Lines Matching full:certificate
24 In addition to the key, a certificate describing the server in human readable tokens
25 is also needed. This certificate will be attested with our aforementioned key. In this way,
26 we obtain a self-signed certificate, valid for one year.
33 To avoid unnecessary error messages in the browser, the certificate needs to
36 called @emph{Certificate Authority}, or @emph{CA}, to attest the certificate for you. This way,
39 Whether the server's certificate is signed by us or a third party, once it has been accepted
62 printf ("The key/certificate files could not be read.\n");
119 certificate or the client obtains the key over secure means. Anyway, the clients have to be aware (or configured)
167 You can then extract the client certificate:
171 * Get the client's certificate
174 * @return NULL if no valid client certificate could be found, a pointer
175 * to the certificate if found
196 "Failed to retrieve client certificate chain\n");
202 "Failed to initialize client certificate\n");
212 "Failed to import client certificate\n");
220 Using the client certificate, you can then get the client's distinguished name
225 * Get the distinguished name from the client's certificate
227 * @param client_cert the client certificate
228 * @return NULL if no dn or certificate could be found, a pointer
243 "Failed to allocate memory for certificate dn\n");
252 * Get the alternative name of specified type from the client's certificate
254 * @param client_cert the client certificate
291 "Failed to allocate memory for certificate alt name\n");
312 certificate:
326 and certificate. For example, when you start the MHD daemon, you could
336 implement to retrieve the X.509 certificate for an incoming connection.
345 is only used in X.509 certificates. Contains a list with the CA names that the server considers trusted. Normally we should send a certificate that is signed by one of these CAs. These names are DER encoded. To get a more meaningful value use the function @code{gnutls_x509_rdn_get()}.
348 contains a list with server?s acceptable signature algorithms. The certificate returned should support the server?s given algorithms.
351 should contain a single certificate and public or a list of them.
403 "Need certificate for %.*s\n",
409 "Returning certificate for %.*s\n",
445 "*** Error loading certificate file %s.\n",
455 "*** Error loading certificate file: %s\n",