Home
last modified time | relevance | path

Searched refs:ENOKEY (Results 1 - 25 of 208) sorted by relevance

123456789

/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Drestrict.c64 * Returns 0 if the new certificate was accepted, -ENOKEY if we couldn't find a
82 return -ENOKEY; in restrict_link_by_signature()
91 return -ENOKEY; in restrict_link_by_signature()
101 return -ENOKEY; in restrict_link_by_signature()
104 ret = -ENOKEY; in restrict_link_by_signature()
121 * Returns 0 if the new certificate was accepted, -ENOKEY if the
140 return -ENOKEY; in restrict_link_by_ca()
142 return -ENOKEY; in restrict_link_by_ca()
146 return -ENOKEY; in restrict_link_by_ca()
162 * Returns 0 if the new certificate was accepted, -ENOKEY i
[all...]
H A Dpkcs7_trust.c42 kleave(" = -ENOKEY [cached]"); in pkcs7_validate_trust_one()
43 return -ENOKEY; in pkcs7_validate_trust_one()
69 kleave(" = -ENOKEY [unknown self-signed]"); in pkcs7_validate_trust_one()
70 return -ENOKEY; in pkcs7_validate_trust_one()
92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
111 kleave(" = -ENOKEY [no backref]"); in pkcs7_validate_trust_one()
112 return -ENOKEY; in pkcs7_validate_trust_one()
153 * (*) -ENOKEY if we couldn't find a match for any of the signature chains in
163 int cached_ret = -ENOKEY; in pkcs7_validate_trust()
[all...]
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dpkcs7_trust.c42 kleave(" = -ENOKEY [cached]"); in pkcs7_validate_trust_one()
43 return -ENOKEY; in pkcs7_validate_trust_one()
69 kleave(" = -ENOKEY [unknown self-signed]"); in pkcs7_validate_trust_one()
70 return -ENOKEY; in pkcs7_validate_trust_one()
92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one()
111 kleave(" = -ENOKEY [no backref]"); in pkcs7_validate_trust_one()
112 return -ENOKEY; in pkcs7_validate_trust_one()
153 * (*) -ENOKEY if we couldn't find a match for any of the signature chains in
163 int cached_ret = -ENOKEY; in pkcs7_validate_trust()
[all...]
H A Drestrict.c64 * Returns 0 if the new certificate was accepted, -ENOKEY if we couldn't find a
82 return -ENOKEY; in restrict_link_by_signature()
91 return -ENOKEY; in restrict_link_by_signature()
101 return -ENOKEY; in restrict_link_by_signature()
104 ret = -ENOKEY; in restrict_link_by_signature()
130 return -ENOKEY; in key_or_keyring_common()
135 return -ENOKEY; in key_or_keyring_common()
144 return -ENOKEY; in key_or_keyring_common()
202 return -ENOKEY; in key_or_keyring_common()
224 * Returns 0 if the new certificate was accepted, -ENOKEY i
[all...]
/kernel/linux/linux-5.10/security/keys/
H A Dprocess_keys.c416 * successful, -EAGAIN if we didn't find any matching key or -ENOKEY if we only
428 /* we want to return -EAGAIN or -ENOKEY if any of the keyrings were in search_cred_keyrings_rcu()
433 * in terms of priority: success > -ENOKEY > -EAGAIN > other error in search_cred_keyrings_rcu()
448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu()
575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu()
[all...]
/kernel/linux/linux-6.6/security/keys/
H A Dprocess_keys.c416 * successful, -EAGAIN if we didn't find any matching key or -ENOKEY if we only
428 /* we want to return -EAGAIN or -ENOKEY if any of the keyrings were in search_cred_keyrings_rcu()
433 * in terms of priority: success > -ENOKEY > -EAGAIN > other error in search_cred_keyrings_rcu()
448 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
469 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
491 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
513 case -ENOKEY: /* negative key */ in search_cred_keyrings_rcu()
574 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings_rcu()
575 key_ref = ERR_PTR(-ENOKEY); in search_process_keyrings_rcu()
[all...]
/kernel/linux/linux-5.10/certs/
H A Dsystem_keyring.c197 ret = -ENOKEY; in verify_pkcs7_message_sig()
203 if (ret != -ENOKEY) { in verify_pkcs7_message_sig()
210 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
/kernel/linux/linux-5.10/include/crypto/internal/
H A Ddes.h32 if (err == -ENOKEY) { in crypto_des_verify_key()
58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
/kernel/linux/linux-6.6/include/crypto/internal/
H A Ddes.h32 if (err == -ENOKEY) { in crypto_des_verify_key()
58 int ret = fips_enabled ? -EINVAL : -ENOKEY; in des3_ede_verify_key()
/kernel/linux/linux-5.10/drivers/nvdimm/
H A Dsecurity.c60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key()
264 return -ENOKEY; in security_disable()
299 return -ENOKEY; in security_update()
305 return -ENOKEY; in security_update()
355 return -ENOKEY; in security_erase()
389 return -ENOKEY; in security_overwrite()
/kernel/linux/linux-5.10/fs/crypto/
H A Dhooks.c28 * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code
63 return -ENOKEY; in __fscrypt_prepare_link()
89 return -ENOKEY; in __fscrypt_prepare_rename()
160 err = -ENOKEY; in fscrypt_prepare_setflags()
187 * -ENOKEY if the encryption key is missing, or another -errno code if a problem
249 return -ENOKEY; in __fscrypt_encrypt_symlink()
H A Dkeyring.c341 * Returns ERR_PTR(-ENOKEY) if not found.
359 keyref = ERR_PTR(-ENOKEY); in find_master_key_user()
393 * Returns 0 if removed, -ENOKEY if not found, or another -errno code.
470 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key()
771 * (returns -ENOKEY if not). This is needed to prevent a user from encrypting
783 * Return: 0 if the key is added, -ENOKEY if it isn't, or another -errno code
798 err = -ENOKEY; in fscrypt_verify_key_added()
812 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added()
997 return -ENOKEY; in do_remove_key()
1025 err = -ENOKEY; in do_remove_key()
[all...]
H A Dkeysetup.c446 return -ENOKEY; in setup_file_encryption_key()
460 err = -ENOKEY; in setup_file_encryption_key()
465 err = -ENOKEY; in setup_file_encryption_key()
630 if (res == -ENOKEY) in fscrypt_get_encryption_info()
654 * Return: 0 on success, -ENOKEY if the encryption key is missing, or another
/kernel/linux/linux-6.6/fs/crypto/
H A Dhooks.c28 * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code
56 return -ENOKEY; in __fscrypt_prepare_link()
75 return -ENOKEY; in __fscrypt_prepare_rename()
193 err = -ENOKEY; in fscrypt_prepare_setflags()
220 * -ENOKEY if the encryption key is missing, or another -errno code if a problem
282 return -ENOKEY; in __fscrypt_encrypt_symlink()
H A Dkeyring.c342 * Returns ERR_PTR(-ENOKEY) if not found.
360 keyref = ERR_PTR(-ENOKEY); in find_master_key_user()
394 * Returns 0 if removed, -ENOKEY if not found, or another -errno code.
470 if (mk_user != ERR_PTR(-ENOKEY)) { in add_existing_master_key()
803 * (returns -ENOKEY if not). This is needed to prevent a user from encrypting
815 * Return: 0 if the key is added, -ENOKEY if it isn't, or another -errno code
830 err = -ENOKEY; in fscrypt_verify_key_added()
844 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added()
1029 return -ENOKEY; in do_remove_key()
1057 err = -ENOKEY; in do_remove_key()
[all...]
H A Dkeysetup.c475 return -ENOKEY; in setup_file_encryption_key()
489 err = -ENOKEY; in setup_file_encryption_key()
494 err = -ENOKEY; in setup_file_encryption_key()
675 if (res == -ENOKEY) in fscrypt_get_encryption_info()
698 * Return: 0 on success, -ENOKEY if the encryption key is missing, or another
/kernel/linux/linux-6.6/certs/
H A Dsystem_keyring.c334 if (ret != -ENOKEY) { in verify_pkcs7_message_sig()
354 ret = -ENOKEY; in verify_pkcs7_message_sig()
361 if (ret == -ENOKEY) in verify_pkcs7_message_sig()
/kernel/linux/linux-5.10/crypto/
H A Ddes_generic.c26 if (err == -ENOKEY) { in des_setkey()
58 if (err == -ENOKEY) { in des3_ede_setkey()
/kernel/linux/linux-5.10/fs/verity/
H A Dsignature.c107 * error, usually ENOKEY. It could also be EBADMSG if the in fsverity_verify_signature()
109 * distinguish. So, just skip to ENOKEY to avoid the attack in fsverity_verify_signature()
115 return -ENOKEY; in fsverity_verify_signature()
141 if (err == -ENOKEY) in fsverity_verify_signature()
/kernel/linux/linux-6.6/fs/verity/
H A Dsignature.c108 * error, usually ENOKEY. It could also be EBADMSG if the in fsverity_verify_signature()
110 * distinguish. So, just skip to ENOKEY to avoid the attack in fsverity_verify_signature()
116 return -ENOKEY; in fsverity_verify_signature()
141 if (err == -ENOKEY) in fsverity_verify_signature()
/kernel/linux/linux-6.6/crypto/
H A Ddes_generic.c26 if (err == -ENOKEY) { in des_setkey()
58 if (err == -ENOKEY) { in des3_ede_setkey()
/kernel/linux/linux-6.6/drivers/nvdimm/
H A Dsecurity.c60 if (PTR_ERR(key) == -ENOKEY) in nvdimm_request_key()
276 return -ENOKEY; in security_disable()
320 return -ENOKEY; in security_update()
326 return -ENOKEY; in security_update()
376 return -ENOKEY; in security_erase()
412 return -ENOKEY; in security_overwrite()
/kernel/linux/linux-6.6/arch/s390/kernel/
H A Dcert_store.c307 return ERR_PTR(-ENOKEY); in get_user_session_keyring()
474 rc = -ENOKEY; in create_key_from_vce()
500 return -ENOKEY; in get_vcssb()
547 rc = -ENOKEY; in get_sevcb()
607 * could be created (i.e. VCEs were invalid) return -ENOKEY.
632 return -ENOKEY; in add_certificates_to_keyring()
/kernel/linux/linux-5.10/include/crypto/
H A Dhash.h512 return -ENOKEY; in crypto_ahash_import()
533 return -ENOKEY; in crypto_ahash_init()
923 return -ENOKEY; in crypto_shash_import()
945 return -ENOKEY; in crypto_shash_init()
/kernel/linux/linux-6.6/include/crypto/
H A Dhash.h543 return -ENOKEY; in crypto_ahash_import()
564 return -ENOKEY; in crypto_ahash_init()
977 return -ENOKEY; in crypto_shash_import()
999 return -ENOKEY; in crypto_shash_init()

Completed in 24 milliseconds

123456789