At 10:37 AM 1/12/2004 +0100, Thomas writeth: >Hi, > >I created a new certificate with 'CA.pl -newcert', and made a verify with >'CA.pl -verify newreq.pem' >The result is: >newreq.pem: /C=DE/ST=GERMANY/L=CITY/O=company/OU=company/CN=server.company.de/ >[EMAIL PROTECTED] >error 18 at 0 depth lookup:self signed certificate >OK > >I removed the private key with 'openssl rsa -in newreq.pem -out slapd.key.pem' > >When I now try to verify with 'CA.pl -verify slapd-key.pem', I get the answer > >"unable to load certificate >16175:error:0906D06C:PEM routines:PEM_read_bio:no start >line:pem_lib.c:632:Expecting: TRUSTED CERTIFICATE" > >What did I do wrong ?
What is your OPENSSL_CONF environment variable set to? You have to set up OPENSSL_CONF to point at the directory where "openssl.cnf" is located. If it already does, then I don't know the answer. I had a similar problem with Win32 OpenSSL until I used SysInternal's FileMon utility to track it down. Hope this helps! Thomas J. Hruska -- [EMAIL PROTECTED] Shining Light Productions -- "Meeting the needs of fellow programmers" http://www.slproweb.com/ `'*-~.,_,.~-*'`'*-~.,_,.~-*'`'*-~.,_,.~-*'`'*-~.,_,.~-*'`'*-~.,_,.~-*'`'*-~ Tired of programming languages that are expensive or difficult to use? Try Nuclear Vision today! http://www.slproweb.com/products/nvml.html Announcing Nuclear Vision v2.0, the 100% HTML-style scripting language. Easy to learn, easy to use. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]