ENOKEY 352 arch/x86/crypto/des3_ede_glue.c if (err == -ENOKEY) { ENOKEY 550 arch/x86/kernel/kexec-bzimage64.c if (ret == -ENOKEY && IS_ENABLED(CONFIG_INTEGRITY_PLATFORM_KEYRING)) { ENOKEY 240 certs/system_keyring.c ret = -ENOKEY; ENOKEY 247 certs/system_keyring.c if (ret == -ENOKEY) ENOKEY 97 crypto/aead.c ret = -ENOKEY; ENOKEY 114 crypto/aead.c ret = -ENOKEY; ENOKEY 297 crypto/af_alg.c nokey = err == -ENOKEY; ENOKEY 408 crypto/ahash.c ret = -ENOKEY; ENOKEY 394 crypto/algif_aead.c err = -ENOKEY; ENOKEY 584 crypto/algif_aead.c return -ENOKEY; ENOKEY 311 crypto/algif_hash.c err = -ENOKEY; ENOKEY 458 crypto/algif_hash.c return -ENOKEY; ENOKEY 225 crypto/algif_skcipher.c err = -ENOKEY; ENOKEY 374 crypto/algif_skcipher.c return -ENOKEY; ENOKEY 97 crypto/asymmetric_keys/asymmetric_type.c return ERR_PTR(-ENOKEY); ENOKEY 43 crypto/asymmetric_keys/pkcs7_trust.c return -ENOKEY; ENOKEY 70 crypto/asymmetric_keys/pkcs7_trust.c return -ENOKEY; ENOKEY 92 crypto/asymmetric_keys/pkcs7_trust.c if (PTR_ERR(key) != -ENOKEY) ENOKEY 108 crypto/asymmetric_keys/pkcs7_trust.c if (PTR_ERR(key) != -ENOKEY) ENOKEY 112 crypto/asymmetric_keys/pkcs7_trust.c return -ENOKEY; ENOKEY 163 crypto/asymmetric_keys/pkcs7_trust.c int cached_ret = -ENOKEY; ENOKEY 172 crypto/asymmetric_keys/pkcs7_trust.c case -ENOKEY: ENOKEY 175 crypto/asymmetric_keys/pkcs7_trust.c if (cached_ret == -ENOKEY) ENOKEY 82 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 91 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 101 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 104 crypto/asymmetric_keys/restrict.c ret = -ENOKEY; ENOKEY 130 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 135 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 144 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 202 crypto/asymmetric_keys/restrict.c return -ENOKEY; ENOKEY 26 crypto/des_generic.c if (err == -ENOKEY) { ENOKEY 61 crypto/des_generic.c if (err == -ENOKEY) { ENOKEY 271 crypto/poly1305_generic.c return -ENOKEY; ENOKEY 201 crypto/shash.c return -ENOKEY; ENOKEY 853 crypto/skcipher.c ret = -ENOKEY; ENOKEY 870 crypto/skcipher.c ret = -ENOKEY; ENOKEY 3300 drivers/md/dm-integrity.c return -ENOKEY; ENOKEY 116 drivers/md/dm-verity-verify-sig.c return -ENOKEY; ENOKEY 596 drivers/net/ieee802154/ca8210.c return -ENOKEY; ENOKEY 1387 drivers/net/wireless/broadcom/b43/dma.c if (unlikely(err == -ENOKEY)) { ENOKEY 539 drivers/net/wireless/broadcom/b43/pio.c if (unlikely(err == -ENOKEY)) { ENOKEY 308 drivers/net/wireless/broadcom/b43/xmit.c return -ENOKEY; ENOKEY 1098 drivers/net/wireless/broadcom/b43legacy/dma.c if (unlikely(err == -ENOKEY)) { ENOKEY 246 drivers/net/wireless/broadcom/b43legacy/pio.c if (unlikely(err == -ENOKEY)) { ENOKEY 253 drivers/net/wireless/broadcom/b43legacy/xmit.c return -ENOKEY; ENOKEY 261 drivers/nfc/nxp-nci/firmware.c return -ENOKEY; ENOKEY 451 drivers/nfc/pn544/i2c.c return -ENOKEY; ENOKEY 60 drivers/nvdimm/security.c if (PTR_ERR(key) == -ENOKEY) ENOKEY 264 drivers/nvdimm/security.c return -ENOKEY; ENOKEY 299 drivers/nvdimm/security.c return -ENOKEY; ENOKEY 305 drivers/nvdimm/security.c return -ENOKEY; ENOKEY 355 drivers/nvdimm/security.c return -ENOKEY; ENOKEY 394 drivers/nvdimm/security.c return -ENOKEY; ENOKEY 220 drivers/ras/cec.c return -ENOKEY; ENOKEY 229 drivers/ras/cec.c return -ENOKEY; ENOKEY 1321 drivers/s390/char/tape_3590.c return tape_3590_erp_basic(device, request, irb, -ENOKEY); ENOKEY 513 drivers/thunderbolt/icm.c return -ENOKEY; ENOKEY 1066 drivers/thunderbolt/icm.c return -ENOKEY; ENOKEY 33 fs/afs/security.c if (PTR_ERR(key) != -ENOKEY) { ENOKEY 62 fs/afs/security.c if (PTR_ERR(key) != -ENOKEY) { ENOKEY 363 fs/afs/write.c int ret = -ENOKEY, ret2; ENOKEY 387 fs/afs/write.c if (ret == -ENOKEY) ENOKEY 430 fs/afs/write.c case -ENOKEY: ENOKEY 574 fs/afs/write.c case -ENOKEY: ENOKEY 354 fs/crypto/fname.c return -ENOKEY; ENOKEY 63 fs/crypto/hooks.c return -ENOKEY; ENOKEY 89 fs/crypto/hooks.c return -ENOKEY; ENOKEY 144 fs/crypto/hooks.c return -ENOKEY; ENOKEY 145 fs/crypto/keyring.c keyref = ERR_PTR(-ENOKEY); ENOKEY 236 fs/crypto/keyring.c return ERR_PTR(-ENOKEY); /* No keyring yet, so no keys yet. */ ENOKEY 393 fs/crypto/keyring.c if (mk_user != ERR_PTR(-ENOKEY)) { ENOKEY 438 fs/crypto/keyring.c if (err != -ENOKEY) ENOKEY 607 fs/crypto/keyring.c if (err == -ENOKEY && capable(CAP_FOWNER)) ENOKEY 915 fs/crypto/keyring.c if (key != ERR_PTR(-ENOKEY)) ENOKEY 940 fs/crypto/keyring.c } else if (mk_user != ERR_PTR(-ENOKEY)) { ENOKEY 322 fs/crypto/keysetup.c if (key != ERR_PTR(-ENOKEY) || ENOKEY 340 fs/crypto/keysetup.c err = -ENOKEY; ENOKEY 356 fs/crypto/keysetup.c err = -ENOKEY; ENOKEY 522 fs/crypto/keysetup.c if (res == -ENOKEY) ENOKEY 141 fs/crypto/keysetup_v1.c return ERR_PTR(-ENOKEY); ENOKEY 328 fs/crypto/keysetup_v1.c if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { ENOKEY 483 fs/crypto/policy.c return -ENOKEY; ENOKEY 106 fs/ecryptfs/ecryptfs_kernel.h return ERR_PTR(-ENOKEY); ENOKEY 34 fs/ecryptfs/keystore.c case -ENOKEY: ENOKEY 124 fs/ext4/dir.c if (err && err != -ENOKEY) ENOKEY 779 fs/ext4/ialloc.c return ERR_PTR(-ENOKEY); ENOKEY 989 fs/f2fs/dir.c if (err && err != -ENOKEY) ENOKEY 589 fs/nfs/nfs4idmap.c int ret = -ENOKEY; ENOKEY 638 fs/nfs/nfs4idmap.c int ret = -ENOKEY; ENOKEY 674 fs/nfs/nfs4idmap.c int ret = -ENOKEY; ENOKEY 697 fs/nfs/nfs4idmap.c ret = -ENOKEY; ENOKEY 1920 fs/nfs/nfs4state.c status = -ENOKEY; ENOKEY 814 fs/nfsd/nfsproc.c { nfserr_perm, -ENOKEY }, ENOKEY 306 fs/ubifs/auth.c err = -ENOKEY; ENOKEY 517 fs/ubifs/dir.c if (err && err != -ENOKEY) ENOKEY 594 fs/ubifs/sb.c return -ENOKEY; ENOKEY 77 fs/verity/signature.c if (err == -ENOKEY) ENOKEY 489 include/crypto/hash.h return -ENOKEY; ENOKEY 510 include/crypto/hash.h return -ENOKEY; ENOKEY 879 include/crypto/hash.h return -ENOKEY; ENOKEY 901 include/crypto/hash.h return -ENOKEY; ENOKEY 32 include/crypto/internal/des.h if (err == -ENOKEY) { ENOKEY 62 include/crypto/internal/des.h int ret = fips_enabled ? -EINVAL : -ENOKEY; ENOKEY 582 include/linux/fscrypt.h return -ENOKEY; ENOKEY 186 include/linux/key-type.h return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey); ENOKEY 203 kernel/kexec_file.c case -ENOKEY: ENOKEY 2881 kernel/module.c case -ENOKEY: ENOKEY 704 lib/crypto/des.c return des_ekey(ctx->expkey, key) ? 0 : -ENOKEY; ENOKEY 833 lib/crypto/des.c if (err && err != -ENOKEY) ENOKEY 332 net/ceph/ceph_common.c case -ENOKEY: ENOKEY 735 net/mac802154/llsec.c rc = -ENOKEY; ENOKEY 1004 net/mac802154/llsec.c err = -ENOKEY; ENOKEY 67 security/integrity/digsig_asymmetric.c return ERR_PTR(-ENOKEY); ENOKEY 84 security/integrity/evm/evm_crypto.c return ERR_PTR(-ENOKEY); ENOKEY 380 security/integrity/ima/ima_appraise.c rc == -ENOKEY)) ENOKEY 26 security/keys/dh.c ret = -ENOKEY; ENOKEY 865 security/keys/encrypted-keys/encrypted.c return -ENOKEY; ENOKEY 676 security/keys/key.c key = ERR_PTR(-ENOKEY); ENOKEY 711 security/keys/key.c ktype = ERR_PTR(-ENOKEY); ENOKEY 766 security/keys/keyctl.c ret = -ENOKEY; ENOKEY 833 security/keys/keyctl.c ret = -ENOKEY; ENOKEY 1133 security/keys/keyctl.c return -ENOKEY; ENOKEY 1307 security/keys/keyctl.c return keyctl_reject_key(id, timeout, ENOKEY, ringid); ENOKEY 1181 security/keys/keyring.c keyring = ERR_PTR(-ENOKEY); ENOKEY 91 security/keys/permission.c return -ENOKEY; ENOKEY 448 security/keys/process_keys.c case -ENOKEY: /* negative key */ ENOKEY 469 security/keys/process_keys.c case -ENOKEY: /* negative key */ ENOKEY 491 security/keys/process_keys.c case -ENOKEY: /* negative key */ ENOKEY 513 security/keys/process_keys.c case -ENOKEY: /* negative key */ ENOKEY 574 security/keys/process_keys.c if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) ENOKEY 575 security/keys/process_keys.c key_ref = ERR_PTR(-ENOKEY); ENOKEY 627 security/keys/process_keys.c key_ref = ERR_PTR(-ENOKEY); ENOKEY 868 security/keys/process_keys.c if (PTR_ERR(keyring) == -ENOKEY) { ENOKEY 200 security/keys/request_key.c ret = -ENOKEY; ENOKEY 633 security/keys/request_key.c key = ERR_PTR(-ENOKEY); ENOKEY 796 security/keys/request_key.c key = ERR_PTR(-ENOKEY); ENOKEY 271 security/keys/request_key_auth.c authkey = ERR_PTR(-ENOKEY); ENOKEY 1078 security/keys/trusted.c return -ENOKEY;