gnutls_reauth(3) — Linux manual page
gnutls_reauth(3) gnutls gnutls_reauth(3)
NAME
gnutls_reauth - API function
SYNOPSIS
#include <gnutls/gnutls.h>
int gnutls_reauth(gnutls_session_t session, unsigned int flags);
ARGUMENTS
gnutls_session_t session
is a gnutls_session_t type.
unsigned int flags
must be zero
DESCRIPTION
This function performs the post-handshake authentication for TLS
1.3. The post-handshake authentication is initiated by the server
by calling this function. Clients respond when
GNUTLS_E_REAUTH_REQUEST has been seen while receiving data.
The non-fatal errors expected by this function are:
GNUTLS_E_INTERRUPTED, GNUTLS_E_AGAIN, as well as
GNUTLS_E_GOT_APPLICATION_DATA when called on server side.
The former two interrupt the authentication procedure due to the
transport layer being interrupted, and the latter because there
were pending data prior to peer initiating the re-authentication.
The server should read/process that data as unauthenticated and
retry calling gnutls_reauth().
When this function is called under TLS1.2 or earlier or the peer
didn't advertise post-handshake auth, it always fails with
GNUTLS_E_INVALID_REQUEST. The verification of the received peers
certificate is delegated to the session or credentials
verification callbacks. A server can check whether post handshake
authentication is supported by the client by checking the session
flags with gnutls_session_get_flags().
Prior to calling this function in server side, the function
gnutls_certificate_server_set_request() must be called setting
expectations for the received certificate (request or require).
If none are set this function will return with
GNUTLS_E_INVALID_REQUEST.
Note that post handshake authentication is available irrespective
of the initial negotiation type (PSK or certificate). In all
cases however, certificate credentials must be set to the session
prior to calling this function.
RETURNS
GNUTLS_E_SUCCESS on a successful authentication, otherwise a
negative error code.
REPORTING BUGS
Report bugs to <bugs@gnutls.org>.
Home page: https://www.gnutls.org
COPYRIGHT
Copyright © 2001-2023 Free Software Foundation, Inc., and others.
Copying and distribution of this file, with or without
modification, are permitted in any medium without royalty
provided the copyright notice and this notice are preserved.
SEE ALSO
The full documentation for gnutls is maintained as a Texinfo
manual. If the /usr/share/doc/gnutls/ directory does not contain
the HTML form visit
https://www.gnutls.org/manual/
COLOPHON
This page is part of the GnuTLS (GnuTLS Transport Layer Security
Library) project. Information about the project can be found at
⟨http://www.gnutls.org/⟩. If you have a bug report for this
manual page, send it to bugs@gnutls.org. This page was obtained
from the tarball gnutls-3.8.5.tar.xz fetched from
⟨http://www.gnutls.org/download.html⟩ on 2024-06-14. If you
discover any rendering problems in this HTML version of the page,
or you believe there is a better or more up-to-date source for
the page, or you have corrections or improvements to the
information in this COLOPHON (which is not part of the original
manual page), send a mail to man-pages@man7.org