mbedTLS + 0/1 examples
SourceVu will show references to mbedtls_x509_crt_verify() from the following samples and libraries:
 
Symbols
loading...
Files
loading...
SummarySyntaxArgumentsRelatedExamplesReferencesCall TreeData Use

Return value

\c 0 if the chain is valid with respect to the passed CN, CAs, CRLs and security profile. #MBEDTLS_ERR_X509_CERT_VERIFY_FAILED in case the certificate chain verification failed. In this case, \c *flags will have one or more \c MBEDTLS_X509_BADCERT_XXX or \c MBEDTLS_X509_BADCRL_XXX flags set. Another negative error code in case of a fatal error encountered during the verification process.

Notes

In case verification failed, the results can be displayed using \c mbedtls_x509_crt_verify_info() Same as \c mbedtls_x509_crt_verify_with_profile() with the default security profile. It is your responsibility to provide up-to-date CRLs for all trusted CAs. If no CRL is provided for the CA that was used to sign the certificate, CRL verification is skipped silently, that is *without* setting any flag. The \c trust_ca list can contain two types of certificates: (1) those of trusted root CAs, so that certificates chaining up to those CAs will be trusted, and (2) self-signed end-entity certificates to be trusted (for specific peers you know) - in that case, the self-signed certificate doesn't need to have the CA bit set.

References

from 0/1 examples