2014-10-01 10:31:17 +08:00
|
|
|
.\" **************************************************************************
|
|
|
|
.\" * _ _ ____ _
|
|
|
|
.\" * Project ___| | | | _ \| |
|
|
|
|
.\" * / __| | | | |_) | |
|
|
|
|
.\" * | (__| |_| | _ <| |___
|
|
|
|
.\" * \___|\___/|_| \_\_____|
|
|
|
|
.\" *
|
2015-09-17 14:50:51 +08:00
|
|
|
.\" * Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2014-10-01 10:31:17 +08:00
|
|
|
.\" *
|
|
|
|
.\" * This software is licensed as described in the file COPYING, which
|
|
|
|
.\" * you should have received as part of this distribution. The terms
|
2016-02-03 07:19:02 +08:00
|
|
|
.\" * are also available at https://curl.haxx.se/docs/copyright.html.
|
2014-10-01 10:31:17 +08:00
|
|
|
.\" *
|
|
|
|
.\" * You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
.\" * copies of the Software, and permit persons to whom the Software is
|
|
|
|
.\" * furnished to do so, under the terms of the COPYING file.
|
|
|
|
.\" *
|
|
|
|
.\" * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
.\" * KIND, either express or implied.
|
|
|
|
.\" *
|
|
|
|
.\" **************************************************************************
|
|
|
|
.\"
|
|
|
|
.TH CURLOPT_PINNEDPUBLICKEY 3 "27 Aug 2014" "libcurl 7.38.0" "curl_easy_setopt options"
|
|
|
|
.SH NAME
|
|
|
|
CURLOPT_PINNEDPUBLICKEY \- set pinned public key
|
|
|
|
.SH SYNOPSIS
|
|
|
|
#include <curl/curl.h>
|
|
|
|
|
|
|
|
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PINNEDPUBLICKEY, char *pinnedpubkey);
|
|
|
|
.SH DESCRIPTION
|
2015-07-01 08:23:54 +08:00
|
|
|
Pass a pointer to a zero terminated string as parameter. The string can be the
|
|
|
|
file name of your pinned public key. The file format expected is "PEM" or "DER".
|
|
|
|
The string can also be any number of base64 encoded sha256 hashes preceded by
|
2015-08-12 17:23:23 +08:00
|
|
|
"sha256//" and separated by ";"
|
2014-10-01 10:31:17 +08:00
|
|
|
|
|
|
|
When negotiating a TLS or SSL connection, the server sends a certificate
|
2014-10-30 21:56:53 +08:00
|
|
|
indicating its identity. A public key is extracted from this certificate and
|
|
|
|
if it does not exactly match the public key provided to this option, curl will
|
|
|
|
abort the connection before sending or receiving any data.
|
2015-09-17 14:50:51 +08:00
|
|
|
|
|
|
|
On mismatch, \fICURLE_SSL_PINNEDPUBKEYNOTMATCH\fP is returned.
|
2014-10-01 10:31:17 +08:00
|
|
|
.SH DEFAULT
|
|
|
|
NULL
|
|
|
|
.SH PROTOCOLS
|
2015-11-08 06:11:04 +08:00
|
|
|
All TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
|
2014-10-01 10:31:17 +08:00
|
|
|
.SH EXAMPLE
|
2014-10-30 21:56:53 +08:00
|
|
|
.nf
|
|
|
|
CURL *curl = curl_easy_init();
|
|
|
|
if(curl) {
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");
|
|
|
|
curl_easy_setopt(curl, CURLOPT_PINNEDPUBLICKEY, "/etc/publickey.der");
|
2015-07-01 08:23:54 +08:00
|
|
|
/* OR
|
|
|
|
curl_easy_setopt(curl, CURLOPT_PINNEDPUBLICKEY, "sha256//YhKJKSzoTt2b5FP18fvpHo7fJYqQCjAa3HWY3tvRMwE=;sha256//t62CeU2tQiqkexU74Gxa2eg7fRbEgoChTociMee9wno=");
|
|
|
|
*/
|
2014-10-30 21:56:53 +08:00
|
|
|
|
|
|
|
/* Perform the request */
|
|
|
|
curl_easy_perform(curl);
|
|
|
|
}
|
|
|
|
.fi
|
2015-04-05 13:48:16 +08:00
|
|
|
.SH PUBLIC KEY EXTRACTION
|
|
|
|
If you do not have the server's public key file you can extract it from the
|
|
|
|
server's certificate.
|
|
|
|
.nf
|
2015-09-14 15:16:04 +08:00
|
|
|
# retrieve the server's certificate if you don't already have it
|
|
|
|
#
|
|
|
|
# be sure to examine the certificate to see if it is what you expected
|
|
|
|
#
|
|
|
|
# Windows-specific:
|
|
|
|
# - Use NUL instead of /dev/null.
|
|
|
|
# - OpenSSL may wait for input instead of disconnecting. Hit enter.
|
|
|
|
# - If you don't have sed, then just copy the certificate into a file:
|
|
|
|
# Lines from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE-----.
|
|
|
|
#
|
2015-09-20 22:08:15 +08:00
|
|
|
openssl s_client -servername www.example.com -connect www.example.com:443 < /dev/null | sed -n "/-----BEGIN/,/-----END/p" > www.example.com.pem
|
2015-09-14 15:16:04 +08:00
|
|
|
|
2015-07-01 08:23:54 +08:00
|
|
|
# extract public key in pem format from certificate
|
2015-09-20 22:08:15 +08:00
|
|
|
openssl x509 -in www.example.com.pem -pubkey -noout > www.example.com.pubkey.pem
|
2015-09-14 15:16:04 +08:00
|
|
|
|
2015-07-01 08:23:54 +08:00
|
|
|
# convert public key from pem to der
|
2015-09-20 22:08:15 +08:00
|
|
|
openssl asn1parse -noout -inform pem -in www.example.com.pubkey.pem -out www.example.com.pubkey.der
|
2015-09-14 15:16:04 +08:00
|
|
|
|
2015-07-01 08:23:54 +08:00
|
|
|
# sha256 hash and base64 encode der to string for use
|
2015-09-20 22:08:15 +08:00
|
|
|
openssl dgst -sha256 -binary www.example.com.pubkey.der | openssl base64
|
2015-04-05 13:48:16 +08:00
|
|
|
.fi
|
2015-07-01 08:23:54 +08:00
|
|
|
The public key in PEM format contains a header, base64 data and a
|
2015-04-05 13:48:16 +08:00
|
|
|
footer:
|
|
|
|
.nf
|
|
|
|
-----BEGIN PUBLIC KEY-----
|
|
|
|
[BASE 64 DATA]
|
|
|
|
-----END PUBLIC KEY-----
|
|
|
|
.fi
|
2014-10-01 10:31:17 +08:00
|
|
|
.SH AVAILABILITY
|
2016-04-22 09:21:45 +08:00
|
|
|
PEM/DER support:
|
|
|
|
7.39.0: OpenSSL, GnuTLS and GSKit
|
|
|
|
7.43.0: NSS and wolfSSL/CyaSSL
|
|
|
|
7.47.0: mbedtls
|
|
|
|
7.49.0: PolarSSL
|
|
|
|
sha256 support:
|
|
|
|
7.44.0: OpenSSL, GnuTLS, NSS and wolfSSL/CyaSSL.
|
|
|
|
7.47.0: mbedtls
|
|
|
|
7.49.0: PolarSSL
|
|
|
|
Other SSL backends not supported.
|
2014-10-01 10:31:17 +08:00
|
|
|
.SH RETURN VALUE
|
|
|
|
Returns CURLE_OK if TLS enabled, CURLE_UNKNOWN_OPTION if not, or
|
|
|
|
CURLE_OUT_OF_MEMORY if there was insufficient heap space.
|
2014-10-30 21:56:53 +08:00
|
|
|
.SH "SEE ALSO"
|
|
|
|
.BR CURLOPT_SSL_VERIFYPEER "(3), "
|
|
|
|
.BR CURLOPT_SSL_VERIFYHOST "(3), "
|
|
|
|
.BR CURLOPT_CAINFO "(3), "
|
|
|
|
.BR CURLOPT_CAPATH "(3), "
|