FT: Store PTKSA entry for the correct BSSID in the FT protocol case
sm->bssid has not yet been updated here, so use the provided bssid
instead. This avoids replacing the PTKSA entry for the previous AP when
a new PTKSA is being stored while using the FT protocol.
Fixes: d70060f966
("WPA: Add PTKSA cache to wpa_supplicant for PASN")
Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
This commit is contained in:
parent
3f3e356fa0
commit
91ad7a3098
1 changed files with 1 additions and 1 deletions
|
@ -511,7 +511,7 @@ static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid)
|
|||
}
|
||||
sm->tk_set = true;
|
||||
|
||||
wpa_sm_store_ptk(sm, sm->bssid, sm->pairwise_cipher,
|
||||
wpa_sm_store_ptk(sm, bssid, sm->pairwise_cipher,
|
||||
sm->dot11RSNAConfigPMKLifetime, &sm->ptk);
|
||||
return 0;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue