| /Linux-v5.4/security/keys/ |
| D | request_key_auth.c | 90 return -EKEYREVOKED; in request_key_auth_read() 195 ret = -EKEYREVOKED; in request_key_auth_new() 279 authkey = ERR_PTR(-EKEYREVOKED); in key_get_instantiation_authkey()
|
| D | permission.c | 96 return -EKEYREVOKED; in key_validate()
|
| D | keyring.c | 599 ctx->result = ERR_PTR(-EKEYREVOKED); in keyring_search_iterator() 1309 ret = -EKEYREVOKED; in __key_link_begin()
|
| D | process_keys.c | 731 key_ref = ERR_PTR(-EKEYREVOKED); in lookup_user_key()
|
| /Linux-v5.4/include/uapi/asm-generic/ |
| D | errno.h | 112 #define EKEYREVOKED 128 /* Key has been revoked */ macro
|
| /Linux-v5.4/tools/include/uapi/asm-generic/ |
| D | errno.h | 112 #define EKEYREVOKED 128 /* Key has been revoked */ macro
|
| /Linux-v5.4/arch/sparc/include/uapi/asm/ |
| D | errno.h | 107 #define EKEYREVOKED 130 /* Key has been revoked */ macro
|
| /Linux-v5.4/arch/parisc/include/uapi/asm/ |
| D | errno.h | 73 #define EKEYREVOKED 186 /* Key has been revoked */ macro
|
| /Linux-v5.4/arch/alpha/include/uapi/asm/ |
| D | errno.h | 117 #define EKEYREVOKED 134 /* Key has been revoked */ macro
|
| /Linux-v5.4/arch/mips/include/uapi/asm/ |
| D | errno.h | 116 #define EKEYREVOKED 163 /* Key has been revoked */ macro
|
| /Linux-v5.4/tools/arch/mips/include/uapi/asm/ |
| D | errno.h | 116 #define EKEYREVOKED 163 /* Key has been revoked */ macro
|
| /Linux-v5.4/tools/arch/alpha/include/uapi/asm/ |
| D | errno.h | 117 #define EKEYREVOKED 134 /* Key has been revoked */ macro
|
| /Linux-v5.4/tools/arch/parisc/include/uapi/asm/ |
| D | errno.h | 73 #define EKEYREVOKED 186 /* Key has been revoked */ macro
|
| /Linux-v5.4/tools/arch/sparc/include/uapi/asm/ |
| D | errno.h | 107 #define EKEYREVOKED 130 /* Key has been revoked */ macro
|
| /Linux-v5.4/drivers/md/ |
| D | dm-verity-verify-sig.c | 47 ret = -EKEYREVOKED; in verity_verify_get_sig_from_key()
|
| /Linux-v5.4/lib/ |
| D | digsig.c | 89 err = -EKEYREVOKED; in digsig_verify_rsa()
|
| /Linux-v5.4/fs/ecryptfs/ |
| D | ecryptfs_kernel.h | 87 return ERR_PTR(-EKEYREVOKED); in ecryptfs_get_encrypted_key_payload_data() 123 return ERR_PTR(-EKEYREVOKED); in ecryptfs_get_key_payload_data()
|
| /Linux-v5.4/fs/afs/ |
| D | write.c | 433 case -EKEYREVOKED: in afs_store_data() 577 case -EKEYREVOKED: in afs_write_back_from_locked_page()
|
| D | flock.c | 573 case -EKEYREVOKED: in afs_do_setlk()
|
| /Linux-v5.4/fs/ubifs/ |
| D | auth.c | 322 err = -EKEYREVOKED; in ubifs_init_authentication()
|
| /Linux-v5.4/net/ceph/ |
| D | ceph_common.c | 340 case -EKEYREVOKED: in get_secret()
|
| /Linux-v5.4/fs/crypto/ |
| D | keyring.c | 144 PTR_ERR(keyref) == -EKEYREVOKED) /* recently invalidated */ in search_fscrypt_keyring()
|
| /Linux-v5.4/Documentation/security/keys/ |
| D | request-key.rst | 204 EKEYREVOKED > EKEYEXPIRED > ENOKEY
|
| D | core.rst | 495 use the key will be met with error EKEYREVOKED, and the key will no longer 637 Error ENOKEY, EKEYREVOKED or EKEYEXPIRED will be returned if the search 1096 Should the function fail error ENOKEY, EKEYEXPIRED or EKEYREVOKED will be 1238 revoked. Should the key be invalid, error EKEYEXPIRED or EKEYREVOKED will
|
| /Linux-v5.4/security/keys/encrypted-keys/ |
| D | encrypted.c | 317 ukey = ERR_PTR(-EKEYREVOKED); in request_user_key()
|