Searched refs:certificate (Results 76 – 100 of 105) sorted by relevance
12345
/curl/tests/data/ |
H A D | test3024 | 6 PEM certificate
|
H A D | test1538 | 93 e58: Problem with the local SSL certificate 95 e60: SSL peer certificate or SSH remote key was not OK 118 e83: Issuer check against peer certificate failed 126 e91: SSL server certificate status verification FAILED
|
/curl/docs/cmdline-opts/ |
H A D | capath.md | 21 Use the specified certificate directory to verify the peer. Multiple paths can
|
H A D | proxy-capath.md | 23 Use the specified certificate directory to verify the proxy. Multiple paths
|
H A D | doh-url.md | 23 name lookups take place over SSL. However, the certificate verification
|
H A D | connect-to.md | 22 certificate verification) or for the application protocols.
|
H A D | write-out.md | 63 Output the certificate chain with details. Supported only by the OpenSSL, 147 The result of the HTTPS proxy's SSL peer certificate verification that was 200 The result of the SSL peer certificate verification that was requested. 0
|
/curl/docs/libcurl/ |
H A D | curl_easy_setopt.md | 128 Extract certificate info. See CURLOPT_CERTINFO(3) 273 Verify the hostname in the DoH (DNS-over-HTTPS) SSL certificate. See 278 Verify the DoH (DNS-over-HTTPS) SSL certificate. See 283 Verify the DoH (DNS-over-HTTPS) SSL certificate's status. See 519 Issuer certificate. See CURLOPT_ISSUERCERT(3) 523 Issuer certificate memory buffer. See CURLOPT_ISSUERCERT_BLOB(3) 785 Proxy issuer certificate. See CURLOPT_PROXY_ISSUERCERT(3) 842 Verify the hostname in the proxy SSL certificate. See 847 Verify the proxy SSL certificate. See CURLOPT_PROXY_SSL_VERIFYPEER(3) 1137 Verify the SSL certificate. See CURLOPT_SSL_VERIFYPEER(3) [all …]
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_SSL_VERIFYSTATUS.md | 21 CURLOPT_SSL_VERIFYSTATUS - verify the certificate's status
|
H A D | CURLOPT_DOH_SSL_VERIFYSTATUS.md | 21 CURLOPT_DOH_SSL_VERIFYSTATUS - verify the DoH SSL certificate's status
|
H A D | CURLINFO_CAINFO.md | 20 CURLINFO_CAINFO - get the default built-in CA certificate path
|
H A D | CURLOPT_KEYPASSWD.md | 37 load a certificate but you need one to load your private key.
|
H A D | CURLOPT_PROXY_KEYPASSWD.md | 40 need a passphrase to load a certificate but you need one to load your private
|
H A D | CURLOPT_SSLKEY.md | 41 in the key-chain or PKCS#12 file containing the certificate.
|
H A D | CURLOPT_PROXY_CAPATH.md | 38 against OpenSSL, the certificate directory must be prepared using the OpenSSL
|
H A D | CURLOPT_CAPATH.md | 38 OpenSSL, the certificate directory must be prepared using the OpenSSL c_rehash
|
H A D | CURLOPT_CAINFO_BLOB.md | 49 server's certificate, CURLOPT_CAINFO_BLOB(3) is not needed.
|
H A D | CURLOPT_PROXY_SSLKEY.md | 44 present in the key chain or PKCS#12 file containing the certificate.
|
H A D | CURLOPT_PROXY_CAINFO_BLOB.md | 53 server's certificate, CURLOPT_PROXY_CAINFO_BLOB(3) is not needed.
|
H A D | CURLOPT_DOH_URL.md | 55 The hostname and peer certificate verification settings are not inherited but
|
H A D | CURLOPT_CONNECT_TO.md | 59 (e.g. SNI, certificate verification) or for the application protocols.
|
/curl/tests/http/testenv/ |
H A D | certs.py | 153 def certificate(self) -> Any: member in Credentials 462 issuer.certificate.extensions.get_extension_for_class( 481 issuer.certificate.extensions.get_extension_for_class( 506 issuer_subject = issuer.certificate.subject 530 issuer_subject=issuer.certificate.subject, pkey=pkey, 548 issuer_subject=issuer.certificate.subject, pkey=pkey,
|
/curl/lib/vtls/ |
H A D | x509asn1.c | 772 cert->certificate.header = NULL; in Curl_parseX509() 773 cert->certificate.beg = beg; in Curl_parseX509() 774 cert->certificate.end = end; in Curl_parseX509() 1213 result = Curl_base64_encode(cert.certificate.beg, in Curl_extract_certinfo() 1214 cert.certificate.end - cert.certificate.beg, in Curl_extract_certinfo()
|
/curl/packages/vms/ |
H A D | curlmsg.msg | 99 PEER_FAILED_VERIF <peer certificate or fingerprint failed> 106 SSL_CERTPROBLEM <SSL problem with the local certificate>
|
/curl/docs/ |
H A D | FAQ | 73 4.12 Why do I get "certificate verify failed" ? 667 does not require this, you do not need a client certificate. 669 A client certificate is always used together with a private key, and the 686 Authority certificate ("CA cert") that was used to sign the server 687 certificate. Server certificate verification is enabled by default in curl 940 4.12 Why do I get "certificate verify failed" ? 944 certificate using the CA cert bundle and verifying for which names the 945 certificate has been granted. 947 To completely disable the certificate verification, use -k. This does 952 server's certificate might not be signed by one of the CA's in your CA [all …]
|
Completed in 46 milliseconds
12345