7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am trying to create a bash script that will create new function by using the user input. The below will create the necessary files in the correct format, however when it comes to the # create function I am at a loss.
If the name entered was NEWNAME and the genes were GENE1,GENE2 then two files... (0 Replies)
Discussion started by: cmccabe
0 Replies
2. Shell Programming and Scripting
Hi I am new to shell scripting,
Can you please help me in writing a script that can switch user in same server with different user name and same password.
I want to perform some functional task in a particular user and need to switch user and perform same activity in another user and so on ...
... (4 Replies)
Discussion started by: Dew
4 Replies
3. UNIX for Advanced & Expert Users
I'm a teacher who teaching computer programming languages.
Generally, I give each student a username in a Linux Server. Then each student use his username to login the Server and program their programming task by putty or secureCRT and so on.
But one fact had bothered me for a long... (9 Replies)
Discussion started by: cqlouis
9 Replies
4. Shell Programming and Scripting
i have a problem with the code I created (see below).
a. when I logged in as root and su to tomcat, i can execute all options. when I press X, it will exit properly.
b. when I logged in directly as user1, I can execute also all options. if I press X i will logout automatically to putty.... (2 Replies)
Discussion started by: lhareigh890
2 Replies
5. AIX
When I use SecureCRT software to connect with AIX servers, don't know why sessions always be kicked out from the SecureCRT if I don't do anything in a few minutes. I think this maybe the SecureCRT configuraiton problem, Who knows how to keep session conect even through I don't do anything?
... (3 Replies)
Discussion started by: rainbow_bean
3 Replies
6. Shell Programming and Scripting
Post has been removed. Prakash K :) (0 Replies)
Discussion started by: bullz26
0 Replies
7. Solaris
hello
any way to avoid the fingerprint authenticity step when I ssh the first time to a server by always setting a 'yes' as a default answer?
thanks (10 Replies)
Discussion started by: melanie_pfefer
10 Replies
C_REHASH(1SSL) OpenSSL C_REHASH(1SSL)
NAME
c_rehash - Create symbolic links to files named by the hash values
SYNOPSIS
c_rehash [directory] ...
DESCRIPTION
c_rehash scans directories and takes a hash value of each .pem and .crt file in the directory. It then creates symbolic links for each of
the files named by the hash value. This is useful as many programs require directories to be set up like this in order to find the
certificates they require.
If any directories are named on the command line then these directories are processed in turn. If not then and the environment variable
SSL_CERT_DIR is defined then that is consulted. This variable should be a colon (:) separated list of directories, all of which will be
processed. If neither of these conditions are true then /usr/lib/ssl/certs is processed.
For each directory that is to be processed he user must have write permissions on the directory, if they do not then nothing will be
printed for that directory.
Note that this program deletes all the symbolic links that look like ones that it creates before processing a directory. Beware that if you
run the program on a directory that contains symbolic links for other purposes that are named in the same format as those created by this
program they will be lost.
The hashes for certificate files are of the form <hash>.<n> where n is an integer. If the hash value already exists then n will be
incremented, unless the file is a duplicate. Duplicates are detected using the fingerprint of the certificate. A warning will be printed if
a duplicate is detected. The hashes for CRL files are of the form <hash>.r<n> and have the same behavior.
The program will also warn if there are files with extension .pem which are not certificate or CRL files.
The program uses the openssl program to compute the hashes and fingerprints. It expects the executable to be named openssl and be on the
PATH, or in the /usr/lib/ssl/bin directory. If the OPENSSL environment variable is defined then this is used instead as the executable that
provides the hashes and fingerprints. When called as $OPENSSL x509 -hash -fingerprint -noout -in $file it must output the hash of $file on
the first line followed by the fingerprint on the second line, optionally prefixed with some text and an equals sign (=).
OPTIONS
None
ENVIRONMENT
OPENSSL
The name (and path) of an executable to use to generate hashes and fingerprints (see above).
SSL_CERT_DIR
Colon separated list of directories to operate on. Ignored if directories are listed on the command line.
SEE ALSO
openssl(1), x509(1)
BUGS
No known bugs
1.0.0e 2013-02-18 C_REHASH(1SSL)