Cryptography and SSL/TLS Toolkit


The master sources are maintained in our git repository, which is accessible over the network and cloned on GitHub, at Bugs and pull patches (issues and pull requests) should be filed on the GitHub repo. Please familiarize yourself with the license.

The table below lists the latest releases for every branch. (For an explanation of the numbering, see our release strategy.) All releases can be found at /source/old.

KBytes  Date   File 
14946  2024-Jun-04 15:15:27  openssl-3.0.14.tar.gz (SHA256) (PGP sign) (SHA1)
15305  2024-Jun-04 15:15:27  openssl-3.1.6.tar.gz (SHA256) (PGP sign) (SHA1)
17328  2024-Jun-04 15:15:27  openssl-3.2.2.tar.gz (SHA256) (PGP sign) (SHA1)
17632  2024-Jun-04 15:15:27  openssl-3.3.1.tar.gz (SHA256) (PGP sign) (SHA1)

Note: The latest stable version is the 3.3 series supported until 9th April 2026. Also available is the 3.2 series supported until 23rd November 2025, the 3.1 series supported until 14th March 2025, and the 3.0 series which is a Long Term Support (LTS) version and is supported until 7th September 2026. All older versions (including 1.1.1, 1.1.0, 1.0.2, 1.0.0 and 0.9.8) are now out of support and should not be used. Users of these older versions are encouraged to upgrade to 3.2 or 3.0 as soon as possible. Extended support for 1.1.1 and 1.0.2 to gain access to security fixes for those versions is available.

The following OpenSSL version(s) are FIPS validated. Versions marked as historic were previously validated, but are no longer listed on the current certificate:

 OpenSSL Version   Certificate   Security Policy 
3.0.9 certificate security policy
3.0.8 certificate security policy
3.0.0 (historic) certificate security policy

For a list of CVEs and their impact on validated FIPS providers, visit the CVEs and FIPS page.

Please follow the Security Policy instructions to download, build and install a validated OpenSSL FIPS provider. Other OpenSSL Releases MAY use the validated FIPS provider, but MUST NOT build and use their own FIPS provider. For example you can build OpenSSL 3.3 and use the OpenSSL 3.0.8 FIPS provider with it.

Information about how to configure and use the FIPS provider in your applications is available on the FIPS module man page. You must also read the module security policy and follow the specific build and installation instructions included in it.

For an overview of some of the key concepts in OpenSSL 3.3 see the OpenSSL Guide. Much of the information in the guide is also applicable to older releases such as 3.1 and 3.0 except for sections relating to new features only in 3.3 and 3.2 (such as QUIC). Information and notes about migrating existing applications to OpenSSL 3.3 (and 3.2/3.1/3.0) are available in the OpenSSL 3.3 Migration Guide

When building a release for the first time, please make sure to look at the INSTALL file in the distribution along with any NOTES file applicable to your platform. If you have problems, then join the openssl-users email list and post a question there.

PGP keys for the signatures of old releases are available from the OTC page.

The current releases are signed by the OpenSSL OMC key with fingerprint EFC0 A467 D613 CB83 C7ED 6D30 D894 E2CE 8B3D 79F5.

Future releases will be signed by the OpenSSL key with fingerprint BA54 73A2 B058 7B07 FB27 CF2D 2160 94DF D0CB 81EF.

Each day we make a snapshot of each development branch. They can be found at These daily snapshots of the source tree are provided for convenience only and not even guaranteed to compile. Note that keeping a git local repository and updating it every 24 hours is equivalent and will often be faster and more efficient.


Please remember that export/import and/or use of strong cryptography software, providing cryptography hooks, or even just communicating technical details about cryptography software is illegal in some parts of the world. So when you import this package to your country, re-distribute it from there or even just email technical suggestions or even source patches to the authors or other people you are strongly advised to pay close attention to any laws or regulations which apply to you. The authors of OpenSSL are not liable for any violations you make here. So be careful, it is your responsibility.