LinuxCommandLibrary

openssl-verify

TLDR

Verify certificate

$ openssl verify [certificate.crt]
copy
Verify with CA file
$ openssl verify -CAfile [ca.crt] [certificate.crt]
copy
Verify with CA directory
$ openssl verify -CApath [/etc/ssl/certs/] [certificate.crt]
copy
Verify certificate chain
$ openssl verify -CAfile [ca.crt] -untrusted [intermediate.crt] [leaf.crt]
copy
Show verification details
$ openssl verify -verbose [certificate.crt]
copy

SYNOPSIS

openssl verify [options] cert...

DESCRIPTION

openssl verify verifies certificate chains against trusted CAs. It checks signatures, validity periods, and trust chains.
Returns 0 for valid certificates, non-zero for invalid.

PARAMETERS

-CAfile file

CA certificate file.
-CApath dir
CA certificate directory.
-untrusted file
Untrusted intermediates.
-partial_chain
Allow partial chain.
-verbose
Verbose output.
-x509_strict
Strict X.509 checking.
-attime time
Verification time.
-purpose purpose
Certificate purpose.

VERIFICATION CHECKS

$ - Signature validity
- Validity period
- Trust chain to CA
- Key usage
- Certificate purpose
copy

EXAMPLE

$ # Verify server certificate
openssl verify -CAfile ca-bundle.crt server.crt
# Output: server.crt: OK
copy

CAVEATS

Doesn't check revocation by default. System CA store location varies. Use -verbose for diagnostic info.

HISTORY

Certificate verification is fundamental to PKI, with openssl verify providing command-line access to OpenSSL's verification functions.

SEE ALSO

Copied to clipboard