/linux-4.4.14/crypto/asymmetric_keys/ |
D | pkcs7_trust.c | 50 return -ENOKEY; in pkcs7_validate_trust_one() 78 return -ENOKEY; in pkcs7_validate_trust_one() 100 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 117 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 121 return -ENOKEY; in pkcs7_validate_trust_one() 178 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 189 case -ENOKEY: in pkcs7_validate_trust() 192 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
D | x509_public_key.c | 126 return ERR_PTR(-ENOKEY); in x509_request_asymmetric_key()
|
/linux-4.4.14/security/keys/ |
D | process_keys.c | 346 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 366 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 390 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 410 case -ENOKEY: /* negative key */ in search_my_process_keyrings() 478 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings() 479 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings() 531 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 783 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
D | permission.c | 94 return -ENOKEY; in key_validate()
|
D | keyctl.c | 680 ret = -ENOKEY; in keyctl_keyring_search() 730 ret = -ENOKEY; in keyctl_read_key() 974 return -ENOKEY; in get_instantiation_keyring() 1153 return keyctl_reject_key(id, timeout, ENOKEY, ringid); in keyctl_negate_key()
|
D | request_key.c | 182 ret = -ENOKEY; in call_sbin_request_key() 562 key = ERR_PTR(-ENOKEY); in request_key_and_link()
|
D | request_key_auth.c | 264 authkey = ERR_PTR(-ENOKEY); in key_get_instantiation_authkey()
|
D | key.c | 635 key = ERR_PTR(-ENOKEY); in key_lookup() 673 ktype = ERR_PTR(-ENOKEY); in key_type_lookup()
|
D | keyring.c | 1019 keyring = ERR_PTR(-ENOKEY); in find_keyring_by_name()
|
D | trusted.c | 1018 return -ENOKEY; in trusted_update()
|
/linux-4.4.14/fs/ext4/ |
D | crypto_key.c | 189 res = -ENOKEY; in _ext4_get_encryption_info() 213 res = -ENOKEY; in _ext4_get_encryption_info() 230 res = -ENOKEY; in _ext4_get_encryption_info() 264 if (res == -ENOKEY) in _ext4_get_encryption_info()
|
D | crypto_policy.c | 201 return -ENOKEY; in ext4_inherit_context()
|
D | file.c | 348 return -ENOKEY; in ext4_file_mmap() 406 return -ENOKEY; in ext4_file_open()
|
D | crypto.c | 104 return ERR_PTR(-ENOKEY); in ext4_get_crypto_ctx()
|
/linux-4.4.14/crypto/ |
D | ghash-generic.c | 71 return -ENOKEY; in ghash_update() 126 return -ENOKEY; in ghash_final()
|
D | algif_hash.c | 262 err = -ENOKEY; in hash_check_key() 444 return -ENOKEY; in hash_accept_parent()
|
D | poly1305_generic.c | 224 return -ENOKEY; in crypto_poly1305_final()
|
D | algif_skcipher.c | 777 err = -ENOKEY; in skcipher_check_key() 967 return -ENOKEY; in skcipher_accept_parent()
|
D | af_alg.c | 295 nokey = err == -ENOKEY; in af_alg_accept()
|
/linux-4.4.14/net/rxrpc/ |
D | ar-security.c | 179 return -ENOKEY; in rxrpc_init_server_conn_security() 200 return -ENOKEY; in rxrpc_init_server_conn_security()
|
/linux-4.4.14/fs/f2fs/ |
D | crypto_key.c | 183 res = -ENOKEY; in _f2fs_get_encryption_info() 241 if (res == -ENOKEY && !S_ISREG(inode->i_mode)) in _f2fs_get_encryption_info()
|
D | crypto.c | 115 return ERR_PTR(-ENOKEY); in f2fs_get_crypto_ctx()
|
/linux-4.4.14/include/uapi/asm-generic/ |
D | errno.h | 109 #define ENOKEY 126 /* Required key not available */ macro
|
/linux-4.4.14/arch/mips/include/uapi/asm/ |
D | errno.h | 113 #define ENOKEY 161 /* Required key not available */ macro
|
/linux-4.4.14/arch/sparc/include/uapi/asm/ |
D | errno.h | 104 #define ENOKEY 128 /* Required key not available */ macro
|
/linux-4.4.14/arch/alpha/include/uapi/asm/ |
D | errno.h | 114 #define ENOKEY 132 /* Required key not available */ macro
|
/linux-4.4.14/arch/parisc/include/uapi/asm/ |
D | errno.h | 70 #define ENOKEY 184 /* Required key not available */ macro
|
/linux-4.4.14/include/linux/ |
D | key-type.h | 179 return key_reject_and_link(key, timeout, ENOKEY, keyring, instkey); in key_negate_and_link()
|
/linux-4.4.14/security/integrity/ |
D | digsig_asymmetric.c | 56 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
|
/linux-4.4.14/certs/ |
D | system_keyring.c | 147 ret = -ENOKEY; in system_verify_data()
|
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/ |
D | errno.c | 167 [ENOKEY] = LUSTRE_ENOKEY, 313 [LUSTRE_ENOKEY] = ENOKEY,
|
/linux-4.4.14/fs/nfs/ |
D | nfs4idmap.c | 615 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message() 649 int ret = -ENOKEY; in idmap_pipe_downcall() 671 ret = -ENOKEY; in idmap_pipe_downcall()
|
D | nfs4state.c | 1765 status = -ENOKEY; in nfs4_check_lease()
|
/linux-4.4.14/Documentation/security/ |
D | keys-request-key.txt | 137 the key whilst it exists to fail with error ENOKEY if negated or the specified 199 EKEYREVOKED > EKEYEXPIRED > ENOKEY
|
D | keys.txt | 466 non-zero; and the error ENOKEY will be returned if "create" is zero. 627 Error ENOKEY, EKEYREVOKED or EKEYEXPIRED will be returned if the search 700 as rejecting the key with ENOKEY as the error code. 895 Should the function fail error ENOKEY, EKEYEXPIRED or EKEYREVOKED will be 988 This searches the keyring tree specified for a matching key. Error ENOKEY
|
/linux-4.4.14/drivers/nfc/nxp-nci/ |
D | firmware.c | 273 return -ENOKEY; in nxp_nci_fw_read_status()
|
/linux-4.4.14/fs/afs/ |
D | security.c | 33 if (PTR_ERR(key) != -ENOKEY) { in afs_request_key()
|
D | cell.c | 75 if (ret == -ENODATA || ret == -EAGAIN || ret == -ENOKEY) in afs_cell_alloc()
|
D | write.c | 416 case -ENOKEY: in afs_write_back_from_locked_page()
|
/linux-4.4.14/net/mac802154/ |
D | llsec.c | 733 rc = -ENOKEY; in mac802154_llsec_encrypt() 999 err = -ENOKEY; in mac802154_llsec_decrypt()
|
/linux-4.4.14/fs/ecryptfs/ |
D | ecryptfs_kernel.h | 108 return ERR_PTR(-ENOKEY); in ecryptfs_get_encrypted_key()
|
D | keystore.c | 47 case -ENOKEY: in process_request_key_err()
|
/linux-4.4.14/drivers/net/wireless/b43legacy/ |
D | xmit.c | 266 return -ENOKEY; in generate_txhdr_fw3()
|
D | pio.c | 259 if (unlikely(err == -ENOKEY)) { in pio_tx_packet()
|
D | dma.c | 1162 if (unlikely(err == -ENOKEY)) { in b43legacy_dma_tx()
|
/linux-4.4.14/net/ceph/ |
D | ceph_common.c | 305 case -ENOKEY: in get_secret()
|
/linux-4.4.14/drivers/net/wireless/b43/ |
D | xmit.c | 314 return -ENOKEY; in b43_generate_txhdr()
|
D | pio.c | 552 if (unlikely(err == -ENOKEY)) { in b43_pio_tx()
|
D | dma.c | 1449 if (unlikely(err == -ENOKEY)) { in b43_dma_tx()
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | encrypted.c | 849 return -ENOKEY; in encrypted_update()
|
/linux-4.4.14/drivers/nfc/pn544/ |
D | i2c.c | 467 return -ENOKEY; in pn544_hci_i2c_fw_read_status()
|
/linux-4.4.14/drivers/s390/char/ |
D | tape_3590.c | 1325 return tape_3590_erp_basic(device, request, irb, -ENOKEY); in tape_3590_crypt_error()
|
/linux-4.4.14/kernel/ |
D | module.c | 2611 int err = -ENOKEY; in module_sig_check() 2628 if (err == -ENOKEY && !sig_enforce) in module_sig_check()
|