CURLOPT_PROXY_CAPATH(3) curl_easy_setopt options CURLOPT_PROXY_CAPATH(3)NAME
CURLOPT_PROXY_CAPATH - specify directory holding proxy CA certificates
SYNOPSIS
#include <curl/curl.h>
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_CAPATH, char *capath);
DESCRIPTION
Pass a char * to a zero terminated string naming a directory holding multiple CA certificates to verify the HTTPS proxy with. If libcurl is
built against OpenSSL, the certificate directory must be prepared using the openssl c_rehash utility. This makes sense only when CUR-
LOPT_SSL_VERIFYPEER(3) is enabled (which it is by default).
The application does not have to keep the string around after setting this option.
DEFAULT
NULL
PROTOCOLS
Everything used over an HTTPS proxy
EXAMPLE
TODO
AVAILABILITY
Added in 7.52.0
This option is supported by the OpenSSL, GnuTLS and PolarSSL backends. The NSS backend provides the option only for backward compatibility.
RETURN VALUE
CURLE_OK if supported; or an error such as:
CURLE_NOT_BUILT_IN - Not supported by the SSL backend
CURLE_UNKNOWN_OPTION
CURLE_OUT_OF_MEMORY
SEE ALSO CURLOPT_CAINFO(3), CURLOPT_STDERR(3), CURLOPT_DEBUGFUNCTION(3),
libcurl 7.54.0 February 21, 2017 CURLOPT_PROXY_CAPATH(3)
Check Out this Related Man Page
CURLOPT_PROXY_SSL_VERIFYHOST(3) curl_easy_setopt options CURLOPT_PROXY_SSL_VERIFYHOST(3)NAME
CURLOPT_PROXY_SSL_VERIFYHOST - verify the proxy certificate's name against host
SYNOPSIS
#include <curl/curl.h>
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_SSL_VERIFYHOST, long verify);
DESCRIPTION
Pass a long set to 2L as asking curl to verify in the HTTPS proxy's certificate name fields against the proxy name.
This option determines whether libcurl verifies that the proxy cert contains the correct name for the name it is known as.
When CURLOPT_PROXY_SSL_VERIFYHOST(3) is 2, the proxy certificate must indicate that the server is the proxy to which you meant to connect
to, or the connection fails.
Curl considers the proxy the intended one when the Common Name field or a Subject Alternate Name field in the certificate matches the host
name in the proxy string which you told curl to use.
When the verify value is 1L, curl_easy_setopt will return an error and the option value will not be changed due to old legacy reasons.
When the verify value is 0L, the connection succeeds regardless of the names used in the certificate. Use that ability with caution!
See also CURLOPT_PROXY_SSL_VERIFYPEER(3) to verify the digital signature of the proxy certificate. If libcurl is built against NSS and
CURLOPT_PROXY_SSL_VERIFYPEER(3) is zero, CURLOPT_PROXY_SSL_VERIFYHOST(3) is also set to zero and cannot be overridden.
DEFAULT
2
PROTOCOLS
All protocols when used over a HTTPS proxy.
EXAMPLE
CURL *curl = curl_easy_init();
if(curl) {
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");
/* Set the default value: strict name check please */
curl_easy_setopt(curl, CURLOPT_PROXY_SSL_VERIFYHOST, 2L);
curl_easy_perform(curl);
}
AVAILABILITY
Added in 7.52.0.
If built TLS enabled.
RETURN VALUE
Returns CURLE_OK if TLS is supported, and CURLE_UNKNOWN_OPTION if not.
If 1 is set as argument, CURLE_BAD_FUNCTION_ARGUMENT is returned.
SEE ALSO CURLOPT_PROXY_SSL_VERIFYPEER(3), CURLOPT_PROXY_CAINFO(3), , CURLOPT_SSL_VERIFYPEER(3), CURLOPT_CAINFO(3), ,
libcurl 7.54.0 December 16, 2016 CURLOPT_PROXY_SSL_VERIFYHOST(3)
Hi,
I have a proxy with SSL that forward any request to a backend platform.
In this moment I have a problem if I'm trying to execute an activex on the backend platform.
I'm reading that the mod_proxy blocks any activex request because it don't trust for the system.
How I can do? I'm reading... (0 Replies)
Hi Guys,
I have recently started reciving below Error message
Failed HTTPS transfer to https://supportfiles.sun.com/curl
whenever I run
/usr/local/bin/sudo /opt/SUNWexplo/bin/explorer -P -q -v
from all Servers.
Looks like the SSL certificate as Expired.
Whenever I type... (4 Replies)