Query: strongimcv_pki---verify
OS: centos
Section: 1
Format: Original Unix Latex Style Formatted with HTML and a Horizontal Scroll Bar
PKI --VERIFY(1) strongSwan PKI --VERIFY(1)NAMEpki --verify - Verify a certificate using a CA certificateSYNOPSISpki --verify [--in file] [--cacert file] [--debug level] pki --verify --options file pki --verify -h | --helpDESCRIPTIONThis sub-command of pki(1) verifies a certificate using an optional CA certificate.OPTIONS-h, --help Print usage information with a summary of the available options. -v, --debug level Set debug level, default: 1. -+, --options file Read command line options from file. -i, --in file X.509 certificate to verify. If not given it is read from STDIN. -c, --cacert file CA certificate to use. If not given the certificate is assumed to be self-signed.EXIT STATUSThe exit status is 0 if the certificate was verified successfully, and 2 if the verification failed.SEE ALSOpki(1) 5.1.1 2013-07-31 PKI --VERIFY(1)
Related Man Pages |
---|
ovs-pki(8) - debian |
strongimcv_pki---keyid(1) - centos |
strongimcv_pki---req(1) - centos |
strongimcv_pki---self(1) - centos |
strongimcv_pki(1) - centos |
Similar Topics in the Unix Linux Community |
---|
Weird 'find' results |
Docker learning Phase-I |
Unsure why access time on a directory change isn't changing |
CentOS 6 ran out of space, need to reclaim it |
Controlling user input |