Lines Matching refs:checks
48 OpenSSL checks the validity period of such certificates
152 Part of these checks are enabled only if the B<-x509_strict> option is given.
156 If the B<-purpose> option is not given then no such checks are done except for
162 and possibly also further non-standard checks are performed.
259 Perform validation checks using time specified by I<timestamp> and not
469 checks for consistency with S/MIME signing use (C<smimesign>).
590 in its section 6 does not include EKU checks for CA certificates.
601 it checks that any present EKU extension (that does not contain
603 Moreover, it does these checks even for trust anchor certificates.
622 For all other certificates the normal CA checks apply. In addition,
635 For all other certificates the normal CA checks apply. In addition,
657 For all other certificates the normal CA checks apply. In addition,
663 In addition to the common S/MIME checks, for target certficiates
668 In addition to the common S/MIME checks, for target certficiates
675 For all other certifcates the normal CA checks apply.
680 For target certificates, no checks are performed at this stage,
681 but special checks apply; see L<OCSP_basic_verify(3)>.
683 For all other certifcates the normal CA checks apply.
692 For all other certifcates the normal CA checks apply.
702 For all other certifcates the normal CA checks apply.
708 The issuer checks still suffer from limitations in the underlying X509_LOOKUP
731 The checks enabled by B<-x509_strict> have been extended in OpenSSL 3.0.