Lines Matching defs:packet
99 ecryptfs_printk(KERN_ERR, "Five-byte packet length not "
104 ecryptfs_printk(KERN_ERR, "Error parsing packet length\n");
117 * @packet_size_length: The number of bytes used to encode the packet
138 "Unsupported packet size: [%zd]\n", size);
145 char **packet, size_t *packet_len)
163 *packet = kmalloc(data_len, GFP_KERNEL);
164 message = *packet;
174 ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
175 "header; cannot generate packet length\n");
185 ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
186 "header; cannot generate packet length\n");
237 ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
286 struct ecryptfs_crypt_stat *crypt_stat, char **packet,
306 *packet = kmalloc(data_len, GFP_KERNEL);
307 message = *packet;
317 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
318 "header; cannot generate packet length\n");
328 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
329 "header; cannot generate packet length\n");
387 ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
609 * write_tag_70_packet - Write encrypted filename (EFN) packet against FNEK
614 * filename encryption key (FNEK) and stores it in a packet to @dest,
666 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
712 printk(KERN_ERR "%s: Error generating tag 70 packet "
713 "header; cannot generate packet length; rc = [%d]\n",
877 * ecryptfs_parse_tag_70_packet - Parse and process FNEK-encrypted passphrase packet
882 * in the packet parsed
885 * packet
886 * @max_packet_size: The maximum legal size of the packet to be parsed
916 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
924 printk(KERN_WARNING "%s: Invalid packet tag [0x%.2x]; must be "
934 printk(KERN_WARNING "%s: Error parsing packet length; "
942 printk(KERN_WARNING "%s: max_packet_size is [%zd]; real packet "
1057 printk(KERN_WARNING "%s: Invalid tag 70 packet; could not "
1146 ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n");
1157 ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet "
1165 printk(KERN_ERR "Failed to parse tag 65 packet; rc = [%d]\n",
1208 * @crypt_stat: The cryptographic context to modify based on packet contents
1209 * @data: The raw bytes of the packet.
1212 * end of this list for this packet.
1217 * @packet_size: This function writes the size of the parsed packet
1219 * @max_packet_size: The maximum allowable packet size
1238 * packet tag 1
1241 * Max Tag 1 packet size (max 3 bytes)
1247 * 12 bytes minimum packet size
1250 printk(KERN_ERR "Invalid max packet size; must be >=12\n");
1274 printk(KERN_WARNING "Error parsing packet length; "
1305 printk(KERN_WARNING "Tag 1 packet contains key larger "
1339 * @crypt_stat: The cryptographic context to modify based on packet
1341 * @data: The raw bytes of the packet.
1344 * of this list for this packet.
1349 * @packet_size: This function writes the size of the parsed packet
1370 * packet tag 3
1373 * Max Tag 3 packet size (max 3 bytes)
1382 * (ECRYPTFS_SALT_SIZE + 7) minimum packet size
1385 printk(KERN_ERR "Max packet size too large\n");
1390 printk(KERN_ERR "First byte != 0x%.2x; invalid packet\n",
1408 printk(KERN_WARNING "Error parsing packet length; rc = [%d]\n",
1427 printk(KERN_WARNING "Tag 3 packet contains key larger "
1515 * @data: The raw bytes of the packet
1517 * packet into this memory location
1523 * @packet_size: This function writes the size of the parsed packet
1541 * packet tag 11
1544 * Max Tag 11 packet size (max 3 bytes)
1551 * We need at least 16 bytes of data for the packet to even be
1555 printk(KERN_ERR "Maximum packet size too small\n");
1560 printk(KERN_WARNING "Invalid tag 11 packet format\n");
1567 printk(KERN_WARNING "Invalid tag 11 packet format\n");
1583 printk(KERN_ERR "Literal data section in tag 11 packet exceeds "
1589 printk(KERN_WARNING "Unrecognizable packet\n");
1594 printk(KERN_WARNING "Unrecognizable packet\n");
1744 * @ecryptfs_dentry: The eCryptfs dentry associated with the packet set
1788 "tag 3 packet\n");
1802 "packet containing "
1805 "tag 3 packet\n");
1832 "tag 1 packet\n");
1840 ecryptfs_printk(KERN_WARNING, "Invalid packet set "
1845 ecryptfs_printk(KERN_DEBUG, "No packet at offset [%zd] "
1980 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n");
1991 ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet "
1998 ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n");
2005 * write_tag_1_packet - Write an RFC2440-compatible tag 1 (public key) packet
2006 * @dest: Buffer into which to write the packet
2010 * @auth_tok: The authentication token used for generating the tag 1 packet
2012 * @key_rec: The key record struct for the tag 1 packet
2014 * up constituting the packet; set to zero on error
2061 * packet tag 1 */
2063 + 3 /* Max Tag 1 packet size */
2080 ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet "
2081 "header; cannot generate packet length\n");
2102 * @dest: Target into which Tag 11 packet is to be written
2103 * @remaining_bytes: Maximum packet length
2106 * @packet_length: Length of the Tag 11 packet written; zero on error
2120 * packet tag 11 */
2122 + 3 /* Max Tag 11 packet size */
2140 printk(KERN_ERR "Error generating tag 11 packet header; cannot "
2141 "generate packet length. rc = [%d]\n", rc);
2163 * @dest: Buffer into which to write the packet
2169 * up constituting the packet; set to zero on error
2323 * packet tag 3 */
2325 + 3 /* Max Tag 3 packet size */
2341 /* Chop off the Tag 3 identifier(1) and Tag 3 packet size(3)
2342 * to get the number of octets in the actual Tag 3 packet */
2347 printk(KERN_ERR "Error generating tag 3 packet header; cannot "
2348 "generate packet length. rc = [%d]\n", rc);
2393 * Generates a key packet set and writes it to the virtual address
2443 "writing tag 3 packet\n");
2447 /* Write auth tok signature packet */
2453 "auth tok signature packet\n");
2463 "writing tag 1 packet\n");