1=pod 2 3=head1 NAME 4 5ossl-guide-libraries-introduction 6- OpenSSL Guide: An introduction to the OpenSSL libraries 7 8=head1 INTRODUCTION 9 10OpenSSL supplies two libraries that can be used by applications known as 11C<libcrypto> and C<libssl>. 12 13The C<libcrypto> library provides APIs for general purpose cryptography such as 14encryption, digital signatures, hash functions, etc. It additionally supplies 15supporting APIs for cryptography related standards, e.g. for reading and writing 16digital certificates (also known as X.509 certificates). Finally it also 17supplies various additional supporting APIs that are not directly cryptography 18related but are nonetheless useful and depended upon by other APIs. For 19example the "BIO" functions provide capabilities for abstracting I/O, e.g. via a 20file or over a network. 21 22The C<libssl> library provides functions to perform secure communication between 23two peers across a network. Most significantly it implements support for the 24SSL/TLS, DTLS and QUIC standards. 25 26The C<libssl> library depends on and uses many of the capabilities supplied by 27C<libcrypto>. Any application linked against C<libssl> will also link against 28C<libcrypto>, and most applications that do this will directly use API functions 29supplied by both libraries. 30 31Applications may be written that only use C<libcrypto> capabilities and do not 32link against C<libssl> at all. 33 34=head1 PROVIDERS 35 36As well as the two main libraries, OpenSSL also comes with a set of providers. 37 38A provider in OpenSSL is a component that collects together algorithm 39implementations (for example an implementation of the symmetric encryption 40algorithm AES). In order to use an algorithm you must have at least one 41provider loaded that contains an implementation of it. OpenSSL comes with a 42number of providers and they may also be obtained from third parties. 43 44Providers may either be "built-in" or in the form of a separate loadable module 45file (typically one ending in ".so" or ".dll" dependent on the platform). A 46built-in provider is one that is either already present in C<libcrypto> or one 47that the application has supplied itself directly. Third parties can also supply 48providers in the form of loadable modules. 49 50If you don't load a provider explicitly (either in program code or via config) 51then the OpenSSL built-in "default" provider will be automatically loaded. 52 53See L</OPENSSL PROVIDERS> below for a description of the providers that OpenSSL 54itself supplies. 55 56Loading and unloading providers is quite an expensive operation. It is normally 57done once, early on in the application lifecycle and those providers are kept 58loaded for the duration of the application execution. 59 60=head1 LIBRARY CONTEXTS 61 62Many OpenSSL API functions make use of a library context. A library context can 63be thought of as a "scope" within which configuration options take effect. When 64a provider is loaded, it is only loaded within the scope of a given library 65context. In this way it is possible for different components of a complex 66application to each use a different library context and have different providers 67loaded with different configuration settings. 68 69If an application does not explicitly create a library context then the 70"default" library context will be used. 71 72Library contexts are represented by the B<OSSL_LIB_CTX> type. Many OpenSSL API 73functions take a library context as a parameter. Applications can always pass 74B<NULL> for this parameter to just use the default library context. 75 76The default library context is automatically created the first time it is 77needed. This will automatically load any available configuration file and will 78initialise OpenSSL for use. Unlike in earlier versions of OpenSSL (prior to 791.1.0) no explicit initialisation steps need to be taken. 80 81Similarly when the application exits, the default library context is 82automatically destroyed. No explicit de-initialisation steps need to be taken. 83 84See L<OSSL_LIB_CTX(3)> for more information about library contexts. 85See also L<ossl-guide-libcrypto-introduction(7)/ALGORITHM FETCHING>. 86 87=head1 PROPERTY QUERY STRINGS 88 89In some cases the available providers may mean that more than one implementation 90of any given algorithm might be available. For example the OpenSSL FIPS provider 91supplies alternative implementations of many of the same algorithms that are 92available in the OpenSSL default provider. 93 94The process of selecting an algorithm implementation is known as "fetching". 95When OpenSSL fetches an algorithm to use it is possible to specify a "property 96query string" to guide the selection process. For example a property query 97string of "provider=default" could be used to force the selection to only 98consider algorithm implementations in the default provider. 99 100Property query strings can be specified explicitly as an argument to a function. 101It is also possible to specify a default property query string for the whole 102library context using the L<EVP_set_default_properties(3)> or 103L<EVP_default_properties_enable_fips(3)> functions. Where both 104default properties and function specific properties are specified then they are 105combined. Function specific properties will override default properties where 106there is a conflict. 107 108See L<ossl-guide-libcrypto-introduction(7)/ALGORITHM FETCHING> for more 109information about fetching. See L<property(7)> for more information about 110properties. 111 112=head1 MULTI-THREADED APPLICATIONS 113 114As long as OpenSSL has been built with support for threads (the default case 115on most platforms) then most OpenSSL I<functions> are thread-safe in the sense 116that it is safe to call the same function from multiple threads at the same 117time. However most OpenSSL I<data structures> are not thread-safe. For example 118the L<BIO_write(3)> and L<BIO_read(3)> functions are thread safe. However it 119would not be thread safe to call BIO_write() from one thread while calling 120BIO_read() in another where both functions are passed the same B<BIO> object 121since both of them may attempt to make changes to the same B<BIO> object. 122 123There are exceptions to these rules. A small number of functions are not thread 124safe at all. Where this is the case this restriction should be noted in the 125documentation for the function. Similarly some data structures may be partially 126or fully thread safe. For example it is always safe to use an B<OSSL_LIB_CTX> in 127multiple threads. 128 129See L<openssl-threads(7)> for a more detailed discussion on OpenSSL threading 130support. 131 132=head1 ERROR HANDLING 133 134Most OpenSSL functions will provide a return value indicating whether the 135function has been successful or not. It is considered best practice to always 136check the return value from OpenSSL functions (where one is available). 137 138Most functions that return a pointer value will return NULL in the event of a 139failure. 140 141Most functions that return an integer value will return a positive integer for 142success. Some of these functions will return 0 to indicate failure. Others may 143return 0 or a negative value for failure. 144 145Some functions cannot fail and have a B<void> return type. There are also a 146small number of functions that do not conform to the above conventions (e.g. 147they may return 0 to indicate success). 148 149Due to the above variations in behaviour it is important to check the 150documentation for each function for information about how to interpret the 151return value for it. 152 153It is sometimes necessary to get further information about the cause of a 154failure (e.g. for debugging or logging purposes). Many (but not all) functions 155will add further information about a failure to the OpenSSL error stack. By 156using the error stack you can find out information such as a reason code/string 157for the error as well as the exact file and source line within OpenSSL that 158emitted the error. 159 160OpenSSL supplies a set of error handling functions to query the error stack. See 161L<ERR_get_error(3)> for information about the functions available for querying 162error data. Also see L<ERR_print_errors(3)> for information on some simple 163helper functions for printing error data. Finally look at L<ERR_clear_error(3)> 164for how to clear old errors from the error stack. 165 166=head1 OPENSSL PROVIDERS 167 168OpenSSL comes with a set of providers. 169 170The algorithms available in each of these providers may vary due to build time 171configuration options. The L<openssl-list(1)> command can be used to list the 172currently available algorithms. 173 174The names of the algorithms shown from L<openssl-list(1)> can be used as an 175algorithm identifier to the appropriate fetching function. Also see the provider 176specific manual pages linked below for further details about using the 177algorithms available in each of the providers. 178 179As well as the OpenSSL providers third parties can also implement providers. 180For information on writing a provider see L<provider(7)>. 181 182=head2 Default provider 183 184The default provider is built-in as part of the F<libcrypto> library and 185contains all of the most commonly used algorithm implementations. Should it be 186needed (if other providers are loaded and offer implementations of the same 187algorithms), the property query string "provider=default" can be used as a 188search criterion for these implementations. The default provider includes all 189of the functionality in the base provider below. 190 191If you don't load any providers at all then the "default" provider will be 192automatically loaded. If you explicitly load any provider then the "default" 193provider would also need to be explicitly loaded if it is required. 194 195See L<OSSL_PROVIDER-default(7)>. 196 197=head2 Base provider 198 199The base provider is built in as part of the F<libcrypto> library and contains 200algorithm implementations for encoding and decoding of OpenSSL keys. 201Should it be needed (if other providers are loaded and offer 202implementations of the same algorithms), the property query string 203"provider=base" can be used as a search criterion for these implementations. 204Some encoding and decoding algorithm implementations are not FIPS algorithm 205implementations in themselves but support algorithms from the FIPS provider and 206are allowed for use in "FIPS mode". The property query string "fips=yes" can be 207used to select such algorithms. 208 209See L<OSSL_PROVIDER-base(7)>. 210 211=head2 FIPS provider 212 213The FIPS provider is a dynamically loadable module, and must therefore 214be loaded explicitly, either in code or through OpenSSL configuration 215(see L<config(5)>). It contains algorithm implementations that have been 216validated according to FIPS standards. Should it be needed (if other 217providers are loaded and offer implementations of the same algorithms), the 218property query string "provider=fips" can be used as a search criterion for 219these implementations. All approved algorithm implementations in the FIPS 220provider can also be selected with the property "fips=yes". The FIPS provider 221may also contain non-approved algorithm implementations and these can be 222selected with the property "fips=no". 223 224Typically the L</Base provider> will also need to be loaded because the FIPS 225provider does not support the encoding or decoding of keys. 226 227See L<OSSL_PROVIDER-FIPS(7)> and L<fips_module(7)>. 228 229=head2 Legacy provider 230 231The legacy provider is a dynamically loadable module, and must therefore 232be loaded explicitly, either in code or through OpenSSL configuration 233(see L<config(5)>). It contains algorithm implementations that are considered 234insecure, or are no longer in common use such as MD2 or RC4. Should it be needed 235(if other providers are loaded and offer implementations of the same algorithms), 236the property "provider=legacy" can be used as a search criterion for these 237implementations. 238 239See L<OSSL_PROVIDER-legacy(7)>. 240 241=head2 Null provider 242 243The null provider is built in as part of the F<libcrypto> library. It contains 244no algorithms in it at all. When fetching algorithms the default provider will 245be automatically loaded if no other provider has been explicitly loaded. To 246prevent that from happening you can explicitly load the null provider. 247 248You can use this if you create your own library context and want to ensure that 249all API calls have correctly passed the created library context and are not 250accidentally using the default library context. Load the null provider into the 251default library context so that the default library context has no algorithm 252implementations available. 253 254See L<OSSL_PROVIDER-null(7)>. 255 256=head1 CONFIGURATION 257 258By default OpenSSL will load a configuration file when it is first used. This 259will set up various configuration settings within the default library context. 260Applications that create their own library contexts may optionally configure 261them with a config file using the L<OSSL_LIB_CTX_load_config(3)> function. 262 263The configuration file can be used to automatically load providers and set up 264default property query strings. 265 266For information on the OpenSSL configuration file format see L<config(5)>. 267 268=head1 LIBRARY CONVENTIONS 269 270Many OpenSSL functions that "get" or "set" a value follow a naming convention 271using the numbers B<0> and B<1>, i.e. "get0", "get1", "set0" and "set1". This 272can also apply to some functions that "add" a value to an existing set, i.e. 273"add0" and "add1". 274 275For example the functions: 276 277 int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev); 278 int X509_add1_trust_object(X509 *x, const ASN1_OBJECT *obj); 279 280In the B<0> version the ownership of the object is passed to (for an add or set) 281or retained by (for a get) the parent object. For example after calling the 282X509_CRL_add0_revoked() function above, ownership of the I<rev> object is passed 283to the I<crl> object. Therefore, after calling this function I<rev> should not 284be freed directly. It will be freed implicitly when I<crl> is freed. 285 286In the B<1> version the ownership of the object is not passed to or retained by 287the parent object. Instead a copy or "up ref" of the object is performed. So 288after calling the X509_add1_trust_object() function above the application will 289still be responsible for freeing the I<obj> value where appropriate. 290 291Many OpenSSL functions conform to a naming convention of the form 292B<CLASSNAME_func_name()>. In this naming convention the B<CLASSNAME> is the name 293of an OpenSSL data structure (given in capital letters) that the function is 294primarily operating on. The B<func_name> portion of the name is usually in 295lowercase letters and indicates the purpose of the function. 296 297=head1 DEMO APPLICATIONS 298 299OpenSSL is distributed with a set of demo applications which provide some 300examples of how to use the various API functions. To look at them download the 301OpenSSL source code from the OpenSSL website 302(L<https://www.openssl.org/source/>). Extract the downloaded B<.tar.gz> file for 303the version of OpenSSL that you are using and look at the various files in the 304B<demos> sub-directory. 305 306The Makefiles in the subdirectories give instructions on how to build and run 307the demo applications. 308 309=head1 FURTHER READING 310 311See L<ossl-guide-libcrypto-introduction(7)> for a more detailed introduction to 312using C<libcrypto> and L<ossl-guide-libssl-introduction(7)> for more information 313on C<libssl>. 314 315=head1 SEE ALSO 316 317L<openssl(1)>, L<ssl(7)>, L<evp(7)>, L<OSSL_LIB_CTX(3)>, L<openssl-threads(7)>, 318L<property(7)>, L<OSSL_PROVIDER-default(7)>, L<OSSL_PROVIDER-base(7)>, 319L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-legacy(7)>, L<OSSL_PROVIDER-null(7)>, 320L<openssl-glossary(7)>, L<provider(7)> 321 322=head1 COPYRIGHT 323 324Copyright 2000-2023 The OpenSSL Project Authors. All Rights Reserved. 325 326Licensed under the Apache License 2.0 (the "License"). You may not use 327this file except in compliance with the License. You can obtain a copy 328in the file LICENSE in the source distribution or at 329L<https://www.openssl.org/source/license.html>. 330 331=cut 332