Home
last modified time | relevance | path

Searched refs:certificate (Results 26 – 50 of 104) sorted by relevance

12345

/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/
H A Dopenssl.cfg24 # This is mostly being used for generation of certificate requests.
66 certificate = $dir/cacert.pem # The CA certificate
185 # This is typical in keyUsage for a client certificate.
209 # Extensions to add to a certificate request
236 # prevent it being used as an test self-signed certificate it is best
263 # These extensions should be added when creating a proxy certificate
266 # requires this to avoid interpreting an end user certificate as a CA.
271 # the certificate can be used for anything *except* object signing.
276 # For an object signing certificate this would be used.
285 # This is typical in keyUsage for a client certificate.
[all …]
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/
H A Dopenssl.cfg24 # This is mostly being used for generation of certificate requests.
66 certificate = $dir/cacert.pem # The CA certificate
185 # This is typical in keyUsage for a client certificate.
209 # Extensions to add to a certificate request
236 # prevent it being used as an test self-signed certificate it is best
263 # These extensions should be added when creating a proxy certificate
266 # requires this to avoid interpreting an end user certificate as a CA.
271 # the certificate can be used for anything *except* object signing.
276 # For an object signing certificate this would be used.
285 # This is typical in keyUsage for a client certificate.
[all …]
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/
H A Dopenssl.cfg24 # This is mostly being used for generation of certificate requests.
66 certificate = $dir/cacert.pem # The CA certificate
185 # This is typical in keyUsage for a client certificate.
209 # Extensions to add to a certificate request
236 # prevent it being used as an test self-signed certificate it is best
263 # These extensions should be added when creating a proxy certificate
266 # requires this to avoid interpreting an end user certificate as a CA.
271 # the certificate can be used for anything *except* object signing.
276 # For an object signing certificate this would be used.
285 # This is typical in keyUsage for a client certificate.
[all …]
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/
H A Dopenssl.cfg24 # This is mostly being used for generation of certificate requests.
66 certificate = $dir/cacert.pem # The CA certificate
185 # This is typical in keyUsage for a client certificate.
209 # Extensions to add to a certificate request
236 # prevent it being used as an test self-signed certificate it is best
263 # These extensions should be added when creating a proxy certificate
266 # requires this to avoid interpreting an end user certificate as a CA.
271 # the certificate can be used for anything *except* object signing.
276 # For an object signing certificate this would be used.
285 # This is typical in keyUsage for a client certificate.
[all …]
/trunk/main/libxmlsec/
H A Dreadme.txt2 the certificate during sign or verification operation. On Windows this was done
7 as X509IssuerSerial and X509Certificate and stores them in a certificate store
9 find the certificate containing the public key which is used for validation
12 was changed by the patch xmlsec1-noverify.patch, which prevents this certificate
17 the other certificates. This certificate is not necessarily the one which was
27 then the key is not extracted from the certificate store which contains all the
H A Dxmlsec1-customkeymanage.patch474 + * @hCertStore: the pointer to certificate database.
476 + * Create and load key store and certificate database into keys manager
549 + * Set certificate databse to X509 key data store
801 + * @handler: the pointer to NSS certificate database.
803 + * Create and load NSS crypto slot and certificate database into keys manager
914 + * Set certificate databse to X509 key data store
/trunk/main/uui/source/
H A Dids.src370 …Before accepting this certificate, you should examine this site's certificate carefully. Are you w…
375 …= "$(ARG1) is a site that uses a security certificate to encrypt data during transmission, but its…
380certificate presented belongs to $(ARG2). It is possible, though unlikely, that someone may be try…
385 …en-US ] = "The certificate could not be validated. You should examine this site's certificate care…
H A Dunknownauthdlg.src102 Text [ en-US ] = "Accept this certificate temporarily for this session" ;
113 Text [ en-US ] = "Do not accept this certificate and do not connect to this Web site" ;
/trunk/main/offapi/com/sun/star/security/
H A DCertificateContainerStatus.idl33 * Constant definition of a certificate container status.
39 * The certificate was not found.
44 * The certificate was found and is trusted.
49 * The certificate was found but is untrusted.
H A DCertificateCharacters.idl37 * Constant definition of a certificate characters.
39 * The certificate characters will be defined as bit-wise constants.
44 * It is a self-signed certificate.
49 * A private key binding with the certificate is in user's profile.
H A DXCertificateContainer.idl32 /** Manage user certificate for temporary connections.
38 /** Store the certificate in memory.
48 /** Sheck if a certificate was stored earlier before.
H A DXSanExtension.idl40 * <p>This interface represents a x509 certificate extension.</p>
45 * Contains the alternative names of a certificate
H A DDocumentSignatureInformation.idl50 /* reflects the validity of the certificate.
70 and the certificate could be validated. However, users should be notified about
H A DSerialNumberAdapter.idl41 <p>An implementation of this service enables the conversion of certificate
H A DCertAltNameEntry.idl37 * X509 certificate.
H A DXCertificateExtension.idl34 * <p>This interface represents a x509 certificate.</p>
H A DXSerialNumberAdapter.idl36 * <p>This interface converts a certificate serial number to and from a string</p>
H A DExtAltNameType.idl34 * Constant definition of a certificate container status.
/trunk/main/xmlsecurity/source/dialogs/
H A Dcertificateviewer.src113 Text [ en-US ] = "This certificate is intended for the following purpose(s):" ;
161 Text [ en-US ] = "You have a private key that corresponds to this certificate." ;
165 Text [ en-US ] = "The certificate could not be validated." ;
331 Text [ en-US ] = "The certificate is OK." ;
335 Text [ en-US ] = "The certificate could not be validated." ;
H A Dcertificatechooser.src42 Text [ en-US ] = "Select the certificate you want to use for signing" ;
/trunk/main/offapi/com/sun/star/ucb/
H A DCertificateValidationRequest.idl39 /** An error specifing an invalid certificate.
44 /** This value describes the validity of the certificate.
49 /** The certificate himself.
/trunk/main/ucb/source/ucp/webdav/
H A DCurlSession.cxx388 static uno::Sequence< sal_Int8 > convertCertificateToAsn1Der( X509 *certificate ) in convertCertificateToAsn1Der() argument
391 int len = i2d_X509( certificate, NULL ); in convertCertificateToAsn1Der()
396 len = i2d_X509( certificate, &end ); in convertCertificateToAsn1Der()
413 X509 *certificate = sk_X509_value( chain, i ); in verifyServerX509Certificate() local
414 … uno::Sequence< sal_Int8 > asn1DerCertificate = convertCertificateToAsn1Der( certificate ); in verifyServerX509Certificate()
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/
H A DREADME.txt12 To provide the intermediate certificate run
/trunk/main/offapi/com/sun/star/document/
H A DMacroExecMode.idl109 <p> If the macro is signed with unknown certificate a warning will
/trunk/main/svx/source/stbctrls/
H A Dstbctrls.src83 …Text [ en-US ] = "Digital Signature: The document signature and the certificate are OK, but not al…

Completed in 72 milliseconds

12345