Through 1.0.1, put the CRL in PEM format in CAfile (specified or defaulted)
or in CApath (ditto) named or linked as $hash.r$num (c_rehash can do for you). I've never seen a CA distribute PEM so you almost certainly need to convert. And specify -crl_check or -crl_check_all (see the man page or -?). 1.0.2 apparently has new capabilities in this area but I haven't looked yet. From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Lakshmi Reguna Sent: Friday, March 28, 2014 14:16 To: openssl-users@openssl.org Subject: *** Spam *** Enabling s_server to use a local CRL file Hi, I would like to know how I can specify s_server to use a local CRL file. Do I need to specify a LDAP CRL distribution field in the certificate which is being checked against the CRL ? Thanks, Lakshmi. _____ *** Please note that this message and any attachments may contain confidential and proprietary material and information and are intended only for the use of the intended recipient(s). If you are not the intended recipient, you are hereby notified that any review, use, disclosure, dissemination, distribution or copying of this message and any attachments is strictly prohibited. If you have received this email in error, please immediately notify the sender and destroy this e-mail and any attachments and all copies, whether electronic or printed. Please also note that any views, opinions, conclusions or commitments expressed in this message are those of the individual sender and do not necessarily reflect the views of Fortinet, Inc., its affiliates, and emails are not binding on Fortinet and only a writing manually signed by Fortinet's General Counsel can be a binding commitment of Fortinet to Fortinet's customers or partners. Thank you. *** _____