From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-3.3 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 2957 invoked from network); 7 Nov 2021 14:11:20 -0000 Received: from mother.openwall.net (195.42.179.200) by inbox.vuxu.org with ESMTPUTF8; 7 Nov 2021 14:11:20 -0000 Received: (qmail 30653 invoked by uid 550); 7 Nov 2021 14:11:16 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Reply-To: musl@lists.openwall.com Received: (qmail 32324 invoked from network); 7 Nov 2021 13:28:37 -0000 Date: Sun, 7 Nov 2021 13:28:26 +0000 From: Chris Webb To: musl@lists.openwall.com Message-ID: <20211107132826.GA4277@arachsys.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-06-14) Subject: [musl] [PATCH] add strerror messages for cryptographic-key errno values ENOKEY, EKEYEXPIRED, EKEYREVOKED and EKEYREJECTED messages are taken from the comments in the Linux uapi errno.h, but also match glibc's strerror. These errno values are now commonly returned by mount(2) and therefore passed to strerror() by mount(8) when working with encrypted filesystems. --- src/errno/__strerror.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/src/errno/__strerror.h b/src/errno/__strerror.h index 2d992da5..14925907 100644 --- a/src/errno/__strerror.h +++ b/src/errno/__strerror.h @@ -102,3 +102,7 @@ E(EDQUOT, "Quota exceeded") E(ENOMEDIUM, "No medium found") E(EMEDIUMTYPE, "Wrong medium type") E(EMULTIHOP, "Multihop attempted") +E(ENOKEY, "Required key not available") +E(EKEYEXPIRED, "Key has expired") +E(EKEYREVOKED, "Key has been revoked") +E(EKEYREJECTED, "Key was rejected by service")