Provided by: libcurl4-doc_7.85.0-1_all bug

NAME

       CURLOPT_DOH_SSL_VERIFYSTATUS - verify the DoH SSL certificate's status

SYNOPSIS

       #include <curl/curl.h>

       CURLcode curl_easy_setopt(CURL *handle, CURLOPT_DOH_SSL_VERIFYSTATUS,
                                 long verify);

DESCRIPTION

       Pass a long as parameter set to 1 to enable or 0 to disable.

       This  option  determines  whether  libcurl verifies the status of the DoH (DNS-over-HTTPS)
       server cert using the "Certificate Status Request" TLS extension (aka. OCSP stapling).

       This option is the DoH equivalent of CURLOPT_SSL_VERIFYSTATUS(3) and only affects requests
       to the DoH server.

       Note that if this option is enabled but the server does not support the TLS extension, the
       verification will fail.

DEFAULT

       0

PROTOCOLS

       DoH

EXAMPLE

       CURL *curl = curl_easy_init();
       if(curl) {
         curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");

         curl_easy_setopt(curl, CURLOPT_DOH_URL, "https://cloudflare-dns.com/dns-query");

         /* Ask for OCSP stapling when verifying the DoH server */
         curl_easy_setopt(curl, CURLOPT_DOH_SSL_VERIFYSTATUS, 1L);

         curl_easy_perform(curl);
       }

AVAILABILITY

       Added in 7.76.0. This option is currently only supported by the OpenSSL,  GnuTLS  and  NSS
       TLS backends.

RETURN VALUE

       Returns  CURLE_OK  if  OCSP  stapling  is  supported by the SSL backend, otherwise returns
       CURLE_NOT_BUILT_IN.

SEE ALSO

       CURLOPT_DOH_SSL_VERIFYHOST(3), CURLOPT_DOH_SSL_VERIFYPEER(3), CURLOPT_SSL_VERIFYSTATUS(3),