Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2218858/?format=api
{ "id": 2218858, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2218858/?format=api", "project": { "id": 22, "url": "http://patchwork.ozlabs.org/api/1.0/projects/22/?format=api", "name": "HostAP Development", "link_name": "hostap", "list_id": "hostap.lists.infradead.org", "list_email": "hostap@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260401220220.4418-70-andrei.otcheretianski@intel.com>", "date": "2026-04-01T22:02:18", "name": "[69/71] wpa_supplicant: Support NAN_BOOTSTRAP command", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "53fd9a912e3d178e3103492083d2c652e2dfe782", "submitter": { "id": 62065, "url": "http://patchwork.ozlabs.org/api/1.0/people/62065/?format=api", "name": "Andrei Otcheretianski", "email": "andrei.otcheretianski@intel.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260401220220.4418-70-andrei.otcheretianski@intel.com/mbox/", "series": [ { "id": 498402, "url": "http://patchwork.ozlabs.org/api/1.0/series/498402/?format=api", "date": "2026-04-01T22:01:09", "name": "NAN Data Path and Bootstrapping support", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/498402/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2218858/checks/", "tags": {}, "headers": { "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=RvJhOZeI;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=mVsvBVC/;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fmK286j1nz1yFv\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 02 Apr 2026 09:11:12 +1100 (AEDT)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w83lg-0000000GGWU-02NC;\n\tWed, 01 Apr 2026 22:10:32 +0000", "from mgamail.intel.com ([198.175.65.20])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w83iE-0000000G9is-04fO\n\tfor hostap@lists.infradead.org;\n\tWed, 01 Apr 2026 22:07:04 +0000", "from fmviesa003.fm.intel.com ([10.60.135.143])\n by orvoesa112.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 Apr 2026 15:06:23 -0700", "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n by fmviesa003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 Apr 2026 15:06:22 -0700" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=YbwMShfFWSDQ4tsj0rqNedijO9rv3toYmY41B6MLPKA=; b=RvJhOZeIG62ogE\n\t+Ya6lXlUzmtd3di5UnDwOjYfQZKO+Kx5Dx3yIeZgdlbXXJiSKEtO766C04ap1R02gCo8cmfXRDhp8\n\tCuf2yqeJU/4XEfMpOC2y9AXtj+tZ7nE8Nq7Ye3JfGBWFSiZ2Ty/KIks959it1OV9X15RLXceP+ktl\n\tcz6nW8f0y0RvzNB918/TonsvI7ZhXZNaPm446b7REWZWXv21fULicoRY/zeGb5Ev5zZY5Xb7XGjv4\n\twXtt777qBn8wEzABIJfL3/ZZUcLL9VS+Ts9Pwx8AYBVF3EbMOVToI4jV+fCmNHZ0VmSH5GcmeafTW\n\ttIMrfX/A0WwcRCfrUvUg==;", "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1775081218; x=1806617218;\n h=from:to:subject:date:message-id:in-reply-to:references:\n mime-version:content-transfer-encoding;\n bh=vrq7E5QzLexvqdEXgdWozOP6XyUh2lyjMImJjnJKQgU=;\n b=mVsvBVC/I8PRioEeyNomgI1mm7Oiuy1S9osIGDfaZWCQqE0NVoj3omqq\n GHo6HgXXwqqlTLeJu4ceSyPpfjVB6wrTtO+mC8H5YYIO6XGsxG4RZHvzW\n plfAtaRnZu07Ile9Hi2sD/+LHtMt0ZKO0+S2ySYawxrM0FIObRR6W3E53\n sVOOEsIG7utuRA7wB4ccBMhvk3nMgZ1fefxQ3iAKUrusEBD+kOe1WNe1M\n C4U2ZGDlq6mOA/uRHe4Vw0STlHAteXIE5mg09wB2wN3bSbPAZLI4CoH4N\n DJuTrBa8th1lQcRTdW+5A43n+mWG4flRtBoPxgVETLEfklUCHtZhiY0nm\n w==;" ], "X-CSE-ConnectionGUID": [ "fVkeE+1vQ8a3sqBIH63Gkg==", "pdZvzjSTTV6eZsy4yuf+kg==" ], "X-CSE-MsgGUID": [ "9o4bbJH8SwuJNi//bcU8lQ==", "SL+qUoMlQla6J4tSHvu8Tw==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6800,10657,11746\"; a=\"75851703\"", "E=Sophos;i=\"6.23,153,1770624000\";\n d=\"scan'208\";a=\"75851703\"" ], "X-ExtLoop1": "1", "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>", "To": "hostap@lists.infradead.org", "Subject": "[PATCH 69/71] wpa_supplicant: Support NAN_BOOTSTRAP command", "Date": "Thu, 2 Apr 2026 01:02:18 +0300", "Message-ID": "<20260401220220.4418-70-andrei.otcheretianski@intel.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260401220220.4418-1-andrei.otcheretianski@intel.com>", "References": "<20260401220220.4418-1-andrei.otcheretianski@intel.com>", "MIME-Version": "1.0", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260401_150658_304317_AB88FF3C ", "X-CRM114-Status": "GOOD ( 18.49 )", "X-Spam-Score": "-1.9 (-)", "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam. The original\n message has been attached to this so you can view it or label\n similar future email. If you have any questions, see\n the administrator of that system for details.\n Content preview: Add support for handling the following NAN bootstrap\n commands\n over the control interface: - NAN Bootstrap request: used to request start\n or authorize a bootstrap flow with a given peer. - NAN Bootstrap reset:\n used\n to request to stop bootstrap with a given peer and to reset the bootstrap\n st [...]\n Content analysis details: (-1.9 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED RBL: Sender listed at https://www.dnswl.org/,\n medium trust\n [198.175.65.20 listed in list.dnswl.org]\n 1.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.20 listed in\n bl.score.senderscore.com]\n 1.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n query to Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.20 listed in\n sa-trusted.bondedsender.org]\n 1.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.20 listed in sa-accredit.habeas.com]\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS SPF: sender matches SPF record\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n -0.5 DKIMWL_WL_HIGH DKIMwl.org - High trust sender", "X-BeenThere": "hostap@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<hostap.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>", "List-Post": "<mailto:hostap@lists.infradead.org>", "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>", "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "Add support for handling the following NAN bootstrap commands over\nthe control interface:\n\n- NAN Bootstrap request: used to request start or authorize a\n bootstrap flow with a given peer.\n- NAN Bootstrap reset: used to request to stop bootstrap with a\n given peer and to reset the bootstrap state for the given peer.\n\nAdd the corresponding support to 'wpa_cli' as well.\n\nSigned-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>\nSigned-off-by: Ilan Peer <ilan.peer@intel.com>\n---\n wpa_supplicant/ctrl_iface.c | 6 +++\n wpa_supplicant/nan_supplicant.c | 87 +++++++++++++++++++++++++++++++++\n wpa_supplicant/nan_supplicant.h | 3 ++\n wpa_supplicant/wpa_cli.c | 19 ++++++-\n 4 files changed, 114 insertions(+), 1 deletion(-)", "diff": "diff --git a/wpa_supplicant/ctrl_iface.c b/wpa_supplicant/ctrl_iface.c\nindex c724097ea2..47822cd567 100644\n--- a/wpa_supplicant/ctrl_iface.c\n+++ b/wpa_supplicant/ctrl_iface.c\n@@ -14423,6 +14423,12 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,\n \t} else if (os_strncmp(buf, \"NAN_PEER_INFO \", 14) == 0) {\n \t\treply_len = wpas_nan_peer_info(wpa_s, buf + 14, reply,\n \t\t\t\t\t reply_size);\n+\t} else if (os_strncmp(buf, \"NAN_BOOTSTRAP \", 14) == 0) {\n+\t\tif (wpas_nan_bootstrap_request(wpa_s, buf + 14) < 0)\n+\t\t\treply_len = -1;\n+\t} else if (os_strncmp(buf, \"NAN_BOOTSTRAP_RESET \", 20) == 0) {\n+\t\tif (wpas_nan_bootstrap_reset(wpa_s, buf + 20) < 0)\n+\t\t\treply_len = -1;\n #endif /* CONFIG_NAN */\n \t} else {\n \t\tos_memcpy(reply, \"UNKNOWN COMMAND\\n\", 16);\ndiff --git a/wpa_supplicant/nan_supplicant.c b/wpa_supplicant/nan_supplicant.c\nindex 1428adfc32..993486f76f 100644\n--- a/wpa_supplicant/nan_supplicant.c\n+++ b/wpa_supplicant/nan_supplicant.c\n@@ -2396,6 +2396,93 @@ int wpas_nan_peer_info(struct wpa_supplicant *wpa_s, const char *cmd,\n }\n \n \n+/*\n+ * Format: NAN_BOOTSTRAP <peer_nmi> <handle=<id>>\n+ * <req_instance_id=<id>> method=<number> [auth]\n+ */\n+int wpas_nan_bootstrap_request(struct wpa_supplicant *wpa_s, char *cmd)\n+{\n+\tchar *pos, *token, *context = NULL;\n+\tint handle = 0;\n+\tint req_instance_id = 0;\n+\tu8 peer_nmi[ETH_ALEN];\n+\tu16 bootstrap_method = 0;\n+\tbool auth = false;\n+\n+\tif (!wpas_nan_ready(wpa_s))\n+\t\treturn -1;\n+\n+\t/* Parse peer address first */\n+\tif (hwaddr_aton(cmd, peer_nmi) < 0)\n+\t\treturn -1;\n+\n+\t/* Move past the peer_mac address */\n+\tpos = os_strchr(cmd, ' ');\n+\tif (!pos)\n+\t\treturn -1;\n+\tpos++;\n+\n+\twhile ((token = str_token(pos, \" \", &context))) {\n+\t\tif (sscanf(token, \"handle=%i\", &handle) == 1)\n+\t\t\tcontinue;\n+\n+\t\tif (sscanf(token, \"req_instance_id=%i\", &req_instance_id) == 1)\n+\t\t\tcontinue;\n+\n+\t\tif (os_strncmp(token, \"method=\", 7) == 0) {\n+\t\t\tbootstrap_method = atoi(token + 7);\n+\t\t\tcontinue;\n+\t\t}\n+\n+\t\tif (os_strcmp(token, \"auth\") == 0) {\n+\t\t\tauth = true;\n+\t\t\tcontinue;\n+\t\t}\n+\n+\t\twpa_printf(MSG_INFO,\n+\t\t\t \"CTRL: Invalid NAN_BOOTSTRAP parameter: %s\",\n+\t\t\t token);\n+\t\treturn -1;\n+\t}\n+\n+\tif (!bootstrap_method) {\n+\t\twpa_printf(MSG_INFO,\n+\t\t\t \"CTRL: Missing NAN_BOOTSTRAP method\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (handle <= 0) {\n+\t\twpa_printf(MSG_INFO,\n+\t\t\t \"CTRL: Invalid or missing NAN_BOOTSTRAP handle\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (is_zero_ether_addr(peer_nmi)) {\n+\t\twpa_printf(MSG_INFO,\n+\t\t\t \"CTRL: Invalid or missing NAN_BOOTSTRAP address\");\n+\t\treturn -1;\n+\t}\n+\n+\treturn nan_bootstrap_request(wpa_s->nan, handle, peer_nmi,\n+\t\t\t\t req_instance_id, bootstrap_method, auth);\n+}\n+\n+\n+/* Format: NAN_BOOTSTRAP_RESET <peer_nmi> */\n+int wpas_nan_bootstrap_reset(struct wpa_supplicant *wpa_s, char *cmd)\n+{\n+\tu8 peer_nmi[ETH_ALEN];\n+\n+\tif (!wpas_nan_ready(wpa_s))\n+\t\treturn -1;\n+\n+\tif (hwaddr_aton(cmd, peer_nmi) < 0)\n+\t\treturn -1;\n+\n+\treturn nan_bootstrap_peer_reset(wpa_s->nan, peer_nmi);\n+}\n+\n+\n static void wpas_nan_de_add_extra_attrs(void *ctx, struct wpabuf *buf)\n {\n \tstruct wpa_supplicant *wpa_s = ctx;\ndiff --git a/wpa_supplicant/nan_supplicant.h b/wpa_supplicant/nan_supplicant.h\nindex 9b1cdb694c..e85625eb1b 100644\n--- a/wpa_supplicant/nan_supplicant.h\n+++ b/wpa_supplicant/nan_supplicant.h\n@@ -32,6 +32,9 @@ int wpas_nan_ndp_response(struct wpa_supplicant *wpa_s, char *cmd);\n int wpas_nan_ndp_terminate(struct wpa_supplicant *wpa_s, char *cmd);\n int wpas_nan_peer_info(struct wpa_supplicant *wpa_s, const char *cmd,\n \t\t char *reply, size_t reply_size);\n+int wpas_nan_bootstrap_request(struct wpa_supplicant *wpa_s, char *cmd);\n+int wpas_nan_bootstrap_reset(struct wpa_supplicant *wpa_s, char *cmd);\n+\n #else /* CONFIG_NAN */\n \n static inline int wpas_nan_init(struct wpa_supplicant *wpa_s)\ndiff --git a/wpa_supplicant/wpa_cli.c b/wpa_supplicant/wpa_cli.c\nindex a560d15500..d4316eae7f 100644\n--- a/wpa_supplicant/wpa_cli.c\n+++ b/wpa_supplicant/wpa_cli.c\n@@ -3420,7 +3420,6 @@ static int wpa_cli_cmd_nan_update_conf(struct wpa_ctrl *ctrl, int argc,\n \treturn wpa_cli_cmd(ctrl, \"NAN_UPDATE_CONF\", 0, argc, argv);\n }\n \n-\n static int wpa_cli_cmd_nan_sched_config_map(struct wpa_ctrl *ctrl, int argc,\n \t\t\t\t\t char *argv[])\n {\n@@ -3455,6 +3454,18 @@ static int wpa_cli_cmd_nan_peer_info(struct wpa_ctrl *ctrl, int argc,\n \treturn wpa_cli_cmd(ctrl, \"NAN_PEER_INFO\", 2, argc, argv);\n }\n \n+static int wpa_cli_cmd_nan_bootstrap(struct wpa_ctrl *ctrl, int argc,\n+\t\t\t\t char *argv[])\n+{\n+\treturn wpa_cli_cmd(ctrl, \"NAN_BOOTSTRAP\", 4, argc, argv);\n+}\n+\n+static int wpa_cli_cmd_nan_bootstrap_reset(struct wpa_ctrl *ctrl,\n+\t\t\t\t\t int argc, char *argv[])\n+{\n+\treturn wpa_cli_cmd(ctrl, \"NAN_BOOTSTRAP_RESET\", 1, argc, argv);\n+}\n+\n #endif /* CONFIG_NAN */\n \n \n@@ -4256,6 +4267,12 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = {\n \t cli_cmd_flag_none, \"peer_nmi=<nmi> init_ndi=<ndi> ndp_id=<id> = Terminate NAN data path\" },\n \t{ \"nan_peer_info\", wpa_cli_cmd_nan_peer_info, NULL,\n \t cli_cmd_flag_none, \"<addr> <schedule|potential|capa> [map_id] = Get NAN peer information\" },\n+\t{ \"nan_bootstrap\", wpa_cli_cmd_nan_bootstrap, NULL,\n+\t cli_cmd_flag_none,\n+\t \" = <peer_mac> <handle=<service handle>> <req_instance_id=<peer requestor id>> <method=<Bootstrap method>> [auth] = Request or authorize NAN boostrapping with peer\" },\n+\t{ \"nan_bootstrap_reset\", wpa_cli_cmd_nan_bootstrap_reset, NULL,\n+\t cli_cmd_flag_none,\n+\t \" = <peer_mac> = Reset NAN boostrapping with peer\" },\n #endif /* CONFIG_NAN */\n \t{ \"new_random_mac_address\", wpa_cli_cmd_generate_new_mac, NULL,\n \t cli_cmd_flag_none, \"= Generate new random MAC address\" },\n", "prefixes": [ "69/71" ] }