Lines Matching full:used
31 ClientAuthentication: The public key is used for TLS WWW client
33 CodeSigning: The public key is used for the signing of executable
34 code. CRLSigning: The public key is used for verifying signatures on
36 DataEncipherment: The public key is used for directly enciphering
39 DecipherOnly: The public key could be used for deciphering data
41 DigitalSignature: The public key is used for verifying digital
44 EmailProtection: The public key is used for email protection.
45 EncipherOnly: The public key could be used for enciphering data
47 KeyCertSign: The public key is used for verifying signatures on
49 KeyEncipherment: The public key is used for enciphering private or
51 NonRepudiation: The public key is used to verify digital signatures,
53 and used to provide a non- repudiation service that
56 OCSPSigning: The public key is used for signing OCSP responses.
57 ServerAuthentication: The public key is used for TLS WWW server
59 Timestamping: The public key is used for binding the hash of an