Lines Matching full:509
154 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
169 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
175 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
182 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
185 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
249 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
284 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
291 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
311 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
342 pr_devel("Using X.509[%u] for sig %u\n", in pkcs7_verify_one()
345 /* Check that the PKCS#7 signing time is valid according to the X.509 in pkcs7_verify_one()
352 pr_warn("Message signed outside of X.509 validity window\n"); in pkcs7_verify_one()
375 * of the X.509 certificates it carries that matches another X.509 cert in the
387 * appropriate X.509 certificate, or: