SSL_set1_host.3ossl 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "SSL_SET1_HOST 3ossl"
  136. .TH SSL_SET1_HOST 3ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. SSL_set1_host, SSL_add1_host, SSL_set_hostflags, SSL_get0_peername \-
  143. SSL server verification parameters
  144. .SH "SYNOPSIS"
  145. .IX Header "SYNOPSIS"
  146. .Vb 1
  147. \& #include <openssl/ssl.h>
  148. \&
  149. \& int SSL_set1_host(SSL *s, const char *hostname);
  150. \& int SSL_add1_host(SSL *s, const char *hostname);
  151. \& void SSL_set_hostflags(SSL *s, unsigned int flags);
  152. \& const char *SSL_get0_peername(SSL *s);
  153. .Ve
  154. .SH "DESCRIPTION"
  155. .IX Header "DESCRIPTION"
  156. These functions configure server hostname checks in the \s-1SSL\s0 client.
  157. .PP
  158. \&\fBSSL_set1_host()\fR sets the expected \s-1DNS\s0 hostname to \fBname\fR clearing
  159. any previously specified hostname. If \fBname\fR is \s-1NULL\s0
  160. or the empty string, the list of hostnames is cleared and name
  161. checks are not performed on the peer certificate. When a nonempty
  162. \&\fBname\fR is specified, certificate verification automatically checks
  163. the peer hostname via \fBX509_check_host\fR\|(3) with \fBflags\fR as specified
  164. via \fBSSL_set_hostflags()\fR. Clients that enable \s-1DANE TLSA\s0 authentication
  165. via \fBSSL_dane_enable\fR\|(3) should leave it to that function to set
  166. the primary reference identifier of the peer, and should not call
  167. \&\fBSSL_set1_host()\fR.
  168. .PP
  169. \&\fBSSL_add1_host()\fR adds \fBname\fR as an additional reference identifier
  170. that can match the peer's certificate. Any previous names set via
  171. \&\fBSSL_set1_host()\fR or \fBSSL_add1_host()\fR are retained, no change is made
  172. if \fBname\fR is \s-1NULL\s0 or empty. When multiple names are configured,
  173. the peer is considered verified when any name matches. This function
  174. is required for \s-1DANE TLSA\s0 in the presence of service name indirection
  175. via \s-1CNAME, MX\s0 or \s-1SRV\s0 records as specified in \s-1RFC7671, RFC7672\s0 or
  176. \&\s-1RFC7673.\s0
  177. .PP
  178. \&\fBSSL_set_hostflags()\fR sets the \fBflags\fR that will be passed to
  179. \&\fBX509_check_host\fR\|(3) when name checks are applicable, by default
  180. the \fBflags\fR value is 0. See \fBX509_check_host\fR\|(3) for the list
  181. of available flags and their meaning.
  182. .PP
  183. \&\fBSSL_get0_peername()\fR returns the \s-1DNS\s0 hostname or subject CommonName
  184. from the peer certificate that matched one of the reference
  185. identifiers. When wildcard matching is not disabled, the name
  186. matched in the peer certificate may be a wildcard name. When one
  187. of the reference identifiers configured via \fBSSL_set1_host()\fR or
  188. \&\fBSSL_add1_host()\fR starts with \*(L".\*(R", which indicates a parent domain prefix
  189. rather than a fixed name, the matched peer name may be a sub-domain
  190. of the reference identifier. The returned string is allocated by
  191. the library and is no longer valid once the associated \fBssl\fR handle
  192. is cleared or freed, or a renegotiation takes place. Applications
  193. must not free the return value.
  194. .PP
  195. \&\s-1SSL\s0 clients are advised to use these functions in preference to
  196. explicitly calling \fBX509_check_host\fR\|(3). Hostname checks may be out
  197. of scope with the \s-1RFC7671 \fBDANE\-EE\s0\fR\|(3) certificate usage, and the
  198. internal check will be suppressed as appropriate when \s-1DANE\s0 is
  199. enabled.
  200. .SH "RETURN VALUES"
  201. .IX Header "RETURN VALUES"
  202. \&\fBSSL_set1_host()\fR and \fBSSL_add1_host()\fR return 1 for success and 0 for
  203. failure.
  204. .PP
  205. \&\fBSSL_get0_peername()\fR returns \s-1NULL\s0 if peername verification is not
  206. applicable (as with \s-1RFC7671 \fBDANE\-EE\s0\fR\|(3)), or no trusted peername was
  207. matched. Otherwise, it returns the matched peername. To determine
  208. whether verification succeeded call \fBSSL_get_verify_result\fR\|(3).
  209. .SH "EXAMPLES"
  210. .IX Header "EXAMPLES"
  211. Suppose \*(L"smtp.example.com\*(R" is the \s-1MX\s0 host of the domain \*(L"example.com\*(R".
  212. The calls below will arrange to match either the \s-1MX\s0 hostname or the
  213. destination domain name in the \s-1SMTP\s0 server certificate. Wildcards
  214. are supported, but must match the entire label. The actual name
  215. matched in the certificate (which might be a wildcard) is retrieved,
  216. and must be copied by the application if it is to be retained beyond
  217. the lifetime of the \s-1SSL\s0 connection.
  218. .PP
  219. .Vb 5
  220. \& SSL_set_hostflags(ssl, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
  221. \& if (!SSL_set1_host(ssl, "smtp.example.com"))
  222. \& /* error */
  223. \& if (!SSL_add1_host(ssl, "example.com"))
  224. \& /* error */
  225. \&
  226. \& /* XXX: Perform SSL_connect() handshake and handle errors here */
  227. \&
  228. \& if (SSL_get_verify_result(ssl) == X509_V_OK) {
  229. \& const char *peername = SSL_get0_peername(ssl);
  230. \&
  231. \& if (peername != NULL)
  232. \& /* Name checks were in scope and matched the peername */
  233. \& }
  234. .Ve
  235. .SH "SEE ALSO"
  236. .IX Header "SEE ALSO"
  237. \&\fBssl\fR\|(7),
  238. \&\fBX509_check_host\fR\|(3),
  239. \&\fBSSL_get_verify_result\fR\|(3).
  240. \&\fBSSL_dane_enable\fR\|(3).
  241. .SH "HISTORY"
  242. .IX Header "HISTORY"
  243. These functions were added in OpenSSL 1.1.0.
  244. .SH "COPYRIGHT"
  245. .IX Header "COPYRIGHT"
  246. Copyright 2016\-2020 The OpenSSL Project Authors. All Rights Reserved.
  247. .PP
  248. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  249. this file except in compliance with the License. You can obtain a copy
  250. in the file \s-1LICENSE\s0 in the source distribution or at
  251. <https://www.openssl.org/source/license.html>.