gnutls_certificate_verify_peers3(3) gnutls gnutls_certificate_verify_peers3(3) NAME gnutls_certificate_verify_peers3 - API function SYNOPSIS #include <gnutls/gnutls.h> int gnutls_certificate_verify_peers3(gnutls_session_t session, const char * hostname, unsigned int * status); ARGUMENTS gnutls_session_t session is a gnutls session const char * hostname is the expected name of the peer; may be NULL unsigned int * status is the output of the verification DESCRIPTION This function will verify the peer's certificate and store the the sta- tus in the status variable as a bitwise OR of gnutls_certificate_sta- tus_t values or zero if the certificate is trusted. Note that value in status is set only when the return value of this function is success (i.e, failure to trust a certificate does not imply a negative return value). The default verification flags used by this function can be overridden using gnutls_certificate_set_verify_flags(). See the docu- mentation of gnutls_certificate_verify_peers2() for details in the ver- ification process. This function will take into account the stapled OCSP responses sent by the server, as well as the following X.509 certificate extensions: Name Constraints, Key Usage, and Basic Constraints (pathlen). If the hostname provided is non-NULL then this function will compare the hostname in the certificate against it. The comparison will follow the RFC6125 recommendations. If names do not match the GNUTLS_CERT_UN- EXPECTED_OWNER status flag will be set. In order to verify the purpose of the end-certificate (by checking the extended key usage), use gnutls_certificate_verify_peers(). To avoid denial of service attacks some default upper limits regarding the certificate key size and chain size are set. To override them use gnutls_certificate_set_verify_limits(). Note that when using raw public-keys verification will not work because there is no corresponding certificate body belonging to the raw key that can be verified. In that case this function will return GNUTLS_E_INVALID_REQUEST. RETURNS GNUTLS_E_SUCCESS (0) when the validation is performed, or a negative error code otherwise. A successful error code means that the status parameter must be checked to obtain the validation status. SINCE 3.1.4 REPORTING BUGS Report bugs to <bugs@gnutls.org>. Home page: https://www.gnutls.org COPYRIGHT Copyright © 2001- Free Software Foundation, Inc., and others. Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright no- tice and this notice are preserved. SEE ALSO The full documentation for gnutls is maintained as a Texinfo manual. If the /usr/share/doc/gnutls/ directory does not contain the HTML form visit https://www.gnutls.org/manual/ gnutls 3.7.3 gnutls_certificate_verify_peers3(3)
Generated by dwww version 1.14 on Mon Feb 3 08:24:50 CET 2025.