Hello,
> I'm working on an application that recieves an x509 certificate along
> with a request.  I want to confirm that the certificate has not been
> altered (perhaps to change the "not_after" time).
> 
> Does the following command give this confirmation:
> 
> $ openssl verify -CAfile trusted.cert test.cert
Yes, this command performs default certificate verification
based on CA certificate. This means that digital signature
is checked (which proofs that certificate is not altered)
and next some certificate fields are verified (like certificate
valid time range).

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to