Home
last modified time | relevance | path

Searched refs:ENOKEY (Results 1 – 47 of 47) sorted by relevance

/linux-4.1.27/crypto/asymmetric_keys/
Dpkcs7_trust.c50 return -ENOKEY; in pkcs7_validate_trust_one()
77 return -ENOKEY; in pkcs7_validate_trust_one()
97 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
113 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
117 return -ENOKEY; in pkcs7_validate_trust_one()
174 int cached_ret = -ENOKEY; in pkcs7_validate_trust()
183 case -ENOKEY: in pkcs7_validate_trust()
186 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
Dx509_public_key.c112 return ERR_PTR(-ENOKEY); in x509_request_asymmetric_key()
/linux-4.1.27/security/keys/
Dprocess_keys.c346 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
366 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
390 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
410 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
478 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings()
479 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings()
531 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key()
783 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
Dpermission.c94 return -ENOKEY; in key_validate()
Dkeyctl.c686 ret = -ENOKEY; in keyctl_keyring_search()
736 ret = -ENOKEY; in keyctl_read_key()
980 return -ENOKEY; in get_instantiation_keyring()
1159 return keyctl_reject_key(id, timeout, ENOKEY, ringid); in keyctl_negate_key()
Drequest_key.c182 ret = -ENOKEY; in call_sbin_request_key()
559 key = ERR_PTR(-ENOKEY); in request_key_and_link()
Drequest_key_auth.c264 authkey = ERR_PTR(-ENOKEY); in key_get_instantiation_authkey()
Dkey.c635 key = ERR_PTR(-ENOKEY); in key_lookup()
673 ktype = ERR_PTR(-ENOKEY); in key_type_lookup()
Dkeyring.c1019 keyring = ERR_PTR(-ENOKEY); in find_keyring_by_name()
Dtrusted.c995 return -ENOKEY; in trusted_update()
/linux-4.1.27/crypto/
Dghash-generic.c71 return -ENOKEY; in ghash_update()
126 return -ENOKEY; in ghash_final()
Dalgif_hash.c254 err = -ENOKEY; in hash_check_key()
436 return -ENOKEY; in hash_accept_parent()
Dalgif_skcipher.c775 err = -ENOKEY; in skcipher_check_key()
964 return -ENOKEY; in skcipher_accept_parent()
Daf_alg.c292 nokey = err == -ENOKEY; in af_alg_accept()
/linux-4.1.27/net/rxrpc/
Dar-security.c179 return -ENOKEY; in rxrpc_init_server_conn_security()
200 return -ENOKEY; in rxrpc_init_server_conn_security()
/linux-4.1.27/kernel/
Dmodule_signing.c145 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
174 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
Dmodule.c2456 int err = -ENOKEY; in module_sig_check()
2473 if (err == -ENOKEY && !sig_enforce) in module_sig_check()
/linux-4.1.27/include/uapi/asm-generic/
Derrno.h109 #define ENOKEY 126 /* Required key not available */ macro
/linux-4.1.27/arch/sparc/include/uapi/asm/
Derrno.h104 #define ENOKEY 128 /* Required key not available */ macro
/linux-4.1.27/arch/parisc/include/uapi/asm/
Derrno.h70 #define ENOKEY 184 /* Required key not available */ macro
/linux-4.1.27/arch/alpha/include/uapi/asm/
Derrno.h114 #define ENOKEY 132 /* Required key not available */ macro
/linux-4.1.27/arch/mips/include/uapi/asm/
Derrno.h113 #define ENOKEY 161 /* Required key not available */ macro
/linux-4.1.27/include/linux/
Dkey-type.h180 return key_reject_and_link(key, timeout, ENOKEY, keyring, instkey); in key_negate_and_link()
/linux-4.1.27/security/integrity/
Ddigsig_asymmetric.c56 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/
Derrno.c167 [ENOKEY] = LUSTRE_ENOKEY,
313 [LUSTRE_ENOKEY] = ENOKEY,
/linux-4.1.27/fs/nfs/
Dnfs4idmap.c630 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message()
664 int ret = -ENOKEY; in idmap_pipe_downcall()
686 ret = -ENOKEY; in idmap_pipe_downcall()
Dnfs4state.c1765 status = -ENOKEY; in nfs4_check_lease()
/linux-4.1.27/Documentation/security/
Dkeys-request-key.txt137 the key whilst it exists to fail with error ENOKEY if negated or the specified
199 EKEYREVOKED > EKEYEXPIRED > ENOKEY
Dkeys.txt466 non-zero; and the error ENOKEY will be returned if "create" is zero.
627 Error ENOKEY, EKEYREVOKED or EKEYEXPIRED will be returned if the search
700 as rejecting the key with ENOKEY as the error code.
895 Should the function fail error ENOKEY, EKEYEXPIRED or EKEYREVOKED will be
988 This searches the keyring tree specified for a matching key. Error ENOKEY
/linux-4.1.27/drivers/nfc/nxp-nci/
Dfirmware.c273 return -ENOKEY; in nxp_nci_fw_read_status()
/linux-4.1.27/fs/afs/
Dsecurity.c33 if (PTR_ERR(key) != -ENOKEY) { in afs_request_key()
Dcell.c75 if (ret == -ENODATA || ret == -EAGAIN || ret == -ENOKEY) in afs_cell_alloc()
Dwrite.c416 case -ENOKEY: in afs_write_back_from_locked_page()
/linux-4.1.27/net/mac802154/
Dllsec.c738 rc = -ENOKEY; in mac802154_llsec_encrypt()
1010 err = -ENOKEY; in mac802154_llsec_decrypt()
/linux-4.1.27/fs/ecryptfs/
Decryptfs_kernel.h108 return ERR_PTR(-ENOKEY); in ecryptfs_get_encrypted_key()
Dkeystore.c47 case -ENOKEY: in process_request_key_err()
/linux-4.1.27/drivers/net/wireless/b43legacy/
Dxmit.c266 return -ENOKEY; in generate_txhdr_fw3()
Dpio.c259 if (unlikely(err == -ENOKEY)) { in pio_tx_packet()
Ddma.c1162 if (unlikely(err == -ENOKEY)) { in b43legacy_dma_tx()
/linux-4.1.27/net/ceph/
Dceph_common.c295 case -ENOKEY: in get_secret()
/linux-4.1.27/fs/ext4/
Dcrypto_fname.c367 return ERR_PTR(-ENOKEY); in ext4_get_fname_crypto_ctx()
/linux-4.1.27/drivers/net/wireless/b43/
Dpio.c552 if (unlikely(err == -ENOKEY)) { in b43_pio_tx()
Dxmit.c314 return -ENOKEY; in b43_generate_txhdr()
Ddma.c1449 if (unlikely(err == -ENOKEY)) { in b43_dma_tx()
/linux-4.1.27/security/keys/encrypted-keys/
Dencrypted.c849 return -ENOKEY; in encrypted_update()
/linux-4.1.27/drivers/nfc/pn544/
Di2c.c467 return -ENOKEY; in pn544_hci_i2c_fw_read_status()
/linux-4.1.27/drivers/s390/char/
Dtape_3590.c1325 return tape_3590_erp_basic(device, request, irb, -ENOKEY); in tape_3590_crypt_error()