Lines Matching full:509
153 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
168 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
174 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
181 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
184 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
245 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
280 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
287 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
307 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
338 pr_devel("Using X.509[%u] for sig %u\n", in pkcs7_verify_one()
341 /* Check that the PKCS#7 signing time is valid according to the X.509 in pkcs7_verify_one()
348 pr_warn("Message signed outside of X.509 validity window\n"); in pkcs7_verify_one()
371 * of the X.509 certificates it carries that matches another X.509 cert in the
383 * appropriate X.509 certificate, or: