auth_tok 217 fs/ecryptfs/crypto.c struct ecryptfs_global_auth_tok *auth_tok, *auth_tok_tmp; auth_tok 222 fs/ecryptfs/crypto.c list_for_each_entry_safe(auth_tok, auth_tok_tmp, auth_tok 225 fs/ecryptfs/crypto.c list_del(&auth_tok->mount_crypt_stat_list); auth_tok 226 fs/ecryptfs/crypto.c if (!(auth_tok->flags & ECRYPTFS_AUTH_TOK_INVALID)) auth_tok 227 fs/ecryptfs/crypto.c key_put(auth_tok->global_auth_tok_key); auth_tok 228 fs/ecryptfs/crypto.c kmem_cache_free(ecryptfs_global_auth_tok_cache, auth_tok); auth_tok 18 fs/ecryptfs/debug.c void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok) auth_tok 24 fs/ecryptfs/debug.c auth_tok); auth_tok 25 fs/ecryptfs/debug.c if (auth_tok->flags & ECRYPTFS_PRIVATE_KEY) { auth_tok 29 fs/ecryptfs/debug.c ecryptfs_to_hex(salt, auth_tok->token.password.salt, auth_tok 33 fs/ecryptfs/debug.c if (auth_tok->token.password.flags & auth_tok 37 fs/ecryptfs/debug.c memcpy(sig, auth_tok->token.password.signature, auth_tok 43 fs/ecryptfs/debug.c auth_tok->session_key.flags); auth_tok 44 fs/ecryptfs/debug.c if (auth_tok->session_key.flags auth_tok 48 fs/ecryptfs/debug.c if (auth_tok->session_key.flags auth_tok 52 fs/ecryptfs/debug.c if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { auth_tok 56 fs/ecryptfs/debug.c auth_tok->session_key.decrypted_key_size); auth_tok 60 fs/ecryptfs/debug.c ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, auth_tok 63 fs/ecryptfs/debug.c if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { auth_tok 67 fs/ecryptfs/debug.c auth_tok->session_key.encrypted_key_size); auth_tok 71 fs/ecryptfs/debug.c ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, auth_tok 72 fs/ecryptfs/debug.c auth_tok->session_key. auth_tok 40 fs/ecryptfs/ecryptfs_kernel.h void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok); auth_tok 58 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_auth_tok *auth_tok; auth_tok 114 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_auth_tok *auth_tok; auth_tok 117 fs/ecryptfs/ecryptfs_kernel.h auth_tok = ecryptfs_get_encrypted_key_payload_data(key); auth_tok 118 fs/ecryptfs/ecryptfs_kernel.h if (auth_tok) auth_tok 119 fs/ecryptfs/ecryptfs_kernel.h return auth_tok; auth_tok 367 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_auth_tok auth_tok; auth_tok 666 fs/ecryptfs/ecryptfs_kernel.h struct ecryptfs_auth_tok **auth_tok, auth_tok 453 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok **auth_tok) auth_tok 457 fs/ecryptfs/keystore.c (*auth_tok) = ecryptfs_get_key_payload_data(auth_tok_key); auth_tok 458 fs/ecryptfs/keystore.c if (IS_ERR(*auth_tok)) { auth_tok 459 fs/ecryptfs/keystore.c rc = PTR_ERR(*auth_tok); auth_tok 460 fs/ecryptfs/keystore.c *auth_tok = NULL; auth_tok 464 fs/ecryptfs/keystore.c if (ecryptfs_verify_version((*auth_tok)->version)) { auth_tok 472 fs/ecryptfs/keystore.c if ((*auth_tok)->token_type != ECRYPTFS_PASSWORD auth_tok 473 fs/ecryptfs/keystore.c && (*auth_tok)->token_type != ECRYPTFS_PRIVATE_KEY) { auth_tok 486 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok **auth_tok, auth_tok 493 fs/ecryptfs/keystore.c (*auth_tok) = NULL; auth_tok 515 fs/ecryptfs/keystore.c walker->global_auth_tok_key, auth_tok); auth_tok 555 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok **auth_tok, auth_tok 561 fs/ecryptfs/keystore.c rc = ecryptfs_find_global_auth_tok_for_sig(auth_tok_key, auth_tok, auth_tok 573 fs/ecryptfs/keystore.c rc = ecryptfs_keyring_auth_tok_for_sig(auth_tok_key, auth_tok, auth_tok 595 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *auth_tok; auth_tok 634 fs/ecryptfs/keystore.c &s->auth_tok, mount_crypt_stat, auth_tok 735 fs/ecryptfs/keystore.c if (s->auth_tok->token_type != ECRYPTFS_PASSWORD) { auth_tok 760 fs/ecryptfs/keystore.c (u8 *)s->auth_tok->token.password.session_key_encryption_key, auth_tok 761 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key_bytes, auth_tok 815 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, auth_tok 823 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, auth_tok 865 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *auth_tok; auth_tok 961 fs/ecryptfs/keystore.c &s->auth_tok, mount_crypt_stat, auth_tok 1023 fs/ecryptfs/keystore.c if (s->auth_tok->token_type != ECRYPTFS_PASSWORD) { auth_tok 1031 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, auth_tok 1039 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, auth_tok 1097 fs/ecryptfs/keystore.c ecryptfs_get_auth_tok_sig(char **sig, struct ecryptfs_auth_tok *auth_tok) auth_tok 1102 fs/ecryptfs/keystore.c switch (auth_tok->token_type) { auth_tok 1104 fs/ecryptfs/keystore.c (*sig) = auth_tok->token.password.signature; auth_tok 1107 fs/ecryptfs/keystore.c (*sig) = auth_tok->token.private_key.signature; auth_tok 1111 fs/ecryptfs/keystore.c auth_tok->token_type); auth_tok 1125 fs/ecryptfs/keystore.c decrypt_pki_encrypted_session_key(struct ecryptfs_auth_tok *auth_tok, auth_tok 1136 fs/ecryptfs/keystore.c rc = ecryptfs_get_auth_tok_sig(&auth_tok_sig, auth_tok); auth_tok 1139 fs/ecryptfs/keystore.c auth_tok->token_type); auth_tok 1142 fs/ecryptfs/keystore.c rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key), auth_tok 1161 fs/ecryptfs/keystore.c rc = parse_tag_65_packet(&(auth_tok->session_key), auth_tok 1168 fs/ecryptfs/keystore.c auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY; auth_tok 1169 fs/ecryptfs/keystore.c memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key, auth_tok 1170 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size); auth_tok 1171 fs/ecryptfs/keystore.c crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; auth_tok 1269 fs/ecryptfs/keystore.c (*new_auth_tok) = &auth_tok_list_item->auth_tok; auth_tok 1403 fs/ecryptfs/keystore.c (*new_auth_tok) = &auth_tok_list_item->auth_tok; auth_tok 1609 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok **auth_tok, auth_tok 1626 fs/ecryptfs/keystore.c rc = ecryptfs_verify_auth_tok_from_key(*auth_tok_key, auth_tok); auth_tok 1645 fs/ecryptfs/keystore.c decrypt_passphrase_encrypted_session_key(struct ecryptfs_auth_tok *auth_tok, auth_tok 1658 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key_bytes); auth_tok 1660 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key, auth_tok 1661 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key_bytes); auth_tok 1671 fs/ecryptfs/keystore.c rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key, auth_tok 1672 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size, auth_tok 1679 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size); auth_tok 1682 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size = auth_tok 1683 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size; auth_tok 1684 fs/ecryptfs/keystore.c rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key, auth_tok 1685 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size, auth_tok 1707 fs/ecryptfs/keystore.c tfm, auth_tok->token.password.session_key_encryption_key, auth_tok 1716 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size, auth_tok 1724 fs/ecryptfs/keystore.c auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY; auth_tok 1725 fs/ecryptfs/keystore.c memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key, auth_tok 1726 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size); auth_tok 1866 fs/ecryptfs/keystore.c candidate_auth_tok = &auth_tok_list_item->auth_tok; auth_tok 1931 fs/ecryptfs/keystore.c == &auth_tok_list_item->auth_tok) { auth_tok 1961 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *auth_tok, auth_tok 1971 fs/ecryptfs/keystore.c rc = write_tag_66_packet(auth_tok->token.private_key.signature, auth_tok 2019 fs/ecryptfs/keystore.c struct key *auth_tok_key, struct ecryptfs_auth_tok *auth_tok, auth_tok 2030 fs/ecryptfs/keystore.c ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature, auth_tok 2035 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key[i]; auth_tok 2038 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key, auth_tok 2039 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size); auth_tok 2044 fs/ecryptfs/keystore.c if (auth_tok->session_key.encrypted_key_size == 0) auth_tok 2045 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = auth_tok 2046 fs/ecryptfs/keystore.c auth_tok->token.private_key.key_size; auth_tok 2047 fs/ecryptfs/keystore.c rc = pki_encrypt_session_key(auth_tok_key, auth_tok, crypt_stat, auth_tok 2174 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *auth_tok, auth_tok 2194 fs/ecryptfs/keystore.c ecryptfs_from_hex(key_rec->sig, auth_tok->token.password.signature, auth_tok 2214 fs/ecryptfs/keystore.c if (auth_tok->session_key.encrypted_key_size == 0) auth_tok 2215 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = auth_tok 2220 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = 32; auth_tok 2222 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = crypt_stat->key_size; auth_tok 2224 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size; auth_tok 2226 fs/ecryptfs/keystore.c for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++) auth_tok 2228 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key[i]; auth_tok 2235 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key, auth_tok 2239 fs/ecryptfs/keystore.c if (auth_tok->token.password.flags & auth_tok 2243 fs/ecryptfs/keystore.c auth_tok->token.password. auth_tok 2246 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key, auth_tok 2365 fs/ecryptfs/keystore.c memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, auth_tok 2403 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *auth_tok; auth_tok 2424 fs/ecryptfs/keystore.c &auth_tok, auth_tok 2433 fs/ecryptfs/keystore.c if (auth_tok->token_type == ECRYPTFS_PASSWORD) { auth_tok 2435 fs/ecryptfs/keystore.c &max, auth_tok, auth_tok 2456 fs/ecryptfs/keystore.c } else if (auth_tok->token_type == ECRYPTFS_PRIVATE_KEY) { auth_tok 2458 fs/ecryptfs/keystore.c auth_tok_key, auth_tok, auth_tok 188 fs/ecryptfs/main.c struct ecryptfs_auth_tok *auth_tok; auth_tok 195 fs/ecryptfs/main.c &global_auth_tok->global_auth_tok_key, &auth_tok, auth_tok 19 security/keys/encrypted-keys/ecryptfs_format.c u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok) auth_tok 21 security/keys/encrypted-keys/ecryptfs_format.c return auth_tok->token.password.session_key_encryption_key; auth_tok 48 security/keys/encrypted-keys/ecryptfs_format.c int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok, auth_tok 54 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) auth_tok 56 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token_type = ECRYPTFS_PASSWORD; auth_tok 57 security/keys/encrypted-keys/ecryptfs_format.c strncpy((char *)auth_tok->token.password.signature, key_desc, auth_tok 59 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.session_key_encryption_key_bytes = auth_tok 67 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.flags |= auth_tok 70 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->session_key.encrypted_key[0] = 0; auth_tok 71 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->session_key.encrypted_key_size = 0; auth_tok 73 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; auth_tok 74 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); auth_tok 22 security/keys/encrypted-keys/ecryptfs_format.h u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok); auth_tok 24 security/keys/encrypted-keys/ecryptfs_format.h int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok,