You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
52 lines
1.3 KiB
52 lines
1.3 KiB
=pod |
|
|
|
=head1 NAME |
|
|
|
SSL_get_peer_cert_chain - get the X509 certificate chain of the peer |
|
|
|
=head1 SYNOPSIS |
|
|
|
#include <openssl/ssl.h> |
|
|
|
STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *ssl); |
|
|
|
=head1 DESCRIPTION |
|
|
|
SSL_get_peer_cert_chain() returns a pointer to STACK_OF(X509) certificates |
|
forming the certificate chain of the peer. If called on the client side, |
|
the stack also contains the peer's certificate; if called on the server |
|
side, the peer's certificate must be obtained separately using |
|
L<SSL_get_peer_certificate(3)|SSL_get_peer_certificate(3)>. |
|
If the peer did not present a certificate, NULL is returned. |
|
|
|
=head1 NOTES |
|
|
|
The peer certificate chain is not necessarily available after reusing |
|
a session, in which case a NULL pointer is returned. |
|
|
|
The reference count of the STACK_OF(X509) object is not incremented. |
|
If the corresponding session is freed, the pointer must not be used |
|
any longer. |
|
|
|
=head1 RETURN VALUES |
|
|
|
The following return values can occur: |
|
|
|
=over 4 |
|
|
|
=item NULL |
|
|
|
No certificate was presented by the peer or no connection was established |
|
or the certificate chain is no longer available when a session is reused. |
|
|
|
=item Pointer to a STACK_OF(X509) |
|
|
|
The return value points to the certificate chain presented by the peer. |
|
|
|
=back |
|
|
|
=head1 SEE ALSO |
|
|
|
L<ssl(3)|ssl(3)>, L<SSL_get_peer_certificate(3)|SSL_get_peer_certificate(3)> |
|
|
|
=cut
|
|
|