get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.1/patches/2229868/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2229868,
    "url": "http://patchwork.ozlabs.org/api/1.1/patches/2229868/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260428200639.40243-45-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": ""
    },
    "msgid": "<20260428200639.40243-45-andrei.otcheretianski@intel.com>",
    "date": "2026-04-28T20:05:45",
    "name": "[44/97] NAN: Add an API to set the cipher suite for group keys",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "a6d0a7fd9b051a93d288156957b81427719946ff",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260428200639.40243-45-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501927,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/501927/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501927",
            "date": "2026-04-28T20:05:05",
            "name": "NAN: Group keys support, schedule update and more",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501927/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2229868/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2229868/checks/",
    "tags": {},
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=qIcP1WpE;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256\n header.s=desiato.20200630 header.b=dZ2gHxzx;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=HN0CK9LH;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4s7Z5j4pz1xrS\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 06:13:14 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHonQ-00000002JDH-3YrP;\n\tTue, 28 Apr 2026 20:12:40 +0000",
            "from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHokN-00000002F1g-1lpj\n\tfor hostap@bombadil.infradead.org;\n\tTue, 28 Apr 2026 20:09:31 +0000",
            "from mgamail.intel.com ([198.175.65.16])\n\tby desiato.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHojn-00000003ySq-0W3Z\n\tfor hostap@lists.infradead.org;\n\tTue, 28 Apr 2026 20:09:03 +0000",
            "from fmviesa001.fm.intel.com ([10.60.135.141])\n  by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:08:23 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:08:21 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=NPmma8Coy9G8ud6y19yTUcyVW0c64cfy4KOEbrsChKo=; b=qIcP1WpESM8SB0\n\tt4UWhAQDXZX8e1ml9VJ+tFKgtAGe0nR09eQKwrg644BOgYOeq930C0X9jwF7m7nuCUuKZUIV51Vk1\n\tSib/dd/6K7ZLJgXhdRzxM3zSL7gkP5gQ0D5Xxk7Hr3UZ65r250QxWNzx/6G+vt9glO+fqxLIaODdv\n\tipOdkLgoOIhhx1dit3jm47Ie8V9iPNpcCdxTaasdTa99+m7WfHZOwSjtF0NBbojCkA3HNBKi/MFin\n\thg5D1RossIh2TuBd4dqx6abDr04Cciz8sf9VdnGLgfJDJZLYG7R/geUhmNl2mEWUk0HFdV5Vxd2Mf\n\tSXom3Dqyn8VpjG/yikzA==;",
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=infradead.org; s=desiato.20200630; h=Content-Transfer-Encoding:MIME-Version\n\t:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:\n\tContent-Type:Content-ID:Content-Description;\n\tbh=1le6ITTbor+JIFjdeLWXDh5+HrE/CEs8wTp+rIH6yN0=; b=dZ2gHxzxYlnhNGUrKG+MQHJxAE\n\tK8oSPQmOnqD2QFk3UE5K6DdFISrD/bSTYJ/xMNJ7ct+xomP2WjmNRk6JyfArQ1kcOdSTa4KJfolI3\n\tPG/yhYeTbzDkPy/gD1FvjP9isEE/W9DcWb6Cj0E94tmktS01sV1GyfJdM9KilbVpDjaLgMSsVbehO\n\t68xbGGTZQo9JWmO3poxu128SpzC2YohMr8j+kYOsOr/3kQfBo7wKRuYP9r+O9cG0ZGP6oYV4jGYdX\n\tRaj1JWgWUR6cnofCSHIa5l+CnOlUE1CJl887VyYcSVLa0+k6yM+n6w6O0RsO95BtKJQFy1e89FCSl\n\tjWID7CDw==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1777406935; x=1808942935;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=w5HYrfkiDFcDacRKU4cUuWRtyb+OsTcBZMjChVy7fZA=;\n  b=HN0CK9LHvmcd6BZba/BgEVdIiG+5n302l9DPmIr7anTKFpRDTgjgObNb\n   oZSWXlrl0vQHvPHSW2l4hF/eLJ1Xp3AkFfauygyFOllA5IcmwmyEhF0Te\n   CiGQXMugNcqR9Pb83aKv9m6mYMv4lXkjkZWWqkDGQHhQbxCgTK7sDKfRw\n   FLWzXc2dSHvFRXudqzBFb2nEcY3QTHsuhMmVgXBcxfpPUGrEqsiQ8JFkk\n   dw4nkqFu8whwGGL6TUmu3TEPRT462GTC/w4j+NDCppW2ief4cqAJ4ZPNP\n   hW1+bHf2bNawaLBEGj8hy+SH2y0JPCNU+PIPkIsUt1Ql3ThCsl9vs3eJm\n   A==;"
        ],
        "X-CSE-ConnectionGUID": [
            "b4zTcNxrQb2uLN6pBxdXGg==",
            "bKHRGI0YSAqD4TdxAtzuXg=="
        ],
        "X-CSE-MsgGUID": [
            "828fW1aJSlSxQTLeINsfMQ==",
            "tEDC+D7TSo+kaacy8qY2DA=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11770\"; a=\"78519424\"",
            "E=Sophos;i=\"6.23,204,1770624000\";\n   d=\"scan'208\";a=\"78519424\"",
            "E=Sophos;i=\"6.23,204,1770624000\";\n   d=\"scan'208\";a=\"257610454\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>",
        "Subject": "[PATCH 44/97] NAN: Add an API to set the cipher suite for group keys",
        "Date": "Tue, 28 Apr 2026 23:05:45 +0300",
        "Message-ID": "<20260428200639.40243-45-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260428200639.40243-1-andrei.otcheretianski@intel.com>",
        "References": "<20260428200639.40243-1-andrei.otcheretianski@intel.com>",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260428_210857_252494_9A2A367C ",
        "X-CRM114-Status": "GOOD (  12.20  )",
        "X-Spam-Score": "-2.5 (--)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"desiato.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> Add an option\n    to set the group keys cipher suite. The group keys cipher suite can only\n   be set before calling nan_start(). Signed-off-by: Avraham Stern\n <avraham.stern@intel.com>\n    --- src/nan/nan.c | 41 +++++++++++++++++++++++++++++++++++++++++\n src/nan/nan.h\n    | 1 + 2 files changed, 42 insertions(+)\n Content analysis details:   (-2.5 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [198.175.65.16 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "From: Avraham Stern <avraham.stern@intel.com>\n\nAdd an option to set the group keys cipher suite. The group keys\ncipher suite can only be set before calling nan_start().\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n src/nan/nan.c | 41 +++++++++++++++++++++++++++++++++++++++++\n src/nan/nan.h |  1 +\n 2 files changed, 42 insertions(+)",
    "diff": "diff --git a/src/nan/nan.c b/src/nan/nan.c\nindex 51ea72e20f..21b5e0ea69 100644\n--- a/src/nan/nan.c\n+++ b/src/nan/nan.c\n@@ -2965,3 +2965,44 @@ bool nan_is_ndpe_supported(struct nan_data *nan, struct nan_peer *peer)\n \n \treturn false;\n }\n+\n+\n+/**\n+ * nan_set_mgmt_group_cipher - Set NAN management group cipher\n+ *\n+ * @nan: Pointer to NAN data structure\n+ * @cipher: Cipher suite to be set (WPA_CIPHER_AES_128_CMAC or\n+ *\tWPA_CIPHER_BIP_GMAC_256)\n+ *\n+ * This function sets the management group cipher for NAN communication.\n+ * The cipher can only be changed when NAN is not started.\n+ *\n+ * Returns: 0 on success, -1 on failure\n+ */\n+int nan_set_mgmt_group_cipher(struct nan_data *nan, int cipher)\n+{\n+\tif (!nan)\n+\t\treturn -1;\n+\n+\tif (nan->nan_started) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Cannot set NAN management group cipher while NAN is started\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (cipher != WPA_CIPHER_AES_128_CMAC &&\n+\t    cipher != WPA_CIPHER_BIP_GMAC_256) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Unsupported NAN management group cipher %d\",\n+\t\t\t   cipher);\n+\t\treturn -1;\n+\t}\n+\n+\tif (cipher == WPA_CIPHER_BIP_GMAC_256)\n+\t\tnan->cfg->security_capab |=\n+\t\t\tNAN_CS_INFO_CAPA_IGTK_USE_NCS_BIP_GMAC_256;\n+\telse\n+\t\tnan->cfg->security_capab &=\n+\t\t\t~NAN_CS_INFO_CAPA_IGTK_USE_NCS_BIP_GMAC_256;\n+\treturn 0;\n+}\ndiff --git a/src/nan/nan.h b/src/nan/nan.h\nindex cf7db9b3b7..97644a7117 100644\n--- a/src/nan/nan.h\n+++ b/src/nan/nan.h\n@@ -835,6 +835,7 @@ struct wpabuf * nan_crypto_derive_nira_tag(const u8 *nik, size_t nik_len,\n \t\t\t\t\t   const u8 *nmi_addr,\n \t\t\t\t\t   const u8 *nira_nonce);\n int nan_ndp_requested_gtk_csid(struct nan_data *nan, struct nan_ndp_id *ndp_id);\n+int nan_set_mgmt_group_cipher(struct nan_data *nan, int cipher);\n #ifdef CONFIG_PASN\n int nan_pairing_add_attrs(struct nan_data *nan_data, struct wpabuf *buf);\n int nan_pairing_initiate_pasn_auth(struct nan_data *nan_data, const u8 *addr,\n",
    "prefixes": [
        "44/97"
    ]
}