"openssl verify" does the trick. http://www.openssl.org/docs/apps/verify.html#
And to test if the key and the cert belong together: openssl x509 -in $cert -noout -modulus | openssl md5 openssl rsa -in $key -noout -modulus | openssl md5 If the md5 sums don't match, the key or the cert is invalid. Cu Am 20.06.2013 um 18:04 schrieb "Rodney Simioni" <rodney.simi...@verio.net>: > Hi, > > A key/pair was sent to me from my admin and it looked like it came from > GeoTrust. It’s a wildcard cert. > > I downloaded the Root CA from GeoTrust ‘s web site because LDAP requires > the CA file. > > What command do I use to make sure the key/pair that was sent to me is > compatible with GeoTrust’s CA? > > Rod > > > This email message is intended for the use of the person to whom it has been > sent, and may contain information that is confidential or legally protected. > If you are not the intended recipient or have received this message in error, > you are not authorized to copy, distribute, or otherwise use this message or > its attachments. Please notify the sender immediately by return e-mail and > permanently delete this message and any attachments. Verio Inc. makes no > warranty that this email is error or virus free. Thank you. >
smime.p7s
Description: S/MIME cryptographic signature