Home
last modified time | relevance | path

Searched refs:ENOKEY (Results 1 – 25 of 105) sorted by relevance

12345

/linux-5.19.10/crypto/asymmetric_keys/
Dpkcs7_trust.c43 return -ENOKEY; in pkcs7_validate_trust_one()
70 return -ENOKEY; in pkcs7_validate_trust_one()
92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
112 return -ENOKEY; in pkcs7_validate_trust_one()
163 int cached_ret = -ENOKEY; in pkcs7_validate_trust()
172 case -ENOKEY: in pkcs7_validate_trust()
175 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
Drestrict.c82 return -ENOKEY; in restrict_link_by_signature()
91 return -ENOKEY; in restrict_link_by_signature()
101 return -ENOKEY; in restrict_link_by_signature()
104 ret = -ENOKEY; in restrict_link_by_signature()
130 return -ENOKEY; in key_or_keyring_common()
135 return -ENOKEY; in key_or_keyring_common()
144 return -ENOKEY; in key_or_keyring_common()
212 return -ENOKEY; in key_or_keyring_common()
/linux-5.19.10/security/keys/
Dprocess_keys.c448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu()
575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu()
627 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key()
867 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
Dpermission.c108 return -ENOKEY; in key_validate()
/linux-5.19.10/fs/crypto/
Dhooks.c58 return -ENOKEY; in __fscrypt_prepare_link()
77 return -ENOKEY; in __fscrypt_prepare_rename()
167 err = -ENOKEY; in fscrypt_prepare_setflags()
256 return -ENOKEY; in __fscrypt_encrypt_symlink()
Dkeyring.c149 keyref = ERR_PTR(-ENOKEY); in search_fscrypt_keyring()
249 return ERR_PTR(-ENOKEY); /* No keyring yet, so no keys yet. */ in fscrypt_find_master_key()
405 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key()
447 if (err != -ENOKEY) in do_add_master_key()
796 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added()
1107 if (key != ERR_PTR(-ENOKEY)) in fscrypt_ioctl_get_key_status()
1132 } else if (mk_user != ERR_PTR(-ENOKEY)) { in fscrypt_ioctl_get_key_status()
Dkeysetup.c434 if (key != ERR_PTR(-ENOKEY) || in setup_file_encryption_key()
452 err = -ENOKEY; in setup_file_encryption_key()
457 err = -ENOKEY; in setup_file_encryption_key()
647 if (res == -ENOKEY) in fscrypt_get_encryption_info()
Dkeysetup_v1.c141 return ERR_PTR(-ENOKEY); in find_and_lock_process_key()
307 if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
/linux-5.19.10/include/crypto/internal/
Ddes.h32 if (err == -ENOKEY) { in crypto_des_verify_key()
58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
/linux-5.19.10/certs/
Dsystem_keyring.c261 ret = -ENOKEY; in verify_pkcs7_message_sig()
267 if (ret != -ENOKEY) { in verify_pkcs7_message_sig()
274 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
/linux-5.19.10/drivers/nvdimm/
Dsecurity.c60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key()
264 return -ENOKEY; in security_disable()
299 return -ENOKEY; in security_update()
305 return -ENOKEY; in security_update()
355 return -ENOKEY; in security_erase()
389 return -ENOKEY; in security_overwrite()
/linux-5.19.10/crypto/
Ddes_generic.c26 if (err == -ENOKEY) { in des_setkey()
58 if (err == -ENOKEY) { in des3_ede_setkey()
/linux-5.19.10/include/crypto/
Dhash.h512 return -ENOKEY; in crypto_ahash_import()
533 return -ENOKEY; in crypto_ahash_init()
923 return -ENOKEY; in crypto_shash_import()
945 return -ENOKEY; in crypto_shash_init()
/linux-5.19.10/tools/include/uapi/asm-generic/
Derrno.h110 #define ENOKEY 126 /* Required key not available */ macro
/linux-5.19.10/include/uapi/asm-generic/
Derrno.h110 #define ENOKEY 126 /* Required key not available */ macro
/linux-5.19.10/tools/arch/alpha/include/uapi/asm/
Derrno.h115 #define ENOKEY 132 /* Required key not available */ macro
/linux-5.19.10/tools/arch/mips/include/uapi/asm/
Derrno.h114 #define ENOKEY 161 /* Required key not available */ macro
/linux-5.19.10/tools/arch/parisc/include/uapi/asm/
Derrno.h71 #define ENOKEY 184 /* Required key not available */ macro
/linux-5.19.10/tools/arch/sparc/include/uapi/asm/
Derrno.h105 #define ENOKEY 128 /* Required key not available */ macro
/linux-5.19.10/arch/sparc/include/uapi/asm/
Derrno.h105 #define ENOKEY 128 /* Required key not available */ macro
/linux-5.19.10/arch/parisc/include/uapi/asm/
Derrno.h71 #define ENOKEY 184 /* Required key not available */ macro
/linux-5.19.10/arch/alpha/include/uapi/asm/
Derrno.h115 #define ENOKEY 132 /* Required key not available */ macro
/linux-5.19.10/arch/mips/include/uapi/asm/
Derrno.h114 #define ENOKEY 161 /* Required key not available */ macro
/linux-5.19.10/kernel/module/
Dsigning.c106 case -ENOKEY: in module_sig_check()
/linux-5.19.10/include/keys/
Dsystem_keyring.h92 return -ENOKEY; in is_key_on_revocation_list()

12345