In message <00a101c29bb4$e832ff30$2102000a@downtown> on Wed, 4 Dec 2002 11:47:59
-0500, "Chad Morland" <[EMAIL PROTECTED]> said:
chad.morland> [11:45am]# openssl verify server.crt
chad.morland> server.crt: unable to load certificate file
chad.morland> 18589:error:0D0A2007:asn1 encoding routines:d2i_X509_CINF:expecting an
chad.morland> asn1
chad.morland> sequence:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/as
chad.morland> n1/x_cinf.c:106:address=134852610 offset=0
chad.morland> 18589:error:0D09F004:asn1 encoding routines:d2i_X509:nested asn1
chad.morland> error:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/asn1/
chad.morland> x_x509.c:103:address=134852608 offset=2
chad.morland> 18589:error:0906700D:PEM routines:PEM_ASN1_read_bio:ASN1
chad.morland> lib:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/pem/pem
chad.morland> _lib.c:291:
The certificate is wrapped in a PKCS#7 structure. You can easily see
that if you do 'openssl asn1parse -in server.crt -i'. So, what you
need to do is to extract the certificate, like this:
openssl pkcs7 -in server.crt -print_certs -out server.pem
Then you can verify it:
openssl verify server.pem
--
Richard Levitte \ Spannv�gen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken \ S-168 35 BROMMA \ T: +46-8-26 52 47
\ SWEDEN \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]