Cover Letter Detail
Show a cover letter.
GET /api/1.1/covers/2229807/?format=api
{ "id": 2229807, "url": "http://patchwork.ozlabs.org/api/1.1/covers/2229807/?format=api", "web_url": "http://patchwork.ozlabs.org/project/hostap/cover/20260428200639.40243-1-andrei.otcheretianski@intel.com/", "project": { "id": 22, "url": "http://patchwork.ozlabs.org/api/1.1/projects/22/?format=api", "name": "HostAP Development", "link_name": "hostap", "list_id": "hostap.lists.infradead.org", "list_email": "hostap@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260428200639.40243-1-andrei.otcheretianski@intel.com>", "date": "2026-04-28T20:05:01", "name": "[00/97] NAN: Group keys support, schedule update and more", "submitter": { "id": 62065, "url": "http://patchwork.ozlabs.org/api/1.1/people/62065/?format=api", "name": "Andrei Otcheretianski", "email": "andrei.otcheretianski@intel.com" }, "mbox": "http://patchwork.ozlabs.org/project/hostap/cover/20260428200639.40243-1-andrei.otcheretianski@intel.com/mbox/", "series": [ { "id": 501927, "url": "http://patchwork.ozlabs.org/api/1.1/series/501927/?format=api", "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501927", "date": "2026-04-28T20:05:05", "name": "NAN: Group keys support, schedule update and more", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501927/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2229807/comments/", "headers": { "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=PdDayqpt;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=hWLy8A+Q;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4s1X6ssqz23gf\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 06:07:55 +1000 (AEST)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHoi5-00000002CB2-31aD;\n\tTue, 28 Apr 2026 20:07:09 +0000", "from mgamail.intel.com ([198.175.65.16])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHoi2-00000002CAN-38eN\n\tfor hostap@lists.infradead.org;\n\tTue, 28 Apr 2026 20:07:08 +0000", "from fmviesa001.fm.intel.com ([10.60.135.141])\n by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:07:05 -0700", "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:07:03 -0700" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:Cc\n\t:To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=VTMS3Sw4Nujs5rjZmINoyVz4L9TuX6uepKs82C3QCps=; b=PdDayqptfam5s+\n\t61kheIxlomu4Fl4wOvpIa+vq3Yb/y/LgIrbMlXIqc3+ZLCNuOu5SonFiWCI4sz1/NLwAebEjXgQGy\n\tZA18upR5E8P4YEdchihBrU9K7Eah/jPqKFT862JB4DJLyfpdhC9XOWepvQxR9/TpaAsxx+cYTQ77Y\n\t8jzXBlKOqWi8LYCPQzgEe1ub9sY8HfE8Sy7/vJiZK3y9bCKgDESBRFA7QPcOU++AMvV5m6eConud6\n\touusjNsvvZtcIIweclx30J8lWSPL3WXq898nsFKdhBrzRc/Uv4R8CHOfAa5CU+1Azd7dLwSW+5CSB\n\t0YEjjsML7zIhYiJbA1ng==;", "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1777406827; x=1808942827;\n h=from:to:cc:subject:date:message-id:mime-version:\n content-transfer-encoding;\n bh=TzYprsBiB2mQv8aWKgUnxOdx/4GRiae5opcZeoktjrQ=;\n b=hWLy8A+Qudq9lUQaOC/opa/OI1Zu/pu8+ddDtar/PeFqj+n0vrtVBVNj\n zMmq3IriEZj+0qnQa/ZxI9TrXyOoC4Yhi84bI7O/7hHhP/6wO2jS7U3Up\n LtL7fsj4Ow1zGY4LV/+jKUbojOpJW++7PeyjqbdXC6k1rczVWO9qhRQ8N\n B0S7Kq2UfuLlYumgyIrJJll85j6HzcYBX9UDmmEi9+LPp+P/N5m2vg8qt\n tgWi6qxhMelA/G1a3VE30kqtvQdtqyMcDnDVWVTDv266haukmnKUCpgPa\n zwts9WvmC8YY38w/dFF3T6BA81XPEx69LaOmX3X3MZ7RfFQlpehlyOpsK\n A==;" ], "X-CSE-ConnectionGUID": [ "a5mBx4JCR02K1xM+A5yzqg==", "q0ySXAtUTX+2/ZiCjtUspw==" ], "X-CSE-MsgGUID": [ "/AiqMIIVTKiwcuMNSTdIVw==", "gSLS2aD4R5K2CwORVLvwJw==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6800,10657,11770\"; a=\"78519208\"", "E=Sophos;i=\"6.23,204,1770624000\";\n d=\"scan'208\";a=\"78519208\"", "E=Sophos;i=\"6.23,204,1770624000\";\n d=\"scan'208\";a=\"257609849\"" ], "X-ExtLoop1": "1", "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>", "To": "hostap@lists.infradead.org", "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAndrei Otcheretianski <andrei.otcheretianski@intel.com>", "Subject": "[PATCH 00/97] NAN: Group keys support, schedule update and more", "Date": "Tue, 28 Apr 2026 23:05:01 +0300", "Message-ID": "<20260428200639.40243-1-andrei.otcheretianski@intel.com>", "X-Mailer": "git-send-email 2.53.0", "MIME-Version": "1.0", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260428_130706_830896_A135A53B ", "X-CRM114-Status": "GOOD ( 15.80 )", "X-Spam-Score": "-4.5 (----)", "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam. The original\n message has been attached to this so you can view it or label\n similar future email. If you have any questions, see\n the administrator of that system for details.\n Content preview: This series adds various NAN improvements and bug fixes: -\n GTK/IGTK/BIGTK support - NDPE support - NAN schedule update handling:\n deferred\n schedule updates,\n peer schedule tracking and ULW support. - Max idle period\n support for NDL - NAN channel evacuation ev [...]\n Content analysis details: (-4.5 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED RBL: Sender listed at https://www.dnswl.org/,\n medium trust\n [198.175.65.16 listed in list.dnswl.org]\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS SPF: sender matches SPF record\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n -0.1 DKIMWL_WL_HIGH DKIMwl.org - High trust sender", "X-BeenThere": "hostap@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<hostap.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>", "List-Post": "<mailto:hostap@lists.infradead.org>", "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>", "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "This series adds various NAN improvements and bug fixes:\n\n- GTK/IGTK/BIGTK support\n- NDPE support\n- NAN schedule update handling: deferred schedule updates, peer schedule\n tracking and ULW support.\n- Max idle period support for NDL\n- NAN channel evacuation event handling\n- Follow up status tracking\n- Password hex support in NDP and pairing\n- Various fixes and improvements\n\nThe test patches are marked as RFC since full testing requires kernel\nNAN data path support which is not yet complete in wireless-next.\nAs in previous series, iwlwifi-next/mac80211_candidate kernel can be\nused for testing.\n\nAndrei Otcheretianski (28):\n tests: Add get_iface_addr() to wpasupplicant.py\n tests: Add NAN data path, bootstrapping and pairing tests\n wpa_supplicant: Don't send empty NAN maps to the kernel\n NAN: Fix A3 in multicast solicited replies\n NAN: Don't skip zero preference potential entries\n NAN: Add locally_generated parameter to ndp_disconnected callback\n NAN: Send NAF with rejection on schedule validation error\n NAN: Fix NDL attribute parsing\n NAN: Skip duplicate NDI station add for second NDP with same peer\n NAN: Only remove NDI station when no other NDP uses the same peer NDI\n tests: NAN: Add tests for 2 NDPs with same peer\n NAN: Wait longer timeout on counter response\n NAN: Send NDP termination on timeout\n NAN: Indicate if NDP disconnection is due to a failure\n tests: Verify NAN-NDP-DISCONNECTED failure flag\n NAN: Implement spec-compliant security strength comparison\n NAN: Clear peer security info on flush\n NAN: Remove stale sec entry on NDP termination\n tests: Support setting TTL for NAN service discovery\n tests: Add NDP reconnection after termination test\n NAN: Terminate all NDPs with peer if security upgrade fails\n NAN: Skip peer schedule update when local schedule update is pending\n wpa_supplicant: Add NAN_STATUS command\n wpa_supplicant: List NDPs in NAN_PEER_INFO command\n wpa_supplicant: Support overriding NAN potential availability\n tests: Add nan_override_potential_availability test\n NAN: Add data_path parameter to NAN_PUBLISH command\n tests: Add data_path flag verification to NDP tests\n\nAvraham Stern (45):\n NAN: Add security cabapilities to NAN module\n NAN: Add and implement set_group_key() callback\n NAN: Add and implement get_seqnum() callback\n NAN: Add IGTK KDE to NDP setup messages\n NAN: Add BIGTK KDE to NDP setup messages\n NAN: Process IGTK KDE from NDP setup messages\n NAN: Process BIGTK KDE from NDP setup messages\n nl80211: Allow deleting group Rx key with specified address\n nl80211: Modify sta_set_flags() to support non-netdev interfaces\n NAN: Remove peer's IGTK/BIGTK when a peer is removed\n NAN: Add an option to set GTK required for a service\n NAN: Add GTK data to NDP security parameters\n NAN: Add GTK cipher suite to NDP setup messages\n wpa_supplicant: Add an option to set the GTK cipher suite for NDP\n setup\n NAN: Modify get_seqnum() to support NDI group keys\n NAN: Add the GTK KDE to key data field when GTK is required\n NAN: Parse the GTK KDE from key data\n wpa_supplicant: Set the GTK for NDP response\n NAN: Add group keys to NDP connected data\n NAN: Pass struct as parameter to wpas_nan_add_ndi_sta()\n NAN: Add peer's GTK ID to NDP disconnected callback\n wpa_supplicant: Install/remove group keys on NDI interface\n NAN: Add an API to set the cipher suite for group keys\n wpa_supplicant: Add support for setting the NAN group keys cipher\n suite\n NAN: Set GTK/IGTK/BIGTK support from driver capabilities\n NAN: Add a function to check if there are active NDPs\n nl80211: Add an option for deferred NAN schedule update\n NAN: Modify nan_peer_schedule_intersects() to return the common slots\n NAN: Move local schedule from NDL data to global NAN data\n NAN: Move NDL QoS checks into a function\n NAN: Update peer schedule when the peer advertises new availability\n map\n wpa_supplicant: Implement NAN schedule changed callback\n wpa_supplicant: Request a deferred NAN schedule if there are active\n NDPs\n NAN: Update peers schedule when local schedule changes\n wpa_supplicant: Handle NAN schedule update notification\n nl80211: Handle NL80211_CMD_NAN_SCHED_UPDATE_DONE event\n wpa_supplicant: Handle NAN ULW notification\n nl80211: Handle NAN ULW attribute notification\n NAN: Add Unaligned Schedule attribute to the list of parsed attributes\n NAN: Update peer schedule when ULW attributes change\n PASN: Include extra IEs in reject frame\n wpa_supplicant: Send response when pairing is aborted\n wpa_supplicant: NAN: Support password hex in NDP request/response\n wpa_supplicant: Add support for password hex in pairing request\n tests: Add NAN NDP test with password as hex\n\nIlan Peer (24):\n NAN: Add definitions and parsing for NDPE\n NAN: Add support for NDPE\n NAN: Add support for communicating the IPv6 local address\n NAN: Support configuration and notification of IPv6 local identifier\n tests: Add coverage for interface ID in NDP\n driver: Extend the NAN capabilities to indicate beacon protection\n NAN: Add a testing configuration for protected NAN multicast follow up\n NAN: Control the support for beacon protection\n wpa_supplicant: Support configuring MAC address on interface creation\n tests: Test NAN management interface creation with an address\n NAN: Add support for including max idle period in NDL\n NAN: Support getting peer max idle period\n NAN: Add handling of max idle period\n wpa_supplicant: NAN: Add support for max NDL idle period\n tests: Verify NAN max idle period\n NAN: Extend Tx status reporting\n NAN: Add support for tracking the status of transmit requests\n wpa_supplicant: Support tracking NAN transmit requests\n tests: Add NAN test to cover followup status tracking\n tests: Test NAN broadcast traffic once NDP has been established\n tests: Add NAN NDP establishment with GTK, IGTK and BIGTK\n tests: Add testing coverage for protected multicast SDF\n driver: Add support for NAN channel evacuation event\n wpa_supplicant: Notify control interface about NAN channel evacuation\n\n src/ap/nan_usd_ap.c | 2 +-\n src/common/nan_de.c | 261 ++++-\n src/common/nan_de.h | 25 +-\n src/common/nan_defs.h | 56 +-\n src/common/wpa_common.h | 7 +\n src/common/wpa_ctrl.h | 8 +\n src/drivers/driver.h | 60 +\n src/drivers/driver_common.c | 3 +\n src/drivers/driver_nl80211.c | 16 +-\n src/drivers/driver_nl80211_capa.c | 16 +\n src/drivers/driver_nl80211_event.c | 71 ++\n src/nan/nan.c | 1004 ++++++++++++++++-\n src/nan/nan.h | 133 ++-\n src/nan/nan_i.h | 80 +-\n src/nan/nan_module_tests.c | 10 +-\n src/nan/nan_ndl.c | 184 ++--\n src/nan/nan_ndp.c | 243 +++-\n src/nan/nan_pairing.c | 130 ++-\n src/nan/nan_sec.c | 506 ++++++++-\n src/nan/nan_util.c | 106 +-\n src/pasn/pasn_responder.c | 5 +-\n tests/hwsim/test_nan.py | 1250 ++++++++++++++++++++-\n tests/hwsim/wpasupplicant.py | 22 +-\n wpa_supplicant/ctrl_iface.c | 73 +-\n wpa_supplicant/dbus/dbus_new_handlers.c | 2 +-\n wpa_supplicant/driver_i.h | 9 +\n wpa_supplicant/events.c | 10 +\n wpa_supplicant/nan_supplicant.c | 1341 +++++++++++++++++++----\n wpa_supplicant/nan_supplicant.h | 25 +-\n wpa_supplicant/notify.c | 74 +-\n wpa_supplicant/notify.h | 15 +-\n wpa_supplicant/wpa_cli.c | 17 +-\n wpa_supplicant/wpa_supplicant_i.h | 8 +\n 33 files changed, 5254 insertions(+), 518 deletions(-)" }