Go to file
Neil Horman cc4ea5e000 Introduce new internal hashtable implementation
Create a new hashtable that is more efficient than the existing LHASH_OF
implementation.  the new ossl_ht api offers several new features that
improve performance opportunistically

* A more generalized hash function.  Currently using fnv1a, provides a
  more general hash function, but can still be overridden where needed

* Improved locking and reference counting.  This hash table is
  internally locked with an RCU lock, and optionally reference counts
  elements, allowing for users to not have to create and manage their
  own read/write locks

* Lockless operation.  The hash table can be configured to operate
  locklessly on the read side, improving performance, at the sacrifice
  of the ability to grow the hash table or delete elements from it

* A filter function allowing for the retrieval of several elements at a
  time matching a given criteria without having to hold a lock
  permanently

* a doall_until iterator variant, that allows callers which need to
  iterate over the entire hash table until a given condition is met (as
  defined by the return value of the iterator callback).  This allows
  for callers attempting to do expensive cache searches for a small
  number of elements to terminate the iteration early, saving cpu cycles

* Dynamic type safety.  The hash table provides operations to set and
  get data of a specific type without having to define a type at the
  instatiation point

* Multiple data type storage.  The hash table can store multiple data
  types allowing for more flexible usage

* Ubsan safety.  Because the API deals with concrete single types
  (HT_KEY and HT_VALUE), leaving specific type casting to the call
  recipient with dynamic type validation, this implementation is safe
  from the ubsan undefined behavior warnings that require additional
  thunking on callbacks.

Testing of this new hashtable with an equivalent hash function, I can
observe approximately a 6% performance improvement in the lhash_test

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23671)
2024-04-24 12:03:30 +10:00
.ctags.d util/ctags.sh: a script for generating tags file with expanding macros 2023-05-18 13:29:43 +02:00
.github Update provider-compatibility.yml 2024-04-18 13:33:06 +02:00
Configurations VMS: Move defining _XOPEN_SOURCE and _XOPEN_SOURCE_EXTENDED to config target 2024-04-11 13:06:49 +02:00
VMS Fix VMS installation - update vmsconfig.pm for consistency 2024-01-08 07:28:19 +01:00
apps fix sending error when no root CA cert update available 2024-04-22 08:28:25 +02:00
cloudflare-quiche@7ab6a55cfe Update Cloudflare Quiche to fix a build issue 2023-08-29 14:51:33 +02:00
crypto Introduce new internal hashtable implementation 2024-04-24 12:03:30 +10:00
demos Augment README.md in top level to indicate Makefile presence 2024-04-12 08:02:20 -04:00
dev Add known issues section 2023-11-29 08:35:17 +00:00
doc Introduce new internal hashtable implementation 2024-04-24 12:03:30 +10:00
engines Copyright year updates 2024-04-09 13:43:26 +02:00
exporters exporters/cmake/OpenSSLConfig.cmake.in: Detect missing `platform->sharedlib_import` 2023-12-02 14:15:25 +01:00
external/perl
fuzz fuzz/decoder.c: Limit the EVP_PKEY_param_check on DHX keys as well 2024-04-17 09:30:11 +02:00
gost-engine@ede3886cc5 Update gost-engine submodule to fix the CI 2024-03-26 15:09:22 +01:00
include Introduce new internal hashtable implementation 2024-04-24 12:03:30 +10:00
krb5@aa9b4a2a64 Update dependencies for krb5 external test 2021-06-23 10:26:53 +02:00
ms Copyright year updates 2024-04-09 13:43:26 +02:00
oqs-provider@8c746d7e29 updated (lib+)oqsprovider to latest releases 2023-06-15 08:39:10 +10:00
os-dep Fix copyrights 2022-02-03 13:56:38 +01:00
providers Exclude X25519 and X448 from capabilities advertised by FIPS provider 2024-04-19 10:32:27 +02:00
pyca-cryptography@7e33b0e773 Update pyca-cryptography submodule to fix CI 2022-12-16 18:24:16 +01:00
python-ecdsa@4de8d5bf89 TLSfuzzer: submodules 2022-01-05 11:24:51 +01:00
ssl Use empty renegotiate extension instead of SCSV for TLS > 1.0 2024-04-22 13:23:28 +01:00
test Introduce new internal hashtable implementation 2024-04-24 12:03:30 +10:00
tlsfuzzer@dbd56c1490 TLSfuzzer: submodules 2022-01-05 11:24:51 +01:00
tlslite-ng@771e9f59d6 TLSfuzzer: submodules 2022-01-05 11:24:51 +01:00
tools c_rehash: Fix file extension matching 2022-10-20 11:26:17 +02:00
util Introduce new internal hashtable implementation 2024-04-24 12:03:30 +10:00
wycheproof@2196000605 add wycheproof submodule 2021-04-27 19:09:03 +10:00
.git-blame-ignore-revs Add reformatting commit to .git-blame-ignore-revs 2024-03-11 12:18:03 +00:00
.gitattributes .ctags.d is previous, include it in our tarballs 2024-04-17 18:41:59 +02:00
.gitignore Add exporters for CMake 2023-11-15 08:22:29 +01:00
.gitmodules Add openssl/fuzz-corpora repository as submodule 2023-04-11 10:41:56 +02:00
ACKNOWLEDGEMENTS.md Fix various typos, repeated words, align some spelling to LDP. 2022-10-12 16:55:28 +11:00
AUTHORS.md
CHANGES.md Use empty renegotiate extension instead of SCSV for TLS > 1.0 2024-04-22 13:23:28 +01:00
CODE-OF-CONDUCT.md Add CODE-OF-CONDUCT.md 2022-08-18 16:32:23 +02:00
CONTRIBUTING.md Add 'documentation policy' link to CONTRIBUTING guide. 2024-04-04 08:41:40 +02:00
Configure disable http3 demo on windows 2024-04-12 08:02:20 -04:00
HACKING.md Fixed some grammar and spelling 2022-10-09 17:40:29 +02:00
INSTALL.md Update FIPS hmac key documentation 2024-03-22 10:48:14 +01:00
LICENSE.txt
NEWS.md Sync CHANGES.md and NEWS.md with 3.3 branch 2024-04-09 13:43:26 +02:00
NOTES-ANDROID.md Add support in configuration for android-riscv64 2024-02-05 10:08:23 +01:00
NOTES-DJGPP.md
NOTES-NONSTOP.md Add atexit configuration option to using atexit() in libcrypto at build-time. 2024-02-01 20:26:42 -05:00
NOTES-PERL.md Fix various typos, repeated words, align some spelling to LDP. 2022-10-12 16:55:28 +11:00
NOTES-UNIX.md Fixed some grammar and spelling 2022-10-09 17:40:29 +02:00
NOTES-VALGRIND.md Updated list formatting, added hyperlinks, modernized syntax 2024-04-18 11:02:29 +02:00
NOTES-VMS.md Add information on the 'ias' port for OpenVMS 2023-05-19 10:02:04 +10:00
NOTES-WINDOWS.md NOTES-WINDOWS: fix named anchor links in table of contents 2023-11-15 16:31:16 +01:00
README-ENGINES.md Fixed some grammar and spelling 2022-10-09 17:40:29 +02:00
README-FIPS.md Add FIPS build instructions 2023-07-14 11:35:23 +10:00
README-PROVIDERS.md Fixed some grammar and spelling 2022-10-09 17:40:29 +02:00
README-QUIC.md Add a separate README for the guide demos 2023-10-30 07:54:00 +00:00
README.md Copyright year updates 2024-04-09 13:43:26 +02:00
SUPPORT.md Fix Markdown links in SUPPORT.md 2021-12-08 15:09:36 +11:00
VERSION.dat Update the version to 3.4.0-dev 2024-04-09 13:43:26 +02:00
build.info fix all the warnings in our demos and make them enableable 2024-04-12 08:02:19 -04:00
config
config.com
configdata.pm.in Use $config{build_file} instead of $target{build_file} 2023-02-01 08:30:04 +01:00

README.md

Welcome to the OpenSSL Project

openssl logo

github actions ci badge appveyor badge

OpenSSL is a robust, commercial-grade, full-featured Open Source Toolkit for the TLS (formerly SSL), DTLS and QUIC (currently client side only) protocols.

The protocol implementations are based on a full-strength general purpose cryptographic library, which can also be used stand-alone. Also included is a cryptographic module validated to conform with FIPS standards.

OpenSSL is descended from the SSLeay library developed by Eric A. Young and Tim J. Hudson.

The official Home Page of the OpenSSL Project is www.openssl.org.

Table of Contents

Overview

The OpenSSL toolkit includes:

  • libssl an implementation of all TLS protocol versions up to TLSv1.3 (RFC 8446), DTLS protocol versions up to DTLSv1.2 (RFC 6347) and the QUIC (currently client side only) version 1 protocol (RFC 9000).

  • libcrypto a full-strength general purpose cryptographic library. It constitutes the basis of the TLS implementation, but can also be used independently.

  • openssl the OpenSSL command line tool, a swiss army knife for cryptographic tasks, testing and analyzing. It can be used for

    • creation of key parameters
    • creation of X.509 certificates, CSRs and CRLs
    • calculation of message digests
    • encryption and decryption
    • SSL/TLS/DTLS and client and server tests
    • QUIC client tests
    • handling of S/MIME signed or encrypted mail
    • and more...

Download

For Production Use

Source code tarballs of the official releases can be downloaded from www.openssl.org/source. The OpenSSL project does not distribute the toolkit in binary form.

However, for a large variety of operating systems precompiled versions of the OpenSSL toolkit are available. In particular, on Linux and other Unix operating systems, it is normally recommended to link against the precompiled shared libraries provided by the distributor or vendor.

We also maintain a list of third parties that produce OpenSSL binaries for various Operating Systems (including Windows) on the Binaries page on our wiki.

For Testing and Development

Although testing and development could in theory also be done using the source tarballs, having a local copy of the git repository with the entire project history gives you much more insight into the code base.

The official OpenSSL Git Repository is located at git.openssl.org. There is a GitHub mirror of the repository at github.com/openssl/openssl, which is updated automatically from the former on every commit.

A local copy of the Git Repository can be obtained by cloning it from the original OpenSSL repository using

git clone git://git.openssl.org/openssl.git

or from the GitHub mirror using

git clone https://github.com/openssl/openssl.git

If you intend to contribute to OpenSSL, either to fix bugs or contribute new features, you need to fork the OpenSSL repository openssl/openssl on GitHub and clone your public fork instead.

git clone https://github.com/yourname/openssl.git

This is necessary because all development of OpenSSL nowadays is done via GitHub pull requests. For more details, see Contributing.

Build and Install

After obtaining the Source, have a look at the INSTALL file for detailed instructions about building and installing OpenSSL. For some platforms, the installation instructions are amended by a platform specific document.

Specific notes on upgrading to OpenSSL 3.x from previous versions can be found in the ossl-guide-migration(7ossl) manual page.

Documentation

README Files

There are some README.md files in the top level of the source distribution containing additional information on specific topics.

The OpenSSL Guide

There are some tutorial and introductory pages on some important OpenSSL topics within the OpenSSL Guide.

Manual Pages

The manual pages for the master branch and all current stable releases are available online.

Demos

The are numerous source code demos for using various OpenSSL capabilities in the demos subfolder.

Wiki

There is a Wiki at wiki.openssl.org which is currently not very active. It contains a lot of useful information, not all of which is up-to-date.

License

OpenSSL is licensed under the Apache License 2.0, which means that you are free to get and use it for commercial and non-commercial purposes as long as you fulfill its conditions.

See the LICENSE.txt file for more details.

Support

There are various ways to get in touch. The correct channel depends on your requirement. See the SUPPORT file for more details.

Contributing

If you are interested and willing to contribute to the OpenSSL project, please take a look at the CONTRIBUTING file.

Legalities

A number of nations restrict the use or export of cryptography. If you are potentially subject to such restrictions, you should seek legal advice before attempting to develop or distribute cryptographic code.

Copyright

Copyright (c) 1998-2024 The OpenSSL Project Authors

Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson

All rights reserved.