Lines Matching full:checks
104 OpenSSL checks the validity period of such certificates
186 Part of these checks are enabled only if the \fB\-x509_strict\fR option is given.
190 If the \fB\-purpose\fR option is not given then no such checks are done except for
196 and possibly also further non-standard checks are performed.
277 Perform validation checks using time specified by \fItimestamp\fR and not
331 Checks end entity certificate validity by attempting to look up a valid CRL.
335 Checks the validity of \fBall\fR certificates in the chain by attempting
441 checks for consistency with S/MIME signing use (\f(CW\*(C`smimesign\*(C'\fR).
548 in its section 6 does not include EKU checks for CA certificates.
559 it checks that any present EKU extension (that does not contain
561 Moreover, it does these checks even for trust anchor certificates.
563 \fIChecks Implied by Specific Predefined Policies\fR
564 .IX Subsection "Checks Implied by Specific Predefined Policies"
579 For all other certificates the normal CA checks apply. In addition,
592 For all other certificates the normal CA checks apply. In addition,
603 .IP "\fBCommon S/MIME Checks\fR" 4
604 .IX Item "Common S/MIME Checks"
613 For all other certificates the normal CA checks apply. In addition,
619 In addition to the common S/MIME checks, for target certficiates
624 In addition to the common S/MIME checks, for target certficiates
631 For all other certifcates the normal CA checks apply.
636 For target certificates, no checks are performed at this stage,
637 but special checks apply; see \fBOCSP_basic_verify\fR\|(3).
639 For all other certifcates the normal CA checks apply.
648 For all other certifcates the normal CA checks apply.
658 For all other certifcates the normal CA checks apply.
661 The issuer checks still suffer from limitations in the underlying X509_LOOKUP
682 The checks enabled by \fB\-x509_strict\fR have been extended in OpenSSL 3.0.