From: Sai Pratyusha Magam Date: Mon, 8 Dec 2025 00:16:48 +0000 (+0530) Subject: AP: Fetch BIGTK PN from the transmitting BSS in non-MLO cases X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=13f0e68d93546c1f1a851d6ec1b1528bf800cae1;p=thirdparty%2Fhostap.git AP: Fetch BIGTK PN from the transmitting BSS in non-MLO cases BIGTK is set and configured to the driver on the transmitting BSS and the non-transmitting BSSs use the BIGTK key from the Tx BSS, so use the Tx BSS authenticator while fetching BIGTK PN in ieee80211w_kde_add() for non-MLO cases. For MLO cases this is already handled correctly in wpa_auth_ml_get_key_info(). Signed-off-by: Sai Pratyusha Magam --- diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c index 49268b21e..b28675cb4 100644 --- a/src/ap/wpa_auth.c +++ b/src/ap/wpa_auth.c @@ -4211,7 +4211,7 @@ static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos) bigtk.keyid[0] = gsm->GN_bigtk; bigtk.keyid[1] = 0; if (gsm->wpa_group_state != WPA_GROUP_SETKEYSDONE || - wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_bigtk, rsc) < 0) + wpa_auth_get_seqnum(wpa_auth, NULL, gsm->GN_bigtk, rsc) < 0) os_memset(bigtk.pn, 0, sizeof(bigtk.pn)); else os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn));