Searched refs:PTK_valid (Results 1 – 3 of 3) sorted by relevance
709 sm->PTK_valid = 0; in wpa_request_new_ptk()868 sm->PTK_valid = TRUE; in wpa_try_alt_snonce()1189 !sm->PTK_valid) { in wpa_receive()1199 || !sm->PTK_valid) { in wpa_receive()1216 if (!sm->PTK_valid) { in wpa_receive()1249 if (sm->PTK_valid && !sm->update_snonce) { in wpa_receive()1576 if (!sm->PTK_valid) { in __wpa_send_eapol()1671 sm->PTK_valid = FALSE; in wpa_remove_ptk()1760 sm->PTK_valid = FALSE; in wpa_auth_sm_event()1828 sm->PTK_valid = FALSE; in SM_STATE()[all …]
66 Boolean PTK_valid; member
900 sm->PTK_valid = TRUE; in wpa_ft_process_auth_req()