Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45)
Standard preamble:
========================================================================
..
.... \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
. ds C` "" . ds C' "" 'br\} . ds C` . ds C' 'br\}
Escape single quotes in literal strings from groff's Unicode transform.
If the F register is >0, we'll generate index entries on stderr for
titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
entries marked with X<> in POD. Of course, you'll have to process the
output yourself in some meaningful fashion.
Avoid warning from groff about undefined register 'F'.
.. .nr rF 0 . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF ========================================================================
Title "OSSL-GUIDE-LIBRARIES-INTRODUCTION 7ossl"
way too many mistakes in technical documents.
The \*(C`libcrypto\*(C' library provides APIs for general purpose cryptography such as encryption, digital signatures, hash functions, etc. It additionally supplies supporting APIs for cryptography related standards, e.g. for reading and writing digital certificates (also known as X.509 certificates). Finally it also supplies various additional supporting APIs that are not directly cryptography related but are nonetheless useful and depended upon by other APIs. For example the "BIO" functions provide capabilities for abstracting I/O, e.g. via a file or over a network.
The \*(C`libssl\*(C' library provides functions to perform secure communication between two peers across a network. Most significantly it implements support for the SSL/TLS, DTLS and QUIC standards.
The \*(C`libssl\*(C' library depends on and uses many of the capabilities supplied by \f(CW\*(C`libcrypto\*(C'. Any application linked against \*(C`libssl\*(C' will also link against \f(CW\*(C`libcrypto\*(C', and most applications that do this will directly use API functions supplied by both libraries.
Applications may be written that only use \*(C`libcrypto\*(C' capabilities and do not link against \*(C`libssl\*(C' at all.
A provider in OpenSSL is a component that collects together algorithm implementations (for example an implementation of the symmetric encryption algorithm AES). In order to use an algorithm you must have at least one provider loaded that contains an implementation of it. OpenSSL comes with a number of providers and they may also be obtained from third parties.
Providers may either be "built-in" or in the form of a separate loadable module file (typically one ending in ".so" or ".dll" dependent on the platform). A built-in provider is one that is either already present in \*(C`libcrypto\*(C' or one that the application has supplied itself directly. Third parties can also supply providers in the form of loadable modules.
If you don't load a provider explicitly (either in program code or via config) then the OpenSSL built-in "default" provider will be automatically loaded.
See "OPENSSL PROVIDERS" below for a description of the providers that OpenSSL itself supplies.
Loading and unloading providers is quite an expensive operation. It is normally done once, early on in the application lifecycle and those providers are kept loaded for the duration of the application execution.
If an application does not explicitly create a library context then the "default" library context will be used.
Library contexts are represented by the OSSL_LIB_CTX type. Many OpenSSL API functions take a library context as a parameter. Applications can always pass \fBNULL for this parameter to just use the default library context.
The default library context is automatically created the first time it is needed. This will automatically load any available configuration file and will initialise OpenSSL for use. Unlike in earlier versions of OpenSSL (prior to 1.1.0) no explicit initialisation steps need to be taken.
Similarly when the application exits, the default library context is automatically destroyed. No explicit de-initialisation steps need to be taken.
See OSSL_LIB_CTX\|(3) for more information about library contexts. See also "ALGORITHM FETCHING" in ossl-guide-libcrypto-introduction\|(7).
The process of selecting an algorithm implementation is known as "fetching". When OpenSSL fetches an algorithm to use it is possible to specify a "property query string" to guide the selection process. For example a property query string of "provider=default" could be used to force the selection to only consider algorithm implementations in the default provider.
Property query strings can be specified explicitly as an argument to a function. It is also possible to specify a default property query string for the whole library context using the EVP_set_default_properties\|(3) or \fBEVP_default_properties_enable_fips\|(3) functions. Where both default properties and function specific properties are specified then they are combined. Function specific properties will override default properties where there is a conflict.
See "ALGORITHM FETCHING" in ossl-guide-libcrypto-introduction\|(7) for more information about fetching. See property\|(7) for more information about properties.
There are exceptions to these rules. A small number of functions are not thread safe at all. Where this is the case this restriction should be noted in the documentation for the function. Similarly some data structures may be partially or fully thread safe. For example it is always safe to use an OSSL_LIB_CTX in multiple threads.
See openssl-threads\|(7) for a more detailed discussion on OpenSSL threading support.
Most functions that return a pointer value will return NULL in the event of a failure.
Most functions that return an integer value will return a positive integer for success. Some of these functions will return 0 to indicate failure. Others may return 0 or a negative value for failure.
Some functions cannot fail and have a void return type. There are also a small number of functions that do not conform to the above conventions (e.g. they may return 0 to indicate success).
Due to the above variations in behaviour it is important to check the documentation for each function for information about how to interpret the return value for it.
It is sometimes necessary to get further information about the cause of a failure (e.g. for debugging or logging purposes). Many (but not all) functions will add further information about a failure to the OpenSSL error stack. By using the error stack you can find out information such as a reason code/string for the error as well as the exact file and source line within OpenSSL that emitted the error.
OpenSSL supplies a set of error handling functions to query the error stack. See \fBERR_get_error\|(3) for information about the functions available for querying error data. Also see ERR_print_errors\|(3) for information on some simple helper functions for printing error data. Finally look at ERR_clear_error\|(3) for how to clear old errors from the error stack.
The algorithms available in each of these providers may vary due to build time configuration options. The openssl-list\|(1) command can be used to list the currently available algorithms.
The names of the algorithms shown from openssl-list\|(1) can be used as an algorithm identifier to the appropriate fetching function. Also see the provider specific manual pages linked below for further details about using the algorithms available in each of the providers.
As well as the OpenSSL providers third parties can also implement providers. For information on writing a provider see provider\|(7).
If you don't load any providers at all then the "default" provider will be automatically loaded. If you explicitly load any provider then the "default" provider would also need to be explicitly loaded if it is required.
See OSSL_PROVIDER-default\|(7).
See OSSL_PROVIDER-base\|(7).
Typically the "Base provider" will also need to be loaded because the FIPS provider does not support the encoding or decoding of keys.
See OSSL_PROVIDER-FIPS\|(7) and fips_module\|(7).
See OSSL_PROVIDER-legacy\|(7).
You can use this if you create your own library context and want to ensure that all API calls have correctly passed the created library context and are not accidentally using the default library context. Load the null provider into the default library context so that the default library context has no algorithm implementations available.
See OSSL_PROVIDER-null\|(7).
The configuration file can be used to automatically load providers and set up default property query strings.
For information on the OpenSSL configuration file format see config\|(5).
For example the functions:
.Vb 2 int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev); int X509_add1_trust_object(X509 *x, const ASN1_OBJECT *obj); .Ve
In the 0 version the ownership of the object is passed to (for an add or set) or retained by (for a get) the parent object. For example after calling the \fBX509_CRL_add0_revoked() function above, ownership of the rev object is passed to the crl object. Therefore, after calling this function rev should not be freed directly. It will be freed implicitly when crl is freed.
In the 1 version the ownership of the object is not passed to or retained by the parent object. Instead a copy or "up ref" of the object is performed. So after calling the X509_add1_trust_object() function above the application will still be responsible for freeing the obj value where appropriate.
Many OpenSSL functions conform to a naming convention of the form \fBCLASSNAME_func_name(). In this naming convention the CLASSNAME is the name of an OpenSSL data structure (given in capital letters) that the function is primarily operating on. The func_name portion of the name is usually in lowercase letters and indicates the purpose of the function.
The Makefiles in the subdirectories give instructions on how to build and run the demo applications.
Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.