openssl icon indicating copy to clipboard operation
openssl copied to clipboard

TLS/SSL and crypto library

Results 1136 openssl issues
Sort by recently updated
recently updated
newest added

Add support for the RFC7250 extensions, allows the use of only private keys for connection (i.e. certs not needed). Fixes #6929 Replacement for #16620 (since github doesn't allow changing the...

branch: master
approval: review pending
approval: otc review pending
triaged: feature
severity: fips change

At Red Hat, we set the SECLEVEL to 2 in DEFAULT and LEGACY policies (in crypto-policies [1], not providers). So when SECLEVEL 2 is in use, the creation and verification...

triaged: feature
triaged: question

Early stage design document identifying some possible approaches to how the QUIC event loop might work for input into OTC discussions.

branch: master
approval: review pending
triaged: design

I'm trying to integrate OpenSSL into a embedded industrial Operating System (XiUOS) on board ok1052-c (cortex-m7). And the OS currently do not support install softwares from it's terminal or shell....

help wanted
triaged: question

If the public key is not set on the key, return error instead of crash. Also clarify documentation in regards to EC key parameters and clarify that EVP_PKEY_fromdata ignores parameters...

branch: master
approval: review pending
triaged: bug
triaged: documentation
severity: fips change
branch: 3.0

As already mentioned in #18915, there is enormous overlap between the implementations of CMS and PKCS#7, which is no wonder because these two standards are basically the same. This causes...

branch: master
triaged: feature

1. Excluded the header file "wspiapi.h" for WinCE build. 2. Included OPENSSL_NO_SECURE_MEMORY compilation flag for WinCE build"' 3. Replaced 'gai_strerror' with 'gai_strerrorW'. This change was needed because gai_strerror internally uses...

branch: master
approval: review pending
triaged: bug
severity: fips change
branch: 3.0
branch: 3.1

These two commits: * `X509V3_set_nconf()`: Improve error handling using this function, mostly in `apps/` * `X509V3_set_ctx()`: Improve error handling mostly in `apps/` ~and documentation~ have been carved out from #16342...

branch: master
approval: review pending
triaged: bug
triaged: refactor
tests: exempted
severity: ABI change

In some dynamic language scenarios where openssl in called underneath this requirement may not be able to be met.. Is there a nicer way of doing this? The OSSL_LIB_CTX documentation...

branch: master
triaged: feature

If app data is received before a Finished message in DTLS then we buffer it to return later. The function `SSL_pending()` is supposed to tell you how much processed app...

branch: master
branch: 1.1.1
approval: ready to merge
triaged: bug
branch: 3.0