@lancelock emmmmm 我还是等等吧
@yexiaoxing
@LokiSharp
暂时的解决方案
> If you want to trust the certificate, you can add it to your CA certificate store or use it stand-alone as described.
参考:https://curl.se/docs/sslcerts.html
简单来说就 3 个方式:
1.使用–insecure,不验证证书
2.使用–cacert [file],这里的 file 就是上面的–nokeys 导出的,或者设计环境变量 CURL_CA_BUNDLE
3.自己重新编译一份 openssl,因为 CA store 是在编译的时候打包进去的,所以 read only 。
暂时先用环境变量顶着吧
> * Trying ::1:5001…
* Connected to localhost (::1) port 5001 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: x509stores/noprivatekey.pem
CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
* subject: CN=localhost
* start date: Nov 23 13:05:24 2020 GMT
* expire date: Nov 23 13:05:24 2021 GMT
* subjectAltName: host “localhost” matched cert’s “localhost”
* issuer: CN=localhost
* SSL certificate verify ok.