From: Andreas Steffen Date: Fri, 26 Aug 2022 14:43:58 +0000 (+0200) Subject: pki: Fixed filenames in pki --estca/--scepca man pages X-Git-Tag: 5.9.8dr2~3 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=3b2b7a3bee3188951b0e20068b18e779372a81a7;p=thirdparty%2Fstrongswan.git pki: Fixed filenames in pki --estca/--scepca man pages --- diff --git a/src/pki/man/pki---estca.1.in b/src/pki/man/pki---estca.1.in index 85ccd0929b..00db818a43 100644 --- a/src/pki/man/pki---estca.1.in +++ b/src/pki/man/pki---estca.1.in @@ -97,12 +97,18 @@ An EST server sends a root CA and an intermediate CA certificate: .EX pki \-\-estca \-\-options est.opt \-\-caout myca.crt +negotiated TLS 1.3 using suite TLS_AES_256_GCM_SHA384 +received TLS server certificate 'C=CH, O=strongSwan Project, CN=pki.strongswan.org' + using certificate "C=CH, O=strongSwan Project, CN=pki.strongswan.org" + using trusted intermediate ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" + using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA" + reached self-signed root ca with a path length of 1 Root CA cert "C=CH, O=strongSwan Project, CN=strongSwan Root CA" serial: 65:31:00:ca:79:da:16:6b:aa:ac:89:e2:a8:f9:49:c3:10:ab:64:54 SHA256: 96:70:50:51:cd:b9:e7:94:6b:04:f6:15:45:80:fc:90:85:01:71:2a:f6:4f:d1:1b:2d:a1:7e:eb:bf:dd:be:86 SHA1 : 8e:f3:78:b0:34:a6:c1:6a:7b:c6:f5:91:eb:e5:46:9b:0d:0a:a7:ba (jvN4sDSmwWp7xvWR6+VGmw0Kp7o) Root CA equals trusted TLS Root CA -Root CA cert is untrusted, valid until Aug 12 15:51:34 2032, 'myca.crt' +Root CA cert is trusted, valid until Aug 12 15:51:34 2032, 'myca.crt' Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" serial: 74:f9:7e:72:7d:b8:fd:f2:c6:e5:1b:fa:37:f9:cb:87:bf:9c:ea:e2 SHA256: a3:5b:4b:12:d5:8f:68:7b:05:11:08:27:f5:42:62:b8:b5:01:1b:19:37:9c:28:78:5d:37:08:69:6a:8c:07:bf @@ -110,7 +116,7 @@ Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" using certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA" reached self-signed root ca with a path length of 0 -Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'mycacert-1.crt' +Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'myca-1.crt' .EE .PP .B NOTE: diff --git a/src/pki/man/pki---scepca.1.in b/src/pki/man/pki---scepca.1.in index 337e2f1a6b..ea5adac9a0 100644 --- a/src/pki/man/pki---scepca.1.in +++ b/src/pki/man/pki---scepca.1.in @@ -103,7 +103,7 @@ Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" using certificate "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" using trusted ca certificate "C=CH, O=strongSwan Project, CN=strongSwan Root CA" reached self-signed root ca with a path length of 0 -Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'mycacert-1.crt' +Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'myca-1.crt' RA cert "C=CH, O=strongSwan Project, CN=SCEP RA" serial: 74:f9:7e:72:7d:b8:fd:f2:c6:e5:1b:fa:37:f9:cb:87:bf:9c:ea:e3 SHA256: 57:22:f3:13:69:2f:24:82:12:59:8e:05:63:0b:f5:a8:fb:4e:78:87:8d:68:d1:4c:c1:c4:b5:85:db:bb:64:df @@ -143,10 +143,10 @@ Root CA cert "C=CH, O=strongSwan Project, CN=strongSwan Root CA" Root CA cert is untrusted, valid until Aug 12 15:51:34 2032, written to 'scep/myca.pem' Sub CA cert "C=CH, O=strongSwan Project, CN=strongSwan Issuing CA" ... -Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'mycacert-1.crt' +Sub CA cert is trusted, valid until Aug 12 15:51:34 2027, 'scep/myca-1.pem' RA cert "C=CH, O=strongSwan Project, CN=SCEP RA" ... -RA cert is trusted, valid until Aug 10 15:51:34 2023, 'myca-ra.crt' +RA cert is trusted, valid until Aug 10 15:51:34 2023, 'scep/myca-ra.pem' .EE .PP A CA certificate bundle in PEM format is written to \fIstdout\fR: