CURLOPT_PROXY_CAPATH(3) curl_easy_setopt options CURLOPT_PROXY_CAPATH(3)NAME
CURLOPT_PROXY_CAPATH - specify directory holding proxy CA certificates
SYNOPSIS
#include <curl/curl.h>
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_CAPATH, char *capath);
DESCRIPTION
Pass a char * to a zero terminated string naming a directory holding multiple CA certificates to verify the HTTPS proxy with. If libcurl is
built against OpenSSL, the certificate directory must be prepared using the openssl c_rehash utility. This makes sense only when CUR-
LOPT_SSL_VERIFYPEER(3) is enabled (which it is by default).
The application does not have to keep the string around after setting this option.
DEFAULT
NULL
PROTOCOLS
Everything used over an HTTPS proxy
EXAMPLE
TODO
AVAILABILITY
Added in 7.52.0
This option is supported by the OpenSSL, GnuTLS and PolarSSL backends. The NSS backend provides the option only for backward compatibility.
RETURN VALUE
CURLE_OK if supported; or an error such as:
CURLE_NOT_BUILT_IN - Not supported by the SSL backend
CURLE_UNKNOWN_OPTION
CURLE_OUT_OF_MEMORY
SEE ALSO CURLOPT_CAINFO(3), CURLOPT_STDERR(3), CURLOPT_DEBUGFUNCTION(3),
libcurl 7.54.0 February 21, 2017 CURLOPT_PROXY_CAPATH(3)
Check Out this Related Man Page
CURLOPT_PROXY_CRLFILE(3) curl_easy_setopt options CURLOPT_PROXY_CRLFILE(3)NAME
CURLOPT_PROXY_CRLFILE - specify a proxy Certificate Revocation List file
SYNOPSIS
#include <curl/curl.h>
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_CRLFILE, char *file);
DESCRIPTION
This option is for connecting to a HTTPS proxy, not a HTTPS server.
Pass a char * to a zero terminated string naming a file with the concatenation of CRL (in PEM format) to use in the certificate validation
that occurs during the SSL exchange.
When curl is built to use NSS or GnuTLS, there is no way to influence the use of CRL passed to help in the verification process. When
libcurl is built with OpenSSL support, X509_V_FLAG_CRL_CHECK and X509_V_FLAG_CRL_CHECK_ALL are both set, requiring CRL check against all
the elements of the certificate chain if a CRL file is passed.
This option makes sense only when used in combination with the CURLOPT_PROXY_SSL_VERIFYPEER(3) option.
A specific error code (CURLE_SSL_CRL_BADFILE) is defined with the option. It is returned when the SSL exchange fails because the CRL file
cannot be loaded. A failure in certificate verification due to a revocation information found in the CRL does not trigger this specific
error.
The application does not have to keep the string around after setting this option.
DEFAULT
NULL
PROTOCOLS
Used with HTTPS proxy.
EXAMPLE
TODO
AVAILABILITY
Added in 7.52.0
RETURN VALUE
Returns CURLE_OK if the option is supported, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space.
SEE ALSO CURLOPT_PROXY_SSL_VERIFYPEER(3), CURLOPT_PROXY_SSL_VERIFYHOST(3), CURLOPT_SSL_VERIFYPEER(3), CURLOPT_SSL_VERIFYHOST(3),
libcurl 7.54.0 December 21, 2016 CURLOPT_PROXY_CRLFILE(3)
Hi,
I have a proxy with SSL that forward any request to a backend platform.
In this moment I have a problem if I'm trying to execute an activex on the backend platform.
I'm reading that the mod_proxy blocks any activex request because it don't trust for the system.
How I can do? I'm reading... (0 Replies)
Hi Guys,
I have recently started reciving below Error message
Failed HTTPS transfer to https://supportfiles.sun.com/curl
whenever I run
/usr/local/bin/sudo /opt/SUNWexplo/bin/explorer -P -q -v
from all Servers.
Looks like the SSL certificate as Expired.
Whenever I type... (4 Replies)