| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849 |
- .\" generated by cd2nroff 0.1 from CURLOPT_SSL_VERIFYSTATUS.md
- .TH CURLOPT_SSL_VERIFYSTATUS 3 "2025-01-17" libcurl
- .SH NAME
- CURLOPT_SSL_VERIFYSTATUS \- verify the certificate\(aqs status
- .SH SYNOPSIS
- .nf
- #include <curl/curl.h>
- CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSL_VERIFYSTATUS, long verify);
- .fi
- .SH DESCRIPTION
- Pass a long as parameter set to 1 to enable or 0 to disable.
- This option determines whether libcurl verifies the status of the server cert
- using the "Certificate Status Request" TLS extension (aka. OCSP stapling).
- Note that if this option is enabled but the server does not support the TLS
- extension, the verification fails.
- .SH DEFAULT
- 0
- .SH PROTOCOLS
- This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
- This option works only with the following TLS backends:
- GnuTLS and OpenSSL
- .SH EXAMPLE
- .nf
- int main(void)
- {
- CURL *curl = curl_easy_init();
- if(curl) {
- CURLcode res;
- curl_easy_setopt(curl, CURLOPT_URL, "https://example.com/");
- /* ask for OCSP stapling! */
- curl_easy_setopt(curl, CURLOPT_SSL_VERIFYSTATUS, 1L);
- res = curl_easy_perform(curl);
- curl_easy_cleanup(curl);
- }
- }
- .fi
- .SH AVAILABILITY
- Added in curl 7.41.0
- .SH RETURN VALUE
- Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
- returns CURLE_NOT_BUILT_IN.
- .SH SEE ALSO
- .BR CURLOPT_CAINFO (3),
- .BR CURLOPT_SSL_VERIFYHOST (3),
- .BR CURLOPT_SSL_VERIFYPEER (3)
|