09-29-2009
Thanks for the info.
I have server URL in /etc/sysconfig/rhn/up2date file.
I compared the downloaded cert and cert existed on the server and both looks same with validity dates and that tells me that my cert is valid.
i dont think my subscription is expired as I registered about 10 systems after and all are working fine. Thanks.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi
I am trying to sort a file of 88075743B size. I am doing some processing on the file and after the processing is done; I get 2 files temp1 and temp2. I need to combine both these files as one and this final file should be sorted on fields 1 and 2. Space is the delimiter between fields. Record... (2 Replies)
Discussion started by: diksha2207
2 Replies
2. UNIX for Advanced & Expert Users
Hi - I am getting the error
`Error reading response length from authentication socket'
when I ssh from my cluster to another cluster, and then back to my cluster. It doesn't seem to affect anything, but it's just annoying that it always pops up and tends to confuse new users of the cluster. I... (1 Reply)
Discussion started by: cpp6f
1 Replies
3. Programming
Dear Experts,
i am compiling my code in suse 4.1 which is compiling fine,
but at runtime it is showing me for socket programming error no 88
as i searched in errno.h it is telling me socket operation on non socket,
what is the meaning of this , how to deal with this error , please... (1 Reply)
Discussion started by: vin_pll
1 Replies
4. Shell Programming and Scripting
hi folk i need your help to find one logic....
i have error log same as any other error logs which get populated by no of events and errors...
but i need to grep the last occured errors.. which cant be duplicate.
here is my script.
========================
#!/usr/bin/ksh
grep -i... (3 Replies)
Discussion started by: tapia
3 Replies
5. Red Hat
I have RHEL5.3 that is with the Platform Cluster Manger PCM installation. on master node. Unfortunately some files were deleted from the /var directory and then the postgresql service couldn't start. I have deleted, rm -rf /var/lib/pgsql/data and started the service again now the service is running... (1 Reply)
Discussion started by: ahsanpmd
1 Replies
6. Solaris
Hi all,
Error occurred while making the net-snmp-5.4.4 on Solaris 5.10 version.
Environment
- Solaris 5.10-x86
- Net-SNMP-5.4.4.tar.gz
- Path (/etc/profile)
PATH=/usr/local/bin:$PATH
export PATH
LD_LIBRARY_PATHUSR=/usr/ccs/bin:
export LD_LIBRARY_PATH
Error01 - summary
***... (3 Replies)
Discussion started by: ziosnim
3 Replies
7. AIX
Hi,
When i am trying to read data from tape cassette its giving below error:
tar tvf /dev/rmt0
"tar: 0511-193 An error occurred while reading from the media.
A system call received a parameter that is not valid."
OS: - AIX 6.1
Tape Library : - IBM TS3100
Tape Cassette : - Ultrium LTO... (1 Reply)
Discussion started by: arunmistry
1 Replies
8. Shell Programming and Scripting
Hi ,
I was invoking a sh file using the nohup command. But while invoking, I received a below error.
Error occurred during initialization of VM
Unable to load native library: /u01/libjava.so: cannot open shared object file: No such file or directory
.
Could you please help out.
Regards,... (2 Replies)
Discussion started by: Kamal1108
2 Replies
LEARN ABOUT CENTOS
ne_ssl_set_verify
NE_SSL_SET_VERIFY(3) neon API reference NE_SSL_SET_VERIFY(3)
NAME
ne_ssl_set_verify - register an SSL certificate verification callback
SYNOPSIS
#include <ne_session.h>
typedef int ne_ssl_verify_fn(void *userdata, int failures, const ne_ssl_certificate *cert);
void ne_ssl_set_verify(ne_session *session, ne_ssl_verify_fn verify_fn, void *userdata);
DESCRIPTION
To enable manual SSL certificate verification, a callback can be registered using ne_ssl_set_verify. If such a callback is not registered,
when a connection is established to an SSL server which does not present a certificate signed by a trusted CA (see ne_ssl_trust_cert), or
if the certificate presented is invalid in some way, the connection will fail.
When the callback is invoked, the failures parameter gives a bitmask indicating in what way the automatic certificate verification failed.
The value is equal to the bit-wise OR of one or more of the following constants (and is guaranteed to be non-zero):
NE_SSL_NOTYETVALID
The certificate is not yet valid.
NE_SSL_EXPIRED
The certificate has expired.
NE_SSL_IDMISMATCH
The hostname used for the session does not match the hostname to which the certificate was issued.
NE_SSL_UNTRUSTED
The Certificate Authority which signed the certificate is not trusted.
Note that if either of the NE_SSL_IDMISMATCH or NE_SSL_UNTRUSTED failures is given, the connection may have been intercepted by a third
party, and must not be presumed to be "secure".
The cert parameter passed to the callback represents the certificate which was presented by the server. If the server presented a chain of
certificates, the chain can be accessed using ne_ssl_cert_signedby. The cert object given is not valid after the callback returns.
RETURN VALUE
The verification callback must return zero to indicate that the certificate should be trusted; and non-zero otherwise (in which case, the
connection will fail).
EXAMPLES
The following code implements an example verification callback, using the dump_cert function from ne_ssl_cert_subject to display
certification information. Notice that the hostname of the server used for the session is passed as the userdata parameter to the callback.
static int
my_verify(void *userdata, int failures, const ne_ssl_certificate *cert)
{
const char *hostname = userdata;
dump_cert(cert);
puts("Certificate verification failed - the connection may have been "
"intercepted by a third party!");
if (failures & NE_SSL_IDMISMATCH) {
const char *id = ne_ssl_cert_identity(cert);
if (id)
printf("Server certificate was issued to '%s' not '%s'.
",
id, hostname);
else
printf("The certificate was not issued for '%s'
", hostname);
}
if (failures & NE_SSL_UNTRUSTED)
puts("The certificate is not signed by a trusted Certificate Authority.");
/* ... check for validity failures ... */
if (prompt_user())
return 1; /* fail verification */
else
return 0; /* trust the certificate anyway */
}
int
main(...)
{
ne_session *sess = ne_session_create("https", "some.host.name", 443);
ne_ssl_set_verify(sess, my_verify, "some.host.name");
...
}
SEE ALSO
ne_ssl_trust_cert, ne_ssl_readable_dname, ne_ssl_cert_subject
AUTHOR
Joe Orton <neon@lists.manyfish.co.uk>
Author.
COPYRIGHT
neon 0.30.0 31 July 2013 NE_SSL_SET_VERIFY(3)