[PATCH] Beacon protection with MBSSID: Fix getting correct pn for bigtk
Nikita Chernikov
nchernikov at maxlinear.com
Thu Jan 15 02:18:28 PST 2026
>From d0bdc5446f1d3d924d08f17f97187ff4a6407515 Mon Sep 17 00:00:00 2001
From: Nikita Chernikov <nchernikov at maxlinear.com>
Date: Thu, 15 Jan 2026 01:51:42 -0800
Subject: [PATCH] Beacon protection with MBSSID: Fix getting correct pn for bigtk
To: hostap at lists.infradead.org
When STA is connecting to a MBSSID non-TX BSS, pn for bigtk is requested from a non beaconing BSS,
when it should be requested for the TX BSS in MBSSID.
This is due to pn is requested from original auth when it should be requested from the tx_bss_auth
which exists and replaced in case of MBSSID.
Signed-off-by: Nikita Chernikov <nchernikov at maxlinear.com>
---
src/ap/wpa_auth.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c
index 49268b21e..b28675cb4 100644
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -4211,7 +4211,7 @@ static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos)
bigtk.keyid[0] = gsm->GN_bigtk;
bigtk.keyid[1] = 0;
if (gsm->wpa_group_state != WPA_GROUP_SETKEYSDONE ||
- wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_bigtk, rsc) < 0)
+ wpa_auth_get_seqnum(wpa_auth, NULL, gsm->GN_bigtk, rsc) < 0)
os_memset(bigtk.pn, 0, sizeof(bigtk.pn));
else
os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn));
--
2.43.5
More information about the Hostap
mailing list