man
7 OSSL_PROVIDER-default
OSSL_PROVIDER-DEFAULT(7ossl) OpenSSL OSSL_PROVIDER-DEFAULT(7ossl)
NAME
OSSL_PROVIDER-default - OpenSSL default provider
DESCRIPTION
The OpenSSL default provider supplies the majority of OpenSSL's diverse
algorithm implementations. If an application doesn't specify anything
else explicitly (e.g. in the application or via config), then this is
the provider that will be used as fallback: It is loaded automatically
the first time that an algorithm is fetched from a provider or a
function acting on providers is called and no other provider has been
loaded yet.
If an attempt to load a provider has already been made (whether
successful or not) then the default provider won't be loaded
automatically. Therefore if the default provider is to be used in
conjunction with other providers then it must be loaded explicitly.
Automatic loading of the default provider only occurs a maximum of
once; if the default provider is explicitly unloaded then the default
provider will not be automatically loaded again.
Properties
The implementations in this provider specifically have this property
defined:
"provider=default"
It may be used in a property query string with fetching functions such
as EVP_MD_fetch(3) or EVP_CIPHER_fetch(3), as well as with other
functions that take a property query string, such as
EVP_PKEY_CTX_new_from_name(3).
It isn't mandatory to query for this property, except to make sure to
get implementations of this provider and none other.
Some implementations may define additional properties. Exact
information is listed below
OPERATIONS AND ALGORITHMS
The OpenSSL default provider supports these operations and algorithms:
Hashing Algorithms / Message Digests
SHA1, see EVP_MD-SHA1(7)
SHA2, see EVP_MD-SHA2(7)
SHA3, see EVP_MD-SHA3(7)
KECCAK, see EVP_MD-KECCAK(7)
KECCAK-KMAC, see EVP_MD-KECCAK-KMAC(7)
SHAKE, see EVP_MD-SHAKE(7)
BLAKE2, see EVP_MD-BLAKE2(7)
SM3, see EVP_MD-SM3(7)
MD5, see EVP_MD-MD5(7)
MD5-SHA1, see EVP_MD-MD5-SHA1(7)
RIPEMD160, see EVP_MD-RIPEMD160(7)
NULL, see EVP_MD-NULL(7)
Symmetric Ciphers
AES, see EVP_CIPHER-AES(7)
ARIA, see EVP_CIPHER-ARIA(7)
CAMELLIA, see EVP_CIPHER-CAMELLIA(7)
3DES, see EVP_CIPHER-DES(7)
SM4, see EVP_CIPHER-SM4(7)
ChaCha20, see EVP_CIPHER-CHACHA(7)
ChaCha20-Poly1305, see EVP_CIPHER-CHACHA(7)
NULL, see EVP_CIPHER-NULL(7)
Message Authentication Code (MAC)
BLAKE2, see EVP_MAC-BLAKE2(7)
CMAC, see EVP_MAC-CMAC(7)
GMAC, see EVP_MAC-GMAC(7)
HMAC, see EVP_MAC-HMAC(7)
KMAC, see EVP_MAC-KMAC(7)
SIPHASH, see EVP_MAC-Siphash(7)
POLY1305, see EVP_MAC-Poly1305(7)
Key Derivation Function (KDF)
HKDF, see EVP_KDF-HKDF(7)
TLS13-KDF, see EVP_KDF-TLS13_KDF(7)
SSKDF, see EVP_KDF-SS(7)
PBKDF2, see EVP_KDF-PBKDF2(7)
PKCS12KDF, see EVP_KDF-PKCS12KDF(7)
SSHKDF, see EVP_KDF-SSHKDF(7)
TLS1-PRF, see EVP_KDF-TLS1_PRF(7)
KBKDF, see EVP_KDF-KB(7)
X942KDF-ASN1, see EVP_KDF-X942-ASN1(7)
X942KDF-CONCAT, see EVP_KDF-X942-CONCAT(7)
X963KDF, see EVP_KDF-X963(7)
SCRYPT, see EVP_KDF-SCRYPT(7)
KRB5KDF, see EVP_KDF-KRB5KDF(7)
HMAC-DRBG, see EVP_KDF-HMAC-DRBG(7)
ARGON2, see EVP_KDF-ARGON2(7)
Key Exchange
DH, see EVP_KEYEXCH-DH(7)
ECDH, see EVP_KEYEXCH-ECDH(7)
X25519, see EVP_KEYEXCH-X25519(7)
X448, see EVP_KEYEXCH-X448(7)
TLS1-PRF
HKDF
SCRYPT
Asymmetric Signature
DSA, see EVP_SIGNATURE-DSA(7)
RSA, see EVP_SIGNATURE-RSA(7)
ED25519, see EVP_SIGNATURE-ED25519(7)
ED448, see EVP_SIGNATURE-ED448(7)
ECDSA, see EVP_SIGNATURE-ECDSA(7)
SM2
HMAC, see EVP_SIGNATURE-HMAC(7)
SIPHASH, see EVP_SIGNATURE-Siphash(7)
POLY1305, see EVP_SIGNATURE-Poly1305(7)
CMAC, see EVP_SIGNATURE-CMAC(7)
Asymmetric Cipher
RSA, see EVP_ASYM_CIPHER-RSA(7)
SM2, see EVP_ASYM_CIPHER-SM2(7)
Asymmetric Key Encapsulation
RSA, see EVP_KEM-RSA(7)
X25519, see EVP_KEM-X25519(7)
X448, see EVP_KEM-X448(7)
EC, see EVP_KEM-EC(7)
Asymmetric Key Management
DH, see EVP_KEYMGMT-DH(7)
DHX, see EVP_KEYMGMT-DHX(7)
DSA, see EVP_KEYMGMT-DSA(7)
RSA, see EVP_KEYMGMT-RSA(7)
RSA-PSS
EC, see EVP_KEYMGMT-EC(7)
X25519, see EVP_KEYMGMT-X25519(7)
X448, see EVP_KEYMGMT-X448(7)
ED25519, see EVP_KEYMGMT-ED25519(7)
ED448, see EVP_KEYMGMT-ED448(7)
TLS1-PRF
HKDF
SCRYPT
HMAC, see EVP_KEYMGMT-HMAC(7)
SIPHASH, see EVP_KEYMGMT-Siphash(7)
POLY1305, see EVP_KEYMGMT-Poly1305(7)
CMAC, see EVP_KEYMGMT-CMAC(7)
SM2, see EVP_KEYMGMT-SM2(7)
Random Number Generation
CTR-DRBG, see EVP_RAND-CTR-DRBG(7)
HASH-DRBG, see EVP_RAND-HASH-DRBG(7)
HMAC-DRBG, see EVP_RAND-HMAC-DRBG(7)
SEED-SRC, see EVP_RAND-SEED-SRC(7)
TEST-RAND, see EVP_RAND-TEST-RAND(7)
In addition to this provider, the "SEED-SRC" algorithm is also
available in the base provider.
Asymmetric Key Encoder
RSA
RSA-PSS
DH
DHX
DSA
EC
ED25519
ED448
X25519
X448
SM2
In addition to this provider, all of these encoding algorithms are also
available in the base provider. Some of these algorithms may be used in
combination with the FIPS provider.
Asymmetric Key Decoder
RSA
RSA-PSS
DH
DHX
DSA
EC
ED25519
ED448
X25519
X448
SM2
DER
In addition to this provider, all of these decoding algorithms are also
available in the base provider. Some of these algorithms may be used in
combination with the FIPS provider.
Stores
file
org.openssl.winstore, see OSSL_STORE-winstore(7)
In addition to this provider, all of these store algorithms are also
available in the base provider.
SEE ALSO
openssl-core.h(7), openssl-core_dispatch.h(7), provider(7),
OSSL_PROVIDER-base(7)
HISTORY
The RIPEMD160 digest was added to the default provider in OpenSSL
3.0.7.
All other functionality was added in OpenSSL 3.0.
COPYRIGHT
Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the Apache License 2.0 (the "License"). You may not use
this file except in compliance with the License. You can obtain a copy
in the file LICENSE in the source distribution or at
<https://www.openssl.org/source/license.html>.
3.2.2 2025-01-29 OSSL_PROVIDER-DEFAULT(7ossl)