NAME | SYNOPSIS | ARGUMENTS | DESCRIPTION | RETURNS | REPORTING BUGS | COPYRIGHT | SEE ALSO | COLOPHON
gnutls_reauth(3) gnutls gnutls_reauth(3)
gnutls_reauth - API function
#include <gnutls/gnutls.h> int gnutls_reauth(gnutls_session_t session, unsigned int flags);
gnutls_session_t session is a gnutls_session_t type. unsigned int flags must be zero
This function performs the post-handshake authentication for TLS 1.3. The post-handshake authentication is initiated by the server by calling this function. Clients respond when GNUTLS_E_REAUTH_REQUEST has been seen while receiving data. The non-fatal errors expected by this function are: GNUTLS_E_INTERRUPTED, GNUTLS_E_AGAIN, as well as GNUTLS_E_GOT_APPLICATION_DATA when called on server side. The former two interrupt the authentication procedure due to the transport layer being interrupted, and the latter because there were pending data prior to peer initiating the re-authentication. The server should read/process that data as unauthenticated and retry calling gnutls_reauth(). When this function is called under TLS1.2 or earlier or the peer didn't advertise post-handshake auth, it always fails with GNUTLS_E_INVALID_REQUEST. The verification of the received peers certificate is delegated to the session or credentials verification callbacks. A server can check whether post handshake authentication is supported by the client by checking the session flags with gnutls_session_get_flags(). Prior to calling this function in server side, the function gnutls_certificate_server_set_request() must be called setting expectations for the received certificate (request or require). If none are set this function will return with GNUTLS_E_INVALID_REQUEST. Note that post handshake authentication is available irrespective of the initial negotiation type (PSK or certificate). In all cases however, certificate credentials must be set to the session prior to calling this function.
GNUTLS_E_SUCCESS on a successful authentication, otherwise a negative error code.
Report bugs to <email@example.com>. Home page: https://www.gnutls.org
Copyright © 2001- Free Software Foundation, Inc., and others. Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved.
The full documentation for gnutls is maintained as a Texinfo manual. If the /usr/share/doc/gnutls/ directory does not contain the HTML form visit https://www.gnutls.org/manual/
This page is part of the GnuTLS (GnuTLS Transport Layer Security Library) project. Information about the project can be found at ⟨http://www.gnutls.org/⟩. If you have a bug report for this manual page, send it to firstname.lastname@example.org. This page was obtained from the tarball gnutls-3.7.8.tar.xz fetched from ⟨http://www.gnutls.org/download.html⟩ on 2022-12-17. If you discover any rendering problems in this HTML version of the page, or you believe there is a better or more up-to-date source for the page, or you have corrections or improvements to the information in this COLOPHON (which is not part of the original manual page), send a mail to email@example.com gnutls 3.7.8 gnutls_reauth(3)