Provided by: openssl_3.3.1-2ubuntu2_amd64 bug

NAME

       OSSL_PROVIDER-default - OpenSSL default provider

DESCRIPTION

       The OpenSSL default provider supplies the majority of OpenSSL's diverse algorithm
       implementations. If an application doesn't specify anything else explicitly (e.g. in the
       application or via config), then this is the provider that will be used as fallback on
       systems that are not operating in FIPS-approved mode: It is loaded automatically the first
       time that an algorithm is fetched from a provider or a function acting on providers is
       called and no other provider has been loaded yet.

       If an attempt to load a provider has already been made (whether successful or not) then
       the default provider won't be loaded automatically. Therefore if the default provider is
       to be used in conjunction with other providers then it must be loaded explicitly.
       Automatic loading of the default provider only occurs a maximum of once; if the default
       provider is explicitly unloaded then the default provider will not be automatically loaded
       again.

   Properties
       The implementations in this provider specifically have this property defined:

       "provider=default"

       It may be used in a property query string with fetching functions such as EVP_MD_fetch(3)
       or EVP_CIPHER_fetch(3), as well as with other functions that take a property query string,
       such as EVP_PKEY_CTX_new_from_name(3).

       It isn't mandatory to query for this property, except to make sure to get implementations
       of this provider and none other.

       Some implementations may define additional properties.  Exact information is listed below

OPERATIONS AND ALGORITHMS

       The OpenSSL default provider supports these operations and algorithms:

   Hashing Algorithms / Message Digests
       SHA1, see EVP_MD-SHA1(7)
       SHA2, see EVP_MD-SHA2(7)
       SHA3, see EVP_MD-SHA3(7)
       KECCAK, see EVP_MD-KECCAK(7)
       KECCAK-KMAC, see EVP_MD-KECCAK-KMAC(7)
       SHAKE, see EVP_MD-SHAKE(7)
       BLAKE2, see EVP_MD-BLAKE2(7)
       SM3, see EVP_MD-SM3(7)
       MD5, see EVP_MD-MD5(7)
       MD5-SHA1, see EVP_MD-MD5-SHA1(7)
       RIPEMD160, see EVP_MD-RIPEMD160(7)
       NULL, see EVP_MD-NULL(7)

   Symmetric Ciphers
       AES, see EVP_CIPHER-AES(7)
       ARIA, see EVP_CIPHER-ARIA(7)
       CAMELLIA, see EVP_CIPHER-CAMELLIA(7)
       3DES, see EVP_CIPHER-DES(7)
       SM4, see EVP_CIPHER-SM4(7)
       ChaCha20, see EVP_CIPHER-CHACHA(7)
       ChaCha20-Poly1305, see EVP_CIPHER-CHACHA(7)
       NULL, see EVP_CIPHER-NULL(7)

   Message Authentication Code (MAC)
       BLAKE2, see EVP_MAC-BLAKE2(7)
       CMAC, see EVP_MAC-CMAC(7)
       GMAC, see EVP_MAC-GMAC(7)
       HMAC, see EVP_MAC-HMAC(7)
       KMAC, see EVP_MAC-KMAC(7)
       SIPHASH, see EVP_MAC-Siphash(7)
       POLY1305, see EVP_MAC-Poly1305(7)

   Key Derivation Function (KDF)
       HKDF, see EVP_KDF-HKDF(7)
       TLS13-KDF, see EVP_KDF-TLS13_KDF(7)
       SSKDF, see EVP_KDF-SS(7)
       PBKDF2, see EVP_KDF-PBKDF2(7)
       PKCS12KDF, see EVP_KDF-PKCS12KDF(7)
       SSHKDF, see EVP_KDF-SSHKDF(7)
       TLS1-PRF, see EVP_KDF-TLS1_PRF(7)
       KBKDF, see EVP_KDF-KB(7)
       X942KDF-ASN1, see EVP_KDF-X942-ASN1(7)
       X942KDF-CONCAT, see EVP_KDF-X942-CONCAT(7)
       X963KDF, see EVP_KDF-X963(7)
       SCRYPT, see EVP_KDF-SCRYPT(7)
       KRB5KDF, see EVP_KDF-KRB5KDF(7)
       HMAC-DRBG, see EVP_KDF-HMAC-DRBG(7)
       ARGON2, see EVP_KDF-ARGON2(7)

   Key Exchange
       DH, see EVP_KEYEXCH-DH(7)
       ECDH, see EVP_KEYEXCH-ECDH(7)
       X25519, see EVP_KEYEXCH-X25519(7)
       X448, see EVP_KEYEXCH-X448(7)
       TLS1-PRF
       HKDF
       SCRYPT

   Asymmetric Signature
       DSA, see EVP_SIGNATURE-DSA(7)
       RSA, see EVP_SIGNATURE-RSA(7)
       ED25519, see EVP_SIGNATURE-ED25519(7)
       ED448, see EVP_SIGNATURE-ED448(7)
       ECDSA, see EVP_SIGNATURE-ECDSA(7)
       SM2
       HMAC, see EVP_SIGNATURE-HMAC(7)
       SIPHASH, see EVP_SIGNATURE-Siphash(7)
       POLY1305, see EVP_SIGNATURE-Poly1305(7)
       CMAC, see EVP_SIGNATURE-CMAC(7)

   Asymmetric Cipher
       RSA, see EVP_ASYM_CIPHER-RSA(7)
       SM2, see EVP_ASYM_CIPHER-SM2(7)

   Asymmetric Key Encapsulation
       RSA, see EVP_KEM-RSA(7)
       X25519, see EVP_KEM-X25519(7)
       X448, see EVP_KEM-X448(7)
       EC, see EVP_KEM-EC(7)

   Asymmetric Key Management
       DH, see EVP_KEYMGMT-DH(7)
       DHX, see EVP_KEYMGMT-DHX(7)
       DSA, see EVP_KEYMGMT-DSA(7)
       RSA, see EVP_KEYMGMT-RSA(7)
       RSA-PSS
       EC, see EVP_KEYMGMT-EC(7)
       X25519, see EVP_KEYMGMT-X25519(7)
       X448, see EVP_KEYMGMT-X448(7)
       ED25519, see EVP_KEYMGMT-ED25519(7)
       ED448, see EVP_KEYMGMT-ED448(7)
       TLS1-PRF
       HKDF
       SCRYPT
       HMAC, see EVP_KEYMGMT-HMAC(7)
       SIPHASH, see EVP_KEYMGMT-Siphash(7)
       POLY1305, see EVP_KEYMGMT-Poly1305(7)
       CMAC, see EVP_KEYMGMT-CMAC(7)
       SM2, see EVP_KEYMGMT-SM2(7)

   Random Number Generation
       CTR-DRBG, see EVP_RAND-CTR-DRBG(7)
       HASH-DRBG, see EVP_RAND-HASH-DRBG(7)
       HMAC-DRBG, see EVP_RAND-HMAC-DRBG(7)
       SEED-SRC,  see EVP_RAND-SEED-SRC(7)
       TEST-RAND, see EVP_RAND-TEST-RAND(7)

       In addition to this provider, the "SEED-SRC" algorithm is also available in the base
       provider.

   Asymmetric Key Encoder
       RSA
       RSA-PSS
       DH
       DHX
       DSA
       EC
       ED25519
       ED448
       X25519
       X448
       SM2

       In addition to this provider, all of these encoding algorithms are also available in the
       base provider. Some of these algorithms may be used in combination with the FIPS provider.

   Asymmetric Key Decoder
       RSA
       RSA-PSS
       DH
       DHX
       DSA
       EC
       ED25519
       ED448
       X25519
       X448
       SM2
       DER

       In addition to this provider, all of these decoding algorithms are also available in the
       base provider. Some of these algorithms may be used in combination with the FIPS provider.

   Stores
       file
       org.openssl.winstore, see OSSL_STORE-winstore(7)

       In addition to this provider, all of these store algorithms are also available in the base
       provider.

SEE ALSO

       openssl-core.h(7), openssl-core_dispatch.h(7), provider(7), OSSL_PROVIDER-base(7)

HISTORY

       The RIPEMD160 digest was added to the default provider in OpenSSL 3.0.7.

       All other functionality was added in OpenSSL 3.0.

COPYRIGHT

       Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved.

       Licensed under the Apache License 2.0 (the "License").  You may not use this file except
       in compliance with the License.  You can obtain a copy in the file LICENSE in the source
       distribution or at <https://www.openssl.org/source/license.html>.