You will need to be a lot more specific - this works fine openssl s_client -connect localhost:443 | openssl x509 -noout -text Can't use SSL_get_servername depth=0 C = US, ST = TX, L = Somewhere, O = MarkHack, OU = Test, CN = fakeserver.com verify error:num=18:self signed certificate verify return:1 depth=0 C = US, ST = TX, L = Somewhere, O = MarkHack, OU = Test, CN = fakeserver.com verify return:1 Certificate: Data: Version: 3 (0x2) Serial Number: 5d:72:e6:0c:24:3f:97:7f:66:09:f6:a5:f7:f8:96:95:ed:cb:26:59 Signature Algorithm: sha512WithRSAEncryption Issuer: C = US, ST = TX, L = Somewhere, O = MarkHack, OU = Test, CN = fakeserver.com Validity Not Before: Apr 22 14:22:50 2021 GMT Not After : Apr 22 14:22:50 2022 GMT Subject: C = US, ST = TX, L = Somewhere, O = MarkHack, OU = Test, CN = fakeserver.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (4096 bit) Modulus: 00:b8:c0:72:0e:81:ec:49:fd:6d:06:c2:15:1c:a7: .... cf:5c:cb Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: 7A:E4:80:D6:86:BF:03:BE:3C:16:C6:99:B7:66:BE:CE:52:F7:96:F2 X509v3 Authority Key Identifier: keyid:7A:E4:80:D6:86:BF:03:BE:3C:16:C6:99:B7:66:BE:CE:52:F7:96:F2 X509v3 Basic Constraints: critical CA:TRUE Signature Algorithm: sha512WithRSAEncryption 27:1e:c7:f4:7a:7e:43:39:1f:3d:8b:08:94:67:bf:9d:e9:38: .... a5:fb:21:9c:d7:f5:28:67 On Thu, 2021-04-22 at 18:22 +0530, Vadivel P wrote:
|