Lines Matching full:with
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
12 uses an EC key with NIST P-384 (aka secp384r1)
21 uses an EC key with NIST P-384, signed by test-ca
25 uses an EC key with NIST P-256, signed by test-int-ca2
32 server2-v1*.crt: EE cert (without of with chain in same file)
58 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal)
76 -badsign.crt: S5 with corrupted signature
77 -expired.crt: S5 with "not after" date in the past
78 -future.crt: S5 with "not before" date in the future
80 (with forbidden EC algorithm identifier NULL parameter)
83 -selfsigned.crt: Self-signed cert with S5 key
84 -ss-expired.crt: Self-signed cert with S5 key, expired
85 -ss-forgeca.crt: Copy of test-int-ca3 self-signed with S5 key
89 -badsign.crt: S7 with corrupted signature + I1
90 -expired.crt: S7 with "not after" date in the past + I1
91 -future.crt: S7 with "not before" date in the future + I1
95 _all_space.crt: S7 + I1 both with misplaced spaces (invalid PEM)
96 _pem_space.crt: S7 with misplaced space (invalid PEM) + I1
97 _trailing_space.crt: S7 + I1 both with trailing space (valid PEM)
101 *CRL for: 9.crt, -badsign, -with-ca (P1)
103 -badsign.crt: S10 with corrupted signature
117 - crl-rsa-pss-*.pem: (1) server9{,badsign,with-ca}.crt + cert_sha384.crt + unknown
122 rsa = crl.pem, rsabadpem = same with pem error, rsaexp = crl_expired.pem