ENOKEY            352 arch/x86/crypto/des3_ede_glue.c 	if (err == -ENOKEY) {
ENOKEY            550 arch/x86/kernel/kexec-bzimage64.c 	if (ret == -ENOKEY && IS_ENABLED(CONFIG_INTEGRITY_PLATFORM_KEYRING)) {
ENOKEY            240 certs/system_keyring.c 			ret = -ENOKEY;
ENOKEY            247 certs/system_keyring.c 		if (ret == -ENOKEY)
ENOKEY             97 crypto/aead.c  		ret = -ENOKEY;
ENOKEY            114 crypto/aead.c  		ret = -ENOKEY;
ENOKEY            297 crypto/af_alg.c 	nokey = err == -ENOKEY;
ENOKEY            408 crypto/ahash.c 		ret = -ENOKEY;
ENOKEY            394 crypto/algif_aead.c 	err = -ENOKEY;
ENOKEY            584 crypto/algif_aead.c 		return -ENOKEY;
ENOKEY            311 crypto/algif_hash.c 	err = -ENOKEY;
ENOKEY            458 crypto/algif_hash.c 		return -ENOKEY;
ENOKEY            225 crypto/algif_skcipher.c 	err = -ENOKEY;
ENOKEY            374 crypto/algif_skcipher.c 		return -ENOKEY;
ENOKEY             97 crypto/asymmetric_keys/asymmetric_type.c 			return ERR_PTR(-ENOKEY);
ENOKEY             43 crypto/asymmetric_keys/pkcs7_trust.c 			return -ENOKEY;
ENOKEY             70 crypto/asymmetric_keys/pkcs7_trust.c 			return -ENOKEY;
ENOKEY             92 crypto/asymmetric_keys/pkcs7_trust.c 		if (PTR_ERR(key) != -ENOKEY)
ENOKEY            108 crypto/asymmetric_keys/pkcs7_trust.c 	if (PTR_ERR(key) != -ENOKEY)
ENOKEY            112 crypto/asymmetric_keys/pkcs7_trust.c 	return -ENOKEY;
ENOKEY            163 crypto/asymmetric_keys/pkcs7_trust.c 	int cached_ret = -ENOKEY;
ENOKEY            172 crypto/asymmetric_keys/pkcs7_trust.c 		case -ENOKEY:
ENOKEY            175 crypto/asymmetric_keys/pkcs7_trust.c 			if (cached_ret == -ENOKEY)
ENOKEY             82 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY             91 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY            101 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY            104 crypto/asymmetric_keys/restrict.c 		ret = -ENOKEY;
ENOKEY            130 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY            135 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY            144 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY            202 crypto/asymmetric_keys/restrict.c 		return -ENOKEY;
ENOKEY             26 crypto/des_generic.c 	if (err == -ENOKEY) {
ENOKEY             61 crypto/des_generic.c 	if (err == -ENOKEY) {
ENOKEY            271 crypto/poly1305_generic.c 		return -ENOKEY;
ENOKEY            201 crypto/shash.c 		return -ENOKEY;
ENOKEY            853 crypto/skcipher.c 		ret = -ENOKEY;
ENOKEY            870 crypto/skcipher.c 		ret = -ENOKEY;
ENOKEY           3300 drivers/md/dm-integrity.c 			return -ENOKEY;
ENOKEY            116 drivers/md/dm-verity-verify-sig.c 			return -ENOKEY;
ENOKEY            596 drivers/net/ieee802154/ca8210.c 		return -ENOKEY;
ENOKEY           1387 drivers/net/wireless/broadcom/b43/dma.c 	if (unlikely(err == -ENOKEY)) {
ENOKEY            539 drivers/net/wireless/broadcom/b43/pio.c 	if (unlikely(err == -ENOKEY)) {
ENOKEY            308 drivers/net/wireless/broadcom/b43/xmit.c 			return -ENOKEY;
ENOKEY           1098 drivers/net/wireless/broadcom/b43legacy/dma.c 	if (unlikely(err == -ENOKEY)) {
ENOKEY            246 drivers/net/wireless/broadcom/b43legacy/pio.c 	if (unlikely(err == -ENOKEY)) {
ENOKEY            253 drivers/net/wireless/broadcom/b43legacy/xmit.c 			return -ENOKEY;
ENOKEY            261 drivers/nfc/nxp-nci/firmware.c 		return -ENOKEY;
ENOKEY            451 drivers/nfc/pn544/i2c.c 		return -ENOKEY;
ENOKEY             60 drivers/nvdimm/security.c 		if (PTR_ERR(key) == -ENOKEY)
ENOKEY            264 drivers/nvdimm/security.c 		return -ENOKEY;
ENOKEY            299 drivers/nvdimm/security.c 		return -ENOKEY;
ENOKEY            305 drivers/nvdimm/security.c 		return -ENOKEY;
ENOKEY            355 drivers/nvdimm/security.c 		return -ENOKEY;
ENOKEY            394 drivers/nvdimm/security.c 		return -ENOKEY;
ENOKEY            220 drivers/ras/cec.c 	return -ENOKEY;
ENOKEY            229 drivers/ras/cec.c 		return -ENOKEY;
ENOKEY           1321 drivers/s390/char/tape_3590.c 	return tape_3590_erp_basic(device, request, irb, -ENOKEY);
ENOKEY            513 drivers/thunderbolt/icm.c 		return -ENOKEY;
ENOKEY           1066 drivers/thunderbolt/icm.c 		return -ENOKEY;
ENOKEY             33 fs/afs/security.c 		if (PTR_ERR(key) != -ENOKEY) {
ENOKEY             62 fs/afs/security.c 		if (PTR_ERR(key) != -ENOKEY) {
ENOKEY            363 fs/afs/write.c 	int ret = -ENOKEY, ret2;
ENOKEY            387 fs/afs/write.c 		if (ret == -ENOKEY)
ENOKEY            430 fs/afs/write.c 	case -ENOKEY:
ENOKEY            574 fs/afs/write.c 	case -ENOKEY:
ENOKEY            354 fs/crypto/fname.c 		return -ENOKEY;
ENOKEY             63 fs/crypto/hooks.c 		return -ENOKEY;
ENOKEY             89 fs/crypto/hooks.c 		return -ENOKEY;
ENOKEY            144 fs/crypto/hooks.c 		return -ENOKEY;
ENOKEY            145 fs/crypto/keyring.c 			keyref = ERR_PTR(-ENOKEY);
ENOKEY            236 fs/crypto/keyring.c 		return ERR_PTR(-ENOKEY); /* No keyring yet, so no keys yet. */
ENOKEY            393 fs/crypto/keyring.c 		if (mk_user != ERR_PTR(-ENOKEY)) {
ENOKEY            438 fs/crypto/keyring.c 		if (err != -ENOKEY)
ENOKEY            607 fs/crypto/keyring.c 	if (err == -ENOKEY && capable(CAP_FOWNER))
ENOKEY            915 fs/crypto/keyring.c 		if (key != ERR_PTR(-ENOKEY))
ENOKEY            940 fs/crypto/keyring.c 		} else if (mk_user != ERR_PTR(-ENOKEY)) {
ENOKEY            322 fs/crypto/keysetup.c 		if (key != ERR_PTR(-ENOKEY) ||
ENOKEY            340 fs/crypto/keysetup.c 		err = -ENOKEY;
ENOKEY            356 fs/crypto/keysetup.c 		err = -ENOKEY;
ENOKEY            522 fs/crypto/keysetup.c 	if (res == -ENOKEY)
ENOKEY            141 fs/crypto/keysetup_v1.c 	return ERR_PTR(-ENOKEY);
ENOKEY            328 fs/crypto/keysetup_v1.c 	if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) {
ENOKEY            483 fs/crypto/policy.c 		return -ENOKEY;
ENOKEY            106 fs/ecryptfs/ecryptfs_kernel.h 	return ERR_PTR(-ENOKEY);
ENOKEY             34 fs/ecryptfs/keystore.c 	case -ENOKEY:
ENOKEY            124 fs/ext4/dir.c  		if (err && err != -ENOKEY)
ENOKEY            779 fs/ext4/ialloc.c 			return ERR_PTR(-ENOKEY);
ENOKEY            989 fs/f2fs/dir.c  		if (err && err != -ENOKEY)
ENOKEY            589 fs/nfs/nfs4idmap.c 	int ret = -ENOKEY;
ENOKEY            638 fs/nfs/nfs4idmap.c 	int ret = -ENOKEY;
ENOKEY            674 fs/nfs/nfs4idmap.c 	int ret = -ENOKEY;
ENOKEY            697 fs/nfs/nfs4idmap.c 		ret = -ENOKEY;
ENOKEY           1920 fs/nfs/nfs4state.c 		status = -ENOKEY;
ENOKEY            814 fs/nfsd/nfsproc.c 		{ nfserr_perm, -ENOKEY },
ENOKEY            306 fs/ubifs/auth.c 		err = -ENOKEY;
ENOKEY            517 fs/ubifs/dir.c 		if (err && err != -ENOKEY)
ENOKEY            594 fs/ubifs/sb.c  			return -ENOKEY;
ENOKEY             77 fs/verity/signature.c 		if (err == -ENOKEY)
ENOKEY            489 include/crypto/hash.h 		return -ENOKEY;
ENOKEY            510 include/crypto/hash.h 		return -ENOKEY;
ENOKEY            879 include/crypto/hash.h 		return -ENOKEY;
ENOKEY            901 include/crypto/hash.h 		return -ENOKEY;
ENOKEY             32 include/crypto/internal/des.h 	if (err == -ENOKEY) {
ENOKEY             62 include/crypto/internal/des.h 	int ret = fips_enabled ? -EINVAL : -ENOKEY;
ENOKEY            582 include/linux/fscrypt.h 			return -ENOKEY;
ENOKEY            186 include/linux/key-type.h 	return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey);
ENOKEY            203 kernel/kexec_file.c 	case -ENOKEY:
ENOKEY           2881 kernel/module.c 	case -ENOKEY:
ENOKEY            704 lib/crypto/des.c 	return des_ekey(ctx->expkey, key) ? 0 : -ENOKEY;
ENOKEY            833 lib/crypto/des.c 	if (err && err != -ENOKEY)
ENOKEY            332 net/ceph/ceph_common.c 		case -ENOKEY:
ENOKEY            735 net/mac802154/llsec.c 		rc = -ENOKEY;
ENOKEY           1004 net/mac802154/llsec.c 		err = -ENOKEY;
ENOKEY             67 security/integrity/digsig_asymmetric.c 			return ERR_PTR(-ENOKEY);
ENOKEY             84 security/integrity/evm/evm_crypto.c 			return ERR_PTR(-ENOKEY);
ENOKEY            380 security/integrity/ima/ima_appraise.c 	     rc == -ENOKEY))
ENOKEY             26 security/keys/dh.c 		ret = -ENOKEY;
ENOKEY            865 security/keys/encrypted-keys/encrypted.c 		return -ENOKEY;
ENOKEY            676 security/keys/key.c 	key = ERR_PTR(-ENOKEY);
ENOKEY            711 security/keys/key.c 	ktype = ERR_PTR(-ENOKEY);
ENOKEY            766 security/keys/keyctl.c 			ret = -ENOKEY;
ENOKEY            833 security/keys/keyctl.c 		ret = -ENOKEY;
ENOKEY           1133 security/keys/keyctl.c 	return -ENOKEY;
ENOKEY           1307 security/keys/keyctl.c 	return keyctl_reject_key(id, timeout, ENOKEY, ringid);
ENOKEY           1181 security/keys/keyring.c 	keyring = ERR_PTR(-ENOKEY);
ENOKEY             91 security/keys/permission.c 		return -ENOKEY;
ENOKEY            448 security/keys/process_keys.c 		case -ENOKEY: /* negative key */
ENOKEY            469 security/keys/process_keys.c 		case -ENOKEY: /* negative key */
ENOKEY            491 security/keys/process_keys.c 		case -ENOKEY: /* negative key */
ENOKEY            513 security/keys/process_keys.c 		case -ENOKEY: /* negative key */
ENOKEY            574 security/keys/process_keys.c 	if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY))
ENOKEY            575 security/keys/process_keys.c 		key_ref = ERR_PTR(-ENOKEY);
ENOKEY            627 security/keys/process_keys.c 	key_ref = ERR_PTR(-ENOKEY);
ENOKEY            868 security/keys/process_keys.c 	if (PTR_ERR(keyring) == -ENOKEY) {
ENOKEY            200 security/keys/request_key.c 			ret = -ENOKEY;
ENOKEY            633 security/keys/request_key.c 		key = ERR_PTR(-ENOKEY);
ENOKEY            796 security/keys/request_key.c 			key = ERR_PTR(-ENOKEY);
ENOKEY            271 security/keys/request_key_auth.c 			authkey = ERR_PTR(-ENOKEY);
ENOKEY           1078 security/keys/trusted.c 		return -ENOKEY;