From: Sai Pratyusha Magam Date: Tue, 30 Sep 2025 10:17:48 +0000 (+0530) Subject: AP MLD: Set RSC=0 for group key handshake message 1 for MLO X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7de29cf86c218a5bc33e8481fe116eaaae3b6fcf;p=thirdparty%2Fhostap.git AP MLD: Set RSC=0 for group key handshake message 1 for MLO Per IEEE Std 802.11be-2024, 12.7.7.2 (Group key handshake message 1), the RSC field contains PN for the GTK for non-MLO and 0 for MLO. So for multi-link association, avoid an explicit GTK PN fetch from the driver/firmware and instead leave the RSC field to the initialized 0. Signed-off-by: Sai Pratyusha Magam --- diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c index 625b99969..7b324670d 100644 --- a/src/ap/wpa_auth.c +++ b/src/ap/wpa_auth.c @@ -5455,8 +5455,9 @@ SM_STATE(WPA_PTK_GROUP, REKEYNEGOTIATING) sm->TimeoutEvt = false; /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */ os_memset(rsc, 0, WPA_KEY_RSC_LEN); - if (gsm->wpa_group_state == WPA_GROUP_SETKEYSDONE) + if (gsm->wpa_group_state == WPA_GROUP_SETKEYSDONE && !is_mld) wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc); + wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG, "sending 1/2 msg of Group Key Handshake");