CURLOPT_PROXY_SSL_OPTIONS.3 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. .\" **************************************************************************
  2. .\" * _ _ ____ _
  3. .\" * Project ___| | | | _ \| |
  4. .\" * / __| | | | |_) | |
  5. .\" * | (__| |_| | _ <| |___
  6. .\" * \___|\___/|_| \_\_____|
  7. .\" *
  8. .\" * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
  9. .\" *
  10. .\" * This software is licensed as described in the file COPYING, which
  11. .\" * you should have received as part of this distribution. The terms
  12. .\" * are also available at https://curl.se/docs/copyright.html.
  13. .\" *
  14. .\" * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. .\" * copies of the Software, and permit persons to whom the Software is
  16. .\" * furnished to do so, under the terms of the COPYING file.
  17. .\" *
  18. .\" * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. .\" * KIND, either express or implied.
  20. .\" *
  21. .\" * SPDX-License-Identifier: curl
  22. .\" *
  23. .\" **************************************************************************
  24. .\"
  25. .TH CURLOPT_PROXY_SSL_OPTIONS 3 "January 05, 2023" "libcurl 7.88.1" "curl_easy_setopt options"
  26. .SH NAME
  27. CURLOPT_PROXY_SSL_OPTIONS \- HTTPS proxy SSL behavior options
  28. .SH SYNOPSIS
  29. .nf
  30. #include <curl/curl.h>
  31. CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_SSL_OPTIONS,
  32. long bitmask);
  33. .fi
  34. .SH DESCRIPTION
  35. Pass a long with a bitmask to tell libcurl about specific SSL
  36. behaviors. Available bits:
  37. .IP CURLSSLOPT_ALLOW_BEAST
  38. Tells libcurl to not attempt to use any workarounds for a security flaw in the
  39. SSL3 and TLS1.0 protocols. If this option is not used or this bit is set to 0,
  40. the SSL layer libcurl uses may use a work-around for this flaw although it
  41. might cause interoperability problems with some (older) SSL
  42. implementations. WARNING: avoiding this work-around lessens the security, and
  43. by setting this option to 1 you ask for exactly that. This option is only
  44. supported for Secure Transport, NSS and OpenSSL.
  45. .IP CURLSSLOPT_NO_REVOKE
  46. Tells libcurl to disable certificate revocation checks for those SSL backends
  47. where such behavior is present. This option is only supported for Schannel
  48. (the native Windows SSL library), with an exception in the case of Windows'
  49. Untrusted Publishers block list which it seems cannot be bypassed. (Added in
  50. 7.44.0)
  51. .IP CURLSSLOPT_NO_PARTIALCHAIN
  52. Tells libcurl to not accept "partial" certificate chains, which it otherwise
  53. does by default. This option is only supported for OpenSSL and will fail the
  54. certificate verification if the chain ends with an intermediate certificate
  55. and not with a root cert. (Added in 7.68.0)
  56. .IP CURLSSLOPT_REVOKE_BEST_EFFORT
  57. Tells libcurl to ignore certificate revocation checks in case of missing or
  58. offline distribution points for those SSL backends where such behavior is
  59. present. This option is only supported for Schannel (the native Windows SSL
  60. library). If combined with \fICURLSSLOPT_NO_REVOKE\fP, the latter takes
  61. precedence. (Added in 7.70.0)
  62. .IP CURLSSLOPT_NATIVE_CA
  63. Tell libcurl to use the operating system's native CA store for certificate
  64. verification. Works only on Windows when built to use OpenSSL. If you set this
  65. option and also set a CA certificate file or directory then during verification
  66. those certificates are searched in addition to the native CA store.
  67. (Added in 7.71.0)
  68. .IP CURLSSLOPT_AUTO_CLIENT_CERT
  69. Tell libcurl to automatically locate and use a client certificate for
  70. authentication, when requested by the server. This option is only supported
  71. for Schannel (the native Windows SSL library). Prior to 7.77.0 this was the
  72. default behavior in libcurl with Schannel. Since the server can request any
  73. certificate that supports client authentication in the OS certificate store it
  74. could be a privacy violation and unexpected.
  75. (Added in 7.77.0)
  76. .SH DEFAULT
  77. 0
  78. .SH PROTOCOLS
  79. All TLS-based protocols
  80. .SH EXAMPLE
  81. .nf
  82. CURL *curl = curl_easy_init();
  83. if(curl) {
  84. curl_easy_setopt(curl, CURLOPT_URL, "https://example.com/");
  85. curl_easy_setopt(curl, CURLOPT_PROXY, "https://proxy");
  86. /* weaken TLS only for use with silly proxies */
  87. curl_easy_setopt(curl, CURLOPT_PROXY_SSL_OPTIONS, CURLSSLOPT_ALLOW_BEAST |
  88. CURLSSLOPT_NO_REVOKE);
  89. ret = curl_easy_perform(curl);
  90. curl_easy_cleanup(curl);
  91. }
  92. .fi
  93. .SH AVAILABILITY
  94. Added in 7.52.0
  95. .SH RETURN VALUE
  96. Returns CURLE_OK if the option is supported, and CURLE_UNKNOWN_OPTION if not.
  97. .SH "SEE ALSO"
  98. .BR CURLOPT_PROXY_SSLVERSION "(3), " CURLOPT_PROXY_SSL_CIPHER_LIST "(3), "
  99. .BR CURLOPT_SSLVERSION "(3), " CURLOPT_SSL_CIPHER_LIST "(3), "