Next: Copying Information, Previous: Guile Examples, Up: Top [Contents][Index]
This chapter lists the GnuTLS Scheme procedures exported by the
(gnutls) module (see The Guile module system in The
GNU Guile Reference Manual).
Enable GnuTLS logging up to level (an integer).
Use proc (a two-argument procedure) as the global GnuTLS log procedure.
Use certificate pub and secret key sec in certificate credentials cred.
Return #f if key ID id is in keyring, #f otherwise.
Import data (a u8vector) according to format and return the imported keyring.
Return a list of values denoting the key usage of key.
Return the version of the OpenPGP message format (RFC2440) honored by key.
Return two values: the certificate algorithm used by key and the number of bits used.
Return the list of names for key.
Return the indexth name of key.
Return a new u8vector denoting the fingerprint of key.
Store in fpr (a u8vector) the fingerprint of key. Return the number of bytes stored in fpr.
Store the ID (an 8 byte sequence) of certificate key in id (a u8vector).
Return the ID (an 8-element u8vector) of certificate key.
Return a new OpenPGP private key object resulting from the import of data (a uniform array) according to format. Optionally, a passphrase may be provided.
Return a new OpenPGP certificate object resulting from the import of data (a uniform array) according to format.
Return two values: the alternative name type for cert (i.e., one of the x509-subject-alternative-name/ values) and the actual subject alternative name (a string) at index. Both values are #f if no alternative name is available at index.
Return the subject key ID (a u8vector) for cert.
Return the key ID (a u8vector) of the X.509 certificate authority of cert.
Return a statistically unique ID (a u8vector) for cert that depends on its public key parameters. This is normally a 20-byte SHA-1 hash.
Return the version of cert.
Return the key usage of cert (i.e., a list of key-usage/ values), or the empty list if cert does not contain such information.
Return two values: the public key algorithm (i.e., one of the pk-algorithm/ values) of cert and the number of bits used.
Return the signature algorithm used by cert (i.e., one of the sign-algorithm/ values).
Return true if cert matches hostname, a string denoting a DNS host name. This is the basic implementation of RFC 2818 (aka. HTTPS).
Return the OID (a string) at index from cert’s issuer DN. Return #f if no OID is available at index.
Return OID (a string) at index from cert. Return #f if no OID is available at index.
Return the distinguished name (DN) of X.509 certificate cert.
Return the distinguished name (DN) of X.509 certificate cert. The form of the DN is as described in RFC 2253.
Return a new X.509 private key object resulting from the import of data (a uniform array) according to format. Optionally, if pass is not #f, it should be a string denoting a passphrase. encrypted tells whether the private key is encrypted (#t by default).
Return a new X.509 private key object resulting from the import of data (a uniform array) according to format.
Return a new X.509 certificate object resulting from the import of data (a uniform array) according to format.
Return the username associated with PSK server session session.
Set the client credentials for cred, a PSK client credentials object.
Return a new PSK client credentials object.
Use file as the password file for PSK server credentials cred.
Return new PSK server credentials.
Verify the peer certificate for session and return a list of certificate-status values (such as certificate-status/revoked), or the empty list if the certificate is valid.
Set the certificate verification flags to flags, a series of certificate-verify values.
Set the verification limits of peer-certificate-status for certificate credentials cred to max_bits bits for an acceptable certificate and max_depth as the maximum depth of a certificate chain.
Have certificate credentials cred use the X.509 certificates listed in certs and X.509 private key privkey.
Use X.509 certificate cert and private key key, both uniform arrays containing the X.509 certificate and key in format format, for certificate credentials cred.
Use data (a uniform array) as the X.509 CRL (certificate revocation list) database for cred. On success, return the number of CRLs processed.
Use data (a uniform array) as the X.509 trust database for cred. On success, return the number of certificates processed.
Use file as the X.509 CRL (certificate revocation list) file for certificate credentials cred. On success, return the number of CRLs processed.
Use file as the X.509 trust file for certificate credentials cred. On success, return the number of certificates processed.
Use file as the password file for PSK server credentials cred.
Use Diffie-Hellman parameters dh_params for certificate credentials cred.
Return new certificate credentials (i.e., for use with either X.509 or OpenPGP certificates.
Set the Diffie-Hellman parameters of anonymous server credentials cred.
Return anonymous client credentials.
Return anonymous server credentials.
Use bits DH prime bits for session.
Export Diffie-Hellman parameters dh_params in PKCS3 format according for format (an x509-certificate-format value). Return a u8vector containing the result.
Import Diffie-Hellman parameters in PKCS3 format (further specified by format, an x509-certificate-format value) from array (a homogeneous array) and return a new dh-params object.
Return new Diffie-Hellman parameters.
Use port as the input/output port for session.
Use file descriptor fd as the underlying transport for session.
Return a read-write port that may be used to communicate over session. All invocations of session-port on a given session return the same object (in the sense of eq?).
Receive data from session into array, a uniform homogeneous array. Return the number of bytes actually received.
Send the record constituted by array through session.
For a client, this procedure provides a way to inform the server that it is known under name, via the SERVER NAME TLS extension. type must be a server-name-type value, server-name-type/dns for DNS names.
Use cred as session’s credentials.
Return the name of the given cipher suite.
Have session use the given priorities for the ciphers, key exchange methods, MACs and compression methods. priorities must be a string (see Priority Strings in GnuTLS, Transport Layer Security Library for the GNU system). When priorities cannot be parsed, an error/invalid-request error is raised, with an extra argument indication the position of the error.
Have session use the default priorities.
Tell how session, a server-side session, should deal with certificate requests. request should be either certificate-request/request or certificate-request/require.
Return our certificate chain for session (as sent to the peer) in raw format (a u8vector). In the case of OpenPGP there is exactly one certificate. Return the empty list if no certificate was used.
Return the a list of certificates in raw format (u8vectors) where the first one is the peer’s certificate. In the case of OpenPGP, there is always exactly one certificate. In the case of X.509, subsequent certificates indicate form a certificate chain. Return the empty list if no certificate was sent.
Return the client authentication type (a credential-type value) used in session.
Return the server authentication type (a credential-type value) used in session.
Return the authentication type (a credential-type value) used by session.
Return the protocol used by session.
Return session’s certificate type.
Return session’s compression method.
Return session’s MAC.
Return session’s kx.
Return session’s cipher.
Send alert via session.
Get an aleter from session.
Perform a re-handshaking for session.
Perform a handshake for session.
Close session according to how.
Return a new session for connection end end, either connection-end/server or connection-end/client.
Return a string denoting the version number of the underlying GnuTLS library, e.g., "1.7.2".
Return true if obj is of type openpgp-keyring.
Return true if obj is of type openpgp-private-key.
Return true if obj is of type openpgp-certificate.
Return true if obj is of type x509-private-key.
Return true if obj is of type x509-certificate.
Return true if obj is of type psk-client-credentials.
Return true if obj is of type psk-server-credentials.
Return true if obj is of type srp-client-credentials.
Return true if obj is of type srp-server-credentials.
Return true if obj is of type certificate-credentials.
Return true if obj is of type dh-parameters.
Return true if obj is of type anonymous-server-credentials.
Return true if obj is of type anonymous-client-credentials.
Return true if obj is of type session.
Return a string describing enumval, a openpgp-certificate-format value.
Return a string describing enumval, a error value.
Return a string describing enumval, a certificate-verify value.
Return a string describing enumval, a key-usage value.
Return a string describing enumval, a psk-key-format value.
Return a string describing enumval, a server-name-type value.
Return a string describing enumval, a sign-algorithm value.
Return a string describing enumval, a pk-algorithm value.
Return a string describing enumval, a x509-subject-alternative-name value.
Return a string describing enumval, a x509-certificate-format value.
Return a string describing enumval, a certificate-type value.
Return a string describing enumval, a protocol value.
Return a string describing enumval, a close-request value.
Return a string describing enumval, a certificate-request value.
Return a string describing enumval, a certificate-status value.
Return a string describing enumval, a handshake-description value.
Return a string describing enumval, a alert-description value.
Return a string describing enumval, a alert-level value.
Return a string describing enumval, a connection-end value.
Return a string describing enumval, a compression-method value.
Return a string describing enumval, a digest value.
Return a string describing enumval, a mac value.
Return a string describing enumval, a credentials value.
Return a string describing enumval, a params value.
Return a string describing enumval, a kx value.
Return a string describing enumval, a cipher value.
Next: Copying Information, Previous: Guile Examples, Up: Top [Contents][Index]