ECRYPTFS_SIG_SIZE_HEX
char sig[ECRYPTFS_SIG_SIZE_HEX + 1];
ECRYPTFS_SIG_SIZE_HEX);
sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
char keysig[ECRYPTFS_SIG_SIZE_HEX + 1];
char fnek_sig[ECRYPTFS_SIG_SIZE_HEX];
unsigned char sig[ECRYPTFS_SIG_SIZE_HEX + 1];
char global_default_fnek_sig[ECRYPTFS_SIG_SIZE_HEX + 1];
data_len = (5 + ECRYPTFS_SIG_SIZE_HEX
rc = ecryptfs_write_packet_length(&message[i], ECRYPTFS_SIG_SIZE_HEX,
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
i += ECRYPTFS_SIG_SIZE_HEX;
"the next match.\n", ECRYPTFS_SIG_SIZE_HEX,
memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX);
new_key_sig->keysig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
memcpy(new_auth_tok->sig, sig, ECRYPTFS_SIG_SIZE_HEX);
new_auth_tok->sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
data_len = (8 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
rc = ecryptfs_write_packet_length(&message[i], ECRYPTFS_SIG_SIZE_HEX,
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
i += ECRYPTFS_SIG_SIZE_HEX;
if (memcmp(walker->sig, sig, ECRYPTFS_SIG_SIZE_HEX))
char fnek_sig_hex[ECRYPTFS_SIG_SIZE_HEX + 1];
#define ECRYPTFS_PASSWORD_SIG_SIZE ECRYPTFS_SIG_SIZE_HEX