Provided by: libcurl4-doc_8.9.1-2ubuntu2.1_all bug

NAME

       CURLOPT_DOH_SSL_VERIFYSTATUS - verify the DoH SSL certificate's status

SYNOPSIS

       #include <curl/curl.h>

       CURLcode curl_easy_setopt(CURL *handle, CURLOPT_DOH_SSL_VERIFYSTATUS,
                                 long verify);

DESCRIPTION

       Pass a long as parameter set to 1 to enable or 0 to disable.

       This  option  determines  whether  libcurl verifies the status of the DoH (DNS-over-HTTPS)
       server cert using the "Certificate Status Request" TLS extension (aka. OCSP stapling).

       This option is the DoH equivalent of CURLOPT_SSL_VERIFYSTATUS(3) and only affects requests
       to the DoH server.

       If  this  option  is  enabled  and  the  server  does  not  support the TLS extension, the
       verification fails.

DEFAULT

       0

PROTOCOLS

       This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.

       This option works only with the following TLS backends: GnuTLS and OpenSSL

EXAMPLE

       int main(void)
       {
         CURL *curl = curl_easy_init();
         if(curl) {
           curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");

           curl_easy_setopt(curl, CURLOPT_DOH_URL,
                            "https://cloudflare-dns.com/dns-query");

           /* Ask for OCSP stapling when verifying the DoH server */
           curl_easy_setopt(curl, CURLOPT_DOH_SSL_VERIFYSTATUS, 1L);

           curl_easy_perform(curl);
         }
       }

AVAILABILITY

       Added in curl 7.76.0

RETURN VALUE

       Returns CURLE_OK if OCSP stapling is supported  by  the  SSL  backend,  otherwise  returns
       CURLE_NOT_BUILT_IN.

SEE ALSO

       CURLOPT_DOH_SSL_VERIFYHOST(3), CURLOPT_DOH_SSL_VERIFYPEER(3), CURLOPT_SSL_VERIFYSTATUS(3)