blob: 917ba7226a72067266d353140074a15d023ba5b3 [file] [log] [blame] [edit]
=pod
=head1 NAME
SSL_set1_dnsname, SSL_add1_dnsname,
SSL_set1_ipaddr, SSL_add1_ipaddr,
SSL_set1_host, SSL_add1_host,
SSL_set_hostflags, SSL_get0_peername -
SSL server verification parameters
=head1 SYNOPSIS
#include <openssl/ssl.h>
int SSL_set1_host(SSL *s, const char *host);
int SSL_add1_host(SSL *s, const char *host);
int SSL_set1_dnsname(SSL *s, const char *dnsname);
int SSL_add1_dnsname(SSL *s, const char *dnsname);
int SSL_set1_ipaddr(SSL *s, const uint8_t *ip_asc);
int SSL_add1_ipaddr(SSL *s, const char *ip_asc);
void SSL_set_hostflags(SSL *s, unsigned int flags);
const char *SSL_get0_peername(SSL *s);
int SSL_set1_host(SSL *s, const char *host);
int SSL_add1_host(SSL *s, const char *host);
=head1 DESCRIPTION
These functions maintain lists of expected matches for peer
certificate subject alternative name (SAN) values is peer certificates
presented in an SSL connection. A peer certificate will be considered
a match for validation purposes if all of the following are true:
* Any name in the dnsname list, if not empty, matches any SAN dnsname
in the certificate. If verification flags allow it, these will also
attempt to match against the CN in the subject.
* Any address in the IP address list, if not empty, matches any IP
address SAN in the certificate.
The set1 family of functions clears the list, and sets the first value
to the provided parameter if the provided parameter is not NULL.
The add1 family of functions adds a single entry to the list.
SSL_set1_dnsname() clears the list of dnsnames to match certificate
SAN dnsnames.
If I<dnsname> is not NULL, it will be checked for
validity and added to the list of DNS name reference identifiers as its first entry.
SSL_set1_ipaddr() clears the list of addresses to match certificate IP address SANs.
If <ip_asc> is not NULL, it is parsed as an
IPv4 or IPv6 address and added to the list as its first entry.
SSL_add1_dnsname() adds I<dnsname> to the list of DNS name reference
identifiers, if it has the correct structure for a DNS name. This
function is required for DANE TLSA in the presence of service name
indirection via CNAME, MX or SRV records as specified in RFCs 7671,
7672, and 7673.
SSL_add1_ipaddr() adds I<ip_asc> to the list of IP addresses, if it parses as an IP address.
It is recommended that TLS clients use SSL_set1_dnsname() to configure server
hostname validation and L<SSL_set_tlsext_host_name(3)> to configure
Server Name Indication (SNI), which may be crucial also for correct
server certificate selection and/or routing of the connection request.
SSL_set1_ipaddr()
should be used for server IP address validation,
SSL_set_hostflags() sets the I<flags> that will be passed to
L<X509_check_host(3)> when name checks are applicable, by default
the I<flags> value is 0. See L<X509_check_host(3)> for the list
of available flags and their meaning.
SSL_get0_peername() returns the DNS hostname or subject CommonName
from the peer certificate that matched one of the reference
identifiers. When wildcard matching is not disabled, the name
matched in the peer certificate may be a wildcard name. When one
of the reference identifiers configured via SSL_set1_host() or
SSL_add1_host() starts with ".", which indicates a parent domain prefix
rather than a fixed name, the matched peer name may be a sub-domain
of the reference identifier. The returned string is allocated by
the library and is no longer valid once the associated I<ssl> handle
is cleared or freed, or a renegotiation takes place. Applications
must not free the return value.
SSL clients are advised to use these functions in preference to
explicitly calling L<X509_check_host(3)>. Hostname checks may be out
of scope with the RFC 7671 DANE-EE(3) certificate usage, and the
internal check will be suppressed as appropriate when DANE is
enabled.
==head1 DEPRECATED FUNCTIONS
SSL_set1_host and SSL_add1_host are deprecated as of OpenSSL 4.0.0.
SSL_set1_dnsname(), SSL_add1_dnsname(), SSL_set1_ipaddr() and SSL_add1_ipaddr() should be used instead.
SSL_set1_host() sets in the verification parameters of I<s>
the expected DNS hostname or IP address to I<host>,
clearing any previously specified IP address and hostnames.
If I<host> is NULL or the empty string, IP address
and hostname checks are not performed on the peer certificate.
When a nonempty I<host> is specified, certificate verification automatically
checks the peer hostname via L<X509_check_host(3)> with I<flags> as specified
via SSL_set_hostflags(). Clients that enable DANE TLSA authentication
via L<SSL_dane_enable(3)> should leave it to that function to set
the primary reference identifier of the peer, and should not call
SSL_set1_host().
SSL_add1_host() adds I<host> as an additional reference identifier
that can match the peer's certificate. Any previous hostnames set via
SSL_set1_host() or SSL_add1_host() are retained. Adding an IP address
is allowed only if no IP address has been set before. No change is
made if I<host> is NULL or empty. The peer is considered verified
when any of the added hostnames, if present, match, and the provided
IP address, if present, matches.
=head1 RETURN VALUES
SSL_set1_dnsname(), SSL_set1_ipaddr(),
SSL_add1_dnsname(), SSL_add1_ipaddr(),
SSL_set1_host() and SSL_add1_host() return 1 for success and 0 for
failure.
SSL_set_hostflags() returns nothing at all.
SSL_get0_peername() returns NULL if peername verification is not
applicable (as with RFC 7671 DANE-EE(3)), or no trusted peername was
matched. Otherwise, it returns the matched peername. To determine
whether verification succeeded call L<SSL_get_verify_result(3)>.
=head1 EXAMPLES
Suppose "smtp.example.com" is the MX host of the domain "example.com".
The calls below will arrange to match either the MX hostname or the
destination domain name in the SMTP server certificate. Wildcards
are supported, but must match the entire label. The actual name
matched in the certificate (which might be a wildcard) is retrieved,
and must be copied by the application if it is to be retained beyond
the lifetime of the SSL connection.
SSL_set_hostflags(ssl, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
if (!SSL_set1_dnsname(ssl, "smtp.example.com"))
/* error */
if (!SSL_add1_dnsname(ssl, "example.com"))
/* error */
/* XXX: Perform SSL_connect() handshake and handle errors here */
if (SSL_get_verify_result(ssl) == X509_V_OK) {
const char *peername = SSL_get0_peername(ssl);
if (peername != NULL)
/* Name checks were in scope and matched the peername */
}
=head1 SEE ALSO
L<ssl(7)>,
L<X509_check_host(3)>, L<SSL_set_tlsext_host_name(3)>,
L<SSL_get_verify_result(3)>, L<SSL_dane_enable(3)>
=head1 HISTORY
These functions were added in OpenSSL 1.1.0.
SSL_set1_host and SSL_add1_host were deprecated in OpenSSL 4.0.0
=head1 COPYRIGHT
Copyright 2016-2026 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the Apache License 2.0 (the "License"). You may not use
this file except in compliance with the License. You can obtain a copy
in the file LICENSE in the source distribution or at
L<https://www.openssl.org/source/license.html>.
=cut