lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <42C3A002.9070302@davewking.com>
Date: Thu Jun 30 08:32:34 2005
From: davefd at davewking.com (Dave King)
Subject: verify ssl cert command line

Sorry about the messed up subject.  I realized it right after I sent 
it.  Anyways, thanks for the advice and I think I can use openssl 
s_client to do what I need, I had considered openssl verify but I'm 
going to have to check a bunch of certs and didn't want to have to deal 
with downloading and storing certs tempararily to check them if possible.

Thanks,
Dave

Harry Hoffman wrote:

> openssl s_client -connect host:port
>
> will tell you if the cert is not valid
>
> Dave wrote:
>
>> Hi All-
>>    I need a command line tool that will verify that an SSL cert is 
>> valid, much like the check a browser performs.  I'm pretty sure I 
>> could hack one using the SSLeay perl module, but if one's already 
>> available, I'd rather use that.  If nobody knows of one, but has some 
>> tips on how to use SSLeay or some other library to check certs then 
>> I'd appreciate any advice.
>
>
>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ