mirror of
https://codeberg.org/kiss-community/repo
synced 2024-12-23 07:40:11 -07:00
59 lines
1.6 KiB
Groff
59 lines
1.6 KiB
Groff
.\" generated by cd2nroff 0.1 from CURLINFO_SSL_VERIFYRESULT.md
|
|
.TH CURLINFO_SSL_VERIFYRESULT 3 "2024-08-02" libcurl
|
|
.SH NAME
|
|
CURLINFO_SSL_VERIFYRESULT \- get the result of the certificate verification
|
|
.SH SYNOPSIS
|
|
.nf
|
|
#include <curl/curl.h>
|
|
|
|
CURLcode curl_easy_getinfo(CURL *handle, CURLINFO_SSL_VERIFYRESULT,
|
|
long *result);
|
|
.fi
|
|
.SH DESCRIPTION
|
|
Pass a pointer to a long to receive the result of the server SSL certificate
|
|
verification that was requested (using the \fICURLOPT_SSL_VERIFYPEER(3)\fP
|
|
option).
|
|
|
|
0 is a positive result. Non\-zero is an error.
|
|
.SH PROTOCOLS
|
|
This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
|
|
|
|
This option works only with the following TLS backends:
|
|
GnuTLS and OpenSSL
|
|
.SH EXAMPLE
|
|
.nf
|
|
int main(void)
|
|
{
|
|
CURL *curl = curl_easy_init();
|
|
if(curl) {
|
|
CURLcode res;
|
|
long verifyresult;
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");
|
|
|
|
res = curl_easy_perform(curl);
|
|
if(res) {
|
|
printf("error: %s\\n", curl_easy_strerror(res));
|
|
curl_easy_cleanup(curl);
|
|
return 1;
|
|
}
|
|
|
|
res = curl_easy_getinfo(curl, CURLINFO_SSL_VERIFYRESULT,
|
|
&verifyresult);
|
|
if(!res) {
|
|
printf("The peer verification said %s\\n",
|
|
(verifyresult ? "bad" : "fine"));
|
|
}
|
|
curl_easy_cleanup(curl);
|
|
}
|
|
}
|
|
.fi
|
|
.SH AVAILABILITY
|
|
Added in curl 7.5
|
|
.SH RETURN VALUE
|
|
Returns CURLE_OK if the option is supported, and CURLE_UNKNOWN_OPTION if not.
|
|
.SH SEE ALSO
|
|
.BR CURLINFO_PROXY_SSL_VERIFYRESULT (3),
|
|
.BR curl_easy_getinfo (3),
|
|
.BR curl_easy_setopt (3)
|