File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / src / pki / man / pki---verify.1.in
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 09:46:44 2020 UTC (4 years, 3 months ago) by misho
Branches: strongswan, MAIN
CVS tags: v5_9_2p0, v5_8_4p7, HEAD
Strongswan

    1: .TH "PKI \-\-VERIFY" 1 "2016-08-19" "@PACKAGE_VERSION@" "strongSwan"
    2: .
    3: .SH "NAME"
    4: .
    5: pki \-\-verify \- Verify a certificate using a CA certificate
    6: .
    7: .SH "SYNOPSIS"
    8: .
    9: .SY pki\ \-\-verify
   10: .OP \-\-in file
   11: .OP \-\-cacert file
   12: .OP \-\-crl file
   13: .OP \-\-debug level
   14: .OP \-\-online
   15: .YS
   16: .
   17: .SY pki\ \-\-verify
   18: .BI \-\-options\~ file
   19: .YS
   20: .
   21: .SY "pki \-\-verify"
   22: .B \-h
   23: |
   24: .B \-\-help
   25: .YS
   26: .
   27: .SH "DESCRIPTION"
   28: .
   29: This sub-command of
   30: .BR pki (1)
   31: verifies a certificate using an optional CA certificate.
   32: .
   33: .SH "OPTIONS"
   34: .
   35: .TP
   36: .B "\-h, \-\-help"
   37: Print usage information with a summary of the available options.
   38: .TP
   39: .BI "\-v, \-\-debug " level
   40: Set debug level, default: 1.
   41: .TP
   42: .BI "\-+, \-\-options " file
   43: Read command line options from \fIfile\fR.
   44: .TP
   45: .BI "\-i, \-\-in " file
   46: X.509 certificate to verify. If not given it is read from \fISTDIN\fR.
   47: .TP
   48: .BI "\-c, \-\-cacert " file
   49: CA certificate to use for trustchain verification. If not given the certificate
   50: is assumed to be self\-signed. May optionally be a path to a directory from
   51: which CA certificates are loaded. Can be used multiple times.
   52: .TP
   53: .BI "\-l, \-\-crl " file
   54: Local CRL to use for trustchain verification. May optionally be a path to a
   55: directory from which CRLs are loaded. Can be used multiple times.
   56: Implies \fB-o\fR.
   57: .TP
   58: .BI "\-o, \-\-online
   59: Enable online CRL/OCSP revocation checking.
   60: .
   61: .SH "EXIT STATUS"
   62: The exit status is 0 if the certificate was verified successfully, 1 if the
   63: certificate is untrusted, 2 if the certificate's lifetimes are invalid, and 3
   64: if the certificate was verified successfully but the online revocation check
   65: indicated that it has been revoked.
   66: .
   67: .SH "SEE ALSO"
   68: .
   69: .BR pki (1)

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>