/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | restrict.c | 64 * Returns 0 if the new certificate was accepted, -ENOKEY if we couldn't find a 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 121 * Returns 0 if the new certificate was accepted, -ENOKEY if the 140 return -ENOKEY; in restrict_link_by_ca() 142 return -ENOKEY; in restrict_link_by_ca() 146 return -ENOKEY; in restrict_link_by_ca() 162 * Returns 0 if the new certificate was accepted, -ENOKEY i [all...] |
H A D | pkcs7_trust.c | 42 kleave(" = -ENOKEY [cached]"); in pkcs7_validate_trust_one() 43 return -ENOKEY; in pkcs7_validate_trust_one() 69 kleave(" = -ENOKEY [unknown self-signed]"); in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 111 kleave(" = -ENOKEY [no backref]"); in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 153 * (*) -ENOKEY if we couldn't find a match for any of the signature chains in 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() [all...] |
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | pkcs7_trust.c | 42 kleave(" = -ENOKEY [cached]"); in pkcs7_validate_trust_one() 43 return -ENOKEY; in pkcs7_validate_trust_one() 69 kleave(" = -ENOKEY [unknown self-signed]"); in pkcs7_validate_trust_one() 70 return -ENOKEY; in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 111 kleave(" = -ENOKEY [no backref]"); in pkcs7_validate_trust_one() 112 return -ENOKEY; in pkcs7_validate_trust_one() 153 * (*) -ENOKEY if we couldn't find a match for any of the signature chains in 163 int cached_ret = -ENOKEY; in pkcs7_validate_trust() [all...] |
H A D | restrict.c | 64 * Returns 0 if the new certificate was accepted, -ENOKEY if we couldn't find a 82 return -ENOKEY; in restrict_link_by_signature() 91 return -ENOKEY; in restrict_link_by_signature() 101 return -ENOKEY; in restrict_link_by_signature() 104 ret = -ENOKEY; in restrict_link_by_signature() 130 return -ENOKEY; in key_or_keyring_common() 135 return -ENOKEY; in key_or_keyring_common() 144 return -ENOKEY; in key_or_keyring_common() 202 return -ENOKEY; in key_or_keyring_common() 224 * Returns 0 if the new certificate was accepted, -ENOKEY i [all...] |
/kernel/linux/linux-5.10/security/keys/ |
H A D | process_keys.c | 416 * successful, -EAGAIN if we didn't find any matching key or -ENOKEY if we only 428 /* we want to return -EAGAIN or -ENOKEY if any of the keyrings were in search_cred_keyrings_rcu() 433 * in terms of priority: success > -ENOKEY > -EAGAIN > other error in search_cred_keyrings_rcu() 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() [all...] |
/kernel/linux/linux-6.6/security/keys/ |
H A D | process_keys.c | 416 * successful, -EAGAIN if we didn't find any matching key or -ENOKEY if we only 428 /* we want to return -EAGAIN or -ENOKEY if any of the keyrings were in search_cred_keyrings_rcu() 433 * in terms of priority: success > -ENOKEY > -EAGAIN > other error in search_cred_keyrings_rcu() 448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu() 574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu() 575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu() [all...] |
/kernel/linux/linux-5.10/certs/ |
H A D | system_keyring.c | 197 ret = -ENOKEY; in verify_pkcs7_message_sig() 203 if (ret != -ENOKEY) { in verify_pkcs7_message_sig() 210 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
/kernel/linux/linux-5.10/include/crypto/internal/ |
H A D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
/kernel/linux/linux-6.6/include/crypto/internal/ |
H A D | des.h | 32 if (err == -ENOKEY) { in crypto_des_verify_key() 58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
|
/kernel/linux/linux-5.10/drivers/nvdimm/ |
H A D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 264 return -ENOKEY; in security_disable() 299 return -ENOKEY; in security_update() 305 return -ENOKEY; in security_update() 355 return -ENOKEY; in security_erase() 389 return -ENOKEY; in security_overwrite()
|
/kernel/linux/linux-5.10/fs/crypto/ |
H A D | hooks.c | 28 * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code 63 return -ENOKEY; in __fscrypt_prepare_link() 89 return -ENOKEY; in __fscrypt_prepare_rename() 160 err = -ENOKEY; in fscrypt_prepare_setflags() 187 * -ENOKEY if the encryption key is missing, or another -errno code if a problem 249 return -ENOKEY; in __fscrypt_encrypt_symlink()
|
H A D | keyring.c | 341 * Returns ERR_PTR(-ENOKEY) if not found. 359 keyref = ERR_PTR(-ENOKEY); in find_master_key_user() 393 * Returns 0 if removed, -ENOKEY if not found, or another -errno code. 470 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 771 * (returns -ENOKEY if not). This is needed to prevent a user from encrypting 783 * Return: 0 if the key is added, -ENOKEY if it isn't, or another -errno code 798 err = -ENOKEY; in fscrypt_verify_key_added() 812 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 997 return -ENOKEY; in do_remove_key() 1025 err = -ENOKEY; in do_remove_key() [all...] |
H A D | keysetup.c | 446 return -ENOKEY; in setup_file_encryption_key() 460 err = -ENOKEY; in setup_file_encryption_key() 465 err = -ENOKEY; in setup_file_encryption_key() 630 if (res == -ENOKEY) in fscrypt_get_encryption_info() 654 * Return: 0 on success, -ENOKEY if the encryption key is missing, or another
|
/kernel/linux/linux-6.6/fs/crypto/ |
H A D | hooks.c | 28 * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code 56 return -ENOKEY; in __fscrypt_prepare_link() 75 return -ENOKEY; in __fscrypt_prepare_rename() 193 err = -ENOKEY; in fscrypt_prepare_setflags() 220 * -ENOKEY if the encryption key is missing, or another -errno code if a problem 282 return -ENOKEY; in __fscrypt_encrypt_symlink()
|
H A D | keyring.c | 342 * Returns ERR_PTR(-ENOKEY) if not found. 360 keyref = ERR_PTR(-ENOKEY); in find_master_key_user() 394 * Returns 0 if removed, -ENOKEY if not found, or another -errno code. 470 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key() 803 * (returns -ENOKEY if not). This is needed to prevent a user from encrypting 815 * Return: 0 if the key is added, -ENOKEY if it isn't, or another -errno code 830 err = -ENOKEY; in fscrypt_verify_key_added() 844 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added() 1029 return -ENOKEY; in do_remove_key() 1057 err = -ENOKEY; in do_remove_key() [all...] |
H A D | keysetup.c | 475 return -ENOKEY; in setup_file_encryption_key() 489 err = -ENOKEY; in setup_file_encryption_key() 494 err = -ENOKEY; in setup_file_encryption_key() 675 if (res == -ENOKEY) in fscrypt_get_encryption_info() 698 * Return: 0 on success, -ENOKEY if the encryption key is missing, or another
|
/kernel/linux/linux-6.6/certs/ |
H A D | system_keyring.c | 334 if (ret != -ENOKEY) { in verify_pkcs7_message_sig() 354 ret = -ENOKEY; in verify_pkcs7_message_sig() 361 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 58 if (err == -ENOKEY) { in des3_ede_setkey()
|
/kernel/linux/linux-5.10/fs/verity/ |
H A D | signature.c | 107 * error, usually ENOKEY. It could also be EBADMSG if the in fsverity_verify_signature() 109 * distinguish. So, just skip to ENOKEY to avoid the attack in fsverity_verify_signature() 115 return -ENOKEY; in fsverity_verify_signature() 141 if (err == -ENOKEY) in fsverity_verify_signature()
|
/kernel/linux/linux-6.6/fs/verity/ |
H A D | signature.c | 108 * error, usually ENOKEY. It could also be EBADMSG if the in fsverity_verify_signature() 110 * distinguish. So, just skip to ENOKEY to avoid the attack in fsverity_verify_signature() 116 return -ENOKEY; in fsverity_verify_signature() 141 if (err == -ENOKEY) in fsverity_verify_signature()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | des_generic.c | 26 if (err == -ENOKEY) { in des_setkey() 58 if (err == -ENOKEY) { in des3_ede_setkey()
|
/kernel/linux/linux-6.6/drivers/nvdimm/ |
H A D | security.c | 60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key() 276 return -ENOKEY; in security_disable() 320 return -ENOKEY; in security_update() 326 return -ENOKEY; in security_update() 376 return -ENOKEY; in security_erase() 412 return -ENOKEY; in security_overwrite()
|
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | cert_store.c | 307 return ERR_PTR(-ENOKEY); in get_user_session_keyring() 474 rc = -ENOKEY; in create_key_from_vce() 500 return -ENOKEY; in get_vcssb() 547 rc = -ENOKEY; in get_sevcb() 607 * could be created (i.e. VCEs were invalid) return -ENOKEY. 632 return -ENOKEY; in add_certificates_to_keyring()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | hash.h | 512 return -ENOKEY; in crypto_ahash_import() 533 return -ENOKEY; in crypto_ahash_init() 923 return -ENOKEY; in crypto_shash_import() 945 return -ENOKEY; in crypto_shash_init()
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | hash.h | 543 return -ENOKEY; in crypto_ahash_import() 564 return -ENOKEY; in crypto_ahash_init() 977 return -ENOKEY; in crypto_shash_import() 999 return -ENOKEY; in crypto_shash_init()
|