| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_trust.c | 43 return -ENOKEY; in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() 172 case -ENOKEY: in pkcs7_validate_trust() 175 if (cached_ret == -ENOKEY) in pkcs7_validate_trust()
|
| H A D | restrict.c | 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 130 return -ENOKEY; in key_or_keyring_common() 135 return -ENOKEY; in key_or_keyring_common() 144 return -ENOKEY; in key_or_keyring_common() 202 return -ENOKEY; in key_or_keyring_common()
|
| /OK3568_Linux_fs/kernel/security/keys/ |
| H A D | process_keys.c | 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() 627 key_ref = ERR_PTR(-ENOKEY); in lookup_user_key() 866 if (PTR_ERR(keyring) == -ENOKEY) { in join_session_keyring()
|
| /OK3568_Linux_fs/kernel/fs/crypto/ |
| H A D | hooks.c | 56 return -ENOKEY; in __fscrypt_prepare_link() 75 return -ENOKEY; in __fscrypt_prepare_rename() 163 err = -ENOKEY; in fscrypt_prepare_setflags() 252 return -ENOKEY; in __fscrypt_encrypt_symlink()
|
| H A D | keyring.c | 359 keyref = ERR_PTR(-ENOKEY); in find_master_key_user() 470 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 828 err = -ENOKEY; in fscrypt_verify_key_added() 842 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 1027 return -ENOKEY; in do_remove_key() 1055 err = -ENOKEY; in do_remove_key() 1169 } else if (mk_user != ERR_PTR(-ENOKEY)) { in fscrypt_ioctl_get_key_status()
|
| H A D | keysetup.c | 481 return -ENOKEY; in setup_file_encryption_key() 499 err = -ENOKEY; in setup_file_encryption_key() 504 err = -ENOKEY; in setup_file_encryption_key() 688 if (res == -ENOKEY) in fscrypt_get_encryption_info()
|
| H A D | keysetup_v1.c | 141 return ERR_PTR(-ENOKEY); in find_and_lock_process_key() 308 if (key == ERR_PTR(-ENOKEY) && ci->ci_inode->i_sb->s_cop->key_prefix) { in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | system_keyring.c | 197 ret = -ENOKEY; in verify_pkcs7_message_sig() 203 if (ret != -ENOKEY) { in verify_pkcs7_message_sig() 210 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
| /OK3568_Linux_fs/kernel/drivers/nvdimm/ |
| H A D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 264 return -ENOKEY; in security_disable() 299 return -ENOKEY; in security_update() 305 return -ENOKEY; in security_update() 355 return -ENOKEY; in security_erase() 389 return -ENOKEY; in security_overwrite()
|
| /OK3568_Linux_fs/kernel/include/crypto/internal/ |
| H A D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | hash.h | 512 return -ENOKEY; in crypto_ahash_import() 533 return -ENOKEY; in crypto_ahash_init() 923 return -ENOKEY; in crypto_shash_import() 945 return -ENOKEY; in crypto_shash_init()
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 58 if (err == -ENOKEY) { in des3_ede_setkey()
|
| H A D | aead.c | 92 ret = -ENOKEY; in crypto_aead_encrypt() 109 ret = -ENOKEY; in crypto_aead_decrypt()
|
| /OK3568_Linux_fs/kernel/fs/nfs/ |
| H A D | nfs4idmap.c | 588 int ret = -ENOKEY; in nfs_idmap_legacy_upcall() 637 int ret = -ENOKEY; in nfs_idmap_read_and_verify_message() 674 int ret = -ENOKEY; in idmap_pipe_downcall() 698 ret = -ENOKEY; in idmap_pipe_downcall()
|
| /OK3568_Linux_fs/kernel/include/keys/ |
| H A D | system_keyring.h | 63 return -ENOKEY; in is_key_on_revocation_list()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/asm-generic/ |
| H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/include/uapi/asm-generic/ |
| H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/asm-generic/ |
| H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/tools/include/uapi/asm-generic/ |
| H A D | errno.h | 110 #define ENOKEY 126 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/tools/arch/sparc/include/uapi/asm/ |
| H A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/arch/alpha/include/uapi/asm/ |
| H A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/arch/sparc/include/uapi/asm/ |
| H A D | errno.h | 105 #define ENOKEY 128 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/tools/arch/parisc/include/uapi/asm/ |
| H A D | errno.h | 71 #define ENOKEY 184 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/arch/mips/include/uapi/asm/ |
| H A D | errno.h | 114 #define ENOKEY 161 /* Required key not available */ macro
|
| /OK3568_Linux_fs/kernel/tools/arch/alpha/include/uapi/asm/ |
| H A D | errno.h | 115 #define ENOKEY 132 /* Required key not available */ macro
|