Subversion Repositories svn LFS-FR

Compare Revisions

Ignore whitespace Rev 7799 → Rev 7800

/trunk/blfs/fr/postlfs/security/make-ca.po
6,7 → 6,7
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2019-02-15 20:02+0000\n"
"POT-Creation-Date: 2019-02-24 12:05+0000\n"
"PO-Revision-Date: 2019-01-03 16:00+0000\n"
"Last-Translator: roptat <roptat@lepiller.eu>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
60,14 → 60,14
#. type: Content of: <sect1><sect1info>
#: blfs-en/postlfs/security/make-ca.xml:21
#| msgid ""
#| "<othername>$LastChangedBy: pierre $</othername> <date>$Date: 2019-01-15 "
#| "17:33:56 +0000 (Tue, 15 Jan 2019) $</date>"
#| "<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2019-02-15 "
#| "19:28:28 +0000 (Fri, 15 Feb 2019) $</date>"
msgid ""
"<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2019-02-15 "
"19:28:28 +0000 (Fri, 15 Feb 2019) $</date>"
"<othername>$LastChangedBy: dj $</othername> <date>$Date: 2019-02-24 05:09:58"
" +0000 (Sun, 24 Feb 2019) $</date>"
msgstr ""
"<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2019-02-15 "
"19:28:28 +0000 (Fri, 15 Feb 2019) $</date>"
"<othername>$LastChangedBy: dj $</othername> <date>$Date: 2019-02-24 05:09:58"
" +0000 (Sun, 24 Feb 2019) $</date>"
 
#. type: Content of: <sect1><title>
#: blfs-en/postlfs/security/make-ca.xml:25
77,8 → 77,8
#. type: Content of:
#. <sect1><sect2><variablelist><varlistentry><listitem><indexterm><primary>
#: blfs-en/postlfs/security/make-ca.xml:27
#: blfs-en/postlfs/security/make-ca.xml:226
#: blfs-en/postlfs/security/make-ca.xml:243
#: blfs-en/postlfs/security/make-ca.xml:258
#: blfs-en/postlfs/security/make-ca.xml:276
msgid "make-ca"
msgstr "make-ca"
 
208,6 → 208,18
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:98
#, fuzzy
#| msgid ""
#| "The <application>make-ca</application> script will download and process the "
#| "certificates included in the <filename>certdata.txt</filename> file for use "
#| "as trust anchors for the <xref linkend=\"p11-kit\"/> trust module. "
#| "Additionally, it will generate system certificate stores used by BLFS "
#| "applications (if the recommended and optional applications are present on "
#| "the system). Any local certificates stored in "
#| "<filename>/etc/ssl/local</filename> will be imported to both the trust "
#| "anchors and the generated certificate stores (overriding Mozilla's trust). "
#| "Certificates in this directory should be stored as PEM encoded "
#| "<application>OpenSSL</application> trusted certificates."
msgid ""
"The <application>make-ca</application> script will download and process the "
"certificates included in the <filename>certdata.txt</filename> file for use "
216,9 → 228,7
"applications (if the recommended and optional applications are present on "
"the system). Any local certificates stored in "
"<filename>/etc/ssl/local</filename> will be imported to both the trust "
"anchors and the generated certificate stores (overriding Mozilla's trust). "
"Certificates in this directory should be stored as PEM encoded "
"<application>OpenSSL</application> trusted certificates."
"anchors and the generated certificate stores (overriding Mozilla's trust)."
msgstr ""
"Le script <application>make-ca</application> téléchargera et adaptera les "
"certificats inclus dans le fichier <filename>certdata.txt</filename> pour "
233,86 → 243,8
"<application>OpenSSL</application> encodé en PEM."
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:109
#: blfs-en/postlfs/security/make-ca.xml:108
msgid ""
"To create an <application>OpenSSL</application> trusted certificate from a "
"regular PEM encoded file, you need to add trust arguments to the "
"<command>openssl</command> command, and create a new certificate. There are "
"three trust types that are recognized by the <application>make-"
"ca</application> script, SSL/TLS, S/Mime, and code signing. For example, "
"using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> roots, if you"
" want to trust both for all three roles, the following commands will create "
"appropriate OpenSSL trusted certificates (run as the <systemitem "
"class=\"username\">root</systemitem> user after <xref linkend=\"wget\"/> is "
"installed):"
msgstr ""
"Pour créer un certificat de confiance <application>OpenSSL</application> "
"depuis un fichier normal encodé en PEM, vous devrez ajouter des arguments "
"«&nbsp;trust&nbsp;» à la commande <command>openssl</command> et créer un "
"nouveau certificat. Il y a trois types de confiances reconnues par le script"
" <application>make-ca</application>&nbsp;: SSL/TLS, S/Mime et la signature "
"de code. Par exemple, si vous souhaitez utiliser les racines <ulink "
"url=\"http://www.cacert.org/\">CAcert</ulink> pour que les deux soient de "
"confiance pour ces trois rôles, les commandes suivantes créeront des "
"certificats de confiance OpenSSL approprié (à lancer en tant qu'utilisateur "
"<systemitem class=\"username\">root</systemitem> après l'installation de "
"<xref linkend=\"wget\"/>)&nbsp;:"
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:121
#, no-wrap
msgid ""
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
msgstr ""
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:131
msgid ""
"If one of the three trust arguments is omitted, the certificate is neither "
"trusted, nor rejected for that role. Clients that use "
"<application>OpenSSL</application> or <application>NSS</application> "
"encountering this certificate will present a warning to the user. Clients "
"using <application>GnuTLS</application> without "
"<application>p11-kit</application> support are not aware of trusted "
"certificates. To include this CA into the ca-bundle.crt (used for "
"<application>GnuTLS</application>), it must have <envar>serverAuth</envar> "
"trust. Additionally, to explicitly disallow a certificate for a particular "
"use, replace the <parameter>-addtrust</parameter> flag with the "
"<parameter>-addreject</parameter> flag."
msgstr ""
"Si un argument trust en omis, le certificat n'est ni reconnu ni rejeté pour "
"ce rôle. Les clients qui utilisent <application>OpenSSL</application> ou "
"<application>NSS</application> rencontrant ce certificat renverront un "
"avertissement à l'utilisateur . Les clients qui utilisent "
"<application>GnuTLS</application> sans le support de "
"<application>p11-kit</application> ne sont pas conscient des certificats de "
"confiance. Pour inclure cette CA dans le fichier ca-bundle.crt (utilisé par "
"<application>GnuTLS</application>), il doit avoir la confiance "
"<envar>serverAuth</envar>. De plus, pour interdire un certificat pour une "
"utilisation particulière, remplacez le paramètre "
"<parameter>-addtrust</parameter> par le paramètre "
"<parameter>-addreject</parameter>."
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:143
msgid ""
"To install the various certificate stores, first install the "
"<application>make-ca</application> script into the correct location. As the"
" <systemitem class=\"username\">root</systemitem> user:"
322,13 → 254,13
"<systemitem class=\"username\">root</systemitem>&nbsp;:"
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:147
#: blfs-en/postlfs/security/make-ca.xml:112
#, no-wrap
msgid "<userinput>make install</userinput>"
msgstr "<userinput>make install</userinput>"
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:149
#: blfs-en/postlfs/security/make-ca.xml:114
msgid ""
"As the <systemitem class=\"username\">root</systemitem> user, after "
"installing <xref linkend=\"p11-kit\"/>, download the certificate source and "
340,7 → 272,7
"commande suivante&nbsp;:"
 
#. type: Content of: <sect1><sect2><note><para>
#: blfs-en/postlfs/security/make-ca.xml:154
#: blfs-en/postlfs/security/make-ca.xml:119
msgid ""
"If running the script a second time with the same version of "
"<filename>certdata.txt</filename>, for instance, to add additional stores as"
356,18 → 288,25
"ligne de commande disponibles."
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:161
#: blfs-en/postlfs/security/make-ca.xml:126
#, no-wrap
msgid "<userinput>/usr/sbin/make-ca -g</userinput>"
msgstr "<userinput>/usr/sbin/make-ca -g</userinput>"
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:164
#: blfs-en/postlfs/security/make-ca.xml:129
#, fuzzy
#| msgid ""
#| "Previous versions of BLFS used the path <filename>/etc/ssl/ca-"
#| "bundle.crt</filename> for the <xref linkend=\"gnutls\"/> certificate store. "
#| "If software is still installed that references this file, create a "
#| "compatibilty symlink for the old location as the <systemitem "
#| "class=\"username\">root</systemitem> user:"
msgid ""
"Previous versions of BLFS used the path <filename>/etc/ssl/ca-"
"bundle.crt</filename> for the <xref linkend=\"gnutls\"/> certificate store. "
"If software is still installed that references this file, create a "
"compatibilty symlink for the old location as the <systemitem "
"compatibility symlink for the old location as the <systemitem "
"class=\"username\">root</systemitem> user:"
msgstr ""
"Les versions précédentes de BLFS utilisaient le chemin "
378,7 → 317,7
"class=\"username\">root</systemitem>&nbsp;:"
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:170
#: blfs-en/postlfs/security/make-ca.xml:135
#, no-wrap
msgid ""
"<userinput>ln -sfv /etc/pki/tls/certs/ca-bundle.crt \\\n"
388,7 → 327,7
" /etc/ssl/ca-bundle.crt</userinput>"
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:173
#: blfs-en/postlfs/security/make-ca.xml:138
msgid ""
"You should periodically update the store with the above command either "
"manually, or via a <phrase revision=\"sysv\">cron job.</phrase> <phrase "
416,7 → 355,7
"revision=\"systemd\">activer le timer systemd&nbsp;:</phrase>"
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:186
#: blfs-en/postlfs/security/make-ca.xml:151
#, no-wrap
msgid ""
"<userinput>install -vdm755 /etc/cron.weekly &amp;&amp;\n"
434,20 → 373,33
"chmod 754 /etc/cron.weekly/update-pki.sh</userinput>"
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:193
#: blfs-en/postlfs/security/make-ca.xml:158
#, no-wrap
msgid "<userinput>systemctl enable update-pki.timer</userinput>"
msgstr "<userinput>systemctl enable update-pki.timer</userinput>"
 
#. type: Content of: <sect1><sect2><title>
#: blfs-en/postlfs/security/make-ca.xml:198
#: blfs-en/postlfs/security/make-ca.xml:163
msgid "Configuring make-ca"
msgstr "Configuration de make-ca"
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:200
#: blfs-en/postlfs/security/make-ca.xml:165
#, fuzzy
#| msgid ""
#| "Genearally, no configuration is necessary on an LFS system, however, the "
#| "default <filename>certdata.txt</filename> file provided by make-ca is "
#| "obtained from the mozilla-release branch, and is modified to provide a "
#| "Mercurial revision. This will be the correct version for most systems. "
#| "There are several other variants of the file available for use that might be"
#| " preferred for one reason or another, including the files shipped with "
#| "Mozilla products in this book. RedHat and OpenSUSE, for instance, use the "
#| "version included in <xref linkend=\"nss\"/>. Additional upstream downloads "
#| "are available at the links included in <filename>/etc/make-"
#| "ca.conf.dist</filename>. Simply copy the file to <filename>/etc/make-"
#| "ca.conf</filename> and edit as appropriate."
msgid ""
"Genearally, no configuration is necessary on an LFS system, however, the "
"For most users, no additional configuration is necessary, however, the "
"default <filename>certdata.txt</filename> file provided by make-ca is "
"obtained from the mozilla-release branch, and is modified to provide a "
"Mercurial revision. This will be the correct version for most systems. "
473,43 → 425,206
"voulez."
 
#. type: Content of: <sect1><sect2><indexterm><primary>
#: blfs-en/postlfs/security/make-ca.xml:213
#: blfs-en/postlfs/security/make-ca.xml:178
msgid "/etc/make-ca.conf"
msgstr "/etc/make-ca.conf"
 
#. type: Content of: <sect1><sect2><bridgehead>
#: blfs-en/postlfs/security/make-ca.xml:181
msgid "About Trust Arguments"
msgstr ""
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:183
#, fuzzy
#| msgid ""
#| "If one of the three trust arguments is omitted, the certificate is neither "
#| "trusted, nor rejected for that role. Clients that use "
#| "<application>OpenSSL</application> or <application>NSS</application> "
#| "encountering this certificate will present a warning to the user. Clients "
#| "using <application>GnuTLS</application> without "
#| "<application>p11-kit</application> support are not aware of trusted "
#| "certificates. To include this CA into the ca-bundle.crt (used for "
#| "<application>GnuTLS</application>), it must have <envar>serverAuth</envar> "
#| "trust. Additionally, to explicitly disallow a certificate for a particular "
#| "use, replace the <parameter>-addtrust</parameter> flag with the "
#| "<parameter>-addreject</parameter> flag."
msgid ""
"There are three trust types that are recognized by the <application>make-"
"ca</application> script, SSL/TLS, S/Mime, and code signing. For "
"<application>OpenSSL</application>, these are "
"<parameter>serverAuth</parameter>, <parameter>emailProtection</parameter>, "
"and <parameter>codeSigning</parameter> respectively. If one of the three "
"trust arguments is omitted, the certificate is neither trusted, nor rejected"
" for that role. Clients that use <application>OpenSSL</application> or "
"<application>NSS</application> encountering this certificate will present a "
"warning to the user. Clients using <application>GnuTLS</application> without"
" <application>p11-kit</application> support are not aware of trusted "
"certificates. To include this CA into the <filename>ca-"
"bundle.crt</filename>, <filename>email-ca-bundle.crt</filename>, or "
"<filename>objsign-ca-bundle.crt</filename> files (the "
"<application>GnuTLS</application> legacy bundles), it must have the "
"appropriate trust arguments."
msgstr ""
"Si un argument trust en omis, le certificat n'est ni reconnu ni rejeté pour "
"ce rôle. Les clients qui utilisent <application>OpenSSL</application> ou "
"<application>NSS</application> rencontrant ce certificat renverront un "
"avertissement à l'utilisateur . Les clients qui utilisent "
"<application>GnuTLS</application> sans le support de "
"<application>p11-kit</application> ne sont pas conscient des certificats de "
"confiance. Pour inclure cette CA dans le fichier ca-bundle.crt (utilisé par "
"<application>GnuTLS</application>), il doit avoir la confiance "
"<envar>serverAuth</envar>. De plus, pour interdire un certificat pour une "
"utilisation particulière, remplacez le paramètre "
"<parameter>-addtrust</parameter> par le paramètre "
"<parameter>-addreject</parameter>."
 
#. type: Content of: <sect1><sect2><bridgehead>
#: blfs-en/postlfs/security/make-ca.xml:201
msgid "Adding Additional CA Certificates"
msgstr ""
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:203
#, fuzzy
#| msgid ""
#| "To create an <application>OpenSSL</application> trusted certificate from a "
#| "regular PEM encoded file, you need to add trust arguments to the "
#| "<command>openssl</command> command, and create a new certificate. There are "
#| "three trust types that are recognized by the <application>make-"
#| "ca</application> script, SSL/TLS, S/Mime, and code signing. For example, "
#| "using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> roots, if you"
#| " want to trust both for all three roles, the following commands will create "
#| "appropriate OpenSSL trusted certificates (run as the <systemitem "
#| "class=\"username\">root</systemitem> user after <xref linkend=\"wget\"/> is "
#| "installed):"
msgid ""
"The <filename class=\"directory\">/etc/ssl/local</filename> directory is "
"available to add additional CA certificates to the system. For instance, you"
" might need to add an organization or government CA certificate. Files in "
"this directory must be in the <application>OpenSSL</application> trusted "
"certificate format. To create an <application>OpenSSL</application> trusted "
"certificate from a regular PEM encoded file, you need to add trust arguments"
" to the <command>openssl</command> command, and create a new certificate. "
"For example, using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> "
"roots, if you want to trust both for all three roles, the following commands"
" will create appropriate OpenSSL trusted certificates (run as the "
"<systemitem class=\"username\">root</systemitem> user after <xref "
"linkend=\"wget\"/> is installed):"
msgstr ""
"Pour créer un certificat de confiance <application>OpenSSL</application> "
"depuis un fichier normal encodé en PEM, vous devrez ajouter des arguments "
"«&nbsp;trust&nbsp;» à la commande <command>openssl</command> et créer un "
"nouveau certificat. Il y a trois types de confiances reconnues par le script"
" <application>make-ca</application>&nbsp;: SSL/TLS, S/Mime et la signature "
"de code. Par exemple, si vous souhaitez utiliser les racines <ulink "
"url=\"http://www.cacert.org/\">CAcert</ulink> pour que les deux soient de "
"confiance pour ces trois rôles, les commandes suivantes créeront des "
"certificats de confiance OpenSSL approprié (à lancer en tant qu'utilisateur "
"<systemitem class=\"username\">root</systemitem> après l'installation de "
"<xref linkend=\"wget\"/>)&nbsp;:"
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:217
#, no-wrap
msgid ""
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
msgstr ""
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
" -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
" > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
 
#. type: Content of: <sect1><sect2><bridgehead>
#: blfs-en/postlfs/security/make-ca.xml:227
msgid "Overriding Mozilla Trust"
msgstr ""
 
#. type: Content of: <sect1><sect2><para>
#: blfs-en/postlfs/security/make-ca.xml:229
msgid ""
"Occasionally, there may be instances where you don't agree with Mozilla's "
"inclusion of a particular certificate authority. If you'd like to override "
"the default trust of a particular CA, simply create a copy of the existing "
"certificate in <filename class=\"directory\">/etc/ssl/local</filename> with "
"different trust arguments. For example, if you'd like to distrust the "
"\"Makebelieve_CA_Root\" file, run the following commands:"
msgstr ""
 
#. type: Content of: <sect1><sect2><screen>
#: blfs-en/postlfs/security/make-ca.xml:237
#, no-wrap
msgid ""
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
"openssl x509 -in /etc/ssl/certs/Makebelieve_CA_Root.pem \\\n"
" -text \\\n"
" -fingerprint \n"
" -setalias \"Disabled Makebelieve CA Root\" \\\n"
" -addreject serverAuth \\\n"
" -addreject emailProtection \\\n"
" -addreject codeSigning \\\n"
" > /etc/ssl/local/Disabled_Makebelieve_CA_Root.pem &amp;&amp;\n"
"/usr/sbin/make-ca -r -f</userinput>"
msgstr ""
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
"openssl x509 -in /etc/ssl/certs/Makebelieve_CA_Root.pem \\\n"
" -text \\\n"
" -fingerprint \n"
" -setalias \"Disabled Makebelieve CA Root\" \\\n"
" -addreject serverAuth \\\n"
" -addreject emailProtection \\\n"
" -addreject codeSigning \\\n"
" > /etc/ssl/local/Disabled_Makebelieve_CA_Root.pem &amp;&amp;\n"
"/usr/sbin/make-ca -r -f</userinput>"
 
#. type: Content of: <sect1><sect2><title>
#: blfs-en/postlfs/security/make-ca.xml:219
#: blfs-en/postlfs/security/make-ca.xml:251
msgid "Contents"
msgstr "Contenu"
 
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
#: blfs-en/postlfs/security/make-ca.xml:222
#: blfs-en/postlfs/security/make-ca.xml:254
msgid "Installed Programs"
msgstr "Programmes installés"
 
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
#: blfs-en/postlfs/security/make-ca.xml:223
#: blfs-en/postlfs/security/make-ca.xml:255
msgid "Installed Directories"
msgstr "Répertoires installés"
 
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
#: blfs-en/postlfs/security/make-ca.xml:227
msgid "/etc/ssl/{certs,java,local} and /etc/pki/{nssdb,anchors}"
#: blfs-en/postlfs/security/make-ca.xml:259
#, fuzzy
#| msgid "/etc/ssl/{certs,java,local} and /etc/pki/{nssdb,anchors}"
msgid "/etc/ssl/{certs,local} and /etc/pki/{nssdb,anchors,tls/{certs,java}}"
msgstr "/etc/ssl/{certs,java,local} et /etc/pki/{nssdb,anchors}"
 
#. type: Content of: <sect1><sect2><variablelist><bridgehead>
#: blfs-en/postlfs/security/make-ca.xml:232
#: blfs-en/postlfs/security/make-ca.xml:265
msgid "Short Descriptions"
msgstr "Descriptions courtes"
 
#. type: Content of: <sect1><sect2><variablelist><varlistentry><term>
#: blfs-en/postlfs/security/make-ca.xml:237
#: blfs-en/postlfs/security/make-ca.xml:270
msgid "<command>make-ca</command>"
msgstr "<command>make-ca</command>"
 
#. type: Content of:
#. <sect1><sect2><variablelist><varlistentry><listitem><para>
#: blfs-en/postlfs/security/make-ca.xml:239
#: blfs-en/postlfs/security/make-ca.xml:272
msgid ""
"is a shell script that adapts a current version of "
"<filename>certdata.txt</filename>, and prepares it for use as the system "