| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106 |
- .\" generated by cd2nroff 0.1 from CURLOPT_PROXY_PINNEDPUBLICKEY.md
- .TH CURLOPT_PROXY_PINNEDPUBLICKEY 3 "2025-01-17" libcurl
- .SH NAME
- CURLOPT_PROXY_PINNEDPUBLICKEY \- pinned public key for https proxy
- .SH SYNOPSIS
- .nf
- #include <curl/curl.h>
- CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_PINNEDPUBLICKEY,
- char *pinnedpubkey);
- .fi
- .SH DESCRIPTION
- Pass a pointer to a null\-terminated string as parameter. The string can be the
- filename of your pinned public key. The file format expected is "PEM" or
- \&"DER". The string can also be any number of base64 encoded sha256 hashes
- preceded by "sha256//" and separated by ";"
- When negotiating a TLS or SSL connection, the https proxy sends a certificate
- indicating its identity. A public key is extracted from this certificate and
- if it does not exactly match the public key provided to this option, libcurl
- aborts the connection before sending or receiving any data.
- On mismatch, \fICURLE_SSL_PINNEDPUBKEYNOTMATCH\fP is returned.
- The application does not have to keep the string around after setting this
- option.
- .SH DEFAULT
- NULL
- .SH PROTOCOLS
- This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
- This option works only with the following TLS backends:
- GnuTLS, OpenSSL, mbedTLS and wolfSSL
- .SH EXAMPLE
- .nf
- int main(void)
- {
- CURL *curl = curl_easy_init();
- if(curl) {
- curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");
- curl_easy_setopt(curl, CURLOPT_PROXY, "https://proxy:443");
- curl_easy_setopt(curl, CURLOPT_PROXY_PINNEDPUBLICKEY,
- "sha256//YhKJKSzoTt2b5FP18fvpHo7fJYqQCjA"
- "a3HWY3tvRMwE=;sha256//t62CeU2tQiqkexU74"
- "Gxa2eg7fRbEgoChTociMee9wno=");
- /* Perform the request */
- curl_easy_perform(curl);
- }
- }
- .fi
- .SH PUBLIC KEY EXTRACTION
- If you do not have the https proxy server\(aqs public key file you can extract it
- from the https proxy server\(aqs certificate.
- .nf
- # retrieve the server's certificate if you do not already have it
- #
- # be sure to examine the certificate to see if it is what you expected
- #
- # Windows-specific:
- # - Use NUL instead of /dev/null.
- # - OpenSSL may wait for input instead of disconnecting. Hit enter.
- # - If you do not have sed, then just copy the certificate into a file:
- # Lines from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE-----.
- #
- openssl s_client -servername www.example.com -connect www.example.com:443 \\
- < /dev/null | sed -n "/-----BEGIN/,/-----END/p" > www.example.com.pem
- # extract public key in pem format from certificate
- openssl x509 -in www.example.com.pem -pubkey -noout > www.example.com.pubkey.pem
- # convert public key from pem to der
- openssl asn1parse -noout -inform pem -in www.example.com.pubkey.pem \\
- -out www.example.com.pubkey.der
- # sha256 hash and base64 encode der to string for use
- openssl dgst -sha256 -binary www.example.com.pubkey.der | openssl base64
- .fi
- The public key in PEM format contains a header, base64 data and a
- footer:
- .nf
- -----BEGIN PUBLIC KEY-----
- [BASE 64 DATA]
- -----END PUBLIC KEY-----
- .fi
- .SH HISTORY
- PEM/DER support:
- 7.52.0: GnuTLS, OpenSSL, mbedTLS, wolfSSL
- sha256 support:
- 7.52.0: GnuTLS, OpenSSL, mbedTLS, wolfSSL
- Other SSL backends not supported.
- .SH AVAILABILITY
- Added in curl 7.52.0
- .SH RETURN VALUE
- Returns CURLE_OK if TLS enabled, CURLE_UNKNOWN_OPTION if not, or
- CURLE_OUT_OF_MEMORY if there was insufficient heap space.
- .SH SEE ALSO
- .BR CURLOPT_PINNEDPUBLICKEY (3),
- .BR CURLOPT_PROXY_CAINFO (3),
- .BR CURLOPT_PROXY_CAPATH (3),
- .BR CURLOPT_PROXY_SSL_VERIFYHOST (3),
- .BR CURLOPT_PROXY_SSL_VERIFYPEER (3)
|