Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2218807/?format=api
{ "id": 2218807, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2218807/?format=api", "project": { "id": 22, "url": "http://patchwork.ozlabs.org/api/1.0/projects/22/?format=api", "name": "HostAP Development", "link_name": "hostap", "list_id": "hostap.lists.infradead.org", "list_email": "hostap@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260401220220.4418-19-andrei.otcheretianski@intel.com>", "date": "2026-04-01T22:01:27", "name": "[18/71] wpa_supplicant: Add support for NDP_RESPONSE command", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "bb47679c07703006322f21a04a06598229f093d0", "submitter": { "id": 62065, "url": "http://patchwork.ozlabs.org/api/1.0/people/62065/?format=api", "name": "Andrei Otcheretianski", "email": "andrei.otcheretianski@intel.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260401220220.4418-19-andrei.otcheretianski@intel.com/mbox/", "series": [ { "id": 498402, "url": "http://patchwork.ozlabs.org/api/1.0/series/498402/?format=api", "date": "2026-04-01T22:01:09", "name": "NAN Data Path and Bootstrapping support", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/498402/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2218807/checks/", "tags": {}, "headers": { "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=0GMUGjGc;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=fiTz+jSe;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fmJwZ3sPxz1yFv\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 02 Apr 2026 09:06:22 +1100 (AEDT)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w83h8-0000000GAKB-1FzK;\n\tWed, 01 Apr 2026 22:05:50 +0000", "from mgamail.intel.com ([198.175.65.20])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w83gs-0000000G9is-1OMt\n\tfor hostap@lists.infradead.org;\n\tWed, 01 Apr 2026 22:05:36 +0000", "from fmviesa003.fm.intel.com ([10.60.135.143])\n by orvoesa112.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 Apr 2026 15:05:33 -0700", "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n by fmviesa003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 Apr 2026 15:05:32 -0700" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=fW2UaPQ9Zc0AIrCPXKrCSH8OWb7OHxtnYIAfaeQFTkY=; b=0GMUGjGcxXsQR7\n\tJYXIxcCV8/mhcux2n8CQdBF1rWirq4LMaXOOuNo6OKsVQSJc6ipQ/FJyEtZvPyt6SnYokn8oJCnpB\n\tTow23W/G03D9ofMNM/Ti37GxNsbLLjaYA5fPkVm4/e9aTvhDmyppkhdVl3SA2/KkbwRDUCkc1xdzn\n\tneGptaSSxWIO3AwLhzAa7mm/ghD+gKkcKXN0svuN25x1/71iqRHjupidNR+ikgGnoIrHiQQEOcahu\n\tJEGjtYtjrbcH8dtNLAOr+sBu3XB544RDigjqbIcvS90IB2LbMRQfPNqGvNnX1Ii39qvNI84VdLSpd\n\tdoE5r0gxsrPkAyira6uA==;", "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1775081134; x=1806617134;\n h=from:to:subject:date:message-id:in-reply-to:references:\n mime-version:content-transfer-encoding;\n bh=1XRBd7WzHXeuJ583k5fJJxGgXyP27QnJYSFNge3FGsU=;\n b=fiTz+jSe0ds9oqU7CLvIh8mu4Utfw1oqdiYfEWsaBBLOy0zovpSJDFyn\n g2uOLkyjYQaQpvaLX91pBqBHA+Bif/8QDZUCfoHXtJsykcbu9B6eIUIe6\n Mw7/ekz528IdbMLNIHmcdhFQRDfw9voFKc3AOR96B2ydbGIMlHJxgGPk4\n 8PTwq+EMWAgP+lxqwG3aR9OmFT0jU1b+WS/CxhPTFnZPXHtaMLfMvRJXF\n 1ic/tkT5JmKDhGxgQmeEUN2UrQ/JgGfeV0DLxls7znZkma6QGaVBBJQou\n 00mfm0pche/CRFxrSiDGoXwR9XzuBBknA0VKjUfsDol49gnCuWX8lW11S\n Q==;" ], "X-CSE-ConnectionGUID": [ "3MEuY8OBTuCF0sCBRgWJ8g==", "4ZHQRSJiTuumNto4qF+JYw==" ], "X-CSE-MsgGUID": [ "2xx5ODnIQhyVrhwl5qrdsA==", "AEzgtWJvRlKtyqTrpOIRLA==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6800,10657,11746\"; a=\"75851593\"", "E=Sophos;i=\"6.23,153,1770624000\";\n d=\"scan'208\";a=\"75851593\"" ], "X-ExtLoop1": "1", "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>", "To": "hostap@lists.infradead.org", "Subject": "[PATCH 18/71] wpa_supplicant: Add support for NDP_RESPONSE command", "Date": "Thu, 2 Apr 2026 01:01:27 +0300", "Message-ID": "<20260401220220.4418-19-andrei.otcheretianski@intel.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260401220220.4418-1-andrei.otcheretianski@intel.com>", "References": "<20260401220220.4418-1-andrei.otcheretianski@intel.com>", "MIME-Version": "1.0", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260401_150534_462755_1DC7BC68 ", "X-CRM114-Status": "GOOD ( 16.32 )", "X-Spam-Score": "-1.9 (-)", "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam. The original\n message has been attached to this so you can view it or label\n similar future email. If you have any questions, see\n the administrator of that system for details.\n Content preview: This allows to accept or reject NDP request. Upper layer is\n expected to create the corresponding NAN data interface and configure a\n compliant\n NAN schedule prior to accepting an NDP request received vi [...]\n Content analysis details: (-1.9 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED RBL: Sender listed at https://www.dnswl.org/,\n medium trust\n [198.175.65.20 listed in list.dnswl.org]\n 1.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.20 listed in\n bl.score.senderscore.com]\n 1.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n query to Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.20 listed in\n sa-trusted.bondedsender.org]\n 1.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.20 listed in sa-accredit.habeas.com]\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS SPF: sender matches SPF record\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n -0.5 DKIMWL_WL_HIGH DKIMwl.org - High trust sender", "X-BeenThere": "hostap@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<hostap.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>", "List-Post": "<mailto:hostap@lists.infradead.org>", "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>", "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "This allows to accept or reject NDP request.\nUpper layer is expected to create the corresponding NAN data interface\nand configure a compliant NAN schedule prior to accepting an NDP request\nreceived via NAN-NDP-REQUEST event.\n\nSigned-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>\n---\n wpa_supplicant/ctrl_iface.c | 3 +\n wpa_supplicant/nan_supplicant.c | 168 ++++++++++++++++++++++++++++++++\n wpa_supplicant/nan_supplicant.h | 1 +\n 3 files changed, 172 insertions(+)", "diff": "diff --git a/wpa_supplicant/ctrl_iface.c b/wpa_supplicant/ctrl_iface.c\nindex dabbf57940..395f809063 100644\n--- a/wpa_supplicant/ctrl_iface.c\n+++ b/wpa_supplicant/ctrl_iface.c\n@@ -14404,6 +14404,9 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,\n \t} else if (os_strncmp(buf, \"NAN_NDP_REQUEST \", 16) == 0) {\n \t\tif (wpas_nan_ndp_request(wpa_s, buf + 16) < 0)\n \t\t\treply_len = -1;\n+\t} else if (os_strncmp(buf, \"NAN_NDP_RESPONSE \", 17) == 0) {\n+\t\tif (wpas_nan_ndp_response(wpa_s, buf + 17) < 0)\n+\t\t\treply_len = -1;\n #endif /* CONFIG_NAN */\n \t} else {\n \t\tos_memcpy(reply, \"UNKNOWN COMMAND\\n\", 16);\ndiff --git a/wpa_supplicant/nan_supplicant.c b/wpa_supplicant/nan_supplicant.c\nindex d056dcb45e..f074321e8e 100644\n--- a/wpa_supplicant/nan_supplicant.c\n+++ b/wpa_supplicant/nan_supplicant.c\n@@ -1385,6 +1385,174 @@ fail:\n }\n \n \n+/* Command format NAN_NDP_RESPONSE accept|reject peer_nmi=<nmi>\n+ [reason_code=<reject_reason>]\n+ [ndi=<ifname> handle=<service_handle> init_ndi=<ndi>\n+ ndp_id=<id> [ssi=<hexdata>] [qos=<slots:latency>]] */\n+int wpas_nan_ndp_response(struct wpa_supplicant *wpa_s, char *cmd)\n+{\n+\tstruct nan_ndp_params ndp;\n+\tstruct wpabuf *ssi_buf = NULL;\n+\tchar *token, *context = NULL;\n+\tchar *pos;\n+\tint ret = -1;\n+\n+\tos_memset(&ndp, 0, sizeof(ndp));\n+\n+\tif (!wpas_nan_ready(wpa_s))\n+\t\treturn -1;\n+\n+\tndp.type = NAN_NDP_ACTION_RESP;\n+\tndp.qos.min_slots = NAN_QOS_MIN_SLOTS_NO_PREF;\n+\tndp.qos.max_latency = NAN_QOS_MAX_LATENCY_NO_PREF;\n+\n+\t/* Parse accept/reject status - first parameter is mandatory */\n+\ttoken = str_token(cmd, \" \", &context);\n+\tif (!token) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Missing accept/reject parameter\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (os_strcmp(token, \"accept\") == 0) {\n+\t\tndp.u.resp.status = NAN_NDP_STATUS_ACCEPTED;\n+\t} else if (os_strcmp(token, \"reject\") == 0) {\n+\t\tndp.u.resp.status = NAN_NDP_STATUS_REJECTED;\n+\t} else {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Invalid accept/reject parameter: %s\", token);\n+\t\treturn -1;\n+\t}\n+\n+\t/* Parse optional parameters */\n+\twhile ((token = str_token(cmd, \" \", &context))) {\n+\t\tpos = os_strchr(token, '=');\n+\t\tif (!pos) {\n+\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t \"NAN: Invalid parameter format: %s\",\n+\t\t\t\t token);\n+\t\t\tgoto fail;\n+\t\t}\n+\t\t*pos++ = '\\0';\n+\n+\t\tif (os_strcmp(token, \"reason_code\") == 0) {\n+\t\t\tndp.u.resp.reason_code = atoi(pos);\n+\t\t} else if (os_strcmp(token, \"ndi\") == 0) {\n+\t\t\tstruct wpa_supplicant *ndi_wpa_s;\n+\n+\t\t\tndi_wpa_s = wpa_supplicant_get_iface(wpa_s->global, pos);\n+\t\t\tif (!ndi_wpa_s) {\n+\t\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t\t \"NAN: NDI interface not found: %s\",\n+\t\t\t\t\t pos);\n+\t\t\t\tgoto fail;\n+\t\t\t}\n+\n+\t\t\tif (!ndi_wpa_s->nan_data) {\n+\t\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t\t \"NAN: Interface %s is not a NAN data interface\",\n+\t\t\t\t\t pos);\n+\t\t\t\tgoto fail;\n+\t\t\t}\n+\n+\t\t\tos_memcpy(ndp.u.resp.resp_ndi, ndi_wpa_s->own_addr,\n+\t\t\t\t ETH_ALEN);\n+\n+\t\t} else if (os_strcmp(token, \"peer_nmi\") == 0) {\n+\t\t\tif (hwaddr_aton(pos, ndp.ndp_id.peer_nmi) < 0) {\n+\t\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t\t \"NAN: Invalid peer NMI address: %s\",\n+\t\t\t\t\t pos);\n+\t\t\t\tgoto fail;\n+\t\t\t}\n+\t\t} else if (os_strcmp(token, \"ndp_id\") == 0) {\n+\t\t\tndp.ndp_id.id = atoi(pos);\n+\n+\t\t} else if (os_strcmp(token, \"init_ndi\") == 0) {\n+\t\t\tif (hwaddr_aton(pos, ndp.ndp_id.init_ndi) < 0) {\n+\t\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t\t \"NAN: Invalid initiator NDI address: %s\",\n+\t\t\t\t\t pos);\n+\t\t\t\tgoto fail;\n+\t\t\t}\n+\n+\t\t} else if (os_strcmp(token, \"ssi\") == 0) {\n+\t\t\tssi_buf = wpabuf_parse_bin(pos);\n+\t\t\tif (!ssi_buf) {\n+\t\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t\t \"NAN: Invalid SSI data: %s\", pos);\n+\t\t\t\tgoto fail;\n+\t\t\t}\n+\n+\t\t\tndp.ssi_len = wpabuf_len(ssi_buf);\n+\t\t\tndp.ssi = wpabuf_head(ssi_buf);\n+\t\t} else if (os_strcmp(token, \"qos\") == 0) {\n+\t\t\tif (sscanf(pos, \"%hhu:%hu\",\n+\t\t\t\t &ndp.qos.min_slots,\n+\t\t\t\t &ndp.qos.max_latency) != 2) {\n+\t\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t\t \"NAN: Invalid QoS parameter: %s\",\n+\t\t\t\t\t pos);\n+\t\t\t\tgoto fail;\n+\t\t\t}\n+\t\t} else {\n+\t\t\twpa_printf(MSG_DEBUG, \"NAN: Unknown parameter: %s\",\n+\t\t\t\t token);\n+\t\t}\n+\t}\n+\n+\t/* Validate required parameters for accept case */\n+\tif (ndp.u.resp.status == NAN_NDP_STATUS_ACCEPTED) {\n+\t\tif (is_zero_ether_addr(ndp.u.resp.resp_ndi)) {\n+\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t \"NAN: Missing required parameter for accept: ndi\");\n+\t\t\tgoto fail;\n+\t\t}\n+\t}\n+\n+\t/* Validate common required parameters */\n+\tif (is_zero_ether_addr(ndp.ndp_id.peer_nmi)) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t \"NAN: Missing required parameter: peer_nmi\");\n+\t\tgoto fail;\n+\t}\n+\n+\tif (is_zero_ether_addr(ndp.ndp_id.init_ndi)) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t \"NAN: Missing required parameter: init_ndi\");\n+\t\tgoto fail;\n+\t}\n+\n+\tif (!ndp.ndp_id.id) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t \"NAN: Missing required parameter: ndp_id\");\n+\t\tgoto fail;\n+\t}\n+\n+\twpa_printf(MSG_DEBUG, \"NAN: %s NDP response for peer \" MACSTR\n+\t\t \" ndp_id=%u\",\n+\t\t ndp.u.resp.status == NAN_NDP_STATUS_ACCEPTED ? \"Accepting\" : \"Rejecting\",\n+\t\t MAC2STR(ndp.ndp_id.peer_nmi), ndp.ndp_id.id);\n+\n+\tif (wpas_nan_set_ndp_schedule(wpa_s, &ndp) < 0) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t \"NAN: Failed to set NDP schedule\");\n+\t\tgoto fail;\n+\t}\n+\n+\t/* If we initiated the NDP setup, this must be the confirmation */\n+\tif (ether_addr_equal(ndp.u.resp.resp_ndi, ndp.ndp_id.init_ndi))\n+\t\tndp.type = NAN_NDP_ACTION_CONF;\n+\n+\tret = nan_handle_ndp_setup(wpa_s->nan, &ndp);\n+\tif (ret < 0)\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Failed to handle NDP response\");\n+\n+fail:\n+\twpabuf_free(ndp.sched.elems);\n+\twpabuf_free(ssi_buf);\n+\treturn ret;\n+}\n+\n+\n void wpas_nan_cluster_join(struct wpa_supplicant *wpa_s,\n \t\t\t const u8 *cluster_id,\n \t\t\t bool new_cluster)\ndiff --git a/wpa_supplicant/nan_supplicant.h b/wpa_supplicant/nan_supplicant.h\nindex c5e1f58a17..12274d8f5f 100644\n--- a/wpa_supplicant/nan_supplicant.h\n+++ b/wpa_supplicant/nan_supplicant.h\n@@ -28,6 +28,7 @@ int wpas_nan_sched_config_map(struct wpa_supplicant *wpa_s, const char *cmd);\n int wpas_nan_ndp_request(struct wpa_supplicant *wpa_s, char *cmd);\n void wpas_nan_rx_naf(struct wpa_supplicant *wpa_s,\n \t\t const struct ieee80211_mgmt *mgmt, size_t len);\n+int wpas_nan_ndp_response(struct wpa_supplicant *wpa_s, char *cmd);\n \n #else /* CONFIG_NAN */\n \n", "prefixes": [ "18/71" ] }