Home
last modified time | relevance | path

Searched refs:PTK_valid (Results 1 - 6 of 6) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_i.h66 bool PTK_valid; member
H A Dwpa_auth.c841 sm->PTK_valid = 0; in wpa_request_new_ptk()
1021 sm->PTK_valid = true; in wpa_try_alt_snonce()
1290 !sm->PTK_valid) { in wpa_receive()
1299 || !sm->PTK_valid) { in wpa_receive()
1336 if (sm->PTK_valid && !sm->update_snonce) { in wpa_receive()
1696 if (!sm->PTK_valid || !mic_len) { in __wpa_send_eapol()
1804 sm->PTK_valid = false; in wpa_remove_ptk()
1945 sm->PTK_valid = false; in wpa_auth_sm_event()
2020 sm->PTK_valid = false; in SM_STATE()
2399 sm->PTK_valid in fils_auth_pmk_to_ptk()
[all...]
H A Dwpa_auth_ft.c3213 sm->PTK_valid = true; in wpa_ft_process_auth_req()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_i.h64 Boolean PTK_valid; member
H A Dwpa_auth.c764 sm->PTK_valid = 0; in wpa_request_new_ptk()
944 sm->PTK_valid = TRUE; in wpa_try_alt_snonce()
1210 !sm->PTK_valid) { in wpa_receive()
1220 || !sm->PTK_valid) { in wpa_receive()
1258 if (sm->PTK_valid && !sm->update_snonce) { in wpa_receive()
1617 if (!sm->PTK_valid || !mic_len) { in __wpa_send_eapol()
1722 sm->PTK_valid = FALSE; in wpa_remove_ptk()
1841 sm->PTK_valid = FALSE; in wpa_auth_sm_event()
1916 sm->PTK_valid = FALSE; in SM_STATE()
2275 sm->PTK_valid in fils_auth_pmk_to_ptk()
[all...]
H A Dwpa_auth_ft.c3017 sm->PTK_valid = TRUE; in wpa_ft_process_auth_req()

Completed in 22 milliseconds