mirror of
https://github.com/curl/curl.git
synced 2024-12-09 06:30:06 +08:00
cb521d1f9a
Closes #12448
107 lines
4.5 KiB
Groff
107 lines
4.5 KiB
Groff
.\" **************************************************************************
|
|
.\" * _ _ ____ _
|
|
.\" * Project ___| | | | _ \| |
|
|
.\" * / __| | | | |_) | |
|
|
.\" * | (__| |_| | _ <| |___
|
|
.\" * \___|\___/|_| \_\_____|
|
|
.\" *
|
|
.\" * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
|
.\" *
|
|
.\" * This software is licensed as described in the file COPYING, which
|
|
.\" * you should have received as part of this distribution. The terms
|
|
.\" * are also available at https://curl.se/docs/copyright.html.
|
|
.\" *
|
|
.\" * You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
.\" * copies of the Software, and permit persons to whom the Software is
|
|
.\" * furnished to do so, under the terms of the COPYING file.
|
|
.\" *
|
|
.\" * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
.\" * KIND, either express or implied.
|
|
.\" *
|
|
.\" * SPDX-License-Identifier: curl
|
|
.\" *
|
|
.\" **************************************************************************
|
|
.\"
|
|
.TH CURLOPT_SSL_OPTIONS 3 "19 Jun 2014" libcurl libcurl
|
|
.SH NAME
|
|
CURLOPT_SSL_OPTIONS \- SSL behavior options
|
|
.SH SYNOPSIS
|
|
.nf
|
|
#include <curl/curl.h>
|
|
|
|
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSL_OPTIONS, long bitmask);
|
|
.fi
|
|
.SH DESCRIPTION
|
|
Pass a long with a bitmask to tell libcurl about specific SSL
|
|
behaviors. Available bits:
|
|
.IP CURLSSLOPT_ALLOW_BEAST
|
|
Tells libcurl to not attempt to use any workarounds for a security flaw in the
|
|
SSL3 and TLS1.0 protocols. If this option is not used or this bit is set to 0,
|
|
the SSL layer libcurl uses may use a work-around for this flaw although it
|
|
might cause interoperability problems with some (older) SSL implementations.
|
|
WARNING: avoiding this work-around lessens the security, and by setting this
|
|
option to 1 you ask for exactly that. This option is only supported for
|
|
Secure Transport and OpenSSL.
|
|
.IP CURLSSLOPT_NO_REVOKE
|
|
Tells libcurl to disable certificate revocation checks for those SSL backends
|
|
where such behavior is present. This option is only supported for Schannel
|
|
(the native Windows SSL library), with an exception in the case of Windows'
|
|
Untrusted Publishers block list which it seems cannot be bypassed. (Added in
|
|
7.44.0)
|
|
.IP CURLSSLOPT_NO_PARTIALCHAIN
|
|
Tells libcurl to not accept "partial" certificate chains, which it otherwise
|
|
does by default. This option is only supported for OpenSSL and fails the
|
|
certificate verification if the chain ends with an intermediate certificate
|
|
and not with a root cert. (Added in 7.68.0)
|
|
.IP CURLSSLOPT_REVOKE_BEST_EFFORT
|
|
Tells libcurl to ignore certificate revocation checks in case of missing or
|
|
offline distribution points for those SSL backends where such behavior is
|
|
present. This option is only supported for Schannel (the native Windows SSL
|
|
library). If combined with \fICURLSSLOPT_NO_REVOKE\fP, the latter takes
|
|
precedence. (Added in 7.70.0)
|
|
.IP CURLSSLOPT_NATIVE_CA
|
|
Tell libcurl to use the operating system's native CA store for certificate
|
|
verification. If you set this option and also set a CA certificate file or
|
|
directory then during verification those certificates are searched in addition
|
|
to the native CA store.
|
|
|
|
Works with wolfSSL on Windows, Linux (Debian, Ubuntu, Gentoo, Fedora, RHEL),
|
|
macOS, Android and iOS (added in 8.3.0), with GnuTLS (added in 8.5.0) or on
|
|
Windows when built to use OpenSSL (Added in 7.71.0).
|
|
.IP CURLSSLOPT_AUTO_CLIENT_CERT
|
|
Tell libcurl to automatically locate and use a client certificate for
|
|
authentication, when requested by the server. This option is only supported
|
|
for Schannel (the native Windows SSL library). Prior to 7.77.0 this was the
|
|
default behavior in libcurl with Schannel. Since the server can request any
|
|
certificate that supports client authentication in the OS certificate store it
|
|
could be a privacy violation and unexpected.
|
|
(Added in 7.77.0)
|
|
.SH DEFAULT
|
|
0
|
|
.SH PROTOCOLS
|
|
All TLS-based protocols
|
|
.SH EXAMPLE
|
|
.nf
|
|
int main(void)
|
|
{
|
|
CURL *curl = curl_easy_init();
|
|
if(curl) {
|
|
CURLcode res;
|
|
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com/");
|
|
/* weaken TLS only for use with silly servers */
|
|
curl_easy_setopt(curl, CURLOPT_SSL_OPTIONS, (long)CURLSSLOPT_ALLOW_BEAST |
|
|
CURLSSLOPT_NO_REVOKE);
|
|
res = curl_easy_perform(curl);
|
|
curl_easy_cleanup(curl);
|
|
}
|
|
}
|
|
.fi
|
|
.SH AVAILABILITY
|
|
Added in 7.25.0
|
|
.SH RETURN VALUE
|
|
Returns CURLE_OK if the option is supported, and CURLE_UNKNOWN_OPTION if not.
|
|
.SH "SEE ALSO"
|
|
.BR CURLOPT_PROXY_SSL_OPTIONS (3),
|
|
.BR CURLOPT_SSL_CIPHER_LIST (3),
|
|
.BR CURLOPT_SSLVERSION (3)
|