gnutls_session_set_verify_cert(3) — Linux manual page

NAME | SYNOPSIS | ARGUMENTS | DESCRIPTION | SINCE | REPORTING BUGS | COPYRIGHT | SEE ALSO | COLOPHON

gnutls_sessio...t_verify_cert(3) gnutls gnutls_sessio...t_verify_cert(3)

NAME         top

       gnutls_session_set_verify_cert - API function

SYNOPSIS         top

       #include <gnutls/gnutls.h>

       void gnutls_session_set_verify_cert(gnutls_session_t session,
       const char * hostname, unsigned flags);

ARGUMENTS         top

       gnutls_session_t session
                   is a gnutls session

       const char * hostname
                   is the expected name of the peer; may be NULL

       unsigned flags
                   flags for certificate verification --
                   gnutls_certificate_verify_flags

DESCRIPTION         top

       This function instructs GnuTLS to verify the peer's certificate
       using the provided hostname. If the verification fails the
       handshake will also fail with
       GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR. In that case the
       verification result can be obtained using
       gnutls_session_get_verify_cert_status().

       The  hostname pointer provided must remain valid for the lifetime
       of the session. More precisely it should be available during any
       subsequent handshakes. If no hostname is provided, no hostname
       verification will be performed. For a more advanced verification
       function check gnutls_session_set_verify_cert2().

       If  flags is provided which contain a profile, this function
       should be called after any session priority setting functions.

       The gnutls_session_set_verify_cert() function is intended to be
       used by TLS clients to verify the server's certificate.

SINCE         top

       3.4.6

REPORTING BUGS         top

       Report bugs to <[email protected]>.
       Home page: https://www.gnutls.org

COPYRIGHT         top

       Copyright © 2001-2023 Free Software Foundation, Inc., and others.
       Copying and distribution of this file, with or without
       modification, are permitted in any medium without royalty
       provided the copyright notice and this notice are preserved.

SEE ALSO         top

       The full documentation for gnutls is maintained as a Texinfo
       manual.  If the /usr/share/doc/gnutls/ directory does not contain
       the HTML form visit

       https://www.gnutls.org/manual/

COLOPHON         top

       This page is part of the GnuTLS (GnuTLS Transport Layer Security
       Library) project.  Information about the project can be found at
       ⟨http:https://www.gnutls.org/⟩.  If you have a bug report for this
       manual page, send it to [email protected].  This page was obtained
       from the tarball gnutls-3.8.2.tar.xz fetched from
       ⟨http:https://www.gnutls.org/download.html⟩ on 2023-12-22.  If you
       discover any rendering problems in this HTML version of the page,
       or you believe there is a better or more up-to-date source for
       the page, or you have corrections or improvements to the
       information in this COLOPHON (which is not part of the original
       manual page), send a mail to [email protected]

gnutls                            3.8.2 gnutls_sessio...t_verify_cert(3)