01-15-2009
Slackware: openssl
LinuxSecurity.com: New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue when connecting to an SSL/TLS server that uses a certificate containing a DSA or ECDSA key.
More...
6 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I ungraded my openssl on sun solaris 8 from openssl 0.9.6c to openssl 0.9.6g the ungrade went
fine but when I tried to ssh in to server, I received the following error message
"ld.so.1: ./sshd: fatal: relocation error: file /usr/local/ssl/lib/libcrypto.so.0.9.6: symbol main: referenced symbol... (2 Replies)
Discussion started by: hassan2
2 Replies
2. UNIX for Advanced & Expert Users
All,
I am new to openssl and I have not been able to figure out exactly how to use it. What I need to do is to create a shell script which FTPS's (SFTP is not allowed on my project) a file to a mainframe. The mainframe will not initiate a session with my server.
Question. Are the packages... (7 Replies)
Discussion started by: MichaelInDC
7 Replies
3. Solaris
Hi Peeps,
Having trouble compiling openssl 0.9.8r on Solaris 10 x86. The make test fails when running the shatests (segmentation faults). There is a PROBLEM file that references a file called values.c. Anyone know whereabouts in the source tree you put this file as the file doesn't tell you... (2 Replies)
Discussion started by: callmebob
2 Replies
4. UNIX for Advanced & Expert Users
Hi ,
1-I need to know please if it's possible to compress using openssl?
Here is the version used:
openssl version -a
OpenSSL 0.9.7d 17 Mar 2004 (+ security fixes for: CVE-2005-2969 CVE-2006-2937 CVE-2006-2940 CVE2006-3738 CVE-2006-4339 CVE-2006-4343 CVE-2007-5135 CVE-2008-5077... (3 Replies)
Discussion started by: Eman_in_forum
3 Replies
5. Cybersecurity
I just started playing around with Unix's OpenSSL utility. I can't seem to get the hang of it, and the man page isn't helping much. I wanted to experiment with file encryption, so I created a dummy text file with one line of text and tried to encrypt it using DES. I used the following command:
... (2 Replies)
Discussion started by: Ultrix
2 Replies
6. HP-UX
We have a legacy HP-UX 11.11 server that has a number of security vulnerabilities associated with OpenSSL. We have a project in the works to replace this server but until then I need to deal with the vulnerabilities. No applications on the server utilize SSL, so my plan was to simply remove it. ... (8 Replies)
Discussion started by: jduehmig
8 Replies
LEARN ABOUT FREEBSD
ssl_get_peer_certificate
SSL_get_peer_certificate(3SSL) OpenSSL SSL_get_peer_certificate(3SSL)
NAME
SSL_get_peer_certificate - get the X509 certificate of the peer
SYNOPSIS
#include <openssl/ssl.h>
X509 *SSL_get_peer_certificate(const SSL *ssl);
DESCRIPTION
SSL_get_peer_certificate() returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is
returned.
NOTES
Due to the protocol definition, a TLS/SSL server will always send a certificate, if present. A client will only send a certificate when
explicitly requested to do so by the server (see SSL_CTX_set_verify(3)). If an anonymous cipher is used, no certificates are sent.
That a certificate is returned does not indicate information about the verification state, use SSL_get_verify_result(3) to check the
verification state.
The reference count of the X509 object is incremented by one, so that it will not be destroyed when the session containing the peer
certificate is freed. The X509 object must be explicitly freed using X509_free().
RETURN VALUES
The following return values can occur:
NULL
No certificate was presented by the peer or no connection was established.
Pointer to an X509 certificate
The return value points to the certificate presented by the peer.
SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_CTX_set_verify(3)
1.0.1e 2013-02-11 SSL_get_peer_certificate(3SSL)