OpenSSL: Check If Private Key Matches SSL Certificate & CSR

When you are dealing with lots of different SSL Certificates, it is quite easy to forget which certificate goes with which Private Key.

Or, for example, which CSR has been generated using which Private Key.

From the Linux command line, you can easily check whether an SSL Certificate or a CSR match a Private Key using the OpenSSL utility.

To make sure that the files are compatible, you can print and compare the values of the SSL Certificate modulus, the Private Key modulus and the CSR modulus.

Cool Tip: Check the expiration date of the SSL Certificate from the Linux command line! The fastest way! Read more →

Check Compatibility


When you create a Private Key and CSR to obtain an SSL Certificate, OpenSSL generates some internal data called a modulus.


OpenSSL stores the modulus in the Private Key, as well as in the CSR and therefore in the SSL Certificate itself.

If you are using either the incorrect Private Key or the SSL Certificate – you will receive an error as follows: [error] Unable to configure RSA server Private Key [error] SSL Library Error: x509 certificate routines:X509_check_private_key:key values mismatch.

So if you got the similar error – it is time to check whatever your Private Key matches the SSL Certificate by comparing their modulus.

[Error] … key values mismatch: Your Private Key and SSL Certificate must contain the same modulus, otherwise the web-server won’t start.

Let’s print the values of the modulus of the Private Key, the SSL Certificate and the CSR with the conversion of them to md5 hashes to make the comparison more convenient.

Print the md5 hash of the SSL Certificate modulus:

$ openssl x509 -noout -modulus -in CERTIFICATE.crt | openssl md5

Print the md5 hash of the CSR modulus:

$ openssl req -noout -modulus -in CSR.csr | openssl md5

Print the md5 hash of the Private Key modulus:

$ openssl rsa -noout -modulus -in PRIVATEKEY.key | openssl md5

Cool Tip: Check the quality of your SSL certificate! Find out its Key length from the Linux command line! Read more →

If the md5 hashes are the same, then the files (SSL Certificate, Private Key and CSR) are compatible.

0 (0)
Article Rating (No Votes)
Rate this article
There are no attachments for this article.
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
stunnel basics and pki standards
Viewed 9116 times since Fri, Sep 28, 2018
Improve security with polyinstantiation
Viewed 12428 times since Fri, May 15, 2020
Linux Add a Swap File – HowTo
Viewed 9749 times since Fri, Jun 8, 2018
RHEL: Services basic management - systemd
Viewed 17949 times since Sat, Jun 2, 2018
ZFS: Snapshots and clones on zfs filesystems
Viewed 2734 times since Sun, Jun 3, 2018
Linux PAM configuration that allows or deny login via the sshd server
Viewed 1449 times since Wed, Oct 3, 2018
Use inotify-tools on CentOS 7 or RHEL 7 to watch files and directories for events
Viewed 13325 times since Fri, Jul 27, 2018
Enabling or disabling a repository using Red Hat Subscription Management
Viewed 6865 times since Mon, Oct 29, 2018
RHEL: Handling SCSI disks
Viewed 11292 times since Sun, May 27, 2018
Tcpdump Examples Linux
Viewed 5475 times since Fri, Nov 16, 2018