Searched refs:PTK_valid (Results 1 – 3 of 3) sorted by relevance
730 sm->PTK_valid = 0; in wpa_request_new_ptk()891 sm->PTK_valid = TRUE; in wpa_try_alt_snonce()1165 !sm->PTK_valid) { in wpa_receive()1175 || !sm->PTK_valid) { in wpa_receive()1213 if (sm->PTK_valid && !sm->update_snonce) { in wpa_receive()1555 if (!sm->PTK_valid || !mic_len) { in __wpa_send_eapol()1651 sm->PTK_valid = FALSE; in wpa_remove_ptk()1761 sm->PTK_valid = FALSE; in wpa_auth_sm_event()1836 sm->PTK_valid = FALSE; in SM_STATE()2108 sm->PTK_valid = TRUE; in fils_auth_pmk_to_ptk()[all …]
62 Boolean PTK_valid; member
2163 sm->PTK_valid = TRUE; in wpa_ft_process_auth_req()