Linux and UNIX Man Pages

Test Your Knowledge in Computers #954
Difficulty: Easy
Boot sector viruses specifically target the boot sector and/or the Master Boot Record (MBR) of the infected host's hard disk drive, solid-state drive, or removable storage media (flash drives, floppy disks, etc.).
True or False?
Linux & Unix Commands - Search Man Pages

ssl_set_verify_result(3) [opendarwin man page]

SSL_set_verify_result(3)					      OpenSSL						  SSL_set_verify_result(3)

NAME
SSL_set_verify_result - override result of peer certificate verification SYNOPSIS
#include <openssl/ssl.h> void SSL_set_verify_result(SSL *ssl, long verify_result); DESCRIPTION
SSL_set_verify_result() sets verify_result of the object ssl to be the result of the verification of the X509 certificate presented by the peer, if any. NOTES
SSL_set_verify_result() overrides the verification result. It only changes the verification result of the ssl object. It does not become part of the established session, so if the session is to be reused later, the original value will reappear. The valid codes for verify_result are documented in verify(1). RETURN VALUES
SSL_set_verify_result() does not provide a return value. SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_get_peer_certificate(3), verify(1) 0.9.7d 2002-04-30 SSL_set_verify_result(3)

Check Out this Related Man Page

SSL_set_verify_result(3SSL)					      OpenSSL					       SSL_set_verify_result(3SSL)

NAME
SSL_set_verify_result - override result of peer certificate verification SYNOPSIS
#include <openssl/ssl.h> void SSL_set_verify_result(SSL *ssl, long verify_result); DESCRIPTION
SSL_set_verify_result() sets verify_result of the object ssl to be the result of the verification of the X509 certificate presented by the peer, if any. NOTES
SSL_set_verify_result() overrides the verification result. It only changes the verification result of the ssl object. It does not become part of the established session, so if the session is to be reused later, the original value will reappear. The valid codes for verify_result are documented in verify(1). RETURN VALUES
SSL_set_verify_result() does not provide a return value. SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_get_peer_certificate(3), verify(1) 1.0.1e 2013-02-11 SSL_set_verify_result(3SSL)

3 More Discussions You Might Find Interesting

1. Programming

setting netbeans to ignore from expired ssl certificate

Hi, I am not sure this is the correct section. My question is not directly about programming about developing IDE. I am using netbeans to develop my project. I created a new project from a remote server. I have set all the details. One problem is that the server ssl has already expired... (0 Replies)
Discussion started by: programAngel
0 Replies

2. Solaris

Version of OpenSSL being used

Hello I'm relatively new to technologies like Apache & ssl but have some years experience with Unix. My question concerns the version of OpenSSL which is genuinely being used on our server & how is that set. The server is running Solaris 10. I'll show output from various commands: ... (1 Reply)
Discussion started by: CHoggarth
1 Replies

3. UNIX for Beginners Questions & Answers

How to check ssl certificate expiry date using openssl command?

hi how to check ssl certificate expiry date using openssl command try below code it is not working, any help echo q | openssl s_client -connect akamai.com:443 | openssl x509 -noout -enddate socket: Bad file descriptor connect:errno=9 unable to load certificate... (0 Replies)
Discussion started by: raghur77
0 Replies

Featured Tech Videos