/linux-master/crypto/asymmetric_keys/ |
H A D | restrict.c | 64 * Returns 0 if the new certificate was accepted, -ENOKEY if we couldn't find a 82 return -ENOKEY; 91 return -ENOKEY; 101 return -ENOKEY; 104 ret = -ENOKEY; 108 ret = -ENOKEY; 125 * Returns 0 if the new certificate was accepted, -ENOKEY if the 144 return -ENOKEY; 146 return -ENOKEY; 150 return -ENOKEY; [all...] |
H A D | pkcs7_trust.c | 42 kleave(" = -ENOKEY [cached]"); 43 return -ENOKEY; 69 kleave(" = -ENOKEY [unknown self-signed]"); 70 return -ENOKEY; 92 if (PTR_ERR(key) != -ENOKEY) 108 if (PTR_ERR(key) != -ENOKEY) 111 kleave(" = -ENOKEY [no backref]"); 112 return -ENOKEY; 153 * (*) -ENOKEY if we couldn't find a match for any of the signature chains in 163 int cached_ret = -ENOKEY; [all...] |
/linux-master/fs/verity/ |
H A D | signature.c | 70 * error, usually ENOKEY. It could also be EBADMSG if the 72 * distinguish. So, just skip to ENOKEY to avoid the attack 78 return -ENOKEY; 96 if (err == -ENOKEY)
|
/linux-master/include/crypto/internal/ |
H A D | des.h | 32 if (err == -ENOKEY) { 58 int ret = fips_enabled ? -EINVAL : -ENOKEY;
|
/linux-master/crypto/ |
H A D | des_generic.c | 26 if (err == -ENOKEY) { 58 if (err == -ENOKEY) {
|
/linux-master/arch/alpha/include/uapi/asm/ |
H A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/linux-master/arch/mips/include/uapi/asm/ |
H A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/linux-master/arch/sparc/include/uapi/asm/ |
H A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/linux-master/tools/arch/alpha/include/uapi/asm/ |
H A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
/linux-master/tools/arch/mips/include/uapi/asm/ |
H A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
/linux-master/tools/arch/sparc/include/uapi/asm/ |
H A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
/linux-master/include/uapi/asm-generic/ |
H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/linux-master/tools/include/uapi/asm-generic/ |
H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
/linux-master/security/keys/ |
H A D | permission.c | 98 * Check that a key is valid, returning 0 if the key is okay, -ENOKEY if the 108 return -ENOKEY;
|
H A D | process_keys.c | 416 * successful, -EAGAIN if we didn't find any matching key or -ENOKEY if we only 428 /* we want to return -EAGAIN or -ENOKEY if any of the keyrings were 433 * in terms of priority: success > -ENOKEY > -EAGAIN > other error 448 case -ENOKEY: /* negative key */ 469 case -ENOKEY: /* negative key */ 491 case -ENOKEY: /* negative key */ 513 case -ENOKEY: /* negative key */ 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) 575 key_ref = ERR_PTR(-ENOKEY); [all...] |
/linux-master/arch/parisc/include/uapi/asm/ |
H A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/linux-master/tools/arch/parisc/include/uapi/asm/ |
H A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
/linux-master/fs/afs/ |
H A D | write.c | 40 int ret = -ENOKEY, ret2; 59 if (ret == -ENOKEY) 100 int ret = -ENOKEY; 142 case -ENOKEY:
|
/linux-master/fs/crypto/ |
H A D | hooks.c | 28 * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code 56 return -ENOKEY; 75 return -ENOKEY; 188 err = -ENOKEY; 215 * -ENOKEY if the encryption key is missing, or another -errno code if a problem 277 return -ENOKEY;
|
/linux-master/kernel/module/ |
H A D | signing.c | 106 case -ENOKEY:
|
/linux-master/include/keys/ |
H A D | system_keyring.h | 106 return -ENOKEY;
|
/linux-master/certs/ |
H A D | system_keyring.c | 334 if (ret != -ENOKEY) { 354 ret = -ENOKEY; 361 if (ret == -ENOKEY)
|
/linux-master/drivers/nvdimm/ |
H A D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) 276 return -ENOKEY; 320 return -ENOKEY; 326 return -ENOKEY; 376 return -ENOKEY; 412 return -ENOKEY;
|
/linux-master/drivers/md/ |
H A D | dm-verity-verify-sig.c | 116 return -ENOKEY;
|
/linux-master/include/linux/ |
H A D | key-type.h | 188 return key_reject_and_link(key, timeout, ENOKEY, keyring, authkey);
|