 |
|
| |
OSSL_PROVIDER-DEFAULT(7ossl) |
OpenSSL |
OSSL_PROVIDER-DEFAULT(7ossl) |
OSSL_PROVIDER-default - OpenSSL default provider
The OpenSSL default provider supplies the majority of OpenSSL's
diverse algorithm implementations. If an application doesn't specify
anything else explicitly (e.g. in the application or via config), then this
is the provider that will be used as fallback: It is loaded automatically
the first time that an algorithm is fetched from a provider or a function
acting on providers is called and no other provider has been loaded yet.
If an attempt to load a provider has already been made (whether
successful or not) then the default provider won't be loaded automatically.
Therefore if the default provider is to be used in conjunction with other
providers then it must be loaded explicitly. Automatic loading of the
default provider only occurs a maximum of once; if the default provider is
explicitly unloaded then the default provider will not be automatically
loaded again.
The implementations in this provider specifically have this
property defined:
- "provider=default"
It may be used in a property query string with fetching functions
such as EVP_MD_fetch(3) or EVP_CIPHER_fetch(3), as well as
with other functions that take a property query string, such as
EVP_PKEY_CTX_new_from_name(3).
It isn't mandatory to query for this property, except to make sure
to get implementations of this provider and none other.
Some implementations may define additional properties. Exact
information is listed below
The OpenSSL default provider supports these operations and
algorithms:
- SHA1, see
EVP_MD-SHA1(7)
- SHA2, see
EVP_MD-SHA2(7)
- SHA3, see
EVP_MD-SHA3(7)
- KECCAK, see
EVP_MD-KECCAK(7)
- KECCAK-KMAC,
see EVP_MD-KECCAK-KMAC(7)
- SHAKE, see
EVP_MD-SHAKE(7)
- BLAKE2, see
EVP_MD-BLAKE2(7)
- SM3, see
EVP_MD-SM3(7)
- MD5, see
EVP_MD-MD5(7)
- MD5-SHA1, see
EVP_MD-MD5-SHA1(7)
- RIPEMD160, see
EVP_MD-RIPEMD160(7)
- NULL, see
EVP_MD-NULL(7)
- HKDF, see
EVP_KDF-HKDF(7)
- TLS13-KDF, see
EVP_KDF-TLS13_KDF(7)
- SSKDF, see
EVP_KDF-SS(7)
- PBKDF2, see
EVP_KDF-PBKDF2(7)
- PKCS12KDF, see
EVP_KDF-PKCS12KDF(7)
- SSHKDF, see
EVP_KDF-SSHKDF(7)
- TLS1-PRF, see
EVP_KDF-TLS1_PRF(7)
- KBKDF, see
EVP_KDF-KB(7)
- X942KDF-ASN1, see
EVP_KDF-X942-ASN1(7)
- X942KDF-CONCAT, see
EVP_KDF-X942-CONCAT(7)
- X963KDF, see
EVP_KDF-X963(7)
- SCRYPT, see
EVP_KDF-SCRYPT(7)
- KRB5KDF, see
EVP_KDF-KRB5KDF(7)
- HMAC-DRBG, see
EVP_KDF-HMAC-DRBG(7)
- ARGON2, see
EVP_KDF-ARGON2(7)
- DSA, see
EVP_SIGNATURE-DSA(7)
- RSA, see
EVP_SIGNATURE-RSA(7)
- ED25519, see
EVP_SIGNATURE-ED25519(7)
- ED448, see
EVP_SIGNATURE-ED448(7)
- ECDSA, see
EVP_SIGNATURE-ECDSA(7)
- SM2
- ML-DSA-44, see
EVP_SIGNATURE-ML-DSA(7)
- ML-DSA-65, see
EVP_SIGNATURE-ML-DSA(7)
- ML-DSA-87, see
EVP_SIGNATURE-ML-DSA(7)
- HMAC, see
EVP_SIGNATURE-HMAC(7)
- SIPHASH, see
EVP_SIGNATURE-Siphash(7)
- POLY1305, see
EVP_SIGNATURE-Poly1305(7)
- CMAC, see
EVP_SIGNATURE-CMAC(7)
- SLH-DSA-SHA2-128s, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHA2-128f, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHA2-192s, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHA2-192f, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHA2-256s, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHA2-256f, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHAKE-128s, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHAKE-128f, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHAKE-192s, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHAKE-192f, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHAKE-256s, see
EVP_SIGNATURE-SLH-DSA(7)
- SLH-DSA-SHAKE-256f, see
EVP_SIGNATURE-SLH-DSA(7)
- DSA, see
EVP_KEYMGMT-DSA(7)
- RSA, see
EVP_KEYMGMT-RSA(7)
- RSA-PSS
- EC, see
EVP_KEYMGMT-EC(7)
- ED25519, see
EVP_KEYMGMT-ED25519(7)
- ED448, see
EVP_KEYMGMT-ED448(7)
- SM2, see
EVP_KEYMGMT-SM2(7)
- DH, see
EVP_KEYMGMT-DH(7)
- DHX, see
EVP_KEYMGMT-DHX(7)
- X25519, see
EVP_KEYMGMT-X25519(7)
- X448, see
EVP_KEYMGMT-X448(7)
- ML-DSA-44, see
EVP_KEYMGMT-ML-DSA(7)
- ML-DSA-65, see
EVP_KEYMGMT-ML-DSA(7)
- ML-DSA-87, see
EVP_KEYMGMT-ML-DSA(7)
- MK-KEM-512, see
EVP_KEYMGMT-ML-KEM-512(7)
- MK-KEM-768, see
EVP_KEYMGMT-ML-KEM-768(7)
- MK-KEM-1024, see
EVP_KEYMGMT-ML-KEM-1024(7)
- SLH-DSA-SHA2-128s, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHA2-128f, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHA2-192s, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHA2-192f, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHA2-256s, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHA2-256f, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHAKE-128s, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHAKE-128f, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHAKE-192s, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHAKE-192f, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHAKE-256s, see
EVP_KEYMGMT-SLH-DSA(7)
- SLH-DSA-SHAKE-256f, see
EVP_KEYMGMT-SLH-DSA(7)
- TLS1-PRF
- HKDF
- SCRYPT
- HMAC, see
EVP_KEYMGMT-HMAC(7)
- SIPHASH, see
EVP_KEYMGMT-Siphash(7)
- POLY1305, see
EVP_KEYMGMT-Poly1305(7)
- CMAC, see
EVP_KEYMGMT-CMAC(7)
openssl-core.h(7), openssl-core_dispatch.h(7),
provider(7), OSSL_PROVIDER-base(7)
The RIPEMD160 digest was added to the default provider in OpenSSL
3.0.7.
All other functionality was added in OpenSSL 3.0.
Copyright 2020-2025 The OpenSSL Project Authors. All Rights
Reserved.
Licensed under the Apache License 2.0 (the "License").
You may not use this file except in compliance with the License. You can
obtain a copy in the file LICENSE in the source distribution or at
<https://www.openssl.org/source/license.html>.
Visit the GSP FreeBSD Man Page Interface. Output converted with ManDoc.
|