new_auth_tok     1225 fs/ecryptfs/keystore.c 		   struct ecryptfs_auth_tok **new_auth_tok,
new_auth_tok     1234 fs/ecryptfs/keystore.c 	(*new_auth_tok) = NULL;
new_auth_tok     1269 fs/ecryptfs/keystore.c 	(*new_auth_tok) = &auth_tok_list_item->auth_tok;
new_auth_tok     1294 fs/ecryptfs/keystore.c 	ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature,
new_auth_tok     1300 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.encrypted_key_size =
new_auth_tok     1302 fs/ecryptfs/keystore.c 	if ((*new_auth_tok)->session_key.encrypted_key_size
new_auth_tok     1309 fs/ecryptfs/keystore.c 	memcpy((*new_auth_tok)->session_key.encrypted_key,
new_auth_tok     1311 fs/ecryptfs/keystore.c 	(*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
new_auth_tok     1312 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
new_auth_tok     1314 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags |=
new_auth_tok     1316 fs/ecryptfs/keystore.c 	(*new_auth_tok)->token_type = ECRYPTFS_PRIVATE_KEY;
new_auth_tok     1317 fs/ecryptfs/keystore.c 	(*new_auth_tok)->flags = 0;
new_auth_tok     1318 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
new_auth_tok     1320 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
new_auth_tok     1325 fs/ecryptfs/keystore.c 	(*new_auth_tok) = NULL;
new_auth_tok     1357 fs/ecryptfs/keystore.c 		   struct ecryptfs_auth_tok **new_auth_tok,
new_auth_tok     1366 fs/ecryptfs/keystore.c 	(*new_auth_tok) = NULL;
new_auth_tok     1403 fs/ecryptfs/keystore.c 	(*new_auth_tok) = &auth_tok_list_item->auth_tok;
new_auth_tok     1422 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.encrypted_key_size =
new_auth_tok     1424 fs/ecryptfs/keystore.c 	if ((*new_auth_tok)->session_key.encrypted_key_size
new_auth_tok     1449 fs/ecryptfs/keystore.c 			(*new_auth_tok)->session_key.encrypted_key_size;
new_auth_tok     1463 fs/ecryptfs/keystore.c 		memcpy((*new_auth_tok)->token.password.salt,
new_auth_tok     1467 fs/ecryptfs/keystore.c 		(*new_auth_tok)->token.password.hash_iterations =
new_auth_tok     1474 fs/ecryptfs/keystore.c 		memcpy((*new_auth_tok)->session_key.encrypted_key,
new_auth_tok     1476 fs/ecryptfs/keystore.c 		       (*new_auth_tok)->session_key.encrypted_key_size);
new_auth_tok     1478 fs/ecryptfs/keystore.c 			(*new_auth_tok)->session_key.encrypted_key_size;
new_auth_tok     1479 fs/ecryptfs/keystore.c 		(*new_auth_tok)->session_key.flags &=
new_auth_tok     1481 fs/ecryptfs/keystore.c 		(*new_auth_tok)->session_key.flags |=
new_auth_tok     1483 fs/ecryptfs/keystore.c 		(*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */
new_auth_tok     1491 fs/ecryptfs/keystore.c 	(*new_auth_tok)->token_type = ECRYPTFS_PASSWORD;
new_auth_tok     1494 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
new_auth_tok     1496 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
new_auth_tok     1501 fs/ecryptfs/keystore.c 	(*new_auth_tok) = NULL;
new_auth_tok     1764 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok *new_auth_tok;
new_auth_tok     1783 fs/ecryptfs/keystore.c 						&auth_tok_list, &new_auth_tok,
new_auth_tok     1818 fs/ecryptfs/keystore.c 			ecryptfs_to_hex(new_auth_tok->token.password.signature,
new_auth_tok     1820 fs/ecryptfs/keystore.c 			new_auth_tok->token.password.signature[
new_auth_tok     1827 fs/ecryptfs/keystore.c 						&auth_tok_list, &new_auth_tok,
new_auth_tok     2514 fs/ecryptfs/keystore.c 	struct ecryptfs_global_auth_tok *new_auth_tok;
new_auth_tok     2516 fs/ecryptfs/keystore.c 	new_auth_tok = kmem_cache_zalloc(ecryptfs_global_auth_tok_cache,
new_auth_tok     2518 fs/ecryptfs/keystore.c 	if (!new_auth_tok)
new_auth_tok     2521 fs/ecryptfs/keystore.c 	memcpy(new_auth_tok->sig, sig, ECRYPTFS_SIG_SIZE_HEX);
new_auth_tok     2522 fs/ecryptfs/keystore.c 	new_auth_tok->flags = global_auth_tok_flags;
new_auth_tok     2523 fs/ecryptfs/keystore.c 	new_auth_tok->sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
new_auth_tok     2525 fs/ecryptfs/keystore.c 	list_add(&new_auth_tok->mount_crypt_stat_list,