AP05/curl_arm64/share/man/man3/CURLOPT_DOH_SSL_VERIFYSTATUS.3
2025-12-02 13:06:35 +08:00

60 lines
1.8 KiB
Groff

.\" generated by cd2nroff 0.1 from CURLOPT_DOH_SSL_VERIFYSTATUS.md
.TH CURLOPT_DOH_SSL_VERIFYSTATUS 3 "2025-07-07" libcurl
.SH NAME
CURLOPT_DOH_SSL_VERIFYSTATUS \- verify the DoH SSL certificate\(aqs status
.SH SYNOPSIS
.nf
#include <curl/curl.h>
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_DOH_SSL_VERIFYSTATUS,
long verify);
.fi
.SH DESCRIPTION
Pass a long as parameter set to 1 to enable or 0 to disable.
This option determines whether libcurl verifies the status of the DoH
(DNS\-over\-HTTPS) server cert using the "Certificate Status Request" TLS
extension (aka. OCSP stapling).
This option is the DoH equivalent of \fICURLOPT_SSL_VERIFYSTATUS(3)\fP and
only affects requests to the DoH server.
If this option is enabled and the server does not support the TLS extension,
the verification fails.
.SH DEFAULT
0
.SH PROTOCOLS
This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
This option works only with the following TLS backends:
GnuTLS and OpenSSL
.SH EXAMPLE
.nf
int main(void)
{
CURL *curl = curl_easy_init();
if(curl) {
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");
curl_easy_setopt(curl, CURLOPT_DOH_URL,
"https://cloudflare-dns.com/dns-query");
/* Ask for OCSP stapling when verifying the DoH server */
curl_easy_setopt(curl, CURLOPT_DOH_SSL_VERIFYSTATUS, 1L);
curl_easy_perform(curl);
}
}
.fi
.SH AVAILABILITY
Added in curl 7.76.0
.SH RETURN VALUE
\fIcurl_easy_setopt(3)\fP returns a CURLcode indicating success or error.
CURLE_OK (0) means everything was OK, non\-zero means an error occurred, see
\fIlibcurl\-errors(3)\fP.
.SH SEE ALSO
.BR CURLOPT_DOH_SSL_VERIFYHOST (3),
.BR CURLOPT_DOH_SSL_VERIFYPEER (3),
.BR CURLOPT_SSL_VERIFYSTATUS (3)