01-07-2011
The "per domain" certificate may be your root CA certificate?
1. The certificate can be used for various services on the one server, with the proviso below.
2. The host name in the certificate needs to match the FQDN that users will use to access the service the certificate is for.
This User Gave Thanks to TonyFullerMalv For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
My current SSL certificate is about to expire in a couple days so I got a new one via Godaddy and need to install the new one. My server is running Centos 4.x with Blue quartz as the backend. Now BQ does have an SSL import option via the GUI but I'm not sure what route to take to import the... (1 Reply)
Discussion started by: mcraul
1 Replies
2. Web Development
Hello everybody
Hope somebody can help me
I'm trying to install SSL Certificate on Apache/mod_ssl on Linux with Zend for Oracle.
I bought and downloaded certificate from certificate from Network Solutions. Than I followed the instructions to the dot.
I created a directory for certificate... (2 Replies)
Discussion started by: Trusevich
2 Replies
3. Web Development
Dear All
Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies
4. AIX
Hello,
I am new in UNIX, and some one asks me to install SSL certificates to allow exchange with an external system.
Can someone tell how to install certificate (ex : verisignxxx.cer) on a UNIX server?
Many thanks.
Tibo (4 Replies)
Discussion started by: tibo51
4 Replies
5. Web Development
we are doing TCP for our systems. I have a working SSL certificate on prodction webserver. Im planning to export it to our DR server for TCP purposes. However when I export based on the procedure below, it doesn't work. When I restart the DR webserver, it still says the certifcate is expired.Any... (1 Reply)
Discussion started by: lhareigh890
1 Replies
6. Red Hat
Hi,
I want to renew the ssl certificate for one of my application on tomcat without down time. I want to know what would the possible impacts for the users who currently have sessions to the app.
Regards,
Arumon (1 Reply)
Discussion started by: arumon
1 Replies
7. Red Hat
Hi guys,
I'm trying to generate a key using the genkey command in centos 6.4 and RHEL6.4, Every thing seems to go cool but I get this error message bad certificate request error -8016 and no key/cert is generated. I don't want use the many openssl(s) commands instead since genkey is a shourtcut... (4 Replies)
Discussion started by: leo_ultra_leo
4 Replies
8. Cybersecurity
Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right?
If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies
9. Web Development
Hello!
I had a cron job running on my website, activating a php script every friday. The Php script just activated another photo to add in the gallery. It worked fine until I got an SSL certificate for my website, then everything broke.
This was the command before:
lynx -source... (0 Replies)
Discussion started by: AGDesign
0 Replies
LEARN ABOUT PLAN9
ssl_get_peer_certificate
SSL_get_peer_certificate(3SSL) OpenSSL SSL_get_peer_certificate(3SSL)
NAME
SSL_get_peer_certificate - get the X509 certificate of the peer
SYNOPSIS
#include <openssl/ssl.h>
X509 *SSL_get_peer_certificate(const SSL *ssl);
DESCRIPTION
SSL_get_peer_certificate() returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is
returned.
NOTES
Due to the protocol definition, a TLS/SSL server will always send a certificate, if present. A client will only send a certificate when
explicitly requested to do so by the server (see SSL_CTX_set_verify(3)). If an anonymous cipher is used, no certificates are sent.
That a certificate is returned does not indicate information about the verification state, use SSL_get_verify_result(3) to check the
verification state.
The reference count of the X509 object is incremented by one, so that it will not be destroyed when the session containing the peer
certificate is freed. The X509 object must be explicitly freed using X509_free().
RETURN VALUES
The following return values can occur:
NULL
No certificate was presented by the peer or no connection was established.
Pointer to an X509 certificate
The return value points to the certificate presented by the peer.
SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_CTX_set_verify(3)
1.0.1e 2013-02-11 SSL_get_peer_certificate(3SSL)