Lines Matching full:key
17 An X.509 certificate contains a public key, validity, and an identity
24 Key usage extensions define the purpose of the public key contained in
27 Valid Key usage extensions and its usage description is based on
31 ClientAuthentication: The public key is used for TLS WWW client
33 CodeSigning: The public key is used for the signing of executable
34 code. CRLSigning: The public key is used for verifying signatures on
36 DataEncipherment: The public key is used for directly enciphering
39 DecipherOnly: The public key could be used for deciphering data
40 while performing key agreement.
41 DigitalSignature: The public key is used for verifying digital
44 EmailProtection: The public key is used for email protection.
45 EncipherOnly: The public key could be used for enciphering data
46 while performing key agreement.
47 KeyCertSign: The public key is used for verifying signatures on
48 public key certificates.
49 KeyEncipherment: The public key is used for enciphering private or
51 NonRepudiation: The public key is used to verify digital signatures,
56 OCSPSigning: The public key is used for signing OCSP responses.
57 ServerAuthentication: The public key is used for TLS WWW server
59 Timestamping: The public key is used for binding the hash of an
67 Refer X.509 certificate wiki for the "Issuer" Key and value details.
77 Refer X.509 certificate wiki for the "Subject" Key and value details.