"openssl verify" does the trick.

http://www.openssl.org/docs/apps/verify.html#

And to test if the key and the cert belong together:

openssl x509 -in $cert -noout -modulus | openssl md5

openssl rsa -in $key -noout -modulus | openssl md5

If the md5 sums don't match, the key or the cert is invalid.

Cu

Am 20.06.2013 um 18:04 schrieb "Rodney Simioni" <rodney.simi...@verio.net>:

> Hi,
>  
> A key/pair was sent to me from my admin  and it looked like it came from 
> GeoTrust. It’s a wildcard cert.
>  
> I downloaded the Root CA  from  GeoTrust ‘s web site because LDAP requires 
> the CA file.
>  
> What command do I use to make sure the key/pair that was sent to me is 
> compatible with GeoTrust’s CA?
>  
> Rod
> 
> 
> This email message is intended for the use of the person to whom it has been 
> sent, and may contain information that is confidential or legally protected. 
> If you are not the intended recipient or have received this message in error, 
> you are not authorized to copy, distribute, or otherwise use this message or 
> its attachments. Please notify the sender immediately by return e-mail and 
> permanently delete this message and any attachments. Verio Inc. makes no 
> warranty that this email is error or virus free. Thank you.
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to