Searched refs:PTK_valid (Results 1 – 3 of 3) sorted by relevance
723 sm->PTK_valid = 0; in wpa_request_new_ptk()884 sm->PTK_valid = TRUE; in wpa_try_alt_snonce()1161 !sm->PTK_valid) { in wpa_receive()1171 || !sm->PTK_valid) { in wpa_receive()1188 if (!sm->PTK_valid) { in wpa_receive()1231 if (sm->PTK_valid && !sm->update_snonce) { in wpa_receive()1581 if (!sm->PTK_valid || !mic_len) { in __wpa_send_eapol()1674 sm->PTK_valid = FALSE; in wpa_remove_ptk()1771 sm->PTK_valid = FALSE; in wpa_auth_sm_event()1839 sm->PTK_valid = FALSE; in SM_STATE()[all …]
59 Boolean PTK_valid; member
1008 sm->PTK_valid = TRUE; in wpa_ft_process_auth_req()