Lines Matching full:509
154 * Find the key (X.509 certificate) to use to verify a PKCS#7 message. PKCS#7
169 * encode the fields from the X.509 cert in the same way in the in pkcs7_find_key()
175 pr_devel("Sig %u: Found cert serial match X.509[%u]\n", in pkcs7_find_key()
179 pr_warn("Sig %u: X.509 algo and PKCS#7 sig algo don't match\n", in pkcs7_find_key()
188 /* The relevant X.509 cert isn't found here, but it might be found in in pkcs7_find_key()
191 pr_debug("Sig %u: Issuing X.509 cert not found (#%*phN)\n", in pkcs7_find_key()
255 /* Look through the X.509 certificates in the PKCS#7 message's in pkcs7_verify_sig_chain()
290 pr_warn("Sig %u: X.509 chain contains auth-skid nonmatch (%u->%u)\n", in pkcs7_verify_sig_chain()
297 pr_warn("Sig %u: X.509 chain contains loop\n", in pkcs7_verify_sig_chain()
317 * validatable against an X.509 cert lower in the chain that we have a in pkcs7_verify_sig_chain()
348 pr_devel("Using X.509[%u] for sig %u\n", in pkcs7_verify_one()
351 /* Check that the PKCS#7 signing time is valid according to the X.509 in pkcs7_verify_one()
358 pr_warn("Message signed outside of X.509 validity window\n"); in pkcs7_verify_one()
381 * of the X.509 certificates it carries that matches another X.509 cert in the
393 * appropriate X.509 certificate, or: