ecryptfs_printk   133 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_DEBUG, "root iv:\n");
ecryptfs_printk   144 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_DEBUG, "source:\n");
ecryptfs_printk   150 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_WARNING, "Error attempting to compute "
ecryptfs_printk   156 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_DEBUG, "derived iv:\n");
ecryptfs_printk   177 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR, "Error attempting to "
ecryptfs_printk   319 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_DEBUG, "Key size [%zd]; key:\n",
ecryptfs_printk   343 fs/ecryptfs/crypto.c 			ecryptfs_printk(KERN_ERR,
ecryptfs_printk   409 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR, "Error attempting to derive IV for "
ecryptfs_printk   469 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR, "Error allocating memory for "
ecryptfs_printk   492 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR,
ecryptfs_printk   541 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR,
ecryptfs_printk   578 fs/ecryptfs/crypto.c 	ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk   596 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): "
ecryptfs_printk   660 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_WARNING, "Session key not valid; "
ecryptfs_printk   667 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_WARNING, "Error attempting to compute "
ecryptfs_printk   686 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_DEBUG, "Generated new session key:\n");
ecryptfs_printk   819 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_ERR, "Error initializing cryptographic "
ecryptfs_printk   840 fs/ecryptfs/crypto.c 	ecryptfs_printk(KERN_DEBUG, "m_1 = [0x%.8x]; m_2 = [0x%.8x]; "
ecryptfs_printk   843 fs/ecryptfs/crypto.c 	ecryptfs_printk(KERN_DEBUG, "(m_1 ^ MAGIC_ECRYPTFS_MARKER) = "
ecryptfs_printk   991 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_WARNING, "Cipher code not recognized: "
ecryptfs_printk  1088 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_WARNING, "Error generating key packet "
ecryptfs_printk  1309 fs/ecryptfs/crypto.c 		ecryptfs_printk(KERN_WARNING, "File version is [%d]; only "
ecryptfs_printk  1322 fs/ecryptfs/crypto.c 			ecryptfs_printk(KERN_WARNING, "Error reading header "
ecryptfs_printk  2064 fs/ecryptfs/crypto.c 			ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk    23 fs/ecryptfs/debug.c 	ecryptfs_printk(KERN_DEBUG, "Auth tok at mem loc [%p]:\n",
ecryptfs_printk    26 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * private key type\n");
ecryptfs_printk    28 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * passphrase type\n");
ecryptfs_printk    32 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
ecryptfs_printk    35 fs/ecryptfs/debug.c 			ecryptfs_printk(KERN_DEBUG, " * persistent\n");
ecryptfs_printk    40 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig);
ecryptfs_printk    42 fs/ecryptfs/debug.c 	ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
ecryptfs_printk    46 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk    50 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk    53 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * Contains decrypted key\n");
ecryptfs_printk    54 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk    57 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * Decrypted session key "
ecryptfs_printk    64 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * Contains encrypted key\n");
ecryptfs_printk    65 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk    68 fs/ecryptfs/debug.c 		ecryptfs_printk(KERN_DEBUG, " * Encrypted session key "
ecryptfs_printk    72 fs/ecryptfs/file.c 			ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk   204 fs/ecryptfs/file.c 		ecryptfs_printk(KERN_ERR,
ecryptfs_printk   212 fs/ecryptfs/file.c 		ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n");
ecryptfs_printk   238 fs/ecryptfs/file.c 	ecryptfs_printk(KERN_DEBUG, "inode w/ addr = [0x%p], i_ino = "
ecryptfs_printk   272 fs/ecryptfs/file.c 		ecryptfs_printk(KERN_ERR,
ecryptfs_printk   219 fs/ecryptfs/inode.c 		ecryptfs_printk(KERN_DEBUG, "This is a directory\n");
ecryptfs_printk   223 fs/ecryptfs/inode.c 	ecryptfs_printk(KERN_DEBUG, "Initializing crypto context\n");
ecryptfs_printk   226 fs/ecryptfs/inode.c 		ecryptfs_printk(KERN_ERR, "Error creating new file "
ecryptfs_printk   266 fs/ecryptfs/inode.c 		ecryptfs_printk(KERN_WARNING, "Failed to create file in"
ecryptfs_printk   412 fs/ecryptfs/inode.c 		ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_len() returned "
ecryptfs_printk    35 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "No key\n");
ecryptfs_printk    39 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Key expired\n");
ecryptfs_printk    43 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Key revoked\n");
ecryptfs_printk    47 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Unknown error code: "
ecryptfs_printk    60 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Missing auth tok\n");
ecryptfs_printk    63 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Invalid auth tok\n");
ecryptfs_printk    99 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Five-byte packet length not "
ecryptfs_printk   104 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error parsing packet length\n");
ecryptfs_printk   137 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING,
ecryptfs_printk   166 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n");
ecryptfs_printk   174 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
ecryptfs_printk   185 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
ecryptfs_printk   225 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Type should be ECRYPTFS_TAG_65\n");
ecryptfs_printk   230 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Status indicator has non-zero value "
ecryptfs_printk   237 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
ecryptfs_printk   243 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "The message received from ecryptfsd "
ecryptfs_printk   249 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR,
ecryptfs_printk   259 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "key_size [%d] larger than "
ecryptfs_printk   274 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Invalid checksum for file "
ecryptfs_printk   309 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n");
ecryptfs_printk   317 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
ecryptfs_printk   328 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
ecryptfs_printk   387 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
ecryptfs_printk   426 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Major version number mismatch. "
ecryptfs_printk   433 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Minor version number mismatch. "
ecryptfs_printk  1145 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n");
ecryptfs_printk  1150 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error sending message to "
ecryptfs_printk  1156 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet "
ecryptfs_printk  1174 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Cipher code [%d] is invalid\n",
ecryptfs_printk  1180 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "Decrypted session key:\n");
ecryptfs_printk  1486 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Unsupported hash algorithm: "
ecryptfs_printk  1656 fs/ecryptfs/keystore.c 		ecryptfs_printk(
ecryptfs_printk  1729 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "FEK of size [%zd]:\n",
ecryptfs_printk  1786 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_ERR, "Error parsing "
ecryptfs_printk  1799 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_ERR, "No valid "
ecryptfs_printk  1810 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_ERR, "Expected "
ecryptfs_printk  1830 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_ERR, "Error parsing "
ecryptfs_printk  1839 fs/ecryptfs/keystore.c 			ecryptfs_printk(KERN_WARNING, "Invalid packet set "
ecryptfs_printk  1844 fs/ecryptfs/keystore.c 			ecryptfs_printk(KERN_DEBUG, "No packet at offset [%zd] "
ecryptfs_printk  1868 fs/ecryptfs/keystore.c 			ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk  1891 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Could not find a usable "
ecryptfs_printk  1921 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Error decrypting the "
ecryptfs_printk  1943 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error computing "
ecryptfs_printk  1949 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error initializing crypto "
ecryptfs_printk  1979 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n");
ecryptfs_printk  1984 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error sending message to "
ecryptfs_printk  1990 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet "
ecryptfs_printk  1997 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n");
ecryptfs_printk  2055 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "Encrypted key:\n");
ecryptfs_printk  2079 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet "
ecryptfs_printk  2230 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "encrypted_session_key_valid != 0; "
ecryptfs_printk  2241 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "Using previously generated "
ecryptfs_printk  2248 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk  2254 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "Session key encryption key:\n");
ecryptfs_printk  2260 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating scatterlist "
ecryptfs_printk  2270 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error generating scatterlist "
ecryptfs_printk  2283 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error setting key for crypto "
ecryptfs_printk  2291 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Out of kernel memory whilst "
ecryptfs_printk  2302 fs/ecryptfs/keystore.c 	ecryptfs_printk(KERN_DEBUG, "Encrypting [%zd] bytes of the key\n",
ecryptfs_printk  2313 fs/ecryptfs/keystore.c 	ecryptfs_printk(KERN_DEBUG, "This should be the encrypted key:\n");
ecryptfs_printk  2315 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_DEBUG, "EFEK of size [%zd]:\n",
ecryptfs_printk  2357 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_WARNING, "Unable to generate code for "
ecryptfs_printk  2441 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_WARNING, "Error "
ecryptfs_printk  2451 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_ERR, "Error writing "
ecryptfs_printk  2461 fs/ecryptfs/keystore.c 				ecryptfs_printk(KERN_WARNING, "Error "
ecryptfs_printk  2469 fs/ecryptfs/keystore.c 			ecryptfs_printk(KERN_WARNING, "Unsupported "
ecryptfs_printk  2478 fs/ecryptfs/keystore.c 		ecryptfs_printk(KERN_ERR, "Error writing boundary byte\n");
ecryptfs_printk   387 fs/ecryptfs/main.c 		ecryptfs_printk(KERN_ERR, "You must supply at least one valid "
ecryptfs_printk   414 fs/ecryptfs/main.c 		ecryptfs_printk(KERN_ERR,
ecryptfs_printk   523 fs/ecryptfs/main.c 		ecryptfs_printk(KERN_WARNING, "kern_path() failed\n");
ecryptfs_printk   746 fs/ecryptfs/main.c 			ecryptfs_printk(KERN_WARNING, "%s: "
ecryptfs_printk   806 fs/ecryptfs/main.c 		ecryptfs_printk(KERN_ERR, "The eCryptfs extent size is "
ecryptfs_printk   432 fs/ecryptfs/miscdev.c 		ecryptfs_printk(KERN_WARNING, "Dropping miscdev "
ecryptfs_printk    57 fs/ecryptfs/mmap.c 		ecryptfs_printk(KERN_WARNING, "Error encrypting "
ecryptfs_printk   216 fs/ecryptfs/mmap.c 			ecryptfs_printk(KERN_ERR, "Error decrypting page; "
ecryptfs_printk   226 fs/ecryptfs/mmap.c 	ecryptfs_printk(KERN_DEBUG, "Unlocking page with index = [0x%.16lx]\n",
ecryptfs_printk   475 fs/ecryptfs/mmap.c 	ecryptfs_printk(KERN_DEBUG, "Calling fill_zeros_to_end_of_page"
ecryptfs_printk   497 fs/ecryptfs/mmap.c 		ecryptfs_printk(KERN_WARNING, "Error attempting to fill "
ecryptfs_printk   503 fs/ecryptfs/mmap.c 		ecryptfs_printk(KERN_WARNING, "Error encrypting page (upper "
ecryptfs_printk   509 fs/ecryptfs/mmap.c 		ecryptfs_printk(KERN_DEBUG, "Expanded file size to "