Searched refs:PTK_valid (Results 1 – 3 of 3) sorted by relevance
745 sm->PTK_valid = 0; in wpa_request_new_ptk()924 sm->PTK_valid = TRUE; in wpa_try_alt_snonce()1190 !sm->PTK_valid) { in wpa_receive()1200 || !sm->PTK_valid) { in wpa_receive()1238 if (sm->PTK_valid && !sm->update_snonce) { in wpa_receive()1595 if (!sm->PTK_valid || !mic_len) { in __wpa_send_eapol()1697 sm->PTK_valid = FALSE; in wpa_remove_ptk()1813 sm->PTK_valid = FALSE; in wpa_auth_sm_event()1888 sm->PTK_valid = FALSE; in SM_STATE()2212 sm->PTK_valid = TRUE; in fils_auth_pmk_to_ptk()[all …]
64 Boolean PTK_valid; member
3006 sm->PTK_valid = TRUE; in wpa_ft_process_auth_req()