><a href="https://nominet.uk/our-impact/nominet-dns-fund/">
<img class="object-contain object-center mx-auto w-[400px] h-[179px]" src="https://openssl-library.org/images/sponsors/NOMINET_BM_BLACK_RGB.svg" alt="Nominet" />
</a>
<hr>
<h2 id="code-protectors">Code Protectors</h2>
<p>The Code Protectors are corporate associates whose sponsorship gifts fund the
OpenSSL Foundation’s most critical daily operations.</p>Platform Policy
https://openssl-library.org/policies/general/platform-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/platform-policy/<p>Platforms are classified as “primary”, “secondary”, “community”
and “unadopted”. Support for a new platform should only be added if it
is being adopted as a primary, secondary or community platform.</p>
<p><a href="https://openssl-library.org/policies/general-supplemental/platforms/">Current platforms</a></p>
<h2 id="primary">Primary</h2>
<p><em>Definition:</em> A platform that is regularly tested through project CI
on a project owned and managed system.</p>
<p>New Pull Requests (PRs) should not be merged unless the primary
platforms are showing as “green” in CI. If the CI breaks for a branch
(such as for a stable version or master) then it should be fixed as a
priority.</p>Policy for Accepting Assembler Optimisations
https://openssl-library.org/policies/technical/assembler/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/assembler/<p>New assembler optimisations for any algorithm having a C based implementation in
any provider are always acceptable (subject to standard review procedures) for
all platforms in the master branch.</p>
<p>New assembler optimisations are never acceptable for any platform or provider in
a <a href="https://openssl-library.org/policies/general/glossary/#stable-release">stable release</a> branch.</p>
<p>Updates to existing assembler optimisations in a stable release branch are only
acceptable where such updates would be allowed under the
<a href="https://openssl-library.org/policies/technical/stable-release-updates/">stable release update policy</a>.</p>
<p>Where assembler optimisations are acceptable they should be implemented using
<a href="https://openssl-library.org/policies/general/glossary/#perlasm">perlasm</a>.</p>Policy for OpenSSL Committers
https://openssl-library.org/policies/general/committer-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/committer-policy/<h2 id="who-is-a-committer">Who is a committer?</h2>
<p>OpenSSL committers are contributors who have commit access to the OpenSSL
source code repository. Committers review and commit their own patches
as well as those of other contributors.</p>
<h2 id="how-to-become-a-committer">How to become a committer?</h2>
<p>Commit access is granted by the OpenSSL Foundation or
the OpenSSL Corporation directors.</p>
<p>We welcome contributors who become domain experts in some part of
the library (for example, low-level crypto) as well as generalists
who contribute to all areas of the codebase. All committers share
the responsibility for the overall health of the project: aside from
contributing quality features, committers are team players who fix bugs,
address open issues, review community contributions, and improve tests
and documentation. Committers are also shepherds of the OpenSSL community
and its code of conduct.</p>Policy on API compatibility in minor releases
https://openssl-library.org/policies/technical/api-compat/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/api-compat/<p>The public <a href="https://openssl-library.org/policies/general/glossary/#api">API</a> of the OpenSSL libraries is defined as functions, macros, data
structure declarations, typedefs, and data variables in header files in the
<code>include/openssl</code> subdirectory of the source tree and <code>include/openssl</code>
subdirectory of the build tree.</p>
<p><strong>No changes to existing public API functions and data are permitted.</strong> This
includes, but is not limited to:</p>
<ul>
<li>constification of arguments;</li>
<li>changing <code>void</code> returns to <code>int</code> returns;</li>
<li>changing a macro to a function and</li>
<li>corrections of spelling.</li>
</ul>
<p>Only API additions are allowed in <a href="https://openssl-library.org/policies/general/glossary/#minor-release">minor</a> releases.</p>Release and Advisory Timeline
https://openssl-library.org/news/timeline/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/timeline/<p>Here is a timeline of all OpenSSL releases and security advisories.</p>
<table>
<thead>
<tr>
<th><strong>Date</strong></th>
<th><strong>Content</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>14 Apr 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-4.0.0">OpenSSL 4.0.0</a></td>
</tr>
<tr>
<td>07 Apr 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.2">OpenSSL 3.6.2</a></td>
</tr>
<tr>
<td>07 Apr 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.6">OpenSSL 3.5.6</a></td>
</tr>
<tr>
<td>07 Apr 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.5">OpenSSL 3.4.5</a></td>
</tr>
<tr>
<td>07 Apr 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.7">OpenSSL 3.3.7</a></td>
</tr>
<tr>
<td>07 Apr 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.20">OpenSSL 3.0.20</a></td>
</tr>
<tr>
<td>07 Apr 2026</td>
<td><a href="https://openssl-library.org/news/secadv/20260407.txt">Security Advisory</a><ul><li>Incorrect Failure Handling in RSA KEM RSASVE Encapsulation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-31790">CVE-2026-31790</a>)</li><li>Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-512 Support (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-28386">CVE-2026-28386</a>)</li><li>Potential Use-after-free in DANE Client Code (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-28387">CVE-2026-28387</a>)</li><li>NULL Pointer Dereference When Processing a Delta CRL (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-28388">CVE-2026-28388</a>)</li><li>Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-28389">CVE-2026-28389</a>)</li><li>Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-28390">CVE-2026-28390</a>)</li><li>Heap Buffer Overflow in Hexadecimal Conversion (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-31789">CVE-2026-31789</a>)</li></ul></td>
</tr>
<tr>
<td>24 Mar 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-4.0.0-beta1">OpenSSL 4.0.0-beta1</a></td>
</tr>
<tr>
<td>13 Mar 2026</td>
<td><a href="https://openssl-library.org/news/secadv/20260313.txt">Security Advisory</a><ul><li>OpenSSL TLS 1.3 server may choose unexpected key agreement group (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-2673">CVE-2026-2673</a>)</li></ul></td>
</tr>
<tr>
<td>10 Mar 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-4.0.0-alpha1">OpenSSL 4.0.0-alpha1</a></td>
</tr>
<tr>
<td>27 Jan 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.1">OpenSSL 3.6.1</a></td>
</tr>
<tr>
<td>27 Jan 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.5">OpenSSL 3.5.5</a></td>
</tr>
<tr>
<td>27 Jan 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.4">OpenSSL 3.4.4</a></td>
</tr>
<tr>
<td>27 Jan 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.6">OpenSSL 3.3.6</a></td>
</tr>
<tr>
<td>27 Jan 2026</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.19">OpenSSL 3.0.19</a></td>
</tr>
<tr>
<td>27 Jan 2026</td>
<td><a href="https://openssl-library.org/news/secadv/20260127.txt">Security Advisory</a><ul><li>Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-11187">CVE-2025-11187</a>)</li><li>Stack buffer overflow in CMS (Auth)EnvelopedData parsing (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467">CVE-2025-15467</a>)</li><li>NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15468">CVE-2025-15468</a>)</li><li>“openssl dgst” one-shot codepath silently truncates inputs >16MB (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-15469">CVE-2025-15469</a>)</li><li>TLS 1.3 CompressedCertificate excessive memory allocation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-66199">CVE-2025-66199</a>)</li><li>Heap out-of-bounds write in BIO_f_linebuffer on short writes (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-68160">CVE-2025-68160</a>)</li><li>Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69418">CVE-2025-69418</a>)</li><li>Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69419">CVE-2025-69419</a>)</li><li>Missing ASN1_TYPE validation in TS_RESP_verify_response() function (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69420">CVE-2025-69420</a>)</li><li>NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-69421">CVE-2025-69421</a>)</li><li>Missing ASN1_TYPE validation in PKCS#12 parsing (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22795">CVE-2026-22795</a>)</li><li>ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2026-22796">CVE-2026-22796</a>)</li></ul></td>
</tr>
<tr>
<td>01 Oct 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.0">OpenSSL 3.6.0</a></td>
</tr>
<tr>
<td>30 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.4">OpenSSL 3.5.4</a></td>
</tr>
<tr>
<td>30 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.3">OpenSSL 3.4.3</a></td>
</tr>
<tr>
<td>30 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.5">OpenSSL 3.3.5</a></td>
</tr>
<tr>
<td>30 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.6">OpenSSL 3.2.6</a></td>
</tr>
<tr>
<td>30 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.18">OpenSSL 3.0.18</a></td>
</tr>
<tr>
<td>30 Sep 2025</td>
<td><a href="https://openssl-library.org/news/secadv/20250930.txt">Security Advisory</a><ul><li>Out-of-bounds read & write in RFC 3211 KEK Unwrap (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-9230">CVE-2025-9230</a>)</li><li>Timing side-channel in SM2 algorithm on 64 bit ARM (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-9231">CVE-2025-9231</a>)</li><li>Out-of-bounds read in HTTP client no_proxy handling (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-9232">CVE-2025-9232</a>)</li></ul></td>
</tr>
<tr>
<td>16 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.3">OpenSSL 3.5.3</a></td>
</tr>
<tr>
<td>16 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.0-beta1">OpenSSL 3.6.0-beta1</a></td>
</tr>
<tr>
<td>02 Sep 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.6.0-alpha1">OpenSSL 3.6.0-alpha1</a></td>
</tr>
<tr>
<td>05 Aug 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.2">OpenSSL 3.5.2</a></td>
</tr>
<tr>
<td>01 Jul 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.1">OpenSSL 3.5.1</a></td>
</tr>
<tr>
<td>01 Jul 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.2">OpenSSL 3.4.2</a></td>
</tr>
<tr>
<td>01 Jul 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.4">OpenSSL 3.3.4</a></td>
</tr>
<tr>
<td>01 Jul 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.5">OpenSSL 3.2.5</a></td>
</tr>
<tr>
<td>01 Jul 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.17">OpenSSL 3.0.17</a></td>
</tr>
<tr>
<td>22 May 2025</td>
<td><a href="https://openssl-library.org/news/secadv/20250522.txt">Security Advisory</a><ul><li>The x509 application adds trusted use instead of rejected use (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2025-4575">CVE-2025-4575</a>)</li></ul></td>
</tr>
<tr>
<td>08 Apr 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.0">OpenSSL 3.5.0</a></td>
</tr>
<tr>
<td>25 Mar 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.0-beta1">OpenSSL 3.5.0-beta1</a></td>
</tr>
<tr>
<td>12 Mar 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.0-alpha1">OpenSSL 3.5.0-alpha1</a></td>
</tr>
<tr>
<td>11 Feb 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.1">OpenSSL 3.4.1</a></td>
</tr>
<tr>
<td>11 Feb 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.3">OpenSSL 3.3.3</a></td>
</tr>
<tr>
<td>11 Feb 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.4">OpenSSL 3.2.4</a></td>
</tr>
<tr>
<td>11 Feb 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.8">OpenSSL 3.1.8</a></td>
</tr>
<tr>
<td>11 Feb 2025</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.16">OpenSSL 3.0.16</a></td>
</tr>
<tr>
<td>11 Feb 2025</td>
<td><a href="https://openssl-library.org/news/secadv/20250211.txt">Security Advisory</a><ul><li>RFC7250 handshakes with unauthenticated servers don’t abort as expected (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-12797">CVE-2024-12797</a>)</li></ul></td>
</tr>
<tr>
<td>20 Jan 2025</td>
<td><a href="https://openssl-library.org/news/secadv/20250120.txt">Security Advisory</a><ul><li>Timing side-channel in ECDSA signature computation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-13176">CVE-2024-13176</a>)</li></ul></td>
</tr>
<tr>
<td>22 Oct 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.0">OpenSSL 3.4.0</a></td>
</tr>
<tr>
<td>16 Oct 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20241016.txt">Security Advisory</a><ul><li>Low-level invalid GF(2^m) parameters lead to OOB memory access (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-9143">CVE-2024-9143</a>)</li></ul></td>
</tr>
<tr>
<td>07 Oct 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.0-beta1">OpenSSL 3.4.0-beta1</a></td>
</tr>
<tr>
<td>05 Sep 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.0-alpha1">OpenSSL 3.4.0-alpha1</a></td>
</tr>
<tr>
<td>03 Sep 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.2">OpenSSL 3.3.2</a></td>
</tr>
<tr>
<td>03 Sep 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.3">OpenSSL 3.2.3</a></td>
</tr>
<tr>
<td>03 Sep 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.7">OpenSSL 3.1.7</a></td>
</tr>
<tr>
<td>03 Sep 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.15">OpenSSL 3.0.15</a></td>
</tr>
<tr>
<td>03 Sep 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240903.txt">Security Advisory</a><ul><li>Possible denial of service in X.509 name checks (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-6119">CVE-2024-6119</a>)</li></ul></td>
</tr>
<tr>
<td>27 Jun 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240627.txt">Security Advisory</a><ul><li>SSL_select_next_proto buffer overread (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-5535">CVE-2024-5535</a>)</li></ul></td>
</tr>
<tr>
<td>04 Jun 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.1">OpenSSL 3.3.1</a></td>
</tr>
<tr>
<td>04 Jun 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.2">OpenSSL 3.2.2</a></td>
</tr>
<tr>
<td>04 Jun 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.6">OpenSSL 3.1.6</a></td>
</tr>
<tr>
<td>04 Jun 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.14">OpenSSL 3.0.14</a></td>
</tr>
<tr>
<td>28 May 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240528.txt">Security Advisory</a><ul><li>Use After Free with SSL_free_buffers (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-4741">CVE-2024-4741</a>)</li></ul></td>
</tr>
<tr>
<td>16 May 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240516.txt">Security Advisory</a><ul><li>Excessive time spent checking DSA keys and parameters (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-4603">CVE-2024-4603</a>)</li></ul></td>
</tr>
<tr>
<td>09 Apr 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.0">OpenSSL 3.3.0</a></td>
</tr>
<tr>
<td>08 Apr 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240408.txt">Security Advisory</a><ul><li>Unbounded memory growth with session handling in TLSv1.3 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-2511">CVE-2024-2511</a>)</li></ul></td>
</tr>
<tr>
<td>29 Mar 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.0-beta1">OpenSSL 3.3.0-beta1</a></td>
</tr>
<tr>
<td>20 Mar 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.0-alpha1">OpenSSL 3.3.0-alpha1</a></td>
</tr>
<tr>
<td>30 Jan 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.1">OpenSSL 3.2.1</a></td>
</tr>
<tr>
<td>30 Jan 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.5">OpenSSL 3.1.5</a></td>
</tr>
<tr>
<td>30 Jan 2024</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.13">OpenSSL 3.0.13</a></td>
</tr>
<tr>
<td>25 Jan 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240125.txt">Security Advisory</a><ul><li>PKCS12 Decoding crashes (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2024-0727">CVE-2024-0727</a>)</li></ul></td>
</tr>
<tr>
<td>15 Jan 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240115.txt">Security Advisory</a><ul><li>Excessive time spent checking invalid RSA public keys (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-6237">CVE-2023-6237</a>)</li></ul></td>
</tr>
<tr>
<td>09 Jan 2024</td>
<td><a href="https://openssl-library.org/news/secadv/20240109.txt">Security Advisory</a><ul><li>POLY1305 MAC implementation corrupts vector registers on PowerPC (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-6129">CVE-2023-6129</a>)</li></ul></td>
</tr>
<tr>
<td>23 Nov 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.0">OpenSSL 3.2.0</a></td>
</tr>
<tr>
<td>06 Nov 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20231106.txt">Security Advisory</a><ul><li>Excessive time spent in DH check / generation with large Q parameter value (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-5678">CVE-2023-5678</a>)</li></ul></td>
</tr>
<tr>
<td>26 Oct 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.0-beta1">OpenSSL 3.2.0-beta1</a></td>
</tr>
<tr>
<td>24 Oct 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.4">OpenSSL 3.1.4</a></td>
</tr>
<tr>
<td>24 Oct 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.12">OpenSSL 3.0.12</a></td>
</tr>
<tr>
<td>24 Oct 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20231024.txt">Security Advisory</a><ul><li>Incorrect cipher key & IV length processing (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-5363">CVE-2023-5363</a>)</li></ul></td>
</tr>
<tr>
<td>28 Sep 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.0-alpha2">OpenSSL 3.2.0-alpha2</a></td>
</tr>
<tr>
<td>19 Sep 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.3">OpenSSL 3.1.3</a></td>
</tr>
<tr>
<td>19 Sep 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.11">OpenSSL 3.0.11</a></td>
</tr>
<tr>
<td>12 Sep 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1w">OpenSSL 1.1.1w</a></td>
</tr>
<tr>
<td>08 Sep 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230908.txt">Security Advisory</a><ul><li>POLY1305 MAC implementation corrupts XMM registers on Windows (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-4807">CVE-2023-4807</a>)</li></ul></td>
</tr>
<tr>
<td>07 Sep 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.2.0-alpha1">OpenSSL 3.2.0-alpha1</a></td>
</tr>
<tr>
<td>01 Aug 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.2">OpenSSL 3.1.2</a></td>
</tr>
<tr>
<td>01 Aug 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.10">OpenSSL 3.0.10</a></td>
</tr>
<tr>
<td>01 Aug 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1v">OpenSSL 1.1.1v</a></td>
</tr>
<tr>
<td>31 Jul 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230731.txt">Security Advisory</a><ul><li>Excessive time spent checking DH q parameter value (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-3817">CVE-2023-3817</a>)</li></ul></td>
</tr>
<tr>
<td>19 Jul 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230719.txt">Security Advisory</a><ul><li>Excessive time spent checking DH keys and parameters (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-3446">CVE-2023-3446</a>)</li></ul></td>
</tr>
<tr>
<td>14 Jul 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230714.txt">Security Advisory</a><ul><li>AES-SIV implementation ignores empty associated data entries (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-2975">CVE-2023-2975</a>)</li></ul></td>
</tr>
<tr>
<td>30 May 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.1">OpenSSL 3.1.1</a></td>
</tr>
<tr>
<td>30 May 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.9">OpenSSL 3.0.9</a></td>
</tr>
<tr>
<td>30 May 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1u">OpenSSL 1.1.1u</a></td>
</tr>
<tr>
<td>30 May 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230530.txt">Security Advisory</a><ul><li>Possible DoS translating ASN.1 object identifiers (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-2650">CVE-2023-2650</a>)</li></ul></td>
</tr>
<tr>
<td>20 Apr 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230420.txt">Security Advisory</a><ul><li>Input buffer over-read in AES-XTS implementation on 64 bit ARM (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-1255">CVE-2023-1255</a>)</li></ul></td>
</tr>
<tr>
<td>28 Mar 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230328.txt">Security Advisory</a><ul><li>Invalid certificate policies in leaf certificates are silently ignored (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0465">CVE-2023-0465</a>)</li><li>Certificate policy check not enabled (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0466">CVE-2023-0466</a>)</li></ul></td>
</tr>
<tr>
<td>22 Mar 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230322.txt">Security Advisory</a><ul><li>Excessive Resource Usage Verifying X.509 Policy Constraints (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0464">CVE-2023-0464</a>)</li></ul></td>
</tr>
<tr>
<td>14 Mar 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.0">OpenSSL 3.1.0</a></td>
</tr>
<tr>
<td>07 Feb 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1t">OpenSSL 1.1.1t</a></td>
</tr>
<tr>
<td>07 Feb 2023</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.8">OpenSSL 3.0.8</a></td>
</tr>
<tr>
<td>07 Feb 2023</td>
<td><a href="https://openssl-library.org/news/secadv/20230207.txt">Security Advisory</a><ul><li>X.400 address type confusion in X.509 GeneralName (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0286">CVE-2023-0286</a>)</li><li>Timing Oracle in RSA Decryption (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4304">CVE-2022-4304</a>)</li><li>X.509 Name Constraints Read Buffer Overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4203">CVE-2022-4203</a>)</li><li>Use-after-free following BIO_new_NDEF (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0215">CVE-2023-0215</a>)</li><li>Double free after calling PEM_read_bio_ex (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-4450">CVE-2022-4450</a>)</li><li>Invalid pointer dereference in d2i_PKCS7 functions (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0216">CVE-2023-0216</a>)</li><li>NULL dereference validating DSA public key (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0217">CVE-2023-0217</a>)</li><li>NULL dereference during PKCS7 data verification (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2023-0401">CVE-2023-0401</a>)</li></ul></td>
</tr>
<tr>
<td>21 Dec 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.0-beta1">OpenSSL 3.1.0-beta1</a></td>
</tr>
<tr>
<td>13 Dec 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20221213.txt">Security Advisory</a><ul><li>X.509 Policy Constraints Double Locking (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3996">CVE-2022-3996</a>)</li></ul></td>
</tr>
<tr>
<td>01 Dec 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.1.0-alpha1">OpenSSL 3.1.0-alpha1</a></td>
</tr>
<tr>
<td>01 Nov 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1s">OpenSSL 1.1.1s</a></td>
</tr>
<tr>
<td>01 Nov 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.7">OpenSSL 3.0.7</a></td>
</tr>
<tr>
<td>01 Nov 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20221101.txt">Security Advisory</a><ul><li>X.509 Email Address 4-byte Buffer Overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3602">CVE-2022-3602</a>)</li><li>X.509 Email Address Variable Length Buffer Overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3786">CVE-2022-3786</a>)</li></ul></td>
</tr>
<tr>
<td>11 Oct 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.6">OpenSSL 3.0.6</a></td>
</tr>
<tr>
<td>11 Oct 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1r">OpenSSL 1.1.1r</a></td>
</tr>
<tr>
<td>11 Oct 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20221011.txt">Security Advisory</a><ul><li>Using a Custom Cipher with NID_undef may lead to NULL encryption (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-3358">CVE-2022-3358</a>)</li></ul></td>
</tr>
<tr>
<td>05 Jul 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.5">OpenSSL 3.0.5</a></td>
</tr>
<tr>
<td>05 Jul 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1q">OpenSSL 1.1.1q</a></td>
</tr>
<tr>
<td>05 Jul 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20220705.txt">Security Advisory</a><ul><li>Heap memory corruption with RSA private key operation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2274">CVE-2022-2274</a>)</li><li>AES OCB fails to encrypt some bytes (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2097">CVE-2022-2097</a>)</li></ul></td>
</tr>
<tr>
<td>21 Jun 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.4">OpenSSL 3.0.4</a></td>
</tr>
<tr>
<td>21 Jun 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1p">OpenSSL 1.1.1p</a></td>
</tr>
<tr>
<td>21 Jun 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20220621.txt">Security Advisory</a><ul><li>The c_rehash script allows command injection (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-2068">CVE-2022-2068</a>)</li></ul></td>
</tr>
<tr>
<td>03 May 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.3">OpenSSL 3.0.3</a></td>
</tr>
<tr>
<td>03 May 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1o">OpenSSL 1.1.1o</a></td>
</tr>
<tr>
<td>03 May 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20220503.txt">Security Advisory</a><ul><li>The c_rehash script allows command injection (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1292">CVE-2022-1292</a>)</li><li>OCSP_basic_verify may incorrectly verify the response signing certificate (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1343">CVE-2022-1343</a>)</li><li>Incorrect MAC key used in the RC4-MD5 ciphersuite (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1434">CVE-2022-1434</a>)</li><li>Resource leakage when decoding certificates and keys (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-1473">CVE-2022-1473</a>)</li></ul></td>
</tr>
<tr>
<td>15 Mar 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.2">OpenSSL 3.0.2</a></td>
</tr>
<tr>
<td>15 Mar 2022</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1n">OpenSSL 1.1.1n</a></td>
</tr>
<tr>
<td>15 Mar 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20220315.txt">Security Advisory</a><ul><li>Infinite loop in BN_mod_sqrt() reachable when parsing certificates (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2022-0778">CVE-2022-0778</a>)</li></ul></td>
</tr>
<tr>
<td>28 Jan 2022</td>
<td><a href="https://openssl-library.org/news/secadv/20220128.txt">Security Advisory</a><ul><li>BN_mod_exp may produce incorrect results on MIPS (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-4160">CVE-2021-4160</a>)</li></ul></td>
</tr>
<tr>
<td>14 Dec 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1m">OpenSSL 1.1.1m</a></td>
</tr>
<tr>
<td>14 Dec 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.1">OpenSSL 3.0.1</a></td>
</tr>
<tr>
<td>14 Dec 2021</td>
<td><a href="https://openssl-library.org/news/secadv/20211214.txt">Security Advisory</a><ul><li>Invalid handling of X509_verify_cert() internal errors in libssl (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-4044">CVE-2021-4044</a>)</li></ul></td>
</tr>
<tr>
<td>07 Sep 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0">OpenSSL 3.0.0</a></td>
</tr>
<tr>
<td>24 Aug 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1l">OpenSSL 1.1.1l</a></td>
</tr>
<tr>
<td>24 Aug 2021</td>
<td><a href="https://openssl-library.org/news/secadv/20210824.txt">Security Advisory</a><ul><li>SM2 Decryption Buffer Overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3711">CVE-2021-3711</a>)</li><li>Read buffer overruns processing ASN.1 strings (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3712">CVE-2021-3712</a>)</li></ul></td>
</tr>
<tr>
<td>29 Jul 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-beta2">OpenSSL 3.0.0-beta2</a></td>
</tr>
<tr>
<td>17 Jun 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-beta1">OpenSSL 3.0.0-beta1</a></td>
</tr>
<tr>
<td>20 May 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha17">OpenSSL 3.0.0-alpha17</a></td>
</tr>
<tr>
<td>06 May 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha16">OpenSSL 3.0.0-alpha16</a></td>
</tr>
<tr>
<td>22 Apr 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha15">OpenSSL 3.0.0-alpha15</a></td>
</tr>
<tr>
<td>08 Apr 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha14">OpenSSL 3.0.0-alpha14</a></td>
</tr>
<tr>
<td>25 Mar 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1k">OpenSSL 1.1.1k</a></td>
</tr>
<tr>
<td>25 Mar 2021</td>
<td><a href="https://openssl-library.org/news/secadv/20210325.txt">Security Advisory</a><ul><li>CA certificate check bypass with X509_V_FLAG_X509_STRICT (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3450">CVE-2021-3450</a>)</li><li>NULL pointer deref in signature_algorithms processing (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-3449">CVE-2021-3449</a>)</li></ul></td>
</tr>
<tr>
<td>11 Mar 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha13">OpenSSL 3.0.0-alpha13</a></td>
</tr>
<tr>
<td>18 Feb 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha12">OpenSSL 3.0.0-alpha12</a></td>
</tr>
<tr>
<td>16 Feb 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1j">OpenSSL 1.1.1j</a></td>
</tr>
<tr>
<td>16 Feb 2021</td>
<td><a href="https://openssl-library.org/news/secadv/20210216.txt">Security Advisory</a><ul><li>Null pointer deref in X509_issuer_and_serial_hash() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-23841">CVE-2021-23841</a>)</li><li>Incorrect SSLv2 rollback protection (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-23839">CVE-2021-23839</a>)</li><li>Integer overflow in CipherUpdate (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2021-23840">CVE-2021-23840</a>)</li></ul></td>
</tr>
<tr>
<td>28 Jan 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha11">OpenSSL 3.0.0-alpha11</a></td>
</tr>
<tr>
<td>07 Jan 2021</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha10">OpenSSL 3.0.0-alpha10</a></td>
</tr>
<tr>
<td>08 Dec 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1i">OpenSSL 1.1.1i</a></td>
</tr>
<tr>
<td>08 Dec 2020</td>
<td><a href="https://openssl-library.org/news/secadv/20201208.txt">Security Advisory</a><ul><li>EDIPARTYNAME NULL pointer de-reference (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2020-1971">CVE-2020-1971</a>)</li></ul></td>
</tr>
<tr>
<td>26 Nov 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha9">OpenSSL 3.0.0-alpha9</a></td>
</tr>
<tr>
<td>05 Nov 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha8">OpenSSL 3.0.0-alpha8</a></td>
</tr>
<tr>
<td>15 Oct 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha7">OpenSSL 3.0.0-alpha7</a></td>
</tr>
<tr>
<td>22 Sep 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1h">OpenSSL 1.1.1h</a></td>
</tr>
<tr>
<td>09 Sep 2020</td>
<td><a href="https://openssl-library.org/news/secadv/20200909.txt">Security Advisory</a><ul><li>Raccoon Attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2020-1968">CVE-2020-1968</a>)</li></ul></td>
</tr>
<tr>
<td>06 Aug 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha6">OpenSSL 3.0.0-alpha6</a></td>
</tr>
<tr>
<td>16 Jul 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha5">OpenSSL 3.0.0-alpha5</a></td>
</tr>
<tr>
<td>25 Jun 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha4">OpenSSL 3.0.0-alpha4</a></td>
</tr>
<tr>
<td>04 Jun 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha3">OpenSSL 3.0.0-alpha3</a></td>
</tr>
<tr>
<td>15 May 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha2">OpenSSL 3.0.0-alpha2</a></td>
</tr>
<tr>
<td>23 Apr 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/openssl-3.0.0-alpha1">OpenSSL 3.0.0-alpha1</a></td>
</tr>
<tr>
<td>21 Apr 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1g">OpenSSL 1.1.1g</a></td>
</tr>
<tr>
<td>21 Apr 2020</td>
<td><a href="https://openssl-library.org/news/secadv/20200421.txt">Security Advisory</a><ul><li>Segmentation fault in SSL_check_chain (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2020-1967">CVE-2020-1967</a>)</li></ul></td>
</tr>
<tr>
<td>31 Mar 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1f">OpenSSL 1.1.1f</a></td>
</tr>
<tr>
<td>17 Mar 2020</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1e">OpenSSL 1.1.1e</a></td>
</tr>
<tr>
<td>20 Dec 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2u">OpenSSL 1.0.2u</a></td>
</tr>
<tr>
<td>06 Dec 2019</td>
<td><a href="https://openssl-library.org/news/secadv/20191206.txt">Security Advisory</a><ul><li>rsaz_512_sqr overflow bug on x86_64 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1551">CVE-2019-1551</a>)</li></ul></td>
</tr>
<tr>
<td>10 Sep 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1d">OpenSSL 1.1.1d</a></td>
</tr>
<tr>
<td>10 Sep 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0l">OpenSSL 1.1.0l</a></td>
</tr>
<tr>
<td>10 Sep 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2t">OpenSSL 1.0.2t</a></td>
</tr>
<tr>
<td>10 Sep 2019</td>
<td><a href="https://openssl-library.org/news/secadv/20190910.txt">Security Advisory</a><ul><li>ECDSA remote timing attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1547">CVE-2019-1547</a>)</li><li>Fork Protection (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1549">CVE-2019-1549</a>)</li><li>Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1563">CVE-2019-1563</a>)</li></ul></td>
</tr>
<tr>
<td>30 Jul 2019</td>
<td><a href="https://openssl-library.org/news/secadv/20190730.txt">Security Advisory</a><ul><li>Windows builds with insecure path defaults (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1552">CVE-2019-1552</a>)</li></ul></td>
</tr>
<tr>
<td>28 May 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2s">OpenSSL 1.0.2s</a></td>
</tr>
<tr>
<td>28 May 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0k">OpenSSL 1.1.0k</a></td>
</tr>
<tr>
<td>28 May 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1c">OpenSSL 1.1.1c</a></td>
</tr>
<tr>
<td>06 Mar 2019</td>
<td><a href="https://openssl-library.org/news/secadv/20190306.txt">Security Advisory</a><ul><li>ChaCha20-Poly1305 with long nonces (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1543">CVE-2019-1543</a>)</li></ul></td>
</tr>
<tr>
<td>26 Feb 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1b">OpenSSL 1.1.1b</a></td>
</tr>
<tr>
<td>26 Feb 2019</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2r">OpenSSL 1.0.2r</a></td>
</tr>
<tr>
<td>26 Feb 2019</td>
<td><a href="https://openssl-library.org/news/secadv/20190226.txt">Security Advisory</a><ul><li>0-byte record padding oracle (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2019-1559">CVE-2019-1559</a>)</li></ul></td>
</tr>
<tr>
<td>20 Nov 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1a">OpenSSL 1.1.1a</a></td>
</tr>
<tr>
<td>20 Nov 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0j">OpenSSL 1.1.0j</a></td>
</tr>
<tr>
<td>20 Nov 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2q">OpenSSL 1.0.2q</a></td>
</tr>
<tr>
<td>12 Nov 2018</td>
<td><a href="https://openssl-library.org/news/secadv/20181112.txt">Security Advisory</a><ul><li>Microarchitecture timing vulnerability in ECC scalar multiplication (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-5407">CVE-2018-5407</a>)</li></ul></td>
</tr>
<tr>
<td>30 Oct 2018</td>
<td><a href="https://openssl-library.org/news/secadv/20181030.txt">Security Advisory</a><ul><li>Timing vulnerability in DSA signature generation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0734">CVE-2018-0734</a>)</li></ul></td>
</tr>
<tr>
<td>29 Oct 2018</td>
<td><a href="https://openssl-library.org/news/secadv/20181029.txt">Security Advisory</a><ul><li>Timing vulnerability in ECDSA signature generation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0735">CVE-2018-0735</a>)</li></ul></td>
</tr>
<tr>
<td>11 Sep 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1">OpenSSL 1.1.1</a></td>
</tr>
<tr>
<td>21 Aug 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre9">OpenSSL 1.1.1-pre9</a></td>
</tr>
<tr>
<td>14 Aug 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0i">OpenSSL 1.1.0i</a></td>
</tr>
<tr>
<td>14 Aug 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2p">OpenSSL 1.0.2p</a></td>
</tr>
<tr>
<td>20 Jun 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre8">OpenSSL 1.1.1-pre8</a></td>
</tr>
<tr>
<td>12 Jun 2018</td>
<td><a href="https://openssl-library.org/news/secadv/20180612.txt">Security Advisory</a><ul><li>Client DoS due to large DH parameter (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0732">CVE-2018-0732</a>)</li></ul></td>
</tr>
<tr>
<td>29 May 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre7">OpenSSL 1.1.1-pre7</a></td>
</tr>
<tr>
<td>01 May 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre6">OpenSSL 1.1.1-pre6</a></td>
</tr>
<tr>
<td>17 Apr 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre5">OpenSSL 1.1.1-pre5</a></td>
</tr>
<tr>
<td>16 Apr 2018</td>
<td><a href="https://openssl-library.org/news/secadv/20180416.txt">Security Advisory</a><ul><li>Cache timing vulnerability in RSA Key Generation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0737">CVE-2018-0737</a>)</li></ul></td>
</tr>
<tr>
<td>03 Apr 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre4">OpenSSL 1.1.1-pre4</a></td>
</tr>
<tr>
<td>27 Mar 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0h">OpenSSL 1.1.0h</a></td>
</tr>
<tr>
<td>27 Mar 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2o">OpenSSL 1.0.2o</a></td>
</tr>
<tr>
<td>27 Mar 2018</td>
<td><a href="https://openssl-library.org/news/secadv/20180327.txt">Security Advisory</a><ul><li>Constructed ASN.1 types with a recursive definition could exceed the stack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0739">CVE-2018-0739</a>)</li><li>Incorrect CRYPTO_memcmp on HP-UX PA-RISC (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2018-0733">CVE-2018-0733</a>)</li><li>rsaz_1024_mul_avx2 overflow bug on x86_64 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3738">CVE-2017-3738</a>)</li></ul></td>
</tr>
<tr>
<td>20 Mar 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre3">OpenSSL 1.1.1-pre3</a></td>
</tr>
<tr>
<td>27 Feb 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre2">OpenSSL 1.1.1-pre2</a></td>
</tr>
<tr>
<td>15 Feb 2018</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1-pre1">OpenSSL 1.1.1-pre1</a></td>
</tr>
<tr>
<td>07 Dec 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2n">OpenSSL 1.0.2n</a></td>
</tr>
<tr>
<td>07 Dec 2017</td>
<td><a href="https://openssl-library.org/news/secadv/20171207.txt">Security Advisory</a><ul><li>Read/write after SSL object in error state (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3737">CVE-2017-3737</a>)</li><li>rsaz_1024_mul_avx2 overflow bug on x86_64 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3738">CVE-2017-3738</a>)</li></ul></td>
</tr>
<tr>
<td>02 Nov 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0g">OpenSSL 1.1.0g</a></td>
</tr>
<tr>
<td>02 Nov 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2m">OpenSSL 1.0.2m</a></td>
</tr>
<tr>
<td>02 Nov 2017</td>
<td><a href="https://openssl-library.org/news/secadv/20171102.txt">Security Advisory</a><ul><li>bn_sqrx8x_internal carry bug on x86_64 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3736">CVE-2017-3736</a>)</li><li>Malformed X.509 IPAddressFamily could cause OOB read (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3735">CVE-2017-3735</a>)</li></ul></td>
</tr>
<tr>
<td>31 Aug 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_16">OpenSSL fips-2.0.16</a></td>
</tr>
<tr>
<td>30 Aug 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_15">OpenSSL fips-2.0.15</a></td>
</tr>
<tr>
<td>28 Aug 2017</td>
<td><a href="https://openssl-library.org/news/secadv/20170828.txt">Security Advisory</a><ul><li>Malformed X.509 IPAddressFamily could cause OOB read (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3735">CVE-2017-3735</a>)</li></ul></td>
</tr>
<tr>
<td>25 May 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0f">OpenSSL 1.1.0f</a></td>
</tr>
<tr>
<td>25 May 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2l">OpenSSL 1.0.2l</a></td>
</tr>
<tr>
<td>16 Feb 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0e">OpenSSL 1.1.0e</a></td>
</tr>
<tr>
<td>16 Feb 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_14">OpenSSL fips-2.0.14</a></td>
</tr>
<tr>
<td>16 Feb 2017</td>
<td><a href="https://openssl-library.org/news/secadv/20170216.txt">Security Advisory</a><ul><li>Encrypt-Then-Mac renegotiation crash (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3733">CVE-2017-3733</a>)</li></ul></td>
</tr>
<tr>
<td>26 Jan 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0d">OpenSSL 1.1.0d</a></td>
</tr>
<tr>
<td>26 Jan 2017</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2k">OpenSSL 1.0.2k</a></td>
</tr>
<tr>
<td>26 Jan 2017</td>
<td><a href="https://openssl-library.org/news/secadv/20170126.txt">Security Advisory</a><ul><li>Truncated packet could crash via OOB read (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3731">CVE-2017-3731</a>)</li><li>Bad (EC)DHE parameters cause a client crash (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3730">CVE-2017-3730</a>)</li><li>BN_mod_exp may produce incorrect results on x86_64 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2017-3732">CVE-2017-3732</a>)</li><li>Montgomery multiplication may produce incorrect results (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-7055">CVE-2016-7055</a>)</li></ul></td>
</tr>
<tr>
<td>14 Nov 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_13">OpenSSL fips-2.0.13</a></td>
</tr>
<tr>
<td>10 Nov 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0c">OpenSSL 1.1.0c</a></td>
</tr>
<tr>
<td>10 Nov 2016</td>
<td><a href="https://openssl-library.org/news/secadv/20161110.txt">Security Advisory</a><ul><li>ChaCha20/Poly1305 heap-buffer-overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-7054">CVE-2016-7054</a>)</li><li>CMS Null dereference (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-7053">CVE-2016-7053</a>)</li><li>Montgomery multiplication may produce incorrect results (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-7055">CVE-2016-7055</a>)</li></ul></td>
</tr>
<tr>
<td>26 Sep 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0b">OpenSSL 1.1.0b</a></td>
</tr>
<tr>
<td>26 Sep 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2j">OpenSSL 1.0.2j</a></td>
</tr>
<tr>
<td>26 Sep 2016</td>
<td><a href="https://openssl-library.org/news/secadv/20160926.txt">Security Advisory</a><ul><li>Fix Use After Free for large message sizes (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6309">CVE-2016-6309</a>)</li><li>Missing CRL sanity check (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-7052">CVE-2016-7052</a>)</li></ul></td>
</tr>
<tr>
<td>22 Sep 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0a">OpenSSL 1.1.0a</a></td>
</tr>
<tr>
<td>22 Sep 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2i">OpenSSL 1.0.2i</a></td>
</tr>
<tr>
<td>22 Sep 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1u">OpenSSL 1.0.1u</a></td>
</tr>
<tr>
<td>22 Sep 2016</td>
<td><a href="https://openssl-library.org/news/secadv/20160922.txt">Security Advisory</a><ul><li>OCSP Status Request extension unbounded memory growth (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6304">CVE-2016-6304</a>)</li><li>SSL_peek() hang on empty record (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6305">CVE-2016-6305</a>)</li><li>SWEET32 Mitigation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2183">CVE-2016-2183</a>)</li><li>OOB write in MDC2_Update() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6303">CVE-2016-6303</a>)</li><li>Malformed SHA512 ticket DoS (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6302">CVE-2016-6302</a>)</li><li>OOB write in BN_bn2dec() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2182">CVE-2016-2182</a>)</li><li>OOB read in TS_OBJ_print_bio() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2180">CVE-2016-2180</a>)</li><li>Pointer arithmetic undefined behaviour (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2177">CVE-2016-2177</a>)</li><li>Constant time flag not preserved in DSA signing (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2178">CVE-2016-2178</a>)</li><li>DTLS buffered message DoS (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2179">CVE-2016-2179</a>)</li><li>DTLS replay protection DoS (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2181">CVE-2016-2181</a>)</li><li>Certificate message OOB reads (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6306">CVE-2016-6306</a>)</li><li>Excessive allocation of memory in tls_get_message_header() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6307">CVE-2016-6307</a>)</li><li>Excessive allocation of memory in dtls1_preprocess_fragment() (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-6308">CVE-2016-6308</a>)</li></ul></td>
</tr>
<tr>
<td>25 Aug 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0">OpenSSL 1.1.0</a></td>
</tr>
<tr>
<td>04 Aug 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0-pre6">OpenSSL 1.1.0-pre6</a></td>
</tr>
<tr>
<td>03 May 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2h">OpenSSL 1.0.2h</a></td>
</tr>
<tr>
<td>03 May 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1t">OpenSSL 1.0.1t</a></td>
</tr>
<tr>
<td>03 May 2016</td>
<td><a href="https://openssl-library.org/news/secadv/20160503.txt">Security Advisory</a><ul><li>Memory corruption in the ASN.1 encoder (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2108">CVE-2016-2108</a>)</li><li>Padding oracle in AES-NI CBC MAC check (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2107">CVE-2016-2107</a>)</li><li>EVP_EncodeUpdate overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2105">CVE-2016-2105</a>)</li><li>EVP_EncryptUpdate overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2106">CVE-2016-2106</a>)</li><li>ASN.1 BIO excessive memory allocation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2109">CVE-2016-2109</a>)</li><li>EBCDIC overread (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-2176">CVE-2016-2176</a>)</li></ul></td>
</tr>
<tr>
<td>19 Apr 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0-pre5">OpenSSL 1.1.0-pre5</a></td>
</tr>
<tr>
<td>16 Mar 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0-pre4">OpenSSL 1.1.0-pre4</a></td>
</tr>
<tr>
<td>01 Mar 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2g">OpenSSL 1.0.2g</a></td>
</tr>
<tr>
<td>01 Mar 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1s">OpenSSL 1.0.1s</a></td>
</tr>
<tr>
<td>01 Mar 2016</td>
<td><a href="https://openssl-library.org/news/secadv/20160301.txt">Security Advisory</a><ul><li>Cross-protocol attack on TLS using SSLv2 (DROWN) (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0800">CVE-2016-0800</a>)</li><li>Double-free in DSA code (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0705">CVE-2016-0705</a>)</li><li>Memory leak in SRP database lookups (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0798">CVE-2016-0798</a>)</li><li>BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0797">CVE-2016-0797</a>)</li><li>Fix memory issues in BIO_*printf functions (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0799">CVE-2016-0799</a>)</li><li>Side channel attack on modular exponentiation (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0702">CVE-2016-0702</a>)</li><li>Divide-and-conquer session key recovery in SSLv2 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0703">CVE-2016-0703</a>)</li><li>Bleichenbacher oracle in SSLv2 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0704">CVE-2016-0704</a>)</li></ul></td>
</tr>
<tr>
<td>15 Feb 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_10">OpenSSL fips-2.0.10</a></td>
</tr>
<tr>
<td>15 Feb 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_11">OpenSSL fips-2.0.11</a></td>
</tr>
<tr>
<td>15 Feb 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_12">OpenSSL fips-2.0.12</a></td>
</tr>
<tr>
<td>15 Feb 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0-pre3">OpenSSL 1.1.0-pre3</a></td>
</tr>
<tr>
<td>28 Jan 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2f">OpenSSL 1.0.2f</a></td>
</tr>
<tr>
<td>28 Jan 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1r">OpenSSL 1.0.1r</a></td>
</tr>
<tr>
<td>28 Jan 2016</td>
<td><a href="https://openssl-library.org/news/secadv/20160128.txt">Security Advisory</a><ul><li>DH small subgroups (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2016-0701">CVE-2016-0701</a>)</li><li>SSLv2 doesn’t block disabled ciphers (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-3197">CVE-2015-3197</a>)</li><li>An update on DHE man-in-the-middle protection (Logjam)</li></ul></td>
</tr>
<tr>
<td>14 Jan 2016</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0-pre2">OpenSSL 1.1.0-pre2</a></td>
</tr>
<tr>
<td>10 Dec 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_0-pre1">OpenSSL 1.1.0-pre1</a></td>
</tr>
<tr>
<td>03 Dec 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2e">OpenSSL 1.0.2e</a></td>
</tr>
<tr>
<td>03 Dec 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1q">OpenSSL 1.0.1q</a></td>
</tr>
<tr>
<td>03 Dec 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0t">OpenSSL 1.0.0t</a></td>
</tr>
<tr>
<td>03 Dec 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8zh">OpenSSL 0.9.8zh</a></td>
</tr>
<tr>
<td>03 Dec 2015</td>
<td><a href="https://openssl-library.org/news/secadv/20151203.txt">Security Advisory</a><ul><li>BN_mod_exp may produce incorrect results on x86_64 (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-3193">CVE-2015-3193</a>)</li><li>Certificate verify crash with missing PSS parameter (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-3194">CVE-2015-3194</a>)</li><li>X509_ATTRIBUTE memory leak (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-3195">CVE-2015-3195</a>)</li><li>Race condition handling PSK identify hint (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-3196">CVE-2015-3196</a>)</li><li>Anon DH ServerKeyExchange with 0 p parameter (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1794">CVE-2015-1794</a>)</li></ul></td>
</tr>
<tr>
<td>09 Jul 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2d">OpenSSL 1.0.2d</a></td>
</tr>
<tr>
<td>09 Jul 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1p">OpenSSL 1.0.1p</a></td>
</tr>
<tr>
<td>09 Jul 2015</td>
<td><a href="https://openssl-library.org/news/secadv/20150709.txt">Security Advisory</a><ul><li>Alternative chains certificate forgery (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1793">CVE-2015-1793</a>)</li></ul></td>
</tr>
<tr>
<td>12 Jun 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2c">OpenSSL 1.0.2c</a></td>
</tr>
<tr>
<td>12 Jun 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1o">OpenSSL 1.0.1o</a></td>
</tr>
<tr>
<td>11 Jun 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2b">OpenSSL 1.0.2b</a></td>
</tr>
<tr>
<td>11 Jun 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1n">OpenSSL 1.0.1n</a></td>
</tr>
<tr>
<td>11 Jun 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0s">OpenSSL 1.0.0s</a></td>
</tr>
<tr>
<td>11 Jun 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8zg">OpenSSL 0.9.8zg</a></td>
</tr>
<tr>
<td>11 Jun 2015</td>
<td><a href="https://openssl-library.org/news/secadv/20150611.txt">Security Advisory</a><ul><li>DHE man-in-the-middle protection (Logjam)</li><li>Malformed ECParameters causes infinite loop (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1788">CVE-2015-1788</a>)</li><li>Exploitable out-of-bounds read in X509_cmp_time (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1789">CVE-2015-1789</a>)</li><li>PKCS7 crash with missing EnvelopedContent (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1790">CVE-2015-1790</a>)</li><li>CMS verify infinite loop with unknown hash function (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1792">CVE-2015-1792</a>)</li><li>Race condition handling NewSessionTicket (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1791">CVE-2015-1791</a>)</li><li>Invalid free in DTLS (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-8176">CVE-2014-8176</a>)</li></ul></td>
</tr>
<tr>
<td>14 May 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_9">OpenSSL fips-2.0.9</a></td>
</tr>
<tr>
<td>19 Mar 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2a">OpenSSL 1.0.2a</a></td>
</tr>
<tr>
<td>19 Mar 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1m">OpenSSL 1.0.1m</a></td>
</tr>
<tr>
<td>19 Mar 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0r">OpenSSL 1.0.0r</a></td>
</tr>
<tr>
<td>19 Mar 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8zf">OpenSSL 0.9.8zf</a></td>
</tr>
<tr>
<td>19 Mar 2015</td>
<td><a href="https://openssl-library.org/news/secadv/20150319.txt">Security Advisory</a><ul><li>OpenSSL 1.0.2 ClientHello sigalgs DoS (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0291">CVE-2015-0291</a>)</li><li>Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0204">CVE-2015-0204</a>)</li><li>Multiblock corrupted pointer (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0290">CVE-2015-0290</a>)</li><li>Segmentation fault in DTLSv1_listen (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0207">CVE-2015-0207</a>)</li><li>Segmentation fault in ASN1_TYPE_cmp (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0286">CVE-2015-0286</a>)</li><li>Segmentation fault for invalid PSS parameters (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0208">CVE-2015-0208</a>)</li><li>ASN.1 structure reuse memory corruption (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0287">CVE-2015-0287</a>)</li><li>PKCS7 NULL pointer dereferences (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0289">CVE-2015-0289</a>)</li><li>Base64 decode (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0292">CVE-2015-0292</a>)</li><li>DoS via reachable assert in SSLv2 servers (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0293">CVE-2015-0293</a>)</li><li>Empty CKE with client auth and DHE (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-1787">CVE-2015-1787</a>)</li><li>Handshake with unseeded PRNG (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0285">CVE-2015-0285</a>)</li><li>Use After Free following d2i_ECPrivatekey error (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0209">CVE-2015-0209</a>)</li><li>X509_to_X509_REQ NULL pointer deref (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0288">CVE-2015-0288</a>)</li></ul></td>
</tr>
<tr>
<td>22 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2">OpenSSL 1.0.2</a></td>
</tr>
<tr>
<td>15 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1l">OpenSSL 1.0.1l</a></td>
</tr>
<tr>
<td>15 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0q">OpenSSL 1.0.0q</a></td>
</tr>
<tr>
<td>15 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8ze">OpenSSL 0.9.8ze</a></td>
</tr>
<tr>
<td>08 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1k">OpenSSL 1.0.1k</a></td>
</tr>
<tr>
<td>08 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0p">OpenSSL 1.0.0p</a></td>
</tr>
<tr>
<td>08 Jan 2015</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8zd">OpenSSL 0.9.8zd</a></td>
</tr>
<tr>
<td>08 Jan 2015</td>
<td><a href="https://openssl-library.org/news/secadv/20150108.txt">Security Advisory</a><ul><li>DTLS segmentation fault in dtls1_get_record (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3571">CVE-2014-3571</a>)</li><li>DTLS memory leak in dtls1_buffer_record (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0206">CVE-2015-0206</a>)</li><li>no-ssl3 configuration sets method to NULL (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3569">CVE-2014-3569</a>)</li><li>ECDHE silently downgrades to ECDH [Client] (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3572">CVE-2014-3572</a>)</li><li>RSA silently downgrades to EXPORT_RSA [Client] (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0204">CVE-2015-0204</a>)</li><li>DH client certificates accepted without verification [Server] (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2015-0205">CVE-2015-0205</a>)</li><li>Certificate fingerprints can be modified (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-8275">CVE-2014-8275</a>)</li><li>Bignum squaring may produce incorrect results (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3570">CVE-2014-3570</a>)</li></ul></td>
</tr>
<tr>
<td>24 Oct 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_8">OpenSSL fips-2.0.8</a></td>
</tr>
<tr>
<td>15 Oct 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8zc">OpenSSL 0.9.8zc</a></td>
</tr>
<tr>
<td>15 Oct 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0o">OpenSSL 1.0.0o</a></td>
</tr>
<tr>
<td>15 Oct 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1j">OpenSSL 1.0.1j</a></td>
</tr>
<tr>
<td>15 Oct 2014</td>
<td><a href="https://openssl-library.org/news/secadv/20141015.txt">Security Advisory</a><ul><li>SRTP Memory Leak (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3513">CVE-2014-3513</a>)</li><li>Session Ticket Memory Leak (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3567">CVE-2014-3567</a>)</li><li>SSL 3.0 Fallback protection</li><li>Build option no-ssl3 is incomplete (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3568">CVE-2014-3568</a>)</li></ul></td>
</tr>
<tr>
<td>25 Sep 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2-beta3">OpenSSL 1.0.2-beta3</a></td>
</tr>
<tr>
<td>06 Aug 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1i">OpenSSL 1.0.1i</a></td>
</tr>
<tr>
<td>06 Aug 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0n">OpenSSL 1.0.0n</a></td>
</tr>
<tr>
<td>06 Aug 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8zb">OpenSSL 0.9.8zb</a></td>
</tr>
<tr>
<td>06 Aug 2014</td>
<td><a href="https://openssl-library.org/news/secadv/20140806.txt">Security Advisory</a><ul><li>Information leak in pretty printing functions (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3508">CVE-2014-3508</a>)</li><li>Crash with SRP ciphersuite in Server Hello message (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-5139">CVE-2014-5139</a>)</li><li>Race condition in ssl_parse_serverhello_tlsext (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3509">CVE-2014-3509</a>)</li><li>Double Free when processing DTLS packets (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3505">CVE-2014-3505</a>)</li><li>DTLS memory exhaustion (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3506">CVE-2014-3506</a>)</li><li>DTLS memory leak from zero-length fragments (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3507">CVE-2014-3507</a>)</li><li>OpenSSL DTLS anonymous EC(DH) denial of service (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3510">CVE-2014-3510</a>)</li><li>OpenSSL TLS protocol downgrade attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3511">CVE-2014-3511</a>)</li><li>SRP buffer overrun (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3512">CVE-2014-3512</a>)</li></ul></td>
</tr>
<tr>
<td>22 Jul 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2-beta2">OpenSSL 1.0.2-beta2</a></td>
</tr>
<tr>
<td>11 Jul 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_7">OpenSSL fips-2.0.7</a></td>
</tr>
<tr>
<td>05 Jun 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8za">OpenSSL 0.9.8za</a></td>
</tr>
<tr>
<td>05 Jun 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0m">OpenSSL 1.0.0m</a></td>
</tr>
<tr>
<td>05 Jun 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1h">OpenSSL 1.0.1h</a></td>
</tr>
<tr>
<td>05 Jun 2014</td>
<td><a href="https://openssl-library.org/news/secadv/20140605.txt">Security Advisory</a><ul><li>SSL/TLS MITM vulnerability (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-0224">CVE-2014-0224</a>)</li><li>DTLS recursion flaw (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-0221">CVE-2014-0221</a>)</li><li>DTLS invalid fragment vulnerability (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-0195">CVE-2014-0195</a>)</li><li>SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-0198">CVE-2014-0198</a>)</li><li>SSL_MODE_RELEASE_BUFFERS session injection or denial of service (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2010-5298">CVE-2010-5298</a>)</li><li>Anonymous ECDH denial of service (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-3470">CVE-2014-3470</a>)</li></ul></td>
</tr>
<tr>
<td>12 May 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_6">OpenSSL fips-2.0.6</a></td>
</tr>
<tr>
<td>07 Apr 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1g">OpenSSL 1.0.1g</a></td>
</tr>
<tr>
<td>07 Apr 2014</td>
<td><a href="https://openssl-library.org/news/secadv/20140407.txt">Security Advisory</a><ul><li>TLS heartbeat read overrun (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2014-0160">CVE-2014-0160</a>)</li></ul></td>
</tr>
<tr>
<td>24 Feb 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_2-beta1">OpenSSL 1.0.2-beta1</a></td>
</tr>
<tr>
<td>06 Jan 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1f">OpenSSL 1.0.1f</a></td>
</tr>
<tr>
<td>06 Jan 2014</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0l">OpenSSL 1.0.0l</a></td>
</tr>
<tr>
<td>16 Dec 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_5">OpenSSL fips-2.0.5</a></td>
</tr>
<tr>
<td>16 Dec 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_4">OpenSSL fips-2.0.4</a></td>
</tr>
<tr>
<td>10 Apr 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_2">OpenSSL fips-2.0.2</a></td>
</tr>
<tr>
<td>10 Apr 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_3">OpenSSL fips-2.0.3</a></td>
</tr>
<tr>
<td>11 Feb 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1e">OpenSSL 1.0.1e</a></td>
</tr>
<tr>
<td>06 Feb 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0k">OpenSSL 1.0.0k</a></td>
</tr>
<tr>
<td>05 Feb 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8y">OpenSSL 0.9.8y</a></td>
</tr>
<tr>
<td>05 Feb 2013</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1d">OpenSSL 1.0.1d</a></td>
</tr>
<tr>
<td>05 Feb 2013</td>
<td><a href="https://openssl-library.org/news/secadv/20130205.txt">Security Advisory</a><ul><li>SSL, TLS and DTLS Plaintext Recovery Attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2013-0169">CVE-2013-0169</a>)</li><li>TLS 1.1 and 1.2 AES-NI crash (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-2686">CVE-2012-2686</a>)</li><li>OCSP invalid key DoS issue (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2013-0166">CVE-2013-0166</a>)</li></ul></td>
</tr>
<tr>
<td>19 Oct 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-pl1">OpenSSL fips-2.0-pl1</a></td>
</tr>
<tr>
<td>04 Oct 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0_1">OpenSSL fips-2.0.1</a></td>
</tr>
<tr>
<td>10 May 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8x">OpenSSL 0.9.8x</a></td>
</tr>
<tr>
<td>10 May 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0j">OpenSSL 1.0.0j</a></td>
</tr>
<tr>
<td>10 May 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1c">OpenSSL 1.0.1c</a></td>
</tr>
<tr>
<td>10 May 2012</td>
<td><a href="https://openssl-library.org/news/secadv/20120510.txt">Security Advisory</a><ul><li>Invalid TLS/DTLS record attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-2333">CVE-2012-2333</a>)</li></ul></td>
</tr>
<tr>
<td>26 Apr 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1b">OpenSSL 1.0.1b</a></td>
</tr>
<tr>
<td>24 Apr 2012</td>
<td><a href="https://openssl-library.org/news/secadv/20120424.txt">Security Advisory</a><ul><li>ASN1 BIO incomplete fix (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-2131">CVE-2012-2131</a>)</li></ul></td>
</tr>
<tr>
<td>23 Apr 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8w">OpenSSL 0.9.8w</a></td>
</tr>
<tr>
<td>19 Apr 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0i">OpenSSL 1.0.0i</a></td>
</tr>
<tr>
<td>19 Apr 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8v">OpenSSL 0.9.8v</a></td>
</tr>
<tr>
<td>19 Apr 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1a">OpenSSL 1.0.1a</a></td>
</tr>
<tr>
<td>19 Apr 2012</td>
<td><a href="https://openssl-library.org/news/secadv/20120419.txt">Security Advisory</a><ul><li>ASN1 BIO vulnerability (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-2110">CVE-2012-2110</a>)</li></ul></td>
</tr>
<tr>
<td>14 Mar 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1">OpenSSL 1.0.1</a></td>
</tr>
<tr>
<td>12 Mar 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8u">OpenSSL 0.9.8u</a></td>
</tr>
<tr>
<td>12 Mar 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0h">OpenSSL 1.0.0h</a></td>
</tr>
<tr>
<td>12 Mar 2012</td>
<td><a href="https://openssl-library.org/news/secadv/20120312.txt">Security Advisory</a><ul><li>CMS and S/MIME Bleichenbacher attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-0884">CVE-2012-0884</a>)</li></ul></td>
</tr>
<tr>
<td>23 Feb 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1-beta3">OpenSSL 1.0.1-beta3</a></td>
</tr>
<tr>
<td>19 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1-beta2">OpenSSL 1.0.1-beta2</a></td>
</tr>
<tr>
<td>18 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8t">OpenSSL 0.9.8t</a></td>
</tr>
<tr>
<td>18 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0g">OpenSSL 1.0.0g</a></td>
</tr>
<tr>
<td>18 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0">OpenSSL fips-2.0</a></td>
</tr>
<tr>
<td>18 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc9">OpenSSL fips-2.0-rc9</a></td>
</tr>
<tr>
<td>18 Jan 2012</td>
<td><a href="https://openssl-library.org/news/secadv/20120118.txt">Security Advisory</a><ul><li>DTLS DoS attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-0050">CVE-2012-0050</a>)</li></ul></td>
</tr>
<tr>
<td>04 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0f">OpenSSL 1.0.0f</a></td>
</tr>
<tr>
<td>04 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8s">OpenSSL 0.9.8s</a></td>
</tr>
<tr>
<td>04 Jan 2012</td>
<td><a href="https://openssl-library.org/news/secadv/20120104.txt">Security Advisory</a><ul><li>DTLS Plaintext Recovery Attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2011-4108">CVE-2011-4108</a>)</li><li>Double-free in Policy Checks (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2011-4109">CVE-2011-4109</a>)</li><li>Uninitialized SSL 3.0 Padding (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2011-4576">CVE-2011-4576</a>)</li><li>Malformed RFC 3779 Data Can Cause Assertion Failures (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2011-4577">CVE-2011-4577</a>)</li><li>SGC Restart DoS Attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2011-4619">CVE-2011-4619</a>)</li><li>Invalid GOST parameters DoS Attack (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2012-0027">CVE-2012-0027</a>)</li></ul></td>
</tr>
<tr>
<td>03 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_1-beta1">OpenSSL 1.0.1-beta1</a></td>
</tr>
<tr>
<td>03 Jan 2012</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc8">OpenSSL fips-2.0-rc8</a></td>
</tr>
<tr>
<td>12 Dec 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc7">OpenSSL fips-2.0-rc7</a></td>
</tr>
<tr>
<td>04 Dec 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc6">OpenSSL fips-2.0-rc6</a></td>
</tr>
<tr>
<td>25 Nov 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc5">OpenSSL fips-2.0-rc5</a></td>
</tr>
<tr>
<td>19 Nov 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc4">OpenSSL fips-2.0-rc4</a></td>
</tr>
<tr>
<td>18 Nov 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc3">OpenSSL fips-2.0-rc3</a></td>
</tr>
<tr>
<td>09 Nov 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc2">OpenSSL fips-2.0-rc2</a></td>
</tr>
<tr>
<td>26 Oct 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-2_0-rc1">OpenSSL fips-2.0-rc1</a></td>
</tr>
<tr>
<td>25 Sep 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-1_2_1">OpenSSL fips-1.2.1</a></td>
</tr>
<tr>
<td>25 Sep 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-1_2_2">OpenSSL fips-1.2.2</a></td>
</tr>
<tr>
<td>25 Sep 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-1_2_3">OpenSSL fips-1.2.3</a></td>
</tr>
<tr>
<td>06 Sep 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0e">OpenSSL 1.0.0e</a></td>
</tr>
<tr>
<td>06 Sep 2011</td>
<td><a href="https://openssl-library.org/news/secadv/20110906.txt">Security Advisory</a><ul><li>CRL verification vulnerability in OpenSSL</li><li>TLS ephemeral ECDH crashes in OpenSSL</li></ul></td>
</tr>
<tr>
<td>08 Feb 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8r">OpenSSL 0.9.8r</a></td>
</tr>
<tr>
<td>08 Feb 2011</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0d">OpenSSL 1.0.0d</a></td>
</tr>
<tr>
<td>08 Feb 2011</td>
<td><a href="https://openssl-library.org/news/secadv/20110208.txt">Security Advisory</a><ul><li>OCSP stapling vulnerability in OpenSSL</li></ul></td>
</tr>
<tr>
<td>02 Dec 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0c">OpenSSL 1.0.0c</a></td>
</tr>
<tr>
<td>02 Dec 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8q">OpenSSL 0.9.8q</a></td>
</tr>
<tr>
<td>02 Dec 2010</td>
<td><a href="https://openssl-library.org/news/secadv/20101202.txt">Security Advisory</a><ul><li>OpenSSL Ciphersuite Downgrade Attack</li><li>OpenSSL JPAKE validation error</li></ul></td>
</tr>
<tr>
<td>16 Nov 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0b">OpenSSL 1.0.0b</a></td>
</tr>
<tr>
<td>16 Nov 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8p">OpenSSL 0.9.8p</a></td>
</tr>
<tr>
<td>16 Nov 2010</td>
<td><a href="https://openssl-library.org/news/secadv/20101116.txt">Security Advisory</a><ul><li>TLS extension parsing race condition.</li></ul></td>
</tr>
<tr>
<td>01 Jun 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0a">OpenSSL 1.0.0a</a></td>
</tr>
<tr>
<td>01 Jun 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8o">OpenSSL 0.9.8o</a></td>
</tr>
<tr>
<td>01 Jun 2010</td>
<td><a href="https://openssl-library.org/news/secadv/20100601.txt">Security Advisory</a><ul><li>Invalid ASN1 module definition for CMS.</li><li>Invalid Return value check in pkey_rsa_verifyrecover</li></ul></td>
</tr>
<tr>
<td>29 Mar 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0">OpenSSL 1.0.0</a></td>
</tr>
<tr>
<td>24 Mar 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8n">OpenSSL 0.9.8n</a></td>
</tr>
<tr>
<td>24 Mar 2010</td>
<td><a href="https://openssl-library.org/news/secadv/20100324.txt">Security Advisory</a><ul><li>“Record of death” vulnerability in OpenSSL 0.9.8f through 0.9.8m</li></ul></td>
</tr>
<tr>
<td>25 Feb 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8m">OpenSSL 0.9.8m</a></td>
</tr>
<tr>
<td>20 Jan 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0-beta5">OpenSSL 1.0.0-beta5</a></td>
</tr>
<tr>
<td>20 Jan 2010</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8m-beta1">OpenSSL 0.9.8m-beta1</a></td>
</tr>
<tr>
<td>11 Nov 2009</td>
<td><a href="https://openssl-library.org/news/secadv/20091111.txt">Security Advisory</a><ul><li>Man-in-the-middle Renegotiation Attack</li></ul></td>
</tr>
<tr>
<td>10 Nov 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0-beta4">OpenSSL 1.0.0-beta4</a></td>
</tr>
<tr>
<td>05 Nov 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8l">OpenSSL 0.9.8l</a></td>
</tr>
<tr>
<td>15 Jul 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0-beta3">OpenSSL 1.0.0-beta3</a></td>
</tr>
<tr>
<td>21 Apr 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0-beta2">OpenSSL 1.0.0-beta2</a></td>
</tr>
<tr>
<td>01 Apr 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_1_0_0-beta1">OpenSSL 1.0.0-beta1</a></td>
</tr>
<tr>
<td>25 Mar 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8k">OpenSSL 0.9.8k</a></td>
</tr>
<tr>
<td>25 Mar 2009</td>
<td><a href="https://openssl-library.org/news/secadv/20090325.txt">Security Advisory</a><ul><li>ASN1 printing crash</li><li>Incorrect Error Checking During CMS verification.</li><li>Invalid ASN1 clearing check</li></ul></td>
</tr>
<tr>
<td>07 Jan 2009</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8j">OpenSSL 0.9.8j</a></td>
</tr>
<tr>
<td>07 Jan 2009</td>
<td><a href="https://openssl-library.org/news/secadv/20090107.txt">Security Advisory</a><ul><li>Incorrect checks for malformed signatures</li></ul></td>
</tr>
<tr>
<td>15 Sep 2008</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8i">OpenSSL 0.9.8i</a></td>
</tr>
<tr>
<td>28 May 2008</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8h">OpenSSL 0.9.8h</a></td>
</tr>
<tr>
<td>19 Oct 2007</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8g">OpenSSL 0.9.8g</a></td>
</tr>
<tr>
<td>11 Oct 2007</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8f">OpenSSL 0.9.8f</a></td>
</tr>
<tr>
<td>05 Oct 2007</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-fips-1_2_0">OpenSSL fips-1.2.0</a></td>
</tr>
<tr>
<td>23 Feb 2007</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8e">OpenSSL 0.9.8e</a></td>
</tr>
<tr>
<td>23 Feb 2007</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7m">OpenSSL 0.9.7m</a></td>
</tr>
<tr>
<td>28 Sep 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8d">OpenSSL 0.9.8d</a></td>
</tr>
<tr>
<td>28 Sep 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7l">OpenSSL 0.9.7l</a></td>
</tr>
<tr>
<td>28 Sep 2006</td>
<td><a href="https://openssl-library.org/news/secadv/20060928.txt">Security Advisory</a><ul><li>ASN.1 Denial of Service Attacks (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2006-2937">CVE-2006-2937</a>, <a href="https://openssl-library.org/news/vulnerabilities/#CVE-2006-2940">CVE-2006-2940</a>)</li><li>SSL_get_shared_ciphers() buffer overflow (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2006-3738">CVE-2006-3738</a>)</li><li>SSLv2 Client Crash (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2006-4343">CVE-2006-4343</a>)</li></ul></td>
</tr>
<tr>
<td>05 Sep 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7k">OpenSSL 0.9.7k</a></td>
</tr>
<tr>
<td>05 Sep 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8c">OpenSSL 0.9.8c</a></td>
</tr>
<tr>
<td>05 Sep 2006</td>
<td><a href="https://openssl-library.org/news/secadv/20060905.txt">Security Advisory</a><ul><li>RSA Signature Forgery (<a href="https://openssl-library.org/news/vulnerabilities/#CVE-2006-4339">CVE-2006-4339</a>)</li></ul></td>
</tr>
<tr>
<td>04 May 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8b">OpenSSL 0.9.8b</a></td>
</tr>
<tr>
<td>04 May 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7j">OpenSSL 0.9.7j</a></td>
</tr>
<tr>
<td>07 Feb 2006</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_FIPS_1_0">OpenSSL FIPS.1.0</a></td>
</tr>
<tr>
<td>14 Oct 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7i">OpenSSL 0.9.7i</a></td>
</tr>
<tr>
<td>11 Oct 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7h">OpenSSL 0.9.7h</a></td>
</tr>
<tr>
<td>11 Oct 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8a">OpenSSL 0.9.8a</a></td>
</tr>
<tr>
<td>11 Oct 2005</td>
<td><a href="https://openssl-library.org/news/secadv/20051011.txt">Security Advisory</a><ul><li>Potential SSL 2.0 Rollback (CAN-2005-2969)</li></ul></td>
</tr>
<tr>
<td>05 Jul 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8">OpenSSL 0.9.8</a></td>
</tr>
<tr>
<td>21 Jun 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8-beta6">OpenSSL 0.9.8-beta6</a></td>
</tr>
<tr>
<td>13 Jun 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8-beta5">OpenSSL 0.9.8-beta5</a></td>
</tr>
<tr>
<td>06 Jun 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8-beta4">OpenSSL 0.9.8-beta4</a></td>
</tr>
<tr>
<td>30 May 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8-beta3">OpenSSL 0.9.8-beta3</a></td>
</tr>
<tr>
<td>24 May 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8-beta2">OpenSSL 0.9.8-beta2</a></td>
</tr>
<tr>
<td>19 May 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_8-beta1">OpenSSL 0.9.8-beta1</a></td>
</tr>
<tr>
<td>11 Apr 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7g">OpenSSL 0.9.7g</a></td>
</tr>
<tr>
<td>22 Mar 2005</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7f">OpenSSL 0.9.7f</a></td>
</tr>
<tr>
<td>25 Oct 2004</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7e">OpenSSL 0.9.7e</a></td>
</tr>
<tr>
<td>17 Mar 2004</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6m">OpenSSL 0.9.6m</a></td>
</tr>
<tr>
<td>17 Mar 2004</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6m">OpenSSL engine-0.9.6m</a></td>
</tr>
<tr>
<td>17 Mar 2004</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7d">OpenSSL 0.9.7d</a></td>
</tr>
<tr>
<td>17 Mar 2004</td>
<td><a href="https://openssl-library.org/news/secadv/20040317.txt">Security Advisory</a><ul><li>1. Null-pointer assignment during SSL handshake</li><li>2. Out-of-bounds read affects Kerberos ciphersuites</li></ul></td>
</tr>
<tr>
<td>04 Nov 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6l">OpenSSL 0.9.6l</a></td>
</tr>
<tr>
<td>04 Nov 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6l">OpenSSL engine-0.9.6l</a></td>
</tr>
<tr>
<td>04 Nov 2003</td>
<td><a href="https://openssl-library.org/news/secadv/20031104.txt">Security Advisory</a><ul><li>Denial of Service in ASN.1 parsing</li></ul></td>
</tr>
<tr>
<td>30 Sep 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7c">OpenSSL 0.9.7c</a></td>
</tr>
<tr>
<td>30 Sep 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6k">OpenSSL 0.9.6k</a></td>
</tr>
<tr>
<td>30 Sep 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6k">OpenSSL engine-0.9.6k</a></td>
</tr>
<tr>
<td>10 Apr 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6j">OpenSSL 0.9.6j</a></td>
</tr>
<tr>
<td>10 Apr 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7b">OpenSSL 0.9.7b</a></td>
</tr>
<tr>
<td>10 Apr 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6j">OpenSSL engine-0.9.6j</a></td>
</tr>
<tr>
<td>19 Mar 2003</td>
<td><a href="https://openssl-library.org/news/secadv/20030319.txt">Security Advisory</a><ul><li>Klima-Pokorny-Rosa attack on RSA in SSL/TLS</li></ul></td>
</tr>
<tr>
<td>17 Mar 2003</td>
<td><a href="https://openssl-library.org/news/secadv/20030317.txt">Security Advisory</a><ul><li>Timing-based attacks on RSA keys</li></ul></td>
</tr>
<tr>
<td>19 Feb 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7a">OpenSSL 0.9.7a</a></td>
</tr>
<tr>
<td>19 Feb 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6i">OpenSSL 0.9.6i</a></td>
</tr>
<tr>
<td>19 Feb 2003</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6i">OpenSSL engine-0.9.6i</a></td>
</tr>
<tr>
<td>19 Feb 2003</td>
<td><a href="https://openssl-library.org/news/secadv/20030219.txt">Security Advisory</a><ul><li>Timing-based attacks on SSL/TLS with CBC encryption</li></ul></td>
</tr>
<tr>
<td>30 Dec 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7">OpenSSL 0.9.7</a></td>
</tr>
<tr>
<td>17 Dec 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7-beta6">OpenSSL 0.9.7-beta6</a></td>
</tr>
<tr>
<td>06 Dec 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7-beta5">OpenSSL 0.9.7-beta5</a></td>
</tr>
<tr>
<td>05 Dec 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6h">OpenSSL 0.9.6h</a></td>
</tr>
<tr>
<td>05 Dec 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6h">OpenSSL engine-0.9.6h</a></td>
</tr>
<tr>
<td>19 Nov 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7-beta4">OpenSSL 0.9.7-beta4</a></td>
</tr>
<tr>
<td>09 Aug 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6g">OpenSSL 0.9.6g</a></td>
</tr>
<tr>
<td>09 Aug 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6g">OpenSSL engine-0.9.6g</a></td>
</tr>
<tr>
<td>08 Aug 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6f">OpenSSL 0.9.6f</a></td>
</tr>
<tr>
<td>08 Aug 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6f">OpenSSL engine-0.9.6f</a></td>
</tr>
<tr>
<td>30 Jul 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6e">OpenSSL 0.9.6e</a></td>
</tr>
<tr>
<td>30 Jul 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6e">OpenSSL engine-0.9.6e</a></td>
</tr>
<tr>
<td>30 Jul 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7-beta3">OpenSSL 0.9.7-beta3</a></td>
</tr>
<tr>
<td>16 Jun 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7-beta2">OpenSSL 0.9.7-beta2</a></td>
</tr>
<tr>
<td>01 Jun 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_7-beta1">OpenSSL 0.9.7-beta1</a></td>
</tr>
<tr>
<td>09 May 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6d">OpenSSL 0.9.6d</a></td>
</tr>
<tr>
<td>09 May 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6d">OpenSSL engine-0.9.6d</a></td>
</tr>
<tr>
<td>17 Apr 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6d-beta1">OpenSSL 0.9.6d-beta1</a></td>
</tr>
<tr>
<td>17 Apr 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6d-beta1">OpenSSL engine-0.9.6d-beta1</a></td>
</tr>
<tr>
<td>15 Feb 2002</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6c">OpenSSL engine-0.9.6c</a></td>
</tr>
<tr>
<td>21 Dec 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6c">OpenSSL 0.9.6c</a></td>
</tr>
<tr>
<td>09 Jul 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6b">OpenSSL 0.9.6b</a></td>
</tr>
<tr>
<td>09 Jul 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6b">OpenSSL engine-0.9.6b</a></td>
</tr>
<tr>
<td>05 Apr 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6a">OpenSSL engine-0.9.6a</a></td>
</tr>
<tr>
<td>05 Apr 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6a">OpenSSL 0.9.6a</a></td>
</tr>
<tr>
<td>30 Mar 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6a-beta3">OpenSSL 0.9.6a-beta3</a></td>
</tr>
<tr>
<td>30 Mar 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6a-beta3">OpenSSL engine-0.9.6a-beta3</a></td>
</tr>
<tr>
<td>21 Mar 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6a-beta2">OpenSSL 0.9.6a-beta2</a></td>
</tr>
<tr>
<td>21 Mar 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6a-beta2">OpenSSL engine-0.9.6a-beta2</a></td>
</tr>
<tr>
<td>13 Mar 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6a-beta1">OpenSSL 0.9.6a-beta1</a></td>
</tr>
<tr>
<td>13 Mar 2001</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6a-beta1">OpenSSL engine-0.9.6a-beta1</a></td>
</tr>
<tr>
<td>10 Oct 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6">OpenSSL 0.9.6</a></td>
</tr>
<tr>
<td>10 Oct 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6-beta1">OpenSSL 0.9.6-beta1</a></td>
</tr>
<tr>
<td>10 Oct 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6-beta2">OpenSSL 0.9.6-beta2</a></td>
</tr>
<tr>
<td>24 Sep 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6">OpenSSL engine-0.9.6</a></td>
</tr>
<tr>
<td>21 Sep 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_6-beta3">OpenSSL 0.9.6-beta3</a></td>
</tr>
<tr>
<td>21 Sep 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6-beta3">OpenSSL engine-0.9.6-beta3</a></td>
</tr>
<tr>
<td>17 Sep 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6-beta2">OpenSSL engine-0.9.6-beta2</a></td>
</tr>
<tr>
<td>11 Sep 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL-engine-0_9_6-beta1">OpenSSL engine-0.9.6-beta1</a></td>
</tr>
<tr>
<td>25 May 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_5">OpenSSL 0.9.5</a></td>
</tr>
<tr>
<td>01 Apr 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_5a">OpenSSL 0.9.5a</a></td>
</tr>
<tr>
<td>23 Mar 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_5a-beta2">OpenSSL 0.9.5a-beta2</a></td>
</tr>
<tr>
<td>20 Mar 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_5a-beta1">OpenSSL 0.9.5a-beta1</a></td>
</tr>
<tr>
<td>27 Feb 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_5beta2">OpenSSL 0.9.5beta2</a></td>
</tr>
<tr>
<td>24 Feb 2000</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_5beta1">OpenSSL 0.9.5beta1</a></td>
</tr>
<tr>
<td>09 Aug 1999</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_4">OpenSSL 0.9.4</a></td>
</tr>
<tr>
<td>29 May 1999</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_3a">OpenSSL 0.9.3a</a></td>
</tr>
<tr>
<td>24 May 1999</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_3">OpenSSL 0.9.3</a></td>
</tr>
<tr>
<td>23 May 1999</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_3beta2">OpenSSL 0.9.3beta2</a></td>
</tr>
<tr>
<td>20 May 1999</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_3beta1">OpenSSL 0.9.3beta1</a></td>
</tr>
<tr>
<td>22 Mar 1999</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_2b">OpenSSL 0.9.2b</a></td>
</tr>
<tr>
<td>23 Dec 1998</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/OpenSSL_0_9_1c">OpenSSL 0.9.1c</a></td>
</tr>
<tr>
<td>21 Dec 1998</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/SSLeay_0_8_1b">OpenSSL SSLeay.0.8.1b</a></td>
</tr>
<tr>
<td>21 Dec 1998</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/SSLeay_0_9_0b">OpenSSL SSLeay.0.9.0b</a></td>
</tr>
<tr>
<td>21 Dec 1998</td>
<td><a href="https://github.com/openssl/openssl/releases/tag/SSLeay_0_9_1b">OpenSSL SSLeay.0.9.1b</a></td>
</tr>
</tbody>
</table>Release Requirements Policy
https://openssl-library.org/policies/technical/release-requirements/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/release-requirements/<p>The OpenSSL project team creates the following 5 types of OpenSSL software
releases:</p>
<ul>
<li><a href="https://openssl-library.org/policies/general/glossary/#alpha-release">alpha</a> (pre-)releases</li>
<li><a href="https://openssl-library.org/policies/general/glossary/#beta-release">beta</a> (pre-)releases</li>
<li><a href="https://openssl-library.org/policies/general/glossary/#major-release">major</a> releases</li>
<li><a href="https://openssl-library.org/policies/general/glossary/#minor-release">minor</a> releases</li>
<li><a href="https://openssl-library.org/policies/general/glossary/#patch-release">patch</a> releases</li>
</ul>
<p>This policy defines the requirements on the state of a branch in the source
tree that must be met before a release from that branch can be done.</p>
<h2 id="alpha-pre-releases">Alpha Pre-releases</h2>
<p>As this is just a preview release for testing things that have been worked
on in the development branch, the requirements are minimal.</p>Release Strategy
https://openssl-library.org/policies/releasestrat/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/releasestrat/<h4 id="first-issued-23-december-2014">First issued 23 December 2014</h4>
<h4 id="last-modified-17-december-2025">Last modified 17 December 2025</h4>
<p>From 3.0.0 and above, the OpenSSL versioning scheme uses the format:
MAJOR.MINOR.PATCH</p>
<p>With this format, API/ABI compatibility will be guaranteed for the same
MAJOR version number.</p>
<ul>
<li>MAJOR: API/ABI incompatible changes will increase this number</li>
<li>MINOR: API/ABI compatible feature releases will change this</li>
<li>PATCH: Bug fix releases will increment this number. We also allow
backporting of accessor functions in these releases.</li>
</ul>
<p>This approximately aligns with the expectations of users who are familiar
with semantic versioning. However, we have not adopted semantic
versioning in the strict sense of its rules, because it would mean
changing our current LTS policies and practices.</p>Search
https://openssl-library.org/search/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/search/Security advisory list (json)
https://openssl-library.org/news/secjson/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/secjson/<ul>
<li><a href="statements.json">statements</a></li>
<li><a href="cve-2026-31790.json">CVE-2026-31790</a></li>
<li><a href="cve-2026-31789.json">CVE-2026-31789</a></li>
<li><a href="cve-2026-28390.json">CVE-2026-28390</a></li>
<li><a href="cve-2026-28389.json">CVE-2026-28389</a></li>
<li><a href="cve-2026-28388.json">CVE-2026-28388</a></li>
<li><a href="cve-2026-28387.json">CVE-2026-28387</a></li>
<li><a href="cve-2026-28386.json">CVE-2026-28386</a></li>
<li><a href="cve-2026-2673.json">CVE-2026-2673</a></li>
<li><a href="cve-2026-22796.json">CVE-2026-22796</a></li>
<li><a href="cve-2026-22795.json">CVE-2026-22795</a></li>
<li><a href="cve-2025-9232.json">CVE-2025-9232</a></li>
<li><a href="cve-2025-9231.json">CVE-2025-9231</a></li>
<li><a href="cve-2025-9230.json">CVE-2025-9230</a></li>
<li><a href="cve-2025-69421.json">CVE-2025-69421</a></li>
<li><a href="cve-2025-69420.json">CVE-2025-69420</a></li>
<li><a href="cve-2025-69419.json">CVE-2025-69419</a></li>
<li><a href="cve-2025-69418.json">CVE-2025-69418</a></li>
<li><a href="cve-2025-68160.json">CVE-2025-68160</a></li>
<li><a href="cve-2025-66199.json">CVE-2025-66199</a></li>
<li><a href="cve-2025-4575.json">CVE-2025-4575</a></li>
<li><a href="cve-2025-15469.json">CVE-2025-15469</a></li>
<li><a href="cve-2025-15468.json">CVE-2025-15468</a></li>
<li><a href="cve-2025-15467.json">CVE-2025-15467</a></li>
<li><a href="cve-2025-11187.json">CVE-2025-11187</a></li>
<li><a href="cve-2024-9143.json">CVE-2024-9143</a></li>
<li><a href="cve-2024-6119.json">CVE-2024-6119</a></li>
<li><a href="cve-2024-5535.json">CVE-2024-5535</a></li>
<li><a href="cve-2024-4741.json">CVE-2024-4741</a></li>
<li><a href="cve-2024-4603.json">CVE-2024-4603</a></li>
<li><a href="cve-2024-2511.json">CVE-2024-2511</a></li>
<li><a href="cve-2024-13176.json">CVE-2024-13176</a></li>
<li><a href="cve-2024-12797.json">CVE-2024-12797</a></li>
<li><a href="cve-2024-0727.json">CVE-2024-0727</a></li>
<li><a href="cve-2023-6237.json">CVE-2023-6237</a></li>
<li><a href="cve-2023-6129.json">CVE-2023-6129</a></li>
<li><a href="cve-2023-5678.json">CVE-2023-5678</a></li>
<li><a href="cve-2023-5363.json">CVE-2023-5363</a></li>
<li><a href="cve-2023-4807.json">CVE-2023-4807</a></li>
<li><a href="cve-2023-3817.json">CVE-2023-3817</a></li>
<li><a href="cve-2023-3446.json">CVE-2023-3446</a></li>
<li><a href="cve-2023-2975.json">CVE-2023-2975</a></li>
<li><a href="cve-2023-2650.json">CVE-2023-2650</a></li>
<li><a href="cve-2023-1255.json">CVE-2023-1255</a></li>
<li><a href="cve-2023-0466.json">CVE-2023-0466</a></li>
<li><a href="cve-2023-0465.json">CVE-2023-0465</a></li>
<li><a href="cve-2023-0464.json">CVE-2023-0464</a></li>
<li><a href="cve-2023-0401.json">CVE-2023-0401</a></li>
<li><a href="cve-2023-0286.json">CVE-2023-0286</a></li>
<li><a href="cve-2023-0217.json">CVE-2023-0217</a></li>
<li><a href="cve-2023-0216.json">CVE-2023-0216</a></li>
<li><a href="cve-2023-0215.json">CVE-2023-0215</a></li>
<li><a href="cve-2022-4450.json">CVE-2022-4450</a></li>
<li><a href="cve-2022-4304.json">CVE-2022-4304</a></li>
<li><a href="cve-2022-4203.json">CVE-2022-4203</a></li>
<li><a href="cve-2022-3996.json">CVE-2022-3996</a></li>
<li><a href="cve-2022-3786.json">CVE-2022-3786</a></li>
<li><a href="cve-2022-3602.json">CVE-2022-3602</a></li>
<li><a href="cve-2022-3358.json">CVE-2022-3358</a></li>
<li><a href="cve-2022-2274.json">CVE-2022-2274</a></li>
<li><a href="cve-2022-2097.json">CVE-2022-2097</a></li>
<li><a href="cve-2022-2068.json">CVE-2022-2068</a></li>
<li><a href="cve-2022-1473.json">CVE-2022-1473</a></li>
<li><a href="cve-2022-1434.json">CVE-2022-1434</a></li>
<li><a href="cve-2022-1343.json">CVE-2022-1343</a></li>
<li><a href="cve-2022-1292.json">CVE-2022-1292</a></li>
<li><a href="cve-2022-0778.json">CVE-2022-0778</a></li>
<li><a href="cve-2021-4160.json">CVE-2021-4160</a></li>
<li><a href="cve-2021-4044.json">CVE-2021-4044</a></li>
<li><a href="cve-2021-3712.json">CVE-2021-3712</a></li>
<li><a href="cve-2021-3711.json">CVE-2021-3711</a></li>
<li><a href="cve-2021-3450.json">CVE-2021-3450</a></li>
<li><a href="cve-2021-3449.json">CVE-2021-3449</a></li>
<li><a href="cve-2021-23841.json">CVE-2021-23841</a></li>
<li><a href="cve-2021-23840.json">CVE-2021-23840</a></li>
<li><a href="cve-2021-23839.json">CVE-2021-23839</a></li>
<li><a href="cve-2020-1971.json">CVE-2020-1971</a></li>
<li><a href="cve-2020-1968.json">CVE-2020-1968</a></li>
<li><a href="cve-2020-1967.json">CVE-2020-1967</a></li>
<li><a href="cve-2019-1563.json">CVE-2019-1563</a></li>
<li><a href="cve-2019-1559.json">CVE-2019-1559</a></li>
<li><a href="cve-2019-1552.json">CVE-2019-1552</a></li>
<li><a href="cve-2019-1551.json">CVE-2019-1551</a></li>
<li><a href="cve-2019-1549.json">CVE-2019-1549</a></li>
<li><a href="cve-2019-1547.json">CVE-2019-1547</a></li>
<li><a href="cve-2019-1543.json">CVE-2019-1543</a></li>
<li><a href="cve-2018-5407.json">CVE-2018-5407</a></li>
<li><a href="cve-2018-0739.json">CVE-2018-0739</a></li>
<li><a href="cve-2018-0737.json">CVE-2018-0737</a></li>
<li><a href="cve-2018-0735.json">CVE-2018-0735</a></li>
<li><a href="cve-2018-0734.json">CVE-2018-0734</a></li>
<li><a href="cve-2018-0733.json">CVE-2018-0733</a></li>
<li><a href="cve-2018-0732.json">CVE-2018-0732</a></li>
<li><a href="cve-2017-3738.json">CVE-2017-3738</a></li>
<li><a href="cve-2017-3737.json">CVE-2017-3737</a></li>
<li><a href="cve-2017-3736.json">CVE-2017-3736</a></li>
<li><a href="cve-2017-3735.json">CVE-2017-3735</a></li>
<li><a href="cve-2017-3733.json">CVE-2017-3733</a></li>
<li><a href="cve-2017-3732.json">CVE-2017-3732</a></li>
<li><a href="cve-2017-3731.json">CVE-2017-3731</a></li>
<li><a href="cve-2017-3730.json">CVE-2017-3730</a></li>
<li><a href="cve-2016-7055.json">CVE-2016-7055</a></li>
<li><a href="cve-2016-7054.json">CVE-2016-7054</a></li>
<li><a href="cve-2016-7053.json">CVE-2016-7053</a></li>
<li><a href="cve-2016-7052.json">CVE-2016-7052</a></li>
<li><a href="cve-2016-6309.json">CVE-2016-6309</a></li>
<li><a href="cve-2016-6308.json">CVE-2016-6308</a></li>
<li><a href="cve-2016-6307.json">CVE-2016-6307</a></li>
<li><a href="cve-2016-6306.json">CVE-2016-6306</a></li>
<li><a href="cve-2016-6305.json">CVE-2016-6305</a></li>
<li><a href="cve-2016-6304.json">CVE-2016-6304</a></li>
<li><a href="cve-2016-6303.json">CVE-2016-6303</a></li>
<li><a href="cve-2016-6302.json">CVE-2016-6302</a></li>
<li><a href="cve-2016-2183.json">CVE-2016-2183</a></li>
<li><a href="cve-2016-2182.json">CVE-2016-2182</a></li>
<li><a href="cve-2016-2181.json">CVE-2016-2181</a></li>
<li><a href="cve-2016-2180.json">CVE-2016-2180</a></li>
<li><a href="cve-2016-2179.json">CVE-2016-2179</a></li>
<li><a href="cve-2016-2178.json">CVE-2016-2178</a></li>
<li><a href="cve-2016-2177.json">CVE-2016-2177</a></li>
<li><a href="cve-2016-2176.json">CVE-2016-2176</a></li>
<li><a href="cve-2016-2109.json">CVE-2016-2109</a></li>
<li><a href="cve-2016-2108.json">CVE-2016-2108</a></li>
<li><a href="cve-2016-2107.json">CVE-2016-2107</a></li>
<li><a href="cve-2016-2106.json">CVE-2016-2106</a></li>
<li><a href="cve-2016-2105.json">CVE-2016-2105</a></li>
<li><a href="cve-2016-0800.json">CVE-2016-0800</a></li>
<li><a href="cve-2016-0799.json">CVE-2016-0799</a></li>
<li><a href="cve-2016-0798.json">CVE-2016-0798</a></li>
<li><a href="cve-2016-0797.json">CVE-2016-0797</a></li>
<li><a href="cve-2016-0705.json">CVE-2016-0705</a></li>
<li><a href="cve-2016-0704.json">CVE-2016-0704</a></li>
<li><a href="cve-2016-0703.json">CVE-2016-0703</a></li>
<li><a href="cve-2016-0702.json">CVE-2016-0702</a></li>
<li><a href="cve-2016-0701.json">CVE-2016-0701</a></li>
<li><a href="cve-2015-3197.json">CVE-2015-3197</a></li>
<li><a href="cve-2015-3196.json">CVE-2015-3196</a></li>
<li><a href="cve-2015-3195.json">CVE-2015-3195</a></li>
<li><a href="cve-2015-3194.json">CVE-2015-3194</a></li>
<li><a href="cve-2015-3193.json">CVE-2015-3193</a></li>
<li><a href="cve-2015-1794.json">CVE-2015-1794</a></li>
<li><a href="cve-2015-1793.json">CVE-2015-1793</a></li>
<li><a href="cve-2015-1792.json">CVE-2015-1792</a></li>
<li><a href="cve-2015-1791.json">CVE-2015-1791</a></li>
<li><a href="cve-2015-1790.json">CVE-2015-1790</a></li>
<li><a href="cve-2015-1789.json">CVE-2015-1789</a></li>
<li><a href="cve-2015-1788.json">CVE-2015-1788</a></li>
<li><a href="cve-2015-1787.json">CVE-2015-1787</a></li>
<li><a href="cve-2015-0293.json">CVE-2015-0293</a></li>
<li><a href="cve-2015-0292.json">CVE-2015-0292</a></li>
<li><a href="cve-2015-0291.json">CVE-2015-0291</a></li>
<li><a href="cve-2015-0290.json">CVE-2015-0290</a></li>
<li><a href="cve-2015-0289.json">CVE-2015-0289</a></li>
<li><a href="cve-2015-0288.json">CVE-2015-0288</a></li>
<li><a href="cve-2015-0287.json">CVE-2015-0287</a></li>
<li><a href="cve-2015-0286.json">CVE-2015-0286</a></li>
<li><a href="cve-2015-0285.json">CVE-2015-0285</a></li>
<li><a href="cve-2015-0209.json">CVE-2015-0209</a></li>
<li><a href="cve-2015-0208.json">CVE-2015-0208</a></li>
<li><a href="cve-2015-0207.json">CVE-2015-0207</a></li>
<li><a href="cve-2015-0206.json">CVE-2015-0206</a></li>
<li><a href="cve-2015-0205.json">CVE-2015-0205</a></li>
<li><a href="cve-2015-0204.json">CVE-2015-0204</a></li>
<li><a href="cve-2014-8275.json">CVE-2014-8275</a></li>
<li><a href="cve-2014-8176.json">CVE-2014-8176</a></li>
<li><a href="cve-2014-5139.json">CVE-2014-5139</a></li>
<li><a href="cve-2014-3572.json">CVE-2014-3572</a></li>
<li><a href="cve-2014-3571.json">CVE-2014-3571</a></li>
<li><a href="cve-2014-3570.json">CVE-2014-3570</a></li>
<li><a href="cve-2014-3569.json">CVE-2014-3569</a></li>
<li><a href="cve-2014-3568.json">CVE-2014-3568</a></li>
<li><a href="cve-2014-3567.json">CVE-2014-3567</a></li>
<li><a href="cve-2014-3513.json">CVE-2014-3513</a></li>
<li><a href="cve-2014-3512.json">CVE-2014-3512</a></li>
<li><a href="cve-2014-3511.json">CVE-2014-3511</a></li>
<li><a href="cve-2014-3510.json">CVE-2014-3510</a></li>
<li><a href="cve-2014-3509.json">CVE-2014-3509</a></li>
<li><a href="cve-2014-3508.json">CVE-2014-3508</a></li>
<li><a href="cve-2014-3507.json">CVE-2014-3507</a></li>
<li><a href="cve-2014-3506.json">CVE-2014-3506</a></li>
<li><a href="cve-2014-3505.json">CVE-2014-3505</a></li>
<li><a href="cve-2014-3470.json">CVE-2014-3470</a></li>
<li><a href="cve-2014-0224.json">CVE-2014-0224</a></li>
<li><a href="cve-2014-0221.json">CVE-2014-0221</a></li>
<li><a href="cve-2014-0198.json">CVE-2014-0198</a></li>
<li><a href="cve-2014-0195.json">CVE-2014-0195</a></li>
<li><a href="cve-2014-0160.json">CVE-2014-0160</a></li>
<li><a href="cve-2014-0076.json">CVE-2014-0076</a></li>
<li><a href="cve-2013-6450.json">CVE-2013-6450</a></li>
<li><a href="cve-2013-6449.json">CVE-2013-6449</a></li>
<li><a href="cve-2013-4353.json">CVE-2013-4353</a></li>
<li><a href="cve-2013-0169.json">CVE-2013-0169</a></li>
<li><a href="cve-2013-0166.json">CVE-2013-0166</a></li>
<li><a href="cve-2012-2686.json">CVE-2012-2686</a></li>
<li><a href="cve-2012-2333.json">CVE-2012-2333</a></li>
<li><a href="cve-2012-2131.json">CVE-2012-2131</a></li>
<li><a href="cve-2012-2110.json">CVE-2012-2110</a></li>
<li><a href="cve-2012-0884.json">CVE-2012-0884</a></li>
<li><a href="cve-2012-0050.json">CVE-2012-0050</a></li>
<li><a href="cve-2012-0027.json">CVE-2012-0027</a></li>
<li><a href="cve-2011-4619.json">CVE-2011-4619</a></li>
<li><a href="cve-2011-4577.json">CVE-2011-4577</a></li>
<li><a href="cve-2011-4576.json">CVE-2011-4576</a></li>
<li><a href="cve-2011-4109.json">CVE-2011-4109</a></li>
<li><a href="cve-2011-4108.json">CVE-2011-4108</a></li>
<li><a href="cve-2011-3210.json">CVE-2011-3210</a></li>
<li><a href="cve-2011-3207.json">CVE-2011-3207</a></li>
<li><a href="cve-2011-0014.json">CVE-2011-0014</a></li>
<li><a href="cve-2010-5298.json">CVE-2010-5298</a></li>
<li><a href="cve-2010-4252.json">CVE-2010-4252</a></li>
<li><a href="cve-2010-4180.json">CVE-2010-4180</a></li>
<li><a href="cve-2010-3864.json">CVE-2010-3864</a></li>
<li><a href="cve-2010-1633.json">CVE-2010-1633</a></li>
<li><a href="cve-2010-0742.json">CVE-2010-0742</a></li>
<li><a href="cve-2010-0740.json">CVE-2010-0740</a></li>
<li><a href="cve-2010-0433.json">CVE-2010-0433</a></li>
<li><a href="cve-2009-4355.json">CVE-2009-4355</a></li>
<li><a href="cve-2009-3555.json">CVE-2009-3555</a></li>
<li><a href="cve-2009-3245.json">CVE-2009-3245</a></li>
<li><a href="cve-2009-1387.json">CVE-2009-1387</a></li>
<li><a href="cve-2009-1386.json">CVE-2009-1386</a></li>
<li><a href="cve-2009-1379.json">CVE-2009-1379</a></li>
<li><a href="cve-2009-1378.json">CVE-2009-1378</a></li>
<li><a href="cve-2009-1377.json">CVE-2009-1377</a></li>
<li><a href="cve-2009-0789.json">CVE-2009-0789</a></li>
<li><a href="cve-2009-0591.json">CVE-2009-0591</a></li>
<li><a href="cve-2009-0590.json">CVE-2009-0590</a></li>
<li><a href="cve-2008-5077.json">CVE-2008-5077</a></li>
<li><a href="cve-2008-1672.json">CVE-2008-1672</a></li>
<li><a href="cve-2008-0891.json">CVE-2008-0891</a></li>
<li><a href="cve-2007-5502.json">CVE-2007-5502</a></li>
<li><a href="cve-2007-5135.json">CVE-2007-5135</a></li>
<li><a href="cve-2007-4995.json">CVE-2007-4995</a></li>
<li><a href="cve-2006-4343.json">CVE-2006-4343</a></li>
<li><a href="cve-2006-4339.json">CVE-2006-4339</a></li>
<li><a href="cve-2006-3738.json">CVE-2006-3738</a></li>
<li><a href="cve-2006-2940.json">CVE-2006-2940</a></li>
<li><a href="cve-2006-2937.json">CVE-2006-2937</a></li>
<li><a href="cve-2005-2969.json">CVE-2005-2969</a></li>
<li><a href="cve-2004-0975.json">CVE-2004-0975</a></li>
<li><a href="cve-2004-0112.json">CVE-2004-0112</a></li>
<li><a href="cve-2004-0081.json">CVE-2004-0081</a></li>
<li><a href="cve-2004-0079.json">CVE-2004-0079</a></li>
<li><a href="cve-2003-0851.json">CVE-2003-0851</a></li>
<li><a href="cve-2003-0545.json">CVE-2003-0545</a></li>
<li><a href="cve-2003-0544.json">CVE-2003-0544</a></li>
<li><a href="cve-2003-0543.json">CVE-2003-0543</a></li>
<li><a href="cve-2003-0147.json">CVE-2003-0147</a></li>
<li><a href="cve-2003-0131.json">CVE-2003-0131</a></li>
<li><a href="cve-2003-0078.json">CVE-2003-0078</a></li>
<li><a href="cve-2002-1568.json">CVE-2002-1568</a></li>
<li><a href="cve-2002-0659.json">CVE-2002-0659</a></li>
<li><a href="cve-2002-0657.json">CVE-2002-0657</a></li>
<li><a href="cve-2002-0656.json">CVE-2002-0656</a></li>
<li><a href="cve-2002-0655.json">CVE-2002-0655</a></li>
</ul>Security advisory list (txt)
https://openssl-library.org/news/secadv/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/secadv/<ul>
<li><a href="prng.txt">prng</a></li>
<li><a href="hack.txt">hack</a></li>
<li><a href="20260407.txt">20260407</a></li>
<li><a href="20260313.txt">20260313</a></li>
<li><a href="20260127.txt">20260127</a></li>
<li><a href="20250930.txt">20250930</a></li>
<li><a href="20250522.txt">20250522</a></li>
<li><a href="20250211.txt">20250211</a></li>
<li><a href="20250120.txt">20250120</a></li>
<li><a href="20241016.txt">20241016</a></li>
<li><a href="20240903.txt">20240903</a></li>
<li><a href="20240627.txt">20240627</a></li>
<li><a href="20240528.txt">20240528</a></li>
<li><a href="20240516.txt">20240516</a></li>
<li><a href="20240408.txt">20240408</a></li>
<li><a href="20240125.txt">20240125</a></li>
<li><a href="20240115.txt">20240115</a></li>
<li><a href="20240109.txt">20240109</a></li>
<li><a href="20231106.txt">20231106</a></li>
<li><a href="20231024.txt">20231024</a></li>
<li><a href="20230908.txt">20230908</a></li>
<li><a href="20230731.txt">20230731</a></li>
<li><a href="20230719.txt">20230719</a></li>
<li><a href="20230714.txt">20230714</a></li>
<li><a href="20230530.txt">20230530</a></li>
<li><a href="20230420.txt">20230420</a></li>
<li><a href="20230328.txt">20230328</a></li>
<li><a href="20230322.txt">20230322</a></li>
<li><a href="20230207.txt">20230207</a></li>
<li><a href="20221213.txt">20221213</a></li>
<li><a href="20221101.txt">20221101</a></li>
<li><a href="20221011.txt">20221011</a></li>
<li><a href="20220705.txt">20220705</a></li>
<li><a href="20220621.txt">20220621</a></li>
<li><a href="20220503.txt">20220503</a></li>
<li><a href="20220315.txt">20220315</a></li>
<li><a href="20220128.txt">20220128</a></li>
<li><a href="20211214.txt">20211214</a></li>
<li><a href="20210824.txt">20210824</a></li>
<li><a href="20210325.txt">20210325</a></li>
<li><a href="20210216.txt">20210216</a></li>
<li><a href="20201208.txt">20201208</a></li>
<li><a href="20200909.txt">20200909</a></li>
<li><a href="20200421.txt">20200421</a></li>
<li><a href="20191206.txt">20191206</a></li>
<li><a href="20190910.txt">20190910</a></li>
<li><a href="20190730.txt">20190730</a></li>
<li><a href="20190306.txt">20190306</a></li>
<li><a href="20190226.txt">20190226</a></li>
<li><a href="20181112.txt">20181112</a></li>
<li><a href="20181030.txt">20181030</a></li>
<li><a href="20181029.txt">20181029</a></li>
<li><a href="20180612.txt">20180612</a></li>
<li><a href="20180416.txt">20180416</a></li>
<li><a href="20180327.txt">20180327</a></li>
<li><a href="20171207.txt">20171207</a></li>
<li><a href="20171102.txt">20171102</a></li>
<li><a href="20170828.txt">20170828</a></li>
<li><a href="20170216.txt">20170216</a></li>
<li><a href="20170126.txt">20170126</a></li>
<li><a href="20161110.txt">20161110</a></li>
<li><a href="20160926.txt">20160926</a></li>
<li><a href="20160922.txt">20160922</a></li>
<li><a href="20160503.txt">20160503</a></li>
<li><a href="20160301.txt">20160301</a></li>
<li><a href="20160128.txt">20160128</a></li>
<li><a href="20151203.txt">20151203</a></li>
<li><a href="20150709.txt">20150709</a></li>
<li><a href="20150611.txt">20150611</a></li>
<li><a href="20150319.txt">20150319</a></li>
<li><a href="20150108.txt">20150108</a></li>
<li><a href="20141015.txt">20141015</a></li>
<li><a href="20140806.txt">20140806</a></li>
<li><a href="20140605.txt">20140605</a></li>
<li><a href="20140407.txt">20140407</a></li>
<li><a href="20130205.txt">20130205</a></li>
<li><a href="20120510.txt">20120510</a></li>
<li><a href="20120424.txt">20120424</a></li>
<li><a href="20120419.txt">20120419</a></li>
<li><a href="20120312.txt">20120312</a></li>
<li><a href="20120118.txt">20120118</a></li>
<li><a href="20120104.txt">20120104</a></li>
<li><a href="20110906.txt">20110906</a></li>
<li><a href="20110208.txt">20110208</a></li>
<li><a href="20101202.txt">20101202</a></li>
<li><a href="20101116.txt">20101116</a></li>
<li><a href="20101116-2.txt">20101116-2</a></li>
<li><a href="20100601.txt">20100601</a></li>
<li><a href="20100324.txt">20100324</a></li>
<li><a href="20091111.txt">20091111</a></li>
<li><a href="20090325.txt">20090325</a></li>
<li><a href="20090107.txt">20090107</a></li>
<li><a href="20080528.txt">20080528</a></li>
<li><a href="20071129.txt">20071129</a></li>
<li><a href="20071012.txt">20071012</a></li>
<li><a href="20060928.txt">20060928</a></li>
<li><a href="20060905.txt">20060905</a></li>
<li><a href="20051011.txt">20051011</a></li>
<li><a href="20040317.txt">20040317</a></li>
<li><a href="20031104.txt">20031104</a></li>
<li><a href="20030930.txt">20030930</a></li>
<li><a href="20030319.txt">20030319</a></li>
<li><a href="20030317.txt">20030317</a></li>
<li><a href="20030219.txt">20030219</a></li>
<li><a href="20020730.txt">20020730</a></li>
</ul>Security Policy
https://openssl-library.org/policies/general/security-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/security-policy/<h2 id="reporting-security-issues">Reporting security issues</h2>
<p>If you wish to report a possible security issue in OpenSSL please
<a href="https://openssl-library.org/community/#reporting-security-bugssecurityreports">notify us</a>.</p>
<h2 id="issue-triage">Issue triage</h2>
<p>Notifications are received by the OpenSSL Security Response Team (<a href="https://openssl-library.org/policies/general/glossary/#srt">SRT</a>)
designated by the OpenSSL Foundation and the OpenSSL Corporation directors.</p>
<p>We engage resources within the OpenSSL Foundation and the OpenSSL Corporation
to start the investigation and prioritisation. We may work in private with
individuals who are not part of the <a href="https://openssl-library.org/policies/general/glossary/#srt">SRT</a> as well as other organisations
where we believe this can help with the issue investigation, resolution, or
testing.</p>Sponsorship and Donations
https://openssl-library.org/donations/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/donations/<p>The OpenSSL project relies on funding to maintain and improve OpenSSL.
You can support the OpenSSL project financially with the purchase of a
<a href="contracts.html">support contract</a>, or by a sponsorship donation.
We can accept smaller sponsorship donations via
<a href="https://github.com/sponsors/openssl">GitHub Sponsors</a>.
We do not have a PayPal account. Please do not donate to any PayPal
account claiming to be associated with us!
Please note that the <a href="https://openssl-library.org/community/contacts.html">OpenSSL Software Foundation</a>
(OSF) is incorporated in the the state of Delaware, United States, as a
non-profit corporation. It does not qualify as a tax-exempt charitable
organisation under Section 501(c)(3) of the U.S. Internal Revenue Code.</p>Stable Release Updates Policy
https://openssl-library.org/policies/technical/stable-release-updates/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/stable-release-updates/<p>This policy covers allowed changes on release branches.</p>
<h2 id="definitions">Definitions</h2>
<p>A <strong>stable release</strong> is a series beginning with a major or minor release that
is not a pre-release, and all its updates.</p>
<p>A <strong>patch release</strong> is an update within a stable release.</p>
<p>A <strong>public interface</strong> is any function, structure or macro declared in a public
header file.</p>
<p>A <strong>bug fix</strong> is a fix of functionality of the libraries, modules,
applications, or the build system that (all or any items might apply):</p>Testing Policy
https://openssl-library.org/policies/technical/testing/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/technical/testing/<p>This applies to all <a href="https://openssl-library.org/policies/general/glossary/#stable-release">stable</a> and development branches of the main code repository.</p>
<p>Within this policy <em>functional behaviour</em> means what the system does, i.e.
given a set of inputs it will produce a set of outputs. This does not include
how the system does it. For example refactoring or performance improvements do
not affect <em>functional behaviour</em>.</p>
<p>Except where noted below:</p>
<ul>
<li>All Pull Requests adding new functionality to the applications, libraries,
providers or engines must include suitable tests.</li>
<li>All Pull Requests fixing a <em>functional behaviour</em> defect in the applications,
libraries, providers or engines must include a test for that defect.</li>
</ul>
<p>Pull Requests that do not change the <em>functional behaviour</em> of the applications,
libraries, providers or engines do not require tests to be added. For example
the following types of changes do not require tests:</p>Thank you for your ICLA submission
https://openssl-library.org/policies/icla-submitted/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/icla-submitted/<p>A confirmation email has been sent to the address you provided, containing a link to review and sign
the agreement. Please check your inbox (and spam folder). If you don’t receive it within 10 minutes,
feel free to contact support at <a href="mailto:[email protected]">[email protected]</a>.</p>Thanks!
https://openssl-library.org/community/thanks/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/community/thanks/<p>We’d like to thank the following individuals and organizations who contribute
to the OpenSSL project.</p>
<ul>
<li>rsync.net for providing free backup storage.</li>
<li>The following organizations who contribute staff time to work on the project
(alphabetically): Akamai, Cryptsoft, Google, Oracle, Red Hat, Siemens, and
Softing.</li>
</ul>Time-based Release Policy
https://openssl-library.org/policies/general/release-policy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/release-policy/<p>This policy outlines the systematic process followed for the time-based release
of the OpenSSL software library. The approach aims to deliver regular,
predictable updates and innovations to users while maintaining optimal workflow
and efficient resource management within the OpenSSL organisation.</p>
<p>This document covers the release schedule and the various phases that comprise
our release cycle: planning, release definition, development, and release stages
including alpha, beta, and final release. It also outlines the support lifecycle
following each release.</p>Trademark Policy
https://openssl-library.org/policies/general/trademarkpolicy/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/policies/general/trademarkpolicy/<p>Last modified 2024-10-08</p>
<h2 id="purpose">Purpose</h2>
<p>OpenSSL is committed to promoting the use of its open-source software. While
open-source software is generally free to download and modify, the use of
open-source software does not include the right to use OpenSSL Trademarks.</p>
<p>The Trademark Policy (The Policy) aims to protect and ensure consistent usage
of the OpenSSL Trademarks and to clarify when and how OpenSSL Trademarks may be
used.</p>
<p>The Policy aims to:</p>Vulnerabilities
https://openssl-library.org/news/vulnerabilities/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities/Vulnerabilities 0.9.6
https://openssl-library.org/news/vulnerabilities-0.9.6/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-0.9.6/Vulnerabilities 0.9.7
https://openssl-library.org/news/vulnerabilities-0.9.7/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-0.9.7/Vulnerabilities 0.9.8
https://openssl-library.org/news/vulnerabilities-0.9.8/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-0.9.8/Vulnerabilities 1.0.0
https://openssl-library.org/news/vulnerabilities-1.0.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-1.0.0/Vulnerabilities 1.0.1
https://openssl-library.org/news/vulnerabilities-1.0.1/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-1.0.1/Vulnerabilities 1.0.2
https://openssl-library.org/news/vulnerabilities-1.0.2/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-1.0.2/Vulnerabilities 1.1.0
https://openssl-library.org/news/vulnerabilities-1.1.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-1.1.0/Vulnerabilities 1.1.1
https://openssl-library.org/news/vulnerabilities-1.1.1/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-1.1.1/Vulnerabilities 3.0
https://openssl-library.org/news/vulnerabilities-3.0/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.0/Vulnerabilities 3.1
https://openssl-library.org/news/vulnerabilities-3.1/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.1/Vulnerabilities 3.2
https://openssl-library.org/news/vulnerabilities-3.2/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.2/Vulnerabilities 3.3
https://openssl-library.org/news/vulnerabilities-3.3/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.3/Vulnerabilities 3.4
https://openssl-library.org/news/vulnerabilities-3.4/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.4/Vulnerabilities 3.5
https://openssl-library.org/news/vulnerabilities-3.5/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.5/Vulnerabilities 3.6
https://openssl-library.org/news/vulnerabilities-3.6/
Mon, 01 Jan 0001 00:00:00 +0000https://openssl-library.org/news/vulnerabilities-3.6/