auth_tok          217 fs/ecryptfs/crypto.c 	struct ecryptfs_global_auth_tok *auth_tok, *auth_tok_tmp;
auth_tok          222 fs/ecryptfs/crypto.c 	list_for_each_entry_safe(auth_tok, auth_tok_tmp,
auth_tok          225 fs/ecryptfs/crypto.c 		list_del(&auth_tok->mount_crypt_stat_list);
auth_tok          226 fs/ecryptfs/crypto.c 		if (!(auth_tok->flags & ECRYPTFS_AUTH_TOK_INVALID))
auth_tok          227 fs/ecryptfs/crypto.c 			key_put(auth_tok->global_auth_tok_key);
auth_tok          228 fs/ecryptfs/crypto.c 		kmem_cache_free(ecryptfs_global_auth_tok_cache, auth_tok);
auth_tok           18 fs/ecryptfs/debug.c void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok)
auth_tok           24 fs/ecryptfs/debug.c 			auth_tok);
auth_tok           25 fs/ecryptfs/debug.c 	if (auth_tok->flags & ECRYPTFS_PRIVATE_KEY) {
auth_tok           29 fs/ecryptfs/debug.c 		ecryptfs_to_hex(salt, auth_tok->token.password.salt,
auth_tok           33 fs/ecryptfs/debug.c 		if (auth_tok->token.password.flags &
auth_tok           37 fs/ecryptfs/debug.c 		memcpy(sig, auth_tok->token.password.signature,
auth_tok           43 fs/ecryptfs/debug.c 			auth_tok->session_key.flags);
auth_tok           44 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags
auth_tok           48 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags
auth_tok           52 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
auth_tok           56 fs/ecryptfs/debug.c 				auth_tok->session_key.decrypted_key_size);
auth_tok           60 fs/ecryptfs/debug.c 			ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
auth_tok           63 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
auth_tok           67 fs/ecryptfs/debug.c 				auth_tok->session_key.encrypted_key_size);
auth_tok           71 fs/ecryptfs/debug.c 			ecryptfs_dump_hex(auth_tok->session_key.encrypted_key,
auth_tok           72 fs/ecryptfs/debug.c 					  auth_tok->session_key.
auth_tok           40 fs/ecryptfs/ecryptfs_kernel.h void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok);
auth_tok           58 fs/ecryptfs/ecryptfs_kernel.h 	struct ecryptfs_auth_tok *auth_tok;
auth_tok          114 fs/ecryptfs/ecryptfs_kernel.h 	struct ecryptfs_auth_tok *auth_tok;
auth_tok          117 fs/ecryptfs/ecryptfs_kernel.h 	auth_tok = ecryptfs_get_encrypted_key_payload_data(key);
auth_tok          118 fs/ecryptfs/ecryptfs_kernel.h 	if (auth_tok)
auth_tok          119 fs/ecryptfs/ecryptfs_kernel.h 		return auth_tok;
auth_tok          367 fs/ecryptfs/ecryptfs_kernel.h 	struct ecryptfs_auth_tok auth_tok;
auth_tok          666 fs/ecryptfs/ecryptfs_kernel.h 				      struct ecryptfs_auth_tok **auth_tok,
auth_tok          453 fs/ecryptfs/keystore.c 				  struct ecryptfs_auth_tok **auth_tok)
auth_tok          457 fs/ecryptfs/keystore.c 	(*auth_tok) = ecryptfs_get_key_payload_data(auth_tok_key);
auth_tok          458 fs/ecryptfs/keystore.c 	if (IS_ERR(*auth_tok)) {
auth_tok          459 fs/ecryptfs/keystore.c 		rc = PTR_ERR(*auth_tok);
auth_tok          460 fs/ecryptfs/keystore.c 		*auth_tok = NULL;
auth_tok          464 fs/ecryptfs/keystore.c 	if (ecryptfs_verify_version((*auth_tok)->version)) {
auth_tok          472 fs/ecryptfs/keystore.c 	if ((*auth_tok)->token_type != ECRYPTFS_PASSWORD
auth_tok          473 fs/ecryptfs/keystore.c 	    && (*auth_tok)->token_type != ECRYPTFS_PRIVATE_KEY) {
auth_tok          486 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok **auth_tok,
auth_tok          493 fs/ecryptfs/keystore.c 	(*auth_tok) = NULL;
auth_tok          515 fs/ecryptfs/keystore.c 				walker->global_auth_tok_key, auth_tok);
auth_tok          555 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok **auth_tok,
auth_tok          561 fs/ecryptfs/keystore.c 	rc = ecryptfs_find_global_auth_tok_for_sig(auth_tok_key, auth_tok,
auth_tok          573 fs/ecryptfs/keystore.c 		rc = ecryptfs_keyring_auth_tok_for_sig(auth_tok_key, auth_tok,
auth_tok          595 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok *auth_tok;
auth_tok          634 fs/ecryptfs/keystore.c 		&s->auth_tok, mount_crypt_stat,
auth_tok          735 fs/ecryptfs/keystore.c 	if (s->auth_tok->token_type != ECRYPTFS_PASSWORD) {
auth_tok          760 fs/ecryptfs/keystore.c 				 (u8 *)s->auth_tok->token.password.session_key_encryption_key,
auth_tok          761 fs/ecryptfs/keystore.c 				 s->auth_tok->token.password.session_key_encryption_key_bytes,
auth_tok          815 fs/ecryptfs/keystore.c 		s->auth_tok->token.password.session_key_encryption_key,
auth_tok          823 fs/ecryptfs/keystore.c 		       s->auth_tok->token.password.session_key_encryption_key,
auth_tok          865 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok *auth_tok;
auth_tok          961 fs/ecryptfs/keystore.c 					    &s->auth_tok, mount_crypt_stat,
auth_tok         1023 fs/ecryptfs/keystore.c 	if (s->auth_tok->token_type != ECRYPTFS_PASSWORD) {
auth_tok         1031 fs/ecryptfs/keystore.c 		s->auth_tok->token.password.session_key_encryption_key,
auth_tok         1039 fs/ecryptfs/keystore.c 		       s->auth_tok->token.password.session_key_encryption_key,
auth_tok         1097 fs/ecryptfs/keystore.c ecryptfs_get_auth_tok_sig(char **sig, struct ecryptfs_auth_tok *auth_tok)
auth_tok         1102 fs/ecryptfs/keystore.c 	switch (auth_tok->token_type) {
auth_tok         1104 fs/ecryptfs/keystore.c 		(*sig) = auth_tok->token.password.signature;
auth_tok         1107 fs/ecryptfs/keystore.c 		(*sig) = auth_tok->token.private_key.signature;
auth_tok         1111 fs/ecryptfs/keystore.c 		       auth_tok->token_type);
auth_tok         1125 fs/ecryptfs/keystore.c decrypt_pki_encrypted_session_key(struct ecryptfs_auth_tok *auth_tok,
auth_tok         1136 fs/ecryptfs/keystore.c 	rc = ecryptfs_get_auth_tok_sig(&auth_tok_sig, auth_tok);
auth_tok         1139 fs/ecryptfs/keystore.c 		       auth_tok->token_type);
auth_tok         1142 fs/ecryptfs/keystore.c 	rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
auth_tok         1161 fs/ecryptfs/keystore.c 	rc = parse_tag_65_packet(&(auth_tok->session_key),
auth_tok         1168 fs/ecryptfs/keystore.c 	auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
auth_tok         1169 fs/ecryptfs/keystore.c 	memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
auth_tok         1170 fs/ecryptfs/keystore.c 	       auth_tok->session_key.decrypted_key_size);
auth_tok         1171 fs/ecryptfs/keystore.c 	crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
auth_tok         1269 fs/ecryptfs/keystore.c 	(*new_auth_tok) = &auth_tok_list_item->auth_tok;
auth_tok         1403 fs/ecryptfs/keystore.c 	(*new_auth_tok) = &auth_tok_list_item->auth_tok;
auth_tok         1609 fs/ecryptfs/keystore.c 				      struct ecryptfs_auth_tok **auth_tok,
auth_tok         1626 fs/ecryptfs/keystore.c 	rc = ecryptfs_verify_auth_tok_from_key(*auth_tok_key, auth_tok);
auth_tok         1645 fs/ecryptfs/keystore.c decrypt_passphrase_encrypted_session_key(struct ecryptfs_auth_tok *auth_tok,
auth_tok         1658 fs/ecryptfs/keystore.c 			auth_tok->token.password.session_key_encryption_key_bytes);
auth_tok         1660 fs/ecryptfs/keystore.c 			auth_tok->token.password.session_key_encryption_key,
auth_tok         1661 fs/ecryptfs/keystore.c 			auth_tok->token.password.session_key_encryption_key_bytes);
auth_tok         1671 fs/ecryptfs/keystore.c 	rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
auth_tok         1672 fs/ecryptfs/keystore.c 				 auth_tok->session_key.encrypted_key_size,
auth_tok         1679 fs/ecryptfs/keystore.c 			auth_tok->session_key.encrypted_key_size);
auth_tok         1682 fs/ecryptfs/keystore.c 	auth_tok->session_key.decrypted_key_size =
auth_tok         1683 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size;
auth_tok         1684 fs/ecryptfs/keystore.c 	rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
auth_tok         1685 fs/ecryptfs/keystore.c 				 auth_tok->session_key.decrypted_key_size,
auth_tok         1707 fs/ecryptfs/keystore.c 		tfm, auth_tok->token.password.session_key_encryption_key,
auth_tok         1716 fs/ecryptfs/keystore.c 				   auth_tok->session_key.encrypted_key_size,
auth_tok         1724 fs/ecryptfs/keystore.c 	auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
auth_tok         1725 fs/ecryptfs/keystore.c 	memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
auth_tok         1726 fs/ecryptfs/keystore.c 	       auth_tok->session_key.decrypted_key_size);
auth_tok         1866 fs/ecryptfs/keystore.c 		candidate_auth_tok = &auth_tok_list_item->auth_tok;
auth_tok         1931 fs/ecryptfs/keystore.c 			    == &auth_tok_list_item->auth_tok) {
auth_tok         1961 fs/ecryptfs/keystore.c 			struct ecryptfs_auth_tok *auth_tok,
auth_tok         1971 fs/ecryptfs/keystore.c 	rc = write_tag_66_packet(auth_tok->token.private_key.signature,
auth_tok         2019 fs/ecryptfs/keystore.c 		   struct key *auth_tok_key, struct ecryptfs_auth_tok *auth_tok,
auth_tok         2030 fs/ecryptfs/keystore.c 	ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature,
auth_tok         2035 fs/ecryptfs/keystore.c 			auth_tok->session_key.encrypted_key[i];
auth_tok         2038 fs/ecryptfs/keystore.c 		       auth_tok->session_key.encrypted_key,
auth_tok         2039 fs/ecryptfs/keystore.c 		       auth_tok->session_key.encrypted_key_size);
auth_tok         2044 fs/ecryptfs/keystore.c 	if (auth_tok->session_key.encrypted_key_size == 0)
auth_tok         2045 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size =
auth_tok         2046 fs/ecryptfs/keystore.c 			auth_tok->token.private_key.key_size;
auth_tok         2047 fs/ecryptfs/keystore.c 	rc = pki_encrypt_session_key(auth_tok_key, auth_tok, crypt_stat,
auth_tok         2174 fs/ecryptfs/keystore.c 		   struct ecryptfs_auth_tok *auth_tok,
auth_tok         2194 fs/ecryptfs/keystore.c 	ecryptfs_from_hex(key_rec->sig, auth_tok->token.password.signature,
auth_tok         2214 fs/ecryptfs/keystore.c 	if (auth_tok->session_key.encrypted_key_size == 0)
auth_tok         2215 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size =
auth_tok         2220 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size = 32;
auth_tok         2222 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
auth_tok         2224 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size;
auth_tok         2226 fs/ecryptfs/keystore.c 	for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
auth_tok         2228 fs/ecryptfs/keystore.c 			auth_tok->session_key.encrypted_key[i];
auth_tok         2235 fs/ecryptfs/keystore.c 		       auth_tok->session_key.encrypted_key,
auth_tok         2239 fs/ecryptfs/keystore.c 	if (auth_tok->token.password.flags &
auth_tok         2243 fs/ecryptfs/keystore.c 				auth_tok->token.password.
auth_tok         2246 fs/ecryptfs/keystore.c 		       auth_tok->token.password.session_key_encryption_key,
auth_tok         2365 fs/ecryptfs/keystore.c 	memcpy(&dest[(*packet_size)], auth_tok->token.password.salt,
auth_tok         2403 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok *auth_tok;
auth_tok         2424 fs/ecryptfs/keystore.c 							   &auth_tok,
auth_tok         2433 fs/ecryptfs/keystore.c 		if (auth_tok->token_type == ECRYPTFS_PASSWORD) {
auth_tok         2435 fs/ecryptfs/keystore.c 						&max, auth_tok,
auth_tok         2456 fs/ecryptfs/keystore.c 		} else if (auth_tok->token_type == ECRYPTFS_PRIVATE_KEY) {
auth_tok         2458 fs/ecryptfs/keystore.c 						auth_tok_key, auth_tok,
auth_tok          188 fs/ecryptfs/main.c 	struct ecryptfs_auth_tok *auth_tok;
auth_tok          195 fs/ecryptfs/main.c 			&global_auth_tok->global_auth_tok_key, &auth_tok,
auth_tok           19 security/keys/encrypted-keys/ecryptfs_format.c u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok)
auth_tok           21 security/keys/encrypted-keys/ecryptfs_format.c 	return auth_tok->token.password.session_key_encryption_key;
auth_tok           48 security/keys/encrypted-keys/ecryptfs_format.c int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok,
auth_tok           54 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->version = (((uint16_t)(major << 8) & 0xFF00)
auth_tok           56 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token_type = ECRYPTFS_PASSWORD;
auth_tok           57 security/keys/encrypted-keys/ecryptfs_format.c 	strncpy((char *)auth_tok->token.password.signature, key_desc,
auth_tok           59 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.session_key_encryption_key_bytes =
auth_tok           67 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.flags |=
auth_tok           70 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->session_key.encrypted_key[0] = 0;
auth_tok           71 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->session_key.encrypted_key_size = 0;
auth_tok           73 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512;
auth_tok           74 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
auth_tok           22 security/keys/encrypted-keys/ecryptfs_format.h u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok);
auth_tok           24 security/keys/encrypted-keys/ecryptfs_format.h int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok,