ecryptfs_printk 133 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "root iv:\n"); ecryptfs_printk 144 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "source:\n"); ecryptfs_printk 150 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "Error attempting to compute " ecryptfs_printk 156 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "derived iv:\n"); ecryptfs_printk 177 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, "Error attempting to " ecryptfs_printk 319 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "Key size [%zd]; key:\n", ecryptfs_printk 343 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 409 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, "Error attempting to derive IV for " ecryptfs_printk 469 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, "Error allocating memory for " ecryptfs_printk 492 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 541 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 578 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 596 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): " ecryptfs_printk 660 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "Session key not valid; " ecryptfs_printk 667 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "Error attempting to compute " ecryptfs_printk 686 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "Generated new session key:\n"); ecryptfs_printk 819 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_ERR, "Error initializing cryptographic " ecryptfs_printk 840 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "m_1 = [0x%.8x]; m_2 = [0x%.8x]; " ecryptfs_printk 843 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, "(m_1 ^ MAGIC_ECRYPTFS_MARKER) = " ecryptfs_printk 991 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "Cipher code not recognized: " ecryptfs_printk 1088 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "Error generating key packet " ecryptfs_printk 1309 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "File version is [%d]; only " ecryptfs_printk 1322 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_WARNING, "Error reading header " ecryptfs_printk 2064 fs/ecryptfs/crypto.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 23 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, "Auth tok at mem loc [%p]:\n", ecryptfs_printk 26 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * private key type\n"); ecryptfs_printk 28 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * passphrase type\n"); ecryptfs_printk 32 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); ecryptfs_printk 35 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * persistent\n"); ecryptfs_printk 40 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig); ecryptfs_printk 42 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n", ecryptfs_printk 46 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 50 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 53 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * Contains decrypted key\n"); ecryptfs_printk 54 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 57 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * Decrypted session key " ecryptfs_printk 64 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * Contains encrypted key\n"); ecryptfs_printk 65 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 68 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * Encrypted session key " ecryptfs_printk 72 fs/ecryptfs/file.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 204 fs/ecryptfs/file.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 212 fs/ecryptfs/file.c ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n"); ecryptfs_printk 238 fs/ecryptfs/file.c ecryptfs_printk(KERN_DEBUG, "inode w/ addr = [0x%p], i_ino = " ecryptfs_printk 272 fs/ecryptfs/file.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 219 fs/ecryptfs/inode.c ecryptfs_printk(KERN_DEBUG, "This is a directory\n"); ecryptfs_printk 223 fs/ecryptfs/inode.c ecryptfs_printk(KERN_DEBUG, "Initializing crypto context\n"); ecryptfs_printk 226 fs/ecryptfs/inode.c ecryptfs_printk(KERN_ERR, "Error creating new file " ecryptfs_printk 266 fs/ecryptfs/inode.c ecryptfs_printk(KERN_WARNING, "Failed to create file in" ecryptfs_printk 412 fs/ecryptfs/inode.c ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_len() returned " ecryptfs_printk 35 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "No key\n"); ecryptfs_printk 39 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Key expired\n"); ecryptfs_printk 43 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Key revoked\n"); ecryptfs_printk 47 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Unknown error code: " ecryptfs_printk 60 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Missing auth tok\n"); ecryptfs_printk 63 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Invalid auth tok\n"); ecryptfs_printk 99 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Five-byte packet length not " ecryptfs_printk 104 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error parsing packet length\n"); ecryptfs_printk 137 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, ecryptfs_printk 166 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n"); ecryptfs_printk 174 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet " ecryptfs_printk 185 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet " ecryptfs_printk 225 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Type should be ECRYPTFS_TAG_65\n"); ecryptfs_printk 230 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Status indicator has non-zero value " ecryptfs_printk 237 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Error parsing packet length; " ecryptfs_printk 243 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "The message received from ecryptfsd " ecryptfs_printk 249 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 259 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "key_size [%d] larger than " ecryptfs_printk 274 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Invalid checksum for file " ecryptfs_printk 309 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n"); ecryptfs_printk 317 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet " ecryptfs_printk 328 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet " ecryptfs_printk 387 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Error parsing packet length; " ecryptfs_printk 426 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Major version number mismatch. " ecryptfs_printk 433 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Minor version number mismatch. " ecryptfs_printk 1145 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n"); ecryptfs_printk 1150 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error sending message to " ecryptfs_printk 1156 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet " ecryptfs_printk 1174 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Cipher code [%d] is invalid\n", ecryptfs_printk 1180 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "Decrypted session key:\n"); ecryptfs_printk 1486 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Unsupported hash algorithm: " ecryptfs_printk 1656 fs/ecryptfs/keystore.c ecryptfs_printk( ecryptfs_printk 1729 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "FEK of size [%zd]:\n", ecryptfs_printk 1786 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error parsing " ecryptfs_printk 1799 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "No valid " ecryptfs_printk 1810 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Expected " ecryptfs_printk 1830 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error parsing " ecryptfs_printk 1839 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Invalid packet set " ecryptfs_printk 1844 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "No packet at offset [%zd] " ecryptfs_printk 1868 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 1891 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Could not find a usable " ecryptfs_printk 1921 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Error decrypting the " ecryptfs_printk 1943 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error computing " ecryptfs_printk 1949 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error initializing crypto " ecryptfs_printk 1979 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n"); ecryptfs_printk 1984 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error sending message to " ecryptfs_printk 1990 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet " ecryptfs_printk 1997 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n"); ecryptfs_printk 2055 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "Encrypted key:\n"); ecryptfs_printk 2079 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet " ecryptfs_printk 2230 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "encrypted_session_key_valid != 0; " ecryptfs_printk 2241 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "Using previously generated " ecryptfs_printk 2248 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, ecryptfs_printk 2254 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "Session key encryption key:\n"); ecryptfs_printk 2260 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating scatterlist " ecryptfs_printk 2270 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error generating scatterlist " ecryptfs_printk 2283 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error setting key for crypto " ecryptfs_printk 2291 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Out of kernel memory whilst " ecryptfs_printk 2302 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "Encrypting [%zd] bytes of the key\n", ecryptfs_printk 2313 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "This should be the encrypted key:\n"); ecryptfs_printk 2315 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_DEBUG, "EFEK of size [%zd]:\n", ecryptfs_printk 2357 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Unable to generate code for " ecryptfs_printk 2441 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Error " ecryptfs_printk 2451 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error writing " ecryptfs_printk 2461 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Error " ecryptfs_printk 2469 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_WARNING, "Unsupported " ecryptfs_printk 2478 fs/ecryptfs/keystore.c ecryptfs_printk(KERN_ERR, "Error writing boundary byte\n"); ecryptfs_printk 387 fs/ecryptfs/main.c ecryptfs_printk(KERN_ERR, "You must supply at least one valid " ecryptfs_printk 414 fs/ecryptfs/main.c ecryptfs_printk(KERN_ERR, ecryptfs_printk 523 fs/ecryptfs/main.c ecryptfs_printk(KERN_WARNING, "kern_path() failed\n"); ecryptfs_printk 746 fs/ecryptfs/main.c ecryptfs_printk(KERN_WARNING, "%s: " ecryptfs_printk 806 fs/ecryptfs/main.c ecryptfs_printk(KERN_ERR, "The eCryptfs extent size is " ecryptfs_printk 432 fs/ecryptfs/miscdev.c ecryptfs_printk(KERN_WARNING, "Dropping miscdev " ecryptfs_printk 57 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_WARNING, "Error encrypting " ecryptfs_printk 216 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_ERR, "Error decrypting page; " ecryptfs_printk 226 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_DEBUG, "Unlocking page with index = [0x%.16lx]\n", ecryptfs_printk 475 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_DEBUG, "Calling fill_zeros_to_end_of_page" ecryptfs_printk 497 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_WARNING, "Error attempting to fill " ecryptfs_printk 503 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_WARNING, "Error encrypting page (upper " ecryptfs_printk 509 fs/ecryptfs/mmap.c ecryptfs_printk(KERN_DEBUG, "Expanded file size to "