OpenSSL SSL_CTX_set_cert_store(3openssl)
NNNNAAAAMMMMEEEESSL_CTX_set_cert_store, SSL_CTX_get_cert_store - manipulate
X509 certificate verification storage SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS#include
void SSL_CTX_set_cert_store(SSL_CTX *ctx, X509_STORE *store);
X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *ctx);
DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNNSSL_CTX_set_cert_store() sets/replaces the certificate
verification storage of ccccttttxxxx to/with ssssttttoooorrrreeee. If anotherX509_STORE object is currently set in ccccttttxxxx, it will be
X509_STORE_free()ed.
SSL_CTX_get_cert_store() returns a pointer to the current
certificate verification storage. NNNNOOOOTTTTEEEESSSS In order to verify the certificates presented by the peer, trusted CA certificates must be accessed. These CA certificates are made available via lookup methods, handledinside the X509_STORE. From the X509_STORE the
X509_STORE_CTX used when verifying certificates is created.
Typically the trusted certificate store is handledindirectly via using SSL_CTX_load_verify_locations(3).
Using the SSL_CTX_set_cert_store() and
SSL_CTX_get_cert_store() functions it is possible to
manipulate the X509_STORE object beyond the
SSL_CTX_load_verify_locations(3) call.
Currently no detailed documentation on how to use theX509_STORE object is available. Not all members of the
X509_STORE are used when the verification takes place. So
will e.g. the verify_callback() be overridden with the
verify_callback() set via the SSL_CTX_set_verify(3) family
of functions. This document must therefore be updated whendocumentation about the X509_STORE object and its handling
becomes available. RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEESSSSSSL_CTX_set_cert_store() does not return diagnostic output.
SSL_CTX_get_cert_store() returns the current setting.
SSSSEEEEEEEE AAAALLLLSSSSOOOOssl(3), SSL_CTX_load_verify_locations(3),
SSL_CTX_set_verify(3)
30/Mar/2005 Last change: 0.9.8o 1
OpenSSL SSL_CTX_set_cert_store(3openssl)
30/Mar/2005 Last change: 0.9.8o 2