xref: /freebsd/secure/lib/libcrypto/man/man3/SSL_CTX_add_extra_chain_cert.3 (revision d4033e6d37747f5213bb245c8e605406703a8766)
-*- mode: troff; coding: utf-8 -*-
Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45)

Standard preamble:
========================================================================
..
..
.. \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
. ds C` "" . ds C' "" 'br\} . ds C` . ds C' 'br\}
Escape single quotes in literal strings from groff's Unicode transform.

If the F register is >0, we'll generate index entries on stderr for
titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
entries marked with X<> in POD. Of course, you'll have to process the
output yourself in some meaningful fashion.

Avoid warning from groff about undefined register 'F'.
.. .nr rF 0 . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF ========================================================================

Title "SSL_CTX_ADD_EXTRA_CHAIN_CERT 3ossl"
SSL_CTX_ADD_EXTRA_CHAIN_CERT 3ossl 2025-09-30 3.5.4 OpenSSL
For nroff, turn off justification. Always turn off hyphenation; it makes
way too many mistakes in technical documents.
NAME
SSL_CTX_add_extra_chain_cert, SSL_CTX_get_extra_chain_certs, SSL_CTX_get_extra_chain_certs_only, SSL_CTX_clear_extra_chain_certs \- add, get or clear extra chain certificates
SYNOPSIS
Header "SYNOPSIS" .Vb 1 #include <openssl/ssl.h> \& long SSL_CTX_add_extra_chain_cert(SSL_CTX *ctx, X509 *x509); long SSL_CTX_get_extra_chain_certs(SSL_CTX *ctx, STACK_OF(X509) **sk); long SSL_CTX_get_extra_chain_certs_only(SSL_CTX *ctx, STACK_OF(X509) **sk); long SSL_CTX_clear_extra_chain_certs(SSL_CTX *ctx); .Ve
DESCRIPTION
Header "DESCRIPTION" \fBSSL_CTX_add_extra_chain_cert() adds the certificate x509 to the extra chain certificates associated with ctx. Several certificates can be added one after another.

\fBSSL_CTX_get_extra_chain_certs() retrieves the extra chain certificates associated with ctx, or the chain associated with the current certificate of ctx if the extra chain is empty. The returned stack should not be freed by the caller.

\fBSSL_CTX_get_extra_chain_certs_only() retrieves the extra chain certificates associated with ctx. The returned stack should not be freed by the caller.

\fBSSL_CTX_clear_extra_chain_certs() clears all extra chain certificates associated with ctx.

These functions are implemented as macros.

NOTES
Header "NOTES" When sending a certificate chain, extra chain certificates are sent in order following the end entity certificate.

If no chain is specified, the library will try to complete the chain from the available CA certificates in the trusted CA storage, see \fBSSL_CTX_load_verify_locations\|(3).

The x509 certificate provided to SSL_CTX_add_extra_chain_cert() will be freed by the library when the SSL_CTX is destroyed. An application \fBshould not free the x509 object.

RESTRICTIONS
Header "RESTRICTIONS" Only one set of extra chain certificates can be specified per SSL_CTX structure. Different chains for different certificates (for example if both RSA and DSA certificates are specified by the same server) or different SSL structures with the same parent SSL_CTX cannot be specified using this function. For more flexibility functions such as SSL_add1_chain_cert() should be used instead.
"RETURN VALUES"
Header "RETURN VALUES" \fBSSL_CTX_add_extra_chain_cert() and SSL_CTX_clear_extra_chain_certs() return 1 on success and 0 for failure. Check out the error stack to find out the reason for failure.
"SEE ALSO"
Header "SEE ALSO" \fBssl\|(7), \fBSSL_CTX_use_certificate\|(3), \fBSSL_CTX_set_client_cert_cb\|(3), \fBSSL_CTX_load_verify_locations\|(3) \fBSSL_CTX_set0_chain\|(3) \fBSSL_CTX_set1_chain\|(3) \fBSSL_CTX_add0_chain_cert\|(3) \fBSSL_CTX_add1_chain_cert\|(3) \fBSSL_set0_chain\|(3) \fBSSL_set1_chain\|(3) \fBSSL_add0_chain_cert\|(3) \fBSSL_add1_chain_cert\|(3) \fBSSL_CTX_build_cert_chain\|(3) \fBSSL_build_cert_chain\|(3)
COPYRIGHT
Header "COPYRIGHT" Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.

Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.