Home
last modified time | relevance | path

Searched refs:certificate (Results 76 – 100 of 105) sorted by relevance

12345

/curl/tests/data/
H A Dtest30246 PEM certificate
H A Dtest153893 e58: Problem with the local SSL certificate
95 e60: SSL peer certificate or SSH remote key was not OK
118 e83: Issuer check against peer certificate failed
126 e91: SSL server certificate status verification FAILED
/curl/docs/cmdline-opts/
H A Dcapath.md21 Use the specified certificate directory to verify the peer. Multiple paths can
H A Dproxy-capath.md23 Use the specified certificate directory to verify the proxy. Multiple paths
H A Ddoh-url.md23 name lookups take place over SSL. However, the certificate verification
H A Dconnect-to.md22 certificate verification) or for the application protocols.
H A Dwrite-out.md63 Output the certificate chain with details. Supported only by the OpenSSL,
147 The result of the HTTPS proxy's SSL peer certificate verification that was
200 The result of the SSL peer certificate verification that was requested. 0
/curl/docs/libcurl/
H A Dcurl_easy_setopt.md128 Extract certificate info. See CURLOPT_CERTINFO(3)
273 Verify the hostname in the DoH (DNS-over-HTTPS) SSL certificate. See
278 Verify the DoH (DNS-over-HTTPS) SSL certificate. See
283 Verify the DoH (DNS-over-HTTPS) SSL certificate's status. See
519 Issuer certificate. See CURLOPT_ISSUERCERT(3)
523 Issuer certificate memory buffer. See CURLOPT_ISSUERCERT_BLOB(3)
785 Proxy issuer certificate. See CURLOPT_PROXY_ISSUERCERT(3)
842 Verify the hostname in the proxy SSL certificate. See
847 Verify the proxy SSL certificate. See CURLOPT_PROXY_SSL_VERIFYPEER(3)
1137 Verify the SSL certificate. See CURLOPT_SSL_VERIFYPEER(3)
[all …]
/curl/docs/libcurl/opts/
H A DCURLOPT_SSL_VERIFYSTATUS.md21 CURLOPT_SSL_VERIFYSTATUS - verify the certificate's status
H A DCURLOPT_DOH_SSL_VERIFYSTATUS.md21 CURLOPT_DOH_SSL_VERIFYSTATUS - verify the DoH SSL certificate's status
H A DCURLINFO_CAINFO.md20 CURLINFO_CAINFO - get the default built-in CA certificate path
H A DCURLOPT_KEYPASSWD.md37 load a certificate but you need one to load your private key.
H A DCURLOPT_PROXY_KEYPASSWD.md40 need a passphrase to load a certificate but you need one to load your private
H A DCURLOPT_SSLKEY.md41 in the key-chain or PKCS#12 file containing the certificate.
H A DCURLOPT_PROXY_CAPATH.md38 against OpenSSL, the certificate directory must be prepared using the OpenSSL
H A DCURLOPT_CAPATH.md38 OpenSSL, the certificate directory must be prepared using the OpenSSL c_rehash
H A DCURLOPT_CAINFO_BLOB.md49 server's certificate, CURLOPT_CAINFO_BLOB(3) is not needed.
H A DCURLOPT_PROXY_SSLKEY.md44 present in the key chain or PKCS#12 file containing the certificate.
H A DCURLOPT_PROXY_CAINFO_BLOB.md53 server's certificate, CURLOPT_PROXY_CAINFO_BLOB(3) is not needed.
H A DCURLOPT_DOH_URL.md55 The hostname and peer certificate verification settings are not inherited but
H A DCURLOPT_CONNECT_TO.md59 (e.g. SNI, certificate verification) or for the application protocols.
/curl/tests/http/testenv/
H A Dcerts.py153 def certificate(self) -> Any: member in Credentials
462 issuer.certificate.extensions.get_extension_for_class(
481 issuer.certificate.extensions.get_extension_for_class(
506 issuer_subject = issuer.certificate.subject
530 issuer_subject=issuer.certificate.subject, pkey=pkey,
548 issuer_subject=issuer.certificate.subject, pkey=pkey,
/curl/lib/vtls/
H A Dx509asn1.c772 cert->certificate.header = NULL; in Curl_parseX509()
773 cert->certificate.beg = beg; in Curl_parseX509()
774 cert->certificate.end = end; in Curl_parseX509()
1213 result = Curl_base64_encode(cert.certificate.beg, in Curl_extract_certinfo()
1214 cert.certificate.end - cert.certificate.beg, in Curl_extract_certinfo()
/curl/packages/vms/
H A Dcurlmsg.msg99 PEER_FAILED_VERIF <peer certificate or fingerprint failed>
106 SSL_CERTPROBLEM <SSL problem with the local certificate>
/curl/docs/
H A DFAQ73 4.12 Why do I get "certificate verify failed" ?
667 does not require this, you do not need a client certificate.
669 A client certificate is always used together with a private key, and the
686 Authority certificate ("CA cert") that was used to sign the server
687 certificate. Server certificate verification is enabled by default in curl
940 4.12 Why do I get "certificate verify failed" ?
944 certificate using the CA cert bundle and verifying for which names the
945 certificate has been granted.
947 To completely disable the certificate verification, use -k. This does
952 server's certificate might not be signed by one of the CA's in your CA
[all …]

Completed in 46 milliseconds

12345