Hi Matthias,
Thanks for the response. For connecting to ESXi, I couldn't find any
environment setting to make 'curl' point to the client certificates. So,
for the time being, I hard-coded the location in
libvirt-/src/esx/esx_vi.c.
esx_vi.c:curl_easy_setopt(curl->handle, CURLOPT_SSLCERT,
"/e
2013/10/30 Shiva Bhanujan :
> Hi Daniel,
>
> thanks for the reply - The procedure I use is the same as I use for
> XenServer, and the certificate exchange works just fine. The only thing I'm
> a bit unclear on, is the location of the CA cert, which in the case of
> XenServer, I simply put it in /e
Hi Daniel,
thanks for the reply - The procedure I use is the same as I use for
XenServer, and the certificate exchange works just fine. The only thing
I'm a bit unclear on, is the location of the CA cert, which in the case of
XenServer, I simply put it in /etc/pki/CA. And when I start the libvir
On Tue, Oct 29, 2013 at 06:48:46PM -0700, Shiva Bhanujan wrote:
> Hello,
>
> I'm using certtool to generate the server certificates for ESXi -
> http://libvirt.org/remote.html#Remote_TLS_CA. I just copy the server
> certificate and key as /etc/vmware/ssl/rui.crt and /etc/vmware/ssl/rui.key.
> An
Hello,
I'm using certtool to generate the server certificates for ESXi -
http://libvirt.org/remote.html#Remote_TLS_CA. I just copy the server
certificate and key as /etc/vmware/ssl/rui.crt and /etc/vmware/ssl/rui.key.
And then use virsh to connect from a CentOS 6.4 VM running on it - "virsh
-c e