candidate_auth_tok 1761 fs/ecryptfs/keystore.c struct ecryptfs_auth_tok *candidate_auth_tok; candidate_auth_tok 1866 fs/ecryptfs/keystore.c candidate_auth_tok = &auth_tok_list_item->auth_tok; candidate_auth_tok 1870 fs/ecryptfs/keystore.c ecryptfs_dump_auth_tok(candidate_auth_tok); candidate_auth_tok 1873 fs/ecryptfs/keystore.c candidate_auth_tok); candidate_auth_tok 1877 fs/ecryptfs/keystore.c candidate_auth_tok->token_type); candidate_auth_tok 1897 fs/ecryptfs/keystore.c if (candidate_auth_tok->token_type == ECRYPTFS_PRIVATE_KEY) { candidate_auth_tok 1898 fs/ecryptfs/keystore.c memcpy(&(candidate_auth_tok->token.private_key), candidate_auth_tok 1903 fs/ecryptfs/keystore.c rc = decrypt_pki_encrypted_session_key(candidate_auth_tok, candidate_auth_tok 1905 fs/ecryptfs/keystore.c } else if (candidate_auth_tok->token_type == ECRYPTFS_PASSWORD) { candidate_auth_tok 1906 fs/ecryptfs/keystore.c memcpy(&(candidate_auth_tok->token.password), candidate_auth_tok 1912 fs/ecryptfs/keystore.c candidate_auth_tok, crypt_stat); candidate_auth_tok 1930 fs/ecryptfs/keystore.c if (candidate_auth_tok