Home
last modified time | relevance | path

Searched refs:ENOKEY (Results 1 – 53 of 53) sorted by relevance

/linux-4.4.14/crypto/asymmetric_keys/
Dpkcs7_trust.c50 return -ENOKEY; in pkcs7_validate_trust_one()
78 return -ENOKEY; in pkcs7_validate_trust_one()
100 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
117 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
121 return -ENOKEY; in pkcs7_validate_trust_one()
178 int cached_ret = -ENOKEY; in pkcs7_validate_trust()
189 case -ENOKEY: in pkcs7_validate_trust()
192 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
Dx509_public_key.c126 return ERR_PTR(-ENOKEY); in x509_request_asymmetric_key()
/linux-4.4.14/security/keys/
Dprocess_keys.c346 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
366 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
390 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
410 case -ENOKEY: /* negative key */ in search_my_process_keyrings()
478 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings()
479 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings()
531 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key()
783 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
Dpermission.c94 return -ENOKEY; in key_validate()
Dkeyctl.c680 ret = -ENOKEY; in keyctl_keyring_search()
730 ret = -ENOKEY; in keyctl_read_key()
974 return -ENOKEY; in get_instantiation_keyring()
1153 return keyctl_reject_key(id, timeout, ENOKEY, ringid); in keyctl_negate_key()
Drequest_key.c182 ret = -ENOKEY; in call_sbin_request_key()
562 key = ERR_PTR(-ENOKEY); in request_key_and_link()
Drequest_key_auth.c264 authkey = ERR_PTR(-ENOKEY); in key_get_instantiation_authkey()
Dkey.c635 key = ERR_PTR(-ENOKEY); in key_lookup()
673 ktype = ERR_PTR(-ENOKEY); in key_type_lookup()
Dkeyring.c1019 keyring = ERR_PTR(-ENOKEY); in find_keyring_by_name()
Dtrusted.c1018 return -ENOKEY; in trusted_update()
/linux-4.4.14/fs/ext4/
Dcrypto_key.c189 res = -ENOKEY; in _ext4_get_encryption_info()
213 res = -ENOKEY; in _ext4_get_encryption_info()
230 res = -ENOKEY; in _ext4_get_encryption_info()
264 if (res == -ENOKEY) in _ext4_get_encryption_info()
Dcrypto_policy.c201 return -ENOKEY; in ext4_inherit_context()
Dfile.c348 return -ENOKEY; in ext4_file_mmap()
406 return -ENOKEY; in ext4_file_open()
Dcrypto.c104 return ERR_PTR(-ENOKEY); in ext4_get_crypto_ctx()
/linux-4.4.14/crypto/
Dghash-generic.c71 return -ENOKEY; in ghash_update()
126 return -ENOKEY; in ghash_final()
Dalgif_hash.c262 err = -ENOKEY; in hash_check_key()
444 return -ENOKEY; in hash_accept_parent()
Dpoly1305_generic.c224 return -ENOKEY; in crypto_poly1305_final()
Dalgif_skcipher.c777 err = -ENOKEY; in skcipher_check_key()
967 return -ENOKEY; in skcipher_accept_parent()
Daf_alg.c295 nokey = err == -ENOKEY; in af_alg_accept()
/linux-4.4.14/net/rxrpc/
Dar-security.c179 return -ENOKEY; in rxrpc_init_server_conn_security()
200 return -ENOKEY; in rxrpc_init_server_conn_security()
/linux-4.4.14/fs/f2fs/
Dcrypto_key.c183 res = -ENOKEY; in _f2fs_get_encryption_info()
241 if (res == -ENOKEY && !S_ISREG(inode->i_mode)) in _f2fs_get_encryption_info()
Dcrypto.c115 return ERR_PTR(-ENOKEY); in f2fs_get_crypto_ctx()
/linux-4.4.14/include/uapi/asm-generic/
Derrno.h109 #define ENOKEY 126 /* Required key not available */ macro
/linux-4.4.14/arch/mips/include/uapi/asm/
Derrno.h113 #define ENOKEY 161 /* Required key not available */ macro
/linux-4.4.14/arch/sparc/include/uapi/asm/
Derrno.h104 #define ENOKEY 128 /* Required key not available */ macro
/linux-4.4.14/arch/alpha/include/uapi/asm/
Derrno.h114 #define ENOKEY 132 /* Required key not available */ macro
/linux-4.4.14/arch/parisc/include/uapi/asm/
Derrno.h70 #define ENOKEY 184 /* Required key not available */ macro
/linux-4.4.14/include/linux/
Dkey-type.h179 return key_reject_and_link(key, timeout, ENOKEY, keyring, instkey); in key_negate_and_link()
/linux-4.4.14/security/integrity/
Ddigsig_asymmetric.c56 return ERR_PTR(-ENOKEY); in request_asymmetric_key()
/linux-4.4.14/certs/
Dsystem_keyring.c147 ret = -ENOKEY; in system_verify_data()
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/
Derrno.c167 [ENOKEY] = LUSTRE_ENOKEY,
313 [LUSTRE_ENOKEY] = ENOKEY,
/linux-4.4.14/fs/nfs/
Dnfs4idmap.c615 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message()
649 int ret = -ENOKEY; in idmap_pipe_downcall()
671 ret = -ENOKEY; in idmap_pipe_downcall()
Dnfs4state.c1765 status = -ENOKEY; in nfs4_check_lease()
/linux-4.4.14/Documentation/security/
Dkeys-request-key.txt137 the key whilst it exists to fail with error ENOKEY if negated or the specified
199 EKEYREVOKED > EKEYEXPIRED > ENOKEY
Dkeys.txt466 non-zero; and the error ENOKEY will be returned if "create" is zero.
627 Error ENOKEY, EKEYREVOKED or EKEYEXPIRED will be returned if the search
700 as rejecting the key with ENOKEY as the error code.
895 Should the function fail error ENOKEY, EKEYEXPIRED or EKEYREVOKED will be
988 This searches the keyring tree specified for a matching key. Error ENOKEY
/linux-4.4.14/drivers/nfc/nxp-nci/
Dfirmware.c273 return -ENOKEY; in nxp_nci_fw_read_status()
/linux-4.4.14/fs/afs/
Dsecurity.c33 if (PTR_ERR(key) != -ENOKEY) { in afs_request_key()
Dcell.c75 if (ret == -ENODATA || ret == -EAGAIN || ret == -ENOKEY) in afs_cell_alloc()
Dwrite.c416 case -ENOKEY: in afs_write_back_from_locked_page()
/linux-4.4.14/net/mac802154/
Dllsec.c733 rc = -ENOKEY; in mac802154_llsec_encrypt()
999 err = -ENOKEY; in mac802154_llsec_decrypt()
/linux-4.4.14/fs/ecryptfs/
Decryptfs_kernel.h108 return ERR_PTR(-ENOKEY); in ecryptfs_get_encrypted_key()
Dkeystore.c47 case -ENOKEY: in process_request_key_err()
/linux-4.4.14/drivers/net/wireless/b43legacy/
Dxmit.c266 return -ENOKEY; in generate_txhdr_fw3()
Dpio.c259 if (unlikely(err == -ENOKEY)) { in pio_tx_packet()
Ddma.c1162 if (unlikely(err == -ENOKEY)) { in b43legacy_dma_tx()
/linux-4.4.14/net/ceph/
Dceph_common.c305 case -ENOKEY: in get_secret()
/linux-4.4.14/drivers/net/wireless/b43/
Dxmit.c314 return -ENOKEY; in b43_generate_txhdr()
Dpio.c552 if (unlikely(err == -ENOKEY)) { in b43_pio_tx()
Ddma.c1449 if (unlikely(err == -ENOKEY)) { in b43_dma_tx()
/linux-4.4.14/security/keys/encrypted-keys/
Dencrypted.c849 return -ENOKEY; in encrypted_update()
/linux-4.4.14/drivers/nfc/pn544/
Di2c.c467 return -ENOKEY; in pn544_hci_i2c_fw_read_status()
/linux-4.4.14/drivers/s390/char/
Dtape_3590.c1325 return tape_3590_erp_basic(device, request, irb, -ENOKEY); in tape_3590_crypt_error()
/linux-4.4.14/kernel/
Dmodule.c2611 int err = -ENOKEY; in module_sig_check()
2628 if (err == -ENOKEY && !sig_enforce) in module_sig_check()