Provided by: openssl_3.0.13-0ubuntu3.5_amd64 bug

NAME

       crypto - OpenSSL cryptographic library

SYNOPSIS

       See the individual manual pages for details.

DESCRIPTION

       The OpenSSL crypto library ("libcrypto") implements a wide range of cryptographic algorithms used in
       various Internet standards. The services provided by this library are used by the OpenSSL implementations
       of TLS and CMS, and they have also been used to implement many other third party products and protocols.

       The functionality includes symmetric encryption, public key cryptography, key agreement, certificate
       handling, cryptographic hash functions, cryptographic pseudo-random number generators, message
       authentication codes (MACs), key derivation functions (KDFs), and various utilities.

   Algorithms
       Cryptographic primitives such as the SHA256 digest, or AES encryption are referred to in OpenSSL as
       "algorithms". Each algorithm may have multiple implementations available for use. For example the RSA
       algorithm is available as a "default" implementation suitable for general use, and a "fips"
       implementation which has been validated to FIPS standards for situations where that is important. It is
       also possible that a third party could add additional implementations such as in a hardware security
       module (HSM).

   Operations
       Different algorithms can be grouped together by their purpose. For example there are algorithms for
       encryption, and different algorithms for digesting data.  These different groups are known as
       "operations" in OpenSSL. Each operation has a different set of functions associated with it. For example
       to perform an encryption operation using AES (or any other encryption algorithm) you would use the
       encryption functions detailed on the EVP_EncryptInit(3) page. Or to perform a digest operation using
       SHA256 then you would use the digesting functions on the EVP_DigestInit(3) page.

   Providers
       A provider in OpenSSL is a component that collects together algorithm implementations. In order to use an
       algorithm you must have at least one provider loaded that contains an implementation of it. OpenSSL comes
       with a number of providers and they may also be obtained from third parties. If you don't load a provider
       explicitly (either in program code or via config) then one of the following OpenSSL providers will be
       loaded automatically:

       •   The built-in "default" provider when running on a system that is not operating in FIPS-approved mode.

       •   The "fips" provider when running on a system that is operating in FIPS-approved mode.

   Library contexts
       A  library  context can be thought of as a "scope" within which configuration options take effect. When a
       provider is loaded, it is only loaded within the scope of a given library context.  In  this  way  it  is
       possible  for  different  components of a complex application to each use a different library context and
       have different providers loaded with different configuration settings.

       If an application does not explicitly create a library context then the "default" library context will be
       used.

       Library contexts are represented by the OSSL_LIB_CTX type. Many OpenSSL  API  functions  take  a  library
       context  as  a  parameter.  Applications  can always pass NULL for this parameter to just use the default
       library context.

       The default library context is automatically created the first time it is needed. This will automatically
       load any available configuration file and will initialise OpenSSL for use. Unlike in earlier versions  of
       OpenSSL (prior to 1.1.0) no explicit initialisation steps need to be taken.

       Similarly  when the application exits the default library context is automatically destroyed. No explicit
       de-initialisation steps need to be taken.

       See OSSL_LIB_CTX(3) for more information about library contexts.  See also "ALGORITHM FETCHING".

   Multi-threaded applications
       As long as OpenSSL has been built with support for threads (the default case on most platforms) then most
       OpenSSL functions are thread-safe in the sense that it is safe to call the same  function  from  multiple
       threads  at  the  same  time.  However  most OpenSSL data structures are not thread-safe. For example the
       BIO_write(3) and BIO_read(3) functions are thread safe. However it would  not  be  thread  safe  to  call
       BIO_write()  from one thread while calling BIO_read() in another where both functions are passed the same
       BIO object since both of them may attempt to make changes to the same BIO object.

       There are exceptions to these rules. A small number of functions are not thread safe at all.  Where  this
       is  the  case this restriction should be noted in the documentation for the function. Similarly some data
       structures may be partially or fully thread safe. For example it  is  safe  to  use  an  OSSL_LIB_CTX  in
       multiple threads.

       See openssl-threads(7) for a more detailed discussion on OpenSSL threading support.

ALGORITHM FETCHING

       In  order  to use an algorithm an implementation for it must first be "fetched".  Fetching is the process
       of looking through the available implementations, applying  selection  criteria  (via  a  property  query
       string), and finally choosing the implementation that will be used.

       Two types of fetching are supported by OpenSSL - explicit fetching and implicit fetching.

   Property query strings
       When  fetching  an  algorithm  it  is  possible to specify a property query string to guide the selection
       process. For example a property query string of "provider=default" could be used to force  the  selection
       to only consider algorithm implementations in the default provider.

       Property  query strings can be specified explicitly as an argument to a function.  It is also possible to
       specify   a   default   property   query   string   for   the   whole   library   context    using    the
       EVP_set_default_properties(3)  or  EVP_default_properties_enable_fips(3)  functions.  Where  both default
       properties and function specific properties are specified  then  they  are  combined.  Function  specific
       properties will override default properties where there is a conflict.

       See property(7) for more information about properties.

   Explicit fetching
       Users  of the OpenSSL libraries never query a provider directly for an algorithm implementation. Instead,
       the diverse OpenSSL APIs often have explicit fetching functions that do the  work,  and  they  return  an
       appropriate  algorithm  object  back  to the user. These functions usually have the name "APINAME_fetch",
       where "APINAME" is the name of the operation. For example EVP_MD_fetch(3) can be used to explicitly fetch
       a digest algorithm implementation. The user is responsible for  freeing  the  object  returned  from  the
       "APINAME_fetch" function using "APINAME_free" when it is no longer needed.

       These fetching functions follow a fairly common pattern, where three arguments are passed:

       The library context
           See  OSSL_LIB_CTX(3)  for  a  more  detailed  description.   This  may be NULL to signify the default
           (global) library context, or a context created by the user. Only providers  loaded  in  this  library
           context  (see OSSL_PROVIDER_load(3)) will be considered by the fetching function. In case no provider
           has been loaded in this library context then the default provider will be loaded as a  fallback  (see
           OSSL_PROVIDER-default(7)).

       An identifier
           For all currently implemented fetching functions this is the algorithm name.

       A property query string
           The property query string used to guide selection of the algorithm implementation.

       The algorithm implementation that is fetched can then be used with other diverse functions that use them.
       For  example  the EVP_DigestInit_ex(3) function takes as a parameter an EVP_MD object which may have been
       returned from an earlier call to EVP_MD_fetch(3).

   Implicit fetching
       OpenSSL has a number of functions that return an algorithm object with no associated implementation, such
       as EVP_sha256(3),  EVP_aes_128_cbc(3),  EVP_get_cipherbyname(3)  or  EVP_get_digestbyname(3).  These  are
       present for compatibility with OpenSSL before version 3.0 where explicit fetching was not available.

       When  they  are  used  with  functions  like  EVP_DigestInit_ex(3)  or  EVP_CipherInit_ex(3),  the actual
       implementation to be used is fetched implicitly using default search criteria.

       In some cases implicit fetching can also occur when a NULL algorithm parameter is supplied. In this  case
       an  algorithm  implementation  is  implicitly fetched using default search criteria and an algorithm name
       that is consistent with the context in which it is being used.

       Functions that revolve around EVP_PKEY_CTX and EVP_PKEY(3), such as  EVP_DigestSignInit(3)  and  friends,
       all  fetch  the implementations implicitly.  Because these functions involve both an operation type (such
       as EVP_SIGNATURE(3)) and an EVP_KEYMGMT(3) for the EVP_PKEY(3), they try the following:

       1.  Fetch the operation type implementation from any provider given a library context and property string
           stored in the EVP_PKEY_CTX.

           If the provider of  the  operation  type  implementation  is  different  from  the  provider  of  the
           EVP_PKEY(3)'s EVP_KEYMGMT(3) implementation, try to fetch a EVP_KEYMGMT(3) implementation in the same
           provider  as the operation type implementation and export the EVP_PKEY(3) to it (effectively making a
           temporary copy of the original key).

           If anything in this step fails, the next step is used as a fallback.

       2.  As a fallback, try to fetch the operation type implementation from the same provider as the  original
           EVP_PKEY(3)'s EVP_KEYMGMT(3), still using the property string from the EVP_PKEY_CTX.

   Performance
       If  you  perform  the  same  operation  many  times  then it is recommended to use "Explicit fetching" to
       prefetch an algorithm once initially, and then pass this  created  object  to  any  operations  that  are
       currently  using  "Implicit  fetching".   See  an  example  of  Explicit fetching in "USING ALGORITHMS IN
       APPLICATIONS".

       Prior to OpenSSL 3.0, constant method tables (such as EVP_sha256()) were used directly to access methods.
       If you pass one of these convenience functions to an operation the fixed methods are  ignored,  and  only
       the name is used to internally fetch methods from a provider.

       If  the  prefetched  object  is not passed to operations, then any implicit fetch will use the internally
       cached prefetched object, but it will still be slower than passing the prefetched object directly.

       Fetching via a provider offers more flexibility, but it is slower than the  old  method,  since  it  must
       search  for  the  algorithm  in  all  loaded providers, and then populate the method table using provider
       supplied methods.  Internally OpenSSL caches similar algorithms on the first fetch (so loading  a  digest
       caches all digests).

       The following methods can be used for prefetching:

       EVP_MD_fetch(3)
       EVP_CIPHER_fetch(3)
       EVP_KDF_fetch(3)
       EVP_MAC_fetch(3)
       EVP_KEM_fetch(3)
       OSSL_ENCODER_fetch(3)
       OSSL_DECODER_fetch(3)
       EVP_RAND_fetch(3)

       The following methods are used internally when performing operations:

       EVP_KEYMGMT_fetch(3)
       EVP_KEYEXCH_fetch(3)
       EVP_SIGNATURE_fetch(3)
       OSSL_STORE_LOADER_fetch(3)

       See   OSSL_PROVIDER-default(7),   <OSSL_PROVIDER-fips(7)>  and  <OSSL_PROVIDER-legacy(7)>for  a  list  of
       algorithm names that can be fetched.

FETCHING EXAMPLES

       The following section provides a series of examples of fetching algorithm implementations.

       Fetch any available implementation of SHA2-256 in the default context. Note  that  some  algorithms  have
       aliases. So "SHA256" and "SHA2-256" are synonymous:

        EVP_MD *md = EVP_MD_fetch(NULL, "SHA2-256", NULL);
        ...
        EVP_MD_free(md);

       Fetch any available implementation of AES-128-CBC in the default context:

        EVP_CIPHER *cipher = EVP_CIPHER_fetch(NULL, "AES-128-CBC", NULL);
        ...
        EVP_CIPHER_free(cipher);

       Fetch an implementation of SHA2-256 from the default provider in the default context:

        EVP_MD *md = EVP_MD_fetch(NULL, "SHA2-256", "provider=default");
        ...
        EVP_MD_free(md);

       Fetch an implementation of SHA2-256 that is not from the default provider in the default context:

        EVP_MD *md = EVP_MD_fetch(NULL, "SHA2-256", "provider!=default");
        ...
        EVP_MD_free(md);

       Fetch an implementation of SHA2-256 from the default provider in the specified context:

        EVP_MD *md = EVP_MD_fetch(ctx, "SHA2-256", "provider=default");
        ...
        EVP_MD_free(md);

       Load the legacy provider into the default context and then fetch an implementation of WHIRLPOOL from it:

        /* This only needs to be done once - usually at application start up */
        OSSL_PROVIDER *legacy = OSSL_PROVIDER_load(NULL, "legacy");

        EVP_MD *md = EVP_MD_fetch(NULL, "WHIRLPOOL", "provider=legacy");
        ...
        EVP_MD_free(md);

       Note that in the above example the property string "provider=legacy" is optional since, assuming no other
       providers  have  been  loaded,  the  only  implementation of the "whirlpool" algorithm is in the "legacy"
       provider. Also note that the default provider should be explicitly loaded if it is required  in  addition
       to other providers:

        /* This only needs to be done once - usually at application start up */
        OSSL_PROVIDER *legacy = OSSL_PROVIDER_load(NULL, "legacy");
        OSSL_PROVIDER *default = OSSL_PROVIDER_load(NULL, "default");

        EVP_MD *md_whirlpool = EVP_MD_fetch(NULL, "whirlpool", NULL);
        EVP_MD *md_sha256 = EVP_MD_fetch(NULL, "SHA2-256", NULL);
        ...
        EVP_MD_free(md_whirlpool);
        EVP_MD_free(md_sha256);

OPENSSL PROVIDERS

       OpenSSL comes with a set of providers.

       The algorithms available in each of these providers may vary due to build time configuration options. The
       openssl-list(1) command can be used to list the currently available algorithms.

       The  names  of  the  algorithms  shown from openssl-list(1) can be used as an algorithm identifier to the
       appropriate fetching function. Also see the provider specific  manual  pages  linked  below  for  further
       details about using the algorithms available in each of the providers.

       As  well as the OpenSSL providers third parties can also implement providers.  For information on writing
       a provider see provider(7).

   Default provider
       The default provider is built in as part of the libcrypto library and contains all of the  most  commonly
       used  algorithm  implementations.  Should  it  be  needed  (if  other  providers  are  loaded  and  offer
       implementations of the same algorithms), the property query string "provider=default" can be  used  as  a
       search  criterion  for  these implementations.  The default provider includes all of the functionality in
       the base provider below.

       If you don't load any providers at all and the system is not running  in  FIPS-approved  mode,  then  the
       "default"  provider will be automatically loaded.  If you explicitly load any provider then the "default"
       provider would also need to be explicitly loaded if it is required.

       See OSSL_PROVIDER-default(7).

   Base provider
       The base provider is built in as part of the libcrypto library and contains algorithm implementations for
       encoding and decoding for OpenSSL keys.  Should it be needed (if other providers  are  loaded  and  offer
       implementations  of  the  same  algorithms),  the  property query string "provider=base" can be used as a
       search criterion for these implementations.  Some encoding and decoding algorithm implementations are not
       FIPS algorithm implementations in themselves but support  algorithms  from  the  FIPS  provider  and  are
       allowed  for  use  in  "FIPS  mode".  The  property  query  string  "fips=yes" can be used to select such
       algorithms.

       See OSSL_PROVIDER-base(7).

   FIPS provider
       The FIPS provider is a dynamically loadable module, and must therefore be loaded  explicitly,  either  in
       code  or  through  OpenSSL configuration (see config(5)). It contains algorithm implementations that have
       been validated according to the FIPS 140-2 standard. Should it be needed (if other providers  are  loaded
       and  offer implementations of the same algorithms), the property query string "provider=fips" can be used
       as a search criterion for these implementations. All  approved  algorithm  implementations  in  the  FIPS
       provider  can  also  be  selected  with  the property "fips=yes". The FIPS provider may also contain non-
       approved algorithm implementations and these can be selected with the property "fips=no".

       If you don't load any providers at all and the system is running in FIPS-approved  mode,  then  the  FIPS
       provider  will be automatically loaded.  If you explicitly load any provider then the FIPS provider would
       also need to be explicitly loaded if it is required.

       See OSSL_PROVIDER-FIPS(7) and fips_module(7).

   Legacy provider
       The legacy provider is a dynamically loadable module, and must therefore be loaded explicitly, either  in
       code  or  through  OpenSSL  configuration (see config(5)). It contains algorithm implementations that are
       considered insecure, or are no longer in common use such as MD2 or RC4. Should it  be  needed  (if  other
       providers  are  loaded  and offer implementations of the same algorithms), the property "provider=legacy"
       can be used as a search criterion for these implementations.

       See OSSL_PROVIDER-legacy(7).

   Null provider
       The null provider is built in as part of the libcrypto library. It contains no algorithms in it  at  all.
       When  fetching algorithms the default provider will be automatically loaded if no other provider has been
       explicitly loaded. To prevent that from happening you can explicitly load the null provider.

       See OSSL_PROVIDER-null(7).

USING ALGORITHMS IN APPLICATIONS

       Cryptographic algorithms are made available to applications through use of the "EVP" APIs.  Each  of  the
       various  operations  such as encryption, digesting, message authentication codes, etc., have a set of EVP
       function calls that can be invoked to use them. See the evp(7) page for further details.

       Most of these follow a common pattern. A "context" object is first created.  For  example  for  a  digest
       operation  you  would  use  an  EVP_MD_CTX,  and  for an encryption/decryption operation you would use an
       EVP_CIPHER_CTX. The operation is then initialised ready for use  via  an  "init"  function  -  optionally
       passing  in  a  set  of  parameters  (using the OSSL_PARAM(3) type) to configure how the operation should
       behave. Next data is fed into the operation in a series of "update" calls.  The  operation  is  finalised
       using  a "final" call which will typically provide some kind of output. Finally the context is cleaned up
       and freed.

       The following shows a complete example for doing this  process  for  digesting  data  using  SHA256.  The
       process is similar for other operations such as encryption/decryption, signatures, message authentication
       codes, etc.

        #include <stdio.h>
        #include <openssl/evp.h>
        #include <openssl/bio.h>
        #include <openssl/err.h>

        int main(void)
        {
            EVP_MD_CTX *ctx = NULL;
            EVP_MD *sha256 = NULL;
            const unsigned char msg[] = {
                0x00, 0x01, 0x02, 0x03
            };
            unsigned int len = 0;
            unsigned char *outdigest = NULL;
            int ret = 1;

            /* Create a context for the digest operation */
            ctx = EVP_MD_CTX_new();
            if (ctx == NULL)
                goto err;

            /*
             * Fetch the SHA256 algorithm implementation for doing the digest. We're
             * using the "default" library context here (first NULL parameter), and
             * we're not supplying any particular search criteria for our SHA256
             * implementation (second NULL parameter). Any SHA256 implementation will
             * do.
             * In a larger application this fetch would just be done once, and could
             * be used for multiple calls to other operations such as EVP_DigestInit_ex().
             */
            sha256 = EVP_MD_fetch(NULL, "SHA256", NULL);
            if (sha256 == NULL)
                goto err;

           /* Initialise the digest operation */
           if (!EVP_DigestInit_ex(ctx, sha256, NULL))
               goto err;

            /*
             * Pass the message to be digested. This can be passed in over multiple
             * EVP_DigestUpdate calls if necessary
             */
            if (!EVP_DigestUpdate(ctx, msg, sizeof(msg)))
                goto err;

            /* Allocate the output buffer */
            outdigest = OPENSSL_malloc(EVP_MD_get_size(sha256));
            if (outdigest == NULL)
                goto err;

            /* Now calculate the digest itself */
            if (!EVP_DigestFinal_ex(ctx, outdigest, &len))
                goto err;

            /* Print out the digest result */
            BIO_dump_fp(stdout, outdigest, len);

            ret = 0;

         err:
            /* Clean up all the resources we allocated */
            OPENSSL_free(outdigest);
            EVP_MD_free(sha256);
            EVP_MD_CTX_free(ctx);
            if (ret != 0)
               ERR_print_errors_fp(stderr);
            return ret;
        }

CONFIGURATION

       By  default  OpenSSL  will  load  a  configuration  file  when it is first used. This will set up various
       configuration settings within the default library context.  Applications that create  their  own  library
       contexts may optionally configure them with a config file using the OSSL_LIB_CTX_load_config(3) function.

       The  configuration  file  can  be  used to automatically load providers and set up default property query
       strings.

       For information on the OpenSSL configuration file format see config(5).

ENCODING AND DECODING KEYS

       Many algorithms require the use of a key. Keys can be generated  dynamically  using  the  EVP  APIs  (for
       example  see  EVP_PKEY_Q_keygen(3)).  However  it  is  often  necessary  to  save  or load keys (or their
       associated parameters) to or from some external format such as  PEM  or  DER  (see  openssl-glossary(7)).
       OpenSSL uses encoders and decoders to perform this task.

       Encoders  and  decoders  are  just  algorithm  implementations  in  the  same  way as any other algorithm
       implementation in OpenSSL. They are implemented by providers.  The  OpenSSL  encoders  and  decoders  are
       available in the default provider. They are also duplicated in the base provider.

       For  information  about encoders see OSSL_ENCODER_CTX_new_for_pkey(3). For information about decoders see
       OSSL_DECODER_CTX_new_for_pkey(3).

LIBRARY CONVENTIONS

       Many OpenSSL functions that "get" or "set" a value follow a naming convention using the numbers 0 and  1,
       i.e.  "get0",  "get1",  "set0" and "set1". This can also apply to some functions that "add" a value to an
       existing set, i.e.  "add0" and "add1".

       For example the functions:

        int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev);
        int X509_add1_trust_object(X509 *x, const ASN1_OBJECT *obj);

       In the 0 version the ownership of the object is passed to (for an add or set) or retained by (for a  get)
       the parent object. For example after calling the X509_CRL_add0_revoked() function above, ownership of the
       rev  object  is  passed to the crl object. Therefore, after calling this function rev should not be freed
       directly. It will be freed implicitly when crl is freed.

       In the 1 version the ownership of the object is not passed to or retained by the parent object. Instead a
       copy or "up ref" of the object is performed. So after calling the X509_add1_trust_object() function above
       the application will still be responsible for freeing the obj value where appropriate.

SEE ALSO

       openssl(1), ssl(7), evp(7), OSSL_LIB_CTX(3), openssl-threads(7),  property(7),  OSSL_PROVIDER-default(7),
       OSSL_PROVIDER-base(7),     OSSL_PROVIDER-FIPS(7),     OSSL_PROVIDER-legacy(7),     OSSL_PROVIDER-null(7),
       openssl-glossary(7), provider(7)

COPYRIGHT

       Copyright 2000-2023 The OpenSSL Project Authors. All Rights Reserved.

       Licensed under the Apache License 2.0 (the "License").  You may not use this file  except  in  compliance
       with  the  License.   You  can  obtain  a  copy  in  the  file  LICENSE  in the source distribution or at
       <https://www.openssl.org/source/license.html>.

3.0.13                                             2025-02-05                                       CRYPTO(7SSL)