Enumeration members
CERT_SIGN
CERT_SIGN: = "cert sign"
CLIENT_AUTH
CLIENT_AUTH: = "client auth"
CODE_SIGNING
CODE_SIGNING: = "code signing"
CONTENT_COMMITMENT
CONTENT_COMMITMENT: = "content commitment"
CRL_SIGN
CRL_SIGN: = "crl sign"
DATA_ENCIPHERMENT
DATA_ENCIPHERMENT: = "data encipherment"
DECIPHER_ONLY
DECIPHER_ONLY: = "decipher only"
DIGITAL_SIGNATURE
DIGITAL_SIGNATURE: = "digital signature"
EMAIL_PROTECTION
EMAIL_PROTECTION: = "email protection"
ENCIPHER_ONLY
ENCIPHER_ONLY: = "encipher only"
IPSEC_END_SYSTEM
IPSEC_END_SYSTEM: = "ipsec end system"
IPSEC_TUNNEL
IPSEC_TUNNEL: = "ipsec tunnel"
IPSEC_USER
IPSEC_USER: = "ipsec user"
KEY_AGREEMENT
KEY_AGREEMENT: = "key agreement"
KEY_ENCIPHERMENT
KEY_ENCIPHERMENT: = "key encipherment"
MICROSOFT_SGC
MICROSOFT_SGC: = "microsoft sgc"
NETSCAPE_SGC
NETSCAPE_SGC: = "netscape sgc"
OCSP_SIGNING
OCSP_SIGNING: = "ocsp signing"
SERVER_AUTH
SERVER_AUTH: = "server auth"
SIGNING
SIGNING: = "signing"
S_MIME
S_MIME: = "s/mime"
TIMESTAMPING
TIMESTAMPING: = "timestamping"
KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
CertificateRequestSpecUsages