strongswan_pki---verify man page

pki --verify — Verify a certificate using a CA certificate


pki --verify 
pki --verify --options file
pki --verify -h | --help


This sub-command of pki(1) verifies a certificate using an optional CA certificate.


-h, --help

Print usage information with a summary of the available options.

-v, --debug level

Set debug level, default: 1.

-+, --options file

Read command line options from file.

-i, --in file

X.509 certificate to verify. If not given it is read from STDIN.

-c, --cacert file

CA certificate to use for trustchain verification. If not given the certificate is assumed to be self-signed.

-l, --crl file

Local CRL to use for trustchain verification. Implies -o.

-o, --online

Enable online CRL/OCSP revocation checking.

Exit Status

The exit status is 0 if the certificate was verified successfully, 1 if the certificate is untrusted, 2 if the certificate's lifetimes are invalid, and 3 if the certificate was verified successfully but the online revocation check indicated that it has been revoked.

See Also



2016-08-19 5.6.2 strongSwan