atfm = crypto_alloc_ahash(driver, type, mask);
        if (IS_ERR(atfm)) {
                if (PTR_ERR(atfm) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                pr_err("alg: hash: failed to allocate transform for %s: %ld\n",
                       driver, PTR_ERR(atfm));
                return PTR_ERR(atfm);
        tfm = crypto_alloc_aead(driver, type, mask);
        if (IS_ERR(tfm)) {
                if (PTR_ERR(tfm) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                pr_err("alg: aead: failed to allocate transform for %s: %ld\n",
                       driver, PTR_ERR(tfm));
                return PTR_ERR(tfm);
        tfm = crypto_alloc_skcipher(driver, type, mask);
        if (IS_ERR(tfm)) {
                if (PTR_ERR(tfm) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                pr_err("alg: skcipher: failed to allocate transform for %s: %ld\n",
                       driver, PTR_ERR(tfm));
                return PTR_ERR(tfm);
        tfm = crypto_alloc_cipher(driver, type, mask);
        if (IS_ERR(tfm)) {
                if (PTR_ERR(tfm) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                printk(KERN_ERR "alg: cipher: Failed to load transform for "
                       "%s: %ld\n", driver, PTR_ERR(tfm));
                return PTR_ERR(tfm);
                acomp = crypto_alloc_acomp(driver, type, mask);
                if (IS_ERR(acomp)) {
                        if (PTR_ERR(acomp) == -ENOENT)
-                               return -ENOENT;
+                               return 0;
                        pr_err("alg: acomp: Failed to load transform for %s: %ld\n",
                               driver, PTR_ERR(acomp));
                        return PTR_ERR(acomp);
                comp = crypto_alloc_comp(driver, type, mask);
                if (IS_ERR(comp)) {
                        if (PTR_ERR(comp) == -ENOENT)
-                               return -ENOENT;
+                               return 0;
                        pr_err("alg: comp: Failed to load transform for %s: %ld\n",
                               driver, PTR_ERR(comp));
                        return PTR_ERR(comp);
        rng = crypto_alloc_rng(driver, type, mask);
        if (IS_ERR(rng)) {
                if (PTR_ERR(rng) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                printk(KERN_ERR "alg: cprng: Failed to load transform for %s: "
                       "%ld\n", driver, PTR_ERR(rng));
                return PTR_ERR(rng);
 
        drng = crypto_alloc_rng(driver, type, mask);
        if (IS_ERR(drng)) {
+               kfree_sensitive(buf);
                if (PTR_ERR(drng) == -ENOENT)
-                       goto out_no_rng;
+                       return 0;
                printk(KERN_ERR "alg: drbg: could not allocate DRNG handle for "
                       "%s\n", driver);
-out_no_rng:
-               kfree_sensitive(buf);
                return PTR_ERR(drng);
        }
 
        tfm = crypto_alloc_kpp(driver, type, mask);
        if (IS_ERR(tfm)) {
                if (PTR_ERR(tfm) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                pr_err("alg: kpp: Failed to load tfm for %s: %ld\n",
                       driver, PTR_ERR(tfm));
                return PTR_ERR(tfm);
        tfm = crypto_alloc_akcipher(driver, type, mask);
        if (IS_ERR(tfm)) {
                if (PTR_ERR(tfm) == -ENOENT)
-                       return -ENOENT;
+                       return 0;
                pr_err("alg: akcipher: Failed to load tfm for %s: %ld\n",
                       driver, PTR_ERR(tfm));
                return PTR_ERR(tfm);