> From: owner-openssl-us...@openssl.org On Behalf Of Rodney Simioni
> Sent: Friday, 21 June, 2013 11:38
> Comments below.
>
> From: owner-openssl-us...@openssl.org On Behalf Of Dave Thompson
> Sent: Thursday, June 20, 2013 6:24 PM
> The wildcard.securesites.com.cert you posted 6/19 has
> Issuer:
Comments below.
-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org]
On Behalf Of Dave Thompson
Sent: Thursday, June 20, 2013 6:24 PM
To: openssl-users@openssl.org; openldap-techni...@openldap.org
Subject: RE: Is my process correct.: openldap
"openssl verify" does the trick.
http://www.openssl.org/docs/apps/verify.html#
And to test if the key and the cert belong together:
openssl x509 -in $cert -noout -modulus | openssl md5
openssl rsa -in $key -noout -modulus | openssl md5
If the md5 sums don't match, the key or the cert is inval
>From: owner-openssl-us...@openssl.org On Behalf Of Rodney Simioni
>Sent: Thursday, 20 June, 2013 12:04
>A key/pair was sent to me from my admin and it looked like it came
>from GeoTrust. It's a wildcard cert.
A privatekey (which in most formats including openssl's is
really a keypair) and a m
Hi,
A key/pair was sent to me from my admin and it looked like it came from
GeoTrust. It's a wildcard cert.
I downloaded the Root CA from GeoTrust 's web site because LDAP
requires the CA file.
What command do I use to make sure the key/pair that was sent to me is
compatible with Geo