neon API reference NE_SSL_SET_VERIFY(3)
NAME
ne_ssl_set_verify - register an SSL certificate verification
callbackSYNOPSIS
#include
typedef int ne_ssl_verify_fn(void *userdata, int failures,
const ne_ssl_certificate *cert
void ne_ssl_set_verify(ne_session *session,
ne_ssl_verify_fn verify_fn,
void *userdataDESCRIPTION
To enable manual SSL certificate verification, a callbackcan be registered using ne_ssl_set_verify. If such a
callback is not registered, when a connection is established to an SSL server which does not present a certificate signedby a trusted CA (see ne_ssl_trust_cert), or if the
certificate presented is invalid in some way, the connection will fail. When the callback is invoked, the failures parameter gives a bitmask indicating in what way the automatic certificateverification failed. The value is equal to the bit-wise OR
of one or more of the following constants (and is guaranteedto be non-zero):
NE_SSL_NOTYETVALID
The certificate is not yet valid.NE_SSL_EXPIRED
The certificate has expired.NE_SSL_IDMISMATCH
The hostname used for the session does not match the hostname to which the certificate was issued.NE_SSL_UNTRUSTED
The Certificate Authority which signed the certificate is not trusted.Note that if either of the NE_SSL_IDMISMATCH or
NE_SSL_UNTRUSTED failures is given, the connection may have
been intercepted by a third party, and must not be presumed to be secure. The cert parameter passed to the callback represents the certificate which was presented by the server. If the server presented a chain of certificates, the chain can be accessedusing ne_ssl_cert_signedby. The cert object given is not
neon 0.29.0 Last change: 13 September 2009 1neon API reference NE_SSL_SET_VERIFY(3)
valid after the callback returns. RETURN VALUE The verification callback must return zero to indicate thatthe certificate should be trusted; and non-zero otherwise
(in which case, the connection will fail).EXAMPLES
The following code implements an example verificationcallback, using the dump_cert function from
ne_ssl_cert_subject to display certification information.
Notice that the hostname of the server used for the session is passed as the userdata parameter to the callback. static intmy_verify(void *userdata, int failures, const ne_ssl_certificate *cert)
{ const char *hostname = userdata;dump_cert(cert);
puts("Certificate verification failed - the connection may have been "
"intercepted by a third party!");if (failures & NE_SSL_IDMISMATCH) {
const char *id = ne_ssl_cert_identity(cert);
if (id)printf("Server certificate was issued to '%s' not '%s'.\n",
id, hostname); elseprintf("The certificate was not issued for '%s'\n", hostname);
}if (failures & NE_SSL_UNTRUSTED)
puts("The certificate is not signed by a trusted Certificate Authority."); /* ... check for validity failures ... */if (prompt_user())
return 1; /* fail verification */ else return 0; /* trust the certificate anyway */ } int main(...) {ne_session *sess = ne_session_create("https", "some.host.name", 443);
ne_ssl_set_verify(sess, my_verify, "some.host.name");
... } neon 0.29.0 Last change: 13 September 2009 2neon API reference NE_SSL_SET_VERIFY(3)
SEE ALSO
ne_ssl_trust_cert, ne_ssl_readable_dname,
ne_ssl_cert_subject
AUTHOR Joe OrtonAuthor. COPYRIGHT ATTRIBUTES
See attributes(5) for descriptions of the following attributes:_______________________________________
| ATTRIBUTE TYPE | ATTRIBUTE VALUE|
|____________________|__________________|_
| Availability | library/neon ||____________________|__________________|_
| Interface Stability| Volatile ||____________________|_________________|
NOTES Source for Neon is available on http://opensolaris.org. neon 0.29.0 Last change: 13 September 2009 3