Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45)
Standard preamble:
========================================================================
..
.... \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
. ds C` "" . ds C' "" 'br\} . ds C` . ds C' 'br\}
Escape single quotes in literal strings from groff's Unicode transform.
If the F register is >0, we'll generate index entries on stderr for
titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
entries marked with X<> in POD. Of course, you'll have to process the
output yourself in some meaningful fashion.
Avoid warning from groff about undefined register 'F'.
.. .nr rF 0 . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF ========================================================================
Title "SSL_SET1_HOST 3ossl"
way too many mistakes in technical documents.
\fBSSL_set1_host() sets in the verification parameters of s the expected DNS hostname or IP address to host, clearing any previously specified IP address and hostnames. If host is NULL or the empty string, IP address and hostname checks are not performed on the peer certificate. When a nonempty host is specified, certificate verification automatically checks the peer hostname via X509_check_host\|(3) with flags as specified via SSL_set_hostflags(). Clients that enable DANE TLSA authentication via SSL_dane_enable\|(3) should leave it to that function to set the primary reference identifier of the peer, and should not call \fBSSL_set1_host().
\fBSSL_add1_host() adds host as an additional reference identifier that can match the peer's certificate. Any previous hostnames set via SSL_set1_host() or SSL_add1_host() are retained. Adding an IP address is allowed only if no IP address has been set before. No change is made if host is NULL or empty. When an IP address and/or multiple hostnames are configured, the peer is considered verified when any of these matches. This function is required for DANE TLSA in the presence of service name indirection via CNAME, MX or SRV records as specified in RFCs 7671, 7672, and 7673.
TLS clients are recommended to use SSL_set1_host() or SSL_add1_host() for server hostname or IP address validation, as well as SSL_set_tlsext_host_name\|(3) for Server Name Indication (SNI), which may be crucial also for correct routing of the connection request.
\fBSSL_set_hostflags() sets the flags that will be passed to \fBX509_check_host\|(3) when name checks are applicable, by default the flags value is 0. See X509_check_host\|(3) for the list of available flags and their meaning.
\fBSSL_get0_peername() returns the DNS hostname or subject CommonName from the peer certificate that matched one of the reference identifiers. When wildcard matching is not disabled, the name matched in the peer certificate may be a wildcard name. When one of the reference identifiers configured via SSL_set1_host() or \fBSSL_add1_host() starts with ".", which indicates a parent domain prefix rather than a fixed name, the matched peer name may be a sub-domain of the reference identifier. The returned string is allocated by the library and is no longer valid once the associated ssl handle is cleared or freed, or a renegotiation takes place. Applications must not free the return value.
SSL clients are advised to use these functions in preference to explicitly calling X509_check_host\|(3). Hostname checks may be out of scope with the RFC 7671 DANE-EE\|(3) certificate usage, and the internal check will be suppressed as appropriate when DANE is enabled.
\fBSSL_set_hostflags() returns nothing at all.
\fBSSL_get0_peername() returns NULL if peername verification is not applicable (as with RFC 7671 DANE-EE\|(3)), or no trusted peername was matched. Otherwise, it returns the matched peername. To determine whether verification succeeded call SSL_get_verify_result\|(3).
.Vb 5 SSL_set_hostflags(ssl, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS); if (!SSL_set1_host(ssl, "smtp.example.com")) /* error */ if (!SSL_add1_host(ssl, "example.com")) /* error */ \& /* XXX: Perform SSL_connect() handshake and handle errors here */ \& if (SSL_get_verify_result(ssl) == X509_V_OK) { const char *peername = SSL_get0_peername(ssl); \& if (peername != NULL) /* Name checks were in scope and matched the peername */ } .Ve
Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.