.\"     Title: ne_ssl_set_verify
.\"    Author: 
.\" Generator: DocBook XSL Stylesheets v1.73.2 <http://docbook.sf.net/>
.\"      Date: 20 August 2008
.\"    Manual: neon API reference
.\"    Source: neon 0.28.3
.\"
.TH "NE_SSL_SET_VERIFY" "3" "20 August 2008" "neon 0.28.3" "neon API reference"
.\" disable hyphenation
.nh
.\" disable justification (adjust text to left margin only)
.ad l
.SH "NAME"
ne_ssl_set_verify - register an SSL certificate verification callback
.SH "SYNOPSIS"
.sp
.ft B
.nf
#include <ne_session\.h>
.fi
.ft
.sp
.HP 29
.BI "typedef int ne_ssl_verify_fn(void\ *" "userdata" ", int\ " "failures" ", const\ ne_ssl_certificate\ *" "cert" ");"
.HP 23
.BI "void ne_ssl_set_verify(ne_session\ *" "session" ", ne_ssl_verify_fn\ " "verify_fn" ", void\ *" "userdata" ");"
.SH "DESCRIPTION"
.PP
To enable manual SSL certificate verification, a callback can be registered using
\fBne_ssl_set_verify\fR\. If such a callback is not registered, when a connection is established to an SSL server which does not present a certificate signed by a trusted CA (see
ne_ssl_trust_cert), or if the certificate presented is invalid in some way, the connection will fail\.
.PP
When the callback is invoked, the
\fIfailures\fR
parameter gives a bitmask indicating in what way the automatic certificate verification failed\. The value is equal to the bit\-wise OR of one or more of the following constants (and is guaranteed to be non\-zero):
.PP
\fBNE_SSL_NOTYETVALID\fR
.RS 4
The certificate is not yet valid\.
.RE
.PP
\fBNE_SSL_EXPIRED\fR
.RS 4
The certificate has expired\.
.RE
.PP
\fBNE_SSL_IDMISMATCH\fR
.RS 4
The hostname used for the session does not match the hostname to which the certificate was issued\.
.RE
.PP
\fBNE_SSL_UNTRUSTED\fR
.RS 4
The Certificate Authority which signed the certificate is not trusted\.
.RE
.PP
Note that if either of the
\fBNE_SSL_IDMISMATCH\fR
or
\fBNE_SSL_UNTRUSTED\fR
failures is given, the connection may have been intercepted by a third party, and must not be presumed to be
\(lqsecure\(rq\.
.PP
The
\fIcert\fR
parameter passed to the callback represents the certificate which was presented by the server\. If the server presented a chain of certificates, the chain can be accessed using
ne_ssl_cert_signedby\. The
\fIcert\fR
object given is not valid after the callback returns\.
.SH "RETURN VALUE"
.PP
The verification callback must return zero to indicate that the certificate should be trusted; and non\-zero otherwise (in which case, the connection will fail)\.
.SH "EXAMPLES"
.PP
The following code implements an example verification callback, using the
\fBdump_cert\fR
function from
ne_ssl_cert_subject
to display certification information\. Notice that the hostname of the server used for the session is passed as the
\fIuserdata\fR
parameter to the callback\.
.sp
.RS 4
.nf
static int
my_verify(void *userdata, int failures, const ne_ssl_certificate *cert)
{
  const char *hostname = userdata;

  dump_cert(cert);

  puts("Certificate verification failed \- the connection may have been "
       "intercepted by a third party!");

  if (failures & NE_SSL_IDMISMATCH) { 
    const char *id = ne_ssl_cert_identity(cert);
    if (id) 
      printf("Server certificate was issued to \'%s\' not \'%s\'\.\en",
             id, hostname);
    else
      printf("The certificate was not issued for \'%s\'\en", hostname);
  }

  if (failures & NE_SSL_UNTRUSTED)
    puts("The certificate is not signed by a trusted Certificate Authority\.");

  /* \.\.\. check for validity failures \.\.\. */

  if (prompt_user())
    return 1; /* fail verification */
  else
    return 0; /* trust the certificate anyway */
}

int
main(\.\.\.)
{
  ne_session *sess = ne_session_create("https", "some\.host\.name", 443);
  ne_ssl_set_verify(sess, my_verify, "some\.host\.name");
  \.\.\.
}
.fi
.RE
.SH "SEE ALSO"
.PP
ne_ssl_trust_cert,
ne_ssl_readable_dname,
ne_ssl_cert_subject
.SH "AUTHOR"
.PP
\fBJoe Orton\fR <\&neon@lists.manyfish.co.uk\&>
.sp -1n
.IP "" 4
Author.
.SH "COPYRIGHT"
