/openbmc/linux/crypto/asymmetric_keys/ |
H A D | restrict.c | 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 140 return -ENOKEY; in restrict_link_by_ca() 142 return -ENOKEY; in restrict_link_by_ca() 146 return -ENOKEY; in restrict_link_by_ca() 183 return -ENOKEY; in restrict_link_by_digsig() 186 return -ENOKEY; in restrict_link_by_digsig() 189 return -ENOKEY; in restrict_link_by_digsig() [all …]
|
H A D | pkcs7_trust.c | 43 return -ENOKEY; in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 172 case -ENOKEY: in pkcs7_validate_trust() 175 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
/openbmc/linux/security/keys/ |
H A D | process_keys.c | 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() 627 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 867 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
/openbmc/linux/fs/verity/ |
H A D | signature.c | 78 return -ENOKEY; in fsverity_verify_signature() 96 if (err == -ENOKEY) in fsverity_verify_signature()
|
/openbmc/linux/fs/crypto/ |
H A D | hooks.c | 56 return -ENOKEY; in __fscrypt_prepare_link() 75 return -ENOKEY; in __fscrypt_prepare_rename() 193 err = -ENOKEY; in fscrypt_prepare_setflags() 282 return -ENOKEY; in __fscrypt_encrypt_symlink()
|
H A D | keyring.c | 360 keyref = ERR_PTR(-ENOKEY); in find_master_key_user() 470 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 830 err = -ENOKEY; in fscrypt_verify_key_added() 844 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 1029 return -ENOKEY; in do_remove_key() 1057 err = -ENOKEY; in do_remove_key() 1171 } else if (mk_user != ERR_PTR(-ENOKEY)) { in fscrypt_ioctl_get_key_status()
|
H A D | keysetup.c | 475 return -ENOKEY; in setup_file_encryption_key() 489 err = -ENOKEY; in setup_file_encryption_key() 494 err = -ENOKEY; in setup_file_encryption_key() 675 if (res == -ENOKEY) in fscrypt_get_encryption_info()
|
H A D | keysetup_v1.c | 141 return ERR_PTR(-ENOKEY); in find_and_lock_process_key() 309 if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
/openbmc/linux/include/crypto/internal/ |
H A D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
/openbmc/linux/drivers/nvdimm/ |
H A D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 276 return -ENOKEY; in security_disable() 320 return -ENOKEY; in security_update() 326 return -ENOKEY; in security_update() 376 return -ENOKEY; in security_erase() 412 return -ENOKEY; in security_overwrite()
|
/openbmc/linux/certs/ |
H A D | system_keyring.c | 334 if (ret != -ENOKEY) { in verify_pkcs7_message_sig() 354 ret = -ENOKEY; in verify_pkcs7_message_sig() 361 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
/openbmc/linux/crypto/ |
H A D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 58 if (err == -ENOKEY) { in des3_ede_setkey()
|
/openbmc/linux/include/crypto/ |
H A D | hash.h | 543 return -ENOKEY; in crypto_ahash_import() 564 return -ENOKEY; in crypto_ahash_init() 977 return -ENOKEY; in crypto_shash_import() 999 return -ENOKEY; in crypto_shash_init()
|
/openbmc/linux/arch/s390/kernel/ |
H A D | cert_store.c | 307 return ERR_PTR(-ENOKEY); in get_user_session_keyring() 474 rc = -ENOKEY; in create_key_from_vce() 500 return -ENOKEY; in get_vcssb() 547 rc = -ENOKEY; in get_sevcb() 632 return -ENOKEY; in add_certificates_to_keyring()
|
/openbmc/qemu/linux-user/ |
H A D | errnos.c.inc | 90 #ifdef ENOKEY 91 E(ENOKEY)
|
/openbmc/linux/tools/include/uapi/asm-generic/ |
H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/openbmc/linux/include/uapi/asm-generic/ |
H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/openbmc/linux/arch/sparc/include/uapi/asm/ |
H A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/openbmc/linux/tools/arch/sparc/include/uapi/asm/ |
H A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/openbmc/linux/tools/arch/alpha/include/uapi/asm/ |
H A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/openbmc/linux/tools/arch/parisc/include/uapi/asm/ |
H A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/openbmc/linux/tools/arch/mips/include/uapi/asm/ |
H A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/openbmc/linux/arch/alpha/include/uapi/asm/ |
H A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/openbmc/linux/arch/parisc/include/uapi/asm/ |
H A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/openbmc/linux/arch/mips/include/uapi/asm/ |
H A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|