NE_SSL_LOAD_CA(3) neon API reference NE_SSL_LOAD_CA(3)NAME
ne_ssl_load_ca, ne_ssl_load_default_ca - load SSL Certificate Authorities
SYNOPSIS
#include <ne_session.h>
int ne_ssl_load_ca (ne_session *session, const char *filename);
int ne_ssl_load_default_ca (ne_session *session);
DESCRIPTION
To indicate that a given CA certificate is trusted by the user, the certificate can be loaded using the ne_ssl_load_ca function. The file-
name parameter given must specify the location of a PEM-encoded CA certificate.
The SSL library in use by neon may include a default set of CA certificates; calling the ne_ssl_load_default_ca function will indicate that
these CAs are trusted by the user.
If no CA certificates are loaded, or the server presents a certificate which is invalid in some way, then the certificate must be manually
verified (see ne_ssl_set_verify(3)), otherwise the connection will fail.
RETURN VALUE
Both ne_ssl_load_ca and ne_ssl_load_default_ca functions return 0 on success, or non-zero on failure.
EXAMPLES
Load the CA certificate stored in /path/to/cacert.pem:
ne_session *sess = ne_session_create(...);
if (ne_ssl_load_ca(sess, "/path/to/cacert.pem")) {
printf("Could not load CA cert: %s
", ne_get_error(sess));
}
SEE ALSO ne_get_error(3), ne_ssl_set_verify(3)AUTHOR
Joe Orton <neon@webdav.org>.
neon 0.23.5 8 October 2002 NE_SSL_LOAD_CA(3)
Check Out this Related Man Page
NE_SSL_TRUST_CERT(3) neon API reference NE_SSL_TRUST_CERT(3)NAME
ne_ssl_trust_cert, ne_ssl_trust_default_ca - functions to indicate that certificates are trusted
SYNOPSIS
#include <ne_session.h>
void ne_ssl_trust_cert(ne_session *session, const ne_ssl_certificate *cert);
void ne_ssl_trust_default_ca(ne_session *session);
DESCRIPTION
To indicate that a given certificate is trusted by the user, the certificate object can be passed to ne_ssl_trust_cert. The certificate
object is duplicated internally and can subsequently be destroyed.
The SSL library in use by neon may include a default set of CA certificates; calling the ne_ssl_trust_default_ca function will indicate
that these CAs are trusted by the user.
EXAMPLES
Load the CA certificate stored in /path/to/cacert.pem:
ne_session *sess = ne_session_create(...);
ne_ssl_certificate *cert = ne_ssl_cert_read("/path/to/cacert.pem");
if (cert) {
ne_ssl_trust_cert(sess, cert);
ne_ssl_cert_free(cert);
} else {
printf("Could not load CA cert: %s
", ne_get_error(sess));
}
SEE ALSO
ne_ssl_cert_read, ne_ssl_cert_import, ne_ssl_cert_free
AUTHOR
Joe Orton <neon@lists.manyfish.co.uk>
Author.
COPYRIGHT neon 0.29.6 3 May 2011 NE_SSL_TRUST_CERT(3)
Hello,
I'm a very basic beginning user of OpenBSD. I'd like to install neon-0.26.3.
I placed it on our server but I don't know how to install it.
The directory has the following contain:
# ls
.package AUTHORS ChangeLog.CVS NEWS TODO ... (1 Reply)
Hi,
we are having the installed cerificates in our unix server's.
The certificates are in following format : cacert.pem,cert8.db,ois294.sem,CertGenCAKey.der,ss_keystore.jks
So i want to know the Expiry date for these certificates. how to get the valid FROM to TO dates for these kind of... (1 Reply)
Hello everybody
Hope somebody can help me
I'm trying to install SSL Certificate on Apache/mod_ssl on Linux with Zend for Oracle.
I bought and downloaded certificate from certificate from Network Solutions. Than I followed the instructions to the dot.
I created a directory for certificate... (2 Replies)
Hi Techies,
Setup details -
1. H/W Load Balancer
2. Two Apache Servers with load balancing and rewrite rule
3. Two Application servers
Request will be travel 1 then 2 then 3
Queries -
1. When any session is established I can see that requests of that session is going to both... (0 Replies)