/Linux-v5.4/crypto/asymmetric_keys/ |
D | pkcs7_trust.c | 43 return -ENOKEY; in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 172 case -ENOKEY: in pkcs7_validate_trust() 175 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
D | restrict.c | 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 130 return -ENOKEY; in key_or_keyring_common() 135 return -ENOKEY; in key_or_keyring_common() 144 return -ENOKEY; in key_or_keyring_common() 202 return -ENOKEY; in key_or_keyring_common()
|
/Linux-v5.4/security/keys/ |
D | process_keys.c | 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() 627 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 868 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
D | permission.c | 91 return -ENOKEY; in key_validate()
|
/Linux-v5.4/include/crypto/internal/ |
D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 62 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
/Linux-v5.4/fs/crypto/ |
D | hooks.c | 63 return -ENOKEY; in __fscrypt_prepare_link() 89 return -ENOKEY; in __fscrypt_prepare_rename() 144 return -ENOKEY; in __fscrypt_prepare_symlink()
|
D | keyring.c | 145 keyref = ERR_PTR(-ENOKEY); in search_fscrypt_keyring() 236 return ERR_PTR(-ENOKEY); /* No keyring yet, so no keys yet. */ in fscrypt_find_master_key() 393 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 438 if (err != -ENOKEY) in add_master_key() 607 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 926 if (key != ERR_PTR(-ENOKEY)) in fscrypt_ioctl_get_key_status() 951 } else if (mk_user != ERR_PTR(-ENOKEY)) { in fscrypt_ioctl_get_key_status()
|
D | keysetup.c | 322 if (key != ERR_PTR(-ENOKEY) || in setup_file_encryption_key() 340 err = -ENOKEY; in setup_file_encryption_key() 356 err = -ENOKEY; in setup_file_encryption_key() 522 if (res == -ENOKEY) in fscrypt_get_encryption_info()
|
D | keysetup_v1.c | 141 return ERR_PTR(-ENOKEY); in find_and_lock_process_key() 328 if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
/Linux-v5.4/drivers/nvdimm/ |
D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 264 return -ENOKEY; in security_disable() 299 return -ENOKEY; in security_update() 305 return -ENOKEY; in security_update() 355 return -ENOKEY; in security_erase() 394 return -ENOKEY; in security_overwrite()
|
/Linux-v5.4/crypto/ |
D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 61 if (err == -ENOKEY) { in des3_ede_setkey()
|
/Linux-v5.4/net/rxrpc/ |
D | security.c | 122 return -ENOKEY; in rxrpc_init_server_conn_security() 142 return -ENOKEY; in rxrpc_init_server_conn_security()
|
/Linux-v5.4/include/crypto/ |
D | hash.h | 489 return -ENOKEY; in crypto_ahash_import() 510 return -ENOKEY; in crypto_ahash_init() 879 return -ENOKEY; in crypto_shash_import() 901 return -ENOKEY; in crypto_shash_init()
|
/Linux-v5.4/certs/ |
D | system_keyring.c | 240 ret = -ENOKEY; in verify_pkcs7_message_sig() 247 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
/Linux-v5.4/include/uapi/asm-generic/ |
D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/Linux-v5.4/tools/include/uapi/asm-generic/ |
D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/Linux-v5.4/arch/sparc/include/uapi/asm/ |
D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/Linux-v5.4/arch/parisc/include/uapi/asm/ |
D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/Linux-v5.4/arch/alpha/include/uapi/asm/ |
D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/Linux-v5.4/arch/mips/include/uapi/asm/ |
D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/Linux-v5.4/tools/arch/mips/include/uapi/asm/ |
D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/Linux-v5.4/tools/arch/alpha/include/uapi/asm/ |
D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/Linux-v5.4/tools/arch/parisc/include/uapi/asm/ |
D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/Linux-v5.4/tools/arch/sparc/include/uapi/asm/ |
D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/Linux-v5.4/fs/nfs/ |
D | nfs4idmap.c | 589 int ret = -ENOKEY; in nfs_idmap_legacy_upcall() 638 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message() 674 int ret = -ENOKEY; in idmap_pipe_downcall() 697 ret = -ENOKEY; in idmap_pipe_downcall()
|