Microsoft Security Advisory (977377): Vulnerability in TLS/SSL Could Allow Spoofing - 2/9/2010


 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Security Advisories (RSS) - Microsoft Microsoft Security Advisory (977377): Vulnerability in TLS/SSL Could Allow Spoofing - 2/9/2010
# 1  
Old 02-09-2010
Microsoft Security Advisory (977377): Vulnerability in TLS/SSL Could Allow Spoofing - 2/9/2010

Revision Note: V1.0 (February 9, 2010): Advisory published. Advisory Summary:Microsoft is investigating public reports of a vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer(SSL)protocols. At this time, Microsoft is not aware of any attacks attempting to exploit the reported vulnerability.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
CURLOPT_SSLCERTTYPE(3)					     curl_easy_setopt options					    CURLOPT_SSLCERTTYPE(3)

NAME
CURLOPT_SSLCERTTYPE - specify type of the client SSL certificate SYNOPSIS
#include <curl/curl.h> CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSLCERTTYPE, char *type); DESCRIPTION
Pass a pointer to a zero terminated string as parameter. The string should be the format of your certificate. Supported formats are "PEM" and "DER", except with Secure Transport. OpenSSL (versions 0.9.3 and later) and Secure Transport (on iOS 5 or later, or OS X 10.7 or later) also support "P12" for PKCS#12-encoded files. The application does not have to keep the string around after setting this option. DEFAULT
"PEM" PROTOCOLS
All TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc. EXAMPLE
TODO AVAILABILITY
If built TLS enabled. Added in 7.9.3 RETURN VALUE
Returns CURLE_OK if TLS is supported, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space. SEE ALSO
CURLOPT_SSLCERT(3), CURLOPT_SSLKEY(3), libcurl 7.54.0 December 21, 2016 CURLOPT_SSLCERTTYPE(3)