your certificate is signed you simply need to verify the signature with the verify command.
openssl verify -CAfile "yourca.cert" your.cert if you have a deeper certification path you must contatenate all the certs in path into a .lst file which contains the PEM certificates one after other. I hope to be helpfull and clear with my english. Greetings 2009/12/26 Timothy Little <t...@clawhaven.com> > Sorry for a newbie question, but I have been unable to find an answer for > this. > > > > I (think that I) have created the certs and keys necessary for SSL > connections between a client and the servers of a MySQL database. But I > can't bring down those servers except to make the change. > > > > Is there a way I can tell if the keys and all the PEMs I'd made are > correctly generated and copied to the right machines via some other utility? > > > > > I was hoping to do something like a telnet -ssl-key=blah to-server > blah... So I could test the keys and stuff via telnet or something easy. > > > > Does openssl have a test for that? > > > > I can't install apache. > > > > Thanks, > > Tim... > > > > > > * > ----------------------------------------------------------------------------- > * > > *Timothy John Little > *39-12 211th Street, Apt 2 > Bayside, NY 11361 > > > > *Cell* *(347) 804-3410* *e-mail* t...@clawhaven.com > *Home* *(718) 631-2774* *Website *http://www.clawhaven.com > > LinkedIn Profile <http://www.linkedin.com/in/mysqlpro> > > > > > -- "Hay que darle un sentido a la vida por el hecho mismo de que la vida carece de sentido."