Lines Matching defs:packet

99 		ecryptfs_printk(KERN_ERR, "Five-byte packet length not "
104 ecryptfs_printk(KERN_ERR, "Error parsing packet length\n");
117 * @packet_size_length: The number of bytes used to encode the packet
138 "Unsupported packet size: [%zd]\n", size);
145 char **packet, size_t *packet_len)
163 *packet = kmalloc(data_len, GFP_KERNEL);
164 message = *packet;
174 ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
175 "header; cannot generate packet length\n");
185 ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
186 "header; cannot generate packet length\n");
237 ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
286 struct ecryptfs_crypt_stat *crypt_stat, char **packet,
306 *packet = kmalloc(data_len, GFP_KERNEL);
307 message = *packet;
317 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
318 "header; cannot generate packet length\n");
328 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
329 "header; cannot generate packet length\n");
387 ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
608 * write_tag_70_packet - Write encrypted filename (EFN) packet against FNEK
613 * filename encryption key (FNEK) and stores it in a packet to @dest,
665 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
711 printk(KERN_ERR "%s: Error generating tag 70 packet "
712 "header; cannot generate packet length; rc = [%d]\n",
876 * parse_tag_70_packet - Parse and process FNEK-encrypted passphrase packet
881 * in the packet parsed
884 * packet
885 * @max_packet_size: The maximum legal size of the packet to be parsed
915 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
923 printk(KERN_WARNING "%s: Invalid packet tag [0x%.2x]; must be "
933 printk(KERN_WARNING "%s: Error parsing packet length; "
941 printk(KERN_WARNING "%s: max_packet_size is [%zd]; real packet "
1056 printk(KERN_WARNING "%s: Invalid tag 70 packet; could not "
1145 ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n");
1156 ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet "
1164 printk(KERN_ERR "Failed to parse tag 65 packet; rc = [%d]\n",
1207 * @crypt_stat: The cryptographic context to modify based on packet contents
1208 * @data: The raw bytes of the packet.
1211 * end of this list for this packet.
1216 * @packet_size: This function writes the size of the parsed packet
1218 * @max_packet_size: The maximum allowable packet size
1237 * packet tag 1
1240 * Max Tag 1 packet size (max 3 bytes)
1246 * 12 bytes minimum packet size
1249 printk(KERN_ERR "Invalid max packet size; must be >=12\n");
1273 printk(KERN_WARNING "Error parsing packet length; "
1304 printk(KERN_WARNING "Tag 1 packet contains key larger "
1338 * @crypt_stat: The cryptographic context to modify based on packet
1340 * @data: The raw bytes of the packet.
1343 * of this list for this packet.
1348 * @packet_size: This function writes the size of the parsed packet
1369 * packet tag 3
1372 * Max Tag 3 packet size (max 3 bytes)
1381 * (ECRYPTFS_SALT_SIZE + 7) minimum packet size
1384 printk(KERN_ERR "Max packet size too large\n");
1389 printk(KERN_ERR "First byte != 0x%.2x; invalid packet\n",
1407 printk(KERN_WARNING "Error parsing packet length; rc = [%d]\n",
1426 printk(KERN_WARNING "Tag 3 packet contains key larger "
1514 * @data: The raw bytes of the packet
1516 * packet into this memory location
1522 * @packet_size: This function writes the size of the parsed packet
1540 * packet tag 11
1543 * Max Tag 11 packet size (max 3 bytes)
1550 * We need at least 16 bytes of data for the packet to even be
1554 printk(KERN_ERR "Maximum packet size too small\n");
1559 printk(KERN_WARNING "Invalid tag 11 packet format\n");
1566 printk(KERN_WARNING "Invalid tag 11 packet format\n");
1582 printk(KERN_ERR "Literal data section in tag 11 packet exceeds "
1588 printk(KERN_WARNING "Unrecognizable packet\n");
1593 printk(KERN_WARNING "Unrecognizable packet\n");
1743 * @ecryptfs_dentry: The eCryptfs dentry associated with the packet set
1787 "tag 3 packet\n");
1801 "packet containing "
1804 "tag 3 packet\n");
1831 "tag 1 packet\n");
1839 ecryptfs_printk(KERN_WARNING, "Invalid packet set "
1844 ecryptfs_printk(KERN_DEBUG, "No packet at offset [%zd] "
1979 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n");
1990 ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet "
1997 ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n");
2004 * write_tag_1_packet - Write an RFC2440-compatible tag 1 (public key) packet
2005 * @dest: Buffer into which to write the packet
2009 * @auth_tok: The authentication token used for generating the tag 1 packet
2011 * @key_rec: The key record struct for the tag 1 packet
2013 * up constituting the packet; set to zero on error
2060 * packet tag 1 */
2062 + 3 /* Max Tag 1 packet size */
2079 ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet "
2080 "header; cannot generate packet length\n");
2101 * @dest: Target into which Tag 11 packet is to be written
2102 * @remaining_bytes: Maximum packet length
2105 * @packet_length: Length of the Tag 11 packet written; zero on error
2119 * packet tag 11 */
2121 + 3 /* Max Tag 11 packet size */
2139 printk(KERN_ERR "Error generating tag 11 packet header; cannot "
2140 "generate packet length. rc = [%d]\n", rc);
2162 * @dest: Buffer into which to write the packet
2168 * up constituting the packet; set to zero on error
2322 * packet tag 3 */
2324 + 3 /* Max Tag 3 packet size */
2340 /* Chop off the Tag 3 identifier(1) and Tag 3 packet size(3)
2341 * to get the number of octets in the actual Tag 3 packet */
2346 printk(KERN_ERR "Error generating tag 3 packet header; cannot "
2347 "generate packet length. rc = [%d]\n", rc);
2392 * Generates a key packet set and writes it to the virtual address
2442 "writing tag 3 packet\n");
2446 /* Write auth tok signature packet */
2452 "auth tok signature packet\n");
2462 "writing tag 1 packet\n");