• Home
  • Raw
  • Download

Lines Matching refs:pem

43   * GnuTLS: `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_,
44 `unenc-rsa-pkcs8.pem`_, `pkcs12_s2k_pem.c`_. The encoding error in
45 `unenc-rsa-pkcs8.pem`_ was fixed, and the contents of `enc-rsa-pkcs8.pem`_
46 was re-encrypted to include it. The contents of `enc2-rsa-pkcs8.pem`_
49 * `asymmetric/public/PKCS1/dsa.pub.pem`_ is a PKCS1 DSA public key from the
65 * ``asymmetric/PEM_Serialization/ec_private_key.pem`` and
68 * ``asymmetric/PEM_Serialization/ec_private_key_encrypted.pem`` and
70 same Elliptic Curve key as ``ec_private_key.pem``, except that it is
72 * ``asymmetric/PEM_Serialization/ec_public_key.pem`` and
74 corresponding to ``ec_private_key.pem``, generated using OpenSSL.
75 * ``asymmetric/PEM_Serialization/rsa_private_key.pem`` - Contains an RSA 2048
78 * ``asymmetric/PEM_Serialization/rsa_public_key.pem`` and
80 bit public generated using OpenSSL from ``rsa_private_key.pem``.
81 * ``asymmetric/PEM_Serialization/dsaparam.pem`` - Contains 2048-bit DSA
83 * ``asymmetric/PEM_Serialization/dsa_private_key.pem`` - Contains a DSA 2048
84 bit key generated using OpenSSL from the parameters in ``dsaparam.pem``,
86 * ``asymmetric/PEM_Serialization/dsa_public_key.pem`` and
88 key generated using OpenSSL from ``dsa_private_key.pem``.
89 * ``asymmetric/PKCS8/unenc-dsa-pkcs8.pem`` and
92 * ``asymmetric/PKCS8/unenc-dsa-pkcs8.pub.pem`` and
94 2048 bit public key generated using OpenSSL from ``unenc-dsa-pkcs8.pem``.
97 * DER conversions of `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_, and
98 `unenc-rsa-pkcs8.pem`_.
99 * ``asymmetric/public/PKCS1/rsa.pub.pem`` and
101 key from ``asymmetric/PKCS8/unenc-rsa-pkcs8.pem`` using PEM and DER encoding.
102 * ``x509/custom/ca/ca_key.pem`` - An unencrypted PCKS8 ``secp256r1`` key. It is
103 the private key for the certificate ``x509/custom/ca/ca.pem``. This key is
107 * ``asymmetric/X448/x448-pkcs8-enc.pem`` and
110 * ``asymmetric/X448/x448-pkcs8.pem`` and ``asymmetric/X448/x448-pkcs8.der``
112 * ``asymmetric/X448/x448-pub.pem`` and ``asymmetric/X448/x448-pub.der`` contain
114 * ``asymmetric/X25519/x25519-pkcs8-enc.pem`` and
117 * ``asymmetric/X25519/x25519-pkcs8.pem`` and
119 * ``asymmetric/X25519/x25519-pub.pem`` and ``asymmetric/X25519/x25519-pub.der``
139 * ``vectors/cryptography_vectors/asymmetric/DH/dhp.pem``,
140 ``vectors/cryptography_vectors/asymmetric/DH/dhkey.pem`` and
141 ``vectors/cryptography_vectors/asymmetric/DH/dhpub.pem`` contains
151 * ``vectors/cryptography_vectors/asymmetric/DH/dhp_rfc5114_2.pem``,
152 ``vectors/cryptography_vectors/asymmetric/DH/dhkey_rfc5114_2.pem`` and
153 ``vectors/cryptography_vectors/asymmetric/DH/dhpub_rfc5114_2.pem`` contains
172 * ``v1_cert.pem`` from the OpenSSL source tree (`testx509.pem`_).
173 * ``ecdsa_root.pem`` - `DigiCert Global Root G3`_, a ``secp384r1`` ECDSA root
175 * ``verisign-md2-root.pem`` - A legacy Verisign public root signed using the
178 * ``cryptography.io.pem`` - A leaf certificate issued by RapidSSL for the
180 * ``rapidssl_sha256_ca_g3.pem`` - The intermediate CA that issued the
181 ``cryptography.io.pem`` certificate.
182 * ``cryptography.io.precert.pem`` - A pre-certificate with the CT poison
184 * ``cryptography-scts.io.pem`` - A leaf certificate issued by Let's Encrypt for
186 * ``wildcard_san.pem`` - A leaf certificate issued by a public CA for
192 * ``department-of-state-root.pem`` - The intermediary CA for the Department of
198 * ``alternate-rsa-sha1-oid.pem`` - A certificate from an
201 * ``badssl-sct.pem`` - A certificate with the certificate transparency signed
203 * ``bigoid.pem`` - A certificate with a rather long OID in the
206 * ``wosign-bc-invalid.pem`` - A certificate issued by WoSign that contains
209 * ``tls-feature-ocsp-staple.pem`` - A certificate issued by Let's Encrypt that
212 * ``unique-identifier.pem`` - A certificate containing
214 * ``utf8-dnsname.pem`` - A certificate containing non-ASCII characters in the
216 * ``badasn1time.pem`` - A certificate containing an incorrectly specified
218 * ``letsencryptx3.pem`` - A subordinate certificate used by Let's Encrypt to
224 * ``invalid_version.pem`` - Contains an RSA 2048 bit certificate with the
226 * ``post2000utctime.pem`` - Contains an RSA 2048 bit certificate with the
228 * ``dsa_selfsigned_ca.pem`` - Contains a DSA self-signed CA certificate
230 * ``ec_no_named_curve.pem`` - Contains an ECDSA certificate that does not have
232 * ``all_supported_names.pem`` - An RSA 2048 bit certificate generated using
235 * ``unsupported_subject_name.pem`` - An RSA 2048 bit self-signed CA certificate
237 * ``utf8_common_name.pem`` - An RSA 2048 bit self-signed CA certificate
240 * ``two_basic_constraints.pem`` - An RSA 2048 bit self-signed certificate
242 * ``basic_constraints_not_critical.pem`` - An RSA 2048 bit self-signed
245 * ``bc_path_length_zero.pem`` - An RSA 2048 bit self-signed
248 * ``unsupported_extension.pem`` - An RSA 2048 bit self-signed certificate
251 * ``unsupported_extension_2.pem`` - A ``secp256r1`` certificate
255 * ``unsupported_extension_critical.pem`` - An RSA 2048 bit self-signed
258 * ``san_email_dns_ip_dirname_uri.pem`` - An RSA 2048 bit self-signed
262 * ``san_empty_hostname.pem`` - An RSA 2048 bit self-signed certificate
265 * ``san_other_name.pem`` - An RSA 2048 bit self-signed certificate containing
267 * ``san_registered_id.pem`` - An RSA 1024 bit certificate containing a
269 * ``all_key_usages.pem`` - An RSA 2048 bit self-signed certificate containing
271 * ``extended_key_usage.pem`` - An RSA 2048 bit self-signed certificate
273 * ``san_idna_names.pem`` - An RSA 2048 bit self-signed certificate containing
276 * ``san_wildcard_idna.pem`` - An RSA 2048 bit self-signed certificate
279 * ``san_idna2003_dnsname.pem`` - An RSA 2048 bit self-signed certificate
282 * ``san_rfc822_names.pem`` - An RSA 2048 bit self-signed certificate containing
284 * ``san_rfc822_idna.pem`` - An RSA 2048 bit self-signed certificate containing
286 * ``san_uri_with_port.pem`` - An RSA 2048 bit self-signed certificate
289 * ``san_ipaddr.pem`` - An RSA 2048 bit self-signed certificate containing a
291 * ``san_dirname.pem`` - An RSA 2048 bit self-signed certificate containing a
293 * ``inhibit_any_policy_5.pem`` - An RSA 2048 bit self-signed certificate
295 * ``inhibit_any_policy_negative.pem`` - An RSA 2048 bit self-signed certificate
297 * ``authority_key_identifier.pem`` - An RSA 2048 bit self-signed certificate
300 * ``authority_key_identifier_no_keyid.pem`` - An RSA 2048 bit self-signed
303 * ``aia_ocsp_ca_issuers.pem`` - An RSA 2048 bit self-signed certificate
306 * ``aia_ocsp.pem`` - An RSA 2048 bit self-signed certificate
308 * ``aia_ca_issuers.pem`` - An RSA 2048 bit self-signed certificate
310 * ``cdp_empty_hostname.pem`` - An RSA 2048 bit self-signed certificate
313 * ``cdp_fullname_reasons_crl_issuer.pem`` - An RSA 1024 bit certificate
316 * ``cdp_crl_issuer.pem`` - An RSA 1024 bit certificate containing a CRL
318 * ``cdp_all_reasons.pem`` - An RSA 1024 bit certificate containing a CRL
320 * ``cdp_reason_aa_compromise.pem`` - An RSA 1024 bit certificate containing a
323 * ``nc_permitted_excluded.pem`` - An RSA 2048 bit self-signed certificate
327 * ``nc_permitted_excluded_2.pem`` - An RSA 2048 bit self-signed certificate
329 elements. Unlike ``nc_permitted_excluded.pem``, the general names do not
331 * ``nc_permitted.pem`` - An RSA 2048 bit self-signed certificate containing a
333 * ``nc_permitted_2.pem`` - An RSA 2048 bit self-signed certificate containing a
336 * ``nc_excluded.pem`` - An RSA 2048 bit self-signed certificate containing a
338 * ``nc_invalid_ip_netmask.pem`` - An RSA 2048 bit self-signed certificate
341 * ``nc_single_ip_netmask.pem`` - An RSA 2048 bit self-signed certificate
344 * ``cp_user_notice_with_notice_reference.pem`` - An RSA 2048 bit self-signed
347 * ``cp_user_notice_with_explicit_text.pem`` - An RSA 2048 bit self-signed
350 * ``cp_cps_uri.pem`` - An RSA 2048 bit self-signed certificate containing a
352 * ``cp_user_notice_no_explicit_text.pem`` - An RSA 2048 bit self-signed
355 * ``cp_invalid.pem`` - An RSA 2048 bit self-signed certificate containing a
357 * ``ian_uri.pem`` - An RSA 2048 bit certificate containing an issuer
359 * ``ocsp_nocheck.pem`` - An RSA 2048 bit self-signed certificate containing
361 * ``pc_inhibit_require.pem`` - An RSA 2048 bit self-signed certificate
364 * ``pc_inhibit.pem`` - An RSA 2048 bit self-signed certificate containing a
366 * ``pc_require.pem`` - An RSA 2048 bit self-signed certificate containing a
368 * ``unsupported_subject_public_key_info.pem`` - A certificate whose public key
370 * ``policy_constraints_explicit.pem`` - A self-signed certificate containing
372 * ``freshestcrl.pem`` - A self-signed certificate containing a ``freshestCRL``
374 * ``ca/ca.pem`` - A self-signed certificate with ``basicConstraints`` set to
375 true. Its private key is ``ca/ca_key.pem``. This certificate is encoded in
381 * ``dsa_sha1.pem`` and ``dsa_sha1.der`` - Contain a certificate request using
383 * ``rsa_md4.pem`` and ``rsa_md4.der`` - Contain a certificate request using
385 * ``rsa_sha1.pem`` and ``rsa_sha1.der`` - Contain a certificate request using
387 * ``rsa_sha256.pem`` and ``rsa_sha256.der`` - Contain a certificate request
389 * ``ec_sha256.pem`` and ``ec_sha256.der`` - Contain a certificate request
391 * ``san_rsa_sha1.pem`` and ``san_rsa_sha1.der`` - Contain a certificate
394 * ``two_basic_constraints.pem`` - A certificate signing request
396 * ``unsupported_extension.pem`` - A certificate signing request
400 * ``unsupported_extension_critical.pem`` - A certificate signing
404 * ``basic_constraints.pem`` - A certificate signing request for an RSA
407 * ``invalid_signature.pem`` - A certificate signing request for an RSA
413 * ``crl_all_reasons.pem`` - Contains a CRL with 12 revoked certificates, whose
418 * ``crl_dup_entry_ext.pem`` - Contains a CRL with one revocation which has a
420 * ``crl_md2_unknown_crit_entry_ext.pem`` - Contains a CRL with one revocation
423 * ``crl_unsupported_reason.pem`` - Contains a CRL with one revocation which has
425 * ``crl_inval_cert_issuer_entry_ext.pem`` - Contains a CRL with one revocation
427 * ``crl_empty.pem`` - Contains a CRL with no revoked certificates.
428 * ``crl_ian_aia_aki.pem`` - Contains a CRL with ``IssuerAlternativeName``,
431 * ``valid_signature.pem`` - Contains a CRL with the public key which was used
433 * ``invalid_signature.pem`` - Contains a CRL with the last signature byte
436 * ``crl_delta_crl_indicator.pem`` - Contains a CRL with the
438 * ``crl_idp_fullname_only.pem`` - Contains a CRL with an
441 * ``crl_idp_only_ca.pem`` - Contains a CRL with an
444 * ``crl_idp_fullname_only_aa.pem`` - Contains a CRL with an
447 * ``crl_idp_fullname_only_user.pem`` - Contains a CRL with an
450 * ``crl_idp_fullname_indirect_crl.pem`` - Contains a CRL with an
453 * ``crl_idp_reasons_only.pem`` - Contains a CRL with an
456 * ``crl_idp_relative_user_all_reasons.pem`` - Contains a CRL with an
459 * ``crl_idp_relativename_only.pem`` - Contains a CRL with an
498 (``x509/custom/ca/ca.pem``) and key (``x509/custom/ca/ca_key.pem``)
501 (``x509/custom/ca/ca.pem``) and key (``x509/custom/ca/ca_key.pem``)
505 (``x509/custom/ca/ca.pem``) encrypted with RC2 and key
506 (``x509/custom/ca/ca_key.pem``) encrypted via 3DES with the password
509 (``x509/custom/ca/ca.pem``) and key (``x509/custom/ca/ca_key.pem``) with no
512 (``x509/custom/ca/ca_key.pem``) encrypted via AES 256 CBC with the
515 (``x509/custom/ca/ca.pem``) encrypted via AES 256 CBC with the
643 …: https://github.com/openssl/openssl/blob/d02b48c63a58ea4367a0e905979f140b7d090f86/test/testrsa.pem
645 …. _`enc-rsa-pkcs8.pem`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa…
646 … _`enc2-rsa-pkcs8.pem`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa…
647 …`unenc-rsa-pkcs8.pem`: https://gitlab.com/gnutls/gnutls/blob/f8d943b38bf74eaaa11d396112daf43cb8aa8…
656 .. _`testx509.pem`: https://github.com/openssl/openssl/blob/master/test/testx509.pem
659 .. _`asymmetric/public/PKCS1/dsa.pub.pem`: https://github.com/ruby/ruby/blob/4ccb387f3bc436a08fc6d7…