Subversion Repositories svn LFS-FR

Rev

Rev 7334 | Rev 7348 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
7156 jlepiller 1
# SOME DESCRIPTIVE TITLE
2
# Copyright (C) YEAR Free Software Foundation, Inc.
3
# This file is distributed under the same license as the PACKAGE package.
4
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
7313 jlepiller 5
#
7156 jlepiller 6
msgid ""
7
msgstr ""
8
"Project-Id-Version: PACKAGE VERSION\n"
7344 jlepiller 9
"POT-Creation-Date: 2018-01-30 04:05+0000\n"
10
"PO-Revision-Date: 2018-02-01 11:12+0000\n"
7156 jlepiller 11
"Last-Translator: roptat <roptat@lepiller.eu>\n"
12
"Language-Team: LANGUAGE <LL@li.org>\n"
7313 jlepiller 13
"Language: fr\n"
7156 jlepiller 14
"MIME-Version: 1.0\n"
15
"Content-Type: text/plain; charset=UTF-8\n"
16
"Content-Transfer-Encoding: 8bit\n"
17
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
7258 jlepiller 18
"X-Generator: Pootle 2.8\n"
7344 jlepiller 19
"X-POOTLE-MTIME: 1517483554.797188\n"
7156 jlepiller 20
 
7202 jlepiller 21
#. type: Content of the certhost entity
7156 jlepiller 22
#: blfs-en/postlfs/security/cacerts.xml:7
7202 jlepiller 23
msgid "https://hg.mozilla.org/"
24
msgstr "https://hg.mozilla.org/"
7156 jlepiller 25
 
7202 jlepiller 26
#. type: Content of the certpath entity
7156 jlepiller 27
#: blfs-en/postlfs/security/cacerts.xml:8
7202 jlepiller 28
msgid "/lib/ckfw/builtins/certdata.txt"
29
msgstr "/lib/ckfw/builtins/certdata.txt"
7156 jlepiller 30
 
7318 jlepiller 31
#. type: Content of the cacerts-buildsize entity
7156 jlepiller 32
#: blfs-en/postlfs/security/cacerts.xml:9
7258 jlepiller 33
msgid "6.5 MB (with all runtime deps)"
34
msgstr "6.5 Mo (avec toutes les dépendances à l'exécution)"
7156 jlepiller 35
 
7202 jlepiller 36
#. type: Content of the cacerts-time entity
7318 jlepiller 37
#: blfs-en/postlfs/security/cacerts.xml:10
7202 jlepiller 38
msgid "0.2 SBU (with all runtime deps)"
39
msgstr "0.2 SBU (avec toutes les dépendances à l'exécution)"
40
 
41
#. type: Content of the make-ca-download entity
7318 jlepiller 42
#: blfs-en/postlfs/security/cacerts.xml:12
43
msgid ""
44
"https://github.com/djlucas/make-ca/archive/v&make-ca-version;/make-ca-&make-"
45
"ca-version;.tar.gz"
46
msgstr ""
47
"https://github.com/djlucas/make-ca/archive/v&make-ca-version;/make-ca-&make-"
48
"ca-version;.tar.gz"
7202 jlepiller 49
 
50
#. type: Content of the make-ca-size entity
7318 jlepiller 51
#: blfs-en/postlfs/security/cacerts.xml:13
52
msgid "36 KB"
53
msgstr "36 Ko"
7202 jlepiller 54
 
55
#. type: Content of the make-ca-md5sum entity
7318 jlepiller 56
#: blfs-en/postlfs/security/cacerts.xml:14
57
msgid "851f9e267f343c54db8caa87ec5b3d75"
58
msgstr "851f9e267f343c54db8caa87ec5b3d75"
7202 jlepiller 59
 
7156 jlepiller 60
#. type: Content of: <sect1><sect1info>
7318 jlepiller 61
#: blfs-en/postlfs/security/cacerts.xml:21
7344 jlepiller 62
#| msgid ""
63
#| "<othername>$LastChangedBy: dj $</othername> <date>$Date: 2017-10-16 01:42:33"
64
#| " +0000 (Mon, 16 Oct 2017) $</date>"
7156 jlepiller 65
msgid ""
7344 jlepiller 66
"<othername>$LastChangedBy: pierre $</othername> <date>$Date: 2018-01-29 "
67
"21:12:53 +0000 (Mon, 29 Jan 2018) $</date>"
7156 jlepiller 68
msgstr ""
7344 jlepiller 69
"<othername>$LastChangedBy: pierre $</othername> <date>$Date: 2018-01-29 "
70
"21:12:53 +0000 (Mon, 29 Jan 2018) $</date>"
7156 jlepiller 71
 
72
#. type: Content of: <sect1><indexterm><primary>
7318 jlepiller 73
#: blfs-en/postlfs/security/cacerts.xml:25
74
#: blfs-en/postlfs/security/cacerts.xml:48
7156 jlepiller 75
msgid "Certificate Authority Certificates"
7159 jlepiller 76
msgstr "Certificats d'autorité de certification"
7156 jlepiller 77
 
78
#. type: Content of: <sect1><para>
7318 jlepiller 79
#: blfs-en/postlfs/security/cacerts.xml:27
7156 jlepiller 80
msgid ""
7202 jlepiller 81
"Public Key Infrastructure (PKI) is a method to validate the authenticity of "
82
"an otherwise unknown entity across untrusted networks. PKI works by "
83
"establishing a chain of trust, rather than trusting each individual host or "
84
"entity explicitly. In order for a certificate presented by a remote entity "
85
"to be trusted, that certificate must present a complete chain of "
86
"certificates that can be validated using the root certificate of a "
87
"Certificate Authority (CA) that is trusted by the local machine."
7156 jlepiller 88
msgstr ""
7202 jlepiller 89
"Une Infrastructure à Clés Publiques (PKI) est une méthode pour valider "
90
"l'authenticité d'une entité autrement inconnue au travers de réseaux qui ne "
91
"sont pas de confiance. La PKI fonctionne en établissant une chaîne de "
92
"confiance, plutôt que de faire confiance individuellement à chaque hôte ou "
93
"entité de manière explicite. Pour qu'un certificat présenté par une entité "
94
"distante soit reconnu, le certificat doit présenter une chaîne complète de "
95
"certificats qui peuvent être validé en utilisant le certificat racine d'une "
96
"autorité de certification (CA) en laquelle la machine locale a confiance."
7156 jlepiller 97
 
7202 jlepiller 98
#. type: Content of: <sect1><para>
7318 jlepiller 99
#: blfs-en/postlfs/security/cacerts.xml:35
7202 jlepiller 100
msgid ""
101
"Establishing trust with a CA involves validating things like company "
102
"address, ownership, contact information, etc., and ensuring that the CA has "
103
"followed best practices, such as undergoing periodic security audits by "
104
"independent investigators and maintaining an always available certificate "
105
"revocation list. This is well outside the scope of BLFS (as it is for most "
106
"Linux distributions). The certificate store provided here is taken from the "
107
"Mozilla Foundation, who have established very strict inclusion policies "
108
"described <ulink url=\"https://www.mozilla.org/en-"
109
"US/about/governance/policies/security-group/certs/\">here</ulink>."
110
msgstr ""
111
"L'établissement de la confiance avec une CA nécessite de valider des choses "
112
"comme l'adresse de la compagnie, la propriété, les informations de contact, "
113
"etc, et de s'assurer que la CA a suivi les bonnes pratiques, comme des "
114
"audits de sécurité périodiques par des enquêteurs indépendants et le "
7216 jlepiller 115
"maintient d'une liste de révocation de certificats toujours disponible. Ceci"
116
" est bien au delà de la portée de BLFS (comme pour la plupart des "
117
"distributions Linux). Le magasin de certificats fournit ici est emprunté à "
118
"la fondation Mozilla, qui ont établit une politique d'inclusion très stricte"
119
" décrite <ulink url=\"https://www.mozilla.org/en-"
120
"US/about/governance/policies/security-group/certs/\">ici</ulink>."
7202 jlepiller 121
 
7156 jlepiller 122
#. type: Content of: <sect1><sect2><title>
7318 jlepiller 123
#: blfs-en/postlfs/security/cacerts.xml:52
7156 jlepiller 124
msgid "Introduction to Certificate Authorities"
125
msgstr "Introduction à Certificate Authorities"
126
 
127
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 128
#: blfs-en/postlfs/security/cacerts.xml:54
7156 jlepiller 129
msgid "Package Information"
130
msgstr "Informations sur le paquet"
131
 
132
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 133
#: blfs-en/postlfs/security/cacerts.xml:57
7193 jlepiller 134
msgid "Download (HTTP): <ulink url=\"&make-ca-download;\"/>"
135
msgstr "Téléchargement (HTTP)&nbsp;: <ulink url=\"&make-ca-download;\"/>"
7156 jlepiller 136
 
137
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 138
#: blfs-en/postlfs/security/cacerts.xml:60
7193 jlepiller 139
msgid "Download size: &make-ca-size;"
140
msgstr "Taille du téléchargement&nbsp;: &make-ca-size;"
7156 jlepiller 141
 
142
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 143
#: blfs-en/postlfs/security/cacerts.xml:63
7193 jlepiller 144
msgid "Download MD5 Sum: &make-ca-md5sum;"
7196 jlepiller 145
msgstr "Somme MD5 du téléchargement&nbsp;: &make-ca-md5sum;"
7193 jlepiller 146
 
147
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 148
#: blfs-en/postlfs/security/cacerts.xml:66
7156 jlepiller 149
msgid "Estimated disk space required: &cacerts-buildsize;"
150
msgstr "Estimation de l'espace disque requis&nbsp;: &cacerts-buildsize;"
151
 
152
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 153
#: blfs-en/postlfs/security/cacerts.xml:69
7156 jlepiller 154
msgid "Estimated build time: &cacerts-time;"
155
msgstr "Estimation du temps de construction&nbsp;: &cacerts-time;"
156
 
157
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 158
#: blfs-en/postlfs/security/cacerts.xml:73
7156 jlepiller 159
msgid "Certificate Authority Certificates Dependencies"
160
msgstr "Dépendances de Certificate Authority Certificates"
161
 
162
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 163
#: blfs-en/postlfs/security/cacerts.xml:75
7156 jlepiller 164
msgid "Required"
165
msgstr "Requises"
166
 
167
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 168
#: blfs-en/postlfs/security/cacerts.xml:76
7202 jlepiller 169
msgid "<xref linkend=\"openssl\"/>"
170
msgstr "<xref linkend=\"openssl\"/>"
7156 jlepiller 171
 
7202 jlepiller 172
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 173
#: blfs-en/postlfs/security/cacerts.xml:78
7202 jlepiller 174
msgid "Optional (runtime)"
175
msgstr "Facultatives (exécution)"
176
 
7156 jlepiller 177
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 178
#: blfs-en/postlfs/security/cacerts.xml:80
7202 jlepiller 179
msgid ""
7313 jlepiller 180
"<xref role=\"runtime\" linkend=\"java\"/> or <xref role=\"runtime\" "
181
"linkend=\"openjdk\"/>, <xref role=\"runtime\" linkend=\"nss\"/>, and <xref "
182
"role=\"runtime\" linkend=\"p11-kit\"/>"
7202 jlepiller 183
msgstr ""
7313 jlepiller 184
"<xref role=\"runtime\" linkend=\"java\"/> ou <xref role=\"runtime\" "
185
"linkend=\"openjdk\"/>, <xref role=\"runtime\" linkend=\"nss\"/> et <xref "
186
"role=\"runtime\" linkend=\"p11-kit\"/>"
7202 jlepiller 187
 
188
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 189
#: blfs-en/postlfs/security/cacerts.xml:86
7156 jlepiller 190
msgid "User Notes: <ulink url='&blfs-wiki;/cacerts'/>"
191
msgstr "Notes utilisateur&nbsp;: <ulink url='&blfs-wiki;/cacerts'/>"
192
 
193
#. type: Content of: <sect1><sect2><title>
7318 jlepiller 194
#: blfs-en/postlfs/security/cacerts.xml:91
7156 jlepiller 195
msgid "Installation of Certificate Authority Certificates"
196
msgstr "Installation de Certificate Authority Certificates"
197
 
198
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 199
#: blfs-en/postlfs/security/cacerts.xml:93
7156 jlepiller 200
msgid ""
7318 jlepiller 201
"The <application>make-ca</application> script will download and process the "
7203 jlepiller 202
"certificates included in the <filename>certdata.txt</filename> file for use "
203
"in multiple certificate stores (if the associated applications are present "
204
"on the system). Additionally, any local certificates stored in "
7202 jlepiller 205
"<filename>/etc/ssl/local</filename> will be imported to the certificate "
206
"stores. Certificates in this directory should be stored as PEM encoded "
207
"<application>OpenSSL</application> trusted certificates."
7156 jlepiller 208
msgstr ""
7318 jlepiller 209
"Le script <application>make-ca</application> adaptera les certificats inclus"
210
" dans le fichier <filename>certdata.txt</filename> pour l'utiliser dans de "
211
"multiples magasins de certificats (si les applications associées sont "
212
"présentes sur le système). De plus, tout certificat local stocké dans "
7202 jlepiller 213
"<filename>/etc/ssl/local</filename> sera importé dans les magasins de "
214
"certificats. Les certificats de ce répertoire devraient être stockés sous "
215
"forme de certificats de confiance <application>OpenSSL</application> encodé "
216
"en PEM."
7156 jlepiller 217
 
7193 jlepiller 218
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 219
#: blfs-en/postlfs/security/cacerts.xml:101
7344 jlepiller 220
#| msgid ""
221
#| "To create an <application>OpenSSL</application> trusted certificate from a "
222
#| "regular PEM encoded file, you need to add trust arguments to the "
223
#| "<command>openssl</command> command, and create a new certificate. There are "
224
#| "three trust types that are recognized by the <application>make-"
225
#| "ca</application> script, SSL/TLS, S/Mime, and code signing. For example, "
226
#| "using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> roots, if you"
227
#| " want to trust both for all three roles, the following commands will create "
228
#| "appropriate OpenSSL trusted certificates:"
7156 jlepiller 229
msgid ""
7202 jlepiller 230
"To create an <application>OpenSSL</application> trusted certificate from a "
7318 jlepiller 231
"regular PEM encoded file, you need to add trust arguments to the "
7202 jlepiller 232
"<command>openssl</command> command, and create a new certificate. There are "
7280 jlepiller 233
"three trust types that are recognized by the <application>make-"
7318 jlepiller 234
"ca</application> script, SSL/TLS, S/Mime, and code signing. For example, "
235
"using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> roots, if you"
236
" want to trust both for all three roles, the following commands will create "
7344 jlepiller 237
"appropriate OpenSSL trusted certificates (run as the <systemitem "
238
"class=\"username\">root</systemitem> user):"
7156 jlepiller 239
msgstr ""
7202 jlepiller 240
"Pour créer un certificat de confiance <application>OpenSSL</application> "
7344 jlepiller 241
"depuis un fichier normal encodé en PEM, vous devrez ajouter des arguments "
242
"«&nbsp;trust&nbsp;» à la commande <command>openssl</command> et créer un "
243
"nouveau certificat. Il y a trois types de confiances reconnues par le script"
244
" <application>make-ca</application>&nbsp;: SSL/TLS, S/Mime et la signature "
245
"de code. Par exemple, si vous souhaitez utiliser les racines <ulink "
246
"url=\"http://www.cacert.org/\">CAcert</ulink> pour que les deux soient de "
247
"confiance pour ces trois rôles, les commandes suivantes créeront des "
248
"certificats de confiance OpenSSL approprié (à lancer en tant qu'utilisateur "
249
"<systemitem class=\"username\">root</systemitem>)&nbsp;:"
7156 jlepiller 250
 
7202 jlepiller 251
#. type: Content of: <sect1><sect2><screen>
7344 jlepiller 252
#: blfs-en/postlfs/security/cacerts.xml:112
7202 jlepiller 253
#, no-wrap
254
msgid ""
7280 jlepiller 255
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
256
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
7318 jlepiller 257
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
7280 jlepiller 258
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
259
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
7318 jlepiller 260
"        > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
261
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
262
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
263
"        > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
7202 jlepiller 264
msgstr ""
7280 jlepiller 265
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
266
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
7318 jlepiller 267
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
7280 jlepiller 268
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
269
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
7318 jlepiller 270
"        > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
271
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
272
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
273
"        > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
7202 jlepiller 274
 
7156 jlepiller 275
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 276
#: blfs-en/postlfs/security/cacerts.xml:122
7156 jlepiller 277
msgid ""
7280 jlepiller 278
"If one of the three trust arguments is omitted, the certificate is neither "
279
"trusted, nor rejected for that role. Clients that use "
280
"<application>OpenSSL</application> or <application>NSS</application> "
281
"encountering this certificate will present a warning to the user. Clients "
282
"using <application>GnuTLS</application> without "
283
"<application>p11-kit</application> support are not aware of trusted "
7202 jlepiller 284
"certificates. To include this CA into the ca-bundle.crt (used for "
285
"<application>GnuTLS</application>), it must have <envar>serverAuth</envar> "
7280 jlepiller 286
"trust. Additionally, to explicitly disallow a certificate for a particular "
287
"use, replace the <parameter>-addtrust</parameter> flag with the "
288
"<parameter>-addreject</parameter> flag."
7156 jlepiller 289
msgstr ""
7280 jlepiller 290
"Si un argument trust en omis, le certificat n'est ni reconnu ni rejeté pour "
291
"ce rôle. Les clients qui utilisent <application>OpenSSL</application> ou "
7202 jlepiller 292
"<application>NSS</application> rencontrant ce certificat renverront un "
293
"avertissement à l'utilisateur . Les clients qui utilisent "
294
"<application>GnuTLS</application> sans le support de "
295
"<application>p11-kit</application> ne sont pas conscient des certificats de "
296
"confiance. Pour inclure cette CA dans le fichier ca-bundle.crt (utilisé par "
7280 jlepiller 297
"<application>GnuTLS</application>), il doit avoir la confiance "
298
"<envar>serverAuth</envar>. De plus, pour interdire un certificat pour une "
299
"utilisation particulière, remplacez le paramètre "
300
"<parameter>-addtrust</parameter> par le paramètre "
301
"<parameter>-addreject</parameter>."
7156 jlepiller 302
 
303
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 304
#: blfs-en/postlfs/security/cacerts.xml:134
7156 jlepiller 305
msgid ""
7334 jlepiller 306
"To install the various certificate stores, first install the "
307
"<application>make-ca</application> script into the correct location.  As the"
308
" <systemitem class=\"username\">root</systemitem> user:"
7156 jlepiller 309
msgstr ""
7202 jlepiller 310
"Pour installer les divers magasins de certificats, installez le script "
7318 jlepiller 311
"<application>make-ca</application> au bon endroit. En tant qu'utilisateur "
312
"<systemitem class=\"username\">root</systemitem>&nbsp;:"
7156 jlepiller 313
 
314
#. type: Content of: <sect1><sect2><screen>
7344 jlepiller 315
#: blfs-en/postlfs/security/cacerts.xml:138
7156 jlepiller 316
#, no-wrap
7318 jlepiller 317
msgid "<userinput>make install</userinput>"
318
msgstr "<userinput>make install</userinput>"
7156 jlepiller 319
 
320
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 321
#: blfs-en/postlfs/security/cacerts.xml:140
7156 jlepiller 322
msgid ""
7318 jlepiller 323
"As the <systemitem class=\"username\">root</systemitem> user, download and "
324
"update the certificate stores with the following command:"
7156 jlepiller 325
msgstr ""
7196 jlepiller 326
"En tant qu'utilisateur <systemitem class=\"username\">root</systemitem>, "
7318 jlepiller 327
"téléchargez et mettez à jour le magasin de certificats avec la commande "
328
"suivante&nbsp;:"
7156 jlepiller 329
 
7308 jlepiller 330
#. type: Content of: <sect1><sect2><note><para>
7344 jlepiller 331
#: blfs-en/postlfs/security/cacerts.xml:144
7308 jlepiller 332
msgid ""
333
"If running the script a second time with the same version of "
334
"<filename>certdata.txt</filename>, for instance, to add additional stores as"
335
" the requisite software is installed, add the <parameter>-f</parameter> "
7318 jlepiller 336
"switch to the command line. If packaging, run <command>make-ca "
7308 jlepiller 337
"--help</command> to see all available command line options."
338
msgstr ""
339
"Si vous lancez le script une deuxième fois avec la même version de "
340
"<filename>certdata.txt</filename>, par exemple pour ajouter des magasins "
341
"supplémentaires parce que le logiciel requis est installé, ajoutez l'option "
342
"<parameter>-f</parameter> à la ligne  de commande. Si vous créez un paquet, "
7318 jlepiller 343
"lancez <command>make-ca --help</command> pour voir toutes les options de la "
344
"ligne de commande disponibles."
7308 jlepiller 345
 
7156 jlepiller 346
#. type: Content of: <sect1><sect2><screen>
7344 jlepiller 347
#: blfs-en/postlfs/security/cacerts.xml:151
7156 jlepiller 348
#, no-wrap
7318 jlepiller 349
msgid "<userinput>/usr/sbin/make-ca -g</userinput>"
350
msgstr "<userinput>/usr/sbin/make-ca -g</userinput>"
7156 jlepiller 351
 
352
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 353
#: blfs-en/postlfs/security/cacerts.xml:153
7156 jlepiller 354
msgid ""
7318 jlepiller 355
"You should periodically update the store with the above command either "
356
"manually, or via a <phrase revision=\"sysv\">cron job.</phrase> <phrase "
357
"revision=\"systemd\">systemd timer. A timer is installed at "
358
"<filename>/etc/systemd/system/update-pki.timer</filename> that, if enabled, "
359
"will check for updates weekly.</phrase>"
7156 jlepiller 360
msgstr ""
7318 jlepiller 361
"Vous devriez mettre à jour régulièrement le magasin avec la commande ci-"
362
"dessus soit manuellement, soit via <phrase revision=\"sysv\">une tâche "
363
"cron.</phrase><phrase revision=\"systemd\">un timer systemd. Un timer est "
364
"installé dans <filename>/etc/systemd/system/update-pki.timer</filename> et "
365
"s'il est activé, il vérifiera les mises à jour une fois par "
366
"semaine.</phrase>"
7156 jlepiller 367
 
7202 jlepiller 368
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 369
#: blfs-en/postlfs/security/cacerts.xml:159
7202 jlepiller 370
msgid ""
7318 jlepiller 371
"The default <filename>certdata.txt</filename> file provided by make-ca is "
372
"obtained from the mozilla-release branch, and is modified to provide a "
373
"Mercurial revision. This will be the correct version for most systems. There"
374
" are, however, several other variants of the file available for use that "
375
"might be preferred for one reason or another, including the files shipped "
376
"with Mozilla products in this book. RedHat and OpenSUSE, for instance, use "
377
"the version included in <xref linkend=\"nss\"/>. Additional upstream "
378
"downloads are available at the links below."
7202 jlepiller 379
msgstr ""
7318 jlepiller 380
"Le fichier <filename>certdata.txt</filename> fournit par make-ca est obtenu "
381
"à partir de la branche mozilla-release, et est modifié pour fournir une "
382
"simple révision horodatée. Ce sera la bonne version pour la plupart des "
383
"systèmes. Il y a cependant plusieurs variantes du fichier disponibles à "
384
"l'utilisation qui peuvent être préférés pour une raison ou une autre, "
385
"incluses dans les produits Mozilla dans ce livre. RedHat et OpenSUSE par "
386
"exemple utilisent la version incluse dans <xref linkend=\"nss\"/>. Des "
387
"emplacements de téléchargement supplémentaires sont disponibles&nbsp;:"
7202 jlepiller 388
 
389
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 390
#: blfs-en/postlfs/security/cacerts.xml:170
7202 jlepiller 391
msgid ""
392
"Mozilla Release (the version provided by BLFS): <ulink "
393
"url=\"&certhost;releases/mozilla-release/raw-"
394
"file/default/security/nss&certpath;\"/>"
395
msgstr ""
396
"Mozilla Release (la version fournie par BLFS)&nbsp;: <ulink "
397
"url=\"&certhost;releases/mozilla-release/raw-"
398
"file/default/security/nss&certpath;\"/>"
399
 
400
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 401
#: blfs-en/postlfs/security/cacerts.xml:175
7202 jlepiller 402
msgid ""
403
"NSS (this is the latest available version): <ulink "
7220 jlepiller 404
"url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>"
7202 jlepiller 405
msgstr ""
406
"NSS (c'est la dernière version disponible)&nbsp;: <ulink "
7220 jlepiller 407
"url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>"
7202 jlepiller 408
 
409
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 410
#: blfs-en/postlfs/security/cacerts.xml:180
7202 jlepiller 411
msgid ""
412
"Mozilla Central: <ulink url=\"&certhost;mozilla-central/raw-"
413
"file/default/security/nss&certpath;\"/>"
414
msgstr ""
415
"Mozilla Central&nbsp;: <ulink url=\"&certhost;mozilla-central/raw-"
416
"file/default/security/nss&certpath;\"/>"
417
 
418
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 419
#: blfs-en/postlfs/security/cacerts.xml:185
7202 jlepiller 420
msgid ""
421
"Mozilla Beta: <ulink url=\"&certhost;releases/mozilla-beta/raw-"
422
"file/default/security/nss&certpath;\"/>"
423
msgstr ""
424
"Mozilla Beta&nbsp;: <ulink url=\"&certhost;releases/mozilla-beta/raw-"
425
"file/default/security/nss&certpath;\"/>"
426
 
427
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 428
#: blfs-en/postlfs/security/cacerts.xml:190
7202 jlepiller 429
msgid ""
430
"Mozilla Aurora: <ulink url=\"&certhost;releases/mozilla-aurora/raw-"
431
"file/default/security/nss&certpath;\"/>"
432
msgstr ""
433
"Mozilla Aurora&nbsp;: <ulink url=\"&certhost;releases/mozilla-aurora/raw-"
434
"file/default/security/nss&certpath;\"/>"
435
 
7156 jlepiller 436
#. type: Content of: <sect1><sect2><title>
7344 jlepiller 437
#: blfs-en/postlfs/security/cacerts.xml:199
7156 jlepiller 438
msgid "Contents"
439
msgstr "Contenu"
440
 
441
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7344 jlepiller 442
#: blfs-en/postlfs/security/cacerts.xml:202
7156 jlepiller 443
msgid "Installed Programs"
444
msgstr "Programmes installés"
445
 
446
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7344 jlepiller 447
#: blfs-en/postlfs/security/cacerts.xml:203
7156 jlepiller 448
msgid "Installed Libraries"
449
msgstr "Bibliothèques installées"
450
 
451
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7344 jlepiller 452
#: blfs-en/postlfs/security/cacerts.xml:204
7156 jlepiller 453
msgid "Installed Directories"
454
msgstr "Répertoires installés"
455
 
7318 jlepiller 456
#. type: Content of:
457
#. <sect1><sect2><variablelist><varlistentry><listitem><indexterm><primary>
7344 jlepiller 458
#: blfs-en/postlfs/security/cacerts.xml:207
459
#: blfs-en/postlfs/security/cacerts.xml:225
7318 jlepiller 460
msgid "make-ca"
461
msgstr "make-ca"
7156 jlepiller 462
 
463
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7344 jlepiller 464
#: blfs-en/postlfs/security/cacerts.xml:208
7156 jlepiller 465
msgid "None"
466
msgstr "Aucune"
467
 
468
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7344 jlepiller 469
#: blfs-en/postlfs/security/cacerts.xml:209
7202 jlepiller 470
msgid "/etc/ssl/{certs,java,local} and /etc/pki/{nssdb,anchors}"
471
msgstr "/etc/ssl/{certs,java,local} et /etc/pki/{nssdb,anchors}"
7156 jlepiller 472
 
473
#. type: Content of: <sect1><sect2><variablelist><bridgehead>
7344 jlepiller 474
#: blfs-en/postlfs/security/cacerts.xml:214
7156 jlepiller 475
msgid "Short Descriptions"
476
msgstr "Descriptions courtes"
477
 
478
#. type: Content of: <sect1><sect2><variablelist><varlistentry><term>
7344 jlepiller 479
#: blfs-en/postlfs/security/cacerts.xml:219
7318 jlepiller 480
msgid "<command>make-ca</command>"
481
msgstr "<command>make-ca</command>"
7156 jlepiller 482
 
7165 jlepiller 483
#. type: Content of:
484
#. <sect1><sect2><variablelist><varlistentry><listitem><para>
7344 jlepiller 485
#: blfs-en/postlfs/security/cacerts.xml:221
7156 jlepiller 486
msgid ""
7202 jlepiller 487
"is a shell script that adapts a current version of "
7193 jlepiller 488
"<filename>certdata.txt</filename>, and prepares it for use as the system "
489
"certificate store."
7156 jlepiller 490
msgstr ""
7202 jlepiller 491
"est un script shell qui adapte une version actuelle de "
7197 jlepiller 492
"<filename>certdata.txt</filename> et le prépare pour l'utiliser comme "
7196 jlepiller 493
"magasin de certificat du système."
7156 jlepiller 494
 
7318 jlepiller 495
#~ msgid "32 KB"
496
#~ msgstr "32 Ko"
7156 jlepiller 497
 
7318 jlepiller 498
#~ msgid "25033ded9dd0979226b8f3fd2792bd3a"
499
#~ msgstr "25033ded9dd0979226b8f3fd2792bd3a"
500
 
501
#~ msgid "&sources-anduin-http;/other/certdata.txt"
502
#~ msgstr "&sources-anduin-http;/other/certdata.txt"
503
 
504
#~ msgid "1.6 MB"
505
#~ msgstr "1.6 Mo"
506
 
507
#~ msgid "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;"
508
#~ msgstr "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;"
509
 
510
#~ msgid "24 KB"
511
#~ msgstr "24 Ko"
512
 
513
#~ msgid "a21a04d6ff5c4645c748220dbaa9f221"
514
#~ msgstr "a21a04d6ff5c4645c748220dbaa9f221"
515
 
516
#~ msgid "Additional Downloads"
517
#~ msgstr "Téléchargements supplémentaires"
518
 
519
#~ msgid "CA Certificates <ulink url=\"&ca-bundle-download;\"/>"
520
#~ msgstr "Certificats de CA <ulink url=\"&ca-bundle-download;\"/>"
521
 
522
#~ msgid ""
523
#~ "<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-"
524
#~ "ca.sh</userinput>"
525
#~ msgstr ""
526
#~ "<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-"
527
#~ "ca.sh</userinput>"
528
 
529
#~ msgid ""
530
#~ "You should periodically download a copy of <filename>certdata.txt</filename>"
531
#~ " and run the <application>make-ca.sh</application> script (as the "
532
#~ "<systemitem class=\"username\">root</systemitem> user), or as part of a "
533
#~ "monthly <application>cron</application> job to ensure that you have the "
534
#~ "latest available version of the certificates."
535
#~ msgstr ""
536
#~ "Vous devriez télécharger régulièrement une copie de "
537
#~ "<filename>certdata.txt</filename> et lancer le script <application>make-"
538
#~ "ca.sh</application> (en tant qu'utilisateur <systemitem "
539
#~ "class=\"username\">root</systemitem>), ou en tant que tâche "
540
#~ "<application>cron</application> mensuelle pour vous assurer d'avoir la "
541
#~ "dernière version disponible des certificats."
542
 
543
#~ msgid "make-ca.sh"
544
#~ msgstr "make-ca.sh"
545
 
7264 jlepiller 546
#~ msgid "b42fd97c173ef67a37fb05ed7587e0a8"
547
#~ msgstr "b42fd97c173ef67a37fb05ed7587e0a8"
548
 
7258 jlepiller 549
#~ msgid "11 KB"
550
#~ msgstr "11 Ko"
551
 
552
#~ msgid "cce9fa4713c4611d9e61f99de612a1e9"
553
#~ msgstr "cce9fa4713c4611d9e61f99de612a1e9"
554
 
7224 jlepiller 555
#~ msgid "5e41c17a3dd6b8195c55092e87e92ef0"
556
#~ msgstr "5e41c17a3dd6b8195c55092e87e92ef0"
557
 
7214 jlepiller 558
#~ msgid "fca9ae62242800a9dcaee5d400ee5c41"
559
#~ msgstr "fca9ae62242800a9dcaee5d400ee5c41"
560
 
7203 jlepiller 561
#~ msgid "9e416981cd153d8923e06dc8e39ac534"
562
#~ msgstr "9e416981cd153d8923e06dc8e39ac534"
563
 
7202 jlepiller 564
#~ msgid "65c6cbbb11e6d124b047f4aa0dcb2808"
565
#~ msgstr "65c6cbbb11e6d124b047f4aa0dcb2808"
7156 jlepiller 566
 
7202 jlepiller 567
#~ msgid "fbc5687ce7fd5533edbb4e616a1080de"
568
#~ msgstr "fbc5687ce7fd5533edbb4e616a1080de"
569
 
570
#~ msgid "487ca7ce6f7b81b3e46362138f93310c"
571
#~ msgstr "487ca7ce6f7b81b3e46362138f93310c"
572
 
573
#~ msgid "1.4 MB"
574
#~ msgstr "1.4 Mo"
575
 
576
#~ msgid "0.1 SBU"
577
#~ msgstr "0.1 SBU"
578
 
579
#~ msgid ""
580
#~ "The Public Key Infrastructure is used for many security features in a Linux "
581
#~ "system.  In order for a certificate to be trusted, it must be signed by a "
582
#~ "trusted agent called a Certificate Authority (CA). The certificates "
583
#~ "installed in this section are obtained from the Mozilla version control "
584
#~ "system, and reformatted for use by <xref linkend='openssl'/> and <xref "
585
#~ "linkend='gnutls'/>. The certificates can also be used by other applications,"
586
#~ " either directly or indirectly by linking to one of these packages."
587
#~ msgstr ""
588
#~ "La <foreignphrase>Public Key Infrastructure</foreignphrase> (infrastructure "
589
#~ "de clés publiques) est utilisée dans de nombreux cas de sécurité sur un "
590
#~ "système Linux. Pour qu'un certificat soit fiable, il doit être signé par un "
591
#~ "agent de confiance, qu'on appelle l'autorité de certification "
592
#~ "(<foreignphrase>Certificate Authority</foreignphrase>) (CA).  Les "
593
#~ "certificats chargés dans cette section sont issus de la liste du système de "
594
#~ "contrôle de Mozilla et elle est formatée dans une forme utilisée par <xref "
595
#~ "linkend=\"openssl\"/> et <xref linkend='gnutls'/>.  Les certificats peuvent "
596
#~ "également être utilisés par d'autres applications, directement ou "
597
#~ "indirectement via <application>openssl</application>."
598
 
599
#~ msgid ""
600
#~ "The <application>make-ca.sh</application> script will download a set of "
601
#~ "certificates from one of five projects (aurora, beta, central, nss, or "
602
#~ "release) in the Mozialla version control system. It defaults to the release "
603
#~ "branch, which is identical to the version that ships with the Mozilla "
604
#~ "products in this book. If you'd like to change the branch that is retrieved,"
605
#~ " edit the file and set <envar>CERTSOURCE</envar> to one of the five values "
606
#~ "above."
607
#~ msgstr ""
608
#~ "Le script <application>make-ca.sh</application> téléchargement un ensemble "
609
#~ "de certificats depuis l'un des cinq projets (aurora, beta, central, nss ou "
610
#~ "release) du système de contrôle de version de Mozilla. Il est réglé par "
611
#~ "défaut sur la branche release, qui est identique à la version qui vient avec"
612
#~ " les produits Mozilla de ce livre. Si vous préférez changer la branche qui "
613
#~ "est récupérée, modifiez le fichier et mettez <envar>CERTSOURCE</envar> à "
614
#~ "l'une des cinq valeurs ci-dessus."
615
 
616
#~ msgid ""
617
#~ "Additionally, any local certificates stored in "
618
#~ "<filename>/etc/ssl/local</filename> will be copied into both the single-file"
619
#~ " <filename>/etc/ssl/ca-bundle.crt</filename> (used by programs that link to "
620
#~ "<application>gnutls</application>), and into the certificate store directory"
621
#~ " <filename>/etc/ssl/certs</filename> (used by programs that link to "
622
#~ "<application>OpenSSL</application>). All certificates will pass a date and "
623
#~ "trust validation, and any existing certificates in <filename>/etc/ssl/ca-"
624
#~ "bundle.crt</filename> or <filename>/etc/ssl/certs</filename> will be removed"
625
#~ " upon successful completion of this script."
626
#~ msgstr ""
627
#~ "De plus, tout certificat local stocké dans "
628
#~ "<filename>/etc/ssl/local</filename> sera copié dans le fichier "
629
#~ "<filename>/etc/ssl/ca-bundle.crt</filename> (utilisé par les programmes qui "
630
#~ "se lient à <application>gnutls</application>) et dans le répertoire du "
631
#~ "magasin de certificats <filename>/etc/ssl/certs</filename> (utilisé par les "
632
#~ "programmes qui se lient à <application>OpenSSL</application>). Tous les "
633
#~ "certificats passeront un test de validation de leur date et de leur "
634
#~ "confiance, et tout certificat existant dans <filename>/etc/ssl/ca-"
635
#~ "bundle.crt</filename> ou <filename>/etc/ssl-certs</filename> sera supprimé à"
636
#~ " la fin de ce script si tout va bien."
637
 
638
#~ msgid ""
639
#~ "Finally, if you've installed <xref linkend=\"java\"/> or <xref "
640
#~ "linkend=\"openjdk\"/>, then it will also update the java cacerts file at "
641
#~ "<filename>/etc/ssl/java/cacerts</filename>."
642
#~ msgstr ""
643
#~ "Enfin, si vous avez installé <xref linkend=\"java\"/> ou <xref "
644
#~ "linkend=\"openjdk\"/>, il mettra aussi à jour le fichier cacerts de java "
645
#~ "dans <filename>/etc/ssl/java/cacerts</filename>."
646
 
647
#~ msgid ""
648
#~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &amp;&amp;\n"
649
#~ "/usr/sbin/make-ca.sh\n"
650
#~ "</userinput>"
651
#~ msgstr ""
652
#~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &amp;&amp;\n"
653
#~ "/usr/sbin/make-ca.sh\n"
654
#~ "</userinput>"
655
 
7193 jlepiller 656
#~ msgid "/mozilla/source/security/nss/lib/ckfw/builtins"
657
#~ msgstr "/mozilla/source/security/nss/lib/ckfw/builtins"
7156 jlepiller 658
 
7193 jlepiller 659
#~ msgid "6 MB"
7233 jlepiller 660
#~ msgstr "6 Mo"
7156 jlepiller 661
 
7193 jlepiller 662
#~ msgid ""
663
#~ "The certfile.txt file above is actually retrieved from <ulink "
664
#~ "url=\"https://hg.mozilla.org/releases/mozilla-"
665
#~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>.  It is"
666
#~ " really an HTML file, but the text file can be retrieved indirectly from the"
667
#~ " HTML file.  The Download URL above automates that process and also adds a "
668
#~ "line where the date can be extracted as a revision number by the scripts "
669
#~ "below."
670
#~ msgstr ""
671
#~ "Le fichier certfile.txt dessous est en fait récupéré depuis <ulink "
672
#~ "url=\"https://hg.mozilla.org/releases/mozilla-"
673
#~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>.  C'est"
674
#~ " en fait un fichier HTML, mais le fichier texte peut être pris indirectement"
675
#~ " depuis le fichier HTML. L'URL dessous automatise ce processus et ajoute "
676
#~ "aussi une ligne où la date peut être extraite en tant que numéro de révision"
677
#~ " par le script."
678
 
679
#~ msgid "Recommended"
680
#~ msgstr "Recommandées"
681
 
682
#~ msgid ""
683
#~ "<userinput>cat > /usr/bin/make-cert.pl &lt;&lt; \"EOF\"\n"
684
#~ "<literal>#!/usr/bin/perl -w\n"
685
#~ "\n"
686
#~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n"
687
#~ "# Run as ./make-cert.pl > certificate.crt\n"
688
#~ "#\n"
689
#~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n"
690
#~ "#\n"
691
#~ "# This script modified for use with single file data (tempfile.cer) extracted\n"
692
#~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n"
693
#~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n"
694
#~ "#\n"
695
#~ "# Authors: DJ Lucas\n"
696
#~ "#          Bruce Dubbs\n"
697
#~ "#\n"
698
#~ "# Version 20120211\n"
699
#~ "\n"
700
#~ "my $certdata = './tempfile.cer';\n"
701
#~ "\n"
702
#~ "open( IN, \"cat $certdata|\" )\n"
703
#~ "    || die \"could not open $certdata\";\n"
704
#~ "\n"
705
#~ "my $incert = 0;\n"
706
#~ "\n"
707
#~ "while ( &lt;IN&gt; )\n"
708
#~ "{\n"
709
#~ "    if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n"
710
#~ "    {\n"
711
#~ "        $incert = 1;\n"
712
#~ "        open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n"
713
#~ "            || die \"could not pipe to openssl x509\";\n"
714
#~ "    }\n"
715
#~ "\n"
716
#~ "    elsif ( /^END/ &amp;&amp; $incert )\n"
717
#~ "    {\n"
718
#~ "        close( OUT );\n"
719
#~ "        $incert = 0;\n"
720
#~ "        print \"\\n\\n\";\n"
721
#~ "    }\n"
722
#~ "\n"
723
#~ "    elsif ($incert)\n"
724
#~ "    {\n"
725
#~ "        my @bs = split( /\\\\/ );\n"
726
#~ "        foreach my $b (@bs)\n"
727
#~ "        {\n"
728
#~ "            chomp $b;\n"
729
#~ "            printf( OUT \"%c\", oct($b) ) unless $b eq '';\n"
730
#~ "        }\n"
731
#~ "    }\n"
732
#~ "}</literal>\n"
733
#~ "EOF\n"
734
#~ "\n"
735
#~ "chmod +x /usr/bin/make-cert.pl</userinput>"
736
#~ msgstr ""
737
#~ "<userinput>cat > /usr/bin/make-cert.pl &lt;&lt; \"EOF\"\n"
738
#~ "<literal>#!/usr/bin/perl -w\n"
739
#~ "\n"
740
#~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n"
741
#~ "# Run as ./make-cert.pl > certificate.crt\n"
742
#~ "#\n"
743
#~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n"
744
#~ "#\n"
745
#~ "# This script modified for use with single file data (tempfile.cer) extracted\n"
746
#~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n"
747
#~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n"
748
#~ "#\n"
749
#~ "# Authors: DJ Lucas\n"
750
#~ "#          Bruce Dubbs\n"
751
#~ "#\n"
752
#~ "# Version 20120211\n"
753
#~ "\n"
754
#~ "my $certdata = './tempfile.cer';\n"
755
#~ "\n"
756
#~ "open( IN, \"cat $certdata|\" )\n"
757
#~ "    || die \"could not open $certdata\";\n"
758
#~ "\n"
759
#~ "my $incert = 0;\n"
760
#~ "\n"
761
#~ "while ( &lt;IN&gt; )\n"
762
#~ "{\n"
763
#~ "    if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n"
764
#~ "    {\n"
765
#~ "        $incert = 1;\n"
766
#~ "        open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n"
767
#~ "            || die \"could not pipe to openssl x509\";\n"
768
#~ "    }\n"
769
#~ "\n"
770
#~ "    elsif ( /^END/ &amp;&amp; $incert )\n"
771
#~ "    {\n"
772
#~ "        close( OUT );\n"
773
#~ "        $incert = 0;\n"
774
#~ "        print \"\\n\\n\";\n"
775
#~ "    }\n"
776
#~ "\n"
777
#~ "    elsif ($incert)\n"
778
#~ "    {\n"
779
#~ "        my @bs = split( /\\\\/ );\n"
780
#~ "        foreach my $b (@bs)\n"
781
#~ "        {\n"
782
#~ "            chomp $b;\n"
783
#~ "            printf( OUT \"%c\", oct($b) ) unless $b eq '';\n"
784
#~ "        }\n"
785
#~ "    }\n"
786
#~ "}</literal>\n"
787
#~ "EOF\n"
788
#~ "\n"
789
#~ "chmod +x /usr/bin/make-cert.pl</userinput>"
790
 
791
#~ msgid ""
792
#~ "The following script creates the certificates and a bundle of all the "
793
#~ "certificates.  It creates a <filename class='directory'>./certs</filename> "
794
#~ "directory and <filename>./BLFS-ca-bundle-${VERSION}.crt</filename>.  Again "
795
#~ "create this script as the <systemitem class=\"username\">root</systemitem> "
796
#~ "user:"
797
#~ msgstr ""
798
#~ "Le script suivant crée les certificats et un bouquet de tous les "
799
#~ "certificats. Il crée un répertoire <filename "
800
#~ "class='directory'>./certs</filename> et <filename>./BLFS-ca-"
801
#~ "bundle-${VERSION}.crt</filename>.  Créez de nouveau ce script en tant "
802
#~ "qu'utilisateur <systemitem class=\"username\">root</systemitem>&nbsp;:"
803
 
804
#~ msgid ""
805
#~ "<userinput>cat > /usr/bin/make-ca.sh &lt;&lt; \"EOF\"\n"
806
#~ "<literal>#!/bin/sh\n"
807
#~ "# Begin make-ca.sh\n"
808
#~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n"
809
#~ "#\n"
810
#~ "# The file certdata.txt must exist in the local directory\n"
811
#~ "# Version number is obtained from the version of the data.\n"
812
#~ "#\n"
813
#~ "# Authors: DJ Lucas\n"
814
#~ "#          Bruce Dubbs\n"
815
#~ "#\n"
816
#~ "# Version 20120211\n"
817
#~ "\n"
818
#~ "# Some data in the certs have UTF-8 characters\n"
819
#~ "export LANG=en_US.utf8\n"
820
#~ "\n"
821
#~ "certdata=\"certdata.txt\"\n"
822
#~ "\n"
823
#~ "if [ ! -r $certdata ]; then\n"
824
#~ "  echo \"$certdata must be in the local directory\"\n"
825
#~ "  exit 1\n"
826
#~ "fi\n"
827
#~ "\n"
828
#~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n"
829
#~ "\n"
830
#~ "if [ -z \"${REVISION}\" ]; then\n"
831
#~ "  echo \"$certfile has no 'Revision' in CVS_ID\"\n"
832
#~ "  exit 1\n"
833
#~ "fi\n"
834
#~ "\n"
835
#~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n"
836
#~ "\n"
837
#~ "TEMPDIR=$(mktemp -d)\n"
838
#~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n"
839
#~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n"
840
#~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n"
841
#~ "SSLDIR=\"/etc/ssl\"\n"
842
#~ "\n"
843
#~ "mkdir \"${TEMPDIR}/certs\"\n"
844
#~ "\n"
845
#~ "# Get a list of starting lines for each cert\n"
846
#~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n"
847
#~ "\n"
848
#~ "# Get a list of ending lines for each cert\n"
849
#~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n"
850
#~ "\n"
851
#~ "# Start a loop\n"
852
#~ "for certbegin in ${CERTBEGINLIST}; do\n"
853
#~ "  for certend in ${CERTENDLIST}; do\n"
854
#~ "    if test \"${certend}\" -gt \"${certbegin}\"; then\n"
855
#~ "      break\n"
856
#~ "    fi\n"
857
#~ "  done\n"
858
#~ "\n"
859
#~ "  # Dump to a temp file with the name of the file as the beginning line number\n"
860
#~ "  sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n"
861
#~ "done\n"
862
#~ "\n"
863
#~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n"
864
#~ "\n"
865
#~ "mkdir -p certs\n"
866
#~ "rm -f certs/*      # Make sure the directory is clean\n"
867
#~ "\n"
868
#~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n"
869
#~ "  # Make sure that the cert is trusted...\n"
870
#~ "  grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n"
871
#~ "    egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n"
872
#~ "\n"
873
#~ "  if test \"${?}\" = \"0\"; then\n"
874
#~ "    # Throw a meaningful error and remove the file\n"
875
#~ "    cp \"${tempfile}\" tempfile.cer\n"
876
#~ "    perl ${CONVERTSCRIPT} > tempfile.crt\n"
877
#~ "    keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
878
#~ "    echo \"Certificate ${keyhash} is not trusted!  Removing...\"\n"
879
#~ "    rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n"
880
#~ "    continue\n"
881
#~ "  fi\n"
882
#~ "\n"
883
#~ "  # If execution made it to here in the loop, the temp cert is trusted\n"
884
#~ "  # Find the cert data and generate a cert file for it\n"
885
#~ "\n"
886
#~ "  cp \"${tempfile}\" tempfile.cer\n"
887
#~ "  perl ${CONVERTSCRIPT} > tempfile.crt\n"
888
#~ "  keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
889
#~ "  mv tempfile.crt \"certs/${keyhash}.pem\"\n"
890
#~ "  rm -f tempfile.cer \"${tempfile}\"\n"
891
#~ "  echo \"Created ${keyhash}.pem\"\n"
892
#~ "done\n"
893
#~ "\n"
894
#~ "# Remove blacklisted files\n"
895
#~ "# MD5 Collision Proof of Concept CA\n"
896
#~ "if test -f certs/8f111d69.pem; then\n"
897
#~ "  echo \"Certificate 8f111d69 is not trusted!  Removing...\"\n"
898
#~ "  rm -f certs/8f111d69.pem\n"
899
#~ "fi\n"
900
#~ "\n"
901
#~ "# Finally, generate the bundle and clean up.\n"
902
#~ "cat certs/*.pem >  ${BUNDLE}\n"
903
#~ "rm -r \"${TEMPDIR}\"</literal>\n"
904
#~ "EOF\n"
905
#~ "\n"
906
#~ "chmod +x /usr/bin/make-ca.sh</userinput>"
907
#~ msgstr ""
908
#~ "<userinput>cat > /usr/bin/make-ca.sh &lt;&lt; \"EOF\"\n"
909
#~ "<literal>#!/bin/sh\n"
910
#~ "# Begin make-ca.sh\n"
911
#~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n"
912
#~ "#\n"
913
#~ "# The file certdata.txt must exist in the local directory\n"
914
#~ "# Version number is obtained from the version of the data.\n"
915
#~ "#\n"
916
#~ "# Authors: DJ Lucas\n"
917
#~ "#          Bruce Dubbs\n"
918
#~ "#\n"
919
#~ "# Version 20120211\n"
920
#~ "\n"
921
#~ "# Some data in the certs have UTF-8 characters\n"
922
#~ "export LANG=en_US.utf8\n"
923
#~ "\n"
924
#~ "certdata=\"certdata.txt\"\n"
925
#~ "\n"
926
#~ "if [ ! -r $certdata ]; then\n"
927
#~ "  echo \"$certdata must be in the local directory\"\n"
928
#~ "  exit 1\n"
929
#~ "fi\n"
930
#~ "\n"
931
#~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n"
932
#~ "\n"
933
#~ "if [ -z \"${REVISION}\" ]; then\n"
934
#~ "  echo \"$certfile has no 'Revision' in CVS_ID\"\n"
935
#~ "  exit 1\n"
936
#~ "fi\n"
937
#~ "\n"
938
#~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n"
939
#~ "\n"
940
#~ "TEMPDIR=$(mktemp -d)\n"
941
#~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n"
942
#~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n"
943
#~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n"
944
#~ "SSLDIR=\"/etc/ssl\"\n"
945
#~ "\n"
946
#~ "mkdir \"${TEMPDIR}/certs\"\n"
947
#~ "\n"
948
#~ "# Get a list of starting lines for each cert\n"
949
#~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n"
950
#~ "\n"
951
#~ "# Get a list of ending lines for each cert\n"
952
#~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n"
953
#~ "\n"
954
#~ "# Start a loop\n"
955
#~ "for certbegin in ${CERTBEGINLIST}; do\n"
956
#~ "  for certend in ${CERTENDLIST}; do\n"
957
#~ "    if test \"${certend}\" -gt \"${certbegin}\"; then\n"
958
#~ "      break\n"
959
#~ "    fi\n"
960
#~ "  done\n"
961
#~ "\n"
962
#~ "  # Dump to a temp file with the name of the file as the beginning line number\n"
963
#~ "  sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n"
964
#~ "done\n"
965
#~ "\n"
966
#~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n"
967
#~ "\n"
968
#~ "mkdir -p certs\n"
969
#~ "rm -f certs/*      # Make sure the directory is clean\n"
970
#~ "\n"
971
#~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n"
972
#~ "  # Make sure that the cert is trusted...\n"
973
#~ "  grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n"
974
#~ "    egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n"
975
#~ "\n"
976
#~ "  if test \"${?}\" = \"0\"; then\n"
977
#~ "    # Throw a meaningful error and remove the file\n"
978
#~ "    cp \"${tempfile}\" tempfile.cer\n"
979
#~ "    perl ${CONVERTSCRIPT} > tempfile.crt\n"
980
#~ "    keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
981
#~ "    echo \"Certificate ${keyhash} is not trusted!  Removing...\"\n"
982
#~ "    rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n"
983
#~ "    continue\n"
984
#~ "  fi\n"
985
#~ "\n"
986
#~ "  # If execution made it to here in the loop, the temp cert is trusted\n"
987
#~ "  # Find the cert data and generate a cert file for it\n"
988
#~ "\n"
989
#~ "  cp \"${tempfile}\" tempfile.cer\n"
990
#~ "  perl ${CONVERTSCRIPT} > tempfile.crt\n"
991
#~ "  keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
992
#~ "  mv tempfile.crt \"certs/${keyhash}.pem\"\n"
993
#~ "  rm -f tempfile.cer \"${tempfile}\"\n"
994
#~ "  echo \"Created ${keyhash}.pem\"\n"
995
#~ "done\n"
996
#~ "\n"
997
#~ "# Remove blacklisted files\n"
998
#~ "# MD5 Collision Proof of Concept CA\n"
999
#~ "if test -f certs/8f111d69.pem; then\n"
1000
#~ "  echo \"Certificate 8f111d69 is not trusted!  Removing...\"\n"
1001
#~ "  rm -f certs/8f111d69.pem\n"
1002
#~ "fi\n"
1003
#~ "\n"
1004
#~ "# Finally, generate the bundle and clean up.\n"
1005
#~ "cat certs/*.pem >  ${BUNDLE}\n"
1006
#~ "rm -r \"${TEMPDIR}\"</literal>\n"
1007
#~ "EOF\n"
1008
#~ "\n"
1009
#~ "chmod +x /usr/bin/make-ca.sh</userinput>"
1010
 
1011
#~ msgid ""
1012
#~ "Add a short script to remove expired certificates from a directory.  Again "
1013
#~ "create this script as the <systemitem class=\"username\">root</systemitem> "
1014
#~ "user:"
1015
#~ msgstr ""
1016
#~ "Ajoutez un script bref pour supprimer les certificats expirés d'un "
1017
#~ "répertoire. Créez de nouveau ce script en tant qu'utilisateur <systemitem "
1018
#~ "class=\"username\">root</systemitem>&nbsp;:"
1019
 
1020
#~ msgid ""
1021
#~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh &lt;&lt; \"EOF\"\n"
1022
#~ "<literal>#!/bin/sh\n"
1023
#~ "# Begin /usr/sbin/remove-expired-certs.sh\n"
1024
#~ "#\n"
1025
#~ "# Version 20120211\n"
1026
#~ "\n"
1027
#~ "# Make sure the date is parsed correctly on all systems\n"
1028
#~ "mydate()\n"
1029
#~ "{\n"
1030
#~ "  local y=$( echo $1 | cut -d\" \" -f4 )\n"
1031
#~ "  local M=$( echo $1 | cut -d\" \" -f1 )\n"
1032
#~ "  local d=$( echo $1 | cut -d\" \" -f2 )\n"
1033
#~ "  local m\n"
1034
#~ "\n"
1035
#~ "  if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n"
1036
#~ "\n"
1037
#~ "  case $M in\n"
1038
#~ "    Jan) m=\"01\";;\n"
1039
#~ "    Feb) m=\"02\";;\n"
1040
#~ "    Mar) m=\"03\";;\n"
1041
#~ "    Apr) m=\"04\";;\n"
1042
#~ "    May) m=\"05\";;\n"
1043
#~ "    Jun) m=\"06\";;\n"
1044
#~ "    Jul) m=\"07\";;\n"
1045
#~ "    Aug) m=\"08\";;\n"
1046
#~ "    Sep) m=\"09\";;\n"
1047
#~ "    Oct) m=\"10\";;\n"
1048
#~ "    Nov) m=\"11\";;\n"
1049
#~ "    Dec) m=\"12\";;\n"
1050
#~ "  esac\n"
1051
#~ "\n"
1052
#~ "  certdate=\"${y}${m}${d}\"\n"
1053
#~ "}\n"
1054
#~ "\n"
1055
#~ "OPENSSL=/usr/bin/openssl\n"
1056
#~ "DIR=/etc/ssl/certs\n"
1057
#~ "\n"
1058
#~ "if [ $# -gt 0 ]; then\n"
1059
#~ "  DIR=\"$1\"\n"
1060
#~ "fi\n"
1061
#~ "\n"
1062
#~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n"
1063
#~ "today=$( date +%Y%m%d )\n"
1064
#~ "\n"
1065
#~ "for cert in $certs; do\n"
1066
#~ "  notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n"
1067
#~ "  date=$( echo ${notafter} |  sed 's/^notAfter=//' )\n"
1068
#~ "  mydate \"$date\"\n"
1069
#~ "\n"
1070
#~ "  if [ ${certdate} -lt ${today} ]; then\n"
1071
#~ "     echo \"${cert} expired on ${certdate}! Removing...\"\n"
1072
#~ "     rm -f \"${cert}\"\n"
1073
#~ "  fi\n"
1074
#~ "done</literal>\n"
1075
#~ "EOF\n"
1076
#~ "\n"
1077
#~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>"
1078
#~ msgstr ""
1079
#~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh &lt;&lt; \"EOF\"\n"
1080
#~ "<literal>#!/bin/sh\n"
1081
#~ "# Begin /usr/sbin/remove-expired-certs.sh\n"
1082
#~ "#\n"
1083
#~ "# Version 20120211\n"
1084
#~ "\n"
1085
#~ "# Make sure the date is parsed correctly on all systems\n"
1086
#~ "mydate()\n"
1087
#~ "{\n"
1088
#~ "  local y=$( echo $1 | cut -d\" \" -f4 )\n"
1089
#~ "  local M=$( echo $1 | cut -d\" \" -f1 )\n"
1090
#~ "  local d=$( echo $1 | cut -d\" \" -f2 )\n"
1091
#~ "  local m\n"
1092
#~ "\n"
1093
#~ "  if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n"
1094
#~ "\n"
1095
#~ "  case $M in\n"
1096
#~ "    Jan) m=\"01\";;\n"
1097
#~ "    Feb) m=\"02\";;\n"
1098
#~ "    Mar) m=\"03\";;\n"
1099
#~ "    Apr) m=\"04\";;\n"
1100
#~ "    May) m=\"05\";;\n"
1101
#~ "    Jun) m=\"06\";;\n"
1102
#~ "    Jul) m=\"07\";;\n"
1103
#~ "    Aug) m=\"08\";;\n"
1104
#~ "    Sep) m=\"09\";;\n"
1105
#~ "    Oct) m=\"10\";;\n"
1106
#~ "    Nov) m=\"11\";;\n"
1107
#~ "    Dec) m=\"12\";;\n"
1108
#~ "  esac\n"
1109
#~ "\n"
1110
#~ "  certdate=\"${y}${m}${d}\"\n"
1111
#~ "}\n"
1112
#~ "\n"
1113
#~ "OPENSSL=/usr/bin/openssl\n"
1114
#~ "DIR=/etc/ssl/certs\n"
1115
#~ "\n"
1116
#~ "if [ $# -gt 0 ]; then\n"
1117
#~ "  DIR=\"$1\"\n"
1118
#~ "fi\n"
1119
#~ "\n"
1120
#~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n"
1121
#~ "today=$( date +%Y%m%d )\n"
1122
#~ "\n"
1123
#~ "for cert in $certs; do\n"
1124
#~ "  notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n"
1125
#~ "  date=$( echo ${notafter} |  sed 's/^notAfter=//' )\n"
1126
#~ "  mydate \"$date\"\n"
1127
#~ "\n"
1128
#~ "  if [ ${certdate} -lt ${today} ]; then\n"
1129
#~ "     echo \"${cert} expired on ${certdate}! Removing...\"\n"
1130
#~ "     rm -f \"${cert}\"\n"
1131
#~ "  fi\n"
1132
#~ "done</literal>\n"
1133
#~ "EOF\n"
1134
#~ "\n"
1135
#~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>"
1136
 
1137
#~ msgid ""
1138
#~ "The following commands will fetch the certificates and convert them to the "
1139
#~ "correct format.  If desired, a web browser may be used instead of "
1140
#~ "<application>wget</application> but the file will need to be saved with the "
1141
#~ "name <filename>certdata.txt</filename>.  These commands can be repeated as "
1142
#~ "necessary to update the CA Certificates."
1143
#~ msgstr ""
1144
#~ "Les commandes suivantes récupéreront les certificats et les convertiront "
1145
#~ "dans le bon format.  Si vous le désirez, vous pouvez utiliser un navigateur "
1146
#~ "Internet plutôt que <application>wget</application> mais le fichier devra "
1147
#~ "être enregistré sous le nom <filename>certdata.txt</filename>.  Ces "
1148
#~ "commandes peuvent être répétées autant de fois que nécessaire pour mettre à "
1149
#~ "jour les Certificats CA."
1150
 
1151
#~ msgid ""
1152
#~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &amp;&amp;\n"
1153
#~ "rm -f certdata.txt &amp;&amp;\n"
1154
#~ "wget $URL          &amp;&amp;\n"
1155
#~ "make-ca.sh         &amp;&amp;\n"
1156
#~ "unset URL</userinput>"
1157
#~ msgstr ""
1158
#~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &amp;&amp;\n"
1159
#~ "rm -f certdata.txt &amp;&amp;\n"
1160
#~ "wget $URL          &amp;&amp;\n"
1161
#~ "make-ca.sh         &amp;&amp;\n"
1162
#~ "unset URL</userinput>"
1163
 
1164
#~ msgid ""
1165
#~ "<userinput>SSLDIR=/etc/ssl                                              &amp;&amp;\n"
1166
#~ "remove-expired-certs.sh certs                                &amp;&amp;\n"
1167
#~ "install -d ${SSLDIR}/certs                                   &amp;&amp;\n"
1168
#~ "cp -v certs/*.pem ${SSLDIR}/certs                            &amp;&amp;\n"
1169
#~ "c_rehash                                                     &amp;&amp;\n"
1170
#~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt          &amp;&amp;\n"
1171
#~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &amp;&amp;\n"
1172
#~ "unset SSLDIR</userinput>"
1173
#~ msgstr ""
1174
#~ "<userinput>SSLDIR=/etc/ssl                                              &amp;&amp;\n"
1175
#~ "remove-expired-certs.sh certs                                &amp;&amp;\n"
1176
#~ "install -d ${SSLDIR}/certs                                   &amp;&amp;\n"
1177
#~ "cp -v certs/*.pem ${SSLDIR}/certs                            &amp;&amp;\n"
1178
#~ "c_rehash                                                     &amp;&amp;\n"
1179
#~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt          &amp;&amp;\n"
1180
#~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &amp;&amp;\n"
1181
#~ "unset SSLDIR</userinput>"
1182
 
1183
#~ msgid "Finally, clean up the current directory:"
1184
#~ msgstr "Enfin, nettoyez le répertoire courant&nbsp;:"
1185
 
1186
#~ msgid "<userinput>rm -r certs BLFS-ca-bundle*</userinput>"
1187
#~ msgstr "<userinput>rm -r certs BLFS-ca-bundle*</userinput>"
1188
 
1189
#~ msgid ""
1190
#~ "After installing or updating certificates, if OpenJDK is installed, update "
1191
#~ "the certificates for Java using the procedures at <xref linkend='ojdk-"
1192
#~ "certs'/>."
1193
#~ msgstr ""
1194
#~ "Après l'installation ou la mise à jour des certificats, si OpenJDK est "
1195
#~ "installé, mettez à jour les certificats pour Java en utilisant la procédure "
1196
#~ "dans <xref linkend=\"ojdk-certs\"/>."
1197
 
1198
#~ msgid "make-ca.sh, make-cert.pl and remove-expired-certs.sh"
1199
#~ msgstr "make-ca.sh, make-cert.pl et remove-expired-certs.sh"
1200
 
1201
#~ msgid "<command>make-cert.pl</command>"
1202
#~ msgstr "<command>make-cert.pl</command>"
1203
 
1204
#~ msgid ""
1205
#~ "is a utility <application>perl</application> script that converts a single "
1206
#~ "binary certificate (.der format) into .pem format."
1207
#~ msgstr ""
1208
#~ "est un script <application>perl</application> qui convertit un certificat "
1209
#~ "binaire unique (format .der) au format .pem."
1210
 
1211
#~ msgid "make-cert"
1212
#~ msgstr "make-cert"
1213
 
1214
#~ msgid "<command>remove-expired-certs.sh</command>"
1215
#~ msgstr "<command>remove-expired-certs.sh</command>"
1216
 
1217
#~ msgid ""
1218
#~ "is a utility shell script that removes expired certificates from a "
1219
#~ "directory.  The default directory is <filename "
1220
#~ "class='directory'>/etc/ssl/certs</filename>."
1221
#~ msgstr ""
1222
#~ "est un script shell qui supprime les certificats expirés d'un répertoire. Le"
1223
#~ " répertoire par défaut est <filename "
1224
#~ "class='directory'>/etc/ssl/certs</filename>."
1225
 
1226
#~ msgid "remove-expired-certs"
1227
#~ msgstr "remove-expired-certs"