When flags are zero this function returns non-zero if a valid
OCSP status response was included in the TLS handshake. That is,
an OCSP status response which is not too old, superseded or marks
the certificate as revoked. It returns zero otherwise.
When the flag GNUTLS_OCSP_SR_IS_AVAIL is specified, the function
returns non-zero if an OCSP status response was included in the
handshake even if it was invalid. Otherwise, if no OCSP status
response was included, it returns zero. The
GNUTLS_OCSP_SR_IS_AVAIL flag was introduced in GnuTLS 3.4.0.
This is a helper function when needing to decide whether to
perform an explicit OCSP validity check on the peer's
certificate. Should be called after any of
gnutls_certificate_verify_peers*() are called.
This function is always usable on client side, but on server side
only under TLS 1.3, which is the first version of TLS that allows
cliend-side OCSP responses.
This page is part of the GnuTLS (GnuTLS Transport Layer Security
Library) project. Information about the project can be found at
⟨http://www.gnutls.org/⟩. If you have a bug report for this
manual page, send it to email@example.com. This page was obtained
from the tarball gnutls-3.7.2.tar.xz fetched from
⟨http://www.gnutls.org/download.html⟩ on 2021-08-27. If you
discover any rendering problems in this HTML version of the page,
or you believe there is a better or more up-to-date source for
the page, or you have corrections or improvements to the
information in this COLOPHON (which is not part of the original
manual page), send a mail to firstname.lastname@example.org