Index: doc/tls.html
==================================================================
--- doc/tls.html
+++ doc/tls.html
@@ -453,17 +453,46 @@
+Summary of command line options:
+The following options are used for certificate validation:
+
+- The -cadir option specifies the directory where the Certificate
+Authority (CA) certificates are stored. The default is platform specific, but
+is usually "/etc/ssl/certs" on Linux/Unix systems. The default location can be
+overridden via the SSL_CERT_DIR environment variable.
+- The -cafile option specifies the file that contains all of the
+Certificate Authority (CA) certificates in the PEM file format. The default is
+cert.pem, in the OpenSSL directory. On Linux/Unix systems, this is
+usually "/etc/ssl/ca-bundle.pem". The default file can be overridden via the
+SSL_CERT_FILE environment variable.
+- The -castore option contains the URI to the Certificate Authority
+(CA) store, which may be a single container or a catalog of containers.
+Starting with OpenSSL 3.2 on Windows, set this to "org.openssl.winstore://" to
+use the built-in Windows Certificate Store. The Windows cert store only
+supports root certificate stores.
+- The -request option is used to request the server send its
+certificate chain as part of the connection negotiation process. This is
+needed to do certificate validation. The default is true. In addition, the
+client can manually inspect and accept or reject each certificate using the
+-validatecommand option.
+- The -require option is used to require certificate validation be
+performed as part of the connection negotiation process. A valid CA directory,
+file, or store must be present for this to work.
+
+
+
+When are command line options needed:
-By default, a client TLS connection is set to NOT request nor validate the
-server certificates. This limitation is due to the lack of a common cross
-platform database of Certificate Authority (CA) provided certificates to
-validate against. Many Linux systems natively support OpenSSL and thus have
-these certificates installed as part of the OS, but MacOS and Windows do not.
-In order to use the -require option, one of the following must be true:
+By default, a client TLS connection does NOT validate the server certificate
+chain. This limitation is due to the lack of a common cross platform
+database of Certificate Authority (CA) provided certificates to validate
+against. Many Linux systems natively support OpenSSL and thus have these
+certificates installed as part of the OS, but MacOS and Windows do not. In
+order to use the -require option, one of the following must be true:
- On Linux and Unix systems with OpenSSL already installed, if the CA
certificates are stored in the standard locations, or the SSL_CERT_DIR
or SSL_CERT_FILE env vars are set, then no other options are needed.
@@ -477,11 +506,11 @@
setting the -castore option to "org.openssl.winstore://".
- If OpenSSL is not installed, the CA certificates must be downloaded and
installed with the user software. The CURL team makes them available at
CA certificates extracted
-from Mozilla. Look for the cacert.pem file. You must then either
+from Mozilla in the cacert.pem file. You must then either
set the SSL_CERT_DIR and/or SSL_CERT_FILE env vars or the
-cadir or -cafile options must be set to the file's install
location. It is your responsibility to keep this file up to date.