• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/

Lines Matching defs:packet

95 		ecryptfs_printk(KERN_ERR, "Five-byte packet length not "
100 ecryptfs_printk(KERN_ERR, "Error parsing packet length\n");
113 * @packet_size_length: The number of bytes used to encode the packet
133 "Unsupported packet size: [%d]\n", size);
140 char **packet, size_t *packet_len)
158 *packet = kmalloc(data_len, GFP_KERNEL);
159 message = *packet;
169 ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
170 "header; cannot generate packet length\n");
180 ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
181 "header; cannot generate packet length\n");
232 ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
281 struct ecryptfs_crypt_stat *crypt_stat, char **packet,
301 *packet = kmalloc(data_len, GFP_KERNEL);
302 message = *packet;
312 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
313 "header; cannot generate packet length\n");
323 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
324 "header; cannot generate packet length\n");
382 ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
496 * write_tag_70_packet - Write encrypted filename (EFN) packet against FNEK
501 * filename encryption key (FNEK) and stores it in a packet to @dest,
546 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
554 + 3 /* Max Tag 70 packet size */
586 printk(KERN_ERR "%s: Error generating tag 70 packet "
587 "header; cannot generate packet length; rc = [%d]\n",
780 * parse_tag_70_packet - Parse and process FNEK-encrypted passphrase packet
785 * in the packet parsed
788 * packet
789 * @max_packet_size: The maximum legal size of the packet to be parsed
822 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
830 printk(KERN_WARNING "%s: Invalid packet tag [0x%.2x]; must be "
840 printk(KERN_WARNING "%s: Error parsing packet length; "
848 printk(KERN_WARNING "%s: max_packet_size is [%zd]; real packet "
955 printk(KERN_WARNING "%s: Invalid tag 70 packet; could not "
1042 ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n");
1053 ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet "
1061 printk(KERN_ERR "Failed to parse tag 65 packet; rc = [%d]\n",
1104 * @crypt_stat: The cryptographic context to modify based on packet contents
1105 * @data: The raw bytes of the packet.
1108 * end of this list for this packet.
1113 * @packet_size: This function writes the size of the parsed packet
1115 * @max_packet_size: The maximum allowable packet size
1134 * packet tag 1
1137 * Max Tag 1 packet size (max 3 bytes)
1143 * 12 bytes minimum packet size
1146 printk(KERN_ERR "Invalid max packet size; must be >=12\n");
1170 printk(KERN_WARNING "Error parsing packet length; "
1201 printk(KERN_WARNING "Tag 1 packet contains key larger "
1235 * @crypt_stat: The cryptographic context to modify based on packet
1237 * @data: The raw bytes of the packet.
1240 * of this list for this packet.
1245 * @packet_size: This function writes the size of the parsed packet
1266 * packet tag 3
1269 * Max Tag 3 packet size (max 3 bytes)
1278 * (ECRYPTFS_SALT_SIZE + 7) minimum packet size
1281 printk(KERN_ERR "Max packet size too large\n");
1286 printk(KERN_ERR "First byte != 0x%.2x; invalid packet\n",
1304 printk(KERN_WARNING "Error parsing packet length; rc = [%d]\n",
1323 printk(KERN_WARNING "Tag 3 packet contains key larger "
1411 * @data: The raw bytes of the packet
1413 * packet into this memory location
1419 * @packet_size: This function writes the size of the parsed packet
1437 * packet tag 11
1440 * Max Tag 11 packet size (max 3 bytes)
1447 * We need at least 16 bytes of data for the packet to even be
1451 printk(KERN_ERR "Maximum packet size too small\n");
1456 printk(KERN_WARNING "Invalid tag 11 packet format\n");
1463 printk(KERN_WARNING "Invalid tag 11 packet format\n");
1479 printk(KERN_ERR "Literal data section in tag 11 packet exceeds "
1485 printk(KERN_WARNING "Unrecognizable packet\n");
1490 printk(KERN_WARNING "Unrecognizable packet\n");
1665 * @ecryptfs_dentry: The eCryptfs dentry associated with the packet set
1708 "tag 3 packet\n");
1722 "packet containing "
1725 "tag 3 packet\n");
1752 "tag 1 packet\n");
1760 ecryptfs_printk(KERN_WARNING, "Invalid packet set "
1766 ecryptfs_printk(KERN_DEBUG, "No packet at offset "
1889 ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n");
1900 ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet "
1907 ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n");
1914 * write_tag_1_packet - Write an RFC2440-compatible tag 1 (public key) packet
1915 * @dest: Buffer into which to write the packet
1917 * @auth_tok: The authentication token used for generating the tag 1 packet
1919 * @key_rec: The key record struct for the tag 1 packet
1921 * up constituting the packet; set to zero on error
1965 * packet tag 1 */
1967 + 3 /* Max Tag 1 packet size */
1984 ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet "
1985 "header; cannot generate packet length\n");
2006 * @dest: Target into which Tag 11 packet is to be written
2007 * @remaining_bytes: Maximum packet length
2010 * @packet_length: Length of the Tag 11 packet written; zero on error
2024 * packet tag 11 */
2026 + 3 /* Max Tag 11 packet size */
2044 printk(KERN_ERR "Error generating tag 11 packet header; cannot "
2045 "generate packet length. rc = [%d]\n", rc);
2067 * @dest: Buffer into which to write the packet
2073 * up constituting the packet; set to zero on error
2214 * packet tag 3 */
2216 + 3 /* Max Tag 3 packet size */
2232 /* Chop off the Tag 3 identifier(1) and Tag 3 packet size(3)
2233 * to get the number of octets in the actual Tag 3 packet */
2238 printk(KERN_ERR "Error generating tag 3 packet header; cannot "
2239 "generate packet length. rc = [%d]\n", rc);
2284 * Generates a key packet set and writes it to the virtual address
2337 "writing tag 3 packet\n");
2341 /* Write auth tok signature packet */
2347 "auth tok signature packet\n");
2357 "writing tag 1 packet\n");