ossl-guide-libssl-introduction.7ossl 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "OSSL-GUIDE-LIBSSL-INTRODUCTION 7ossl"
  136. .TH OSSL-GUIDE-LIBSSL-INTRODUCTION 7ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. ossl\-guide\-libssl\-introduction, ssl
  143. \&\- OpenSSL Guide: An introduction to libssl
  144. .SH "INTRODUCTION"
  145. .IX Header "INTRODUCTION"
  146. The OpenSSL \f(CW\*(C`libssl\*(C'\fR library provides implementations of several secure network
  147. communications protocols. Specifically it provides \s-1SSL/TLS\s0 (SSLv3, TLSv1,
  148. TLSv1.1, TLSv1.2 and TLSv1.3), \s-1DTLS\s0 (DTLSv1 and DTLSv1.2) and \s-1QUIC\s0 (client side
  149. only). The library depends on \f(CW\*(C`libcrypto\*(C'\fR for its underlying cryptographic
  150. operations (see \fBossl\-guide\-libcrypto\-introduction\fR\|(7)).
  151. .PP
  152. The set of APIs supplied by \f(CW\*(C`libssl\*(C'\fR is common across all of these different
  153. network protocols, so a developer familiar with writing applications using one
  154. of these protocols should be able to transition to using another with relative
  155. ease.
  156. .PP
  157. An application written to use \f(CW\*(C`libssl\*(C'\fR will include the \fI<openssl/ssl.h>\fR
  158. header file and will typically use two main data structures, i.e. \fB\s-1SSL\s0\fR and
  159. \&\fB\s-1SSL_CTX\s0\fR.
  160. .PP
  161. An \fB\s-1SSL\s0\fR object is used to represent a connection to a remote peer. Once a
  162. connection with a remote peer has been established data can be exchanged with
  163. that peer.
  164. .PP
  165. When using \s-1DTLS\s0 any data that is exchanged uses \*(L"datagram\*(R" semantics, i.e.
  166. the packets of data can be delivered in any order, and they are not guaranteed
  167. to arrive at all. In this case the \fB\s-1SSL\s0\fR object used for the connection is also
  168. used for exchanging data with the peer.
  169. .PP
  170. Both \s-1TLS\s0 and \s-1QUIC\s0 support the concept of a \*(L"stream\*(R" of data. Data sent via a
  171. stream is guaranteed to be delivered in order without any data loss. A stream
  172. can be uni\- or bi-directional.
  173. .PP
  174. \&\s-1SSL/TLS\s0 only supports one stream of data per connection and it is always
  175. bi-directional. In this case the \fB\s-1SSL\s0\fR object used for the connection also
  176. represents that stream. See \fBossl\-guide\-tls\-introduction\fR\|(7) for more
  177. information.
  178. .PP
  179. The \s-1QUIC\s0 protocol can support multiple streams per connection and they can be
  180. uni\- or bi-directional. In this case an \fB\s-1SSL\s0\fR object can represent the
  181. underlying connection, or a stream, or both. Where multiple streams are in use
  182. a separate \fB\s-1SSL\s0\fR object is used for each one. See
  183. \&\fBossl\-guide\-quic\-introduction\fR\|(7) for more information.
  184. .PP
  185. An \fB\s-1SSL_CTX\s0\fR object is used to create the \fB\s-1SSL\s0\fR object for the underlying
  186. connection. A single \fB\s-1SSL_CTX\s0\fR object can be used to create many connections
  187. (each represented by a separate \fB\s-1SSL\s0\fR object). Many \s-1API\s0 functions in libssl
  188. exist in two forms: one that takes an \fB\s-1SSL_CTX\s0\fR and one that takes an \fB\s-1SSL\s0\fR.
  189. Typically settings that you apply to the \fB\s-1SSL_CTX\s0\fR will then be inherited by
  190. any \fB\s-1SSL\s0\fR object that you create from it. Alternatively you can apply settings
  191. directly to the \fB\s-1SSL\s0\fR object without affecting other \fB\s-1SSL\s0\fR objects. Note that
  192. you should not normally make changes to an \fB\s-1SSL_CTX\s0\fR after the first \fB\s-1SSL\s0\fR
  193. object has been created from it.
  194. .SH "DATA STRUCTURES"
  195. .IX Header "DATA STRUCTURES"
  196. As well as \fB\s-1SSL_CTX\s0\fR and \fB\s-1SSL\s0\fR there are a number of other data structures
  197. that an application may need to use. They are summarised below.
  198. .IP "\fB\s-1SSL_METHOD\s0\fR (\s-1SSL\s0 Method)" 4
  199. .IX Item "SSL_METHOD (SSL Method)"
  200. This structure is used to indicate the kind of connection you want to make, e.g.
  201. whether it is to represent the client or the server, and whether it is to use
  202. \&\s-1SSL/TLS, DTLS\s0 or \s-1QUIC\s0 (client only). It is passed as a parameter when creating
  203. the \fB\s-1SSL_CTX\s0\fR.
  204. .IP "\fB\s-1SSL_SESSION\s0\fR (\s-1SSL\s0 Session)" 4
  205. .IX Item "SSL_SESSION (SSL Session)"
  206. After establishing a connection with a peer the agreed cryptographic material
  207. can be reused to create future connections with the same peer more rapidly. The
  208. set of data used for such a future connection establishment attempt is collected
  209. together into an \fB\s-1SSL_SESSION\s0\fR object. A single successful connection with a
  210. peer may generate zero or more such \fB\s-1SSL_SESSION\s0\fR objects for use in future
  211. connection attempts.
  212. .IP "\fB\s-1SSL_CIPHER\s0\fR (\s-1SSL\s0 Cipher)" 4
  213. .IX Item "SSL_CIPHER (SSL Cipher)"
  214. During connection establishment the client and server agree upon cryptographic
  215. algorithms they are going to use for encryption and other uses. A single set
  216. of cryptographic algorithms that are to be used together is known as a
  217. ciphersuite. Such a set is represented by an \fB\s-1SSL_CIPHER\s0\fR object.
  218. .Sp
  219. The set of available ciphersuites that can be used are configured in the
  220. \&\fB\s-1SSL_CTX\s0\fR or \fB\s-1SSL\s0\fR.
  221. .SH "FURTHER READING"
  222. .IX Header "FURTHER READING"
  223. See \fBossl\-guide\-tls\-introduction\fR\|(7) for an introduction to the \s-1SSL/TLS\s0
  224. protocol and \fBossl\-guide\-quic\-introduction\fR\|(7) for an introduction to \s-1QUIC.\s0
  225. .PP
  226. See \fBossl\-guide\-libcrypto\-introduction\fR\|(7) for an introduction to \f(CW\*(C`libcrypto\*(C'\fR.
  227. .SH "SEE ALSO"
  228. .IX Header "SEE ALSO"
  229. \&\fBossl\-guide\-libcrypto\-introduction\fR\|(7), \fBossl\-guide\-tls\-introduction\fR\|(7),
  230. \&\fBossl\-guide\-quic\-introduction\fR\|(7)
  231. .SH "COPYRIGHT"
  232. .IX Header "COPYRIGHT"
  233. Copyright 2000\-2023 The OpenSSL Project Authors. All Rights Reserved.
  234. .PP
  235. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  236. this file except in compliance with the License. You can obtain a copy
  237. in the file \s-1LICENSE\s0 in the source distribution or at
  238. <https://www.openssl.org/source/license.html>.