GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
SSL_GET_PEER_CERT_CHAIN(3) FreeBSD Library Functions Manual SSL_GET_PEER_CERT_CHAIN(3)

SSL_get_peer_cert_chainget the X509 certificate chain sent by the peer

#include <openssl/ssl.h>

STACK_OF(X509) *
SSL_get_peer_cert_chain(const SSL *ssl);

() returns a pointer to STACK_OF(X509) certificates forming the certificate chain of the peer. If called on the client side, the stack also contains the peer's certificate; if called on the server side, the peer's certificate must be obtained separately using SSL_get_peer_certificate(3). If the peer did not present a certificate, NULL is returned.

() returns the peer chain as sent by the peer: it only consists of certificates the peer has sent (in the order the peer has sent them) and it is not a verified chain.

If the session is resumed, peers do not send certificates, so a NULL pointer is returned. Applications can call () to determine whether a session is resumed.

The reference count of the STACK_OF(X509) object is not incremented. If the corresponding session is freed, the pointer must not be used any longer.

The following return values can occur:

No certificate was presented by the peer or no connection was established or the certificate chain is no longer available when a session is reused.
Pointer to a STACK_OF(X509)
The return value points to the certificate chain presented by the peer.

ssl(3), SSL_get_peer_certificate(3)

SSL_get_peer_cert_chain() first appeared in SSLeay 0.8.0 and has been available since OpenBSD 2.4.

March 27, 2018 FreeBSD 14.3-RELEASE

Search for    or go to Top of page |  Section 3 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.