Automatically generated by Pod::Man v6.0.2 (Pod::Simple 3.45)
Standard preamble:
========================================================================
..
.... \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
. ds C` "" . ds C' "" 'br\} . ds C` . ds C' 'br\}
Escape single quotes in literal strings from groff's Unicode transform.
If the F register is >0, we'll generate index entries on stderr for
titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
entries marked with X<> in POD. Of course, you'll have to process the
output yourself in some meaningful fashion.
Avoid warning from groff about undefined register 'F'.
.. .nr rF 0 . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF
Required to disable full justification in groff 1.23.0.
========================================================================
Title "X509_STORE_SET_VERIFY_CB_FUNC 3ossl"
way too many mistakes in technical documents.
\fBX509_STORE_set_verify() sets the final chain verification function for \fIxs to verify. Its purpose is to go through the chain of certificates and check that all signatures are valid and that the current time is within the limits of each certificate\*(Aqs first and last validity time. The final chain verification functions must return 0 on failure and 1 on success. \fIIf no chain verification function is provided, the internal default function will be used instead.
\fBX509_STORE_CTX_get1_issuer() tries to find a certificate from the store component of ctx that has a subject name matching the issuer name of x and is accepted by the check_issued function in ctx. On success it assigns to *issuer the first match that has a suitable validity period or otherwise has the latest expiration date of all matching certificates. If the function returns 1 the caller is responsible for freeing *issuer. Note that this search does not support backtracking.
\fBX509_STORE_set_get_issuer() sets the function get_issuer that is used to get the "best" candidate issuer certificate of the given certificate x. When such a certificate is found, get_issuer must up-ref and assign it to *issuer and then return 1. Otherwise get_issuer must return 0 if not found and -1 (or 0) on failure. If X509_STORE_set_get_issuer() is not used or get_issuer is NULL then X509_STORE_CTX_get1_issuer() is used as the default implementation.
\fBX509_STORE_set_check_issued() sets the function to check that a given certificate x is issued by the issuer certificate issuer. This function must return 0 on failure (among others if x hasn\*(Aqt been issued with issuer) and 1 on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_check_revocation() sets the revocation checking function. Its purpose is to look through the final chain and check the revocation status for each certificate. It must return 0 on failure and 1 on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_get_crl() sets the function to get the crl for a given certificate x. When found, the crl must be assigned to *crl. This function must return 0 on failure and 1 on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_check_crl() sets the function to check the validity of the given crl. This function must return 0 on failure and 1 on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_cert_crl() sets the function to check the revocation status of the given certificate x against the given crl. This function must return 0 on failure and 1 on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_check_policy() sets the function to check the policies of all the certificates in the final chain.. This function must return 0 on failure and 1 on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_lookup_certs() and X509_STORE_set_lookup_crls() set the functions to look up all the certs or all the CRLs that match the given name nm. These functions return NULL on failure and a pointer to a stack of certificates (X509) or to a stack of CRLs (X509_CRL) on success. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_set_cleanup() sets the final cleanup function, which is called when the context (X509_STORE_CTX) is being torn down. This function doesn\*(Aqt return any value. \fIIf no function to get the issuer is provided, the internal default function will be used instead.
\fBX509_STORE_get_verify_cb(), X509_STORE_CTX_get_verify(), \fBX509_STORE_get_get_issuer(), X509_STORE_get_check_issued(), \fBX509_STORE_get_check_revocation(), X509_STORE_get_get_crl(), \fBX509_STORE_get_check_crl(), X509_STORE_set_verify(), \fBX509_STORE_set_get_issuer(), X509_STORE_get_cert_crl(), \fBX509_STORE_get_check_policy(), X509_STORE_get_lookup_certs(), \fBX509_STORE_get_lookup_crls() and X509_STORE_get_cleanup() all return the function pointer assigned with X509_STORE_set_check_issued(), \fBX509_STORE_set_check_revocation(), X509_STORE_set_get_crl(), \fBX509_STORE_set_check_crl(), X509_STORE_set_cert_crl(), \fBX509_STORE_set_check_policy(), X509_STORE_set_lookup_certs(), \fBX509_STORE_set_lookup_crls() and X509_STORE_set_cleanup(), or NULL if no assignment has been made.
\fBX509_STORE_set_verify_cb_func(), X509_STORE_set_verify_func() and \fBX509_STORE_set_lookup_crls_cb() are aliases for \fBX509_STORE_set_verify_cb(), X509_STORE_set_verify() and X509_STORE_set_lookup_crls, available as macros for backward compatibility.
The X509_STORE_get_*() functions return a pointer of the appropriate function type.
\fBX509_STORE_CTX_get1_issuer() returns 1 if a suitable certificate is found, 0 if not found, -1 on other error.
The functions \fBX509_STORE_set_verify_cb(), X509_STORE_get_verify_cb(), \fBX509_STORE_set_verify(), X509_STORE_CTX_get_verify(), \fBX509_STORE_set_get_issuer(), X509_STORE_get_get_issuer(), \fBX509_STORE_set_check_issued(), X509_STORE_get_check_issued(), \fBX509_STORE_set_check_revocation(), X509_STORE_get_check_revocation(), \fBX509_STORE_set_get_crl(), X509_STORE_get_get_crl(), \fBX509_STORE_set_check_crl(), X509_STORE_get_check_crl(), \fBX509_STORE_set_cert_crl(), X509_STORE_get_cert_crl(), \fBX509_STORE_set_check_policy(), X509_STORE_get_check_policy(), \fBX509_STORE_set_lookup_certs(), X509_STORE_get_lookup_certs(), \fBX509_STORE_set_lookup_crls(), X509_STORE_get_lookup_crls(), \fBX509_STORE_set_cleanup() and X509_STORE_get_cleanup() were added in OpenSSL 1.1.0.
Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.