From c83921a2b566aa9d55d8ccc7258f04fca6292ee6 Mon Sep 17 00:00:00 2001 From: Yves-Alexis Perez Date: Tue, 30 Apr 2013 17:51:33 +0200 Subject: Imported Upstream version 5.0.4 --- man/Makefile.in | 1 + man/ipsec.conf.5 | 2 +- man/ipsec.secrets.5 | 2 +- man/strongswan.conf.5 | 8 +++++++- man/strongswan.conf.5.in | 6 ++++++ 5 files changed, 16 insertions(+), 3 deletions(-) (limited to 'man') diff --git a/man/Makefile.in b/man/Makefile.in index daebe3b90..50b7144a1 100644 --- a/man/Makefile.in +++ b/man/Makefile.in @@ -227,6 +227,7 @@ dev_headers = @dev_headers@ docdir = @docdir@ dvidir = @dvidir@ exec_prefix = @exec_prefix@ +fips_mode = @fips_mode@ gtk_CFLAGS = @gtk_CFLAGS@ gtk_LIBS = @gtk_LIBS@ h_plugins = @h_plugins@ diff --git a/man/ipsec.conf.5 b/man/ipsec.conf.5 index 554a6e8ca..981b53dba 100644 --- a/man/ipsec.conf.5 +++ b/man/ipsec.conf.5 @@ -1,4 +1,4 @@ -.TH IPSEC.CONF 5 "2012-06-26" "5.0.3rc1" "strongSwan" +.TH IPSEC.CONF 5 "2012-06-26" "5.0.4" "strongSwan" .SH NAME ipsec.conf \- IPsec configuration and connections .SH DESCRIPTION diff --git a/man/ipsec.secrets.5 b/man/ipsec.secrets.5 index 0948e5cc9..9b3d19190 100644 --- a/man/ipsec.secrets.5 +++ b/man/ipsec.secrets.5 @@ -1,4 +1,4 @@ -.TH IPSEC.SECRETS 5 "2011-12-14" "5.0.3rc1" "strongSwan" +.TH IPSEC.SECRETS 5 "2011-12-14" "5.0.4" "strongSwan" .SH NAME ipsec.secrets \- secrets for IKE/IPsec authentication .SH DESCRIPTION diff --git a/man/strongswan.conf.5 b/man/strongswan.conf.5 index 34dfde735..3c820dbf9 100644 --- a/man/strongswan.conf.5 +++ b/man/strongswan.conf.5 @@ -1,4 +1,4 @@ -.TH STRONGSWAN.CONF 5 "2013-04-01" "5.0.3" "strongSwan" +.TH STRONGSWAN.CONF 5 "2013-04-01" "5.0.4" "strongSwan" .SH NAME strongswan.conf \- strongSwan configuration file .SH DESCRIPTION @@ -203,6 +203,9 @@ IKE_SA_INIT DROPPING). Limit new connections based on the number of jobs currently queued for processing (see IKE_SA_INIT DROPPING). .TP +.BR charon.initiator_only " [no]" +Causes charon daemon to ignore IKE initiation requests. +.TP .BR charon.install_routes " [yes]" Install routes into a separate routing table for established IPsec tunnels .TP @@ -777,6 +780,9 @@ Use faster random numbers in gcrypt; for testing only, produces weak keys! .BR libstrongswan.plugins.openssl.engine_id " [pkcs11]" ENGINE ID to use in the OpenSSL plugin .TP +.BR libstrongswan.plugins.openssl.fips_mode " [0]" +Set OpenSSL FIPS mode: disabled(0), enabled(1), Suite B enabled(2) +.TP .BR libstrongswan.plugins.pkcs11.modules List of available PKCS#11 modules .TP diff --git a/man/strongswan.conf.5.in b/man/strongswan.conf.5.in index d483addbd..44fe330e8 100644 --- a/man/strongswan.conf.5.in +++ b/man/strongswan.conf.5.in @@ -203,6 +203,9 @@ IKE_SA_INIT DROPPING). Limit new connections based on the number of jobs currently queued for processing (see IKE_SA_INIT DROPPING). .TP +.BR charon.initiator_only " [no]" +Causes charon daemon to ignore IKE initiation requests. +.TP .BR charon.install_routes " [yes]" Install routes into a separate routing table for established IPsec tunnels .TP @@ -777,6 +780,9 @@ Use faster random numbers in gcrypt; for testing only, produces weak keys! .BR libstrongswan.plugins.openssl.engine_id " [pkcs11]" ENGINE ID to use in the OpenSSL plugin .TP +.BR libstrongswan.plugins.openssl.fips_mode " [0]" +Set OpenSSL FIPS mode: disabled(0), enabled(1), Suite B enabled(2) +.TP .BR libstrongswan.plugins.pkcs11.modules List of available PKCS#11 modules .TP -- cgit v1.2.3