1gnutls_certificate_verify_peers2(3) gnutls gnutls_certificate_verify_peers2(3)
2
3
4
6 gnutls_certificate_verify_peers2 - return the peer's certificate veri‐
7 fication status
8
10 #include <gnutls/gnutls.h>
11
12 int gnutls_certificate_verify_peers2(gnutls_session_t session, unsigned
13 int * status);
14
16 gnutls_session_t session
17 is a gnutls session
18
19 unsigned int * status
20 is the output of the verification
21
23 This function will try to verify the peer's certificate and return its
24 status (trusted, invalid etc.). The value of status should be one or
25 more of the gnutls_certificate_status_t enumerated elements bitwise
26 or'd. To avoid denial of service attacks some default upper limits
27 regarding the certificate key size and chain size are set. To override
28 them use gnutls_certificate_set_verify_limits().
29
30 Note that you must also check the peer's name in order to check if the
31 verified certificate belongs to the actual peer.
32
33 This function uses gnutls_x509_crt_list_verify() with the CAs in the
34 credentials as trusted CAs.
35
36 Note that some commonly used X.509 Certificate Authorities are still
37 using Version 1 certificates. If you want to accept them, you need to
38 call gnutls_certificate_set_verify_flags() with, e.g., GNUTLS_VER‐
39 IFY_ALLOW_X509_V1_CA_CRT parameter.
40
42 a negative error code on error and zero on success.
43
45 Report bugs to <bug-gnutls@gnu.org>. GnuTLS home page:
46 http://www.gnu.org/software/gnutls/ General help using GNU software:
47 http://www.gnu.org/gethelp/
48
50 Copyright © 2008 Free Software Foundation.
51 Copying and distribution of this file, with or without modification,
52 are permitted in any medium without royalty provided the copyright
53 notice and this notice are preserved.
54
56 The full documentation for gnutls is maintained as a Texinfo manual.
57 If the info and gnutls programs are properly installed at your site,
58 the command
59
60 info gnutls
61
62 should give you access to the complete manual.
63
64
65
66gnutls 2.8.6 gnutls_certificate_verify_peers2(3)