/linux/crypto/asymmetric_keys/ |
A D | pkcs7_trust.c | 43 return -ENOKEY; in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 172 case -ENOKEY: in pkcs7_validate_trust() 175 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
A D | restrict.c | 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 130 return -ENOKEY; in key_or_keyring_common() 135 return -ENOKEY; in key_or_keyring_common() 144 return -ENOKEY; in key_or_keyring_common() 202 return -ENOKEY; in key_or_keyring_common()
|
/linux/security/keys/ |
A D | process_keys.c | 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() 627 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 867 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
/linux/fs/crypto/ |
A D | hooks.c | 58 return -ENOKEY; in __fscrypt_prepare_link() 77 return -ENOKEY; in __fscrypt_prepare_rename() 167 err = -ENOKEY; in fscrypt_prepare_setflags() 256 return -ENOKEY; in __fscrypt_encrypt_symlink()
|
A D | keyring.c | 149 keyref = ERR_PTR(-ENOKEY); in search_fscrypt_keyring() 249 return ERR_PTR(-ENOKEY); /* No keyring yet, so no keys yet. */ in fscrypt_find_master_key() 405 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 447 if (err != -ENOKEY) in do_add_master_key() 756 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 1067 if (key != ERR_PTR(-ENOKEY)) in fscrypt_ioctl_get_key_status() 1092 } else if (mk_user != ERR_PTR(-ENOKEY)) { in fscrypt_ioctl_get_key_status()
|
A D | keysetup.c | 448 if (key != ERR_PTR(-ENOKEY) || in setup_file_encryption_key() 466 err = -ENOKEY; in setup_file_encryption_key() 471 err = -ENOKEY; in setup_file_encryption_key() 661 if (res == -ENOKEY) in fscrypt_get_encryption_info()
|
A D | keysetup_v1.c | 141 return ERR_PTR(-ENOKEY); in find_and_lock_process_key() 307 if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
/linux/certs/ |
A D | system_keyring.c | 219 ret = -ENOKEY; in verify_pkcs7_message_sig() 225 if (ret != -ENOKEY) { in verify_pkcs7_message_sig() 232 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
/linux/drivers/nvdimm/ |
A D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 264 return -ENOKEY; in security_disable() 299 return -ENOKEY; in security_update() 305 return -ENOKEY; in security_update() 355 return -ENOKEY; in security_erase() 394 return -ENOKEY; in security_overwrite()
|
/linux/include/crypto/internal/ |
A D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
/linux/crypto/ |
A D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 58 if (err == -ENOKEY) { in des3_ede_setkey()
|
/linux/include/crypto/ |
A D | hash.h | 512 return -ENOKEY; in crypto_ahash_import() 533 return -ENOKEY; in crypto_ahash_init() 923 return -ENOKEY; in crypto_shash_import() 945 return -ENOKEY; in crypto_shash_init()
|
/linux/fs/nfs/ |
A D | nfs4idmap.c | 590 int ret = -ENOKEY; in nfs_idmap_legacy_upcall() 639 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message() 675 int ret = -ENOKEY; in idmap_pipe_downcall() 698 ret = -ENOKEY; in idmap_pipe_downcall()
|
/linux/fs/afs/ |
A D | write.c | 286 int ret = -ENOKEY, ret2; in afs_get_writeback_key() 305 if (ret == -ENOKEY) in afs_get_writeback_key() 346 int ret = -ENOKEY; in afs_store_data() 388 case -ENOKEY: in afs_store_data() 609 case -ENOKEY: in afs_write_back_from_locked_folio()
|
/linux/include/keys/ |
A D | system_keyring.h | 70 return -ENOKEY; in is_key_on_revocation_list()
|
/linux/tools/include/uapi/asm-generic/ |
A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/linux/include/uapi/asm-generic/ |
A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/linux/arch/sparc/include/uapi/asm/ |
A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/linux/arch/parisc/include/uapi/asm/ |
A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/linux/arch/mips/include/uapi/asm/ |
A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/linux/tools/arch/mips/include/uapi/asm/ |
A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/linux/tools/arch/sparc/include/uapi/asm/ |
A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/linux/tools/arch/alpha/include/uapi/asm/ |
A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/linux/tools/arch/parisc/include/uapi/asm/ |
A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/linux/arch/alpha/include/uapi/asm/ |
A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|