From: Andrei Otcheretianski Date: Tue, 6 Dec 2022 09:46:08 +0000 (+0200) Subject: SME: Accept Authentication frame from an MLD AP X-Git-Tag: hostap_2_11~1374 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=8c0f83ae889f8acfed1ecc2dc5ffe978efebad36;p=thirdparty%2Fhostap.git SME: Accept Authentication frame from an MLD AP The driver is expected to translate the link addresses to MLD addresses when processing an Authentication frame from a MLD AP. Thus, accept Authentication frame when the peer matches the expected MLD address. Signed-off-by: Ilan Peer Signed-off-by: Andrei Otcheretianski --- diff --git a/wpa_supplicant/sme.c b/wpa_supplicant/sme.c index af906448d..feb3b114b 100644 --- a/wpa_supplicant/sme.c +++ b/wpa_supplicant/sme.c @@ -1849,7 +1849,9 @@ void sme_event_auth(struct wpa_supplicant *wpa_s, union wpa_event_data *data) return; } - if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { + if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0 && + !(wpa_s->valid_links && + os_memcmp(wpa_s->ap_mld_addr, data->auth.peer, ETH_ALEN) == 0)) { wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication with " "unexpected peer " MACSTR, MAC2STR(data->auth.peer));