/linux-4.1.27/crypto/asymmetric_keys/ |
D | pkcs7_trust.c | 50 return -ENOKEY; in pkcs7_validate_trust_one() 77 return -ENOKEY; in pkcs7_validate_trust_one() 97 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 113 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 117 return -ENOKEY; in pkcs7_validate_trust_one() 174 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 183 case -ENOKEY: in pkcs7_validate_trust() 186 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
D | x509_public_key.c | 112 return ERR_PTR(-ENOKEY); in x509_request_asymmetric_key()
|
/linux-4.1.27/security/keys/ |
D | process_keys.c | 346 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 366 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 390 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 410 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 478 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings() 479 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings() 531 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 783 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
D | permission.c | 94 return -ENOKEY; in key_validate()
|
D | keyctl.c | 686 ret = -ENOKEY; in keyctl_keyring_search() 736 ret = -ENOKEY; in keyctl_read_key() 980 return -ENOKEY; in get_instantiation_keyring() 1159 return keyctl_reject_key(id, timeout, ENOKEY, ringid); in keyctl_negate_key()
|
D | request_key.c | 182 ret = -ENOKEY; in call_sbin_request_key() 559 key = ERR_PTR(-ENOKEY); in request_key_and_link()
|
D | request_key_auth.c | 264 authkey = ERR_PTR(-ENOKEY); in key_get_instantiation_authkey()
|
D | key.c | 635 key = ERR_PTR(-ENOKEY); in key_lookup() 673 ktype = ERR_PTR(-ENOKEY); in key_type_lookup()
|
D | keyring.c | 1019 keyring = ERR_PTR(-ENOKEY); in find_keyring_by_name()
|
D | trusted.c | 995 return -ENOKEY; in trusted_update()
|
/linux-4.1.27/crypto/ |
D | ghash-generic.c | 71 return -ENOKEY; in ghash_update() 126 return -ENOKEY; in ghash_final()
|
D | algif_hash.c | 254 err = -ENOKEY; in hash_check_key() 436 return -ENOKEY; in hash_accept_parent()
|
D | algif_skcipher.c | 775 err = -ENOKEY; in skcipher_check_key() 964 return -ENOKEY; in skcipher_accept_parent()
|
D | af_alg.c | 292 nokey = err == -ENOKEY; in af_alg_accept()
|
/linux-4.1.27/net/rxrpc/ |
D | ar-security.c | 179 return -ENOKEY; in rxrpc_init_server_conn_security() 200 return -ENOKEY; in rxrpc_init_server_conn_security()
|
/linux-4.1.27/kernel/ |
D | module_signing.c | 145 return ERR_PTR(-ENOKEY); in request_asymmetric_key() 174 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
|
D | module.c | 2456 int err = -ENOKEY; in module_sig_check() 2473 if (err == -ENOKEY && !sig_enforce) in module_sig_check()
|
/linux-4.1.27/include/uapi/asm-generic/ |
D | errno.h | 109 #define ENOKEY 126 /* Required key not available */ macro
|
/linux-4.1.27/arch/sparc/include/uapi/asm/ |
D | errno.h | 104 #define ENOKEY 128 /* Required key not available */ macro
|
/linux-4.1.27/arch/parisc/include/uapi/asm/ |
D | errno.h | 70 #define ENOKEY 184 /* Required key not available */ macro
|
/linux-4.1.27/arch/alpha/include/uapi/asm/ |
D | errno.h | 114 #define ENOKEY 132 /* Required key not available */ macro
|
/linux-4.1.27/arch/mips/include/uapi/asm/ |
D | errno.h | 113 #define ENOKEY 161 /* Required key not available */ macro
|
/linux-4.1.27/include/linux/ |
D | key-type.h | 180 return key_reject_and_link(key, timeout, ENOKEY, keyring, instkey); in key_negate_and_link()
|
/linux-4.1.27/security/integrity/ |
D | digsig_asymmetric.c | 56 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
|
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/ |
D | errno.c | 167 [ENOKEY] = LUSTRE_ENOKEY, 313 [LUSTRE_ENOKEY] = ENOKEY,
|
/linux-4.1.27/fs/nfs/ |
D | nfs4idmap.c | 630 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message() 664 int ret = -ENOKEY; in idmap_pipe_downcall() 686 ret = -ENOKEY; in idmap_pipe_downcall()
|
D | nfs4state.c | 1765 status = -ENOKEY; in nfs4_check_lease()
|
/linux-4.1.27/Documentation/security/ |
D | keys-request-key.txt | 137 the key whilst it exists to fail with error ENOKEY if negated or the specified 199 EKEYREVOKED > EKEYEXPIRED > ENOKEY
|
D | keys.txt | 466 non-zero; and the error ENOKEY will be returned if "create" is zero. 627 Error ENOKEY, EKEYREVOKED or EKEYEXPIRED will be returned if the search 700 as rejecting the key with ENOKEY as the error code. 895 Should the function fail error ENOKEY, EKEYEXPIRED or EKEYREVOKED will be 988 This searches the keyring tree specified for a matching key. Error ENOKEY
|
/linux-4.1.27/drivers/nfc/nxp-nci/ |
D | firmware.c | 273 return -ENOKEY; in nxp_nci_fw_read_status()
|
/linux-4.1.27/fs/afs/ |
D | security.c | 33 if (PTR_ERR(key) != -ENOKEY) { in afs_request_key()
|
D | cell.c | 75 if (ret == -ENODATA || ret == -EAGAIN || ret == -ENOKEY) in afs_cell_alloc()
|
D | write.c | 416 case -ENOKEY: in afs_write_back_from_locked_page()
|
/linux-4.1.27/net/mac802154/ |
D | llsec.c | 738 rc = -ENOKEY; in mac802154_llsec_encrypt() 1010 err = -ENOKEY; in mac802154_llsec_decrypt()
|
/linux-4.1.27/fs/ecryptfs/ |
D | ecryptfs_kernel.h | 108 return ERR_PTR(-ENOKEY); in ecryptfs_get_encrypted_key()
|
D | keystore.c | 47 case -ENOKEY: in process_request_key_err()
|
/linux-4.1.27/drivers/net/wireless/b43legacy/ |
D | xmit.c | 266 return -ENOKEY; in generate_txhdr_fw3()
|
D | pio.c | 259 if (unlikely(err == -ENOKEY)) { in pio_tx_packet()
|
D | dma.c | 1162 if (unlikely(err == -ENOKEY)) { in b43legacy_dma_tx()
|
/linux-4.1.27/net/ceph/ |
D | ceph_common.c | 295 case -ENOKEY: in get_secret()
|
/linux-4.1.27/fs/ext4/ |
D | crypto_fname.c | 367 return ERR_PTR(-ENOKEY); in ext4_get_fname_crypto_ctx()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
D | pio.c | 552 if (unlikely(err == -ENOKEY)) { in b43_pio_tx()
|
D | xmit.c | 314 return -ENOKEY; in b43_generate_txhdr()
|
D | dma.c | 1449 if (unlikely(err == -ENOKEY)) { in b43_dma_tx()
|
/linux-4.1.27/security/keys/encrypted-keys/ |
D | encrypted.c | 849 return -ENOKEY; in encrypted_update()
|
/linux-4.1.27/drivers/nfc/pn544/ |
D | i2c.c | 467 return -ENOKEY; in pn544_hci_i2c_fw_read_status()
|
/linux-4.1.27/drivers/s390/char/ |
D | tape_3590.c | 1325 return tape_3590_erp_basic(device, request, irb, -ENOKEY); in tape_3590_crypt_error()
|