-*- mode: troff; coding: utf-8 -*- Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45) Standard preamble: ========================================================================..
..
..
\*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.. ds C` ""
. ds C' ""
'br\}
. ds C`
. ds C'
'br\}
Escape single quotes in literal strings from groff's Unicode transform. If the F register is >0, we'll generate index entries on stderr for titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index entries marked with X<> in POD. Of course, you'll have to process the output yourself in some meaningful fashion. Avoid warning from groff about undefined register 'F'...
.nr rF 0
. if \nF \{\
. de IX
. tm Index:\\$1\t\\n%\t"\\$2"
..
. if !\nF==2 \{\
. nr % 0
. nr F 2
. \}
. \}
.\}
.rr rF
======================================================================== Title "SSL_CTX_ADD_EXTRA_CHAIN_CERT 3ossl" SSL_CTX_ADD_EXTRA_CHAIN_CERT 3ossl 2025-09-30 3.5.4 OpenSSL
For nroff, turn off justification. Always turn off hyphenation; it makes way too many mistakes in technical documents. NAME
SSL_CTX_add_extra_chain_cert,
SSL_CTX_get_extra_chain_certs,
SSL_CTX_get_extra_chain_certs_only,
SSL_CTX_clear_extra_chain_certs
\- add, get or clear extra chain certificates
SYNOPSIS
Header "SYNOPSIS" .Vb 1
#include <
openssl/
ssl.h>
\&
long SSL_CTX_add_extra_chain_cert(SSL_CTX *ctx, X509 *x509);
long SSL_CTX_get_extra_chain_certs(SSL_CTX *ctx, STACK_OF(X509) **sk);
long SSL_CTX_get_extra_chain_certs_only(SSL_CTX *ctx, STACK_OF(X509) **sk);
long SSL_CTX_clear_extra_chain_certs(SSL_CTX *ctx);
.Ve
DESCRIPTION
Header "DESCRIPTION" \fBSSL_CTX_add_extra_chain_cert() adds the certificate
x509 to the extra chain
certificates associated with
ctx. Several certificates can be added one
after another.
\fBSSL_CTX_get_extra_chain_certs() retrieves the extra chain certificates
associated with ctx, or the chain associated with the current certificate
of ctx if the extra chain is empty.
The returned stack should not be freed by the caller.
\fBSSL_CTX_get_extra_chain_certs_only() retrieves the extra chain certificates
associated with ctx.
The returned stack should not be freed by the caller.
\fBSSL_CTX_clear_extra_chain_certs() clears all extra chain certificates
associated with ctx.
These functions are implemented as macros.
NOTES
Header "NOTES" When sending a certificate chain, extra chain certificates are sent in order
following the end entity certificate.
If no chain is specified, the library will try to complete the chain from the
available CA certificates in the trusted CA storage, see
\fBSSL_CTX_load_verify_locations\|(3).
The x509 certificate provided to SSL_CTX_add_extra_chain_cert() will be
freed by the library when the SSL_CTX is destroyed. An application
\fBshould not free the x509 object.
RESTRICTIONS
Header "RESTRICTIONS" Only one set of extra chain certificates can be specified per SSL_CTX
structure. Different chains for different certificates (for example if both
RSA and DSA certificates are specified by the same server) or different SSL
structures with the same parent SSL_CTX cannot be specified using this
function. For more flexibility functions such as
SSL_add1_chain_cert() should
be used instead.
"RETURN VALUES"
Header "RETURN VALUES" \fBSSL_CTX_add_extra_chain_cert() and
SSL_CTX_clear_extra_chain_certs() return
1 on success and 0 for failure. Check out the error stack to find out the
reason for failure.
"SEE ALSO"
Header "SEE ALSO" \fBssl\|(7),
\fBSSL_CTX_use_certificate\|(3),
\fBSSL_CTX_set_client_cert_cb\|(3),
\fBSSL_CTX_load_verify_locations\|(3)
\fBSSL_CTX_set0_chain\|(3)
\fBSSL_CTX_set1_chain\|(3)
\fBSSL_CTX_add0_chain_cert\|(3)
\fBSSL_CTX_add1_chain_cert\|(3)
\fBSSL_set0_chain\|(3)
\fBSSL_set1_chain\|(3)
\fBSSL_add0_chain_cert\|(3)
\fBSSL_add1_chain_cert\|(3)
\fBSSL_CTX_build_cert_chain\|(3)
\fBSSL_build_cert_chain\|(3)
COPYRIGHT
Header "COPYRIGHT" Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the Apache License 2.0 (the "License"). You may not use
this file except in compliance with the License. You can obtain a copy
in the file LICENSE in the source distribution or at
<https://www.openssl.org/source/license.html>.