| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | =pod | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 NAME | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | SSL_CTX_set_cert_cb, SSL_set_cert_cb - handle certificate callback function | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 SYNOPSIS | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  #include <openssl/ssl.h> | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-21 02:58:49 +08:00
										 |  |  |  void SSL_CTX_set_cert_cb(SSL_CTX *c, int (*cert_cb)(SSL *ssl, void *arg), | 
					
						
							|  |  |  |                           void *arg); | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  |  void SSL_set_cert_cb(SSL *s, int (*cert_cb)(SSL *ssl, void *arg), void *arg); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  int (*cert_cb)(SSL *ssl, void *arg); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 DESCRIPTION | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-11-20 04:49:30 +08:00
										 |  |  | SSL_CTX_set_cert_cb() and SSL_set_cert_cb() sets the cert_cb() callback, | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | B<arg> value is pointer which is passed to the application callback. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-11-20 04:49:30 +08:00
										 |  |  | When cert_cb() is NULL, no callback function is used. | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | cert_cb() is the application defined callback. It is called before a | 
					
						
							|  |  |  | certificate will be used by a client or server. The callback can then inspect | 
					
						
							|  |  |  | the passed B<ssl> structure and set or clear any appropriate certificates. If | 
					
						
							|  |  |  | the callback is successful it B<MUST> return 1 even if no certificates have | 
					
						
							|  |  |  | been set. A zero is returned on error which will abort the handshake with a | 
					
						
							|  |  |  | fatal internal error alert. A negative return value will suspend the handshake | 
					
						
							| 
									
										
										
										
											2014-07-03 10:42:40 +08:00
										 |  |  | and the handshake function will return immediately. | 
					
						
							| 
									
										
										
										
											2015-08-18 03:21:33 +08:00
										 |  |  | L<SSL_get_error(3)> will return SSL_ERROR_WANT_X509_LOOKUP to | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | indicate, that the handshake was suspended. The next call to the handshake | 
					
						
							|  |  |  | function will again lead to the call of cert_cb(). It is the job of the | 
					
						
							|  |  |  | cert_cb() to store information about the state of the last call, | 
					
						
							|  |  |  | if required to continue. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 NOTES | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | An application will typically call SSL_use_certificate() and | 
					
						
							|  |  |  | SSL_use_PrivateKey() to set the end entity certificate and private key. | 
					
						
							|  |  |  | It can add intermediate and optionally the root CA certificates using | 
					
						
							|  |  |  | SSL_add1_chain_cert(). | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | It might also call SSL_certs_clear() to delete any certificates associated | 
					
						
							|  |  |  | with the B<SSL> object. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-04-14 00:48:06 +08:00
										 |  |  | The certificate callback functionality supersedes the (largely broken) | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | functionality provided by the old client certificate callback interface. | 
					
						
							|  |  |  | It is B<always> called even is a certificate is already set so the callback | 
					
						
							|  |  |  | can modify or delete the existing certificate. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | A more advanced callback might examine the handshake parameters and set | 
					
						
							|  |  |  | whatever chain is appropriate. For example a legacy client supporting only | 
					
						
							| 
									
										
										
										
											2018-09-01 08:40:51 +08:00
										 |  |  | TLSv1.0 might receive a certificate chain signed using SHA1 whereas a | 
					
						
							|  |  |  | TLSv1.2 or later client which advertises support for SHA256 could receive a | 
					
						
							|  |  |  | chain using SHA256. | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Normal server sanity checks are performed on any certificates set | 
					
						
							|  |  |  | by the callback. So if an EC chain is set for a curve the client does not | 
					
						
							|  |  |  | support it will B<not> be used. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-12-25 17:50:39 +08:00
										 |  |  | =head1 RETURN VALUES | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | SSL_CTX_set_cert_cb() and SSL_set_cert_cb() do not return values. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | =head1 SEE ALSO | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-11-11 16:33:09 +08:00
										 |  |  | L<ssl(7)>, L<SSL_use_certificate(3)>, | 
					
						
							| 
									
										
										
										
											2015-08-18 03:21:33 +08:00
										 |  |  | L<SSL_add1_chain_cert(3)>, | 
					
						
							|  |  |  | L<SSL_get_client_CA_list(3)>, | 
					
						
							|  |  |  | L<SSL_clear(3)>, L<SSL_free(3)> | 
					
						
							| 
									
										
										
										
											2014-01-26 07:20:34 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | =head1 COPYRIGHT | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-01-16 01:01:46 +08:00
										 |  |  | Copyright 2014-2018 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-12-06 21:04:44 +08:00
										 |  |  | Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  | in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  | L<https://www.openssl.org/source/license.html>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =cut |