In message <00a101c29bb4$e832ff30$2102000a@downtown> on Wed, 4 Dec 2002 11:47:59 
-0500, "Chad Morland" <[EMAIL PROTECTED]> said:

chad.morland>  [11:45am]# openssl verify server.crt
chad.morland> server.crt: unable to load certificate file
chad.morland> 18589:error:0D0A2007:asn1 encoding routines:d2i_X509_CINF:expecting an
chad.morland> asn1
chad.morland> sequence:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/as
chad.morland> n1/x_cinf.c:106:address=134852610 offset=0
chad.morland> 18589:error:0D09F004:asn1 encoding routines:d2i_X509:nested asn1
chad.morland> error:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/asn1/
chad.morland> x_x509.c:103:address=134852608 offset=2
chad.morland> 18589:error:0906700D:PEM routines:PEM_ASN1_read_bio:ASN1
chad.morland> lib:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/pem/pem
chad.morland> _lib.c:291:

The certificate is wrapped in a PKCS#7 structure.  You can easily see
that if you do 'openssl asn1parse -in server.crt -i'.  So, what you
need to do is to extract the certificate, like this:

openssl pkcs7 -in server.crt -print_certs -out server.pem

Then you can verify it:

openssl verify server.pem

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to