Provided by: gnutls-doc_3.4.10-4ubuntu1.9_all bug

NAME

       gnutls_x509_trust_list_verify_crt2 - API function

SYNOPSIS

       #include <gnutls/x509.h>

       int  gnutls_x509_trust_list_verify_crt2(gnutls_x509_trust_list_t list, gnutls_x509_crt_t *
       cert_list,  unsigned  int  cert_list_size,  gnutls_typed_vdata_st  *  data,  unsigned  int
       elements, unsigned int flags, unsigned int * voutput, gnutls_verify_output_function func);

ARGUMENTS

       gnutls_x509_trust_list_t list
                   The list

       gnutls_x509_crt_t * cert_list
                   is the certificate list to be verified

       unsigned int cert_list_size
                   is the certificate list size

       gnutls_typed_vdata_st * data
                   an array of typed data

       unsigned int elements
                   the number of data elements

       unsigned int flags
                   Flags  that  may  be  used to change the verification algorithm. Use OR of the
                   gnutls_certificate_verify_flags enumerations.

       unsigned int * voutput
                   will hold the certificate verification output.

       gnutls_verify_output_function func
                   If non-null will be called on each chain element verification with the output.

DESCRIPTION

       This function will attempt to verify the given certificate  and  return  its  status.  The
       voutput parameter will hold an OR'ed sequence of gnutls_certificate_status_t flags. When a
       chain of  cert_list_size with more than one certificates  is  provided,  the  verification
       status  will  apply  to  the  first certificate in the chain that failed verification. The
       verification process starts from the end of the chain (from CA to end certificate).

       Additionally a certificate  verification  profile  can  be  specified  from  the  ones  in
       gnutls_certificate_verification_profiles_t      by      ORing      the      result      of
       GNUTLS_PROFILE_TO_VFLAGS() to the verification flags.

       The acceptable  data types are GNUTLS_DT_DNS_HOSTNAME and GNUTLS_DT_KEY_PURPOSE_OID.   The
       former accepts as data a null-terminated hostname, and the latter a null-terminated object
       identifier (e.g., GNUTLS_KP_TLS_WWW_SERVER).  If a DNS  hostname  is  provided  then  this
       function  will  compare the hostname in the certificate against the given. If names do not
       match the GNUTLS_CERT_UNEXPECTED_OWNER status flag  will  be  set.  In  addition  it  will
       consider certificates provided with gnutls_x509_trust_list_add_named_crt().

       If  a  key purpose OID is provided and the end-certificate contains the extended key usage
       PKIX extension, it will be required to match  the  provided  OID  or  be  marked  for  any
       purpose, otherwise verification will fail with GNUTLS_CERT_PURPOSE_MISMATCH status.

RETURNS

       On  success, GNUTLS_E_SUCCESS (0) is returned, otherwise a negative error value. Note that
       verification failure will not result to an error code, only  voutput will be updated.

SINCE

       3.3.8

REPORTING BUGS

       Report bugs to <bugs@gnutls.org>.
       Home page: http://www.gnutls.org

COPYRIGHT

       Copyright © 2001-2021 Free Software Foundation, Inc., and others.
       Copying and distribution of this file, with or without modification, are permitted in  any
       medium without royalty provided the copyright notice and this notice are preserved.

SEE ALSO

       The   full   documentation  for  gnutls  is  maintained  as  a  Texinfo  manual.   If  the
       /usr/share/doc/gnutls/ directory does not contain the HTML form visit

       http://www.gnutls.org/manual/