/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/ |
H A D | openssl.cfg | 24 # This is mostly being used for generation of certificate requests. 66 certificate = $dir/cacert.pem # The CA certificate 185 # This is typical in keyUsage for a client certificate. 209 # Extensions to add to a certificate request 236 # prevent it being used as an test self-signed certificate it is best 263 # These extensions should be added when creating a proxy certificate 266 # requires this to avoid interpreting an end user certificate as a CA. 271 # the certificate can be used for anything *except* object signing. 276 # For an object signing certificate this would be used. 285 # This is typical in keyUsage for a client certificate. [all …]
|
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/ |
H A D | openssl.cfg | 24 # This is mostly being used for generation of certificate requests. 66 certificate = $dir/cacert.pem # The CA certificate 185 # This is typical in keyUsage for a client certificate. 209 # Extensions to add to a certificate request 236 # prevent it being used as an test self-signed certificate it is best 263 # These extensions should be added when creating a proxy certificate 266 # requires this to avoid interpreting an end user certificate as a CA. 271 # the certificate can be used for anything *except* object signing. 276 # For an object signing certificate this would be used. 285 # This is typical in keyUsage for a client certificate. [all …]
|
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/ |
H A D | openssl.cfg | 24 # This is mostly being used for generation of certificate requests. 66 certificate = $dir/cacert.pem # The CA certificate 185 # This is typical in keyUsage for a client certificate. 209 # Extensions to add to a certificate request 236 # prevent it being used as an test self-signed certificate it is best 263 # These extensions should be added when creating a proxy certificate 266 # requires this to avoid interpreting an end user certificate as a CA. 271 # the certificate can be used for anything *except* object signing. 276 # For an object signing certificate this would be used. 285 # This is typical in keyUsage for a client certificate. [all …]
|
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/ |
H A D | openssl.cfg | 24 # This is mostly being used for generation of certificate requests. 66 certificate = $dir/cacert.pem # The CA certificate 185 # This is typical in keyUsage for a client certificate. 209 # Extensions to add to a certificate request 236 # prevent it being used as an test self-signed certificate it is best 263 # These extensions should be added when creating a proxy certificate 266 # requires this to avoid interpreting an end user certificate as a CA. 271 # the certificate can be used for anything *except* object signing. 276 # For an object signing certificate this would be used. 285 # This is typical in keyUsage for a client certificate. [all …]
|
/trunk/main/libxmlsec/ |
H A D | readme.txt | 2 the certificate during sign or verification operation. On Windows this was done 7 as X509IssuerSerial and X509Certificate and stores them in a certificate store 9 find the certificate containing the public key which is used for validation 12 was changed by the patch xmlsec1-noverify.patch, which prevents this certificate 17 the other certificates. This certificate is not necessarily the one which was 27 then the key is not extracted from the certificate store which contains all the
|
H A D | xmlsec1-customkeymanage.patch | 474 + * @hCertStore: the pointer to certificate database. 476 + * Create and load key store and certificate database into keys manager 549 + * Set certificate databse to X509 key data store 801 + * @handler: the pointer to NSS certificate database. 803 + * Create and load NSS crypto slot and certificate database into keys manager 914 + * Set certificate databse to X509 key data store
|
/trunk/main/uui/source/ |
H A D | ids.src | 370 …Before accepting this certificate, you should examine this site's certificate carefully. Are you w… 375 …= "$(ARG1) is a site that uses a security certificate to encrypt data during transmission, but its… 380 …certificate presented belongs to $(ARG2). It is possible, though unlikely, that someone may be try… 385 …en-US ] = "The certificate could not be validated. You should examine this site's certificate care…
|
H A D | unknownauthdlg.src | 102 Text [ en-US ] = "Accept this certificate temporarily for this session" ; 113 Text [ en-US ] = "Do not accept this certificate and do not connect to this Web site" ;
|
/trunk/main/offapi/com/sun/star/security/ |
H A D | CertificateContainerStatus.idl | 33 * Constant definition of a certificate container status. 39 * The certificate was not found. 44 * The certificate was found and is trusted. 49 * The certificate was found but is untrusted.
|
H A D | CertificateCharacters.idl | 37 * Constant definition of a certificate characters. 39 * The certificate characters will be defined as bit-wise constants. 44 * It is a self-signed certificate. 49 * A private key binding with the certificate is in user's profile.
|
H A D | XCertificateContainer.idl | 32 /** Manage user certificate for temporary connections. 38 /** Store the certificate in memory. 48 /** Sheck if a certificate was stored earlier before.
|
H A D | XSanExtension.idl | 40 * <p>This interface represents a x509 certificate extension.</p> 45 * Contains the alternative names of a certificate
|
H A D | DocumentSignatureInformation.idl | 50 /* reflects the validity of the certificate. 70 and the certificate could be validated. However, users should be notified about
|
H A D | SerialNumberAdapter.idl | 41 <p>An implementation of this service enables the conversion of certificate
|
H A D | CertAltNameEntry.idl | 37 * X509 certificate.
|
H A D | XCertificateExtension.idl | 34 * <p>This interface represents a x509 certificate.</p>
|
H A D | XSerialNumberAdapter.idl | 36 * <p>This interface converts a certificate serial number to and from a string</p>
|
H A D | ExtAltNameType.idl | 34 * Constant definition of a certificate container status.
|
/trunk/main/xmlsecurity/source/dialogs/ |
H A D | certificateviewer.src | 113 Text [ en-US ] = "This certificate is intended for the following purpose(s):" ; 161 Text [ en-US ] = "You have a private key that corresponds to this certificate." ; 165 Text [ en-US ] = "The certificate could not be validated." ; 331 Text [ en-US ] = "The certificate is OK." ; 335 Text [ en-US ] = "The certificate could not be validated." ;
|
H A D | certificatechooser.src | 42 Text [ en-US ] = "Select the certificate you want to use for signing" ;
|
/trunk/main/offapi/com/sun/star/ucb/ |
H A D | CertificateValidationRequest.idl | 39 /** An error specifing an invalid certificate. 44 /** This value describes the validity of the certificate. 49 /** The certificate himself.
|
/trunk/main/ucb/source/ucp/webdav/ |
H A D | CurlSession.cxx | 388 static uno::Sequence< sal_Int8 > convertCertificateToAsn1Der( X509 *certificate ) in convertCertificateToAsn1Der() argument 391 int len = i2d_X509( certificate, NULL ); in convertCertificateToAsn1Der() 396 len = i2d_X509( certificate, &end ); in convertCertificateToAsn1Der() 413 X509 *certificate = sk_X509_value( chain, i ); in verifyServerX509Certificate() local 414 … uno::Sequence< sal_Int8 > asn1DerCertificate = convertCertificateToAsn1Der( certificate ); in verifyServerX509Certificate()
|
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/ |
H A D | README.txt | 12 To provide the intermediate certificate run
|
/trunk/main/offapi/com/sun/star/document/ |
H A D | MacroExecMode.idl | 109 <p> If the macro is signed with unknown certificate a warning will
|
/trunk/main/svx/source/stbctrls/ |
H A D | stbctrls.src | 83 …Text [ en-US ] = "Digital Signature: The document signature and the certificate are OK, but not al…
|