your certificate is signed you simply need to verify the signature with the
verify command.

openssl verify -CAfile "yourca.cert" your.cert

if you have a deeper certification path you must contatenate all the certs
in path into a .lst file which contains the PEM certificates one after
other.

I hope to be helpfull and clear with my english.

Greetings

2009/12/26 Timothy Little <t...@clawhaven.com>

>  Sorry for a newbie question, but I have been unable to find an answer for
> this.
>
>
>
> I (think that I) have created the certs and keys necessary for SSL
> connections between a client and the servers of a MySQL database.  But I
> can't bring down those servers except to make the change.
>
>
>
> Is there a way I can tell if the keys and all the PEMs I'd made are
> correctly generated and copied to the right machines via some other utility?
>
>
>
>
> I was hoping to do something like a telnet -ssl-key=blah to-server
> blah...  So I could test the keys and stuff via telnet or something easy.
>
>
>
> Does openssl have a test for that?
>
>
>
> I can't install apache.
>
>
>
> Thanks,
>
> Tim...
>
>
>
>
>
> *
> -----------------------------------------------------------------------------
> *
>
> *Timothy John Little
> *39-12 211th Street, Apt 2
> Bayside, NY 11361
>
>
>
> *Cell*        *(347) 804-3410*   *e-mail*   t...@clawhaven.com
> *Home*   *(718) 631-2774*   *Website *http://www.clawhaven.com
>
> LinkedIn Profile <http://www.linkedin.com/in/mysqlpro>
>
>
>
>
>



-- 
"Hay que darle un sentido a la vida por el hecho mismo de que la vida carece
de sentido."

Reply via email to