mirror of
https://codeberg.org/kiss-community/repo
synced 2024-11-19 21:20:07 -07:00
51 lines
1.4 KiB
Groff
51 lines
1.4 KiB
Groff
.\" generated by cd2nroff 0.1 from CURLOPT_SSL_VERIFYSTATUS.md
|
|
.TH CURLOPT_SSL_VERIFYSTATUS 3 libcurl
|
|
.SH NAME
|
|
CURLOPT_SSL_VERIFYSTATUS \- verify the certificate\(aqs status
|
|
.SH SYNOPSIS
|
|
.nf
|
|
#include <curl/curl.h>
|
|
|
|
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSL_VERIFYSTATUS, long verify);
|
|
.fi
|
|
.SH DESCRIPTION
|
|
Pass a long as parameter set to 1 to enable or 0 to disable.
|
|
|
|
This option determines whether libcurl verifies the status of the server cert
|
|
using the "Certificate Status Request" TLS extension (aka. OCSP stapling).
|
|
|
|
Note that if this option is enabled but the server does not support the TLS
|
|
extension, the verification fails.
|
|
.SH DEFAULT
|
|
0
|
|
.SH PROTOCOLS
|
|
All TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
|
|
|
|
This option works only with the following TLS backends:
|
|
GnuTLS and OpenSSL
|
|
.SH EXAMPLE
|
|
.nf
|
|
int main(void)
|
|
{
|
|
CURL *curl = curl_easy_init();
|
|
if(curl) {
|
|
CURLcode res;
|
|
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com/");
|
|
/* ask for OCSP stapling! */
|
|
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYSTATUS, 1L);
|
|
res = curl_easy_perform(curl);
|
|
curl_easy_cleanup(curl);
|
|
}
|
|
}
|
|
.fi
|
|
.SH AVAILABILITY
|
|
Added in 7.41.0. This option is currently only supported by the OpenSSL and
|
|
GnuTLS TLS backends.
|
|
.SH RETURN VALUE
|
|
Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
|
|
returns CURLE_NOT_BUILT_IN.
|
|
.SH SEE ALSO
|
|
.BR CURLOPT_CAINFO (3),
|
|
.BR CURLOPT_SSL_VERIFYHOST (3),
|
|
.BR CURLOPT_SSL_VERIFYPEER (3)
|