.\" generated by cd2nroff 0.1 from CURLOPT_SSLCERT_BLOB.md .TH CURLOPT_SSLCERT_BLOB 3 "2024-11-18" libcurl .SH NAME CURLOPT_SSLCERT_BLOB \- SSL client certificate from memory blob .SH SYNOPSIS .nf #include CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSLCERT_BLOB, struct curl_blob *stblob); .fi .SH DESCRIPTION Pass a pointer to a curl_blob structure, which contains (pointer and size) a client certificate. The format must be "P12" on Secure Transport or Schannel. The format must be "P12" or "PEM" on OpenSSL. The format must be \&"DER" or "PEM" on mbedTLS. The format must be specified with \fICURLOPT_SSLCERTTYPE(3)\fP. If the blob is initialized with the flags member of struct curl_blob set to CURL_BLOB_COPY, the application does not have to keep the buffer around after setting this. This option is an alternative to \fICURLOPT_SSLCERT(3)\fP which instead expects a filename as input. .SH DEFAULT NULL .SH PROTOCOLS This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc. This option works only with the following TLS backends: OpenSSL, Schannel, Secure Transport and mbedTLS .SH EXAMPLE .nf extern char *certificateData; /* point to data */ extern size_t filesize; /* size of data */ int main(void) { CURL *curl = curl_easy_init(); if(curl) { CURLcode res; struct curl_blob stblob; stblob.data = certificateData; stblob.len = filesize; stblob.flags = CURL_BLOB_COPY; curl_easy_setopt(curl, CURLOPT_URL, "https://example.com/"); curl_easy_setopt(curl, CURLOPT_SSLCERT_BLOB, &stblob); curl_easy_setopt(curl, CURLOPT_SSLCERTTYPE, "P12"); curl_easy_setopt(curl, CURLOPT_KEYPASSWD, "s3cret"); res = curl_easy_perform(curl); curl_easy_cleanup(curl); } } .fi .SH AVAILABILITY Added in curl 7.71.0 .SH RETURN VALUE Returns CURLE_OK if TLS enabled, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space. .SH SEE ALSO .BR CURLOPT_KEYPASSWD (3), .BR CURLOPT_SSLCERTTYPE (3), .BR CURLOPT_SSLKEY (3)