Provided by: gnutls-doc_3.4.10-4ubuntu1.9_all bug

NAME

       gnutls_x509_trust_list_verify_crt2 - API function

SYNOPSIS

       #include <gnutls/x509.h>

       int  gnutls_x509_trust_list_verify_crt2(gnutls_x509_trust_list_t  list,  gnutls_x509_crt_t  *  cert_list,
       unsigned int cert_list_size, gnutls_typed_vdata_st * data, unsigned int  elements,  unsigned  int  flags,
       unsigned int * voutput, gnutls_verify_output_function func);

ARGUMENTS

       gnutls_x509_trust_list_t list
                   The list

       gnutls_x509_crt_t * cert_list
                   is the certificate list to be verified

       unsigned int cert_list_size
                   is the certificate list size

       gnutls_typed_vdata_st * data
                   an array of typed data

       unsigned int elements
                   the number of data elements

       unsigned int flags
                   Flags   that   may   be   used   to   change  the  verification  algorithm.  Use  OR  of  the
                   gnutls_certificate_verify_flags enumerations.

       unsigned int * voutput
                   will hold the certificate verification output.

       gnutls_verify_output_function func
                   If non-null will be called on each chain element verification with the output.

DESCRIPTION

       This function will attempt to verify the given certificate and return its status. The  voutput  parameter
       will  hold  an  OR'ed sequence of gnutls_certificate_status_t flags. When a chain of  cert_list_size with
       more than one certificates is provided, the verification status will apply to the  first  certificate  in
       the chain that failed verification. The verification process starts from the end of the chain (from CA to
       end certificate).

       Additionally    a    certificate   verification   profile   can   be   specified   from   the   ones   in
       gnutls_certificate_verification_profiles_t by ORing  the  result  of  GNUTLS_PROFILE_TO_VFLAGS()  to  the
       verification flags.

       The  acceptable  data types are GNUTLS_DT_DNS_HOSTNAME and GNUTLS_DT_KEY_PURPOSE_OID.  The former accepts
       as  data  a  null-terminated  hostname,  and  the  latter  a  null-terminated  object  identifier  (e.g.,
       GNUTLS_KP_TLS_WWW_SERVER).  If a DNS hostname is provided then this function will compare the hostname in
       the  certificate  against  the  given. If names do not match the GNUTLS_CERT_UNEXPECTED_OWNER status flag
       will    be    set.    In     addition     it     will     consider     certificates     provided     with
       gnutls_x509_trust_list_add_named_crt().

       If  a key purpose OID is provided and the end-certificate contains the extended key usage PKIX extension,
       it will be required to match the provided OID or be marked for any purpose, otherwise  verification  will
       fail with GNUTLS_CERT_PURPOSE_MISMATCH status.

RETURNS

       On  success,  GNUTLS_E_SUCCESS  (0) is returned, otherwise a negative error value. Note that verification
       failure will not result to an error code, only  voutput will be updated.

SINCE

       3.3.8

REPORTING BUGS

       Report bugs to <bugs@gnutls.org>.
       Home page: http://www.gnutls.org

COPYRIGHT

       Copyright © 2001-2021 Free Software Foundation, Inc., and others.
       Copying and distribution of this file, with or without modification, are permitted in any medium  without
       royalty provided the copyright notice and this notice are preserved.

SEE ALSO

       The  full  documentation  for  gnutls  is  maintained as a Texinfo manual.  If the /usr/share/doc/gnutls/
       directory does not contain the HTML form visit

       http://www.gnutls.org/manual/

gnutls                                               3.4.10                gnutls_x509_trust_list_verify_crt2(3)