candidate_auth_tok 1761 fs/ecryptfs/keystore.c 	struct ecryptfs_auth_tok *candidate_auth_tok;
candidate_auth_tok 1866 fs/ecryptfs/keystore.c 		candidate_auth_tok = &auth_tok_list_item->auth_tok;
candidate_auth_tok 1870 fs/ecryptfs/keystore.c 			ecryptfs_dump_auth_tok(candidate_auth_tok);
candidate_auth_tok 1873 fs/ecryptfs/keystore.c 					       candidate_auth_tok);
candidate_auth_tok 1877 fs/ecryptfs/keystore.c 			       candidate_auth_tok->token_type);
candidate_auth_tok 1897 fs/ecryptfs/keystore.c 	if (candidate_auth_tok->token_type == ECRYPTFS_PRIVATE_KEY) {
candidate_auth_tok 1898 fs/ecryptfs/keystore.c 		memcpy(&(candidate_auth_tok->token.private_key),
candidate_auth_tok 1903 fs/ecryptfs/keystore.c 		rc = decrypt_pki_encrypted_session_key(candidate_auth_tok,
candidate_auth_tok 1905 fs/ecryptfs/keystore.c 	} else if (candidate_auth_tok->token_type == ECRYPTFS_PASSWORD) {
candidate_auth_tok 1906 fs/ecryptfs/keystore.c 		memcpy(&(candidate_auth_tok->token.password),
candidate_auth_tok 1912 fs/ecryptfs/keystore.c 			candidate_auth_tok, crypt_stat);
candidate_auth_tok 1930 fs/ecryptfs/keystore.c 			if (candidate_auth_tok