EKEYREJECTED
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
ret = -EKEYREJECTED;
-EKEYREJECTED)
return -EKEYREJECTED;
return ERR_PTR(-EKEYREJECTED);
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
ret = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
actual_ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
return -EKEYREJECTED;
if (ret == -EKEYREJECTED) {
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
ret = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED; \
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
if (ret == -ENOKEY || ret == -EKEYREJECTED)
if (ret != -ENOKEY && ret != -EKEYREJECTED)
[MLXFW_FSM_STATE_ERR_REJECTED_KEY_NOT_APPLICABLE] = -EKEYREJECTED,
return -EKEYREJECTED;
return -EKEYREJECTED;
ret = -EKEYREJECTED;
chap->error = -EKEYREJECTED;
chap->error = -EKEYREJECTED;
chap->error = -EKEYREJECTED;
if (status == -EKEYREJECTED || status == -ENOKEY)
rc = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
case -EKEYREJECTED:
case RXKADBADTICKET: return -EKEYREJECTED;
case RXKADUNKNOWNKEY: return -EKEYREJECTED;
case RXKADSEALEDINCON: return -EKEYREJECTED;
case RXKADDATALEN: return -EKEYREJECTED;
case RXKADILLEGALLEVEL: return -EKEYREJECTED;
case RXGK_SEALEDINCON: return -EKEYREJECTED;
case RXGK_NOTAUTH: return -EKEYREJECTED;
case RXGK_BADLEVEL: return -EKEYREJECTED;
case RXGK_BADKEYNO: return -EKEYREJECTED;
case RXGK_NOTRXGK: return -EKEYREJECTED;
case RXGK_UNSUPPORTED: return -EKEYREJECTED;
case RXGK_GSSERROR: return -EKEYREJECTED;
case RXGK_BADTOKEN: return -EKEYREJECTED;
case RXGK_BADQOP: return -EKEYREJECTED;
case RXKADLEVELFAIL: return -EKEYREJECTED;
case RXKADTICKETLEN: return -EKEYREJECTED;
case RXKADNOAUTH: return -EKEYREJECTED;
case RXKADBADKEY: return -EKEYREJECTED;
case -EKEYREJECTED:
case -EKEYREJECTED:
case -EKEYREJECTED:
err = -EKEYREJECTED;
rc = -EKEYREJECTED;
rc = -EKEYREJECTED;
else if (err == -EKEYREJECTED)
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
KUNIT_ASSERT_EQ(test, -EKEYREJECTED,
KUNIT_ASSERT_EQ(test, -EKEYREJECTED,
E(EKEYREJECTED),
ret = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
err = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
RX_INVALID_OPERATION, -EKEYREJECTED);
return -EKEYREJECTED;
ret = -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
ret = rxrpc_abort_conn(conn, skb, RXGK_NOTAUTH, -EKEYREJECTED,
-EKEYREJECTED, rxgk_abort_resp_nopkg);
ret = -EKEYREJECTED;
return -EKEYREJECTED;
return PTR_ERR(gk) == -ESTALE ? -EKEYREJECTED : PTR_ERR(gk);
case -EKEYREJECTED:
return rxrpc_abort_conn(conn, skb, RXGK_BADKEYNO, -EKEYREJECTED,
return rxrpc_abort_conn(conn, skb, RXGK_NOTAUTH, -EKEYREJECTED,
return rxrpc_abort_conn(conn, skb, RXGK_NOTAUTH, -EKEYREJECTED,
-EKEYREJECTED, rxgk_abort_resp_tok_nopkg);
return rxrpc_abort_conn(conn, skb, RXKADNOAUTH, -EKEYREJECTED,
ret = -EKEYREJECTED;
return -EKEYREJECTED;
RX_INVALID_OPERATION, -EKEYREJECTED);
sec->no_key_abort, -EKEYREJECTED);
struct key *key = ERR_PTR(-EKEYREJECTED);
return -EKEYREJECTED;
case -EKEYREJECTED:
return -EKEYREJECTED;
return -EKEYREJECTED;
return -EKEYREJECTED;
return ERR_PTR(-EKEYREJECTED);
if (rc == -ENOKEY || rc == -EKEYREJECTED)
if (fault(KEYREJECT) && ret == -EKEYREJECTED) {
} else if (err == -EKEYREJECTED) {
setsockopt_checked(sk, TCP_AO_INFO, &info, EKEYREJECTED,
if (fault(KEYREJECT) && ret == -EKEYREJECTED)
if (err != -EKEYREJECTED || !expected_to_fail) {
} else if (err == -EKEYREJECTED) {