| /Linux-v6.1/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 43 return -ENOKEY; in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 172 case -ENOKEY: in pkcs7_validate_trust() 175 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
| D | restrict.c | 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 130 return -ENOKEY; in key_or_keyring_common() 135 return -ENOKEY; in key_or_keyring_common() 144 return -ENOKEY; in key_or_keyring_common() 212 return -ENOKEY; in key_or_keyring_common()
|
| /Linux-v6.1/security/keys/ |
| D | process_keys.c | 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() 627 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 867 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
| D | permission.c | 108 return -ENOKEY; in key_validate()
|
| /Linux-v6.1/fs/crypto/ |
| D | hooks.c | 56 return -ENOKEY; in __fscrypt_prepare_link() 75 return -ENOKEY; in __fscrypt_prepare_rename() 163 err = -ENOKEY; in fscrypt_prepare_setflags() 252 return -ENOKEY; in __fscrypt_encrypt_symlink()
|
| D | keyring.c | 362 keyref = ERR_PTR(-ENOKEY); in find_master_key_user() 473 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 841 err = -ENOKEY; in fscrypt_verify_key_added() 855 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 1040 return -ENOKEY; in do_remove_key() 1068 err = -ENOKEY; in do_remove_key() 1182 } else if (mk_user != ERR_PTR(-ENOKEY)) { in fscrypt_ioctl_get_key_status()
|
| D | keysetup.c | 441 return -ENOKEY; in setup_file_encryption_key() 455 err = -ENOKEY; in setup_file_encryption_key() 460 err = -ENOKEY; in setup_file_encryption_key() 641 if (res == -ENOKEY) in fscrypt_get_encryption_info()
|
| D | keysetup_v1.c | 141 return ERR_PTR(-ENOKEY); in find_and_lock_process_key() 309 if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
| /Linux-v6.1/include/crypto/internal/ |
| D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
| /Linux-v6.1/certs/ |
| D | system_keyring.c | 261 ret = -ENOKEY; in verify_pkcs7_message_sig() 267 if (ret != -ENOKEY) { in verify_pkcs7_message_sig() 274 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
| /Linux-v6.1/drivers/nvdimm/ |
| D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 264 return -ENOKEY; in security_disable() 299 return -ENOKEY; in security_update() 305 return -ENOKEY; in security_update() 355 return -ENOKEY; in security_erase() 389 return -ENOKEY; in security_overwrite()
|
| /Linux-v6.1/crypto/ |
| D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 58 if (err == -ENOKEY) { in des3_ede_setkey()
|
| /Linux-v6.1/include/crypto/ |
| D | hash.h | 512 return -ENOKEY; in crypto_ahash_import() 533 return -ENOKEY; in crypto_ahash_init() 925 return -ENOKEY; in crypto_shash_import() 947 return -ENOKEY; in crypto_shash_init()
|
| /Linux-v6.1/include/uapi/asm-generic/ |
| D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
| /Linux-v6.1/tools/include/uapi/asm-generic/ |
| D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
| /Linux-v6.1/tools/arch/sparc/include/uapi/asm/ |
| D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
| /Linux-v6.1/tools/arch/alpha/include/uapi/asm/ |
| D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
| /Linux-v6.1/tools/arch/mips/include/uapi/asm/ |
| D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
| /Linux-v6.1/tools/arch/parisc/include/uapi/asm/ |
| D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
| /Linux-v6.1/arch/alpha/include/uapi/asm/ |
| D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
| /Linux-v6.1/arch/sparc/include/uapi/asm/ |
| D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
| /Linux-v6.1/arch/parisc/include/uapi/asm/ |
| D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
| /Linux-v6.1/arch/mips/include/uapi/asm/ |
| D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
| /Linux-v6.1/kernel/module/ |
| D | signing.c | 106 case -ENOKEY: in module_sig_check()
|
| /Linux-v6.1/include/keys/ |
| D | system_keyring.h | 92 return -ENOKEY; in is_key_on_revocation_list()
|