| =pod |
| |
| =head1 NAME |
| |
| SSL_CTX_set_cert_store, SSL_CTX_set1_cert_store, SSL_CTX_get_cert_store - manipulate X509 certificate verification storage |
| |
| =head1 SYNOPSIS |
| |
| #include <openssl/ssl.h> |
| |
| void SSL_CTX_set_cert_store(SSL_CTX *ctx, X509_STORE *store); |
| void SSL_CTX_set1_cert_store(SSL_CTX *ctx, X509_STORE *store); |
| X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *ctx); |
| |
| =head1 DESCRIPTION |
| |
| SSL_CTX_set_cert_store() sets/replaces the certificate verification storage |
| of B<ctx> to/with B<store>. If another X509_STORE object is currently |
| set in B<ctx>, it will be X509_STORE_free()ed. |
| |
| SSL_CTX_set1_cert_store() sets/replaces the certificate verification storage |
| of B<ctx> to/with B<store>. The B<store>'s reference count is incremented. |
| If another X509_STORE object is currently set in B<ctx>, it will be X509_STORE_free()ed. |
| |
| SSL_CTX_get_cert_store() returns a pointer to the current certificate |
| verification storage. |
| |
| =head1 NOTES |
| |
| In order to verify the certificates presented by the peer, trusted CA |
| certificates must be accessed. These CA certificates are made available |
| via lookup methods, handled inside the X509_STORE. From the X509_STORE |
| the X509_STORE_CTX used when verifying certificates is created. |
| |
| Typically the trusted certificate store is handled indirectly via using |
| L<SSL_CTX_load_verify_locations(3)>. |
| Using the SSL_CTX_set_cert_store() and SSL_CTX_get_cert_store() functions |
| it is possible to manipulate the X509_STORE object beyond the |
| L<SSL_CTX_load_verify_locations(3)> |
| call. |
| |
| Currently no detailed documentation on how to use the X509_STORE |
| object is available. Not all members of the X509_STORE are used when |
| the verification takes place. So will e.g. the verify_callback() be |
| overridden with the verify_callback() set via the |
| L<SSL_CTX_set_verify(3)> family of functions. |
| This document must therefore be updated when documentation about the |
| X509_STORE object and its handling becomes available. |
| |
| SSL_CTX_set_cert_store() does not increment the B<store>'s reference |
| count, so it should not be used to assign an X509_STORE that is owned |
| by another SSL_CTX. |
| |
| To share X509_STOREs between two SSL_CTXs, use SSL_CTX_get_cert_store() |
| to get the X509_STORE from the first SSL_CTX, and then use |
| SSL_CTX_set1_cert_store() to assign to the second SSL_CTX and |
| increment the reference count of the X509_STORE. |
| |
| =head1 RESTRICTIONS |
| |
| The X509_STORE structure used by an SSL_CTX is used for verifying peer |
| certificates and building certificate chains, it is also shared by |
| every child SSL structure. Applications wanting finer control can use |
| functions such as SSL_CTX_set1_verify_cert_store() instead. |
| |
| =head1 RETURN VALUES |
| |
| SSL_CTX_set_cert_store() does not return diagnostic output. |
| |
| SSL_CTX_set1_cert_store() does not return diagnostic output. |
| |
| SSL_CTX_get_cert_store() returns the current setting. |
| |
| =head1 SEE ALSO |
| |
| L<ssl(7)>, |
| L<SSL_CTX_load_verify_locations(3)>, |
| L<SSL_CTX_set_verify(3)> |
| |
| =head1 COPYRIGHT |
| |
| Copyright 2001-2016 The OpenSSL Project Authors. All Rights Reserved. |
| |
| Licensed under the Apache License 2.0 (the "License"). You may not use |
| this file except in compliance with the License. You can obtain a copy |
| in the file LICENSE in the source distribution or at |
| L<https://www.openssl.org/source/license.html>. |
| |
| =cut |