Sortix 1.1dev ports manual
This manual documents Sortix 1.1dev ports. You can instead view this document in the latest official manual.
SSL_SET1_HOST(3) | Library Functions Manual | SSL_SET1_HOST(3) |
NAME
SSL_set1_host, SSL_set_hostflags, SSL_get0_peername — SSL server verification parametersSYNOPSIS
#include <openssl/ssl.h> intSSL_set1_host(SSL *ssl, const char *hostname); void
SSL_set_hostflags(SSL *ssl, unsigned int flags); const char *
SSL_get0_peername(SSL *ssl);
DESCRIPTION
SSL_set1_host() configures a server hostname check in the ssl client, setting the expected DNS hostname to hostname and clearing any previously specified hostname. If hostname isNULL
or the empty string, name checks are
not performed on the peer certificate. If a nonempty
hostname is specified, certificate
verification automatically checks the peer hostname via
X509_check_host(3)
with flags set to 0.
SSL_set_hostflags() sets the flags that will be
passed to
X509_check_host(3)
when name checks are applicable, by default the flags value is 0. See
X509_check_host(3)
for the list of available flags and their meaning.
SSL_get0_peername() returns the DNS hostname or
subject CommonName from the peer certificate that matched one of the reference
identifiers. Unless wildcard matching is disabled, the name matched in the
peer certificate may be a wildcard name. A reference identifier starting with
‘.’ indicates a parent domain prefix rather than a fixed name.
In this case, the matched peername may be a sub-domain of the reference
identifier. The returned string is owned by the library and is no longer valid
once the associated ssl object is cleared or
freed, or if a renegotiation takes place. Applications must not free the
return value.
SSL clients are advised to use these functions in preference to explicitly
calling
X509_check_host(3).
RETURN VALUES
SSL_set1_host() returns 1 for success or 0 for failure. SSL_get0_peername() returns the matched peername orNULL
if peername verification is not
applicable or no trusted peername was matched. Use
SSL_get_verify_result(3)
to determine whether verification succeeded.
EXAMPLES
The calls below check the hostname. Wildcards are supported, but they must match the entire label. The actual name matched in the certificate (which might be a wildcard) is retrieved, and must be copied by the application if it is to be retained beyond the lifetime of the SSL connection.if (!SSL_set1_host(ssl, "smtp.example.com")) /* error */ /* XXX: Perform SSL_connect() handshake and handle errors here */ if (SSL_get_verify_result(ssl) == X509_V_OK) { const char *peername = SSL_get0_peername(ssl); if (peername != NULL) /* Name checks were in scope and matched the peername */ }
SEE ALSO
ssl(3), SSL_CTX_set_verify(3), SSL_get_peer_certificate(3), SSL_get_verify_result(3), X509_check_host(3), X509_VERIFY_PARAM_set1_host(3)HISTORY
All three functions first appeared in OpenSSL 1.1.0. SSL_set1_host() has been available since OpenBSD 6.5, and SSL_set_hostflags() and SSL_get0_peername() since OpenBSD 6.9.March 31, 2021 | Debian |