2000-09-21 00:55:26 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
SSL_get_verify_result - get result of peer certificate verification
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
2005-03-30 19:50:14 +08:00
|
|
|
long SSL_get_verify_result(const SSL *ssl);
|
2000-09-21 00:55:26 +08:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
SSL_get_verify_result() returns the result of the verification of the
|
2024-08-07 16:54:14 +08:00
|
|
|
X509 certificate presented by the peer, if any. I<ssl> B<MUST NOT> be NULL.
|
2000-09-21 00:55:26 +08:00
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
SSL_get_verify_result() can only return one error code while the verification
|
|
|
|
of a certificate can fail because of many reasons at the same time. Only
|
2001-02-16 10:09:53 +08:00
|
|
|
the last verification error that occurred during the processing is available
|
2000-09-21 00:55:26 +08:00
|
|
|
from SSL_get_verify_result().
|
|
|
|
|
2023-06-16 17:22:24 +08:00
|
|
|
Sometimes there can be a sequence of errors leading to the verification
|
|
|
|
failure as reported by SSL_get_verify_result().
|
|
|
|
To get the errors, it is necessary to setup a verify callback via
|
|
|
|
L<SSL_CTX_set_verify(3)> or L<SSL_set_verify(3)> and retrieve the errors
|
|
|
|
from the error stack there, because once L<SSL_connect(3)> returns,
|
|
|
|
these errors may no longer be available.
|
|
|
|
|
2000-09-21 00:55:26 +08:00
|
|
|
The verification result is part of the established session and is restored
|
|
|
|
when a session is reused.
|
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
|
|
|
If no peer certificate was presented, the returned result code is
|
2001-02-16 10:09:53 +08:00
|
|
|
X509_V_OK. This is because no verification error occurred, it does however
|
2000-09-21 00:55:26 +08:00
|
|
|
not indicate success. SSL_get_verify_result() is only useful in connection
|
2015-08-18 03:21:33 +08:00
|
|
|
with L<SSL_get_peer_certificate(3)>.
|
2000-09-21 00:55:26 +08:00
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
The following return values can currently occur:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item X509_V_OK
|
|
|
|
|
|
|
|
The verification succeeded or no peer certificate was presented.
|
|
|
|
|
|
|
|
=item Any other value
|
|
|
|
|
2019-11-02 04:26:05 +08:00
|
|
|
Documented in L<openssl-verify(1)>.
|
2000-09-21 00:55:26 +08:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2016-11-11 16:33:09 +08:00
|
|
|
L<ssl(7)>, L<SSL_set_verify_result(3)>,
|
2015-08-18 03:21:33 +08:00
|
|
|
L<SSL_get_peer_certificate(3)>,
|
2019-11-02 04:26:05 +08:00
|
|
|
L<openssl-verify(1)>
|
2000-09-21 00:55:26 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2023-09-07 16:59:15 +08:00
|
|
|
Copyright 2000-2023 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|