Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

curlopt_proxy_capath(3) [mojave man page]

CURLOPT_PROXY_CAPATH(3) 				     curl_easy_setopt options					   CURLOPT_PROXY_CAPATH(3)

NAME
CURLOPT_PROXY_CAPATH - specify directory holding proxy CA certificates SYNOPSIS
#include <curl/curl.h> CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_CAPATH, char *capath); DESCRIPTION
Pass a char * to a zero terminated string naming a directory holding multiple CA certificates to verify the HTTPS proxy with. If libcurl is built against OpenSSL, the certificate directory must be prepared using the openssl c_rehash utility. This makes sense only when CUR- LOPT_SSL_VERIFYPEER(3) is enabled (which it is by default). The application does not have to keep the string around after setting this option. DEFAULT
NULL PROTOCOLS
Everything used over an HTTPS proxy EXAMPLE
TODO AVAILABILITY
Added in 7.52.0 This option is supported by the OpenSSL, GnuTLS and PolarSSL backends. The NSS backend provides the option only for backward compatibility. RETURN VALUE
CURLE_OK if supported; or an error such as: CURLE_NOT_BUILT_IN - Not supported by the SSL backend CURLE_UNKNOWN_OPTION CURLE_OUT_OF_MEMORY SEE ALSO
CURLOPT_CAINFO(3), CURLOPT_STDERR(3), CURLOPT_DEBUGFUNCTION(3), libcurl 7.54.0 February 21, 2017 CURLOPT_PROXY_CAPATH(3)

Check Out this Related Man Page

CURLOPT_PROXY_CRLFILE(3)				     curl_easy_setopt options					  CURLOPT_PROXY_CRLFILE(3)

NAME
CURLOPT_PROXY_CRLFILE - specify a proxy Certificate Revocation List file SYNOPSIS
#include <curl/curl.h> CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_CRLFILE, char *file); DESCRIPTION
This option is for connecting to a HTTPS proxy, not a HTTPS server. Pass a char * to a zero terminated string naming a file with the concatenation of CRL (in PEM format) to use in the certificate validation that occurs during the SSL exchange. When curl is built to use NSS or GnuTLS, there is no way to influence the use of CRL passed to help in the verification process. When libcurl is built with OpenSSL support, X509_V_FLAG_CRL_CHECK and X509_V_FLAG_CRL_CHECK_ALL are both set, requiring CRL check against all the elements of the certificate chain if a CRL file is passed. This option makes sense only when used in combination with the CURLOPT_PROXY_SSL_VERIFYPEER(3) option. A specific error code (CURLE_SSL_CRL_BADFILE) is defined with the option. It is returned when the SSL exchange fails because the CRL file cannot be loaded. A failure in certificate verification due to a revocation information found in the CRL does not trigger this specific error. The application does not have to keep the string around after setting this option. DEFAULT
NULL PROTOCOLS
Used with HTTPS proxy. EXAMPLE
TODO AVAILABILITY
Added in 7.52.0 RETURN VALUE
Returns CURLE_OK if the option is supported, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space. SEE ALSO
CURLOPT_PROXY_SSL_VERIFYPEER(3), CURLOPT_PROXY_SSL_VERIFYHOST(3), CURLOPT_SSL_VERIFYPEER(3), CURLOPT_SSL_VERIFYHOST(3), libcurl 7.54.0 December 21, 2016 CURLOPT_PROXY_CRLFILE(3)
Man Page

2 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

mod_proxy with ActiveX

Hi, I have a proxy with SSL that forward any request to a backend platform. In this moment I have a problem if I'm trying to execute an activex on the backend platform. I'm reading that the mod_proxy blocks any activex request because it don't trust for the system. How I can do? I'm reading... (0 Replies)
Discussion started by: lain
0 Replies

2. Solaris

Need suggestion:- Failed HTTPS transfer to https://supportfiles.sun.com/curl

Hi Guys, I have recently started reciving below Error message Failed HTTPS transfer to https://supportfiles.sun.com/curl whenever I run /usr/local/bin/sudo /opt/SUNWexplo/bin/explorer -P -q -v from all Servers. Looks like the SSL certificate as Expired. Whenever I type... (4 Replies)
Discussion started by: manalisharmabe
4 Replies