new_auth_tok 1225 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok **new_auth_tok, new_auth_tok 1234 fs/ecryptfs/keystore.c (*new_auth_tok) = NULL; new_auth_tok 1269 fs/ecryptfs/keystore.c (*new_auth_tok) = &auth_tok_list_item->auth_tok; new_auth_tok 1294 fs/ecryptfs/keystore.c ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, new_auth_tok 1300 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size = new_auth_tok 1302 fs/ecryptfs/keystore.c if ((*new_auth_tok)->session_key.encrypted_key_size new_auth_tok 1309 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->session_key.encrypted_key, new_auth_tok 1311 fs/ecryptfs/keystore.c (*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size; new_auth_tok 1312 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= new_auth_tok 1314 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags |= new_auth_tok 1316 fs/ecryptfs/keystore.c (*new_auth_tok)->token_type = ECRYPTFS_PRIVATE_KEY; new_auth_tok 1317 fs/ecryptfs/keystore.c (*new_auth_tok)->flags = 0; new_auth_tok 1318 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= new_auth_tok 1320 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= new_auth_tok 1325 fs/ecryptfs/keystore.c (*new_auth_tok) = NULL; new_auth_tok 1357 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok **new_auth_tok, new_auth_tok 1366 fs/ecryptfs/keystore.c (*new_auth_tok) = NULL; new_auth_tok 1403 fs/ecryptfs/keystore.c (*new_auth_tok) = &auth_tok_list_item->auth_tok; new_auth_tok 1422 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size = new_auth_tok 1424 fs/ecryptfs/keystore.c if ((*new_auth_tok)->session_key.encrypted_key_size new_auth_tok 1449 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size; new_auth_tok 1463 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->token.password.salt, new_auth_tok 1467 fs/ecryptfs/keystore.c (*new_auth_tok)->token.password.hash_iterations = new_auth_tok 1474 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->session_key.encrypted_key, new_auth_tok 1476 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size); new_auth_tok 1478 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size; new_auth_tok 1479 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= new_auth_tok 1481 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags |= new_auth_tok 1483 fs/ecryptfs/keystore.c (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ new_auth_tok 1491 fs/ecryptfs/keystore.c (*new_auth_tok)->token_type = ECRYPTFS_PASSWORD; new_auth_tok 1494 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= new_auth_tok 1496 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= new_auth_tok 1501 fs/ecryptfs/keystore.c (*new_auth_tok) = NULL; new_auth_tok 1764 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *new_auth_tok; new_auth_tok 1783 fs/ecryptfs/keystore.c &auth_tok_list, &new_auth_tok, new_auth_tok 1818 fs/ecryptfs/keystore.c ecryptfs_to_hex(new_auth_tok->token.password.signature, new_auth_tok 1820 fs/ecryptfs/keystore.c new_auth_tok->token.password.signature[ new_auth_tok 1827 fs/ecryptfs/keystore.c &auth_tok_list, &new_auth_tok, new_auth_tok 2514 fs/ecryptfs/keystore.c struct ecryptfs_global_auth_tok *new_auth_tok; new_auth_tok 2516 fs/ecryptfs/keystore.c new_auth_tok = kmem_cache_zalloc(ecryptfs_global_auth_tok_cache, new_auth_tok 2518 fs/ecryptfs/keystore.c if (!new_auth_tok) new_auth_tok 2521 fs/ecryptfs/keystore.c memcpy(new_auth_tok->sig, sig, ECRYPTFS_SIG_SIZE_HEX); new_auth_tok 2522 fs/ecryptfs/keystore.c new_auth_tok->flags = global_auth_tok_flags; new_auth_tok 2523 fs/ecryptfs/keystore.c new_auth_tok->sig[ECRYPTFS_SIG_SIZE_HEX] = '\0'; new_auth_tok 2525 fs/ecryptfs/keystore.c list_add(&new_auth_tok->mount_crypt_stat_list,