Through 1.0.1, put the CRL in PEM format in CAfile (specified or defaulted) 

or in CApath (ditto) named or linked as $hash.r$num (c_rehash can do for
you).

I've never seen a CA distribute PEM so you almost certainly need to convert.

And specify -crl_check or -crl_check_all (see the man page or -?).

 

1.0.2 apparently has new capabilities in this area but I haven't looked yet.

 

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Lakshmi Reguna
Sent: Friday, March 28, 2014 14:16
To: openssl-users@openssl.org
Subject: *** Spam *** Enabling s_server to use a local CRL file

 

Hi,

 

 I would like to know how I can specify s_server to use a local CRL file. Do
I need to specify a LDAP CRL distribution field in the certificate which is
being checked against the CRL ? 

 

Thanks,

Lakshmi. 

 

  _____  

*** Please note that this message and any attachments may contain
confidential and proprietary material and information and are intended only
for the use of the intended recipient(s). If you are not the intended
recipient, you are hereby notified that any review, use, disclosure,
dissemination, distribution or copying of this message and any attachments
is strictly prohibited. If you have received this email in error, please
immediately notify the sender and destroy this e-mail and any attachments
and all copies, whether electronic or printed. Please also note that any
views, opinions, conclusions or commitments expressed in this message are
those of the individual sender and do not necessarily reflect the views of
Fortinet, Inc., its affiliates, and emails are not binding on Fortinet and
only a writing manually signed by Fortinet's General Counsel can be a
binding commitment of Fortinet to Fortinet's customers or partners. Thank
you. *** 

  _____  

Reply via email to